Unlock instant, AI-driven research and patent intelligence for your innovation.

Serial number-based network request tamper-proofing method

A network request, tamper-proof technology, applied in the field of logistics network, can solve the problem of not being able to protect the integrity and effectiveness of network requests well, and achieve the effect of increasing accuracy and solving errors

Active Publication Date: 2020-12-25
SICHUAN HONGTU LOGISTICS +1
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing technology cannot protect the integrity and validity of network requests well

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Serial number-based network request tamper-proofing method
  • Serial number-based network request tamper-proofing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0030] refer to figure 1 , the serial number-based anti-tampering method for network requests in the embodiment of the present invention includes the following steps;

[0031] S1: The requesting end and the accessing end obtain the data type relationship table, and the data type relationship table records all types of request data packets and the random code corresponding to each type.

[0032] Among them, the data type relationship table is pre-generated, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a serial number-based network request tamper-proofing method, According to the method, the type of a request data packet corresponds to a random code, a request end and an access end need to perform check value interaction, then the interaction random value and the random code corresponding to the type of the request data packet constitute a serial number, and the serial number is added to the head of the request data packet to form a recombined data packet; the access end compares whether a first random value in the recombined data packet is consistent with a first random value in a first check value or not and whether a second random value in the recombined data packet is consistent with a second random value in a second check value or not; and if the judgment results are yes, whether the random code in the recombined data packet is matched with the type of the recombined data packet or not is judged according to a data type relation table, and if the random code is matched with the type, the head of the recombined data packet is removed to obtain a request data packet. According to the invention, tamper-proofing of a network request can be realized.

Description

technical field [0001] The invention relates to the technical field of logistics network, in particular to a serial number-based anti-tampering method for network requests. Background technique [0002] With the vigorous development of the logistics industry, logistics network security has become an issue that must be considered. Network requests are the most common events and have become the most important step in network security defense. Effective protection of network requests will play a key role in network security. However, the existing technology is still unable to protect the integrity and validity of the network request well. Contents of the invention [0003] The purpose of the present invention is to provide a network request tamper-proof method based on a serial number, which can realize network request tamper-proof. [0004] In order to solve the above-mentioned technical problems, a technical solution adopted by the present invention is to provide a method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1441H04L63/0428H04L63/12H04L67/60
Inventor 施甘图陈旭庭治宏赵乾旭
Owner SICHUAN HONGTU LOGISTICS