Communication method, server and terminal based on HTTP (Hypertext Transfer Protocol)

A technology of hypertext transmission and server, applied in terminal, communication method based on hypertext transmission protocol, server field, can solve the problem of not being able to identify whether the request is intercepted, replayed, etc.

Active Publication Date: 2012-08-22
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Based on the above reasons, once the request information between the terminal and the server is intercepted during the data transmission process, since the server does not record any relevant information such as the status of the request, it is impossible to identify whether the request is intercepted and replayed, and it is unavoidable. Occurrence of replay attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method, server and terminal based on HTTP (Hypertext Transfer Protocol)
  • Communication method, server and terminal based on HTTP (Hypertext Transfer Protocol)
  • Communication method, server and terminal based on HTTP (Hypertext Transfer Protocol)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0128] In order to make the above objects, features and advantages of the present application more obvious and understandable, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0129] refer to figure 1, which shows a schematic flowchart of Embodiment 1 of a communication method based on the HTTP protocol provided by the present application. The communication method based on the HTTP protocol in this embodiment includes the following steps:

[0130] Step 101, the terminal sends a timestamp request to the server.

[0131] Step 102, the server generates a first timestamp.

[0132] The server may obtain the current time according to international standard rules to generate the first time stamp.

[0133] Step 103, the server sends the first timestamp to the terminal.

[0134] Step 104, the server receives the network request information sent by the terminal; the network request i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides a network communication method, a system, a server and a terminal based on HTTP (Hypertext Transfer Protocol), aiming at resisting replay attack in HTTP network communication. The network communication method comprises the steps of sending a first time stamp to the terminal according to a terminal request; receiving network request information sent by the terminal, wherein the network request information includes the first time stamp and corresponding time stamp ciphertext, and the time stamp ciphertext is generated by encrypting algorithm factor containing the first time stamp according to a preset encryption algorithm at the terminal; and verifying whether the time stamp ciphertext is in effect or not according to the preset encryption algorithm, if no, judging the network request information is an invalid request. By verifying the validity and effectiveness of the time stamp ciphertext containing time stamp information, the possibility that the time stamp information in the network request is tampered can be further prevented, and occurrence of network replay attack can be avoided.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a hypertext transfer protocol-based communication method, server, and terminal. Background technique [0002] At present, as the Internet affects people's daily work and life more and more deeply, the security of data communication based on the Internet is particularly important. [0003] Among various factors affecting network communication security, replay attacks (Replay Attacks) are one of the most common attack methods. Replay attacks, also known as replay attacks, replay attacks, or freshness attacks, refer to attackers using network monitoring or other methods to steal authentication credentials, and then resend the disguised data packets to the server to achieve deception. purpose of the system. It is mostly used in the identity authentication process, destroying the correctness of authentication. This kind of attack repeats a valid data transmission...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 李超杭程吴浩任寰
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products