Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A network request validity verification method applied to logistics network

A network request and verification method technology, applied in the field of logistics network, can solve the problems of low network request processing efficiency and verification efficiency, limited computing power, etc., and achieve the effect of reducing verification pressure, reducing response time, and ensuring accuracy

Active Publication Date: 2022-07-29
SICHUAN HONGTU LOGISTICS +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing verification method for the validity of network requests is to be verified by the requested party. The requested party is both the party that processes the network request and the party that verifies, but its own computing power is limited, resulting in the efficiency of network request processing and verification. are lower

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network request validity verification method applied to logistics network
  • A network request validity verification method applied to logistics network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0029] see figure 1 and figure 2 , the method for verifying the validity of a network request applied to a logistics network according to the embodiment of the present invention includes the following steps;

[0030] S1: The local network platform generates random characters as verification values.

[0031] In this embodiment, the random character is a combination of at least two of numbers, letters and symbols.

[0032] S2: The local network ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network request validity verification method applied to a logistics network. In the method, the local network platform composes a verification value, a verification identifier and a request header in an initial request data packet into a verification packet, and the verification server starts from the verification Extract the verification value and verification ID from the package, generate the private key and public key according to the verification value, associate the public key with the verification ID, send the private key to the local network platform, and send the public key and verification ID to the peer network platform , the local network platform adds the private key and verification field to the final request data packet, and the peer network platform parses the final request data packet to obtain the private key and verification field, finds the public key associated with the verification identifier in the verification field, and then uses the relevant The associated public key decrypts the private key in the final request packet to obtain the verification value, and if the parsed verification value is consistent with the verification value in the verification field, the final request packet is responded to. The application of the present invention can improve the network request processing efficiency and verification efficiency.

Description

technical field [0001] The invention relates to the technical field of logistics networks, in particular to a method for verifying the validity of a network request applied to a logistics network. Background technique [0002] With the vigorous development of the logistics industry, logistics network security has become an issue that must be considered. Network request is the most common event, and it has also become an important step in security defense. Effective use of means to protect network requests will play a key role in network security. [0003] However, the existing method for verifying the validity of a network request is that the requested party performs the verification. The requested party acts as both the party processing the network request and the verification party, but its own computing power is limited, resulting in the efficiency of network request processing and verification. are lower. SUMMARY OF THE INVENTION [0004] The purpose of the present i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/08H04L9/30
CPCH04L63/083H04L63/0442H04L63/0428H04L63/0892H04L63/0876H04L9/0869H04L9/30
Inventor 施甘图陈旭庭治宏赵乾旭
Owner SICHUAN HONGTU LOGISTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products