Supercharge Your Innovation With Domain-Expert AI Agents!

A Dynamic Allocation Request Verification Method

A verification method and dynamic allocation technology, applied in the fields of data encryption, storage and privacy protection, security and privacy protection, can solve the problems of low security performance, singleness, and easy capture of request packets, so as to save resources and increase security sexual effect

Active Publication Date: 2022-04-01
ZHEJIANG UNIV OF TECH
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Now in the era of big data, more and more websites and APP applications are actively interacting with the server for data, and then the problem of secure data interaction with the server is derived. Under the HTTP protocol, the request packet is easily stolen. Packet capture, after the emergence of the HTTPS protocol, the flood of packet capture attacks has been curbed to a certain extent. Under the HTTPS protocol, most of the current request verification methods are fixed, and a single request verification method is adopted, which is safe. poor performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Dynamic Allocation Request Verification Method
  • A Dynamic Allocation Request Verification Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Referring to the accompanying drawings, a dynamic allocation request verification method is described in detail in this embodiment in conjunction with a mobile terminal social software of a certain offline social network, including the following steps:

[0022] Step 1: The business server of the social software performs scheduled tasks when the system activity is the lowest every day. According to the number of visits to all interfaces of the previous day, the type of interface, and the data fields involved in the interface stored in the database of the business server. The quantification parameter of importance, according to the weight corresponding to the three interface types set in the background, calculate the weight value according to the weight value calculation formula. In this project, the parameter of the interface access times is 0.1, the parameter of the interface type is 100, and the The parameter of sensitivity is 200, the value of the data acquisition inte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for dynamically assigning request verification, which calculates a weight value of an interface according to a weight parameter, selects a verification method corresponding to the weight value, and dynamically assigns a request verification method to a client according to the variability of the weight parameter. It can flexibly use a variety of request verification methods to further increase the security of data interaction with the server on the basis of HTTPS. Under multiple request verification, even if the packet is captured, it cannot attack all interfaces by forging or cracking one of them. The present invention enables the interface to obtain reasonable safety guarantee through the dynamic distribution mechanism, and saves server resources.

Description

technical field [0001] The invention belongs to the field of computer information security, relates to data encryption, storage, privacy protection and other contents and methods, and can be used for security and privacy protection during Internet data transmission. Background technique [0002] Nowadays, in the era of big data, more and more websites and APP applications are actively interacting with the server, which leads to the problem of secure data interaction with the server. Under the HTTP protocol, the request packet can easily be Packet capture, after the emergence of the HTTPS protocol, the proliferation of packet capture attacks has been curbed to a certain extent. Under the HTTPS protocol, most of the current request verification methods are fixed, and a single request verification method is used, which is safe and secure. Performance is not high. SUMMARY OF THE INVENTION [0003] In order to solve the shortcomings of the prior art, a dynamic allocation reque...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/0442H04L63/10H04L63/20H04L63/0807H04L63/0876H04L63/083H04L9/3213H04L9/3226H04L9/3247
Inventor 程宏兵方伟赵鹏杨斌飞王晓进
Owner ZHEJIANG UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More