Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Service request processing method, Web server, equipment and medium

A business request and server technology, applied in the computer field, can solve problems such as being vulnerable to attacks, and achieve the effects of protecting safe operation, reducing the risk of attacks, and ensuring safe and reliable performance

Pending Publication Date: 2022-03-11
CHONGQING CHUANYI AUTOMATION
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, since the IP address and port of the web application server are directly exposed on the Internet and are vulnerable to attacks, a more secure and reliable protection measure for the web application server is urgently needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service request processing method, Web server, equipment and medium
  • Service request processing method, Web server, equipment and medium
  • Service request processing method, Web server, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] see figure 1 , in the related technology, the user visits the Web server again through the firewall through the Internet, and the protection of the server is usually through a hardware firewall ( figure 1 firewall in the ) and the web application server ( figure 1 The built-in functions such as webpage anti-tampering and Trojan horse detection are realized. This is because the IP address and Port port of the web application server are directly exposed on the Internet and are vulnerable to attacks; the conventional ID+Password method is used to verify user identity, which is easy to forge. Therefore, there are still certain risks in the above method.

[0053] To solve the above problems, such as figure 2 As shown, the present embodiment provides a Web server 200, the Web server 200 includes a security software firewall 201 and a network application server 202, the security software firewall 201 includes a reverse proxy module 2011, and the reverse proxy module 2011 i...

Embodiment 2

[0106] see Figure 6 , this embodiment provides a service request processing method, the method comprising:

[0107] Step S101: setting a security software firewall in the server.

[0108] Among them, it can be realized by dividing the existing web server into two logically independent virtual machines, one of which is used as a security software firewall to provide software-level security protection for the back-end network application server, which is similar to the hardware firewall. connection; another virtual machine acts as a web application server, provides original web application services, and connects with the previous virtual machine.

[0109] Wherein, the security software firewall exposes the proxy address and proxy port to the Internet, and the proxy address and proxy port are different from the network address and network port of the back-end web application server. In this way, the user (service request sender) can access the proxy address and proxy port The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a service request processing method, a Web server, a device and a medium, the server comprises a security software firewall and a network application server, the security software firewall comprises a reverse proxy module, and the reverse proxy module is used for exposing a proxy address and a proxy port of the reverse proxy module to the Internet. The security software firewall obtains a service request and sends the service request to a network application server according to a preset routing information table, and the security software firewall further comprises a dynamic identity recognition module which generates a message secret key during first identity authentication, performs identity authentication of a demand side by using the secret key in subsequent message interaction with the service demand side, and sends the service request to the network application server. According to the method, no entity server is added, the security software firewall is implanted into the existing server to form a three-level network system architecture of the application server, the firewall and the service demand side, so that the security operation of the website server is further protected, the attack risk of the website server is reduced, the identity authentication capability of a communication object is improved, and the security and reliability of the application server are jointly guaranteed.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a service request processing method, Web server, equipment and media. Background technique [0002] The security protection of the Web application server is an important security issue. In related technologies, the Web application server is often placed behind a hardware firewall, and users access the Web application server through the Internet through the hardware firewall. The web application server (website) itself can further enhance its own security protection capabilities through built-in protection measures such as webpage anti-tampering, anti-virus attack and DDoS attack, anti-SQL injection and cookie modification. [0003] However, since the IP address and port of the web application server are directly exposed on the Internet and are vulnerable to attacks, a more secure and reliable protection measure for the web application server is urgently needed. Conten...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/02
CPCH04L63/0281H04L67/02
Inventor 姚杰肖宇亮张桂花
Owner CHONGQING CHUANYI AUTOMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products