Access request verification method and device, storage medium and electronic device

A technology of access request and verification method, which is applied in the computer field and can solve problems such as interface paralysis and server pressure increase

Active Publication Date: 2020-04-03
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a verification method and device, a storage medium, and an electronic device for an access request, so as to at least solve the problem in related technologies that when crawlers or malicious users tamper with request parameters, or use scripts to access interfaces in batches, it is easy to Technical problems that cause security such as interface paralysis or increased server pressure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access request verification method and device, storage medium and electronic device
  • Access request verification method and device, storage medium and electronic device
  • Access request verification method and device, storage medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0026] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access request verification method and device, a storage medium and an electronic device. The method comprises the steps that a target access request is acquired, wherein the target access request carries first client fingerprint information; comparing the first client fingerprint information with fingerprint information in a fingerprint information set, the fingerprintinformation in the fingerprint information set comprising client fingerprint information carried in an access request obtained before the target access request; and under the condition that the fingerprint information set comprises the fingerprint information of the first client, confirming the target access request as an abnormal access request. By the adoption of the technical scheme, the problem that in the prior art, when a crawler or a malicious user tampers with request parameters or accesses interfaces in batches through scripts, interface paralysis or server pressure increase and othersafety problems are likely to be caused is solved.

Description

technical field [0001] The present invention relates to the field of computers, in particular to a verification method and device for an access request, a storage medium and an electronic device. Background technique [0002] A cookie is an option for the client to store data. It can be set on the client or on the server, and the cookie will be sent along with any http request. Since the cookie information is plain text and easy to be stolen, users can easily and completely copy all the request information, including cookies, so this application programming interface (Application Programming Interface, API for short) is not safe, crawlers or malicious users You can easily tamper with the request parameters, or use scripts to access the interface in batches, causing excessive pressure on the interface or server or even paralysis. [0003] In the related technology, when copying the current API request to curl mode or fetch mode, it is convenient to call this request in a loo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0861H04L63/10
Inventor 方亮张得俊陆鹏李晓玮
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products