Website anti-attack verification system and method

A verification system and verification method technology, applied in the field of website attack prevention verification system, to achieve high security, ensure safe operation, and prevent illegal requests and network attacks

Active Publication Date: 2016-11-16
WUHAN DOUYU NETWORK TECH CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, live video websites need to store various sensitive information, such as user personal identity information, credit card payment data, and website business information, when performing various businesses on a daily basis, so it is very easy to become the target of attack by unscrupulous users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website anti-attack verification system and method
  • Website anti-attack verification system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Terminology Explanation:

[0034] Lua is a scripting language embedded in the server.

[0035] Nginx is a lightweight web server, reverse proxy server and email (IMAP / POP3) proxy server.

[0036] The verification code is a user identification picture for behavior verification.

[0037] TCP (Transmission Control Protocol Transmission Control Protocol).

[0038] MD5 (Message Digest Algorithm Fifth Edition) is a hash function widely used in the field of computer security to provide message integrity protection.

[0039] HMAC (Hash-based Message Authentication Code) is a key-related hash operation message authentication code. HMAC operation uses a hash algorithm, takes a key and a message as input, and generates a message digest as output.

[0040] HMACMD5 is a keyed hash algorithm constructed from the MD5 hash function and is used as a hash-based message authentication code. This HMAC process mixes a key with the message data, hashes the result of the mix using a hash ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a website anti-attack verification system and method, relating to the technical field of network security. The system comprises a primary detection module and a secondary detection module, wherein the primary detection module is used for detecting whether a user is the secure user verified by the system by employing an authentication password; and the secondary detection module is used for judging whether a user behavior of the unsecure user verified by the primary detection module is a network attack via a URL (Uniform Resource Locator) of the user to request access, a user access time and a user IP. According to the website anti-attack verification system and method, by employing a manner of verifying the authentication password, a request of the secure user can be guaranteed not to be affected, the connection request of the unsecure user can be effectively intercepted, the illegal request and network attack are prevented, and a website is guaranteed to operate securely.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a website attack prevention verification system and method. Background technique [0002] At present, live video streaming websites need to store various sensitive information, such as user personal identity information, credit card payment data, and website business information, when performing various businesses on a daily basis, so they are very easy to become the target of illegal users. In order to protect the interests of users and websites, it is necessary to verify the client requesting connection to prevent various illegal requests from illegal users or network attacks. Clients generally refer to browsers or app applications. However, Internet sites, especially live video sites, have a large number of users and a huge amount of visits. How to ensure the normal operation of legitimate users and maintain the normal operation of the website, and ensure the security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1466
Inventor 彭友顺杨鹭
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products