Unlock instant, AI-driven research and patent intelligence for your innovation.

Three-dimensional visual website building method

A website, three-dimensional technology, applied in the field of three-dimensional visualization website construction, can solve the problems such as data cannot be displayed

Pending Publication Date: 2022-04-29
武汉盛世奈特科技有限公司
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the disadvantage that the data inside the website cannot be displayed in three-dimensional form in the prior art, and propose a method for building a three-dimensional visual website

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] The first step is to select a suitable domain name and server first, then file for the record, then submit the website entry to the search engine, and then upload the internal data of the website. When an external visitor visits, the browser will store the visitor's information Encrypt it into ciphertext with the public key and send it to the server;

[0025] Step 2: The server decrypts the encrypted data through the private key. The decrypted data removes duplicate data and abnormal data, and then analyzes the data. The parsed data is segmented and then processed. The security of each piece of data is judged, and the parsed data is verified to determine whether it contains viruses or Trojans. After the data verification fails, the data after the verification failure is directly transmitted back to the browser, and the transmitted data is displayed directly. Access to the website is wrong, and at the same time mark the user's address to prohibit malicious access to the ...

Embodiment 2

[0030] The first step is to select a suitable domain name and server first, then file for the record, then submit the website entry to the search engine, and then upload the internal data of the website. When an external visitor visits, the browser will store the visitor's information Encrypt it into ciphertext with the public key and send it to the server;

[0031] Step 2: The server decrypts the encrypted data through the private key. After the data verification fails, it directly transmits the data after the verification failure back to the browser. At this time, the transmitted data directly displays an error when accessing the website;

[0032] Step 3: After the data is judged, the response data is generated. The generated response data contains the security authentication information of the server, and then the response data is encrypted with the private key. The encrypted data is transmitted to the browser for analysis, and then transmitted to the The encrypted data in ...

Embodiment 3

[0036] The first step is to select a suitable domain name and server first, then file for the record, then submit the website entry to the search engine, and then upload the internal data of the website. When an external visitor visits, the browser will store the visitor's information Encrypt it into ciphertext with the public key and send it to the server;

[0037]Step 2: The server decrypts the encrypted data through the private key. The decrypted data removes duplicate data and abnormal data, and then analyzes the data. The parsed data is segmented and then processed. The security of each piece of data is judged, and the parsed data is verified to determine whether it contains viruses or Trojans. After the data verification fails, the data after the verification failure is directly transmitted back to the browser, and the transmitted data is displayed directly. Access to the website is wrong, and at the same time mark the user's address to prohibit malicious access to the w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a three-dimensional visual website building method, which relates to the field of machining, and adopts the technical scheme that the method comprises the following steps of: 1, website building: selecting a proper domain name and a proper server, recording, submitting a website entrance to a search engine, and uploading data in a website; 2, browser access: requesting to access a website through a browser, encrypting information of a visitor into a ciphertext by using a public key, and then sending the ciphertext; and step 3: data analysis: the browser transmits the encrypted ciphertext to a server, the server decrypts the encrypted data through a private key, and abnormal data is processed in data analysis, so that correct judgment on the security of an access address can be ensured. The method comprises the following steps of: verifying data in a server, detecting the data in a verification process, marking an access address when detecting that Trojan horse or virus is contained in the data, and simultaneously preventing the access address from continuously and maliciously accessing the website, so that the website and the server are protected.

Description

technical field [0001] The invention relates to the technical field of website building, in particular to a method for building a three-dimensional visualized website. Background technique [0002] Website construction refers to the use of logo language to transmit information in electronic format through the Internet through a series of design, modeling, and execution processes, and finally to be browsed by users in the form of a graphical user interface; [0003] After searching, the invention patent with the Chinese patent number CN110247762A discloses a trusted website building method based on the SM9 algorithm. The domain name of the website is used as the identity of the SM9 algorithm to generate a key pair, and the data sent by the browser to the server is publicized. The key is encrypted into ciphertext and then sent, and the received data is decrypted into plaintext with the public key and then parsed; the data sent by the server to the browser is encrypted into cip...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F16/957G06F16/958
CPCG06F21/56G06F16/986G06F16/957
Inventor 余谦吴伟郑景标陈政统陈国桦陈伟湘
Owner 武汉盛世奈特科技有限公司