Unauthorized vulnerability detection method and device, equipment and computer program product

A vulnerability detection and vulnerability technology, applied in the field of financial technology, can solve the problem of low efficiency of unauthorized vulnerability detection, and achieve the effect of improving efficiency

Active Publication Date: 2021-09-28
WEBANK (CHINA)
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to propose a method, device, equipment and computer program product for detecting unauthorized vulnerabilities, aiming at solving the low efficiency of existing unauthorized vulnerability detection technical issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unauthorized vulnerability detection method and device, equipment and computer program product
  • Unauthorized vulnerability detection method and device, equipment and computer program product
  • Unauthorized vulnerability detection method and device, equipment and computer program product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0053] like figure 1 as shown, figure 1 It is a schematic diagram of the structure of an unauthorized vulnerability detection device in the hardware operating environment involved in the solution of the embodiment of the present invention.

[0054] In the embodiment of the present invention, the unauthorized vulnerability detection device may be a PC or a server device on which a virtual machine runs.

[0055] like figure 1 As shown, the unauthorized vulnerability detection device may include: a processor 1001 , such as a CPU, a network interface 1004 , a user interface 1003 , a memory 1005 , and a communication bus 1002 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display), an input unit such a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of finance science and technology, and discloses an unauthorized vulnerability detection method and device, equipment and product, and the method comprises the steps: receiving a first service request comprising a first identity label of a to-be-detected system, and modifying the first identity label to obtain a second service request; executing the first service request and the second service request to obtain response data; fragmenting each piece of response data, and performing hash on each piece of fragmented data to obtain a first fragmented hash value and a second fragmented hash value; splicing the first fragment hash values to obtain a first spliced hash value, and splicing the second fragment hash values to obtain a second spliced hash value; and determining whether the to-be-detected system has an unauthorized vulnerability or not according to the similarity of the two spliced hash values. According to the method, the response data is fragmented, and the similarity comparison is performed according to the hash value of the obtained fragmented data, so the efficiency of the unauthorized vulnerability detection is improved on the premise of ensuring the accuracy of the unauthorized vulnerability detection.

Description

technical field [0001] The present invention relates to the technical field of financial science and technology (Fintech), and in particular to a detection method, device system, equipment and computer program product for unauthorized loopholes. Background technique [0002] With the development of computer technology, more and more technologies (big data, distributed, blockchain, artificial intelligence, etc.) The industry's security and real-time requirements also put forward higher requirements for unauthorized vulnerability detection technology. [0003] With the recent outbreak of various high-risk vulnerabilities, network security issues have attracted more and more attention. Privilege violation vulnerability, a common security vulnerability in web applications, means that due to the negligence of programmers, there is no strict restriction on the permissions / users required for an operation, so that users who should not have operation permissions can operate normally...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/1433H04L9/3239
Inventor 刘宇滨
Owner WEBANK (CHINA)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products