Network request protection method and network communication system

A network request and login request technology, applied in the field of network security, can solve the problems of attackers bypassing, incomplete protection methods, and ineffective protection, etc., to achieve the effect of improving security

Active Publication Date: 2018-07-06
CHENGDU NEUSOFT UNIV
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process of data interaction through the webpage, the communication between the legitimate user terminal and the server may be attacked by various attacks, causing the attacker to use the identity of the legitimate user terminal to operate the server
In the prior art, this kind of attack is only protected by some single means, the protection method is not comprehensive, it is easy to be bypassed by the attacker, and it cannot be effectively protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network request protection method and network communication system
  • Network request protection method and network communication system
  • Network request protection method and network communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0046] Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network request protection method and a network communication system. The network communication system comprises a server and a a user terminal that communicate with each other. The method comprises the following steps: acquiring a first HTTP request sent by the user terminal by the server; replacing a preset character in the first HTTP request by the server to obtain a second HTTP request, and detecting whether a preset sensitive keyword is included in the second HTTP request; and if not, then acquiring and verifying whether a Referer value in the first HTTP request starts with a preset domain name by the server, and verifying that a token value in the first HTTP request is a preset value. Thus, the sensitive keywords in the HTTP requests are shielded, and the requests are verified by combining a Referer field and a token, so that cross-site scripting attacks and cross-site request forgery can be recognized and excluded, so that the safety of data interactionbetween a legal user terminal and the server is improved.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a network request protection method and a network communication system. Background technique [0002] With the continuous development of network technology and the popularization of personal computer terminals, the scenarios of relying on the Internet to realize various information interactions are becoming more and more abundant. During the data interaction process through the webpage, the communication between the legitimate user terminal and the server may be subjected to various attacks, causing the attacker to use the identity of the legitimate user terminal to operate the server. In the prior art, such attacks are only protected by some single means, and the protection method is not comprehensive, and it is easy to be bypassed by attackers, so it cannot be effectively protected. Contents of the invention [0003] In order to overcome the above-mention...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/0807H04L63/0815H04L63/1466H04L67/02H04L67/60
Inventor 罗频捷温荷刘毅巨星
Owner CHENGDU NEUSOFT UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products