Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for preventing web system data migration based on asymmetric encryption algorithm

An asymmetric encryption and system data technology, which is applied in the field of anti-web system data migration based on asymmetric encryption algorithm, which can solve the problems of vulnerable Web sites, easy tampering of request parameters, and non-uniqueness of important parameters. Effects of Replay Attacks, Confidentiality Guarantees

Pending Publication Date: 2021-11-09
神州网云(北京)信息技术有限公司
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the maturity of network technology, hackers have gradually shifted their attention from attacks on web servers to attacks on web applications; 75% of information security attacks occur on web applications rather than on the network level; the existing Web sites have the following disadvantages: web system interface data in plain text, interface functions are easy to guess, request parameters are easy to be tampered with, important parameters are not unique, can be copied, server interface recognition and repeated consumption, and client requests can be simulated, thereby Web sites are vulnerable to attacks; therefore, we propose a method based on asymmetric encryption algorithms to prevent data migration in web systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing web system data migration based on asymmetric encryption algorithm
  • Method for preventing web system data migration based on asymmetric encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] The present invention provides such Figure 1-2 The anti-web system data migration method based on asymmetric encryption algorithm comprises the following steps:

[0030] S1. The user logs in to the system through the browser 1, reads the unique data of the client, the computer machine code and the characteristic information of the computer through the client fingerprint generator to generate a client fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a web system data transplantation prevention method based on an asymmetric encryption algorithm. The method comprises the following steps: S1, a user logs in a system through a browser 1, reads a unique data calculator machine code and calculator feature information of a client through a client fingerprint generator to generate a client fingerprint, and stores and binds the client fingerprint with the user and the browser; S2, the client fingerprint is combined with the current time and the public key to encrypt and generate a string of character strings, and the character strings are client signatures; S3, a server interface is visited, and when a normal interface accesses a server, a client signature and a server private key are carried for encrypting to obtain a fingerprint and time; S4, the parameter is copied to access the server interface through the browser 2, and if the verification of the client fingerprint verifier is not passed, the service response fails. The method has the characteristics of preventing pretending, authenticating identity and preventing parameter tampering, and a timestamp comparison and fingerprint comparison technology exists, so that replay attacks can be prevented when the data of the previous timestamp is invalid.

Description

technical field [0001] The invention belongs to the field of network technology, and more specifically relates to a method for preventing web system data migration based on an asymmetric encryption algorithm. Background technique [0002] Web applications are composed of dynamic scripts, compiled codes, etc. It is usually set up on the web server, and the user sends a request on the web browser. These requests use the HTTP protocol to interact with the web application of the enterprise through the Internet, and the web application communicates with the database and other dynamic content in the background of the enterprise. Portable secondary use is a common phenomenon in web systems now; [0003] Due to the maturity of network technology, hackers have gradually shifted their attention from attacks on web servers to attacks on web applications; 75% of information security attacks occur on web applications rather than on the network level; the existing Web sites have the fol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0442H04L63/0861H04L9/3297
Inventor 宋超
Owner 神州网云(北京)信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products