Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for verifying a server

A server and domain name server technology, applied in the field of network security, can solve problems such as complex positioning, complex positioning, and inability to obtain information, achieving high security and flexibility, high efficiency, and security solutions

Active Publication Date: 2016-05-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Disadvantages of Option 1: low development efficiency, complex positioning problems, and unfavorable for continuous operation
Since the communication protocol adopted by Https is encrypted, the server and the client need to convert the text protocol additionally, the development efficiency is low, and when a fault occurs, the location is complicated, and the information cannot be intuitively obtained from the transmission content, which is not conducive to continuous operation
[0007] Disadvantages of Option 2: Operational operations such as server host change and capacity expansion are inflexible
Since the IP of the server host is hard-coded locally on the client, if the address of the server host needs to be changed, it is necessary to update the hard-coded IP list of all clients, and the workload and response speed are very problematic.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for verifying a server
  • Method and system for verifying a server
  • Method and system for verifying a server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0034] An embodiment of the present invention provides a method for verifying a server, such as figure 1 shown, including the following steps:

[0035] 101. Send a service request to the server.

[0036] Specifically, the user requests service content through the client, and the client identifies the user's request, sends a service request message to the server according to the user's trigger, and includes service content identification information in the service ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention provides a method and system for verifying a server, and relates to the field of network security technology. The method comprises: sending service request, which contains service content identifying information, to the server so that the server can obtain the corresponding service content; receiving a content providing message sent by the server, wherein the content providing message contains the service content corresponding to the service content identifying information and encrypted string that is obtained after the server encrypts key content; decrypting the key content from the encrypted string; verifying whether the key content is legal; and if the key content is legal, determining that the server passes the verification. The method and system are mainly used for verifying the server, especially a text protocol server.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and a system for verifying the legality of a server. Background technique [0002] With the continuous development of network technology, more and more businesses can be operated on the network, such as online shopping, online banking, etc., especially online shopping and online banking, which involve people's property transactions. Therefore, for servers The verification of legitimacy is particularly important. [0003] In order to ensure the security of network services, there are the following two solutions in the prior art: [0004] Solution 1, Https (HypertextTransferProtocoloverSecureSocketLayer) solution: apply for a certificate from a CA (CertificateAuthority, digital certificate certification center) to prove the type of use of the server. The client only trusts the host if the certificate is used for the corresponding server. Therefore, all current ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 董江德蔡耿平周桓宇蔡志国吴祖榕李枫杨文军魏亚民高名航张倩谢昕虬马洋涛
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More