CN107707532A - URL generations, query argument verification method, device, equipment and storage medium - Google Patents

URL generations, query argument verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN107707532A
CN107707532A CN201710834278.2A CN201710834278A CN107707532A CN 107707532 A CN107707532 A CN 107707532A CN 201710834278 A CN201710834278 A CN 201710834278A CN 107707532 A CN107707532 A CN 107707532A
Authority
CN
China
Prior art keywords
parameter
temporal information
original
character
query parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710834278.2A
Other languages
Chinese (zh)
Other versions
CN107707532B (en
Inventor
朱瑞贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201710834278.2A priority Critical patent/CN107707532B/en
Publication of CN107707532A publication Critical patent/CN107707532A/en
Application granted granted Critical
Publication of CN107707532B publication Critical patent/CN107707532B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The disclosure, which provides a kind of URL generations, query argument verification method, device, equipment and storage medium, the URL generation methods, to be included:Obtain temporal information and the original query parameter for inquiring about the resource;The original query parameter is encrypted based on the temporal information, obtains encrypted query parameter;URL corresponding to the resource is generated based on the encrypted query parameter.Query argument is encrypted using temporal information for the present embodiment, the difficulty that encrypted query parameter is cracked can be increased, increase disabled user speculates the difficulty of other query arguments using existing encrypted query parameter, so as to avoid disabled user from accessing resource by forging URL, and then improve the security of resource.

Description

URL generations, query argument verification method, device, equipment and storage medium
Technical field
The application is related to communication technical field, more particularly to URL generations, query argument verification method, device, equipment and deposits Storage media.
Background technology
With the fast development of Internet technology, URL (or uniform resource locator/positioning address, URL addresses etc., English:Uniform Resource Locator, are often abbreviated as URL) turn into access, positioning and call network clothes The main stream approach for resource of being engaged in.URL can be the address of standard resource on internet, on internet every kind of resource have one it is unique URL.
URL can include transportation protocol, server (being usually domain name, be sometimes IP address), port numbers, path and inquiry The parts such as parameter.In traditional URL communication modes, query argument is typically write in URL in clear text manner, disabled user Other query arguments are easily deduced according to clear text queries parameter, then forge URL using the query argument deduced, and utilize The URL of forgery sends the request for accessing resource to service end, and service end can not judge the true and false of this request, this mode Do not possess security, easily cause resource leakage.
The content of the invention
To overcome problem present in correlation technique, present disclose provides URL generations, query argument verification method, device, Equipment and storage medium.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of URL generation methods, methods described include:
Obtain temporal information and the original query parameter for inquiring about the resource;
The original query parameter is encrypted based on the temporal information, obtains encrypted query parameter;
URL corresponding to the resource is generated based on the encrypted query parameter.
In an optional implementation, the temporal information includes creation time, the original query of the URL One or more in the creation time of parameter, the creation time of the resource.
In an optional implementation, the encrypted query parameter is based in original query parameter and derivative parameter At least one parameter and temporal information, shift time information, mapping time information, reversing time information, mixed processing time One or more parameter combinations obtain in information;
Wherein, the shift time information is based on the temporal information carrying out circulative shift operation acquisition;The mapping Temporal information is based on the temporal information carrying out map operation acquisition;The reversing time information is based on the temporal information Carry out reverse turn operation acquisition;The mixed processing temporal information is based on the temporal information carrying out loopy moving operation, mapping At least two operations in operation and reverse turn operation obtain;The derivative parameter is based on being circulated the original query parameter Shifting function obtains, or based on the original query parameter is carried out into map operation acquisition, or based on the original query is joined Number carries out reverse turn operation acquisition, or is grasped based on the original query parameter is carried out into loopy moving operation, map operation and reversion At least two operations in work obtain;
The loopy moving operation includes each original character in character string specifying digit along assigned direction loopy moving; The map operation includes each original character in character string being mapped as corresponding mapping character, institute according to default mapping relations Stating mapping relations includes the corresponding relation of original character and mapping character;The reverse turn operation includes integrally carrying out character string instead Turn and inverted each original character in character string.
It is described that the original query parameter is added based on the temporal information in an optional implementation It is close, encrypted query parameter is obtained, including:
Each original character in the temporal information is specified into digit along the assigned direction loopy moving;According to described pre- If mapping relations, each original character in the original query parameter is mapped as corresponding mapping character;It will shift what is obtained The derivative parameter that shift time information obtains with mapping is combined, and obtains encrypted query parameter;Or,
According to the default mapping relations, each original character in the temporal information is mapped as corresponding mapping word Symbol, obtain mapping time information;According to the default mapping relations, each original character in the original query parameter is mapped For corresponding mapping character, derivative parameter is obtained;The mapping time information obtained will be mapped and the derivative parameter of mapping acquisition is entered Row combination, obtains encrypted query parameter;Or,
The temporal information is integrally inverted, and each character is inverted in the information that will invert acquisition, is obtained Reversing time information;According to the default mapping relations, each original character in the reversing time information is mapped as correspondingly Mapping character, obtain mixed processing temporal information;, will be each in the original query parameter according to the default mapping relations Original character is mapped as corresponding mapping character, obtains derivative parameter;The mixed processing temporal information is obtained with mapping Derivative parameter is combined, and obtains encrypted query parameter.
It is described that the original query parameter is added based on the temporal information in an optional implementation It is close, encrypted query parameter is obtained, including:
The temporal information is integrally inverted, and each character is inverted in the temporal information that will invert acquisition, Obtain reversing time information;
According to the default mapping relations, each original character in the reversing time information is mapped as corresponding mapping Character, obtain mixed processing temporal information;
According to the default mapping relations, each original character in the original query parameter is mapped as corresponding mapping Character, obtain derivative parameter;
The derivative parameter that designated character string, the mixed processing temporal information obtain with mapping is combined, added Close query argument.
According to the second aspect of the embodiment of the present disclosure, there is provided query argument verification method in a kind of URL, methods described bag Include:
Receive when corresponding to the request of resource for accessing URL, extract the encrypted query parameter in URL, the encryption is looked into Ask original query gain of parameter of the parameter based on temporal information and for query resource;
Original query parameter and temporal information are extracted from the encrypted query parameter;
From default query argument and the corresponding relation of temporal information, search corresponding with the original query parameter extracted Target time information;
By the temporal information extracted compared with the target time information, encrypted query is verified according to comparative result Whether parameter is effective.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of URL generating means, described device include:
Data obtaining module, it is configured as obtaining temporal information and the original query parameter for inquiring about the resource;
Information encrypting module, it is configured as that the original query parameter is encrypted based on the temporal information, obtains Encrypted query parameter;
Information generating module, it is configured as generating URL corresponding to the resource based on the encrypted query parameter.
In an optional implementation, the temporal information includes creation time, the original query of the URL One or more in the creation time of parameter, the creation time of the resource.
In an optional implementation, the encrypted query parameter is based in original query parameter and derivative parameter At least one parameter and temporal information, shift time information, mapping time information, reversing time information, mixed processing time One or more parameter combinations obtain in information;
Wherein, the shift time information is based on the temporal information carrying out circulative shift operation acquisition;The mapping Temporal information is based on the temporal information carrying out map operation acquisition;The reversing time information is based on the temporal information Carry out reverse turn operation acquisition;The mixed processing temporal information is based on the temporal information carrying out loopy moving operation, mapping At least two operations in operation and reverse turn operation obtain;The derivative parameter is based on being circulated the original query parameter Shifting function obtains, or based on the original query parameter is carried out into map operation acquisition, or based on the original query is joined Number carries out reverse turn operation acquisition, or is grasped based on the original query parameter is carried out into loopy moving operation, map operation and reversion At least two operations in work obtain;
The loopy moving operation includes each original character in character string specifying digit along assigned direction loopy moving; The map operation includes each original character in character string being mapped as corresponding mapping character, institute according to default mapping relations Stating mapping relations includes the corresponding relation of original character and mapping character;The reverse turn operation includes integrally carrying out character string instead Turn and inverted each original character in character string.
In an optional implementation, described information encrypting module is included with next sub- module:
First encryption submodule, is configured as circulating each original character in the temporal information along the assigned direction Mobile specified digit;According to the default mapping relations, each original character in the original query parameter is mapped as correspondingly Mapping character;The shift time information obtained will be shifted and the derivative parameter of mapping acquisition is combined, obtain encrypted query Parameter;
Second encryption submodule, is configured as according to the default mapping relations, will be each original in the temporal information Character is mapped as corresponding mapping character, obtains mapping time information;According to the default mapping relations, by the original query Each original character is mapped as corresponding mapping character in parameter, obtains derivative parameter;The mapping time information obtained will be mapped The derivative parameter obtained with mapping is combined, and obtains encrypted query parameter;
3rd encryption submodule, is configured as integrally being inverted the temporal information, and will invert the information obtained In each character inverted, obtain reversing time information;According to the default mapping relations, by the reversing time information Each original character is mapped as corresponding mapping character, obtains mixed processing temporal information;, will according to the default mapping relations Each original character is mapped as corresponding mapping character in the original query parameter, obtains derivative parameter;At the mixing The derivative parameter that reason temporal information obtains with mapping is combined, and obtains encrypted query parameter.
In an optional implementation, described information encrypting module includes:
Submodule is inverted, is configured as integrally being inverted the temporal information, and the temporal information obtained will be inverted In each character inverted, obtain reversing time information;
First mapping submodule, it is configured as according to the default mapping relations, will be each in the reversing time information Original character is mapped as corresponding mapping character, obtains mixed processing temporal information;
Second mapping submodule, it is configured as according to the default mapping relations, will be each in the original query parameter Original character is mapped as corresponding mapping character, obtains derivative parameter;
Submodule is combined, is configured as the derivative for obtaining designated character string, the mixed processing temporal information with mapping Parameter is combined, and obtains encrypted query parameter.
According to the fourth aspect of the embodiment of the present disclosure, there is provided query argument verifies device, described device bag in a kind of URL Include:
First extraction module, be configured as receiving when corresponding to the request of resource for accessing URL, extract it is in URL plus Close query argument, original query gain of parameter of the encrypted query parameter based on temporal information and for query resource;
Second extraction module, it is configured as extracting original query parameter and temporal information from the encrypted query parameter;
Information inquiry module, it is configured as from default query argument and the corresponding relation of temporal information, lookup and institute Target time information corresponding to the original query parameter of extraction;
Information authentication module, the temporal information for being configured as being extracted is compared with the target time information, root It is whether effective according to comparative result checking encrypted query parameter.
According to the 5th of the embodiment of the present disclosure the aspect, there is provided a kind of server device, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Obtain temporal information and the original query parameter for inquiring about the resource;
The original query parameter is encrypted based on the temporal information, obtains encrypted query parameter;
URL corresponding to the resource is generated based on the encrypted query parameter.
According to the 6th of the embodiment of the present disclosure the aspect, there is provided a kind of server device, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Receive when corresponding to the request of resource for accessing URL, extract the encrypted query parameter in URL, the encryption is looked into Ask original query gain of parameter of the parameter based on temporal information and for query resource;
Original query parameter and temporal information are extracted from the encrypted query parameter;
From default query argument and the corresponding relation of temporal information, search corresponding with the original query parameter extracted Target time information;
By the temporal information extracted compared with the target time information, encrypted query is verified according to comparative result Whether parameter is effective.
According to the 7th of the embodiment of the present disclosure the aspect, there is provided a kind of computer-readable recording medium, be stored thereon with calculating Machine program, the program realizes URL generation methods described in any of the above-described when being executed by processor the step of.
According to the eighth aspect of the embodiment of the present disclosure, there is provided a kind of computer-readable recording medium, be stored thereon with calculating Machine program, the program realizes query argument verification method in URL described in any of the above-described when being executed by processor the step of.
The technical scheme provided by this disclosed embodiment can include the following benefits:
The embodiment of the present disclosure provides a kind of URL generations scheme, and query argument is carried out using temporal information in this scenario Encryption, the complexity of encrypted query parameter, the difficulty that increase encrypted query parameter is cracked can be increased, and then increase illegal use Family speculates the difficulty of other query arguments using existing encrypted query parameter, so as to avoid disabled user from passing through forgery URL accesses resource, and then improves the security of resource.
The embodiment of the present disclosure provides query argument proof scheme in a kind of URL, by will be extracted from encrypted query parameter Temporal information compared with target time information corresponding to original query parameter reality, judge that encryption is looked into according to comparative result Whether effective ask parameter, and then can determine whether URL is effective, avoid forgery URL from causing resource unsafe condition.
It should be appreciated that the general description and following detailed description of the above are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the disclosure Example, and be used to together with specification to explain the principle of the disclosure.
Fig. 1 is a kind of application scenario diagram of the disclosure according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of URL generation method of the disclosure according to an exemplary embodiment.
Fig. 3 A are the flows of query argument verification method in a kind of URL of the disclosure according to an exemplary embodiment Figure.
Fig. 3 B are a kind of interactive schematic diagram of the disclosure according to an exemplary embodiment.
Fig. 4 is a kind of block diagram of URL generating means of the disclosure according to an exemplary embodiment.
Fig. 5 to Fig. 8 is the block diagram of another URL generating means of the disclosure according to an exemplary embodiment.
Fig. 9 is a kind of block diagram of device for URL generation of the disclosure according to an exemplary embodiment.
Figure 10 is the block diagram of query argument checking device in a kind of URL of the disclosure according to an exemplary embodiment.
Figure 11 and Figure 12 is that query argument verifies device in another URL of the disclosure according to an exemplary embodiment Block diagram.
Figure 13 is a kind of device that is used in URL query argument checking of the disclosure according to an exemplary embodiment Block diagram.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
It is only merely for the purpose of description specific embodiment in the term that the disclosure uses, and is not intended to be limiting the disclosure. " one kind " of singulative used in disclosure and the accompanying claims book, " described " and "the" are also intended to including majority Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein refers to and wrapped Containing the associated list items purpose of one or more, any or all may be combined.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the disclosure A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, do not departing from In the case of disclosure scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining ".
URL is commonly called as web page address, is the address of the resource of standard on internet.For example, URL form can be:Association Discuss type:[// [accesses the credential information@that resource needs] server address [:Port numbers]] [/ resource level unix file road Footpath] filename [Inquiry] [# fragments ID].Wherein it is possible to including part be:
Transportation protocol (such as http)
Level URL label symbols (for [//], immobilize)
Access the credential information (can omit) that resource needs
Server (being usually domain name, be sometimes IP address)
Port numbers (represent in a digital manner, if HTTP default value ":80 " can omit)
(each directory name in path is distinguished with "/" character) in path
Inquiry (the forms parameter of GET patterns, be properly termed as argument section, search part, inquiry unit grade, with "" character For starting point, each parameter can be separated with " & ", then separate parameter name and data with "=", can be encoded with UTF8 URL, The problem of avoiding character conflict)
Fragment (often using " # " character as starting point, part to the last can be anchor section)
It is understood that wherein access credentials information, port numbers, fragment etc. belong to optional part, it is not composition URL Necessary component.Query portion includes the original query parameter for query resource, due to separating parameter name with "=" With data, then original query parameter can be including the data on the right of "=", for example, original query parameter can include ID value.
For example, https://item.mi.com/product.doIn id=10000030, id value 10000030 is The original query parameter of plaintext.
And for example, ftp://prep.ai.mit.edu/pub/gnu;Type=dIn item=123, item value 123 is For the original query parameter of plaintext.
As shown in figure 1, Fig. 1 is a kind of application scenario diagram of the disclosure according to an exemplary embodiment.In the application In scene, new resource can be added in service end, and URL is created for the new resources, URL is issued to each client, respectively Individual client can send the request that resource is corresponded to for accessing URL to service end according to the triggering command received, so as to The resource corresponding to request URL from service end.Because query argument can be used for inquiring about resource to be visited, and URL other compositions In the case that part is constant, different resources to be visited is may have access to by the query argument changed in URL.For example, it is based on Above-mentioned URL:https://item.mi.com/product.doId=10000030, it is as follows URL can be forged:
https://item.mi.com/product.doId=10000031
https://item.mi.com/product.doId=10000032
https://item.mi.com/product.doId=10000099
If in consideration of it, query argument is write in URL in clear text manner, disabled user easily joins according to clear text queries Number deduces other query arguments, then forges URL using the query argument deduced, and have access to entirely using the URL of forgery Portion's resource, this mode do not possess security, easily cause resource leakage.For example, disabled user may be accessed by forging URL To the resource do not issued or do not expected user and see.
In order to avoid the unsafe problem of above-mentioned resource, the embodiment of the present disclosure provides a kind of URL generations scheme, in the program It is middle that query argument is encrypted using temporal information, the complexity of query argument can be increased, and then increase disabled user's profit The difficulty of other query arguments is speculated with existing encrypted query parameter, so as to avoid disabled user from being visited by forging URL Resource is asked, and then improves the security of resource.
Next the embodiment of the present disclosure is illustrated with reference to accompanying drawing.
As shown in Fig. 2 Fig. 2 is a kind of flow chart of URL generation method of the disclosure according to an exemplary embodiment, It may comprise steps of:
In step 201, temporal information and the original query parameter for inquiring about the resource are obtained.
In step 202, the original query parameter is encrypted based on the temporal information, obtains encrypted query ginseng Number;
In step 203, URL corresponding to the resource is generated based on the encrypted query parameter.
As one of which implementation, the embodiment of the present disclosure can be applied in service end, and service end can be service Device, server cluster, cloud server terminal etc..After service end generation URL, URL can be issued to corresponding client, so as to user Based on client request and check resource corresponding to URL.
On URL generation opportunity, URL can be generated when creating new resources, after new resources are created and can also connect URL etc. is generated when receiving URL generation instructions, generation opportunity of the present embodiment to URL is not limited.
During URL corresponding to generation resource, the original query parameter for inquiring about the resource can be obtained.It is original Query argument can be based on default parameter generation strategy and obtain.In one example, can be in establishing resource based on establishment Resource is numbered order, so as to the new resources distribution original query parameter to create, such as ID.In another example, Center requests original query parameter can be generated to parameter in establishing resource, so as to obtain the original query parameter of new resources Deng.
In order to which strengthen original query parameter cracks difficulty, temporal information can also be obtained.Time corresponding to different URL believes Breath can be different, particularly, for other components are identical, the only different URL of original query parameter, its corresponding time letter Breath can be different.Again because temporal information complexity itself is stronger, therefore time information encryption original query parameter is utilized, can be with Strengthen the complexity of original query parameter, the difficulty of original query parameter is forged in increase.
Wherein, temporal information is the information for describing the time, for example, the form of temporal information can be:During the date Every minute and second, such as:20170804000000.It can be seen that complexity can be strengthened using the temporal information of this form.
In one example, temporal information can obtain in random generation during URL corresponding to generation resource.Due to The randomness of machine generation is stronger, then disabled user is difficult to deduce the temporal information generated at random.
In another example, temporal information can be creation time, for example, the temporal information includes the URL's One or more in creation time, the creation time of the original query parameter, the creation time of the resource.It is if a variety of When creation time combines, it can be combined according to specified order, so that later use specifies order is counter to be solved.If three kinds Creation time is identical, then can select one as temporal information.
It can be seen that the embodiment is by the use of creation time as temporal information, because creation time corresponding to every resource compares It is stable, and the creation time of different resource data is most of different, for using identical creation time compared to different resource, Former improve the difficulty that encrypted query parameter is cracked.
After temporal information is obtained, the corresponding relation of original query parameter and temporal information can be recorded, is easy to follow-up profit URL checkings are carried out with corresponding relation.
Obtain temporal information purpose be in order to which original query parameter is encrypted, it is original to avoid disabled user from cracking Query argument., can be by temporal information or based on the derivation information that temporal information obtains and original as one of which cryptographic means Beginning query argument is combined, so as to obtain encrypted query parameter., can be by temporal information or base as another cryptographic means In the derivation information (parameter of type one) that temporal information obtains, with original query parameter or spreading out based on original query gain of parameter Raw parameter (parameter of type two) is combined, so as to obtain encrypted query parameter.When encrypted query parameter is joined based on polytype When array closes acquisition, all kinds parameter can be combined using combined strategy, for example, combined strategy can be able to be by finger After fixed order arranges or one of which type parameter is inserted into the default position character of another type parameter, may be used also It is numerous to list herein to be other combinations.
In an optional implementation, the encrypted query parameter is based in original query parameter and derivative parameter At least one parameter and temporal information, shift time information, mapping time information, reversing time information, mixed processing time At least one of information parameter combination obtains.It can be seen that can at least it be selected from original query parameter and derivative parameter a kind of Parameter, from temporal information, shift time information, mapping time information, reversing time information, mixed processing temporal information at least A kind of parameter is selected, selected parameter is combined, you can obtains encrypted query parameter.When encrypted query parameter is including more During kind parameter, many kinds of parameters can be arranged in certain sequence, so as to obtain encrypted query parameter, and it is suitable to record the arrangement Sequence;After one of which parameter can also be inserted into the default position character of another information, and record this insertion relation etc..
Wherein, the shift time information can be based on the temporal information carrying out circulative shift operation acquisition, described Loopy moving operation includes each original character in character string specifying digit along assigned direction loopy moving.Temporal information can be with A character string, each character in temporal information is properly termed as original character, in order to in follow-up mapping relations Mapping character make a distinction.Assigned direction can be leftward or rightward, and specified digit can be preset, it is assumed that temporal information In original character number be n, then it can be Any Digit in 1 to n-1 to specify digit.For example, it is assumed that temporal information is " 20170804123021 ", assigned direction are 3 to the right, to specify digit, then the shift time information after shifting is “02120170804123”。
The mapping time information can be based on the temporal information carrying out map operation acquisition, the map operation bag Include and each original character in character string is mapped as corresponding mapping character according to default mapping relations, the mapping relations include The corresponding relation of original character and mapping character.Temporal information can be a character string, and original character can in temporal information To be referred to as original character.Default mapping relations can be the mapping relations constructed in advance, and mapping relations can be based on random configuration Obtain, user instruction construction can also be based on and obtained.
Default mapping relations can be constructed based on the type of original character, and type can be by numeral, letter, symbol etc. Divided.For example, if original character only includes numerical character, digital mapping relations are built, if original character includes The different type character such as numerical character and alphabetic character, then build corresponding mapping relations for different type character.Numeral is right The mapping character answered can be digital or alphabetical grade other characters different from the numeral, mapping word corresponding to letter Symbol can be alphabetical or digital grade other characters different from the letter.It is understood that in mapping relations, no It is different with mapping character corresponding to original character, corresponded with realizing.Hereinafter signal is carried out by taking digital mapping relations as an example to say It is bright:
'0'->'9'
'1'->'D'
'2'->'N'
'3'->'Q'
'4'->'H'
'5'->'2'
'6'->'E'
'7'->'A'
'8'->'B'
'9'->'0'
In one example, after presetting mapping relations structure, all original query parameters are using the default mapping relations.
In another example, in order to be further ensured that the security of original query parameter, for different storage zone The different default mapping relations of the use such as resource or different type resource that resource or different time sections create, and After obtaining for inquiring about the original query parameter of the resource, the relation of the default mapping relations and original query parameter is recorded, with Continue to get in verification process after an action of the bowels and mapping relations are preset corresponding to original query parameter, utilize corresponding default mapping relations Carry out reflection to penetrate, recovery time information.
The reversing time information is based on the temporal information carrying out reverse turn operation acquisition, and the reverse turn operation includes will Character string is integrally inverted and is inverted each original character in character string.For example, can be first whole by temporal information Body is inverted, and is then inverted each character in the information after reversion, obtains reversing time information;And for example, Ke Yixian Each original character in temporal information is inverted, then integrally inverted the information after reversion, obtains reversing time Information.For effect, equivalent to i-th of original character in character string is exchanged with (N-i+1) individual character and (replaced Change), wherein, N is the number of the original character of character string, and i is integer, andFor example, it is assumed that temporal information is " 20170804000000 ", then the reversing time information after reverse turn operation is " 00000040807102 ".
It can be seen that after temporal information is carried out into reverse turn operation, the reversing time information of acquisition is difficult to find out relevant with the time, is carried High the information is deduced from reversing time information is that the reversion of passage time information obtains, and then improves and crack query argument Difficulty.
It should be appreciated that above-mentioned circulative shift operation, map operation and reverse turn operation can also be combined, then it is described Mixed processing temporal information is based on the temporal information is carried out in loopy moving operation, map operation and reverse turn operation at least Two kinds of operations are obtained, and a variety of operations are carried out to temporal information so as to realize.The execution sequence of operations can not be limited.Example Such as, the mixed processing temporal information is based on the temporal information carrying out loopy moving operation and map operation obtains;And for example, Mixed processing temporal information is based on the temporal information carrying out loopy moving operation and reverse turn operation obtains;And for example, at mixing Temporal information is managed to be based on the temporal information carrying out map operation and reverse turn operation acquisition;And for example, mixed processing temporal information Obtained etc. based on the temporal information is carried out into loopy moving operation, map operation and reverse turn operation.
On derivative parameter, derivative parameter is based on original query gain of parameter, for example, can be based on the original query Parameter carries out circulative shift operation acquisition, can also be based on the original query parameter carrying out map operation acquisition, can be with Based on the original query parameter is carried out into reverse turn operation acquisition, or even it is also based on being followed the original query parameter At least two operations in ring moving operation, map operation and reverse turn operation obtain, and derivative gain of parameter mode is with being based on the time Derivation information mode that information derives (such as shift time information, mapping time information, reversing time information, mixed processing Temporal information) it is similar, it is numerous to list herein.Character in original query parameter is referred to as original character.
At least selected first, and the time from original query parameter and in the derivative parameter based on the original query gain of parameter One or more parameters in information, shift time information, mapping time information, mixed processing temporal information are combined, can To obtain multiple combinations, every kind of combination can obtain corresponding encrypted query parameter.
Illustrated below with wherein several combinations.
The first combination:The encrypted query parameter is based on shift time information and original query parameter combination obtains .
It is described that the original query parameter is encrypted based on the temporal information, encrypted query parameter is obtained, including:
Each original character in the temporal information is specified into digit along the assigned direction loopy moving;
The shift time information for shifting acquisition is combined with original query parameter, obtains encrypted query parameter.
Wherein, in one example, can be suitable by specifying when shift time information and original query parameter being combined Sequence is arranged, such as is combined by the order of shift time information+original query parameter, it is assumed that shift time information is " 02120170804123 ", it is assumed that original query parameter is " 3 ", then the encrypted query parameter for combining acquisition is “021201708041233”.In another example, original query parameter can be inserted into shift time information and preset position word Fu Hou, such as default position is 5, then after original query parameter being inserted into the 5th character of shift time information, obtains encrypted query Parameter " 021203170804123 ".It can be seen that by way of insertion, the possibility that makes the encrypted query parameter of acquisition be cracked It is lower.
Second of combination:The encrypted query parameter is based on shift time information and derivative parameter combination obtains.
The embodiment is exemplified by deriving parameter as based on the original query parameter is carried out into the parameter of map operation acquisition Illustrate.It is described that the original query parameter is encrypted based on the temporal information, obtain encrypted query parameter, bag Include:
Each original character in the temporal information is specified into digit along the assigned direction loopy moving;
According to the default mapping relations, each original character in the original query parameter is mapped as corresponding mapping Character;
The shift time information obtained will be shifted and the derivative parameter of mapping acquisition is combined, obtain encrypted query ginseng Number.
In the embodiment, it is combined by the derivative parameter for obtaining shift time information with mapping, makes adding for acquisition The difficulty that close query argument is cracked is bigger.
The third combination:The encrypted query parameter is based on mapping time information and derivative parameter combination obtains.
The embodiment is exemplified by deriving parameter as based on the original query parameter is carried out into the parameter of map operation acquisition Illustrate.It is described that the original query parameter is encrypted based on the temporal information, obtain encrypted query parameter, bag Include:
According to the default mapping relations, each original character in the temporal information is mapped as corresponding mapping word Symbol, obtain mapping time information;
According to the default mapping relations, each original character in the original query parameter is mapped as corresponding mapping Character, obtain derivative parameter;
The mapping time information obtained will be mapped and the derivative parameter of mapping acquisition is combined, obtain encrypted query ginseng Number.
Wherein, temporal information is carried out presetting mapping relations used by map operation, with carrying out original query parameter Mapping relations are preset used by map operation, be able to can also be differed with identical, the present embodiment carries out example exemplified by identical Explanation.
4th kind of combination:The encrypted query parameter is based on mixed processing temporal information and derivative parameter combination obtains .
The embodiment is exemplified by deriving parameter as based on the original query parameter is carried out into the parameter of map operation acquisition Illustrate.It is described that the original query parameter is encrypted based on the temporal information, obtain encrypted query parameter, bag Include:
The temporal information is subjected to reverse turn operation and obtains reversing time information, for example, the temporal information is integrally entered Row reversion, and each character is inverted in the information that will invert acquisition, obtains reversing time information;
According to the default mapping relations, each original character in the reversing time information is mapped as corresponding mapping Character, obtain mixed processing temporal information;
According to the default mapping relations, each original character in the original query parameter is mapped as corresponding mapping Character, obtain derivative parameter;
The derivative parameter that the mixed processing temporal information obtains with mapping is combined, obtains encrypted query parameter.
Wherein, after temporal information is integrally inverted, not only the position of each character is modified, and each character also enters Reversion is gone, for this reason, it may be necessary to which each character after reversion is inverted back into correct direction again.
It can be seen that being combined by the derivative parameter for obtaining mixed processing temporal information with mapping, complexity can be obtained The higher encrypted query parameter of degree, so as to avoid encrypted query parameter from being cracked by disabled user.
It is understood that above-mentioned only include several combinations, other combinations are can also be, herein not one by one Enumerate.
In another optional implementation, the encrypted query parameter is also obtained based on designated character string.Its middle finger It can be magic numeral to determine character string, can be a fixed character string e.g., arbitrarily set according to demand, can be with after setting Do not rechange, so as to later use, the character string carries out query argument preliminary identification.In consideration of it, the encrypted query parameter is based on At least one of original query parameter and derivative parameter parameter and designated character string and temporal information, shift time letter At least one of breath, mapping time information, reversing time information, mixed processing temporal information gain of parameter.It can be seen that encrypted query Parameter is influenceed by three class parameters, and one kind is that at least one of original query parameter and derivative parameter parameter, one kind are designated words Symbol string, one kind are to specify character string and temporal information, shift time information, mapping time information, reversing time information, mixed At least one of processing time information parameter is closed, and then is understood, encrypted query parameter is not only with original query relating to parameters but also with referring to It is relevant, also relevant with temporal information to determine character string, so as to increase the complexity of encrypted query parameter.It is exemplified below one of which group Conjunction is illustrated.
5th kind of combination:It is described that the original query parameter is encrypted based on the temporal information, added Close query argument, including:
The temporal information is subjected to reverse turn operation and obtains reversing time information, for example, the temporal information is integrally entered Row reversion, and each character is inverted in the temporal information that will invert acquisition, obtains reversing time information;
According to the default mapping relations, each original character in the reversing time information is mapped as corresponding mapping Character, obtain mixed processing temporal information;
According to the default mapping relations, each original character in the original query parameter is mapped as corresponding mapping Character, obtain derivative parameter;
The derivative parameter that designated character string, the mixed processing temporal information obtain with mapping is combined, added Close query argument.
It can be seen that the derivative parameter that the present embodiment combination designated character string, mixed processing temporal information obtain with mapping, makes to obtain The encrypted query parameter complexity obtained is higher, and the possibility being decrypted is smaller.
It is understood that other combinations are can also be, for example, the encrypted query parameter is based on derivative parameter, specified Character string, the acquisition of reversing time information combination etc., it is numerous to list herein.
Various technical characteristics in embodiment of above can be arbitrarily combined, as long as the combination between feature is not present Conflict or contradiction, but as space is limited, do not described one by one, therefore the various technical characteristics in above-mentioned embodiment is any It is combined the scope for falling within this disclosure.For example, combined as one of which, encrypted query parameter=M (designated words Symbol string)+mapping reversing time information+carry out original query parameter the derivative parameter of map operation acquisition.It is with creation time 2017-08-04 00:00:00th, exemplified by original query parameter is 7, then:
It is initial to combine:M+20170804000000+7
Temporal information reverse turn operation:M+00000040807102+7
Digital map operation:M+999999H9B9AD9N+A
Obtain encrypted query parameter:M 999999H9B9AD9N A
After encrypted query parameter is obtained, encrypted query parameter can be replaced original query parameter, other groups with URL URL is formed into part, such as obtains the parts such as host-host protocol, server, port numbers, path, the generation of combining encryption query argument URL, it is specifically how identical with correlation technique using encrypted query parameter generation URL mode, do not repeat one by one herein, the disclosure How embodiment encrypts original query parameter if mainly being introduced.
Accordingly, the embodiment of the present disclosure also provides query argument proof scheme in a kind of URL, and as shown in Figure 3A, Fig. 3 A are The flow chart of query argument verification method, methods described include in a kind of URL of the disclosure according to an exemplary embodiment:
In step 301, receive when corresponding to the request of resource for accessing URL, extract the encrypted query ginseng in URL Number, original query gain of parameter of the encrypted query parameter based on temporal information and for query resource.
In step 302, original query parameter and temporal information are extracted from the encrypted query parameter.
In step 303, from default query argument and the corresponding relation of temporal information, lookup is original with being extracted Target time information corresponding to query argument.
In step 304, by the temporal information extracted compared with the target time information, according to comparative result Verify whether encrypted query parameter is effective.
In this embodiment, when receive correspond to the request of resource for accessing URL when, encryption can be extracted from URL Query argument.Wherein, the mode for extracting encrypted query parameter can be with the mode phase of extraction original query parameter in correlation technique Seemingly, it is not limited herein.
Original query gain of parameter due to encrypted query parameter based on temporal information and for query resource, therefore can To extract original query parameter and temporal information from encrypted query parameter.The strategy of extracting time information and original query parameter With it is tactful corresponding based on temporal information and original query gain of parameter encrypted query parameter.
On temporal information, in one example, temporal information can give birth at random during URL corresponding to generation resource Into acquisition.Because the randomness generated at random is stronger, then disabled user is difficult to deduce the temporal information generated at random.Another In one example, temporal information can be creation time, for example, the creation time of the temporal information including the URL, described One or more in the creation time of original query parameter, the creation time of the resource.If a variety of creation time combinations When, it can be combined according to specified order.
On encrypted query parameter, encrypted query parameter is based at least one of original query parameter and derivative parameter ginseng One in number and temporal information, shift time information, mapping time information, reversing time information, mixed processing temporal information Kind or many kinds of parameters combination obtain.When encrypted query parameter, which is based on polytype parameter combination, to be obtained, combination plan can be used Slightly all kinds parameter is combined, for example, combined strategy can be arranged many kinds of parameters in certain sequence, so as to Encrypted query parameter is obtained, and records this and puts in order;Combined strategy can also be inserted into one of which type parameter separately After a kind of default position character of type parameter, and record this insertion relation etc..
Wherein, the shift time information is based on the temporal information carrying out circulative shift operation acquisition;The mapping Temporal information is based on the temporal information carrying out map operation acquisition;The reversing time information is based on the temporal information Carry out reverse turn operation acquisition;The mixed processing temporal information is based on the temporal information carrying out loopy moving operation, mapping At least two operations in operation and reverse turn operation obtain;The derivative parameter is based on being circulated the original query parameter Shifting function obtains, or based on the original query parameter is carried out into map operation acquisition, or based on the original query is joined Number carries out reverse turn operation acquisition, or is grasped based on the original query parameter is carried out into loopy moving operation, map operation and reversion At least two operations in work obtain;The loopy moving operation includes following each original character in character string along assigned direction Digit is specified in ring movement;The map operation includes each original character in character string being mapped as pair according to default mapping relations The mapping character answered, the mapping relations include the corresponding relation of original character and mapping character;The reverse turn operation includes will Character string is integrally inverted and is inverted each original character in character string.The technology related to encrypted query parameter Reference can be made to the introduction in URL generating process to encrypted query parameter, is not introduced one by one herein.
Every kind of combined strategy is corresponding with fractionation strategy, and combination can be obtained to the progress of encrypted query parameter using strategy is split Split, obtain two class parameters, one kind is original query parameter or the derivative parameter based on original query gain of parameter, another kind of to be Temporal information or the colouring information obtained based on temporal information.
In one example, if encrypted query parameter combines acquisition, extraction ginseng in a designated order based on many kinds of parameters During number, encrypted query parameter can be split in a designated order, so as to obtain different two class parameters.For example, if encryption is looked into Ask parameter and acquisition is combined based on derivative parameter, mixed processing temporal information in a designated order, then can in a designated order split and add Close query argument, obtain derivative parameter and mixed processing temporal information.
In another example, if encrypted query parameter is based on the default position word that the first parameter is inserted into the second parameter Obtained after symbol, if the first parameter digit is target digit, the word of target digit is extracted after the default position character of the second parameter Symbol, so as to obtain the first parameter and the second parameter.
It should be appreciated that in extracting parameter, can tentatively be extracted using strategy is split corresponding to combined strategy, It is above-mentioned to list two kinds of preliminary extracting modes, it is numerous to list herein for other modes.If the parameter extracted is as original Query argument and temporal information, then without further extraction, if the parameter extracted is not original query parameter or time Information, then the parameter extracted is subjected to inverse operation, so as to obtain corresponding original query parameter or temporal information.Inverse operation can To be the inverse operation of loopy moving operation or the inverse operation of map operation, inverse operation of reverse turn operation etc. can also be. For example, the inverse operation of loopy moving operation, can be by each opposite direction of the original character along the assigned direction in character string Loopy moving specifies digit;The inverse operation of the map operation, can be by described default by each mapping character in character string Mapping relations carry out reflection and penetrated;The inverse operation of the reverse turn operation is identical with reverse turn operation, can integrally enter character string e.g. Row inverts and is inverted each original character in character string.
The encrypted query parameter obtained for various combination mode, using different parameters extracting mode, given birth to below for URL The encrypted query parameter that several combinations enumerated into method obtain, it is corresponding to introduce corresponding parameter extraction mode.
The encrypted query parameter obtained for the first combination, the encrypted query parameter are based on shift time information Obtained with original query parameter combination.It is described that original query parameter and temporal information, bag are extracted from the encrypted query parameter Include:
Shift time information and original query parameter are extracted from the encrypted query parameter.For example, combination can be based on Strategy is split corresponding to tactful shift time information and original query parameter are extracted from encrypted query parameter.
By opposite direction loopy moving specific bit of each original character along the assigned direction in the shift time information Number, obtain temporal information.
For the second combination obtain encrypted query parameter, the encrypted query parameter be based on shift time information and Derivative parameter combination obtains.The embodiment is to derive parameter as based on the original query parameter is carried out into map operation acquisition Illustrated exemplified by parameter.In consideration of it, described extract original query parameter and temporal information, bag from the encrypted query parameter Include:
Shift time information and derivative parameter are extracted from the encrypted query parameter.
By opposite direction loopy moving specific bit of each original character along the assigned direction in the shift time information Number, obtain temporal information.
Each mapping character in the derivative parameter is carried out into reflection by the default mapping relations to penetrate, obtains original query Parameter.
For the 3rd combination obtain encrypted query parameter, the encrypted query parameter be based on mapping time information and Derivative parameter combination obtains.The embodiment is to derive parameter as based on the original query parameter is carried out into map operation acquisition Illustrated exemplified by parameter.In consideration of it, described extract original query parameter and temporal information, bag from the encrypted query parameter Include:
Mapping time information and derivative parameter are extracted from the encrypted query parameter.
The mapping character in the mapping time information is carried out into reflection by the default mapping relations to penetrate, obtains time letter Breath.
Each mapping character in the derivative parameter is carried out into reflection by the default mapping relations to penetrate, obtains original query Parameter.
For the 4th combination obtain encrypted query parameter, the encrypted query parameter be based on incorporation time information with And derivative parameter combination obtains, the incorporation time information is based on temporal information carrying out map operation and reverse turn operation obtains, The derivative parameter is based on original query parameter carrying out map operation acquisition, described that original is extracted from the encrypted query parameter Beginning query argument and temporal information, including:
The incorporation time information and the derivative parameter are extracted from the encrypted query parameter;
The mapping character in the mixed processing temporal information is carried out into reflection by the default mapping relations to penetrate;And will be anti- The character string that mapping obtains carries out reverse turn operation, obtains temporal information;
The mapping character in the derivative parameter is carried out into reflection by the default mapping relations to penetrate, obtains original query ginseng Number.
The encrypted query parameter obtained for the 5th combination, the encrypted query parameter are believed based on the incorporation time Breath, designated character string and derivative parameter combination obtain, and the incorporation time information is based on temporal information carrying out map operation Obtained with reverse turn operation, the derivative parameter is based on original query parameter carrying out map operation acquisition, described from the encryption Original query parameter and temporal information are extracted in query argument, including:
The designated character string is extracted from the encrypted query parameter;
If the designated character string extracted meets well-formedness condition, when extracting the mixing from the encrypted query parameter Between information and the derivative parameter;
The mapping character in the mixed processing temporal information is carried out into reflection by the default mapping relations to penetrate, and will be anti- The character string that mapping obtains carries out reverse turn operation, obtains temporal information;
The mapping character in the derivative parameter is carried out into reflection by the default mapping relations to penetrate, obtains original query ginseng Number.
Wherein, identical designated character string can be used for different original query parameters, received for accessing URL During the request of corresponding resource, designated character string can be extracted from encrypted query parameter, utilizes designated character string and the finger to prestore Determine character string to be compared, with check extracted designated character string whether with the designated character String matching that prestores, during matching, then Judge that extracted designated character string meets well-formedness condition, other specification can be further extracted, if the designated word extracted When symbol string is unsatisfactory for well-formedness condition, then encrypted query invalid parameters are judged, and then judge that URL is invalid, directly ignore the request, Without being verified again to other specification, so as to improve verification efficiency.
It is understood that encrypted query parameter can also use other combinations to obtain, from encrypted query parameter The method of extracting parameter can carry out being adapted adjustment, numerous to list herein.
Various technical characteristics in embodiment of above can be arbitrarily combined, as long as the combination between feature is not present Conflict or contradiction, but as space is limited, do not described one by one, therefore the various technical characteristics in above-mentioned embodiment is any It is combined the scope for falling within this disclosure.For example, combined as one of which, encrypted query parameter=M (designated words Symbol string)+mapping reversing time information+carry out original query parameter the color parameter of map operation acquisition.Therefore, extracting After encrypted query parameter M999999H9B9AD9N A, following steps are performed:
Fractured operation:M+999999H9B9AD9N+A
Verification operation:Checking M whether with the designated character String matching that prestores, if matching, performs next operation, if not Match somebody with somebody, ignore this request.
Anti- map operation:M+00000040807102+7
Reverse turn operation:M+20170804000000+7
In consideration of it, obtain temporal information:20170804000000 and original query parameter 7.
In order to improve the security of resource to be visited, temporal information can be verified.In consideration of it, from default inquiry In the corresponding relation of parameter and temporal information, target time information corresponding with the original query parameter extracted is searched;By institute The temporal information of extraction verifies whether encrypted query parameter has compared with the target time information, according to comparative result Effect.In encrypted query invalid parameters, it is possible to determine that URL is invalid.
Wherein, default query argument and the corresponding relation of temporal information are to record to obtain when generating URL, if carried The temporal information taken differs with the target time information, then judges the encrypted query invalid parameters, so judge URL without Effect.If the temporal information extracted is identical with the target time information, judge that encrypted query parameter is effective, can be right URL carries out other verification process, such as signature verification etc., or after all be verified, returns to resource corresponding to URL.
As seen from the above-described embodiment, the embodiment of the present disclosure is by testing the temporal information extracted in encrypted query parameter Card, to judge whether encrypted query parameter is effective, forgery URL is avoided to cause resource unsafe condition.This method is cleverly The creation time of data be make use of as slat, so needing to enumerate all possible creation time point in theory, can just be cracked Query argument (such as ID).The ID of a plaintext, ciphertext is converted into;The data letter of full dose can not be obtained by allowing malice to grab taker Breath, ensures information security.
As shown in Figure 3 B, Fig. 3 B are a kind of interactive schematic diagram of the disclosure according to an exemplary embodiment.Show at this In intention, service end can obtain temporal information and the original query parameter (step 401) for inquiring about the resource;Based on institute State temporal information the original query parameter is encrypted, obtain encrypted query parameter (step 402);Looked into based on the encryption Ask parameter and generate URL (steps 403) corresponding to the resource, URL is issued to client (step 404) by service end.Work as client When termination receives user's triggering URL instruction, the request (step 405) that resource is corresponded to for accessing URL is sent to service end.Clothes Encrypted query parameter (the step 406) being engaged in end extraction URL;From the encrypted query parameter extract original query parameter and when Between information (step 407);From default query argument and the corresponding relation of temporal information, the original query with being extracted is searched Target time information (step 408) corresponding to parameter;By the temporal information extracted compared with the target time information, Whether effectively encrypted query parameter (step 409) is verified according to comparative result;If invalid, directly ignore request or to client End returns to request failure message (step 410);If other verification operations, such as signature verification further effectively, are carried out to URL Deng after all be verified, to resource (step 411) corresponding to client return URL.For other verification operations with related Technology is identical, numerous to list herein.
As seen from the above-described embodiment, query argument is encrypted using temporal information for the present embodiment, can increase encryption The difficulty that query argument is cracked, and then increase disabled user and speculate other query arguments using existing encrypted query parameter Difficulty.After service end issues URL to client, client can send resource based on the instruction received to service end please Ask, service end to the temporal information extracted in encrypted query parameter by verifying, to judge whether encrypted query parameter has Effect, forgery URL is avoided to cause resource unsafe condition.
Corresponding with the embodiment of foregoing URL generation methods, the disclosure additionally provides URL generating means, device is applied Equipment and storage medium embodiment.
As shown in figure 4, Fig. 4 is a kind of block diagram of URL generating means of the disclosure according to an exemplary embodiment, institute Stating device includes:
Data obtaining module 41, it is configured as obtaining temporal information and the original query parameter for inquiring about the resource.
Information encrypting module 42, it is configured as that the original query parameter is encrypted based on the temporal information, obtains Obtain encrypted query parameter.
Information generating module 43, it is configured as generating URL corresponding to the resource based on the encrypted query parameter.
In an optional implementation, the temporal information includes creation time, the original query of the URL One or more in the creation time of parameter, the creation time of the resource.
In an optional implementation, the encrypted query parameter is based in original query parameter and derivative parameter At least one parameter and temporal information, shift time information, mapping time information, reversing time information, mixed processing time One or more parameter combinations obtain in information;
Wherein, the shift time information is based on the temporal information carrying out circulative shift operation acquisition;The mapping Temporal information is based on the temporal information carrying out map operation acquisition;The reversing time information is based on the temporal information Carry out reverse turn operation acquisition;The mixed processing temporal information is based on the temporal information carrying out loopy moving operation, mapping At least two operations in operation and reverse turn operation obtain;The derivative parameter is based on being circulated the original query parameter Shifting function obtains, or based on the original query parameter is carried out into map operation acquisition, or based on the original query is joined Number carries out reverse turn operation acquisition, or is grasped based on the original query parameter is carried out into loopy moving operation, map operation and reversion At least two operations in work obtain;
The loopy moving operation includes each original character in character string specifying digit along assigned direction loopy moving; The map operation includes each original character in character string being mapped as corresponding mapping character, institute according to default mapping relations Stating mapping relations includes the corresponding relation of original character and mapping character;The reverse turn operation includes integrally carrying out character string instead Turn and inverted each original character in character string.
As shown in figure 5, Fig. 5 is the block diagram of another URL generating means of the disclosure according to an exemplary embodiment, On the basis of foregoing embodiment illustrated in fig. 4, described information encrypting module 42 includes the embodiment:
First encryption submodule 421, is configured as each original character in the temporal information along the assigned direction Loopy moving specifies digit;According to the default mapping relations, each original character in the original query parameter is mapped as Corresponding mapping character;The shift time information obtained will be shifted and the derivative parameter of mapping acquisition is combined, encrypted Query argument.
As shown in fig. 6, Fig. 6 is the block diagram of another URL generating means of the disclosure according to an exemplary embodiment, On the basis of foregoing embodiment illustrated in fig. 4, described information encrypting module 42 includes the embodiment:
Second encryption submodule 422, is configured as according to the default mapping relations, will be each former in the temporal information Beginning character is mapped as corresponding mapping character, obtains mapping time information;According to the default mapping relations, original looked into described Ask each original character in parameter and be mapped as corresponding mapping character, obtain derivative parameter;The mapping time letter obtained will be mapped Cease the derivative parameter obtained with mapping to be combined, obtain encrypted query parameter.
As shown in fig. 7, Fig. 7 is the block diagram of another URL generating means of the disclosure according to an exemplary embodiment, On the basis of foregoing embodiment illustrated in fig. 4, described information encrypting module 42 includes the embodiment:
3rd encryption submodule 423, is configured as integrally being inverted the temporal information, and will invert the letter obtained Each character is inverted in breath, obtains reversing time information;According to the default mapping relations, by the reversing time information In each original character be mapped as corresponding mapping character, obtain mixed processing temporal information;According to the default mapping relations, Each original character in the original query parameter is mapped as corresponding mapping character, obtains derivative parameter;By the mixing The derivative parameter that processing time information obtains with mapping is combined, and obtains encrypted query parameter.
As shown in figure 8, Fig. 8 is the block diagram of another URL generating means of the disclosure according to an exemplary embodiment, On the basis of foregoing embodiment illustrated in fig. 4, described information encrypting module 42 includes the embodiment:
Submodule 424 is inverted, is configured as integrally being inverted the temporal information, and the time letter obtained will be inverted Each character is inverted in breath, obtains reversing time information.
First mapping submodule 425, it is configured as according to the default mapping relations, will be every in the reversing time information Individual original character is mapped as corresponding mapping character, obtains mixed processing temporal information.
Second mapping submodule 426, it is configured as according to the default mapping relations, will be every in the original query parameter Individual original character is mapped as corresponding mapping character, obtains derivative parameter.
Submodule 427 is combined, is configured as spreading out designated character string, the mixed processing temporal information with what mapping obtained Raw parameter is combined, and obtains encrypted query parameter.
Accordingly, the disclosure also provides a kind of server device, including:Processor;For storing, processor is executable to be referred to The memory of order;Wherein, the processor is configured as:
Obtain temporal information and the original query parameter for inquiring about the resource.
The original query parameter is encrypted based on the temporal information, obtains encrypted query parameter.
URL corresponding to the resource is generated based on the encrypted query parameter.
Accordingly, the disclosure also provides a kind of computer-readable recording medium, is stored thereon with computer program, the program The step of URL generation methods described in any of the above-described are realized when being executed by processor.
The disclosure can use the storage medium for wherein including program code in one or more (to include but is not limited to disk Memory, CD-ROM, optical memory etc.) on the form of computer program product implemented.Computer-usable storage medium bag Permanent and non-permanent, removable and non-removable media is included, can realize that information stores by any method or technique.Letter Breath can be computer-readable instruction, data structure, the module of program or other data.The example bag of the storage medium of computer Include but be not limited to:Phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), Other kinds of random access memory (RAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus or any other non-biography Defeated medium, the information that can be accessed by a computing device available for storage.
The function of modules and the specific details of implementation process of effect, which are shown in, in said apparatus corresponds to step in the above method Implementation process, will not be repeated here.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part is real referring to method Apply the part explanation of example.Device embodiment described above is only schematical, wherein described be used as separating component The module of explanation can be or may not be physically separate, can be as the part that module is shown or can also It is not physical module, you can with positioned at a place, or can also be distributed on multiple mixed-media network modules mixed-medias.Can be according to reality Need to select some or all of module therein to realize the purpose of disclosure scheme.Those of ordinary skill in the art are not paying In the case of going out creative work, you can to understand and implement.
As shown in figure 9, Fig. 9 is a kind of block diagram of device for URL generations according to an exemplary embodiment.
For example, device 900 may be provided in server device.Reference picture 9, device 900 include processing component 922, its Further comprise one or more processors, and as the memory resource representated by memory 932, can be by handling for storing The instruction of the execution of part 922, such as application program.The application program stored in memory 932 can include one or one Above each corresponds to the module of one group of instruction.In addition, processing component 922 is configured as execute instruction, it is above-mentioned to perform URL generation methods.
Device 900 can also include the power management that a power supply module 926 is configured as performs device 900, and one has Line or radio network interface 950 are configured as device 900 being connected to network, and input and output (I/O) interface 958.Dress Putting 900 can operate based on the operating system for being stored in memory 932.
Wherein, when the instruction in the memory 932 is performed by the processing component 922 so that device 900 can be held A kind of URL generation methods of row, including:
Obtain temporal information and the original query parameter for inquiring about the resource;
The original query parameter is encrypted based on the temporal information, obtains encrypted query parameter;
URL corresponding to the resource is generated based on the encrypted query parameter.
Corresponding with the embodiment of query argument verification method in foregoing URL, the disclosure additionally provides query argument in URL Verify the embodiment of device, the equipment that device is applied and storage medium.
As shown in Figure 10, Figure 10 is that query argument is verified in a kind of URL of the disclosure according to an exemplary embodiment The block diagram of device, described device include:
First extraction module 101, it is configured as receiving when corresponding to the request of resource for accessing URL, extracts in URL Encrypted query parameter, original query gain of parameter of the encrypted query parameter based on temporal information and for query resource.
Second extraction module 102, it is configured as extracting original query parameter and time letter from the encrypted query parameter Breath.
Information inquiry module 103, be configured as from default query argument and the corresponding relation of temporal information, search with Target time information corresponding to the original query parameter extracted.
Information authentication module 104, the temporal information for being configured as being extracted compared with the target time information, Verify whether encrypted query parameter is effective according to comparative result.
In an optional implementation, the temporal information includes creation time, the original query of the URL One or more in the creation time of parameter, the creation time of the resource.
In an optional implementation, the encrypted query parameter is based in original query parameter and derivative parameter At least one parameter and temporal information, shift time information, mapping time information, reversing time information, mixed processing time One or more parameter combinations obtain in information;
Wherein, the shift time information is based on the temporal information carrying out circulative shift operation acquisition;The mapping Temporal information is based on the temporal information carrying out map operation acquisition;The reversing time information is based on the temporal information Carry out reverse turn operation acquisition;The mixed processing temporal information is based on the temporal information carrying out loopy moving operation, mapping At least two operations in operation and reverse turn operation obtain;The derivative parameter is based on being circulated the original query parameter Shifting function obtains, or based on the original query parameter is carried out into map operation acquisition, or based on the original query is joined Number carries out reverse turn operation acquisition, or is grasped based on the original query parameter is carried out into loopy moving operation, map operation and reversion At least two operations in work obtain;
The loopy moving operation includes each original character in character string specifying digit along assigned direction loopy moving; The map operation includes each original character in character string being mapped as corresponding mapping character, institute according to default mapping relations Stating mapping relations includes the corresponding relation of original character and mapping character;The reverse turn operation includes integrally carrying out character string instead Turn and inverted each original character in character string.
As shown in figure 11, Figure 11 is that query argument is tested in another URL of the disclosure according to an exemplary embodiment The block diagram of card device, on the basis of foregoing embodiment illustrated in fig. 10, the encrypted query parameter is based on described mixed the embodiment Close temporal information and derive parameter combination and obtain, the incorporation time information is based on by temporal information progress map operation and instead Turn operation to obtain, the derivative parameter is based on original query parameter carrying out map operation acquisition, second extraction module 102 Including:
First extracting sub-module 1021, be configured as extracting from the encrypted query parameter incorporation time information and The derivative parameter.
Very first time determination sub-module 1022, it is configured as the mapping character in the mixed processing temporal information by institute State default mapping relations and carry out reflection and penetrate;And will reflect that the character string for penetrating acquisition carries out reverse turn operation, obtain temporal information.
First parameter determination submodule 1023, it is configured as reflecting the mapping character in the derivative parameter by described preset The relation of penetrating carries out reflection and penetrated, and obtains original query parameter.
As shown in figure 12, Figure 12 is that query argument is tested in another URL of the disclosure according to an exemplary embodiment The block diagram of card device, on the basis of foregoing embodiment illustrated in fig. 10, the encrypted query parameter is based on described mixed the embodiment Close temporal information, designated character string and derivative parameter combination to obtain, the incorporation time information is based on carrying out temporal information Map operation and reverse turn operation obtain, and the derivative parameter is based on original query parameter carrying out map operation acquisition, and described the Two extraction modules 102 include:
Text string extracting submodule 1024, it is configured as extracting the designated character string from the encrypted query parameter.
Second extracting sub-module 1025, if the designated character string for being configured as being extracted meets well-formedness condition, from described The incorporation time information and the derivative parameter are extracted in encrypted query parameter.
Second time determination sub-module 1026, it is configured as the mapping character in the mixed processing temporal information by institute State default mapping relations and carry out reflection and penetrate, and will reflect that the character string for penetrating acquisition carries out reverse turn operation, obtain temporal information.
Second parameter determination submodule 1027, it is configured as reflecting the mapping character in the derivative parameter by described preset The relation of penetrating carries out reflection and penetrated, and obtains original query parameter.
Accordingly, the disclosure also provides a kind of server device, including:Processor;For storing, processor is executable to be referred to The memory of order;Wherein, the processor is configured as:
Receive when corresponding to the request of resource for accessing URL, extract the encrypted query parameter in URL, the encryption is looked into Ask original query gain of parameter of the parameter based on temporal information and for query resource;
Original query parameter and temporal information are extracted from the encrypted query parameter;
From default query argument and the corresponding relation of temporal information, search corresponding with the original query parameter extracted Target time information;
By the temporal information extracted compared with the target time information, encrypted query is verified according to comparative result Whether parameter is effective.
Accordingly, the disclosure also provides a kind of computer-readable recording medium, is stored thereon with computer program, the program The step of URL query arguments verification method described in any of the above-described is realized when being executed by processor.
The disclosure can use the storage medium for wherein including program code in one or more (to include but is not limited to disk Memory, CD-ROM, optical memory etc.) on the form of computer program product implemented.Computer-usable storage medium bag Permanent and non-permanent, removable and non-removable media is included, can realize that information stores by any method or technique.Letter Breath can be computer-readable instruction, data structure, the module of program or other data.The example bag of the storage medium of computer Include but be not limited to:Phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), Other kinds of random access memory (RAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus or any other non-biography Defeated medium, the information that can be accessed by a computing device available for storage.
The function of modules and the specific details of implementation process of effect, which are shown in, in said apparatus corresponds to step in the above method Implementation process, will not be repeated here.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part is real referring to method Apply the part explanation of example.Device embodiment described above is only schematical, wherein described be used as separating component The module of explanation can be or may not be physically separate, can be as the part that module is shown or can also It is not physical module, you can with positioned at a place, or can also be distributed on multiple mixed-media network modules mixed-medias.Can be according to reality Need to select some or all of module therein to realize the purpose of disclosure scheme.Those of ordinary skill in the art are not paying In the case of going out creative work, you can to understand and implement.
As shown in figure 13, Figure 13 be according to an exemplary embodiment it is a kind of be used for URL in query argument verify The block diagram of device.
For example, device 1300 may be provided in server device.Reference picture 13, device 1300 include processing component 1322, it further comprises one or more processors, and as the memory resource representated by memory 1332, for storing Can be by the instruction of the execution of processing component 1322, such as application program.The application program stored in memory 1332 can include It is one or more each correspond to the module of one group of instruction.In addition, processing component 1322 is configured as execute instruction, To perform query argument verification method in above-mentioned URL.
Device 1300 can also include a power supply module 1326 and be configured as the power management of performs device 1300, one Wired or wireless network interface 1350 is configured as device 1300 being connected to network, and input and output (I/O) interface 1358.Device 1300 can be operated based on the operating system for being stored in memory 1332.
Wherein, when the instruction in the memory 1332 is performed by the processing component 1322 so that the energy of device 1300 Query argument verification method in a kind of URL is enough performed, including:
Receive when corresponding to the request of resource for accessing URL, extract the encrypted query parameter in URL, the encryption is looked into Ask original query gain of parameter of the parameter based on temporal information and for query resource;
Original query parameter and temporal information are extracted from the encrypted query parameter;
From default query argument and the corresponding relation of temporal information, search corresponding with the original query parameter extracted Target time information;
By the temporal information extracted compared with the target time information, encrypted query is verified according to comparative result Whether parameter is effective.
Those skilled in the art will readily occur to the disclosure its after considering specification and putting into practice invention disclosed herein Its embodiment.The disclosure is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledges in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following Claim is pointed out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.
The preferred embodiment of the disclosure is the foregoing is only, not limiting the disclosure, all essences in the disclosure God any modification, equivalent substitution and improvements done etc., should be included within the scope of disclosure protection with principle.

Claims (16)

1. a kind of URL generation methods, it is characterised in that methods described includes:
Obtain temporal information and the original query parameter for inquiring about the resource;
The original query parameter is encrypted based on the temporal information, obtains encrypted query parameter;
URL corresponding to the resource is generated based on the encrypted query parameter.
2. according to the method for claim 1, it is characterised in that the temporal information includes the creation time of the URL, institute State the one or more in the creation time of original query parameter, the creation time of the resource.
3. method according to claim 1 or 2, it is characterised in that the encrypted query parameter is based on original query parameter With at least one of derivative parameter parameter and temporal information, shift time information, mapping time information, reversing time letter One or more parameter combinations obtain in breath, mixed processing temporal information;
Wherein, the shift time information is based on the temporal information carrying out circulative shift operation acquisition;The mapping time Information is based on the temporal information carrying out map operation acquisition;The reversing time information is based on carrying out the temporal information Reverse turn operation obtains;The mixed processing temporal information is based on the temporal information carrying out loopy moving operation, map operation Obtained with least two operations in reverse turn operation;The derivative parameter is based on the original query parameter carrying out cyclic shift Operation obtains, or based on the original query parameter is carried out into map operation acquisition, or based on the original query parameter is entered Row reverse turn operation obtains, or based on by the operation of original query parameter progress loopy moving, map operation and reverse turn operation At least two operation obtain;
The loopy moving operation includes each original character in character string specifying digit along assigned direction loopy moving;It is described Map operation includes each original character in character string being mapped as corresponding mapping character according to default mapping relations, described to reflect Penetrating relation includes the corresponding relation of original character and mapping character;The reverse turn operation include character string is integrally inverted with And each original character in character string is inverted.
4. according to the method for claim 3, it is characterised in that described that the original query is joined based on the temporal information Number is encrypted, and obtains encrypted query parameter, including:
Each original character in the temporal information is specified into digit along the assigned direction loopy moving;Reflected according to described preset Relation is penetrated, each original character in the original query parameter is mapped as corresponding mapping character;The displacement obtained will be shifted The derivative parameter that temporal information obtains with mapping is combined, and obtains encrypted query parameter;Or,
According to the default mapping relations, each original character in the temporal information is mapped as corresponding mapping character, obtained Obtain mapping time information;According to the default mapping relations, each original character in the original query parameter is mapped as pair The mapping character answered, obtain derivative parameter;The mapping time information obtained will be mapped and the derivative parameter of mapping acquisition carries out group Close, obtain encrypted query parameter;Or,
The temporal information is integrally inverted, and each character is inverted in the information that will invert acquisition, is inverted Temporal information;According to the default mapping relations, each original character in the reversing time information is mapped as corresponding reflect Character is penetrated, obtains mixed processing temporal information;, will be each original in the original query parameter according to the default mapping relations Character is mapped as corresponding mapping character, obtains derivative parameter;The derivative that the mixed processing temporal information is obtained with mapping Parameter is combined, and obtains encrypted query parameter.
5. according to the method for claim 3, it is characterised in that described that the original query is joined based on the temporal information Number is encrypted, and obtains encrypted query parameter, including:
The temporal information is integrally inverted, and each character is inverted in the temporal information that will invert acquisition, is obtained Reversing time information;
According to the default mapping relations, each original character in the reversing time information is mapped as corresponding mapping word Symbol, obtain mixed processing temporal information;
According to the default mapping relations, each original character in the original query parameter is mapped as corresponding mapping word Symbol, obtain derivative parameter;
The derivative parameter that designated character string, the mixed processing temporal information obtain with mapping is combined, encryption is obtained and looks into Ask parameter.
6. query argument verification method in a kind of URL, it is characterised in that methods described includes:
Receive when corresponding to the request of resource for accessing URL, extract the encrypted query parameter in URL, the encrypted query ginseng Base is in temporal information and original query gain of parameter for query resource;
Original query parameter and temporal information are extracted from the encrypted query parameter;
From default query argument and the corresponding relation of temporal information, mesh corresponding with the original query parameter extracted is searched Mark temporal information;
By the temporal information extracted compared with the target time information, encrypted query parameter is verified according to comparative result It is whether effective.
7. a kind of URL generating means, it is characterised in that described device includes:
Data obtaining module, it is configured as obtaining temporal information and the original query parameter for inquiring about the resource;
Information encrypting module, it is configured as that the original query parameter is encrypted based on the temporal information, is encrypted Query argument;
Information generating module, it is configured as generating URL corresponding to the resource based on the encrypted query parameter.
8. device according to claim 7, it is characterised in that the temporal information includes the creation time of the URL, institute State the one or more in the creation time of original query parameter, the creation time of the resource.
9. the device according to claim 7 or 8, it is characterised in that the encrypted query parameter is based on original query parameter With at least one of derivative parameter parameter and temporal information, shift time information, mapping time information, reversing time letter One or more parameter combinations obtain in breath, mixed processing temporal information;
Wherein, the shift time information is based on the temporal information carrying out circulative shift operation acquisition;The mapping time Information is based on the temporal information carrying out map operation acquisition;The reversing time information is based on carrying out the temporal information Reverse turn operation obtains;The mixed processing temporal information is based on the temporal information carrying out loopy moving operation, map operation Obtained with least two operations in reverse turn operation;The derivative parameter is based on the original query parameter carrying out cyclic shift Operation obtains, or based on the original query parameter is carried out into map operation acquisition, or based on the original query parameter is entered Row reverse turn operation obtains, or based on by the operation of original query parameter progress loopy moving, map operation and reverse turn operation At least two operation obtain;
The loopy moving operation includes each original character in character string specifying digit along assigned direction loopy moving;It is described Map operation includes each original character in character string being mapped as corresponding mapping character according to default mapping relations, described to reflect Penetrating relation includes the corresponding relation of original character and mapping character;The reverse turn operation include character string is integrally inverted with And each original character in character string is inverted.
10. device according to claim 9, it is characterised in that described information encrypting module is included with next sub- module:
First encryption submodule, is configured as each original character in the temporal information along the assigned direction loopy moving Specify digit;According to the default mapping relations, each original character in the original query parameter is mapped as corresponding reflect Penetrate character;The shift time information obtained will be shifted and the derivative parameter of mapping acquisition is combined, obtain encrypted query parameter;
Second encryption submodule, is configured as according to the default mapping relations, by each original character in the temporal information Corresponding mapping character is mapped as, obtains mapping time information;According to the default mapping relations, by the original query parameter In each original character be mapped as corresponding mapping character, obtain derivative parameter;The mapping time information obtained will be mapped with reflecting The derivative parameter for penetrating acquisition is combined, and obtains encrypted query parameter;
3rd encryption submodule, is configured as integrally being inverted the temporal information, and will be every in the information for inverting acquisition Individual character is inverted, and obtains reversing time information;, will be each in the reversing time information according to the default mapping relations Original character is mapped as corresponding mapping character, obtains mixed processing temporal information;According to the default mapping relations, by described in Each original character is mapped as corresponding mapping character in original query parameter, obtains derivative parameter;During by the mixed processing Between information and mapping obtain derivative parameter be combined, obtain encrypted query parameter.
11. device according to claim 9, it is characterised in that described information encrypting module includes:
Submodule is inverted, is configured as integrally being inverted the temporal information, and will be every in the temporal information for inverting acquisition Individual character is inverted, and obtains reversing time information;
First mapping submodule, it is configured as according to the default mapping relations, will be each original in the reversing time information Character is mapped as corresponding mapping character, obtains mixed processing temporal information;
Second mapping submodule, it is configured as according to the default mapping relations, will be each original in the original query parameter Character is mapped as corresponding mapping character, obtains derivative parameter;
Submodule is combined, is configured as the derivative parameter for obtaining designated character string, the mixed processing temporal information with mapping It is combined, obtains encrypted query parameter.
12. query argument verifies device in a kind of URL, it is characterised in that described device includes:
First extraction module, it is configured as receiving when corresponding to the request of resource for accessing URL, the encryption extracted in URL is looked into Ask parameter, original query gain of parameter of the encrypted query parameter based on temporal information and for query resource;
Second extraction module, it is configured as extracting original query parameter and temporal information from the encrypted query parameter;
Information inquiry module, it is configured as from default query argument and the corresponding relation of temporal information, searches with being extracted Original query parameter corresponding to target time information;
Information authentication module, the temporal information for being configured as being extracted compared with the target time information, according to than It is whether effective compared with result verification encrypted query parameter.
A kind of 13. server device, it is characterised in that including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Obtain temporal information and the original query parameter for inquiring about the resource;
The original query parameter is encrypted based on the temporal information, obtains encrypted query parameter;
URL corresponding to the resource is generated based on the encrypted query parameter.
A kind of 14. server device, it is characterised in that including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Receive when corresponding to the request of resource for accessing URL, extract the encrypted query parameter in URL, the encrypted query ginseng Base is in temporal information and original query gain of parameter for query resource;
Original query parameter and temporal information are extracted from the encrypted query parameter;
From default query argument and the corresponding relation of temporal information, mesh corresponding with the original query parameter extracted is searched Mark temporal information;
By the temporal information extracted compared with the target time information, encrypted query parameter is verified according to comparative result It is whether effective.
15. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is by processor The step of any one of claim 1 to 5 methods described is realized during execution.
16. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is by processor The step of claim 6 methods described is realized during execution.
CN201710834278.2A 2017-09-15 2017-09-15 URL (Uniform resource locator) generation and query parameter verification method, device, equipment and storage medium Active CN107707532B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710834278.2A CN107707532B (en) 2017-09-15 2017-09-15 URL (Uniform resource locator) generation and query parameter verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710834278.2A CN107707532B (en) 2017-09-15 2017-09-15 URL (Uniform resource locator) generation and query parameter verification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN107707532A true CN107707532A (en) 2018-02-16
CN107707532B CN107707532B (en) 2022-05-13

Family

ID=61172620

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710834278.2A Active CN107707532B (en) 2017-09-15 2017-09-15 URL (Uniform resource locator) generation and query parameter verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN107707532B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650183A (en) * 2018-05-15 2018-10-12 南京邮电大学 A kind of unmanned plane information query system based on Web dynamic routing matching techniques
CN110061967A (en) * 2019-03-15 2019-07-26 平安科技(深圳)有限公司 Business datum providing method, device, equipment and computer readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100192210A1 (en) * 2009-01-26 2010-07-29 Apple Inc. Method and system for verifying entitlement to access content by url validation
US20120124372A1 (en) * 2010-10-13 2012-05-17 Akamai Technologies, Inc. Protecting Websites and Website Users By Obscuring URLs
CN102594557A (en) * 2012-01-10 2012-07-18 深圳市汉普电子技术开发有限公司 Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL
CN103067156A (en) * 2012-12-28 2013-04-24 北京移数通电讯有限公司 Uniform resource locator (URL) encryption and validation method for mobile internet user resource access and device provided with the same
CN104009989A (en) * 2014-05-22 2014-08-27 Tcl集团股份有限公司 Link-stealing-prevention method and system for media files and server
US9075778B1 (en) * 2011-07-15 2015-07-07 Google Inc. Predicting user navigation events within a browser
CN106101133A (en) * 2016-07-14 2016-11-09 观止云(北京)信息技术有限公司 A kind of method and system of Streaming Media door chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100192210A1 (en) * 2009-01-26 2010-07-29 Apple Inc. Method and system for verifying entitlement to access content by url validation
US20120124372A1 (en) * 2010-10-13 2012-05-17 Akamai Technologies, Inc. Protecting Websites and Website Users By Obscuring URLs
CN103229181A (en) * 2010-10-13 2013-07-31 阿卡麦科技公司 Protecting websites and website users by obscuring URLs
US9075778B1 (en) * 2011-07-15 2015-07-07 Google Inc. Predicting user navigation events within a browser
CN102594557A (en) * 2012-01-10 2012-07-18 深圳市汉普电子技术开发有限公司 Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL
CN103067156A (en) * 2012-12-28 2013-04-24 北京移数通电讯有限公司 Uniform resource locator (URL) encryption and validation method for mobile internet user resource access and device provided with the same
CN104009989A (en) * 2014-05-22 2014-08-27 Tcl集团股份有限公司 Link-stealing-prevention method and system for media files and server
CN106101133A (en) * 2016-07-14 2016-11-09 观止云(北京)信息技术有限公司 A kind of method and system of Streaming Media door chain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650183A (en) * 2018-05-15 2018-10-12 南京邮电大学 A kind of unmanned plane information query system based on Web dynamic routing matching techniques
CN110061967A (en) * 2019-03-15 2019-07-26 平安科技(深圳)有限公司 Business datum providing method, device, equipment and computer readable storage medium
CN110061967B (en) * 2019-03-15 2022-02-22 平安科技(深圳)有限公司 Service data providing method, device, equipment and computer readable storage medium

Also Published As

Publication number Publication date
CN107707532B (en) 2022-05-13

Similar Documents

Publication Publication Date Title
JP7467456B2 (en) SYSTEM AND METHOD FOR EFFICIENT AND SECURE PROCESSING, ACCESSING, AND TRANSMITTING DATA VIA A BLOCKCHAIN NETWORK
CN111930881B (en) Connection keyword authentication searchable encryption method based on state cryptographic algorithm
CN108170753A (en) A kind of method of Key-Value data base encryptions and Safety query in shared cloud
CN107707532A (en) URL generations, query argument verification method, device, equipment and storage medium
Wang et al. A multi-keyword searchable encryption sensitive data trusted sharing scheme in multi-user scenario
CN114629713B (en) Identity verification method, device and system
Huang et al. Privacy-Preserving Data Search in Cloud Storage
Fang et al. Practical Verification of Data Encryption for Cloud Storage Services
Zhao et al. Obric: Oblivious Keyword Search in Hyperledger Fabric Platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant