Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network request validity verification method applied to logistics network

A network request and verification method technology, applied in the field of logistics network, can solve the problems of limited computing power, network request processing efficiency and verification efficiency, and achieve the effect of reducing verification pressure, reducing response time and ensuring accuracy

Active Publication Date: 2021-02-09
SICHUAN HONGTU LOGISTICS +1
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing verification method for the validity of network requests is to be verified by the requested party. The requested party is both the party that processes the network request and the party that verifies, but its own computing power is limited, resulting in the efficiency of network request processing and verification. are lower

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network request validity verification method applied to logistics network
  • Network request validity verification method applied to logistics network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0029] see figure 1 and figure 2 , the method for verifying the validity of a network request applied to a logistics network according to the embodiment of the present invention includes the following steps;

[0030] S1: The local network platform generates random characters as verification values.

[0031] In this embodiment, the random character is a combination of at least two of numbers, letters and symbols.

[0032] S2: The local network ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network request validity verification method applied to a logistics network, and the method comprises the steps that a home terminal network platform enables a verification value, a verification identification and a request header in an initial request data packet to form a verification packet, a verification server extracts the verification value and the verification identification from the verification packet, and generates a private key and a public key according to the verification value; the public key is associated with the verification identifier, the private key is sent to the home terminal network platform, the public key and the verification identifier are sent to an opposite terminal network platform, the private key and the verification field are addedinto a final request data packet by the home terminal network platform, and the final request data packet is analyzed by the opposite terminal network platform to obtain the private key and the verification field; and the public key associated with the verification identifier in the verification field is searched, the private key is decrypted in the final request data packet by the associated public key to obtain a verification value, and if the analyzed verification value is consistent with the verification value in the verification field, the final request data packet is responded. According to the invention, the network request processing efficiency and the verification efficiency can be improved.

Description

technical field [0001] The invention relates to the technical field of logistics networks, in particular to a method for verifying the validity of a network request applied to a logistics network. Background technique [0002] With the vigorous development of the logistics industry, logistics network security has become an issue that must be considered. Network request is the most common event, and it has also become an important step in security defense. Effective use of means to protect network requests will play a key role in network security. [0003] However, the existing method for verifying the validity of network requests is that the requested party performs verification. The requested party acts as both the party processing the network request and the party verifying, but its own computing power is limited, resulting in the efficiency of network request processing and verification. are lower. SUMMARY OF THE INVENTION [0004] The purpose of the present invention...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/30
CPCH04L63/083H04L63/0442H04L63/0428H04L63/0892H04L63/0876H04L9/0869H04L9/30
Inventor 施甘图陈旭庭治宏赵乾旭
Owner SICHUAN HONGTU LOGISTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products