An access request processing method and system

A technology for access requests and processing methods, applied in transmission systems, electrical components, etc., can solve problems such as attacking user websites, threatening the security of static resources of web servers, and affecting the results of dynamic resource access, so as to improve security and resist malicious The effect of the attack

Active Publication Date: 2021-03-23
郑州昂视信息科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The inventor found that when a user accesses a web server to request a dynamic resource, the dynamic resource may contain a malicious dark link, and illegal users often use the malicious dark link to spread bad information to the visiting user, or even maliciously attack the user website, which will not only affect the dynamic The result of resource access may also threaten the security of the static resources of the web server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access request processing method and system
  • An access request processing method and system
  • An access request processing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] The inventors of the present invention found that in the prior art, the web server does not perform any differentiated processing on the access request initiated by the user, and directly feeds back the requested dynamic resource or static resource to the user client, which causes the web server and User clients are attacked by dark links hidden in dynamic resource access.

[0067] Based on this, the inventor proposes to classify access requests initiated by users, and to process and respond to access requests according to corresponding processing rules for different types of access requests. That is to say, the purpose of isolating the dynamic resource access that may cause security problems is to prevent it from affecting the user's access to the static resource, thereby greatly improving the security of the static resource of the Web server.

[0068] Moreover, the inventor also proposes mimetic processing of dynamic resources to ensure that access to dynamic resource...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access request processing method and system. An access request sent by a user cannot be directly sent to any one or all website servers; firstly, the affiliated request typeneeds to be recognized; the delivery decision of the current access request is determined; then, the current access request can be delivered to the corresponding website server to be processed according to the delivery decision. Therefore for different kinds of access requests, different website servers are used for processing; the independent processing on the dynamic resource request of possiblyexisting pathogens is realized; the influence on the processing of static resources on the website servers of other types of access requests is avoided; the safety of the static resources on the website servers can be improved; the hostile attack of the user websites is effectively resisted; the influence of dark chains on the user access is avoided to a certain degree.

Description

technical field [0001] The present invention relates to the field of network security access, and more specifically relates to an access request processing method and system. Background technique [0002] In today's network environment, the Web service system, as a platform for carrying and providing important services, has become a virtual representative of the government, enterprises and individuals on the Internet. Massive data resources such as order information make web servers the main attack targets of network hackers. [0003] The inventor found that when a user accesses a web server to request a dynamic resource, the dynamic resource may contain a malicious dark link, and illegal users often use the malicious dark link to spread bad information to the visiting user, or even maliciously attack the user's website, which will not only affect the dynamic The result of resource access may also threaten the security of the static resources of the Web server. [0004] Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0236H04L63/10H04L67/025
Inventor 韩首魁刘浩
Owner 郑州昂视信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products