Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for preventing illegal access to server

An illegal access and server technology, applied in the field of communication, can solve the problems of insufficient resources, the server cannot serve normal users, and information leakage, etc., to achieve the effect of wide application, avoiding the server being unable to serve normal users, and avoiding information leakage.

Active Publication Date: 2021-07-09
HUNAN HAPPLY SUNSHINE INTERACTIVE ENTERTAINMENT MEDIA CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the above interaction process, if a malicious client modifies the URL or its parameters, initiates a malicious request, or a malicious client simulates a normal user to initiate a request, there is a risk of information leakage
In addition, if malicious clients continue to initiate requests, the server will reject normal client requests due to insufficient resources, resulting in the client being unable to obtain the required data, so the server cannot serve normal users
[0008] In order to solve the above problems, the existing method is generally to limit the IP and UserAgent of the client that initiates the request, such as limiting the number of requests that a single IP can initiate within a fixed period of time, or by analyzing the behavior of the IP, put the suspicious IP into Blacklist, IPs in the blacklist are not allowed to make requests
However, this method cannot prevent the behavior of accessing the server by brushing the backend interface with scattered IPs and unfixed requests.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] One implementation of the method for preventing illegal access to the server includes the following steps:

[0059] Step A1. The server generates a set of prompt code, session ID, session key and encryption key;

[0060] Step A2. The server encrypts the information formed by combining the prompt code, the session ID, and the session key with an encryption key to obtain encrypted information, where the encryption key is any number in the encryption key set;

[0061] Step A3. The server sends the encryption key set, prompt code and encrypted information to the client;

[0062] Step A4. The client receives the encryption key set, prompt code and encrypted information;

[0063] Step A5. The client selects an encryption key from the encryption key set to decrypt the encrypted information to obtain the decrypted information;

[0064] Step A6. Determine whether the prompt code contained in the decrypted information is consistent with the prompt code received by the client di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for preventing illegal access to a server, wherein the prevention method includes: A1. The server generates a prompt code and a session identifier; A2. Encrypts the prompt code and the session identifier to obtain encrypted information; A3. The encrypted information is sent to the client; A4. The client receives the information; A5. The client selects an encryption key to decrypt the encrypted information; A6. Determines whether the prompt code in the decrypted information is consistent with the prompt code received directly, and if so, obtains Correspond to the session ID and jump to A; otherwise, repeat A5-A6; A. The client generates the original resource URL; B. Combine the session ID and the original resource URL into a new URL; C. Send an access request based on the new URL; D. Judging whether there is a session ID in the new URL, if not, deny access; if so, execute E. Determine whether the session ID in the new URL is consistent with the pre-generated session ID, otherwise deny access. The invention can identify whether the access request is legal, and prevent illegal access to the server from occurring.

Description

technical field [0001] The invention belongs to the communication field, in particular to a method and system for preventing illegal access to a server. Background technique [0002] At present, most of the interactive interfaces between the client and the server are implemented through http, wherein the server provides external access interfaces, and these interfaces provide standard http services. [0003] In the prior art, the process of interaction between the client and the server is as follows: [0004] First, the client generates a resource URL (Uniform Resource Locator, Uniform Resource Locator) to be requested, and sends an http request to the server. [0005] Then, the server receives the request and returns the access result to the client. [0006] Finally, the client parses the access result returned by the server and processes the corresponding business logic. [0007] During the above interaction process, if a malicious client modifies the URL or its paramet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 李小红
Owner HUNAN HAPPLY SUNSHINE INTERACTIVE ENTERTAINMENT MEDIA CO LTD