Request signature method and device thereof, electronic equipment and storage medium
A request header and access request technology, applied in the computer field, can solve the problems of time-consuming and laborious signing process, unfavorable maintenance, repeated development, etc., and achieve the effect of facilitating subsequent maintenance and repeated development, saving time and human resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] figure 1 It is a flow chart of a method for requesting a signature provided by an embodiment of the present invention. The method can be executed by the device for requesting a signature provided in the embodiment of the present invention, the device can be realized by software and / or hardware, and the device can be integrated on various user terminals or servers.
[0031] Such as figure 1 As shown, the method of the embodiment of the present invention specifically includes the following steps:
[0032] S101. Acquire a target request sent by a user terminal for requesting a browser.
[0033] Optionally, when the target request sent by the user terminal for requesting the browser is detected, the target request is acquired. Specifically, the request sent by the specified user terminal may be determined as the target request, or all received requests may be determined as the target request.
[0034] Further, based on the request content of the request, it may be deter...
Embodiment 2
[0046] figure 2It is a flow chart of another method for requesting a signature provided by an embodiment of the present invention. This embodiment is optimized on the basis of the above-mentioned technical solutions. Optionally, obtaining the target request sent by the user terminal for requesting the browser includes: monitoring the access request of the browser's access attribute definition interface, and determining whether the request method for initiating the access request is a preset request method; if it is a preset request mode, intercept the access request and determine the access request as the target request. Optionally, based on the target signature behavior, inject the request header into the target request to sign the target request, including: determining the signature time of the target request; based on the target request's request information, target signature behavior, signature time, preset encryption algorithm and user The attribute information of the ...
Embodiment 3
[0066] The embodiments corresponding to the request signature method are described in detail above. In order to make the technical solution of the method more clear to those skilled in the art, specific application scenarios are given below.
[0067] image 3 A flow chart of a method for requesting a signature in an application scenario provided by an embodiment of the present invention; image 3 As shown, when the user terminal sends a user request, the user request needs to complete the request setting through the Object.defineProperty interface, and the Object.defineProperty interface can hijack the request data of the browser page. In a specific implementation, the Object.defineProperty interface can be monitored to obtain requests for accessing the Object.defineProperty interface. When it is detected that the access attribute definition interface of the browser receives a user request, the request mode of the user request is determined.
[0068] Further, when the reques...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


