Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for website security detection

A security detection and website technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problems of lack of vulnerability verification mechanism, false positives, etc., to improve quality and efficiency, reduce false positives, and maintain information security. Effect

Active Publication Date: 2016-01-06
QI-ANXIN LEGENDSEC INFORMATION TECH (BEIJING) INC +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In traditional website vulnerability scanning products, vulnerability testing is only performed on existing pages, and after a vulnerability is discovered, the necessary vulnerability verification mechanism is lacking, resulting in a high number of false positives

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for website security detection
  • Method and device for website security detection
  • Method and device for website security detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0028] figure 1 A flow chart of a website security detection method 100 according to an embodiment of the present invention is schematically illustrated. Such as figure 1 As shown, in the website security detection method 100 according to the embodiment of the present invention, the method starts with step S102, and in step S102, according to the website's website address, a first detection website associated with the website is c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a website security detection method, website security detection equipment and a website security detection system. The method includes the steps: according to a web address of a website, constructing a first detection web address relevant to the website; accessing to the website by the aid of the first detection web address, and detecting whether the website has vulnerabilities or not on the basis of return results of the website; under the circumstance that the detection results indicate that the website has the vulnerabilities, constructing a second detection web address corresponding to the first detection web address based on the first detection web address; and accessing to the website by the aid of the second detection web address, and verifying whether the website has the vulnerabilities or not on the basis of the return results of the website.

Description

technical field [0001] The invention relates to computer network security, in particular to a website security detection method, device and system. Background technique [0002] A vulnerability is a weakness or flaw in a computer system. Vulnerabilities may come from flaws in application software or operating system design or errors in coding, or from design flaws in the process of business interaction or unreasonable logic flow. These defects, errors or unreasonable parts may be used intentionally or unintentionally, thereby causing adverse effects on an organization's assets or operations, such as information systems being attacked or controlled, important information being stolen, user data being tampered with, and systems being used as Springboard for intrusion into other host systems. Judging from the vulnerabilities discovered so far, the vulnerabilities in application software are far more than those in the operating system, especially the vulnerabilities in WEB app...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
Inventor 龙专赵武
Owner QI-ANXIN LEGENDSEC INFORMATION TECH (BEIJING) INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products