Unlock instant, AI-driven research and patent intelligence for your innovation.

Communication method, server and terminal based on hypertext transfer protocol

A technology of hypertext transmission and server, which is applied in the field of communication methods, terminals and servers based on hypertext transfer protocol, and can solve the problem of unrecognizable whether the request is intercepted or replayed.

Active Publication Date: 2016-06-15
BEIJING QIHOO TECH CO LTD
View PDF6 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Based on the above reasons, once the request information between the terminal and the server is intercepted during the data transmission process, since the server does not record any relevant information such as the status of the request, it is impossible to identify whether the request is intercepted and replayed, and it is unavoidable. Occurrence of replay attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method, server and terminal based on hypertext transfer protocol
  • Communication method, server and terminal based on hypertext transfer protocol
  • Communication method, server and terminal based on hypertext transfer protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0128] In order to make the above objects, features and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and specific embodiments.

[0129] refer to figure 1 , shows a schematic flowchart of Embodiment 1 of a communication method based on HTTP protocol provided by the present application. The communication method based on HTTP protocol in this embodiment includes the following steps:

[0130] Step 101, the terminal sends a timestamp request to the server.

[0131] Step 102, the server generates a first timestamp.

[0132] The server may obtain the current time according to international standard rules to generate the first timestamp.

[0133] Step 103, the server sends the first timestamp to the terminal.

[0134] Step 104, the server receives the network request information sent by the terminal; the network request information includes the first timesta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a communication method, a server and a terminal based on a hypertext transfer protocol (HTTP), aiming to resist playback attacks in HTTP network communication. The method comprises: sending a first time stamp to a terminal under the requirement of the terminal; receiving the network request information sent by the terminal, wherein the network request information includes the first time stamp and a corresponding time stamp ciphertext, and the terminal encrypts the algorithm factor including the first time stamp according to a preset encryption algorithm to generate the time stamp ciphertext; and verifying whether the time stamp ciphertext is valid according to the preset encryption algorithm, and determining the network request information to be invalid if the time stamp ciphertext is invalid. The method can verify the legality and validity of the time stamp ciphertext including time stamp information, so as to prevent the time stamp information in a network request from being tampered, and to avoid network playback attacks.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular, to a communication method, server and terminal based on a hypertext transfer protocol. Background technique [0002] At present, as the Internet increasingly affects people's daily work and life, the security of Internet-based data communication is particularly important. [0003] Among various factors that affect the security of network communication, replay attacks (ReplayAttacks) are one of the most common attack methods. Replay attack, also known as replay attack, replay attack or freshness attack (FreshnessAttacks), means that the attacker uses network monitoring or other methods to steal authentication credentials, and then re-send the disguised data packets to the server to deceive the system. the goal of. It is mostly used in the identity authentication process and destroys the correctness of the authentication. This type of attack continuously mal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L9/32
CPCH04L9/3247H04L9/3297H04L67/02
Inventor 李超杭程吴浩任寰
Owner BEIJING QIHOO TECH CO LTD