Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data exchange method and device thereof based on HTTP protocol

An HTTP protocol, data interaction technology, applied in the field of data interaction, can solve problems such as data leakage, and achieve the effect of ensuring security, ensuring information security, and ensuring information security

Inactive Publication Date: 2015-09-30
XIAOMI INC
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this only solves the data security problem after the data arrives at the server. If the data is intercepted during the transmission between the front end and the server, it may still cause data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data exchange method and device thereof based on HTTP protocol
  • Data exchange method and device thereof based on HTTP protocol
  • Data exchange method and device thereof based on HTTP protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] figure 1 It is a flow chart of a data interaction method based on the HTTP protocol shown according to an exemplary embodiment, such as figure 1 As shown, the data interaction method based on the HTTP protocol is used in a client of a web browser or other WEB applications, including the following steps S11-S12:

[0057] In step S11, a reversible algorithm is used to encrypt the data to be sent to the server.

[0058] When the user performs an operation on the web browser or other WEB application client, so that the client needs to send data to the server, the client will use a reversible algorithm to check the data to be sent or a specific data in the data Fields are encrypted, and the encryption process can be done by client-side scripts.

[0059] In one embodiment, the reversible algorithm may be a simple algorithm: y=f(x,m), where x is the data to be sent to the server, y is the encrypted data, and m is the encryption key.

[0060] In step S12, the encrypted data ...

Embodiment 2

[0064] figure 2 It is a flow chart of another data interaction method based on the HTTP protocol shown according to an exemplary embodiment on the basis of Embodiment 1 of the present disclosure, as shown in figure 2 As shown, the data interaction method is used in the client of the above-mentioned web browser or other WEB applications, and the above-mentioned data interaction method may further include the following steps after the above-mentioned step S12:

[0065] In step S13, an HTTP request is sent to the server, and the HTTP request is used to request the encrypted data from the server.

[0066] When the client needs to request the encrypted data stored on the server, the client sends an HTTP request to request the server to return the encrypted data.

[0067] In step S14, the above-mentioned encrypted data returned by the server is received.

[0068] Using AJAX, the above encrypted data returned by the server is received.

[0069] In step S15, the received encrypte...

Embodiment 3

[0076] image 3 It is a flow chart of a data interaction method based on the HTTP protocol according to an exemplary embodiment based on the second embodiment of the present disclosure. The data interaction method is used in the following scenario: the user provides the user to the website X The address of the user is "Chaoyang District, Beijing". When the user uses the website in the later stage, the website will automatically display the user's address to the user for the user's convenience, without the need for the user to fill in the address repeatedly. Such as image 3 As shown, in this scenario, using the data interaction method based on the HTTP protocol provided by the embodiment of the present disclosure for data interaction includes the following steps:

[0077] In step S31, after the user logs in to website X, he enters the user's address "Chaoyang District, Beijing" in the input box provided by website X, and then, the user clicks the information sending button co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a data exchange method based on an HTTP protocol and a data exchange device based on an HTTP protocol to solve the safety problem in AJAX technology transmission data based on the HTTP protocol, and the transmission safety of user data can be ensured while the use of a HTTPS protocol is avoided. The method comprises the steps of using a reversible algorithm to encrypt data which is needed to be sent to a server to obtain encrypted data and sending the encrypted data to the server via an AJAX request. According to the technical scheme, the safe transmission of the data in the AJAX technology transmission data based on the HTTP protocol is ensured.

Description

technical field [0001] The present disclosure relates to the field of data interaction, and in particular to a method and device for data interaction based on the HTTP protocol. Background technique [0002] With the development of the Internet, the data interaction between the front end of the WEB application and the server has become more and more frequent. In order to make the WEB application more perfect and more friendly, most WEB applications begin to undertake data interaction through AJAX request technology. But the problem that comes with it is that most WEB applications use the TCP+HTTP working mechanism, and the data exchange is based on the plaintext data transmission protocol. If the data packet is intercepted by a third party during the transmission process, it may cause data leakage. So how to ensure the security of data interaction has become a problem that WEB applications need to solve. [0003] In related technologies, some WEB applications use the HTTPS ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 任远漆昱恒江岱霖
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products