Unlock instant, AI-driven research and patent intelligence for your innovation.

Web service security access method, system and corresponding server

A technology for secure access and web services, applied in transmission systems, electrical components, etc., can solve problems such as inability to guarantee complete security, and achieve the effects of improving security, preventing the execution of illegal configurations, and preventing leakage

Inactive Publication Date: 2015-04-29
PHICOMM (SHANGHAI) CO LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, this method is limited by browsers and is not guaranteed to be completely secure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Web service security access method, system and corresponding server
  • Web service security access method, system and corresponding server
  • Web service security access method, system and corresponding server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further elaborated below by describing a preferred specific embodiment in detail in conjunction with the accompanying drawings.

[0046] Such as figure 1As shown, a web service security access system includes a client 1 and a server 2, wherein the server 2 is an embedded device supporting web services, and the server 2 includes: a request receiving unit 21 for receiving a client 1, and record the time node when the client access request is received; the storage unit 22, connected to the request receiving unit 21, is used to save the connection identifier of the authenticated client 1 and receive the client 1 access request The time node and the preset time interval; the verification unit 23 is connected to the request receiving unit 21 and the storage unit 22 respectively, and is used to match the client 1 connection identifier received by the request receiving unit 21 with the client stored in the storage unit 22 The connection identifica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Web service security access method. The method is applied to a Web service security access system. The Web service security access system comprises a client and a server. The Web service security access method comprises the following steps: S1, recording a time node at which an access request of the client is received by the server; S2, judging whether the time interval between the adjacent two access requests is larger than a preset time interval or not by the server; S2.1, if so, not responding to the request of the client by the server; S2.2, otherwise, responding to the request of the client by the server and saving the time node at which the access request of the client is received. The invention further discloses a Web service security access system and a corresponding server. By adopting the Web service security access method disclosed by the invention, the Web security of equipment can be effectively improved, information leakage of the equipment can be prevented, and the changes in configuration of the equipment caused by malicious attacks are avoided.

Description

technical field [0001] The invention relates to Web service technology, in particular to a Web service security access method, system and corresponding server. Background technique [0002] With the development of computer and communication technology, Internet applications are no longer limited to PCs, and the networking of embedded devices has also become a product of the development of information technology. After the embedded device is connected to the Internet, it can easily share information to the network, and also realize remote control, upgrade and maintenance of the device. Users only need a web browser to visually understand the device information and operating status, and can easily and conveniently configure the device by changing the elements on the page, without knowing too much about the inside of the device. [0003] When the device is connected to the Internet, the information is shared in the network, and remote configuration is also acceptable. This no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/105H04L63/0815H04L63/0876H04L63/145H04L63/306
Inventor 王旭仲黄小飞杨侠凌车任秋刘驰
Owner PHICOMM (SHANGHAI) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More