Security verification defect detection method and device and electronic equipment

A technology for security verification and defect detection, applied in the field of communication, can solve problems such as undetectable, and achieve the effect of ensuring normal communication

Active Publication Date: 2020-09-01
BEIJING BYTEDANCE NETWORK TECH CO LTD
View PDF11 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Currently, man-in-the-middle attacks can be used to detect whether the module has security verification defects. Specifically, whether the module has security verification defects can be judged by whether the encrypted connection between the module and the "man-in-the-middle" is successfully established. However, due to the Each module has a dependency relationship in oper

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security verification defect detection method and device and electronic equipment
  • Security verification defect detection method and device and electronic equipment
  • Security verification defect detection method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although certain embodiments of the present disclosure are shown in the drawings, it should be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein; A more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the present disclosure are for exemplary purposes only, and are not intended to limit the protection scope of the present disclosure.

[0028] It should be understood that the various steps described in the method implementations of the present disclosure may be executed in different orders, and / or executed in parallel. Additionally, method embodiments may include additional steps and / or omit performing illustrated steps. The scope of the present disclosure is not limited in this regard. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security verification defect detection method and device, and electronic equipment, and relates to the field of communications. The method comprises the steps: receiving an encrypted connection establishment request sent by a functional module in a client; establishing encrypted connection with the function module based on the encrypted connection establishment request soas to detect whether the function module has a security verification defect; if the encrypted connection establishment fails, forwarding the data between the functional module and the server in a transparent transmission mode, so as to ensure that after the functional module and the server communicate normally; starting other functional modules associated with the functional module in operation inthe client to operate to perform security verification defect detection. According to the invention, it can be ensured that security verification defect detection can be carried out on each functional module associated with client side operation.

Description

technical field [0001] The disclosure provides a security verification defect detection method, device and electronic equipment, and relates to the communication field. Background technique [0002] A device or application program (APP) can call many software package development tools (Software Development Kit, SDK) modules to realize its functions, and the communication between the modules and the server can be based on the Transport Layer Security protocol (Transport Layer Security, TLS) or data packet transport layer Security protocols (Datagram TransportLayer Security, DTLS) etc. establish encrypted connections for communication, and there may be security verification flaws when establishing encrypted connections for communication based on tls or dtls. [0003] Currently, man-in-the-middle attacks can be used to detect whether the module has security verification defects. Specifically, whether the module has security verification defects can be judged by whether the encr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/1416
Inventor 郑玉伟秦明闯
Owner BEIJING BYTEDANCE NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products