A method and system for preventing illegal access to server
An illegal access and server technology, applied in the field of communication, can solve the problems of the server being unable to serve normal users, not allowing IP to send requests, and information leakage. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0061] The method for preventing illegal access to the server includes the following steps:
[0062] Step A1. The client sends the user ID and the resource ID to be requested (if requesting the playback address of a certain video, the resource ID is the id of the video; if requesting to send a SMS verification code, the resource ID is the issued mobile phone number) to server.
[0063] Step A2. The server receives the user ID and the resource ID to be requested.
[0064] Step A3. The server generates a session ID according to the user ID received in step A2, the resource ID to be requested, and the session key preset in the server. The process of generating a session ID involves:
[0065] Calculate the hash value according to the user ID and the resource ID to be requested;
[0066] Use a preset key to encrypt the hash value to generate a session ID.
[0067] Step A4. The server sends the session identifier and session key to the client.
[0068] Step A5. The client recei...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More