Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Uniform resource locator (URL) encryption and validation method for mobile internet user resource access and device provided with the same

A technology of mobile Internet and user resources, which is applied in the field of URL encryption for mobile Internet user resource access, verification methods and devices thereof, and can solve the problems of low security performance and easy cracking of encryption technology

Active Publication Date: 2013-04-24
MDC TELECOM CO LTD
View PDF2 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention aims to solve the defects of low security performance and easy cracking of the existing encryption technology, and proposes a new encryption method. When a user requests a resource URL, multiple encryption techniques are used to generate request parameters, and the encrypted parameters It is time-sensitive and unbreakable, and can be used to encrypt resource requests to avoid hotlinking and tampering of request information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Uniform resource locator (URL) encryption and validation method for mobile internet user resource access and device provided with the same
  • Uniform resource locator (URL) encryption and validation method for mobile internet user resource access and device provided with the same
  • Uniform resource locator (URL) encryption and validation method for mobile internet user resource access and device provided with the same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] figure 1 It is a schematic diagram of implementing URL encryption at the client end according to the first embodiment of the present invention.

[0049] Such as figure 1 As shown, the present embodiment is a specific example in which a mobile Internet user requests a certain picture resource from a China Unicom operator, and the method for encrypting the client URL of the mobile Internet user's resource access includes the following steps:

[0050] Step 1. Respond to the user's resource access request, obtain the request parameter set S, and generate the original parameter sequence originalString of the resource access request.

[0051]Among them, the request parameter set can include the following parameter groups: phoneNumber represents the user's mobile phone number, productCode represents the package service code, imageID represents the image serial number, timestamp represents the current timestamp... In addition, the request parameter set can also include an impl...

Embodiment 2

[0080] Corresponding to Embodiment 1, when the encrypted URL is sent to the content providing terminal, the content providing terminal encrypts the request parameter using an encryption method similar to that of the client, and then compares it with the secu_KEY transmitted in the form of the URL transmission parameter, and then determines Whether the input URL has been tampered with, see this embodiment for details.

[0081] Such as figure 2 As shown, the URL verification method of the content providing terminal in this embodiment includes the following steps:

[0082] Step 1. The content providing terminal receives the encrypted URL sent by the client;

[0083] In this embodiment, the encrypted URL received by the content providing terminal is:

[0084] http: / / www.10010.com / submit.do?phoneNumber=18888888888&productCode=bycl&imageID=837134&timestamp=20121211152106345&secu_KEY=ee9d749c56a9e84accb714fb911cabcfa58c3.

[0085] Step 2. Parsing out the original parameter sequen...

Embodiment 3

[0096] This embodiment is a specific example in which a mobile Internet user requests a certain content providing website (music.m-po.com) to access a certain song resource. The method for encrypting the URL of the mobile Internet user's resource access includes the following steps:

[0097] Step 1. Respond to the user's resource access request, obtain the request parameter set, and generate the original parameter sequence originalString of the resource access request.

[0098] Same as Embodiment 1, in this embodiment, when the user requests song resource access, the request parameter set will also be obtained according to the resource access request of the user, and the original request parameter set will be generated according to the specified parameters pre-agreed between the user end and the content providing terminal in the request parameter set. Parameter sequence originalString.

[0099] In this embodiment, the request resource serial number (songId=12345 for this embod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a uniform resource locator (URL) encryption and validation method for mobile internet user resource access and a device provided with the URL encryption and validation method for the mobile internet user resource access. A user side responses to a resource access request from a user, a request parameter set is obtained, an original parameter sequence of the resource access request is generated, a first secret key sequence is obtained after mini disk (MD) encryption, transposition and inserting of a random sequence, and added to the request parameter set, and further, an encryption URL is generated. A terminal receiving encryption URL is provided in the content of the invention embodiment, and the original parameter sequence and the first secret key sequence are extracted from the terminal receiving encryption URL. An encryption processing similar to an encryption processing of the user side is performed on the original parameter sequence, and then the original parameter sequence is compared with the first secret key sequence, if the original parameter sequence is consistent with the first secret key sequence, the user is allowed to access resource, and otherwise, the user is not allowed to access the resource. A multiple encryption technology is adopted for generating of request parameters, encrypted parameters have timeliness and uncrackable performance, and therefore when the user requests for the access of a resource class URL, the security of resource URL access request can be guaranteed, and request information is prevented from being hotlinked or falsified.

Description

technical field [0001] The invention relates to the field of data encryption, in particular to a URL encryption and verification method and device for mobile Internet user resource access. Background technique [0002] Data security has always been an important issue for human beings and the pursuit of secret communication. With the development of computers and networks, more and more information is exchanged in electronic form. The openness of computers and networks has caused many data security issues. Therefore, Data transmission security is also getting more and more attention. Because computers and networks are open environments, requests for URLs on the terminal connection network may be accessed by others at will. In addition to preventing illegal reading and tampering, the multiple encryption of request parameters prevents illegal obtainers from directly reading the information. The data is encrypted first, then transmitted on the network, and then decrypted after b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04W12/02
Inventor 李志胜
Owner MDC TELECOM CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products