Unlock instant, AI-driven research and patent intelligence for your innovation.

A network attack defense method, server and terminal

A network attack and server technology, applied in the computer field, can solve the problems of increasing server management costs and spending a lot of resources, and achieve the effects of increasing management costs, avoiding malicious attacks, and defending against network attacks.

Active Publication Date: 2020-08-04
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the above solution, the server needs to record the user characteristic information of each user. If the number of users is particularly large, the server needs to spend a lot of resources to store the user characteristic information of each user.
Obviously, the existing solution will increase the management cost of the server as the number of users increases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network attack defense method, server and terminal
  • A network attack defense method, server and terminal
  • A network attack defense method, server and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The embodiment of the present invention provides a network attack defense method, server and terminal, which can save the user characteristic information of the user, so that even if the number of users increases, the management cost of the server will not be increased, thereby achieving a reduction in server management cost purposes.

[0041] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of practice in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention disclose a defense method of a network attack, a server and a terminal that can help reduce the management costs of the server. The method comprises the steps of receiving a first access request of a target network address that is sent by the terminal, and determining first user feature information according to the first access request; encrypting the target network address according to the first user feature information and a pre-stored password, so as to obtain an encrypted target network address, wherein the encrypted target network address comprises a first secret key; sending the encrypted target network address to the terminal; when a second access request of the encrypted target network address sent by the terminal is received, determining second user feature information according to the second access request; generating a second secret key according to the second user feature information and the pre-stored password, and determining whether the first secret key and the second secret key are identical, wherein if the first secret key and the second secret key are identical, the second access request is responded, or if the first secret key and the second secret key are different, the second access request is filtered.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a network attack defense method, server and terminal. Background technique [0002] With the development of the Internet, some lawbreakers have launched cyber attacks in order to interfere with normal website operations and conduct malicious competition. [0003] At present, the industry adopts the scheme in terms of website attack defense: when each user visits the website for the first time, after the server obtains the user characteristic information of each user, the server stores the user characteristic information of each user; The website, the server determines the user characteristic information of the user, and compares the user characteristic information of the user with the user characteristic information of each user recorded by the server, if the comparison is successful, the user is allowed to access the website, otherwise Access to this site is prohibited. [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/0876H04L63/102H04L63/1441
Inventor 袁帅曹智
Owner TENCENT TECH (SHENZHEN) CO LTD