Secure access method and device for a service interface

A service interface and secure access technology, applied in the field of secure access to service interfaces, can solve problems such as inability to effectively resist illegal server attacks, overwhelm server services, and unavailability, so as to enhance identity verification capabilities and ensure data integrity Effect

Active Publication Date: 2019-05-14
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF9 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are many defects in the above scheme: First, the information in the cookie is very easy to be obtained by a third party. Once the third party obtains the information, it is fully capable of forging the identity by modifying the cookie, so as to pass the identity verification; Tampering, in some cases, is also easy to cause purposeful damage to the server; third, the information in the cookie can be used repeatedly before it becomes inv

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure access method and device for a service interface
  • Secure access method and device for a service interface
  • Secure access method and device for a service interface

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0042] figure 1 It is a schematic diagram of main steps of a secure access method of a service interface according to an embodiment of the present invention.

[0043] Such as figure 1 As shown, a method for securely accessing a service interface according to an embodiment of the present invention mainly includes the following steps S101 to S102.

[0044] Step S101: The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure access method and device for a service interface, and relates to the technical field of computers. A specific embodiment of the method comprises the following steps: aserver generates a token according to a token acquisition request sent by a client requesting the token, sends the token to the client requesting the token, and stores a corresponding relationship between the token and the client requesting the token; When the server side receives an access request sent by a client side to be accessed, the server side sends the access request to the client side;and verifying whether the to-be-accessed client is the client of the request token according to the stored corresponding relationship, if the verification is passed, allowing the to-be-accessed clientto access the service interface, and otherwise, refusing the to-be-accessed client to access the service interface. According to the embodiment, the identity verification capability, the data integrity and the anti-brushing capability of the background server side are enhanced under the condition that the cost is allowed.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for securely accessing a service interface. Background technique [0002] With the advent of the Internet era, more and more services are transferred from offline to online, and the volume of applications continues to grow. Due to the needs of some special scenarios, the traditional network request technology (short connection) has been difficult to meet, so the long connection technology that is more suitable for these specific scenarios has gradually developed. Due to the specific properties of persistent connection technology, when designing such services, it is necessary to carefully design strategies to ensure that background service resources can be used to maximize effective services, otherwise some simple malicious attacks will have a great impact Availability and robustness of services. [0003] Currently, the most commonly used attack modes for p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 吴骏宇
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products