A method and system for preventing illegal access to server
An illegal access and server technology, applied in the field of communication, can solve the problems of insufficient resources, the server cannot serve normal users, and information leakage, etc., to achieve the effect of wide application, avoiding the server being unable to serve normal users, and avoiding information leakage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0058] One implementation of the method for preventing illegal access to the server includes the following steps:
[0059] Step A1. The server generates a set of prompt code, session ID, session key and encryption key;
[0060] Step A2. The server encrypts the information formed by combining the prompt code, the session ID, and the session key with an encryption key to obtain encrypted information, where the encryption key is any number in the encryption key set;
[0061] Step A3. The server sends the encryption key set, prompt code and encrypted information to the client;
[0062] Step A4. The client receives the encryption key set, prompt code and encrypted information;
[0063] Step A5. The client selects an encryption key from the encryption key set to decrypt the encrypted information to obtain the decrypted information;
[0064] Step A6. Determine whether the prompt code contained in the decrypted information is consistent with the prompt code received by the client di...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More