Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network request safety verification method, device, medium and electronic equipment

A network request and verification method technology, which is applied in the direction of secure communication devices, user identity/authority verification, electrical components, etc., can solve problems such as low network service efficiency and disrupted user experience

Active Publication Date: 2019-11-12
PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the technical problem in the related art that the expiration of the token will damage the user experience and ultimately lead to the inefficiency of users using network services, the present invention provides a network request security verification method, device, medium and electronic equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network request safety verification method, device, medium and electronic equipment
  • Network request safety verification method, device, medium and electronic equipment
  • Network request safety verification method, device, medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0036] Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. Some of the block diagrams shown in the drawings are functional entities and do not necessarily correspond to physically or logically separate entities.

[0037] The present disclosure firstly provides a network request security verification method. The network requ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network monitoring, and discloses a network request safety verification method, a device, a medium and electronic equipment. The method comprises the steps of receiving a first network request, generating a first token according to the first network request, and sending the first token to a sending end of the first network request, wherein the firsttoken comprises failure time; determining the time for monitoring the trigger operation of the sending end of the first network request; when the trigger operation of the sending end of the first network request is monitored at the time, adjusting the failure time of the first token according to the trigger operation to obtain the adjusted failure time of the first token; and when a second networkrequest carrying the first token is received before the adjusted failure time, confirming that the second network request is legal. According to the method, after the token is generated for the network request, the failure time of the token is adjusted according to the triggering operation of the user, so that the dynamic optimization of the failure time of the token is realized, and the safety of the token is considered while the user experience is ensured.

Description

technical field [0001] The invention relates to the technical field of network monitoring, in particular to a network request security verification method, device, medium and electronic equipment. Background technique [0002] With the advent of the Internet era, various technologies including network protocols provide a safe and orderly environment for network communications, enabling people to roam freely in the ocean of the network. an important technology. As a token in identity authentication, token has certain timeliness. At present, the usage process of most clients or Apps is that when a user logs in to the server or submits a form to the server, the server will return a token to the client or App. When the user logs in again or submits the form, the request submitted by the client or App will carry the token. token, the server judges whether the user's request is legal based on the token. [0003] In the implementation of the existing technology, in order to ensu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3213H04L63/0807
Inventor 颜媛
Owner PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products