Unlock instant, AI-driven research and patent intelligence for your innovation.

Detection protection method and system, computer equipment and readable storage medium

A protection system, a technology to be detected, applied in computing, platform integrity maintenance, digital data information retrieval, etc., can solve problems such as inconvenient protection and modification of program code layers, and achieve code modification costs. The purpose and advantages are simple and easy to understand Effect

Pending Publication Date: 2022-01-04
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a detection and protection method, system, computer equipment, and readable storage medium, so as to at least solve the SQL injection vulnerability in the related art when the application program of the webpage interacts with the data in the background database, and does not The problem of facilitating protection modification from the program code layer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection protection method and system, computer equipment and readable storage medium
  • Detection protection method and system, computer equipment and readable storage medium
  • Detection protection method and system, computer equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be described and explained below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application. Based on the embodiments provided in the present application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0043] Obviously, the accompanying drawings in the following description are only some examples or embodiments of the present application, and those skilled in the art can also apply the present application to other similar scenarios. In addition, it can also be understood that although such development efforts may be complex and lengthy, for those of ord...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a detection protection method and system, computer equipment and a readable storage medium, and the detection protection method comprises the steps: extracting an SQL statement in request data; performing lexical analysis on the SQL statement to obtain a word set; establishing an abstract syntax tree according to the word set; matching each leaf node of the abstract syntax tree with a plurality of preset blocking rules, when any leaf node is matched with the previous blocking rule, inqurying the operation type corresponding to the matched blocking rule and executing the corresponding operation in the operation type on the SQL statement. Through the detection protection method, the problems that SQL injection vulnerabilities exist and protection modification is inconvenient to perform from a program code layer when an application program of a webpage interacts with data in a background database are solved, accurate judgment of SQL injection attacks of the to-be-detected system is realized, operation is independent of the to-be-detected system. For an old application system, a developer does not need to check and modify codes.

Description

technical field [0001] The present application relates to the technical field of communication security protection, in particular to a detection and protection method, system, computer equipment and readable storage medium. Background technique [0002] Structured Query Language (Structured Query Language), referred to as SQL, is a special-purpose programming language. It is a database query and programming language. SQL is used when the application data of the web page interacts with the data in the background database. And SQL injection is to modify the original URL (Uniform Resource Locator, Uniform Resource Locator) of the web page, form fields or data packet input parameters, modify and splice them into SQL statements, pass them to the web server, and then pass them to the database server to execute database commands , a SQL injection attack occurs. Any application system developed using a database may have a medium for SQL injection attacks. Since 1999, SQL injection ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F16/242
CPCG06F21/55G06F16/242
Inventor 周昌剑范渊刘博
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD