Unlock instant, AI-driven research and patent intelligence for your innovation.

Data defense method, defense device, terminal device and readable storage medium

A technology for terminal equipment and data, applied in the field of network security, can solve the problem of data security protection that cannot be accessed, and achieve the effect of avoiding attacks

Pending Publication Date: 2021-11-19
云盾智慧安全科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a data defense method, defense equipment, terminal equipment, and a readable storage medium, which are used to solve the technical problem of being unable to provide security protection for the data to be accessed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data defense method, defense device, terminal device and readable storage medium
  • Data defense method, defense device, terminal device and readable storage medium
  • Data defense method, defense device, terminal device and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Embodiments of the present invention provide a data defense method, a terminal device, and a computer-readable storage medium, which are used to provide security protection for data to be accessed.

[0056] In order to enable those skilled in the art to better understand the solution of the present invention, the following will describe the technical solution in the embodiment of the present invention in conjunction with the accompanying drawings in the embodiment of the present invention. Obviously, the described embodiment is only a part of the present invention Examples, but not all examples. All embodiments based on the present invention shall belong to the protection scope of the present invention.

[0057] The terms "first" and "second" in the specification and claims of the present invention are used to distinguish different objects, rather than to describe a specific order of objects. For example, the first prompt message and the second prompt message are used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data defense method, defense equipment, terminal equipment and a readable storage medium, which are applied to the technical field of network security and can provide security guarantee for data to be accessed. The method provided by the embodiment of the invention comprises the following steps that the defense equipment receives a first access request sent by the terminal equipment, wherein the first access request comprises an address of to-be-accessed data; under the condition that the defense equipment determines that the first access request is an attack request, if the defense equipment determines that the address of the to-be-accessed data belongs to the address of preset access data, a first response message is output according to the first access request, wherein the first response message comprises a link address of a data defense system (DWS), or the uniform resource of the DWS locates the access data of the url address of the system.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a data defense method, defense equipment, terminal equipment and a readable storage medium. Background technique [0002] With the continuous development and popularization of the Internet (Internet), the Internet has become an indispensable communication platform for people. At present, many businesses rely on the Internet, such as online banking, online shopping, online games, etc. Many malicious attackers attack World Wide Web (Web) servers for bad purposes, and try to obtain other people's information through various means. information for profit. [0003] In the prior art, the main protection mechanism is a Web Application Firewall (Waf). The Waf detects illegal content in the request and blocks the request. The Web service security mechanism similar to the present invention has a Web sandbox. By setting an application system with multiple weaknesses, attackers c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1491
Inventor 肖军欧怀谷王枭卿丁倩
Owner 云盾智慧安全科技有限公司