Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security protection method and device, electronic equipment and readable storage medium

A network security and web technology, applied in the field of network security, can solve the problems of poor security protection reliability, mismatch or mismatch, poor reliability, etc.

Active Publication Date: 2021-02-09
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the lack of contextual understanding, static rules often have mismatches or mismatches, and are often easily bypassed in the defense process or "kill one thousand enemies and self-damage eight hundred". Reliable security protection Poor sex
[0003] Therefore, the problem of poor reliability in related technologies is a technical problem that those skilled in the art need to solve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protection method and device, electronic equipment and readable storage medium
  • Network security protection method and device, electronic equipment and readable storage medium
  • Network security protection method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is only a part of the embodiments of the present application, but not all the embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0049] Please refer to figure 1 , figure 1 It is a flow chart of a network security protection method provided by the embodiment of this application. The method includes:

[0050] S101: Obtain an access request sent by a terminal, and use the access request to determine a target webpage.

[0051] It should be noted that som...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network security protection method and device, electronic equipment and a computer readable storage medium, and the method comprises the steps: obtaining an access request transmitted by a terminal, and determining a target webpage through the access request; determining whether the target webpage needs to be isolated or not; if the target webpage needs to be isolated, acquiring webpage data corresponding to the target webpage from a server; rendering the webpage data to obtain output data, and sending the output data to the terminal. The webpage data is obtained froma server and then rendered locally. The rendered output only comprise data used for display. After the output data is sent to a terminal, the terminal can still conduct webpage access normally, but cannot obtain necessary information for conducting network attacks through the obtained output data, or cannot directly perform data interaction with the part, used for webpage access, of the server, so that the terminal cannot directly attack the target webpage. Thus, the reliability of security protection is improved.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular to a network security protection method, a network security protection device, electronic equipment, and a computer-readable storage medium. Background technique [0002] With the promotion of the country's "Internet +" in recent years this year, more and more business systems have been drawn to the Internet, and the Internet has also carried more and more important assets. While web browsers bring convenience to people, they also bring security threats. When performing network security protection, related technologies usually use WAF (WEB Application Firewall) to solve security problems. The core principle of WAF is to analyze HTTP requests, perform rule detection based on configured static rules, perform different defense actions according to the detection results, and record the defense process. However, due to the lack of contextual understanding, static...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F16/958
CPCH04L63/02H04L67/02G06F16/972
Inventor 王楠范渊杨勃
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD