Method for preventing network attack performed by using legal data or tampering legal data
A legal data and network attack technology, applied in the field of network security, can solve problems such as calculation theory difficulties, achieve the effect of protecting network and server resources, ensuring timeliness, and preventing attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0030] Example one:
[0031] A method to prevent attacks using legal data or tampering with legal data, which can be used in Internet of Things (ipp) projects, launcher projects and other mobile terminals and cloud access, such as figure 2 As shown, in this embodiment, it is mainly applied to an IoT project including multiple application services 301.
[0032] Such as figure 1 As shown, the method for preventing attacks using legal data or tampering with legal data is realized by two modules: terminal signature module 101 and cloud verification module 201, where these two modules have the following functions respectively :
[0033] Terminal signature module 101: The main function is to add the business data body sent by the business terminal to the timestamp timestamp, non-repeated random numbers, such as uuid, the salt value agreed by the terminal and the cloud, and perform the hash algorithm on the combined data. Obtain the hash value; among them, the salt value agreed by the se...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap