Request data verification system and method

A technology for requesting data and verifying methods, applied in the field of network security, can solve the problems of high access platform cost, less security processing, security risks, etc., to reduce the cost of intranet system access platform, save manpower and time costs , The effect of saving the time of review and risk control

Inactive Publication Date: 2020-05-08
SUNING CLOUD COMPUTING CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Most of the intranet systems are used internally by the enterprise. After being crawled by a reverse proxy or crawler, the business of the intranet platform can be accessed through the external network platform. When accessing, the requested data after access needs to be imported into the intranet system, but When the request data is fed back to the intranet platform, less security is dealt with, and there are various security risks. If it is maliciously attacked, it will be disastrous, so effective protection must be achieved
From the system level, the security guarantee should be guaranteed by the business system itself. When accessing the intranet business through the external network platform, due to the large number of access systems, the development teams and business lines of each business system are different, and it is carried out according to the standard. In the case of security transformation, the communication, design, development, testing, and scheduling time are too long and cumbersome, and because the connected systems are constantly increasing according to business changes, this kind of development work will be endless for a long time, resulting in intranet system access. The cost of entering the platform is high, and greatly affects the efficiency of system opening. How to design a method to verify the request data during the process of feeding back the request data to the intranet platform requires further technological innovation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Request data verification system and method
  • Request data verification system and method
  • Request data verification system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] like figure 1 As shown, this embodiment provides a verification system for request data, including:

[0032] The general interception module is used to receive the request data sent by the user from the external network platform to the internal network platform, and perform the first dimension verification on the request data, and continue to transmit the request after the request data passes the verification data;

[0033] The form field interception module is used to receive the request data transmitted from the general interception module, and verify the page form information on the request data, and continue to transmit the request data after the verification is passed. request data;

[0034] A logic interception module, configured to receive the request data transmitted from the form field interception module, and perform application programming interface verification on the request data, and when the request data passes the verification, the requesting data to ...

Embodiment 2

[0040] like image 3 As shown, this embodiment provides a method for verifying request data, including the following steps:

[0041] S1: The general interceptor receives the request data sent by the user from the external network platform to the internal network platform, and performs the first dimension verification on the request data. When the request data passes the verification, the general interceptor will continue passing said request data;

[0042] S2: The form field interceptor receives the request data transmitted from the general interceptor, and verifies the page form information on the request data. When the request data passes the verification, the form field interceptor continue to pass said request data;

[0043] S3: The logic interceptor receives the request data transmitted from the form field interceptor, and performs application programming interface verification on the request data, and when the request data passes the verification, the logic interceptor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a request data verification system and method. The method comprises the steps that a universal interceptor receives request data transmitted by a user from anextranet platform to an intranet platform, carries out first-dimensional verification on the request data, and continues to transmit the request data; a form field interceptor receives the request data transmitted from the universal interceptor, verifies page form information of the request data and then continues to transmit the request data; a logic interceptor receives the request data transmitted from the form field interceptor, and transmits the request data to the intranet platform after verifying an application programming interface of the request data; and after the request data is intercepted, the intercepted position of the request data is displayed through a data interception prompter. Therefore, the security of accessing the intranet service by the extranet platform is improved, the cost of accessing the platform by the intranet system is reduced, and the access efficiency is improved.

Description

technical field [0001] The invention relates to the field of network security, in particular to a verification system and method for request data. Background technique [0002] Most of the intranet systems are used internally by the enterprise. After being crawled by a reverse proxy or crawler, the business of the intranet platform can be accessed through the external network platform. When accessing, the requested data after access needs to be imported into the intranet system, but When the request data is fed back to the intranet platform, less security is dealt with, and there are various security risks. If it is maliciously attacked, it will be disastrous, so effective protection must be achieved. From the perspective of the system level, the security guarantee should be guaranteed by the business system itself. When accessing the intranet business through the external network platform, due to the large number of access systems, the development teams and business lines o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/12H04L63/123H04L63/1466
Inventor 许昆王宇郭近之王陆军王震东
Owner SUNING CLOUD COMPUTING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products