Mimic web gateway system and method for dynamic scheduling using load balancing
A dynamic scheduling and load balancing technology applied in the computer field to reduce risks and losses and increase the difficulty of attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0067] Embodiment 1, user HTTP request generates HTTP sub-request (user HTTP request includes security Cookie)
[0068] The client sends a user HTTP request to the web gateway, and the content of the request is as follows:
[0069] GET / test HTTP / 1.1
[0070] Host:acm.hdu.edu.cn
[0071] Upgrade-Insecure-Requests: 1
[0072] Cookie: UID=xcbe41273w&6zp1maitle&1rdnaj7pfb
[0073] The multi-mode distribution module in the web gateway receives the user's HTTP request, analyzes and judges the type of the user's HTTP request, and extracts the URL address and the security cookie carried in the user's HTTP request. Since there is a secure cookie, the user HTTP request contains a secure cookie flag is set to true, and the secure cookie database is retrieved to determine whether the secure cookie is safe and legal. If it is legal, it is judged whether the request type is POST. Since the user HTTP request type is GET, multiple HTTP subrequests are generated according to the informati...
Embodiment 2
[0093] Embodiment 2, user HTTP request generates HTTP sub-request (user HTTP request does not include security Cookie)
[0094] The client sends a user HTTP request to the web gateway, and the content of the request is as follows:
[0095] GET / test HTTP / 1.1
[0096] Host:acm.hdu.edu.cn
[0097] Upgrade-Insecure-Requests: 1
[0098] The multi-mode distribution module in the web gateway receives the user's HTTP request, analyzes and judges the type of the user's HTTP request, extracts the URL address and the security cookie carried in the user's HTTP request, and since there is no security cookie, the user's HTTP request contains the security cookie mark set to false. Determine whether the request type is POST. Since the user's HTTP request type is GET, multiple HTTP sub-requests are generated according to the information contained in the HTTP request header and the security configuration policy (HTTP request header generation related parameters), and the content of the HTTP...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



