Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for network request proxy execution

A technology of network request and proxy service, applied in transmission systems, electrical components, etc., to solve problems such as inaccessible sites

Active Publication Date: 2019-12-06
FUJIAN NETDRAGON WEBSOFT CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] When visiting an https site, in order to confirm whether the visited site is in a safe state, the domain name and certificate of the visited site will be verified, but if an intermediate proxy server is used during the access process, it will be The proxy server has been transferred, and it may prompt that the certificate is invalid
In the existing technology, each client needs to import the certificate into the trusted root certificate to prevent the prompt that the certificate is invalid; if it is not imported into the trusted root certificate, even if the intermediate proxy server is a trustworthy server, the client will always prompt the certificate is invalid, preventing access to the desired site

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for network request proxy execution
  • A method and system for network request proxy execution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] The proxy server receives the client's initial network request based on https;

[0065] The proxy server judges whether the certificate of the target server accessed by the initial network request is valid and obtains a corresponding result. If the certificate is valid, then:

[0066] The proxy server feeds back the result to the client and sends the initial network request to the target server;

[0067] The client converts the network request for accessing the target server into an http-based transit network request according to the result and sends the transit network request to the proxy server;

[0068] The proxy server receives the transit network request;

[0069] The proxy server converts the transit network request into an https-based access network request;

[0070] The proxy server sends the network access request to the target server.

[0071] The proxy server receives initial network response information based on https sent by the target server;

[0072]...

Embodiment 2

[0075] S1. The proxy server obtains the HTTPS-based initial network request sent by the client's browser,

[0076] S2. The proxy server will verify whether the certificate of the target server accessed by the initial network request is valid; if valid: feedback that the certificate of the target server accessed by the initial network request is valid, and send the initial network request to the target If the server is invalid, it will feed back to the browser of the client that the certificate of the target server is invalid, and stop accessing the target server.

[0077] S3. The browser of the client receives the result of the feedback, and judges whether the certificate of the target server accessed by the initial network request is valid according to the result, if invalid: the browser of the client stops accessing the target server; if valid : The browser of the client converts all https-based network requests for accessing the target server into corresponding http-based t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of network request proxy execution, in particular to a method and system for network request proxy execution. In the present invention, through S1, the proxy server receives the client's initial network request based on https; S2, the proxy server judges whether the certificate of the target server accessed by the initial network request is valid and obtains a corresponding result, if the certificate is valid , then: S3, the proxy server feeds back the result to the client and sends the initial network request to the target server; S4, the client accesses the network of the target server according to the result The request is converted into an http-based transit network request and the transit network request is sent to the proxy server. In this way, the sender of the network request is prevented from repeatedly checking the security of the target site, causing wrong judgments and interrupting the access of the network request to the target site, and at the same time avoiding affecting the efficiency of network execution.

Description

technical field [0001] The invention relates to the field of network request proxy execution, in particular to a method and system for network request proxy execution. Background technique [0002] When visiting an https site, in order to confirm whether the visited site is in a safe state, the domain name and certificate of the visited site will be verified, but if an intermediate proxy server is used during the access process, it will be The proxy server has been relayed, and it may prompt that the certificate is invalid. In the existing technology, each client needs to import the certificate into the trusted root certificate to prevent the prompt that the certificate is invalid; if it is not imported into the trusted root certificate, even if the intermediate proxy server is a trustworthy server, the client will always prompt the certificate Invalid, resulting in inability to access the desired site. Contents of the invention [0003] The technical problem to be solve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/0823H04L67/02H04L67/56H04L67/60
Inventor 刘德建陈丛亮郭玉湖
Owner FUJIAN NETDRAGON WEBSOFT CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More