Unlock instant, AI-driven research and patent intelligence for your innovation.

Request control method, server, client and system

A request control, client-side technology, applied in the information field, can solve problems such as hidden dangers of user account information security, users cannot log in operations, etc., to achieve the effect of ensuring security

Active Publication Date: 2018-07-27
BEIJING QIHOO TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, when a user logs in to an application, the application login request information will be hijacked by some operators, such as hijacking the user's request to access the account login interface and tampering with or deleting important information in the login request, resulting in the user being unable to perform normal login operations. Create security risks for user account information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Request control method, server, client and system
  • Request control method, server, client and system
  • Request control method, server, client and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0038] The embodiment of the present invention provides a request control method, which can be applied to the server, such as figure 1 As shown, the method includes:

[0039] 101. Receive login request information sent by the client.

[0040] Wherein, the login request information may carry Cookie (data stored on the client) information. The cookie information may include user account information, such as user login account name ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a request control method, a server, a client and a system, and relates to the technical field of information. When login request information is attacked, the problem can be processed timely, and therefore the safety of the user account login information can be guaranteed. The request control method comprises that the login request information sent by the client is received at first, then whether the response corresponding to the login request information is abnormal or not is judged, if the response corresponding to the login request information is abnormal, mode switching indication information is sent to the client, the mode switching indication information is carried with a configuration file including various request modes, and therefore the client switches the request mode in dependence on the configuration file. The request control method, the server, the client and the system are suitable for request control.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a request control method, server, client and system. Background technique [0002] With the continuous development of the Internet, the number of Internet users continues to increase. Among them, some application developers have developed application login services in order to attract more Internet users and maintain the stickiness between users and applications. After logging in to the app with an account, you can enjoy the app's membership privileges, membership tasks, membership lucky draw, point redemption, etc. Usually, when a user logs in to an application, the account information entered by the user is generally verified. If the verification is passed, the user is allowed to use the functions corresponding to the application membership. [0003] At present, when a user logs in to an application, the application login request information will be hijacked by s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/14
Inventor 祝振飞吴宏博吕艳李进荣震黄旭
Owner BEIJING QIHOO TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More