Request processing method, server, client, and request processing system
A request processing and server technology, which is applied in the computer field, can solve the problems of low security, low resistance to maliciously forged requests, easy to accidentally damage normal requests, etc., and achieve the effect of improving security and improving resistance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0068] A request processing method provided by an embodiment of the present invention is introduced in detail.
[0069] refer to figure 1 , shows a flowchart of steps of a request processing method in an embodiment of the present invention.
[0070] Step 110, receiving the data request sent by the client, and obtaining the encrypted character string carried by the data request; wherein, the encrypted character string is obtained by encrypting the first request parameter of the client through a preset encryption algorithm .
[0071] In the embodiment of the present invention, in order to confirm whether the currently received data request is a forged request, the first request parameter corresponding to the sender client can be set in the data request, and in order to avoid the first request parameter being transmitted during the transmission process tampered, you can set the data request to carry an encrypted string, where the encrypted string is obtained by encrypting the f...
Embodiment 2
[0089] A request processing method provided by an embodiment of the present invention is introduced in detail.
[0090] refer to figure 1 , shows a flowchart of steps of a request processing method in an embodiment of the present invention.
[0091] Step 210, receiving the data request sent by the client, and obtaining the encrypted character string carried by the data request; wherein, the encrypted character string is obtained by encrypting the first request parameter of the client through a preset encryption algorithm .
[0092] Step 220, decrypt the encrypted character string to obtain the decrypted character string.
[0093] As mentioned above, in this embodiment of the present invention, in order to detect the match between the first request parameter contained in the encrypted string and the second request parameter contained in the data request, the encrypted string can be decrypted, or the second request parameter to encrypt. However, the way of encrypting the sec...
Embodiment 3
[0121] A request processing method provided by an embodiment of the present invention is introduced in detail.
[0122] refer to image 3 , shows a flowchart of steps of a request processing method in an embodiment of the present invention.
[0123] Step 310, when the client receives the data request, acquire the first request parameter of the client.
[0124] Step 320: Encrypt the first request parameter with a preset encryption algorithm to obtain an encrypted character string.
[0125] Step 330, carry the encrypted character string in the data request, and send the data request carrying the encrypted character string to the server corresponding to the data request.
[0126] Step 340, receiving the data returned by the server in response to the data request.
[0127] In the embodiment of the present invention, when the client receives the data request, the first request parameter of the client is acquired; the first request parameter is encrypted by a preset encryption al...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


