Unlock instant, AI-driven research and patent intelligence for your innovation.

Request processing method, server, client, and request processing system

A request processing and server technology, which is applied in the computer field, can solve the problems of low security, low resistance to maliciously forged requests, easy to accidentally damage normal requests, etc., and achieve the effect of improving security and improving resistance

Active Publication Date: 2019-04-16
BEIJING CHENGSHI WANGLIN INFORMATION TECH CO LTD
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a request processing method, server, client, and system to solve the problems that existing request processing methods are easy to accidentally damage normal requests, have low security, and have low resistance to maliciously forged requests.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Request processing method, server, client, and request processing system
  • Request processing method, server, client, and request processing system
  • Request processing method, server, client, and request processing system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] A request processing method provided by an embodiment of the present invention is introduced in detail.

[0069] refer to figure 1 , shows a flowchart of steps of a request processing method in an embodiment of the present invention.

[0070] Step 110, receiving the data request sent by the client, and obtaining the encrypted character string carried by the data request; wherein, the encrypted character string is obtained by encrypting the first request parameter of the client through a preset encryption algorithm .

[0071] In the embodiment of the present invention, in order to confirm whether the currently received data request is a forged request, the first request parameter corresponding to the sender client can be set in the data request, and in order to avoid the first request parameter being transmitted during the transmission process tampered, you can set the data request to carry an encrypted string, where the encrypted string is obtained by encrypting the f...

Embodiment 2

[0089] A request processing method provided by an embodiment of the present invention is introduced in detail.

[0090] refer to figure 1 , shows a flowchart of steps of a request processing method in an embodiment of the present invention.

[0091] Step 210, receiving the data request sent by the client, and obtaining the encrypted character string carried by the data request; wherein, the encrypted character string is obtained by encrypting the first request parameter of the client through a preset encryption algorithm .

[0092] Step 220, decrypt the encrypted character string to obtain the decrypted character string.

[0093] As mentioned above, in this embodiment of the present invention, in order to detect the match between the first request parameter contained in the encrypted string and the second request parameter contained in the data request, the encrypted string can be decrypted, or the second request parameter to encrypt. However, the way of encrypting the sec...

Embodiment 3

[0121] A request processing method provided by an embodiment of the present invention is introduced in detail.

[0122] refer to image 3 , shows a flowchart of steps of a request processing method in an embodiment of the present invention.

[0123] Step 310, when the client receives the data request, acquire the first request parameter of the client.

[0124] Step 320: Encrypt the first request parameter with a preset encryption algorithm to obtain an encrypted character string.

[0125] Step 330, carry the encrypted character string in the data request, and send the data request carrying the encrypted character string to the server corresponding to the data request.

[0126] Step 340, receiving the data returned by the server in response to the data request.

[0127] In the embodiment of the present invention, when the client receives the data request, the first request parameter of the client is acquired; the first request parameter is encrypted by a preset encryption al...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a request processing method, a server, a client, and a request processing system, and relates to the technical field of computers. The method comprises the following steps: receiving a data request sent by a client, and acquiring an encrypted character string carried by the data request; detecting whether a first request parameter included in the encrypted character string matches a second request parameter included in the data request; and if the first request parameter included in the encrypted character string matches the second request parameter included in the datarequest, searching for data corresponding to the data request and returning the data to the client, wherein the encrypted character string is obtained by encrypting the first request parameter of theclient by using a preset encryption algorithm. The invention solves the technical problem that the existing request processing scheme is easy to accidentally injure normal requests and has low resistance to malicious forgery requests, improves the security of the request processing scheme, and improves the beneficial effect of resistance against the abnormal request such as malicious forgery.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a request processing method, server, client and system. Background technique [0002] With the rapid development and popularization of Internet technology, more and more users query various information through the Internet, and in order to quickly respond to various complex scenarios, a caching strategy is designed on the server side. In the cache strategy, a corresponding set of data cache templates will be generated for requests of different dimensions. After receiving the request from the client, it is easy to find the corresponding data in the data cache of the server and return it. If there is no hit For the data cache template in the data cache area, you need to generate the corresponding data template by querying the database and write it into the data cache area. At this time, if you forge a request at will, it will be easy to penetrate the data cache and direc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/14
CPCH04L9/14H04L63/0428H04L63/045H04L63/083H04L63/123
Inventor 张昌凯
Owner BEIJING CHENGSHI WANGLIN INFORMATION TECH CO LTD