Unlock instant, AI-driven research and patent intelligence for your innovation.

A data transmission processing method, device, system and equipment

A technology of data transmission and processing method, applied in the field of communication, can solve the problems of manslaughter of normal business traffic, affecting server business, unsatisfactory cleaning effect, etc., to ensure the effect of not being affected and preventing attacks

Active Publication Date: 2021-02-12
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the cleaning effect of the existing solutions is not ideal, and it is easy to cause accidental killing of normal business traffic, thereby affecting server business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data transmission processing method, device, system and equipment
  • A data transmission processing method, device, system and equipment
  • A data transmission processing method, device, system and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0058] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of practice in sequences other than those ill...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a data transmission processing method, device, system and equipment. Specifically, the method includes: receiving a first data message and generating a random character string; embedding a flag in the first data message bits and the random character string to obtain a second data message; send the second data message and obtain a first key generated according to the random character string in the second data message; The key is verified with the second key generated according to the locally stored random character string; and the first data message is processed according to the verification result. The invention can effectively protect against attacks and ensure that normal services are not affected.

Description

technical field [0001] The present invention relates to the technical field of communication, and in particular to a data transmission processing method, device, system and equipment. Background technique [0002] During the process of data transmission from the client to the server, a large number of malicious requests will be sent to the target server, causing the server bandwidth, memory and other resources to be exhausted and unable to respond to normal user requests. [0003] In the prior art, the processing methods of attack traffic corresponding to such malicious requests mainly include: using feature filtering, rate limiting, watermarking and other strategies to clean the attack traffic; among them, feature filtering: some attack traffic is abnormal compared to normal traffic feature, by checking and filtering abnormal features to protect against attacks; rate limit: after the attack occurs, limit the packet rate of the source IP and destination IP; watermark: the cl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0869H04L63/0428H04L63/083
Inventor 陈国张浩浩罗喜军
Owner TENCENT TECH (SHENZHEN) CO LTD