A method and system for preventing illegal access to server
An illegal access and server technology, applied in the field of communication, can solve the problems of servers unable to serve normal users, insufficient resources, information leakage, etc., and achieve the effect of preventing servers from being unable to serve normal users, preventing illegal access to servers, and avoiding information leakage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0041] One implementation of the method for preventing illegal access to the server includes the following steps:
[0042] Step A. The client generates the original resource URL to be requested.
[0043] Step B. The client obtains the session identifier pre-stored in the server; the client obtains the session key from the server; the client encrypts the original resource URL according to the session key to obtain the encrypted URL.
[0044] Step C. The client merges the session identifier obtained in step B, the encrypted URL obtained in step B, and the original resource URL generated in step A into a new URL.
[0045] Step D. The client sends an access request to the server based on the new URL.
[0046] Step E. The server judges whether the new URL in the received access request has a session identifier, if not, then judges that the access request is an illegal access request, and the server rejects the access; if so, executes step F.
[0047] Step F. judge whether the ses...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More