Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Backdoor safety protection device and method applied to global wide area network

A security protection device and global wide area network technology, applied in the field of backdoor security protection devices, can solve the problem of incapable of malicious script backdoor program protection, and achieve the effect of preventing attackers from further intrusion

Pending Publication Date: 2020-10-09
SHANGHAI COMMITTEE CHINA TELECOM GRP LABOR UNION +1
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a backdoor safety protection device and method applied to the global wide area network, aiming to solve the technical problem in the prior art that the malicious script backdoor program itself that has been implanted in the website cannot be protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Backdoor safety protection device and method applied to global wide area network
  • Backdoor safety protection device and method applied to global wide area network
  • Backdoor safety protection device and method applied to global wide area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0039] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0040] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments, but not as a limitation of the present invention.

[0041] see figure 2 , the present invention provides a backdoor safety protection device applied to the global...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a backdoor safety protection device and method applied to a global wide area network. The backdoor safety protection device is integrated into application safety protection equipment of the global wide area network. The application security protection equipment specifically comprises: an acquisition module, which is used for acquiring feature code keywords of a script backdoor program of a request website; a calling interface module, which is connected with the acquisition module and is used for calling the feature code keywords acquired by the acquisition module; a predefined rule base, which is used for storing a preset keyword combination set in advance; a rule detection module, which is connected with the predefined rule base and the calling interface module andused for detecting whether at least one keyword group formed by keywords is matched with a certain keyword group in the preset keyword combination set or not, and if matching succeeds, generating a disconnection source request connection command; and an action module, which is connected with the rule detection module and is used for executing the disconnection source request connection command soas to refuse the access request between the request websites. According to the method, dynamic access control can be carried out on the malicious script backdoor program implanted into the website, hacker behaviors are found, connection is disconnected in time, the server with the Trojan horse is protected, deeper defense is achieved, and attackers are prevented from further invading.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a backdoor security protection device and method applied to a global wide area network. Background technique [0002] The use of the Internet is increasingly widespread, and programs based on the web application layer (global wide area network application layer) are widely popularized. In the prior art, various protection technologies are adopted for web application security issues, such as figure 1 , the database server (14) and the Web server (13) are used as background servers, and security protection devices such as a firewall (10), an IDS / IPS (11), and an application firewall (12) are arranged between the client (9) requesting access . [0003] Firewall (10) is a kind of equipment that helps computer network build a relatively isolated protective barrier between its internal and external networks to protect user data and information security; IDS (intrusion detecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/145H04L63/1416
Inventor 赵勇方剑金剑锋
Owner SHANGHAI COMMITTEE CHINA TELECOM GRP LABOR UNION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products