Unlock instant, AI-driven research and patent intelligence for your innovation.

Http request parameter verification method applied to electronic channel of telecom operator

A technology for telecom operators and request parameters, applied in user identity/authority verification, electrical components, digital transmission systems, etc., can solve problems such as inability to obtain session data, stateless application services, etc., and avoid reading sessions across machines The effect of failure

Inactive Publication Date: 2019-07-02
NANJING XINWANG VIDEO NETWORK TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The above existing methods have the following problems: In a distributed cluster system, application services may be stateless, and multiple requests may not be processed on the same server server, resulting in session data not being obtained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Http request parameter verification method applied to electronic channel of telecom operator
  • Http request parameter verification method applied to electronic channel of telecom operator

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Below in conjunction with pay him the present invention is described.

[0024] A method for verifying HTTP request parameters applied to electronic channels of telecom operators, comprising the following steps:

[0025] 1: The verification data generation steps are: 1.1 When the server returns data to the browser, the verification field is calculated for the sensitive content; the sensitive content is the product number and / or price discount data; the verification data S generation method is as follows: S=Hash (K, Userid, T, Code); where S is the generated verification data, Hash is the generation algorithm, K is the preset secret key, which participates in the Hash operation; Userid is the user ID; T is the time, is the current time or expiration date; Code is sensitive content; 1.2: The server puts the generated verification data S into the cookie field and returns it to the front-end browser through a message;

[0026] The verification process of the second pair of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention particularly relates to an http request parameter verification method applied to an electronic channel of a telecom operator. The method comprises the steps of 1, when the verification data are generated, calculating a verification field according to sensitive content, wherein the sensitive content refers to commodity numbers and / or data of price discount data participating in generation of verification data S, and the server side puts the generated verification data S into a cookie field and returns the verification data S to a user front-end browser through a message; 2, operating a user at the browser end in the browser operation verification process of the user, selecting corresponding commodities and price discounts, and submitting the commodities and the price discountsto the server end; using the server to verify the request parameters of the user; reading the commodity selected by the user and the price discount, and outputting a business code Code1 correspondingto the content according to the content selected by the user; and calculating a request parameter S1 for the Code1, comparing the verification data S with the request parameter S1 by the server, andif the verification data S and the request parameter S1 are different, indicating that the request parameter is illegally modified or forged on the browser side, and the processing fails.

Description

technical field [0001] The invention belongs to the field of telecommunication operator's electronic channel and Internet software system, and in particular relates to an http request parameter checking method applied to the telecommunication operator's electronic channel. Background technique [0002] "Handheld business hall" is an important mobile Internet product for mobile operators in terms of electronic channels. It is the business that involves some discounts and free services and becomes the key attack target of illegal users. Therefore, the industry usually sends verification data for verification when handling the above-mentioned sensitive business. In the common http request interaction process, request parameters are transmitted in the form of url or request body. However, due to the openness of http requests, request parameters are easily intercepted and tampered with. Some illegal users use tools or programming methods to modify the content of http request p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L9/06H04L9/32
CPCH04L9/0643H04L9/3236H04L9/3247H04L63/08H04L63/10H04L67/02H04L67/14
Inventor 石光捷张良付飞龙张晓莉
Owner NANJING XINWANG VIDEO NETWORK TECH