Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for preventing illegal access to server

An illegal access and server technology, applied in the field of communication, can solve the problems of servers unable to serve normal users, insufficient resources, information leakage, etc., and achieve the effect of preventing servers from being unable to serve normal users, preventing illegal access to servers, and avoiding information leakage

Active Publication Date: 2022-03-22
HUNAN HAPPLY SUNSHINE INTERACTIVE ENTERTAINMENT MEDIA CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the above interaction process, if a malicious client modifies the URL or its parameters, initiates a malicious request, or a malicious client simulates a normal user to initiate a request, there is a risk of information leakage
In addition, if malicious clients continue to initiate requests, the server will reject normal client requests due to insufficient resources, resulting in the client being unable to obtain the required data, so the server cannot serve normal users
[0008] In order to solve the above problems, the existing method is generally to limit the IP and UserAgent of the client that initiates the request, such as limiting the number of requests that a single IP can initiate within a fixed period of time, or by analyzing the behavior of the IP, put the suspicious IP into Blacklist, IPs in the blacklist are not allowed to make requests
However, this method cannot prevent the behavior of accessing the server by brushing the backend interface with scattered IPs and unfixed requests.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] One implementation of the method for preventing illegal access to the server includes the following steps:

[0042] Step A. The client generates the original resource URL to be requested.

[0043] Step B. The client obtains the session identifier pre-stored in the server; the client obtains the session key from the server; the client encrypts the original resource URL according to the session key to obtain the encrypted URL.

[0044] Step C. The client merges the session identifier obtained in step B, the encrypted URL obtained in step B, and the original resource URL generated in step A into a new URL.

[0045] Step D. The client sends an access request to the server based on the new URL.

[0046] Step E. The server judges whether the new URL in the received access request has a session identifier, if not, then judges that the access request is an illegal access request, and the server rejects the access; if so, executes step F.

[0047] Step F. judge whether the ses...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for preventing illegal access to a server, wherein the method comprises: A. the client generates an original resource URL to be requested; B. the client obtains a session identifier; C. the client converts the session identifier and the original resource URL Combined into a new URL; D. The client sends an access request to the server based on the new URL; E. The server determines whether the new URL has a session identifier, if not, the server rejects the access; if so, execute step F; F. It is judged whether the session ID in the new URL is consistent with the session ID stored in the server in advance, if not, it is judged that the access request is an illegal access request, and the server rejects the access. The present invention can identify whether the access request is legal, prevent the behavior of illegally accessing the server, thereby avoiding information leakage and the server being unable to serve normal users; the method has a wide range of applications, and is especially suitable for the behavior of swiping the back-end interface with scattered IP and irregular requests.

Description

technical field [0001] The invention belongs to the communication field, in particular to a method and system for preventing illegal access to a server. Background technique [0002] At present, most of the interactive interfaces between the client and the server are implemented through http, wherein the server provides external access interfaces, and these interfaces provide standard http services. [0003] In the prior art, the process of interaction between the client and the server is as follows: [0004] First, the client generates a resource URL (Uniform Resource Locator, Uniform Resource Locator) to be requested, and sends an http request to the server. [0005] Then, the server receives the request and returns the access result to the client. [0006] Finally, the client parses the access result returned by the server and processes the corresponding business logic. [0007] During the above interaction process, if a malicious client modifies the URL or its paramet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L67/146
Inventor 李小红
Owner HUNAN HAPPLY SUNSHINE INTERACTIVE ENTERTAINMENT MEDIA CO LTD