Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Connection method, system, client and server based on workload proof

A connection method and workload technology, applied in the Internet field, can solve problems such as website crash, server crash, economic loss, etc., and achieve the effect of increasing costs, reducing the number of connections, and controlling the number of connections

Active Publication Date: 2020-11-13
JIANGSU PAYEGIS TECH CO LTD +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Websites such as e-commerce have a very high number of concurrent connections. During e-commerce shopping festivals such as Double 11 and 618, the number of concurrent connections will be very high, which can easily cause server crashes. However, hackers often use tens of thousands of simultaneous connections DDOS attacks on such websites, if there is no restriction on such connection requests, it will force the website to crash, which in turn will cause greater economic losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Connection method, system, client and server based on workload proof
  • Connection method, system, client and server based on workload proof
  • Connection method, system, client and server based on workload proof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] figure 1 A schematic flow chart of a proof-of-work-based connection method according to Embodiment 1 of the present invention is shown. Such as figure 1 As shown, the method includes the following steps:

[0066] Step S10, constructing a connection request, wherein the connection request carries a random number.

[0067] Specifically, the client may include a random number generator, use the random number generator to randomly generate a random number, and then use the generated random number to construct a connection request, that is, the connection request carries a random number, wherein the connection request Can be http request.

[0068] Of course, the client can store a random number set locally, and the client can select a random number from the random number set each time, and then use the selected random number to construct a connection request. This is just an example and does not have any limiting effect. .

[0069] In step S11, proof of workload is perf...

Embodiment 2

[0078] figure 2 A schematic flow chart of a proof-of-work-based connection method according to Embodiment 2 of the present invention is shown. The execution subject of this method is the server, such as figure 2 As shown, the method includes the following steps:

[0079] Step S20, receiving the connection request sent by the client through the proof of work, wherein the connection request carries a random number.

[0080] The client performs proof of work on the connection request constructed. In order to pass the proof of work, the client may need to perform multiple calculations. That is to say, the process of proof of work is a complicated process. Proof, then send the connection request through the workload proof to the server, the connection request carries the random number that meets the workload proof, and the server receives the connection request through the workload proof sent by the client.

[0081] Step S21, perform workload verification on the connection req...

Embodiment 3

[0085] image 3 A schematic flow chart of a proof-of-work-based connection method according to Embodiment 3 of the present invention is shown. Such as image 3 As shown, the method includes the following steps:

[0086] Step S300, the client constructs a connection request, wherein the connection request carries a random number.

[0087] Specifically, the client may include a random number generator, use the random number generator to randomly generate a random number, and then use the generated random number to construct a connection request, that is, the connection request carries a random number, wherein the connection request Can be http request.

[0088] Of course, the client can store a random number set locally, and the client can select a random number from the random number set each time, and then use the selected random number to construct a connection request. This is just an example and does not have any limiting effect. .

[0089] In step S301, the client per...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a connection method based on workload proof, a client, a server, a connection system based on the workload proof and a computer storage medium. The method comprises the following steps: step S10, constructing a connection request, wherein the connection request carries a random number; step S11, performing workload proof on the constructed connection request; and step S12, sending the proved connection request to the server, so that the server performs workload verification on the connection request, and if the connection request passes the workload verification, establishing a connection with the client in response to the connection request. The client executes the workload proof operation, thereby increasing the connection cost of the client, the server performs the workload verification on the connection request to determine whether to establish the connection, therefore the connection number can be effectively controlled, for the attacker initiating malicious DDOS, he needs to pay a certain amount of work, thereby increasing the cost of the attacker initiating malicious DDOS and reducing the connection number established by the maliciously initiated DDOS attacks.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular to a connection method based on proof of work, a client, a server, a connection system based on proof of work, and a computer storage medium. Background technique [0002] Websites such as e-commerce have a very high number of concurrent connections. During e-commerce shopping festivals such as Double 11 and 618, the number of concurrent connections will be very high, which can easily cause server crashes. However, hackers often use tens of thousands of simultaneous connections DDOS attacks on such websites, if no restrictions are imposed on such connection requests, the website will be forced to crash, which in turn will cause large economic losses. Contents of the invention [0003] In view of the above problems, the present invention is proposed to provide a proof-of-work-based connection method, a client, a server, a workload-proof-based connection system, and a c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/3236H04L63/08H04L63/1458H04L67/141
Inventor 汪德嘉郭宇王少凡
Owner JIANGSU PAYEGIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products