CN118101519A - Network connectivity verification method, device, equipment and readable storage medium - Google Patents

Network connectivity verification method, device, equipment and readable storage medium Download PDF

Info

Publication number
CN118101519A
CN118101519A CN202410226412.0A CN202410226412A CN118101519A CN 118101519 A CN118101519 A CN 118101519A CN 202410226412 A CN202410226412 A CN 202410226412A CN 118101519 A CN118101519 A CN 118101519A
Authority
CN
China
Prior art keywords
address information
verified
verification
network connectivity
acquiring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410226412.0A
Other languages
Chinese (zh)
Inventor
贺诗辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202410226412.0A priority Critical patent/CN118101519A/en
Publication of CN118101519A publication Critical patent/CN118101519A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a network connectivity verification method, a device, equipment and a readable storage medium, which relate to the field of communication, wherein the network connectivity verification method comprises the following steps: determining a server system corresponding to a system to be verified; acquiring first address information of the system to be verified and second address information of the server system; generating a verification strategy according to the first address information and the second address information; and verifying the network connectivity of the system to be verified according to the verification strategy to obtain a verification result. Therefore, the application directly acquires the first address information of the system to be verified and the second address information of the server system and generates the verification strategy, namely, the network connectivity of the system is verified based on the actual address information of the system in the interaction process, so that misjudgment possibly caused by interception of a network firewall or safety equipment is avoided, and the verification accuracy of the network connectivity of the system is improved.

Description

Network connectivity verification method, device, equipment and readable storage medium
Technical Field
The present application relates to the field of communications, and more particularly, to a network connectivity verification method, apparatus, device, and readable storage medium.
Background
As the deployment architecture of the bank application system develops towards containerization and unitization, transaction call between systems becomes more complex, and often one transaction involves interaction between a plurality of application systems, and any link in the middle is abnormal, which leads to failure of the whole transaction. Therefore, verifying network connectivity between systems is very important to improve the stability of banking processes.
At present, network connectivity among systems is usually verified by an automatic topology discovery mode, namely, a topology discovery tool is used for automatically scanning a network and establishing a network topology graph, various devices and connections in the network are identified, and finally, network connectivity among systems is verified by analyzing the topology graph. However, the method may be intercepted by a network firewall or a security device during port scanning, so that a topology map may contain devices which are not actually connected or the actually existing connection is omitted, and finally, the verification accuracy of the method is low.
Disclosure of Invention
The embodiment of the application provides a network connectivity verification method, a device, equipment and a readable storage medium, which can improve the verification accuracy of the network connectivity of a system.
In view of this, an embodiment of the present application provides a network connectivity verification method, including:
determining a server system corresponding to a system to be verified;
acquiring first address information of the system to be verified and second address information of the server system;
Generating a verification strategy according to the first address information and the second address information;
and verifying the network connectivity of the system to be verified according to the verification strategy to obtain a verification result.
Optionally, the determining the server system corresponding to the system to be verified includes:
Acquiring a call list of the system to be verified;
And determining the server system according to the call list.
Optionally, the acquiring the first address information of the system to be verified and the second address information of the server system includes:
acquiring first identification information of a system to be verified and second identification information of the server system;
acquiring first address information of the system to be verified from a configuration management database according to the first identification information;
and acquiring second address information of the server system from a service bus according to the second identification information.
Optionally, the first address information includes a plurality of first sub-address information, and the second address information includes a plurality of second sub-address information; the generating a verification policy according to the first address information and the second address information includes:
Determining target address information corresponding to each first sub-address information from a plurality of second sub-address information respectively;
Determining the verification sequence of each piece of first sub-address information;
and generating a verification strategy according to the target address information corresponding to each piece of sub-address information and the verification sequence of each piece of first sub-address information.
Optionally, after verifying the network connectivity of the system to be verified according to the verification policy, the method further includes:
If the verification result is that the network is normal, adding the system to be verified into a white list;
and if the verification result is that the network is abnormal, sending out an alarm prompt.
The embodiment of the application also provides a network connectivity verification device, which comprises:
The determining unit is used for determining a server system corresponding to the system to be verified;
The acquisition unit is used for acquiring the first address information of the system to be verified and the second address information of the server system;
The generation unit is used for generating a verification strategy according to the first address information and the second address information;
And the verification unit is used for verifying the network connectivity of the system to be verified according to the verification strategy to obtain a verification result.
Optionally, the acquiring unit is specifically configured to:
acquiring first identification information of a system to be verified and second identification information of the server system;
acquiring first address information of the system to be verified from a configuration management database according to the first identification information;
and acquiring second address information of the server system from a service bus according to the second identification information.
The embodiment of the application also provides computer equipment, which comprises: a memory, a processor, and a bus system;
Wherein the memory is used for storing programs;
The processor is configured to execute the program in the memory, so as to implement any one of the network connectivity verification methods described above;
The bus system is used for connecting the memory and the processor so as to enable the memory and the processor to communicate.
Embodiments of the present application also provide a computer readable storage medium storing instructions that, when executed on a computer, cause the computer to perform any of the network connectivity verification methods described above.
The embodiment of the application provides a network connectivity verification method, which comprises the following steps: determining a server system corresponding to a system to be verified; acquiring first address information of the system to be verified and second address information of the server system; generating a verification strategy according to the first address information and the second address information; and verifying the network connectivity of the system to be verified according to the verification strategy to obtain a verification result. Therefore, the application directly acquires the first address information of the system to be verified and the second address information of the server system and generates the verification strategy, namely, the network connectivity of the system is verified based on the actual address information of the system in the interaction process, so that misjudgment possibly caused by interception of a network firewall or safety equipment is avoided, and the verification accuracy of the network connectivity of the system is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present application, and that other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a network connectivity verification method according to an embodiment of the present application;
fig. 2 is a flow chart of another network connectivity verification method according to an embodiment of the present application;
fig. 3 is a schematic diagram of a correspondence relationship between a consumer and a server according to an embodiment of the present application;
Fig. 4 is a schematic structural diagram of a network connectivity verification apparatus according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above drawings, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Network connectivity verification: a method for checking whether devices in a network are capable of communicating with each other. In a complex network environment, including multiple computers, routers, switches, firewalls, etc., network connectivity verification helps ensure that these devices can properly connect and exchange data packets.
As the deployment architecture of the bank application system develops towards containerization and unitization, transaction call between systems becomes more complex, and often one transaction involves interaction between a plurality of application systems, and any link in the middle is abnormal, which leads to failure of the whole transaction. Therefore, verifying network connectivity between systems is very important to improve the stability of banking processes.
At present, network connectivity among systems is usually verified by an automatic topology discovery mode, namely, a topology discovery tool is used for automatically scanning a network and establishing a network topology graph, various devices and connections in the network are identified, and finally, network connectivity among systems is verified by analyzing the topology graph. However, the method may be intercepted by a network firewall or a security device during port scanning, so that a topology map may contain devices which are not actually connected or the actually existing connection is omitted, and finally, the verification accuracy of the method is low.
Therefore, in view of the above problems, embodiments of the present application provide a method, an apparatus, a device, and a readable storage medium for verifying network connectivity, which can improve the accuracy of verifying network connectivity of a system.
Referring to fig. 1, a network connectivity verification method provided by an embodiment of the present application includes the following steps.
S101, determining a server system corresponding to the system to be verified.
In this embodiment, the server system corresponding to the system to be verified may be determined first. It will be appreciated that, in order to verify network connectivity of the system to be verified, other systems that need to interact with the system to be verified, for example, systems that have a call relationship with the system to be verified, may be determined first, and these systems may be used as server systems. In particular, the server system may comprise a plurality of systems.
In one possible implementation manner, a call list of the system to be verified may be obtained; and determining the server system according to the call list. It can be understood that, in order to more comprehensively verify the network connectivity of the system to be verified, the server system having a calling relationship with the system to be verified or needing to perform information interaction can be determined through the calling list of the system to be verified, so that the network connectivity of the system to be verified is comprehensively verified, and the verification accuracy of the network connectivity of the system is further improved.
S102, acquiring first address information of the system to be verified and second address information of the server system.
In this embodiment, after determining the server system corresponding to the system to be verified, the first address information of the system to be verified and the second address information of the server system may be obtained. It may be appreciated that the system to be verified may include a plurality of servers on the cloud and a plurality of servers under the cloud, and the first address information of each server in the system to be verified may be obtained respectively, where the first address information may include an IP address and the like. The server system can also comprise a plurality of ports and a plurality of servers, and address information of each port and each server of the server system can be respectively obtained as second address information, wherein the second address information can comprise an IP address, port information, URL links and the like, so that verification of network connectivity of the system is conveniently performed based on actual address information of the system in an interaction process, misjudgment possibly caused by interception of a network firewall or safety equipment is avoided, and verification accuracy of the network connectivity of the system is improved. Specifically, the first address information includes a plurality of first sub-address information; the second address information includes a plurality of second sub-address information.
In one possible implementation manner, first identification information of a system to be verified and second identification information of the server system are obtained; acquiring first address information of the system to be verified from a configuration management database according to the first identification information; and acquiring second address information of the server system from a service bus according to the second identification information. It can be appreciated that a Configuration Management Database (CMDB): is a database for recording and managing information of various configuration items (Configuration Item, CI) in an IT system. In the CMDB configuration library, various configuration information about IT systems and services are recorded, including but not limited to: hardware devices, software applications, network devices, service configurations, configuration relationships, change records, and the like. And the first address information of the system to be verified can be searched from the configuration management database according to the first identification information of the system to be verified. Service bus: refers to middleware or architecture for integrating and coordinating various different services in a banking system. It is a high-level software architecture mode and aims to solve the complex integration and communication problems in banking systems. The main functions include: integration, protocol conversion, message routing, security and authentication, transaction management, scalability, monitoring and logging, etc. The second address information of the server system may be obtained from the service bus based on the identification information of the server system. By acquiring the first address information of the system to be verified and the second address information of the server system, the network connectivity of the system can be verified based on the actual address information of the system in the interaction process, so that misjudgment possibly caused by interception of a network firewall or safety equipment is avoided, and the verification accuracy of the network connectivity of the system is improved.
S103, generating a verification strategy according to the first address information and the second address information.
In this embodiment, after the first address information of the system to be verified and the second address information of the server system are obtained, the verification policy may be generated according to the first address information and the second address information. It may be appreciated that, since the first address information of the system to be verified and the second address information of the server may include a plurality of address information, in order to ensure that the network connectivity of the system to be verified can be comprehensively verified, a verification policy may be generated according to the first address information of the system to be verified and the second address information of the server, so as to implement network connectivity verification of each network path in the system to be verified and the server.
In one possible implementation manner, the target address information corresponding to each piece of first sub-address information can be determined from the plurality of pieces of second sub-address information; determining the verification sequence of each piece of first sub-address information; and generating a verification strategy according to the target address information corresponding to each piece of sub-address information and the verification sequence of each piece of first sub-address information. It can be understood that the interface or the server to be accessed by the server corresponding to each first sub-address information may be determined first, and then the address information of the interface or the server corresponding to each first sub-address information, that is, the target address information corresponding to each first sub-address information, is determined from the plurality of second sub-address information. And then determining the verification sequence of each piece of first sub-address information, and generating a verification strategy according to the verification sequence so as to comprehensively verify the network connectivity of the system to be verified and improve the verification accuracy of the network connectivity of the system.
And S104, verifying the network connectivity of the system to be verified according to the verification strategy to obtain a verification result.
In this embodiment, after the verification policy is generated, the network connectivity of the system to be verified may be verified according to the verification policy, so as to obtain a verification result. It can be understood that after the verification policy is generated, whether the network between the system to be verified and the server system is connected or not can be verified by calling the test script according to the first address information of the system to be verified and the second address information of the server system in the verification policy. The verification result may include a network normal or a network abnormal.
In one possible implementation manner, if the verification result is that the network is normal, adding the system to be verified into a white list; and if the verification result is that the network is abnormal, sending out an alarm prompt. It can be understood that if the verification result is that the network is normal, it can be explained that the network connectivity of the system to be verified is normal, and the system to be verified can be added into the white list at this time, so that repeated verification of the system to be verified is avoided, and the verification efficiency of the network connectivity of the system is improved. If the verification result is that the network is abnormal, the system to be verified and the server system possibly cannot normally communicate, so that the stability of banking business processing is low, and an alarm prompt can be sent out at the moment, so that technicians can repair a network channel between the system to be verified and the server system.
It can be seen that the embodiment of the application provides a network connectivity verification method, because the first address information of the system to be verified and the second address information of the server system are directly obtained and the verification policy is generated, that is, the network connectivity of the system is verified based on the actual address information of the system in the interaction process, misjudgment possibly caused by interception of a network firewall or a security device is avoided, and therefore the verification accuracy of the network connectivity of the system is improved.
Referring to fig. 2, the embodiment of the application further provides a network connectivity verification method, which specifically includes the following steps:
S1, a cloud upper cloud server list of a consumer obtained from a configuration management database is used as a source address, meanwhile, configuration data of a bank service bus is used as a target address, a server interface address is obtained, a verification strategy is formed, and automatic network verification is carried out, as shown in FIG. 3. For example: a certain consumer needs to access the interface 1 of the service party, the IP address and port information of the interface 1 for providing interface service are registered in the bank service bus, and the IP address of each server of the consumer is accurately registered in the configuration management database. Through the information, accurate information of the network connectivity relationship between the application A and the application B can be formed in a matching mode.
S2, the IP addresses and port information of the source end and the target end managed in the change list are communicated through the network, and the verification strategy is formed based on the IP address of the source end associated with the IP address of the consumer server in the configuration management database. Wherein the source end may correspond to a consumer and the target end may correspond to a server. Network opening change order: refers to modifying, adding or deleting configurations in the network to change the connection or manner of communication between devices. These changes may relate to aspects of network equipment (e.g., routers, switches, firewalls, etc.), network topology, IP addresses, network protocols, port configurations, etc.
S3, considering that the services running on different servers are different under the same application module, the requirements of corresponding network access are also different, the network verification failure strategy can be evaluated and repaired, and the white list is allowed to be set to verify the false alarm system no longer under the false alarm condition.
Therefore, the embodiment of the application provides a network connectivity verification method, which can verify the network connectivity of the system based on the actual address information of the system in the interaction process, and avoid misjudgment possibly caused by interception of a network firewall or a safety device, thereby improving the verification accuracy of the network connectivity of the system.
Referring to fig. 4, the embodiment of the present application further provides a network connectivity verification apparatus, where the apparatus includes:
a determining unit 401, configured to determine a server system corresponding to a system to be verified;
An obtaining unit 402, configured to obtain first address information of the system to be verified and second address information of the server system;
a generating unit 403, configured to generate a verification policy according to the first address information and the second address information;
And the verification unit 404 is configured to verify the network connectivity of the system to be verified according to the verification policy, so as to obtain a verification result.
Optionally, the determining unit 401 is specifically configured to:
Acquiring a call list of the system to be verified;
And determining the server system according to the call list.
Optionally, the acquiring unit 402 is specifically configured to:
acquiring first identification information of a system to be verified and second identification information of the server system;
acquiring first address information of the system to be verified from a configuration management database according to the first identification information;
and acquiring second address information of the server system from a service bus according to the second identification information.
Optionally, the first address information includes a plurality of first sub-address information, and the second address information includes a plurality of second sub-address information; the generating unit 403 is specifically configured to:
Determining target address information corresponding to each first sub-address information from a plurality of second sub-address information respectively;
Determining the verification sequence of each piece of first sub-address information;
and generating a verification strategy according to the target address information corresponding to each piece of sub-address information and the verification sequence of each piece of first sub-address information.
Optionally, the apparatus further comprises:
an adding unit, configured to add the system to be verified to a white list if the verification result is that the network is normal;
And the alarm unit is used for sending an alarm prompt if the verification result is network abnormality.
It can be seen that the embodiment of the application provides a network connectivity verification device, because the first address information of the system to be verified and the second address information of the server system are directly obtained and the verification policy is generated, that is, the network connectivity of the system is verified based on the actual address information of the system in the interaction process, misjudgment possibly caused by interception of a network firewall or a security device is avoided, and therefore the verification accuracy of the network connectivity of the system is improved.
The embodiment of the application also provides computer equipment, which comprises: a memory, a processor, and a bus system;
Wherein the memory is used for storing programs;
the processor is configured to execute the program in the memory to implement any one of the network connectivity methods described above;
The bus system is used for connecting the memory and the processor so as to enable the memory and the processor to communicate.
Embodiments of the present application also provide a computer readable storage medium storing instructions that, when executed on a computer, cause the computer to perform any of the network connectivity verification methods described above.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method of network connectivity verification, the method comprising:
determining a server system corresponding to a system to be verified;
acquiring first address information of the system to be verified and second address information of the server system;
Generating a verification strategy according to the first address information and the second address information;
and verifying the network connectivity of the system to be verified according to the verification strategy to obtain a verification result.
2. The method according to claim 1, wherein the determining the server system to which the system to be authenticated corresponds includes:
Acquiring a call list of the system to be verified;
And determining the server system according to the call list.
3. The method of claim 1, wherein the obtaining the first address information of the system to be authenticated and the second address information of the server system comprises:
acquiring first identification information of a system to be verified and second identification information of the server system;
acquiring first address information of the system to be verified from a configuration management database according to the first identification information;
and acquiring second address information of the server system from a service bus according to the second identification information.
4. The method of claim 1, wherein the first address information comprises a plurality of first sub-address information and the second address information comprises a plurality of second sub-address information; the generating a verification policy according to the first address information and the second address information includes:
Determining target address information corresponding to each first sub-address information from a plurality of second sub-address information respectively;
Determining the verification sequence of each piece of first sub-address information;
and generating a verification strategy according to the target address information corresponding to each piece of sub-address information and the verification sequence of each piece of first sub-address information.
5. The method according to claim 1, wherein after verifying the network connectivity of the system to be verified according to the verification policy, the method further comprises:
If the verification result is that the network is normal, adding the system to be verified into a white list;
and if the verification result is that the network is abnormal, sending out an alarm prompt.
6. A network connectivity verification apparatus, the apparatus comprising:
The determining unit is used for determining a server system corresponding to the system to be verified;
The acquisition unit is used for acquiring the first address information of the system to be verified and the second address information of the server system;
The generation unit is used for generating a verification strategy according to the first address information and the second address information;
And the verification unit is used for verifying the network connectivity of the system to be verified according to the verification strategy to obtain a verification result.
7. The apparatus according to claim 6, wherein the determining unit is specifically configured to:
Acquiring a call list of the system to be verified;
And determining the server system according to the call list.
8. The apparatus according to claim 6, wherein the acquisition unit is specifically configured to:
acquiring first identification information of a system to be verified and second identification information of the server system;
acquiring first address information of the system to be verified from a configuration management database according to the first identification information;
and acquiring second address information of the server system from a service bus according to the second identification information.
9. A computer device, comprising: a memory, a processor, and a bus system;
Wherein the memory is used for storing programs;
the processor being adapted to execute a program in the memory to implement the method of any one of claims 1 to 5;
The bus system is used for connecting the memory and the processor so as to enable the memory and the processor to communicate.
10. A computer readable storage medium storing instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1 to 5.
CN202410226412.0A 2024-02-29 2024-02-29 Network connectivity verification method, device, equipment and readable storage medium Pending CN118101519A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410226412.0A CN118101519A (en) 2024-02-29 2024-02-29 Network connectivity verification method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410226412.0A CN118101519A (en) 2024-02-29 2024-02-29 Network connectivity verification method, device, equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN118101519A true CN118101519A (en) 2024-05-28

Family

ID=91162919

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410226412.0A Pending CN118101519A (en) 2024-02-29 2024-02-29 Network connectivity verification method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN118101519A (en)

Similar Documents

Publication Publication Date Title
US6993683B2 (en) Analysis of pipelined networks
US8433811B2 (en) Test driven deployment and monitoring of heterogeneous network systems
CN110943984B (en) Asset safety protection method and device
US7835307B2 (en) Network discovery tool
CN112039868A (en) Firewall policy verification method, device, equipment and storage medium
CN112199276B (en) Method, device, server and storage medium for detecting change of micro-service architecture
CN109639631A (en) A kind of network security cruising inspection system and method for inspecting
CN110880146A (en) Block chain chaining method, device, electronic equipment and storage medium
CN110597541A (en) Interface updating processing method, device, equipment and storage medium based on block chain
CN111782456B (en) Anomaly detection method, device, computer equipment and storage medium
CN114338068A (en) Multi-node vulnerability scanning method and device, electronic equipment and storage medium
CN112818307A (en) User operation processing method, system, device and computer readable storage medium
US20230006898A1 (en) A Method of Capturing Packets from a Container in a Cluster
CN115174279A (en) Real-time detection method, terminal and storage medium for intelligent Ether house contract vulnerability
CN113868669A (en) Vulnerability detection method and system
CN118101519A (en) Network connectivity verification method, device, equipment and readable storage medium
CN112383536B (en) Firewall verification method and device, computer equipment and storage medium
CN113489773B (en) Data access method, device, equipment and medium
CN108566380A (en) A kind of proxy surfing Activity recognition and detection method
CN111385293B (en) Network risk detection method and device
US11582345B2 (en) Context data management interface for contact center
CN114070624A (en) Message monitoring method and device, electronic equipment and medium
CN113672464B (en) Method, device and system for monitoring service availability
CN110545264B (en) Method and device for automatically detecting LDAP authentication injection vulnerability
JP2003514275A (en) Computer access security test method on data communication network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination