Method for encrypting URL (uniform resource locator) address
A symmetric encryption algorithm and address link technology, applied in the field of URL address encryption, can solve the problem of judging that the header information cannot be anti-leech.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0012] 1. Use MyEclipse as a development tool, use the database management tool MySQL to build the database and tomcat server required by the system.
[0013] 2. On two servers, one acts as a front-end server for external access, and encrypts the access address according to the access content; the other deploys the source program, and acts as a response server to decrypt the access content.
[0014] 3. After the front-end server receives the access information, it first encrypts the access address, and then submits it to the response server.
[0015] 4. On the responding server side, first decrypt the received access address and restore the access information. At this time, it is necessary to judge whether it is legal or expired.
[0016] 5. If it is illegal or expired, it will return to the front-end server, prompting illegal access, otherwise, it will return the content actually accessed by the user.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com