Verification method and device

A verification method and a technology for verifying character strings, which are applied in the field of verification methods and devices, and can solve problems affecting the normal operation of servers and high server loads

Pending Publication Date: 2022-06-21
CHINANETCENT TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method can obtain the client ID to facilitate data transmission, the attacker can generate a large number of illegal client IDs by disguising the client Mac address to launch an attack on the server, because the server cannot Identification to judge whether the request is legal, so that it is impossible to perceive the leakage of user information in the first place, and at the same time, receive and process a large number of attack requests, which is very likely to cause excessive server load and affect the normal operation of the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and device
  • Verification method and device
  • Verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings. Obviously, the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0051] figure 1 This is a system architecture of a verification system provided by an embodiment of the present invention, wherein the client 102 can be installed in physical devices such as a desktop computer, a notebook computer, a tablet, a mobile phone, a portable smart watch, etc., which is not specifically limited here. The server 101 may correspond to one server, or may correspond to a server cluster composed of multiple ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a verification method and device, and the method is applied to a client, and the method comprises the steps: obtaining a first client ID from the local before a service request is sent, and carrying out the verification of the first client ID; if the verification fails, generating a second client ID based on a preset mode negotiated with the server; and carrying the second client ID in the service request, and sending the second client ID to the server, so that the server verifies the legality of the service request based on the preset generation mode and the second client ID carried in the service request. The method is used for identifying the identity of the client so as to improve the security and stability of the service.

Description

technical field [0001] The present application relates to the field of network technologies, and in particular, to a verification method and device. Background technique [0002] With the rapid development of the network, network applications have become a trend, such as online securities, online banking, e-government, e-commerce, online office, etc. More and more important information is transmitted in the network, and the security of data flow is a network application. very important issue. The authentication of the data transmission end is also one of the important factors affecting the security of data flow. [0003] In the existing data flow process, the client usually carries the client ID to determine the data sender when sending data. The client generates the client ID based on the client's Mac address through the corresponding algorithm for generating the ID. Although this method can obtain the client ID, which is convenient for data transmission, the attacker ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/08H04L63/101
Inventor 陈潜森
Owner CHINANETCENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products