Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for preventing illegal access to server

An illegal access and server technology, applied in the field of communication, can solve the problems of the server being unable to serve normal users, not allowing IP to send requests, and information leakage. Effect

Active Publication Date: 2022-03-22
HUNAN HAPPLY SUNSHINE INTERACTIVE ENTERTAINMENT MEDIA CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the above interaction process, if a malicious client modifies the URL or its parameters, initiates a malicious request, or a malicious client simulates a normal user to initiate a request, there is a risk of information leakage
In addition, if malicious clients continue to initiate requests, the server will reject normal client requests due to insufficient resources, resulting in the client being unable to obtain the required data, so the server cannot serve normal users
[0008] In order to solve the above problems, the existing method is generally to limit the IP and UserAgent of the client that initiates the request, such as limiting the number of requests that a single IP can initiate within a fixed period of time, or by analyzing the behavior of the IP, put the suspicious IP into Blacklist, IPs in the blacklist are not allowed to make requests
However, this method cannot prevent the behavior of accessing the server by brushing the backend interface with scattered IPs and unfixed requests.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The method for preventing illegal access to the server includes the following steps:

[0062] Step A1. The client sends the user ID and the resource ID to be requested (if requesting the playback address of a certain video, the resource ID is the id of the video; if requesting to send a SMS verification code, the resource ID is the issued mobile phone number) to server.

[0063] Step A2. The server receives the user ID and the resource ID to be requested.

[0064] Step A3. The server generates a session ID according to the user ID received in step A2, the resource ID to be requested, and the session key preset in the server. The process of generating a session ID involves:

[0065] Calculate the hash value according to the user ID and the resource ID to be requested;

[0066] Use a preset key to encrypt the hash value to generate a session ID.

[0067] Step A4. The server sends the session identifier and session key to the client.

[0068] Step A5. The client recei...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for preventing illegal access to a server, wherein the prevention method includes: the client sends the user identification and the resource identification to be requested to the server; The key generates a session ID, and sends the session ID to the client; the client generates the original resource URL to be requested, combines the session ID and the original resource URL into a new URL, and sends an access request to the server based on the new URL; the server judges the new Whether there is a session ID in the URL, if not, the access is rejected; if so, it is judged whether the session ID in the new URL is consistent with the generated session ID, and if not, the access is rejected. The invention can prevent the behavior of illegally accessing the server, thereby avoiding information leakage and the failure of the server to serve normal users; the method has a wide range of applications, and is especially suitable for the behavior of swiping the back-end interface with scattered IPs and unfixed requests.

Description

technical field [0001] The invention belongs to the communication field, in particular to a method and system for preventing illegal access to a server. Background technique [0002] At present, most of the interactive interfaces between the client and the server are implemented through http, wherein the server provides external access interfaces, and these interfaces provide standard http services. [0003] In the prior art, the process of interaction between the client and the server is as follows: [0004] First, the client generates a resource URL (Uniform Resource Locator, Uniform Resource Locator) to be requested, and sends an http request to the server. [0005] Then, the server receives the request and returns the access result to the client. [0006] Finally, the client parses the access result returned by the server and processes the corresponding business logic. [0007] During the above interaction process, if a malicious client modifies the URL or its paramet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/02
Inventor 李小红
Owner HUNAN HAPPLY SUNSHINE INTERACTIVE ENTERTAINMENT MEDIA CO LTD