Apparatus and method for blocking attack against Web application
First Claim
Patent Images
1. An apparatus for blocking an attack against a Web application, the apparatus comprising:
- an input value authentication unit authenticating an input value included in Web service request data and determining the attack;
an input value filtering unit editing Web service request data determined as the attack by removing an attack element from the Web service request data; and
a data transfer unit transferring Web service request data which is not determined as the attack and the edited Web service request data to a Web server.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus and method for blocking an attack against a Web application are provided. The apparatus includes: an input value authentication unit authenticating an input value included in Web service request data and determining the attack; an input value filtering unit editing Web service request data determined as the attack by removing an attack element from the Web service request data; and a data transfer unit transferring Web service request data which is not determined as the attack and the edited Web service request data to a Web server.
73 Citations
11 Claims
-
1. An apparatus for blocking an attack against a Web application, the apparatus comprising:
-
an input value authentication unit authenticating an input value included in Web service request data and determining the attack;
an input value filtering unit editing Web service request data determined as the attack by removing an attack element from the Web service request data; and
a data transfer unit transferring Web service request data which is not determined as the attack and the edited Web service request data to a Web server. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of blocking an attack against a Web application, the method comprising:
-
(a) authenticating an input value included in Web service request data and determining the attack;
(b) editing Web service request data determined as the attack by removing an attack element from the Web service request data; and
(c) transferring Web service request data which is not determined as the attack and the edited Web service request data to a Web server. - View Dependent Claims (7, 8, 9, 10, 11)
-
Specification