Method and device for processing web-side access

A processing method and access request technology, applied in the field of network information, can solve the problems of not being able to control web risks well, relying on human input and labor level, manual verification by security engineers, etc., to achieve a strict and complete security defense mechanism and reduce human input Cost, effect of improving web security

Inactive Publication Date: 2017-10-24
ALIBABA GRP HLDG LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] On the other hand, due to the use of various custom code writing methods, all verifications cannot be automatically completed in a standardized form, and manual verification by security engineers is still required. Especially for h...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing web-side access
  • Method and device for processing web-side access
  • Method and device for processing web-side access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] refer to figure 2 , which shows a flow chart of the steps of Embodiment 1 of a method for processing web-side access of the present application, which may specifically include the following steps:

[0080] Step 101, generating feedback data for the access request on the web side.

[0081] Wherein, the web terminal may be a browser terminal or other clients providing web page access, and may be specifically applied to mobile terminals (such as mobile phones) or other fixed terminals.

[0082] The embodiment of the present application can be implemented on a server corresponding to the web end, and the web end sends an access request to the server, and the access request can be a login request, or an access request triggered by clicking a web page or an access entry (such as a button).

[0083] Feedback data can be provided for the access request on the web side. For example, the feedback data for the login request is the login page that is redirected after successful l...

Embodiment 2

[0097] refer to image 3 , which shows a flow chart of the steps of Embodiment 2 of a method for processing web-side access of the present application. This embodiment can be specifically executed during the web-side login process, and can specifically include the following steps:

[0098] Step 201, after receiving a login request and the current login is successful, creating session information and a session identifier corresponding to the current login.

[0099] In this embodiment, the web terminal initiates a login request to the server, and successfully logs in after the server authenticates the web terminal, and the server can further create a corresponding session information session for this login, and the session information corresponds to a unique session identifier sessionid .

[0100] Step 202, generate an encryption key for this login on the web side.

[0101] After successful web login, you can further create an encryption key only for this login.

[0102] Th...

Embodiment 3

[0122] refer to Figure 4 , which shows a flow chart of the steps of Embodiment 3 of a processing method for web-side access of the present application. This embodiment can be specifically executed after logging in at the web-side, and can specifically include the following steps:

[0123] Step 301: Receive an access request from the web, the access request carries encrypted data that triggers this access, and the encrypted data is encrypted with a preset encryption key.

[0124] The encrypted data can be encrypted variable data. The web end accesses the server through the page provided by the server. Since the variable data has been encrypted with an encryption key, when the web end accesses based on the variable data, the access request carried It is also encrypted data, so that attackers cannot construct new access parameters by modifying system variable data, which improves web security and eliminates various security attacks including horizontal permission vulnerabilities...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides a method and a device for processing web-side access. The method includes the following steps: generating feedback data for an access request at a Web side; using a preset encryption key to encrypt the feedback data; and sending the encrypted feedback data to the web side to enable the Web side to access a server according to the encrypted feedback data. According to the scheme of the application, if the variable data in the feedback data in encrypted, attackers are unable to construct new access parameters by modifying the variable data of the system, so that the security of Web is improved, and all kinds of security attacks due to horizontal permission vulnerabilities are eradicated; and meanwhile, the requirement on security awareness of development personnel in the research and development stage of a business system is lowered, and the manpower cost is reduced.

Description

technical field [0001] The present application relates to the field of network information technology, in particular to a method for processing web-side access and a processing device for web-side access. Background technique [0002] Internet applications based on the web environment are becoming more and more widespread, followed by the emergence of web security threats. Attackers use cross-site scripting attacks to attack XSS, SQL injection vulnerabilities in web service programs, horizontal permission vulnerabilities, etc. to obtain control authority of the web server, tamper with the content of the webpage, steal important internal data, and even implant malicious code in the webpage, making the website access were violated. [0003] The current common solution is to customize a security code writing method corresponding to the development language for each security problem, and use this security code writing method to write codes during the business system development...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04L29/08G06F21/62
CPCG06F21/6263H04L9/0866H04L63/0428H04L67/02
Inventor 林松英吴翰清钱磊余金波
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products