Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network communication safety protection method and device

A network communication and security technology, applied in the network field, can solve problems such as tokens not being used, unable to work, increase server and client overhead, etc., to achieve the effect of improving security, preventing CSRF attacks, and lightening the burden

Active Publication Date: 2016-03-30
IBM CORP
View PDF9 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, a huge number of tokens increases server and client overhead, and some tokens may be rarely or never used
Therefore, this scheme cannot work effectively in many network environments such as Web2.0

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network communication safety protection method and device
  • Network communication safety protection method and device
  • Network communication safety protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Preferred embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although preferred embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0020] figure 1 A block diagram of an exemplary computer system / server 12 suitable for use in implementing embodiments of the invention is shown. figure 1 The computer system / server 12 shown is only an example and should not impose any limitation on the functions and scope of use of the embodiments of the present invention.

[0021] Such as figure 1 As shown, computer system / server 12 takes the form of a general purpose computing device. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network communication safety protection method and device. One embodiment provides a method for protecting network communication safety at the place of a server. The method comprises the following steps: in response to a request from a client, determining whether a token received from the client is included in an effective token queue, wherein the effective token queue is a first-in first-out queue; in response to the case that the token is included in the effective token queue, managing the effective token queue according to the position of the token in the effective token queue; and sending a response to the client according to the management of the effective token queue. The invention also discloses a corresponding method at the place of the client and a device for realizing the method.

Description

technical field [0001] Embodiments of the present invention generally relate to network technologies, and more specifically, to methods and devices for protecting network communication security. Background technique [0002] In network communication, a common type of malicious attack is to forge legitimate requests or commands. For example, Cross-Site Request Forgery (CSRF) is an example of such malicious attacks. A common approach to CSRF attacks is to provide the user with a message containing a link or script. If a user clicks on a link or triggers script execution, an unauthorized request will be sent to the site where the user has been authenticated. At this point, from the site's perspective, the request is a legitimate request sent by an authenticated user. Thus, the actions involved in the request will be performed. In this way, CSRF attackers can achieve illegal purposes by forging requests from authenticated users. [0003] As an example, assume a user is usin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807
Inventor 殷文宝廖军冯易成
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products