Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and device for checking malicious extension of browser and computer equipment

An inspection method and browser technology, which can be used in encryption devices with shift registers/memory, secure communication devices, network data retrieval, etc., and can solve problems such as user interference, imperfect auditing systems, and economic losses.

Pending Publication Date: 2020-10-27
PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in order to prevent malicious extensions, existing technologies often prevent them by strengthening the review mechanism of browser extensions; due to the imperfect review system and the scheming of malicious extension developers, it is inevitable that some malicious extensions will pass the review of browser manufacturers , released to the app store, and installed by users in their respective browsers, which caused light or heavy interference to users, and brought direct economic losses to users by changing the HTML page structure (such as illegally obtaining personal data, bank account information, etc.)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for checking malicious extension of browser and computer equipment
  • Method and device for checking malicious extension of browser and computer equipment
  • Method and device for checking malicious extension of browser and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to better understand the technical solutions of the present invention, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0068] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0069] Terms used in the embodiments of the present invention are only for the purpose of describing specific embodiments, and are not intended to limit the present invention. As used in the embodiments of the present invention and the appended claims, the singular forms "a", "said" and "the" are also intended to include the plural forms unless the context clearly dictates otherwise.

[0070] It should be understood that the term "and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and device for checking malicious extension of a browser and computer equipment. The method comprises the steps: receiving a key acquisition request sent by a terminal through the browser; generating a first key according to the key acquisition request, and returning the first key to the terminal; receiving a first message authentication code and afirst change record sent by the terminal, wherein the first change record comprises DOM change triggering information corresponding to a first change; executing a change operation corresponding to the DOM change triggering information on a reference DOM tree to obtain a second DOM tree change sequence; calculating the first key and the second DOM tree change sequence by a predetermined algorithmto obtain a second message authentication code; determining whether the calculated second message authentication code is the same as the first message authentication code or not; and if so, determining that the page structure of the browser is not damaged by browser extension. According to the method, the malicious extension behavior of the browser can be reliably detected.

Description

technical field [0001] The invention relates to the field of rack operation and maintenance, in particular to a method, device and computer equipment for checking malicious browser extensions. Background technique [0002] Browsers allow users to interact with various communication networks (such as the Internet) in order to view websites, access computer files in various formats, manage network applications, etc.; in order to extend the functional capabilities of web browsers, many web browsers allow extensions, browsing Browser extensions are usually developed by independent developers / development teams, released to various browser application stores, and run in the closed environment provided by the browser after being reviewed by the browser manufacturer. The extension is an enhanced function of the browser, and generally the API (Application Program Interface, application program) interface authority provided by the browser is higher than the operability of the browser ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/08H04L9/06G06F16/958
CPCH04L63/083H04L63/10H04L67/02H04L69/162H04L9/0869H04L9/0643G06F16/958
Inventor 林泽全
Owner PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products