Service request validity control method, server and system
A business request and server technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as easy forgery and easy forgery requests, and achieve difficult results
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0079] This embodiment proposes a method for controlling the legality of a service request, which is applied to a server, and the server stores a complete key and a corresponding relationship between the identity of the client and the complete key, and the complete key includes the first key and second key. The identification in this embodiment may preferably use the machine code of the client. The first key in this embodiment is preferably the first half of the complete key, and the second key is preferably the second half of the complete key. Of course, according to the setting requirements, the first key can also be the odd-numbered position of the complete key The second key may be a permutation and combination of the values of the even-numbered positions of the complete key, or it may be able to form a complete key in other ways.
[0080] The server in this embodiment communicates with the client through the network. The network may be a wireless network or a wired ne...
Embodiment 2
[0099] Such as figure 2 As shown, this embodiment discloses a server, which includes a memory and a processor. The memory is used to store the complete key, the correspondence between the client identifier and the complete key, and program instructions; wherein the complete key includes a first key and a second key; the processor , for running the program instructions to execute the encryption step and the decryption step described in the first embodiment. I won't repeat them here.
Embodiment 3
[0101] Such as image 3 As shown, a system includes a server and a client communicating with the server through a network, the server includes a first memory and a first processor, and the client includes a second memory and a second processor.
[0102] The first memory is configured to store a complete key, a correspondence between the client identifier and the complete key, and first program instructions; wherein the complete key includes a first key and a second key; The first processor is configured to execute the first program instructions to perform as image 3 steps shown.
[0103] The second memory is used to store the second program instructions and the first key; the second processor is used to run the second program instructions to perform the following steps: image 3 steps shown.
[0104] Such as image 3 As shown, the interaction process between the server and the client is described in detail.
[0105] 1. Client startup request:
[0106] Step S01, sending ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


