Unlock instant, AI-driven research and patent intelligence for your innovation.

Network request tamper-proofing method based on data splitting

A network request, tamper-proof technology, applied in the field of logistics network, can solve the problem of not being able to protect the integrity and effectiveness of network requests well, and achieve the effect of increasing verification accuracy, ensuring integrity, and increasing randomness

Active Publication Date: 2021-01-05
SICHUAN HONGTU LOGISTICS +1
View PDF14 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing technology cannot protect the integrity and validity of network requests well

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network request tamper-proofing method based on data splitting
  • Network request tamper-proofing method based on data splitting

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0028] refer to figure 1 According to the embodiment of the present invention, the network request tamper-proof method based on data splitting includes the following steps;

[0029] S1: The requesting end generates a request data packet, the request data packet includes a protocol header, a request header and a data segment, the data segment includes multiple data items, and the multiple data items are separated from each other by predetermined identifiers.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network request tamper-proofing method based on data splitting, and the method comprises the steps: separating a plurality of data items of a data segment of a request data packet through preset identifiers, wherein a request end and an access end are required to carry out the interaction at the current time; then segmenting the data segment of the request data packet into a data front segment and a data rear segment at random according to a predetermined identifier, and forming a first data segmentation packet and a second data segmentation packet from the protocol header with the data front segment and from the request header with the data rear segment respectively; and when the request end current time in the first data segmentation packet is consistent with the request end current time in a first time label and the access end current time in the second data segmentation packet is consistent with the access end current time in the second time label, recombining, by the access end, the protocol head, the request head, the data front segment and the data rear segment into a request data packet. According to the method, tamper-proofing of the network request can be realized.

Description

technical field [0001] The invention relates to the technical field of logistics network, in particular to a method for preventing tampering of network requests based on data splitting. Background technique [0002] With the vigorous development of the logistics industry, logistics network security has become an issue that must be considered. Network requests are the most common events and have become the most important step in network security defense. Effective protection of network requests will play a key role in network security. However, the existing technology is still unable to protect the integrity and validity of the network request well. Contents of the invention [0003] The purpose of the present invention is to provide a network request tamper-proof method based on data splitting, which can realize network request tamper-proof. [0004] In order to solve the above technical problems, a technical solution adopted by the present invention is to provide a netw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/06H04L9/08
CPCH04L63/123H04L63/0428H04L69/06H04L9/0643H04L9/0869
Inventor 施甘图陈旭庭治宏赵乾旭
Owner SICHUAN HONGTU LOGISTICS