Supercharge Your Innovation With Domain-Expert AI Agents!

Illegal request interception method and system

An interception system and illegal technology, applied in the field of information processing, can solve the problems of effectively distinguishing difficult and fake terminals, affecting the reasonable and effective conduct of business, and unreasonable allocation of business resources, so as to prevent unreasonable allocation, effectively intercept and guarantee business. Effect

Active Publication Date: 2020-06-16
智业互联(厦门)健康科技有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In related technologies, it is difficult to effectively distinguish the requests of pseudo-terminals, resulting in unreasonable allocation of service resources, which in turn affects the reasonable and effective execution of services.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal request interception method and system
  • Illegal request interception method and system
  • Illegal request interception method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0028] In related technologies, it is difficult to effectively distinguish requests from pseudo-terminals, which may easily lead to unreasonable allocation of business resources and affect the effective operation of business; according to the illegal request interception method of the embodiment of the present invention, first, the front-end service obtains the first request sent by the client. An input request, the first input request includes an input key-value pair; then, generating the first input encryption information accord...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an illegal request interception method, medium, device and system, and the method comprises the steps: enabling a front-end service to obtain a first parameter entering requestsent by a client, wherein the first parameter entering request comprises a parameter entering key value pair; according to the parameter entering key value pair, generating first parameter entering encryption information, generating a second parameter entering request according to the first parameter entering encryption information, and transmitting the second parameter entering request to a back-end server; enabling the back-end server to analyze the second parameter entering request to obtain a corresponding parameter entering key value pair, and generating second parameter entering encryption information according to the parameter entering key value pair; judging whether the first participation encryption information is consistent with the second participation encryption information ornot: if not, considering that the first participation request is an illegal request, and intercepting the first participation request. According to the invention, the parameter entering request initiated by the pseudo terminal can be effectively intercepted, so unreasonable distribution of service resources is prevented, and reasonable and effective operation of the service is guaranteed.

Description

technical field [0001] The invention relates to the technical field of information processing, in particular to an illegal request interception method, a computer-readable storage medium, a computer device and an illegal request interception system. Background technique [0002] In the process of business processing through the Internet, it is necessary to obtain user requests, so as to perform corresponding business processing according to the user requests. In this process, there are often many criminals who initiate requests in the form of pseudo-terminals in order to obtain the operation authority of the corresponding business. [0003] In related technologies, it is difficult to effectively distinguish requests from pseudo-terminals, resulting in unreasonable allocation of service resources, thereby affecting reasonable and effective service execution. Contents of the invention [0004] The present invention aims to solve one of the technical problems in the above-me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L63/1466H04L63/1441H04L63/0428H04L9/0861
Inventor 高扬洪德杉戴鹏龙陈奇莲
Owner 智业互联(厦门)健康科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More