CN113918862A - Web application protection method, system and computer readable storage medium - Google Patents

Web application protection method, system and computer readable storage medium Download PDF

Info

Publication number
CN113918862A
CN113918862A CN202111232418.1A CN202111232418A CN113918862A CN 113918862 A CN113918862 A CN 113918862A CN 202111232418 A CN202111232418 A CN 202111232418A CN 113918862 A CN113918862 A CN 113918862A
Authority
CN
China
Prior art keywords
parameter
picture
web application
back end
parameter value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111232418.1A
Other languages
Chinese (zh)
Inventor
刘安
徐雷
张小梅
郭新海
丁攀
蓝鑫冲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202111232418.1A priority Critical patent/CN113918862A/en
Publication of CN113918862A publication Critical patent/CN113918862A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9566URL specific, e.g. using aliases, detecting broken or misspelled links
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Medical Informatics (AREA)
  • Information Transfer Between Computers (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a web application protection method, a system and a computer readable storage medium, wherein the method comprises the following steps: the method comprises the steps that a front end sends a data request to a rear end, wherein the data request carries Uniform Resource Locators (URLs) and parameter information; after receiving the data request, the back end analyzes the parameter information to obtain a corresponding parameter value; and the back end generates a corresponding parameter picture according to the parameter value and stores the parameter picture in a preset database. According to the invention, by imaging the parameter values, the web application risk caused by inserting malicious codes into the parameters can be avoided, cross-site scripts, sql injection, file uploading, brute force cracking and other attacks can be effectively prevented, the safety of the web application is improved, the comprehensive protection on the web application is realized, and the problem that the web application is not completely protected by the existing web application protection method is solved.

Description

Web application protection method, system and computer readable storage medium
Technical Field
The present invention relates to the field of web application protection technologies, and in particular, to a method and a system for web application protection and a computer-readable storage medium.
Background
The internet is changing day by day, the web attack events are coming out endlessly, and the attack means are hidden all the more. With the popularization of networks, web applications are closely tied to people's lives. The exposed surface of the Web application back end to the user is mainly concentrated in parameters, and an attacker often achieves the attack purpose by elaborately constructing the parameters and adding malicious codes into the parameters. At present, certain protection effect can be achieved by checking the parameters in the modes of coding, black and white lists and the like.
However, the problem of malicious codes in parameters is solved by an encoding mode, only some malicious codes containing special characters can be processed, and protection is not comprehensive enough. For the black and white list, if the setting is comprehensive, all malicious codes can be defended theoretically, but in actual operation, the feature codes of all the malicious codes cannot be collected comprehensively, and comprehensive protection cannot be realized.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a web application protection method, system and computer readable storage medium for solving the problem that the existing web application protection method is not comprehensive enough to protect the web application.
In a first aspect, the present invention provides a web application protection method, applied to a system including a front end and a back end, the method including:
the front end sends a data request to the back end, wherein the data request carries Uniform Resource Locator (URL) and parameter information;
after receiving the data request, the back end analyzes the parameter information to obtain a corresponding parameter value;
and the back end generates a corresponding parameter picture according to the parameter value and stores the parameter picture in a preset database.
Preferably, the generating, by the back end, a corresponding parameter picture according to the parameter value specifically includes:
the back end judges whether the parameter value needs to be rendered;
if so, the back end acquires a rendering style corresponding to the parameter value, and performs rendering according to the rendering style to generate the parameter picture;
and if not, the back end generates the parameter picture according to a preset default style.
Preferably, after the back end generates a corresponding parameter picture according to the parameter value, the method further includes:
the back end judges whether the parameter value contains sensitive data;
if so, adding a fixed salt value in the parameter picture by the rear end;
the storing the parameter picture into a preset database specifically includes:
and storing the parameter picture added with the fixed salt value into the preset database.
Preferably, after the parameter picture is saved in a preset database, the method further includes:
the front end sends a parameter display request to the back end;
the back end sends the parameter picture to the front end according to the parameter display request;
the front end receives the parameter picture and displays the parameter picture at a preset position;
the parameter picture is a dynamic picture or a static picture.
Preferably, the storing the parameter picture in a preset database specifically includes:
and storing the parameter pictures into the preset database in a matrix form.
In a second aspect, the present invention provides a web application defense system, comprising a front end and a back end;
the front end is used for sending a data request to the back end, and the data request carries Uniform Resource Locator (URL) and parameter information;
the back end is used for analyzing the parameter information after receiving the data request to obtain a corresponding parameter value;
and the back end is also used for generating a corresponding parameter picture according to the parameter value and storing the parameter picture in a preset database.
Preferably, the back end is further configured to determine whether the parameter value needs to be rendered, and when it is determined that the parameter value needs to be rendered, obtain a rendering pattern corresponding to the parameter value, and perform rendering according to the rendering pattern to generate the parameter picture; and when the parameter value is judged not to be rendered, generating the parameter picture according to a preset default style.
Preferably, the back end is further configured to determine whether the parameter value includes sensitive data, and add a fixed salt value to the parameter picture when it is determined that the parameter value includes sensitive data; and storing the parameter picture added with the fixed salt value into the preset database.
In a third aspect, the present invention provides a web application protection system, including a memory and a processor, where the memory stores a computer program, and the processor is configured to run the computer program to implement the web application protection method according to the first aspect.
In a fourth aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the web application defense method of the first aspect.
According to the web application protection method, the system and the computer readable storage medium, firstly, a data request is sent from a front end to a back end, the data request carries URL and parameter information, then the back end analyzes the parameter information according to the received data request to obtain a corresponding parameter value, finally the back end generates a corresponding parameter picture according to the parameter value, and the parameter picture is stored in a preset database. According to the invention, by imaging the parameter values, the web application risk caused by inserting malicious codes into the parameters can be avoided, cross-site scripts, sql injection, file uploading, brute force cracking and other attacks can be effectively prevented, the safety of the web application is improved, the comprehensive protection on the web application is realized, and the problem that the web application is not completely protected by the existing web application protection method is solved.
Drawings
FIG. 1: a flow chart of a web application protection method according to embodiment 1 of the present invention;
FIG. 2: is a schematic structural diagram of a web application protection system according to embodiment 2 of the present invention;
FIG. 3: a schematic structural diagram of a web application protection system according to embodiment 3 of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the following detailed description will be made with reference to the accompanying drawings.
It is to be understood that the specific embodiments and figures described herein are merely illustrative of the invention and are not limiting of the invention.
It is to be understood that the embodiments and features of the embodiments can be combined with each other without conflict.
It is to be understood that, for the convenience of description, only parts related to the present invention are shown in the drawings of the present invention, and parts not related to the present invention are not shown in the drawings.
It should be understood that each unit and module related in the embodiments of the present invention may correspond to only one physical structure, may also be composed of multiple physical structures, or multiple units and modules may also be integrated into one physical structure.
It will be understood that, without conflict, the functions, steps, etc. noted in the flowchart and block diagrams of the present invention may occur in an order different from that noted in the figures.
It is to be understood that the flowchart and block diagrams of the present invention illustrate the architecture, functionality, and operation of possible implementations of systems, apparatus, devices and methods according to various embodiments of the present invention. Each block in the flowchart or block diagrams may represent a unit, module, segment, code, which comprises executable instructions for implementing the specified function(s). Furthermore, each block or combination of blocks in the block diagrams and flowchart illustrations can be implemented by a hardware-based system that performs the specified functions or by a combination of hardware and computer instructions.
It is to be understood that the units and modules involved in the embodiments of the present invention may be implemented by software, and may also be implemented by hardware, for example, the units and modules may be located in a processor.
Example 1:
the embodiment provides a web application protection method, as shown in fig. 1, applied to a system including a front end and a back end, where the method includes:
step S102: the front end sends a data request to the back end, where the data request carries a URL (Uniform Resource Locator) and parameter information.
In this embodiment, the front end is a part that can be seen and interacted with by a user in a Web application, and includes a structure of a Web page, an appearance visual representation of a Web, an interaction implementation at a Web level, and the like, and the back end processes a corresponding service logic by interacting with a database, and mainly includes: implementation of functions, storage and access of data, and the like. When a user accesses a Web application page, inputting parameter values in an input box corresponding to the page, then clicking a corresponding submission button to execute a request operation, at this time, sending a data request to a back end by a front end, wherein the data request carries a URL (uniform resource locator) and parameter information required by the request, and the parameter information specifically comprises a parameter name and a parameter value.
Step S104: and after receiving the data request, the rear end analyzes the parameter information to obtain a corresponding parameter value.
In this embodiment, after receiving the data request, the backend analyzes the parameter information, and obtains a corresponding parameter value from an analysis result.
Step S106: and the back end generates a corresponding parameter picture according to the parameter value and stores the parameter picture in a preset database.
In the embodiment, in order to prevent an attacker from attacking through a carefully constructed parameter value, the back end generates a corresponding parameter picture according to the parameter value, and stores the parameter picture in a preset database, so that a good protection effect on the web application can be achieved. Taking a scene of a message or comment of a user as an example, the scene of the message or comment area of the user is often encountered in the internet surfing, the normal process is that the user submits the comment content (namely a parameter value) in the comment area after the comment area is commented, the back end stores the comment content in the database, and when the page is accessed again, the back end takes the comment content out of the database and sends the comment content to the front end, and the comment content is displayed back on the page by the front end. At this time, if an attacker writes a malicious script in the comment content, the browser executes the malicious script in the page playback process, and since the comment content is visible to all users, each user executes the malicious code when accessing the comment, which causes a wide-range attack, which is a typical XSS attack scenario. However, when the comment content is converted into the picture through the method and the device, no matter what comment content is input in the comment area, the browser cannot execute the malicious script, and therefore the safety of the web application is guaranteed.
Optionally, the generating, by the back end, a corresponding parameter picture according to the parameter value may specifically include:
the back end judges whether the parameter value needs to be rendered;
if so, the back end acquires a rendering style corresponding to the parameter value, and performs rendering according to the rendering style to generate the parameter picture;
and if not, the back end generates the parameter picture according to a preset default style.
In this embodiment, in order to enhance the aesthetic property of the page, a corresponding parameter picture may be generated according to a style to be displayed at the front end, and the parameter picture may be a dynamic picture or a static picture, so that when a parameter value needs to be displayed back on the page, the parameter picture obtained after rendering processing is displayed to the user, and the visual experience of the user is improved. Specifically, the back end first determines whether the parameter value needs to be rendered, specifically, whether the parameter value needs to be rendered may be determined according to a parameter name or whether the parameter value has an associated rendering style, if the back end determines that the parameter value needs to be rendered, the back end may first obtain a rendering style corresponding to the parameter value, the rendering style may be written into a document by a front-end designer in advance, and then the back end performs rendering according to the rendering style in the document, thereby generating a corresponding parameter picture, where the rendering style may be, for example, a bold font, a red color, and the like. If the back end judges that the parameter value does not need to be rendered, the back end generates the parameter picture according to a preset default style, for example, the parameter picture generated by the default style can be a picture of black characters with white background.
Optionally, after the back end generates a corresponding parameter picture according to the parameter value, the method may further include:
the back end judges whether the parameter value contains sensitive data;
if so, adding a fixed salt value in the parameter picture by the rear end;
the storing the parameter picture in a preset database may specifically include:
and storing the parameter picture added with the fixed salt value into the preset database.
In this embodiment, in order to ensure the security of the data and facilitate the subsequent operation of removing the salt value, a fixed salt value may be added to the parameter picture corresponding to the parameter value containing the sensitive data. Specifically, the back end first determines whether the parameter value includes sensitive data, and specifically may determine according to a keyword or a parameter name, for example, if the parameter value includes keywords such as a password and an identity card number, it determines that the parameter value includes sensitive data and needs to be encrypted, and at this time, the back end adds a fixed salt value to the parameter picture and stores the fixed salt value in the database.
In this embodiment, when the parameter value needs to be displayed, the front end sends a parameter display request to the back end, the back end sends the parameter picture to the front end according to the parameter display request, and the front end receives the parameter picture and then displays the parameter picture at a predetermined position. If the parameter picture is the parameter picture added with the fixed salt value, the back end firstly carries out salt value removal processing to restore the parameter picture before the fixed salt value is not added, and then sends the picture to the front end.
In this embodiment, the parameter picture generated by the default style may specifically be a grayscale picture, the parameter picture generated by the rendering style may specifically be a color picture, the parameter picture generated by the style may specifically be stored in a preset database in a matrix form, for example, the grayscale picture, and if the corresponding parameter value is a number 1, the corresponding matrix may be as follows:
Figure BDA0003316382950000071
wherein, the row of the matrix corresponds to the height (unit is pixel) of the parameter image, the column of the matrix corresponds to the width (unit is pixel) of the parameter image, the element of the matrix corresponds to the pixel of the parameter image, and the value of the element of the matrix is the gray value of the pixel.
In this embodiment, if a field corresponding to the parameter value in the database is set as a primary key, for example, the parameter value is a user name (admin), the back end stores a picture generated by the user name in the database, the parameter picture is used as a key value picture and is stored in a matrix form, at this time, if the front end wants to query the user admin, the front end sends the admin to the back end, the back end converts the parameter value admin into a corresponding parameter picture, the parameter picture is converted into a picture matrix by an OpenCV or other picture processing plug-in, then all key value pictures in the database are traversed, and information corresponding to the admin can be queried by comparing corresponding matrix values.
According to the web application protection method provided by the embodiment of the invention, firstly, a data request is sent from a front end to a back end, the data request carries URL (uniform resource locator) and parameter information, then the back end analyzes the parameter information according to the received data request to obtain a corresponding parameter value, finally, the back end generates a corresponding parameter picture according to the parameter value, and the parameter picture is stored in a preset database. According to the invention, by imaging the parameter values, the web application risk caused by inserting malicious codes into the parameters can be avoided, cross-site scripts, sql injection, file uploading, brute force cracking and other attacks can be effectively prevented, the safety of the web application is improved, the comprehensive protection on the web application is realized, and the problem that the web application is not completely protected by the existing web application protection method is solved.
Example 2:
as shown in FIG. 2, the present embodiment provides a web application defense system, comprising a front end 12 and a back end 14;
the front end 12 is configured to send a data request to the back end 14, where the data request carries a uniform resource locator URL and parameter information;
the back end 14 is configured to, after receiving the data request, analyze the parameter information to obtain a corresponding parameter value;
the back end 14 is further configured to generate a corresponding parameter picture according to the parameter value, and store the parameter picture in a preset database.
Optionally, the back end 14 is further configured to determine whether the parameter value needs to be rendered, and when it is determined that the parameter value needs to be rendered, obtain a rendering pattern corresponding to the parameter value, and perform rendering according to the rendering pattern to generate the parameter picture; and when the parameter value is judged not to be rendered, generating the parameter picture according to a preset default style.
Optionally, the back end 14 is further configured to determine whether the parameter value includes sensitive data, and add a fixed salt value to the parameter picture when it is determined that the parameter value includes sensitive data; and storing the parameter picture added with the fixed salt value into the preset database.
Optionally, the front end 12 is further configured to send a parameter display request to the back end 14;
the back end 14 is further configured to send the parameter picture to the front end 12 according to the parameter display request;
the front end 12 is further configured to receive the parameter picture and display the parameter picture at a predetermined position;
the parameter picture is a dynamic picture or a static picture.
Optionally, the back end 14 is specifically configured to generate a corresponding parameter picture according to the parameter value, and store the parameter picture in the preset database in a matrix form.
Example 3:
as shown in fig. 3, the present embodiment provides a web application protection system, which includes a memory 22 and a processor 24, where the memory 22 stores a computer program, and the processor 24 is configured to run the computer program to execute the web application protection method in embodiment 1.
The memory 22 is connected to the processor 24, the memory 22 may be a flash memory, a read-only memory or other memories, and the processor 24 may be a central processing unit or a single chip microcomputer.
Example 4:
the present embodiment provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the web application protection method in embodiment 1.
The computer-readable storage media include volatile or nonvolatile, removable or non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, computer program modules or other data. Computer-readable storage media include, but are not limited to, RAM (Random Access Memory), ROM (Read-Only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory), flash Memory or other Memory technology, CD-ROM (Compact disk Read-Only Memory), Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer.
Embodiments 2 to 4 provide a web application protection system and a computer-readable storage medium, where a data request is first sent from a front end to a back end, where the data request carries a URL and parameter information, then the back end parses the parameter information according to the received data request to obtain a corresponding parameter value, and finally the back end generates a corresponding parameter picture according to the parameter value and stores the parameter picture in a preset database. According to the invention, by imaging the parameter values, the web application risk caused by inserting malicious codes into the parameters can be avoided, cross-site scripts, sql injection, file uploading, brute force cracking and other attacks can be effectively prevented, the safety of the web application is improved, the comprehensive protection on the web application is realized, and the problem that the web application is not completely protected by the existing web application protection method is solved.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.

Claims (10)

1. A web application protection method is applied to a system comprising a front end and a back end, and the method comprises the following steps:
the front end sends a data request to the back end, wherein the data request carries Uniform Resource Locator (URL) and parameter information;
after receiving the data request, the back end analyzes the parameter information to obtain a corresponding parameter value;
and the back end generates a corresponding parameter picture according to the parameter value and stores the parameter picture in a preset database.
2. The web application protection method according to claim 1, wherein the back-end generates a corresponding parameter picture according to the parameter value, and specifically includes:
the back end judges whether the parameter value needs to be rendered;
if so, the back end acquires a rendering style corresponding to the parameter value, and performs rendering according to the rendering style to generate the parameter picture;
and if not, the back end generates the parameter picture according to a preset default style.
3. The web application protection method according to claim 2, wherein after the backend generates the corresponding parameter picture according to the parameter value, the method further comprises:
the back end judges whether the parameter value contains sensitive data;
if so, adding a fixed salt value in the parameter picture by the rear end;
the storing the parameter picture into a preset database specifically includes:
and storing the parameter picture added with the fixed salt value into the preset database.
4. The web application protection method according to claim 1, wherein after saving the parameter picture to a preset database, the method further comprises:
the front end sends a parameter display request to the back end;
the back end sends the parameter picture to the front end according to the parameter display request;
the front end receives the parameter picture and displays the parameter picture at a preset position;
the parameter picture is a dynamic picture or a static picture.
5. The web application protection method according to claim 1, wherein the storing the parameter picture in a preset database specifically includes:
and storing the parameter pictures into the preset database in a matrix form.
6. A web application protection system comprising a front end and a back end;
the front end is used for sending a data request to the back end, and the data request carries Uniform Resource Locator (URL) and parameter information;
the back end is used for analyzing the parameter information after receiving the data request to obtain a corresponding parameter value;
and the back end is also used for generating a corresponding parameter picture according to the parameter value and storing the parameter picture in a preset database.
7. The web application protection system according to claim 6, wherein the back end is further configured to determine whether the parameter value needs to be rendered, and when it is determined that the parameter value needs to be rendered, obtain a rendering pattern corresponding to the parameter value, and perform rendering according to the rendering pattern to generate the parameter picture; and when the parameter value is judged not to be rendered, generating the parameter picture according to a preset default style.
8. The web application protection system according to claim 6, wherein the backend is further configured to determine whether the parameter value includes sensitive data, and add a fixed salt value to the parameter picture when determining that the parameter value includes sensitive data; and storing the parameter picture added with the fixed salt value into the preset database.
9. A web application protection system comprising a memory having stored therein a computer program and a processor arranged to run the computer program to implement the web application protection method of any one of claims 1 to 5.
10. A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, implements a web application defense method as claimed in any one of claims 1 to 5.
CN202111232418.1A 2021-10-22 2021-10-22 Web application protection method, system and computer readable storage medium Pending CN113918862A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111232418.1A CN113918862A (en) 2021-10-22 2021-10-22 Web application protection method, system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111232418.1A CN113918862A (en) 2021-10-22 2021-10-22 Web application protection method, system and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN113918862A true CN113918862A (en) 2022-01-11

Family

ID=79242538

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111232418.1A Pending CN113918862A (en) 2021-10-22 2021-10-22 Web application protection method, system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113918862A (en)

Similar Documents

Publication Publication Date Title
US10097360B2 (en) Automated test to tell computers and humans apart
US10341380B2 (en) Detecting man-in-the-browser attacks
US8910247B2 (en) Cross-site scripting prevention in dynamic content
CN110851879A (en) Method, device and equipment for infringement and evidence preservation based on evidence preservation block chain
US20170026393A1 (en) Methods, systems and application programmable interface for verifying the security level of universal resource identifiers embedded within a mobile application
US9479678B1 (en) Method and device for image processing, and storage medium
US20150143481A1 (en) Application security verification method, application server, application client and system
CN111339548B (en) Data processing method and device for anticreep, computer equipment and storage medium
CN108646988B (en) Document printing method and system
CN107180194B (en) Method and device for vulnerability detection based on visual analysis system
CN108846277B (en) Reading control method, reading control equipment and computer storage medium
CN114157568A (en) Browser security access method, device, equipment and storage medium
CN114124414B (en) Method and device for generating honey service, method for capturing attack behavior data, computer equipment and storage medium
CN117040804A (en) Network attack detection method, device, equipment, medium and program product for website
AU2019214074B2 (en) Method for processing data
CN113918862A (en) Web application protection method, system and computer readable storage medium
CN116647734A (en) Page display method, system, computer equipment and storage medium
CN114331841A (en) Content picture processing method, system, terminal and storage medium
CN115993918A (en) Menu processing method, menu processing device, electronic equipment and readable storage medium
CN114760078A (en) Method and system for preventing malicious tampering of page request parameters
CN109145645B (en) Method for protecting short message verification code in android mobile phone
CN108650257B (en) Security detection setting method and device based on website content and storage medium
CN114070950B (en) Image processing method, related device and equipment
US20240113889A1 (en) Verifying ownership using decentralized verification
CN107943876B (en) Page response method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination