Access detection method and device, electronic equipment and computer storage medium

A detection method and detection device technology, applied in the field of network security, can solve the problems of user loss, incompleteness, installation, etc.

Pending Publication Date: 2021-03-30
SANGFOR TECH INC
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once hackers or viruses successfully invade the system, they will install malicious programs on the system, steal confidential data or use the controlled computer to send spam, thus causing irreparable losses to users
[0003] In related technologies, in the network protection scenario, in order to ensure the security of user information, vulnerability defense is implemented by deploying an application firewall (Application Firewa

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access detection method and device, electronic equipment and computer storage medium
  • Access detection method and device, electronic equipment and computer storage medium
  • Access detection method and device, electronic equipment and computer storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the examples provided here are only used to explain the present invention, not to limit the present invention. In addition, the examples provided below are some examples for implementing the present invention, rather than providing all the examples for implementing the present invention. In the case of no conflict, the technical solutions recorded in the embodiments of the present invention can be combined in any manner implement.

[0062] It should be noted that, in the embodiments of the present invention, the terms "comprising", "comprising" or any other variant thereof are intended to cover non-exclusive inclusion, so that a method or device comprising a series of elements not only includes the explicitly stated elements, but also include other elements not explicitly listed, or also include elements inherent in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an access detection method applied to a first terminal, and the method comprises the steps: reporting malicious network information to a cloud, and enabling the cloud to transmit the malicious network information to all terminals connected with the cloud; receiving malicious network information issued by the cloud, and updating the local blacklist and/or white list of each terminal according to the malicious network information to obtain an updating result; and acquiring an access request, and detecting network information corresponding to the access request based on the updating result. The embodiment of the invention further provides an access detection device, electronic equipment and a computer storage medium.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an access detection method, device, electronic equipment and computer storage medium. Background technique [0002] In today's Internet environment where vulnerabilities frequently appear, no matter whether it is a traditional World Wide Web (World Wide Web, Web) vulnerability or a common component vulnerability that is constantly emerging, it is possible to be attacked by hackers or viruses from the network. Once hackers or viruses successfully invade the system, they will install malicious programs on the system, steal confidential data or use the controlled computer to send spam, thus causing irreparable losses to users. [0003] In related technologies, in the network protection scenario, in order to ensure the security of user information, vulnerability defense is implemented by deploying an application firewall (Application Firewall, AF) device on each terminal; th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/1441H04L63/1433
Inventor 李宁丰
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products