Program security detection protection method, middleware system and security middleware system

A security detection and middleware technology, applied in the field of software system vulnerability detection, can solve problems such as low program security

Active Publication Date: 2021-03-19
SECZONE TECH CO LTD
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to improve the problem of low security of programs running on middleware systems, the present application provides a middleware system-based program security detection and protection method, a middleware system, and a security middleware system for protecting program security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program security detection protection method, middleware system and security middleware system
  • Program security detection protection method, middleware system and security middleware system
  • Program security detection protection method, middleware system and security middleware system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to describe the technical content, structural features, achieved goals and effects of the present invention in detail, the following will be described in detail in conjunction with the embodiments and accompanying drawings.

[0068] The following is attached Figure 1-Figure 12 The application is described in further detail.

[0069] Middleware is a type of software between the application system and system software. It uses the basic services (functions) provided by the system software to connect various parts of the application system or different applications on the network, and can share resources and functions. .

[0070] The embodiment of the present application discloses a program security detection and protection method based on a middleware system. refer to figure 1 with figure 2 , a security proxy module is deployed on the middleware system, and the security proxy module dynamically inserts stub detection probes in the bytecode of the program run...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a program security detection and protection method based on a middleware system, the middleware system and a security middleware system for protecting program security, and belongs to the technical field of software systems. The security detection and protection method comprises the steps: dynamically instrumenting byte codes of a program running on the middleware system,and collecting the contextual information of the program during running; detecting the program and the security weakness of the third-party program referenced in the program; adopting a protection means according to the detected attack aiming at the security weakness, wherein a security agent module is deployed on the middleware system and comprises an acquisition sub-module, a detection sub-module and a protection and output sub-module, and the security middleware system for protecting the program security comprises a security processing module, a middleware system and a security processing module. The method and the device have the effect of improving the problem of relatively low security of the program running on the middleware system.

Description

technical field [0001] The present application relates to the technical field of software system vulnerability detection, in particular to a program security detection and protection method based on a middleware system, a middleware system and a security middleware system for protecting program security. Background technique [0002] Middleware is a type of software between the application system and system software. It uses the basic services (functions) provided by the system software to connect various parts of the application system or different applications on the network, and can achieve resource sharing and function sharing. the goal of. [0003] The stub insertion technology is to insert probes into the program on the basis of ensuring the original logical integrity of the program under test, and throw out the characteristic data of the program operation through the execution of the probes. Through the analysis of these data, the program can be obtained. Control flo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36G06F21/52
CPCG06F11/3644G06F21/52
Inventor 万振华付山阳
Owner SECZONE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products