Three-dimensional visual website building method
A website, three-dimensional technology, applied in the field of three-dimensional visualization website construction, can solve the problems such as data cannot be displayed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0024] The first step is to select a suitable domain name and server first, then file for the record, then submit the website entry to the search engine, and then upload the internal data of the website. When an external visitor visits, the browser will store the visitor's information Encrypt it into ciphertext with the public key and send it to the server;
[0025] Step 2: The server decrypts the encrypted data through the private key. The decrypted data removes duplicate data and abnormal data, and then analyzes the data. The parsed data is segmented and then processed. The security of each piece of data is judged, and the parsed data is verified to determine whether it contains viruses or Trojans. After the data verification fails, the data after the verification failure is directly transmitted back to the browser, and the transmitted data is displayed directly. Access to the website is wrong, and at the same time mark the user's address to prohibit malicious access to the ...
Embodiment 2
[0030] The first step is to select a suitable domain name and server first, then file for the record, then submit the website entry to the search engine, and then upload the internal data of the website. When an external visitor visits, the browser will store the visitor's information Encrypt it into ciphertext with the public key and send it to the server;
[0031] Step 2: The server decrypts the encrypted data through the private key. After the data verification fails, it directly transmits the data after the verification failure back to the browser. At this time, the transmitted data directly displays an error when accessing the website;
[0032] Step 3: After the data is judged, the response data is generated. The generated response data contains the security authentication information of the server, and then the response data is encrypted with the private key. The encrypted data is transmitted to the browser for analysis, and then transmitted to the The encrypted data in ...
Embodiment 3
[0036] The first step is to select a suitable domain name and server first, then file for the record, then submit the website entry to the search engine, and then upload the internal data of the website. When an external visitor visits, the browser will store the visitor's information Encrypt it into ciphertext with the public key and send it to the server;
[0037]Step 2: The server decrypts the encrypted data through the private key. The decrypted data removes duplicate data and abnormal data, and then analyzes the data. The parsed data is segmented and then processed. The security of each piece of data is judged, and the parsed data is verified to determine whether it contains viruses or Trojans. After the data verification fails, the data after the verification failure is directly transmitted back to the browser, and the transmitted data is displayed directly. Access to the website is wrong, and at the same time mark the user's address to prohibit malicious access to the w...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More