Unlock instant, AI-driven research and patent intelligence for your innovation.

A way to prevent malicious requests

A malicious and business request technology, applied in the field of network security, can solve the problems of inconsistency and complexity of current limiting rules, a large number of malicious requests, business needs and calls, etc., to achieve the effect of guaranteeing experience, saving costs and avoiding excessive pressure

Active Publication Date: 2021-04-20
北京农信数智科技有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] The purpose of the present invention is to overcome the malicious request interception or preventive measures in the prior art. For servers that need to be open to the public and provide a large number of services of various types, these interception or preventive measures have problems such as difficulty in preventing simulated requests. A large number of malicious requests and a large number of business demand calls lead to inconsistent and complicated technical problems in current limiting rules. It is difficult to achieve technical problems in the prevention of malicious requests. A method and device for preventing malicious requests is proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A way to prevent malicious requests
  • A way to prevent malicious requests
  • A way to prevent malicious requests

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0045] Detailed exemplary embodiments are disclosed below. However, specific structural and functional details disclosed herein are merely for purposes of describing example embodiments.

[0046] It should be understood, however, that the invention is not limited to the particular exemplary embodiments disclosed, but covers all modifications, equivalents, and alternatives falling within the scope of the disclosure. Throughout the description of the figures, the same reference numerals denote the same elements.

[0047] Referring to the accompanying drawings, the structures, proportions, sizes, etc. shown in the accompanying drawings of this specification are only used to match the content disclosed in the specification, for those who are familiar with this technology to understand and read, and are not used to limit the scope of the present invention. Therefore, it...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for preventing malicious requests. The method includes the steps: A. When the user terminal sends a service request to the server, the server front-end application requests whether the back-end service needs a verification code; B. If the back-end service needs a verification code, the server front-end application requests the terminal to input the verification code , after the terminal sends a verification code request to the server, the back-end service sends a verification code to the terminal, and after the terminal returns the verification code information to the front-end application, the back-end service intercepts more than one indicator of the terminal; C, intercepts one of the terminal's indicators according to the back-end service The above indicators analyze the possibility of malicious requests. When the possibility of malicious requests is higher than the predetermined threshold, the back-end service requires the terminal to enter an additional verification code through the front-end application.

Description

technical field [0001] The invention relates to network security technology, in particular to active security protection technology related to the server side. Background technique [0002] With the rapid development of the Internet, malicious network attacks have become a problem that cannot be ignored in the industry. Malicious network attacks can be abnormal means adopted to achieve a certain purpose, such as network attacks, malicious requests, and so on. In the network environment, malicious behaviors on the network can cause the website to fail to provide services to users normally in a very short period of time, which seriously affects the normal operation of the Internet. [0003] Malicious requests can be hypertext transfer protocol network requests that are continuously sent to the server through the application program within a period of time and affect the normal operation of the server. For example, to interfere with normal user's network behavior or to attack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L63/0838H04L63/1441H04L63/1425
Inventor 易有涛李玉福薛素金于莹王柯王旭
Owner 北京农信数智科技有限公司