Supercharge Your Innovation With Domain-Expert AI Agents!

Access request capturing method, device, computer equipment and storage medium

A technology for access requests and computer programs, applied in transmission systems, electrical components, etc., can solve problems such as late detection, inability to effectively prevent virus programs from invading hosts, and difficulty in accurately identifying normal access behaviors to improve security. Effect

Active Publication Date: 2021-12-21
SUZHOU METABRAIN INTELLIGENT TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Cyber ​​attacks such as tampering with webpages and spreading viruses have occurred in various places, causing heavy losses to users and Internet companies
[0003] At present, web protection software is mostly a combination of data security software and firewall products, and it is difficult to accurately identify whether a certain access behavior is a normal access by a real user
This type of software usually judges access behavior based on the process and service level. Its detection time is late and cannot effectively prevent virus programs from invading the host, leaving a window period for other malicious operations to exploit.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access request capturing method, device, computer equipment and storage medium
  • Access request capturing method, device, computer equipment and storage medium
  • Access request capturing method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0050] The access request capture method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the server 101 may communicate with the terminal 102 through a network. The server 101 may receive the first access request from the terminal 102, and return session response information. Wherein, the server 101 can be realized by an independent server or a server cluster composed of multiple servers, and the terminal 102 can be but not limited to various personal computers, notebook computers, smart phones, tablet comput...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to an access request capturing method, device, computer equipment and storage medium. The aforementioned method includes: when receiving the first access request of the current user, returning session response information, the session response information includes session control identifiers and auxiliary authentication data stored in different locations; receiving the current non-first access request of the current user; When the non-first access request carries a session control identifier and does not carry auxiliary authentication data, capture the current non-first access request. In the aforementioned method, when receiving the first access request, a session control identifier and auxiliary authentication data corresponding to the current user are created, and the session control identifier and auxiliary authentication data are set in different positions in the session response message. When the first access request is made, combined with the session control identifier and auxiliary authentication data, the content of the current non-first access request is comprehensively authenticated, which improves the security of network communication.

Description

technical field [0001] The present application relates to the technical field of computer information security, in particular to an access request capturing method, device, computer equipment and storage medium. Background technique [0002] After the web (Global Wide Area Network) became the mainstream network and application technology, the security of the web server has always been the focus of the industry. Cyber ​​attacks such as tampering with webpages and spreading viruses have occurred in various places, causing heavy losses to users and Internet companies. [0003] At present, web protection software is mostly a combination of data security software and firewall products, and it is difficult to accurately identify whether a certain access behavior is a normal access by a real user. This type of software usually judges access behavior based on the process and service level, and its detection time is late, which cannot effectively prevent virus programs from invading...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1491H04L63/1416H04L67/14
Inventor 魏志伟
Owner SUZHOU METABRAIN INTELLIGENT TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More