Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Web security protection method

A security protection and filtering method technology, applied in the field of Web security, can solve problems such as different levels of awareness of security issues, distraction of project developers, poor perception by Party A, etc., to solve security reinforcement problems, realize Web security protection, and general strong effect

Pending Publication Date: 2021-11-30
ZHONGBO INFORMATION TECH RES INST CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Caused project developers to scatter
2. Due to the different levels of technical ability and understanding of security issues of each project team, in the actual project security hardening development, there is a problem that A vulnerability is solved and B vulnerability is exposed
During the repeated process of security scanning and vulnerability repairing by the project team, it gave Party A a very bad perception and exposed many security risks.
3. Since each project maintains its own security issues, it fails to concentrate efforts to solve various security issues, resulting in a waste of manpower for repeated security reinforcement in multiple projects or functions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web security protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0017] Such as figure 1 As shown, the Web security protection method of the embodiment of the present invention includes the following steps:

[0018] S1, introducing security components, wherein the security component is a Jar package, which includes the LimitWordUtil desensitization tool class, WordBankUtil thesaurus processing class, SecurityRequestWrapper class and SecurityFilter class, the LimitWordUtil desensitization tool class contains multiple filteri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a Web security protection method, which comprises the following steps that a security component is introduced, the security component is a Jar packet, a LimitWordUtil desensitization tool class in the Jar packet comprises a plurality of filtering methods, a Security Request Wrapper class comprises a plurality of methods for obtaining request contents of a request object, each method for acquiring the request content of the request object calls a plurality of filtering methods before returning a result; when an external request exists, intercepting a specified request through a Security Filter class, it is judged whether the specified request is a white list request, and if the specified request is not the white list request, a request object is repackaged by using a Security Request Wrapper class; and the packaged request object is transmitted back to the filter chain of the SecurityFilter type.

Description

technical field [0001] The invention relates to the technical field of Web security, in particular to a Web security protection method. Background technique [0002] With the rapid development of Internet technology in recent years, as well as domestic and international environmental changes and network security requirements, all enterprises and institutions are paying more and more attention to the construction of network security. In addition to the security construction at the hardware and network levels, many security requirements have been put forward for Web application services, so that our developers have to consider the processing of various Web security factors in project construction. The common ones are Xss (Cross Site Scripting, cross-site scripting attack) cross-site scripting, SQL (Structured Query Language, Structured Query Language) injection, sensitive information disclosure, etc. [0003] In the current development framework, there are no particularly goo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F21/64G06F16/955
CPCG06F21/6245G06F21/64G06F16/955
Inventor 丁振华
Owner ZHONGBO INFORMATION TECH RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products