Unlock instant, AI-driven research and patent intelligence for your innovation.

Service request validity control method, server and system

A business request and server technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as easy forgery and easy forgery requests, and achieve difficult results

Active Publication Date: 2017-11-17
GUANGDONG YOUMAI INFORMATION COMM TECH
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to overcome the deficiencies of the prior art, one of the purposes of the present invention is to provide a method for legality control of service requests, which can solve the problem of easy forgery of requests
[0004] The second object of the present invention is to provide a server that can solve the problem of easy forgery of requests
[0005] The third object of the present invention is to provide a system that can solve the problem of easy forgery of requests

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service request validity control method, server and system
  • Service request validity control method, server and system
  • Service request validity control method, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] This embodiment proposes a method for controlling the legality of a service request, which is applied to a server, and the server stores a complete key and a corresponding relationship between the identity of the client and the complete key, and the complete key includes the first key and second key. The identification in this embodiment may preferably use the machine code of the client. The first key in this embodiment is preferably the first half of the complete key, and the second key is preferably the second half of the complete key. Of course, according to the setting requirements, the first key can also be the odd-numbered position of the complete key The second key may be a permutation and combination of the values ​​of the even-numbered positions of the complete key, or it may be able to form a complete key in other ways.

[0080] The server in this embodiment communicates with the client through the network. The network may be a wireless network or a wired ne...

Embodiment 2

[0099] Such as figure 2 As shown, this embodiment discloses a server, which includes a memory and a processor. The memory is used to store the complete key, the correspondence between the client identifier and the complete key, and program instructions; wherein the complete key includes a first key and a second key; the processor , for running the program instructions to execute the encryption step and the decryption step described in the first embodiment. I won't repeat them here.

Embodiment 3

[0101] Such as image 3 As shown, a system includes a server and a client communicating with the server through a network, the server includes a first memory and a first processor, and the client includes a second memory and a second processor.

[0102] The first memory is configured to store a complete key, a correspondence between the client identifier and the complete key, and first program instructions; wherein the complete key includes a first key and a second key; The first processor is configured to execute the first program instructions to perform as image 3 steps shown.

[0103] The second memory is used to store the second program instructions and the first key; the second processor is used to run the second program instructions to perform the following steps: image 3 steps shown.

[0104] Such as image 3 As shown, the interaction process between the server and the client is described in detail.

[0105] 1. Client startup request:

[0106] Step S01, sending ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a service request validity control method, a server and a system. The service request validity control method is characterized in that a client stores the front half section of a complete key, the server stores the complete key which comprises the front half section and the rear half section, the client performs verification before sending a service request to the server, the server performs twice encryption according to the complete key and a server timestamp after verification and then returns back to the client, the client decrypts by using the front half section of the key, assembles into a complete key and then acquire a unique token and a corresponding timestamp, and the client maintains the timestamp to enable the timestamp to be consistent with the server timestamp. The partial key can further prevent the client from being cracked to obtain the complete key so as to improve the security, and the request of the client is enabled to be difficult to be forged after being intercepted according to the method of performing encryption by using the server timestamp.

Description

technical field [0001] The invention relates to communication security technology. Background technique [0002] In the Internet era, with the proliferation of WEB and apps today, the legality control of client requests is becoming more and more important. Now the client generally uses the client to request the server, and then the server generates a token (token) and returns it to the client. Bring the token with this request. However, there will be some security holes in this way. Once the token is captured, the request can be forged. Contents of the invention [0003] In order to overcome the deficiencies of the prior art, one of the purposes of the present invention is to provide a method for legality control of service requests, which can solve the problem of easy forgery of requests. [0004] The second object of the present invention is to provide a server that can solve the problem of easy forgery of requests. [0005] The third object of the present invention i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0866H04L9/3213H04L9/3297H04L63/0478H04L63/06H04L63/0807H04L2463/121
Inventor 陈强潘有劲
Owner GUANGDONG YOUMAI INFORMATION COMM TECH