Check patentability & draft patents in minutes with Patsnap Eureka AI!

Request method for safety of data exchange between application program and server

An application program and technology for exchanging data, which is applied in the field of network communication, can solve problems such as the vulnerability of exchanged data to attacks, and achieve the effects of ensuring confidentiality, preventing tampering, and preventing replay attacks

Inactive Publication Date: 2014-08-06
HANGZHOU ZHIPING TECH
View PDF12 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention aims to solve the security problem caused by easy attacks on the data exchanged between the application program and the server, and provides a method to prevent HTTP request content from being tampered with, prevent replay attacks, and ensure data confidentiality, source reliability and integrity. The request method used to exchange data securely between the application and the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Request method for safety of data exchange between application program and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] The present invention is further described below.

[0010] Such as figure 1 As shown, a request method for exchanging data security between the application program and the server, preventing replay attacks between the application program and the server, including setting time stamps, the server has a time stamp database, and the application program and the server end There is an agreed common private key in the underlying code. The application side uses the private key to calculate and generate a signature. When the application side sends a request to the server side, it sends the signature and timestamp together. After the request, the server first judges the validity of the time stamp, and then uses the private key to recalculate the generated signature. The server verifies this signature with the signature sent from the application. When the application and the server calculate the signature using the private key All use MD5 hash algorithm.

[0011] The specific us...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a request method for safety of data exchange between an application program and a server. Replay attack between the application program and the server is prevented from being generated. The method includes the steps that a timestamp is set, the server is provided with a timestamp database, an appointed common private key is arranged on both a bottom layer code in the application program side and a bottom layer code in the server side, the application program side generates a signature through the private key, the application program side sends out the signature and the timestamp while sending a request to the server side, the server side performs verification, and the application program side and the server side both adopt a Hash algorithm for calculating the signature through the private key. With the method, content requested by a HTTP can be prevented from being tampered, replay attack is avoided, and confidentiality, source reliability and integrity of data are guaranteed.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a request method for exchanging data security between an application program and a server. Background technique [0002] Replay attacks (Replay Attacks), also known as replay attacks and replay attacks, refer to the attacker sending a package that the destination host has accepted to achieve the purpose of deceiving the system. It is mainly used in the identity authentication process, destroying the correctness of authentication, replaying The replay attack can be carried out by the initiator or the enemy who intercepts and resends the data. The attacker uses network monitoring or other methods to steal the authentication credentials, and then resends them to the authentication server. The replay attack can be performed in any network communication It is one of the common attack methods of HTTP requests; for the exchange of data between applications and servers, there is no r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/64
Inventor 王磊崔峥吴辉斌
Owner HANGZHOU ZHIPING TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More