A method and system for preventing illegal access to server
An illegal access and server technology, applied in the field of communication, can solve the problems that the server cannot serve normal users, the session key is easy to be cracked, and it is difficult to be modified, so as to increase the difficulty of cracking, prevent behaviors from happening, and easy to update.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0040] The method for preventing illegal access to the server includes the following steps:
[0041] Step A1. The client generates a session ID.
[0042] Step A2. The client sends the session identifier to the server.
[0043] Step A3. The server receives the session identifier.
[0044] Step A4. The server encrypts the session ID (session id) with a preset encryption key (key) to obtain the session key. Assuming that the encryption algorithm is des, the session key session key = des(key, session id).
[0045] Step A5. The server synchronizes the session key to the client.
[0046] Step A. The client generates the original resource URL to be requested.
[0047] Step B. The client uses the session key to encrypt the session identifier and the original resource URL, and appends the session identifier to obtain a new URL.
[0048] Step C. The client sends an access request to the server based on the new URL.
[0049] Step D. The server obtains the session ID from the new UR...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More