Method and device for intercepting resource requests

A resource request and resource technology, applied in the field of computer security, can solve problems such as HTTP request interception errors

Inactive Publication Date: 2015-04-15
GUANGZHOU HUADUO NETWORK TECH
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] When users participate in activities such as online panic buying, the frequency of http requests sent by legitimate users may exceed the preset threshold. At this time, the server will intercept http requests sent by legitimate users, resulting in errors in intercepting http requests.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for intercepting resource requests
  • Method and device for intercepting resource requests
  • Method and device for intercepting resource requests

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] The embodiment of the present invention provides a method for intercepting resource requests, the execution subject of the method is a server, see Picture 1-1 , where the method includes:

[0091] Step 101a: receiving the first resource request sent by the terminal, the first resource request carrying the user ID of the user;

[0092] Step 102a: Generate a first feature parameter according to the user ID of the user and the current time, and send a first resource response to the terminal, where the first resource response carries the first feature parameter;

[0093] Step 103a: receiving the second resource request sent by the terminal, the second resource request carries the user ID of the user and a second characteristic parameter, and the second characteristic parameter is obtained by the terminal parsing the first resource response;

[0094] Step 104a: Determine whether to intercept the second resource request according to the user ID of the user and the second fea...

Embodiment 2

[0102] The embodiment of the present invention provides a method for intercepting resource requests.

[0103] Users can send resource requests to the server through the terminal to request the resources included in the server. However, in order to improve the efficiency of obtaining resources, many users do not manually send resource requests to the server through the browser, but use the A bot simulates a user sending a resource request to request a resource included in the server. For example, when a user participates in an online snap-up activity, in order to snap up a product as soon as possible, the user sends a resource request to the server by using a snap-up program. Since automatic programs send resource requests much faster than users manually send resource requests, if a user manually sends a resource request, the automatic program may send dozens or even hundreds of resource requests, which not only increases the burden on the server, but also affects the user. It...

Embodiment 3

[0161] An embodiment of the present invention provides a device for intercepting resource requests, see image 3 , the device consists of:

[0162] The first receiving module 301 is configured to receive a first resource request sent by the terminal, where the first resource request carries a user identifier of the user;

[0163] A generating module 302, configured to generate a first characteristic parameter according to the user identifier of the user and the current time, and send a first resource response to the terminal, where the first resource response carries the first characteristic parameter;

[0164] The second receiving module 303 is configured to receive a second resource request sent by the terminal, where the second resource request carries the user ID of the user and a second feature parameter, and the second feature parameter is obtained by the terminal by parsing the first resource response;

[0165] A determining module 304, configured to determine whether ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for intercepting resource requests, and belongs to the field of safety of computers. The method comprises the steps that a first resource request sent by a terminal is received, and the first resource request carries user identification of a user; a first feature parameter is generated according to the user identification of the user and current time, and a first resource response which carries the user identification of the user and the first feature parameter is sent to the terminal; a second resource request which is sent by the terminal and carries a second feature parameter is received, and the second feature parameter is obtained when the terminal analyzes the first resource response; whether the second resource request is to be intercepted or not is determined according to the user identification of the user and the second feature parameter. The device comprises a first receiving module, a generation module, a second receiving module and a determination module. The resource requests of program simulation can be accurately intercepted by the device with the method, and the interception accuracy is improved.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a method and device for intercepting resource requests. Background technique [0002] In the Internet, users can send http (Hypertext transfer protocol) requests to the server through the terminal to request resources included in the server; however, many users do not send http requests to the server through the terminal, but use automatic programs Simulate http requests to request resources included in the server. For example, many users now participate in online shopping activities by using automatic programs to simulate http requests. Users who use terminals to send http requests are legal users, and automatic programs are illegal users. In order to protect its own interests, the server often only allows legal users to request the resources contained in itself, and rejects illegal users to request the resources contained in itself. [0003] At present, the server can interc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/306
Inventor 李奇韩方
Owner GUANGZHOU HUADUO NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products