Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

79 results about "Application firewall" patented technology

An application firewall is a form of firewall that controls input, output, and/or access from, to, or by an application or service. It operates by monitoring and potentially blocking the input, output, or system service calls that do not meet the configured policy of the firewall. The application firewall is typically built to control all network traffic on any OSI layer up to the application layer. It is able to control applications or services specifically, unlike a stateful network firewall, which is - without additional software - unable to control network traffic regarding a specific application. There are two primary categories of application firewalls, network-based application firewalls and host-based application firewalls.

System vulnerability detection method, device, terminal equipment and medium

PendingCN110472414AAvoid manual analysis item by itemQuick fixPlatform integrity maintainanceObject basedTerminal equipment
The invention provides a system vulnerability detection method, a system vulnerability detection device and terminal equipment, and belongs to the technical field of signal processing. The method comprises the steps of obtaining an interception log collected by an application firewall; analyzing the interception log, and extracting attack parameters associated with the attack event in the interception log; determining a simulation object corresponding to the to-be-attacked object in the test environment according to the address information; replaying the attack parameters in the test environment, and receiving response information returned by the simulation object based on the attack parameters; and determining an attack result generated by the attack parameter to the to-be-attacked objectaccording to the response information, and identifying system vulnerability information of the to-be-attacked object based on the attack result. According to the method, the simulation operation about the historical attack event of the production environment is executed in the test environment, and the attack result of the to-be-attacked object about the attack parameter is indirectly determined,so that whether the historical attack event succeeds or not is automatically verified, and the detection efficiency and the detection accuracy of the system vulnerability are improved.
Owner:CHINA PING AN LIFE INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products