Http request parameter verification method applied to electronic channel of telecom operator
A technology for telecom operators and request parameters, applied in user identity/authority verification, electrical components, digital transmission systems, etc., can solve problems such as inability to obtain session data, stateless application services, etc., and avoid reading sessions across machines The effect of failure
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] Below in conjunction with pay him the present invention is described.
[0024] A method for verifying HTTP request parameters applied to electronic channels of telecom operators, comprising the following steps:
[0025] 1: The verification data generation steps are: 1.1 When the server returns data to the browser, the verification field is calculated for the sensitive content; the sensitive content is the product number and / or price discount data; the verification data S generation method is as follows: S=Hash (K, Userid, T, Code); where S is the generated verification data, Hash is the generation algorithm, K is the preset secret key, which participates in the Hash operation; Userid is the user ID; T is the time, is the current time or expiration date; Code is sensitive content; 1.2: The server puts the generated verification data S into the cookie field and returns it to the front-end browser through a message;
[0026] The verification process of the second pair of ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

