Unlock instant, AI-driven research and patent intelligence for your innovation.

Access request encryption method and device, electronic equipment and storage medium

A technology of access request and encryption method, applied in the network field, can solve problems such as data leakage and server attack, and achieve the effect of strong versatility, simple solution and high operability

Pending Publication Date: 2022-04-22
BEIJING DAJIA INTERNET INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The disclosure provides an access request encryption method, device, electronic equipment, and storage medium, which can improve the security of website data and solve the problems of data leakage and server attacks caused by web crawlers arbitrarily crawling page interfaces

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access request encryption method and device, electronic equipment and storage medium
  • Access request encryption method and device, electronic equipment and storage medium
  • Access request encryption method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to enable ordinary persons in the art to better understand the technical solutions of the present disclosure, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings.

[0054] It should be noted that the terms "first" and "second" in the specification and claims of the present disclosure and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein can be practiced in sequences other than those illustrated or described herein. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an access request encryption method and device, electronic equipment and a storage medium, which can improve the security of website data and solve the problems of data leakage, server attack and the like caused by random crawling of a page interface by a web crawler. According to the specific scheme, the method comprises the steps of obtaining an access parameter corresponding to a target access request, and performing first encryption processing on the access parameter to obtain first encrypted content; obtaining a target timestamp corresponding to the current moment, and performing second encryption processing on the target timestamp to obtain second encrypted content; the current moment is a moment corresponding to the sending of the target access request; fusing the first encrypted content and the second encrypted content to obtain target content, and sending a target access request; the target access request carries an access parameter, target content and a target timestamp; the access parameter, the target content and the target timestamp are used for determining whether the target access request is safe.

Description

technical field [0001] The present disclosure relates to the field of network technology, and in particular to an access request encryption method, device, electronic equipment and storage medium. Background technique [0002] In the current network application, the user can trigger the electronic device to directly open the target website link to display the network page and access the corresponding database to obtain information. In this implementation mode, when the browser sends a request to the web server, the web According to the HTTP Referer in the header of the browser request header, the server can determine from which URL link the accessed URL link is redirected, so that the HTTP source address can be used to check where the visitor comes from, which can be used to deal with fake trans website request. [0003] However, in the above solution, the content of the HTTP Referer request header is easy to be forged, resulting in the failure of identification and anti-pi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40
CPCH04L63/0428
Inventor 李亚楠
Owner BEIJING DAJIA INTERNET INFORMATION TECH CO LTD