Supercharge Your Innovation With Domain-Expert AI Agents!

Illegal request interception method and system

An illegal, key-value pair technology, applied in the field of information processing, can solve problems such as effective identification of difficult-to-counterfeit terminals, affecting reasonable and effective business operations, and unreasonable allocation of business resources.

Active Publication Date: 2022-05-10
智业互联(厦门)健康科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In related technologies, it is difficult to effectively distinguish the requests of pseudo-terminals, resulting in unreasonable allocation of service resources, which in turn affects the reasonable and effective execution of services.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal request interception method and system
  • Illegal request interception method and system
  • Illegal request interception method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0028] In related technologies, it is difficult to effectively distinguish requests from pseudo-terminals, which may easily lead to unreasonable allocation of business resources and affect the effective operation of business; according to the illegal request interception method of the embodiment of the present invention, first, the front-end service obtains the first request sent by the client. An input request, the first input request includes an input key-value pair; then, generating the first input encryption information accord...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an illegal request interception method, medium, device and system, wherein the method includes: the front-end service acquires a first input request sent by a client, wherein the first input request includes an input key-value pair; Generate first entry encryption information according to the entry key-value pair, and generate a second entry request according to the first entry encryption information, and send the second entry request to a backend server; The back-end server parses the second entry request to obtain the corresponding entry key-value pair, and generates second entry encryption information according to the entry key-value pair; judging the first entry entry encryption information Whether it is consistent with the second entry encryption information, if not, the first entry request is considered to be an illegal request, and the first entry request is intercepted; the entry request initiated by the pseudo-terminal can be effectively Interception, thereby preventing the unreasonable allocation of business resources, and ensuring the reasonable and effective conduct of business.

Description

technical field [0001] The invention relates to the technical field of information processing, in particular to an illegal request interception method, a computer-readable storage medium, a computer device and an illegal request interception system. Background technique [0002] In the process of business processing through the Internet, it is necessary to obtain user requests, so as to perform corresponding business processing according to the user requests. In this process, there are often many criminals who initiate requests in the form of pseudo-terminals in order to obtain the operation authority of the corresponding business. [0003] In related technologies, it is difficult to effectively distinguish requests from pseudo-terminals, resulting in unreasonable allocation of service resources, thereby affecting reasonable and effective service execution. Contents of the invention [0004] The present invention aims to solve one of the technical problems in the above-me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08
CPCH04L63/1466H04L63/1441H04L63/0428H04L9/0861
Inventor 高扬洪德杉戴鹏龙陈奇莲
Owner 智业互联(厦门)健康科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More