CN107707532A - URL generations, query argument verification method, device, equipment and storage medium - Google Patents
URL generations, query argument verification method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN107707532A CN107707532A CN201710834278.2A CN201710834278A CN107707532A CN 107707532 A CN107707532 A CN 107707532A CN 201710834278 A CN201710834278 A CN 201710834278A CN 107707532 A CN107707532 A CN 107707532A
- Authority
- CN
- China
- Prior art keywords
- parameter
- temporal information
- original
- character
- query parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The disclosure, which provides a kind of URL generations, query argument verification method, device, equipment and storage medium, the URL generation methods, to be included:Obtain temporal information and the original query parameter for inquiring about the resource;The original query parameter is encrypted based on the temporal information, obtains encrypted query parameter;URL corresponding to the resource is generated based on the encrypted query parameter.Query argument is encrypted using temporal information for the present embodiment, the difficulty that encrypted query parameter is cracked can be increased, increase disabled user speculates the difficulty of other query arguments using existing encrypted query parameter, so as to avoid disabled user from accessing resource by forging URL, and then improve the security of resource.
Description
Technical field
The application is related to communication technical field, more particularly to URL generations, query argument verification method, device, equipment and deposits
Storage media.
Background technology
With the fast development of Internet technology, URL (or uniform resource locator/positioning address,
URL addresses etc., English:Uniform Resource Locator, are often abbreviated as URL) turn into access, positioning and call network clothes
The main stream approach for resource of being engaged in.URL can be the address of standard resource on internet, on internet every kind of resource have one it is unique
URL.
URL can include transportation protocol, server (being usually domain name, be sometimes IP address), port numbers, path and inquiry
The parts such as parameter.In traditional URL communication modes, query argument is typically write in URL in clear text manner, disabled user
Other query arguments are easily deduced according to clear text queries parameter, then forge URL using the query argument deduced, and utilize
The URL of forgery sends the request for accessing resource to service end, and service end can not judge the true and false of this request, this mode
Do not possess security, easily cause resource leakage.
The content of the invention
To overcome problem present in correlation technique, present disclose provides URL generations, query argument verification method, device,
Equipment and storage medium.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of URL generation methods, methods described include:
Obtain temporal information and the original query parameter for inquiring about the resource;
The original query parameter is encrypted based on the temporal information, obtains encrypted query parameter;
URL corresponding to the resource is generated based on the encrypted query parameter.
In an optional implementation, the temporal information includes creation time, the original query of the URL
One or more in the creation time of parameter, the creation time of the resource.
In an optional implementation, the encrypted query parameter is based in original query parameter and derivative parameter
At least one parameter and temporal information, shift time information, mapping time information, reversing time information, mixed processing time
One or more parameter combinations obtain in information;
Wherein, the shift time information is based on the temporal information carrying out circulative shift operation acquisition;The mapping
Temporal information is based on the temporal information carrying out map operation acquisition;The reversing time information is based on the temporal information
Carry out reverse turn operation acquisition;The mixed processing temporal information is based on the temporal information carrying out loopy moving operation, mapping
At least two operations in operation and reverse turn operation obtain;The derivative parameter is based on being circulated the original query parameter
Shifting function obtains, or based on the original query parameter is carried out into map operation acquisition, or based on the original query is joined
Number carries out reverse turn operation acquisition, or is grasped based on the original query parameter is carried out into loopy moving operation, map operation and reversion
At least two operations in work obtain;
The loopy moving operation includes each original character in character string specifying digit along assigned direction loopy moving;
The map operation includes each original character in character string being mapped as corresponding mapping character, institute according to default mapping relations
Stating mapping relations includes the corresponding relation of original character and mapping character;The reverse turn operation includes integrally carrying out character string instead
Turn and inverted each original character in character string.
It is described that the original query parameter is added based on the temporal information in an optional implementation
It is close, encrypted query parameter is obtained, including:
Each original character in the temporal information is specified into digit along the assigned direction loopy moving;According to described pre-
If mapping relations, each original character in the original query parameter is mapped as corresponding mapping character;It will shift what is obtained
The derivative parameter that shift time information obtains with mapping is combined, and obtains encrypted query parameter;Or,
According to the default mapping relations, each original character in the temporal information is mapped as corresponding mapping word
Symbol, obtain mapping time information;According to the default mapping relations, each original character in the original query parameter is mapped
For corresponding mapping character, derivative parameter is obtained;The mapping time information obtained will be mapped and the derivative parameter of mapping acquisition is entered
Row combination, obtains encrypted query parameter;Or,
The temporal information is integrally inverted, and each character is inverted in the information that will invert acquisition, is obtained
Reversing time information;According to the default mapping relations, each original character in the reversing time information is mapped as correspondingly
Mapping character, obtain mixed processing temporal information;, will be each in the original query parameter according to the default mapping relations
Original character is mapped as corresponding mapping character, obtains derivative parameter;The mixed processing temporal information is obtained with mapping
Derivative parameter is combined, and obtains encrypted query parameter.
It is described that the original query parameter is added based on the temporal information in an optional implementation
It is close, encrypted query parameter is obtained, including:
The temporal information is integrally inverted, and each character is inverted in the temporal information that will invert acquisition,
Obtain reversing time information;
According to the default mapping relations, each original character in the reversing time information is mapped as corresponding mapping
Character, obtain mixed processing temporal information;
According to the default mapping relations, each original character in the original query parameter is mapped as corresponding mapping
Character, obtain derivative parameter;
The derivative parameter that designated character string, the mixed processing temporal information obtain with mapping is combined, added
Close query argument.
According to the second aspect of the embodiment of the present disclosure, there is provided query argument verification method in a kind of URL, methods described bag
Include:
Receive when corresponding to the request of resource for accessing URL, extract the encrypted query parameter in URL, the encryption is looked into
Ask original query gain of parameter of the parameter based on temporal information and for query resource;
Original query parameter and temporal information are extracted from the encrypted query parameter;
From default query argument and the corresponding relation of temporal information, search corresponding with the original query parameter extracted
Target time information;
By the temporal information extracted compared with the target time information, encrypted query is verified according to comparative result
Whether parameter is effective.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of URL generating means, described device include:
Data obtaining module, it is configured as obtaining temporal information and the original query parameter for inquiring about the resource;
Information encrypting module, it is configured as that the original query parameter is encrypted based on the temporal information, obtains
Encrypted query parameter;
Information generating module, it is configured as generating URL corresponding to the resource based on the encrypted query parameter.
In an optional implementation, the temporal information includes creation time, the original query of the URL
One or more in the creation time of parameter, the creation time of the resource.
In an optional implementation, the encrypted query parameter is based in original query parameter and derivative parameter
At least one parameter and temporal information, shift time information, mapping time information, reversing time information, mixed processing time
One or more parameter combinations obtain in information;
Wherein, the shift time information is based on the temporal information carrying out circulative shift operation acquisition;The mapping
Temporal information is based on the temporal information carrying out map operation acquisition;The reversing time information is based on the temporal information
Carry out reverse turn operation acquisition;The mixed processing temporal information is based on the temporal information carrying out loopy moving operation, mapping
At least two operations in operation and reverse turn operation obtain;The derivative parameter is based on being circulated the original query parameter
Shifting function obtains, or based on the original query parameter is carried out into map operation acquisition, or based on the original query is joined
Number carries out reverse turn operation acquisition, or is grasped based on the original query parameter is carried out into loopy moving operation, map operation and reversion
At least two operations in work obtain;
The loopy moving operation includes each original character in character string specifying digit along assigned direction loopy moving;
The map operation includes each original character in character string being mapped as corresponding mapping character, institute according to default mapping relations
Stating mapping relations includes the corresponding relation of original character and mapping character;The reverse turn operation includes integrally carrying out character string instead
Turn and inverted each original character in character string.
In an optional implementation, described information encrypting module is included with next sub- module:
First encryption submodule, is configured as circulating each original character in the temporal information along the assigned direction
Mobile specified digit;According to the default mapping relations, each original character in the original query parameter is mapped as correspondingly
Mapping character;The shift time information obtained will be shifted and the derivative parameter of mapping acquisition is combined, obtain encrypted query
Parameter;
Second encryption submodule, is configured as according to the default mapping relations, will be each original in the temporal information
Character is mapped as corresponding mapping character, obtains mapping time information;According to the default mapping relations, by the original query
Each original character is mapped as corresponding mapping character in parameter, obtains derivative parameter;The mapping time information obtained will be mapped
The derivative parameter obtained with mapping is combined, and obtains encrypted query parameter;
3rd encryption submodule, is configured as integrally being inverted the temporal information, and will invert the information obtained
In each character inverted, obtain reversing time information;According to the default mapping relations, by the reversing time information
Each original character is mapped as corresponding mapping character, obtains mixed processing temporal information;, will according to the default mapping relations
Each original character is mapped as corresponding mapping character in the original query parameter, obtains derivative parameter;At the mixing
The derivative parameter that reason temporal information obtains with mapping is combined, and obtains encrypted query parameter.
In an optional implementation, described information encrypting module includes:
Submodule is inverted, is configured as integrally being inverted the temporal information, and the temporal information obtained will be inverted
In each character inverted, obtain reversing time information;
First mapping submodule, it is configured as according to the default mapping relations, will be each in the reversing time information
Original character is mapped as corresponding mapping character, obtains mixed processing temporal information;
Second mapping submodule, it is configured as according to the default mapping relations, will be each in the original query parameter
Original character is mapped as corresponding mapping character, obtains derivative parameter;
Submodule is combined, is configured as the derivative for obtaining designated character string, the mixed processing temporal information with mapping
Parameter is combined, and obtains encrypted query parameter.
According to the fourth aspect of the embodiment of the present disclosure, there is provided query argument verifies device, described device bag in a kind of URL
Include:
First extraction module, be configured as receiving when corresponding to the request of resource for accessing URL, extract it is in URL plus
Close query argument, original query gain of parameter of the encrypted query parameter based on temporal information and for query resource;
Second extraction module, it is configured as extracting original query parameter and temporal information from the encrypted query parameter;
Information inquiry module, it is configured as from default query argument and the corresponding relation of temporal information, lookup and institute
Target time information corresponding to the original query parameter of extraction;
Information authentication module, the temporal information for being configured as being extracted is compared with the target time information, root
It is whether effective according to comparative result checking encrypted query parameter.
According to the 5th of the embodiment of the present disclosure the aspect, there is provided a kind of server device, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Obtain temporal information and the original query parameter for inquiring about the resource;
The original query parameter is encrypted based on the temporal information, obtains encrypted query parameter;
URL corresponding to the resource is generated based on the encrypted query parameter.
According to the 6th of the embodiment of the present disclosure the aspect, there is provided a kind of server device, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Receive when corresponding to the request of resource for accessing URL, extract the encrypted query parameter in URL, the encryption is looked into
Ask original query gain of parameter of the parameter based on temporal information and for query resource;
Original query parameter and temporal information are extracted from the encrypted query parameter;
From default query argument and the corresponding relation of temporal information, search corresponding with the original query parameter extracted
Target time information;
By the temporal information extracted compared with the target time information, encrypted query is verified according to comparative result
Whether parameter is effective.
According to the 7th of the embodiment of the present disclosure the aspect, there is provided a kind of computer-readable recording medium, be stored thereon with calculating
Machine program, the program realizes URL generation methods described in any of the above-described when being executed by processor the step of.
According to the eighth aspect of the embodiment of the present disclosure, there is provided a kind of computer-readable recording medium, be stored thereon with calculating
Machine program, the program realizes query argument verification method in URL described in any of the above-described when being executed by processor the step of.
The technical scheme provided by this disclosed embodiment can include the following benefits:
The embodiment of the present disclosure provides a kind of URL generations scheme, and query argument is carried out using temporal information in this scenario
Encryption, the complexity of encrypted query parameter, the difficulty that increase encrypted query parameter is cracked can be increased, and then increase illegal use
Family speculates the difficulty of other query arguments using existing encrypted query parameter, so as to avoid disabled user from passing through forgery
URL accesses resource, and then improves the security of resource.
The embodiment of the present disclosure provides query argument proof scheme in a kind of URL, by will be extracted from encrypted query parameter
Temporal information compared with target time information corresponding to original query parameter reality, judge that encryption is looked into according to comparative result
Whether effective ask parameter, and then can determine whether URL is effective, avoid forgery URL from causing resource unsafe condition.
It should be appreciated that the general description and following detailed description of the above are only exemplary and explanatory, not
The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the disclosure
Example, and be used to together with specification to explain the principle of the disclosure.
Fig. 1 is a kind of application scenario diagram of the disclosure according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of URL generation method of the disclosure according to an exemplary embodiment.
Fig. 3 A are the flows of query argument verification method in a kind of URL of the disclosure according to an exemplary embodiment
Figure.
Fig. 3 B are a kind of interactive schematic diagram of the disclosure according to an exemplary embodiment.
Fig. 4 is a kind of block diagram of URL generating means of the disclosure according to an exemplary embodiment.
Fig. 5 to Fig. 8 is the block diagram of another URL generating means of the disclosure according to an exemplary embodiment.
Fig. 9 is a kind of block diagram of device for URL generation of the disclosure according to an exemplary embodiment.
Figure 10 is the block diagram of query argument checking device in a kind of URL of the disclosure according to an exemplary embodiment.
Figure 11 and Figure 12 is that query argument verifies device in another URL of the disclosure according to an exemplary embodiment
Block diagram.
Figure 13 is a kind of device that is used in URL query argument checking of the disclosure according to an exemplary embodiment
Block diagram.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the disclosure.
It is only merely for the purpose of description specific embodiment in the term that the disclosure uses, and is not intended to be limiting the disclosure.
" one kind " of singulative used in disclosure and the accompanying claims book, " described " and "the" are also intended to including majority
Form, unless context clearly shows that other implications.It is also understood that term "and/or" used herein refers to and wrapped
Containing the associated list items purpose of one or more, any or all may be combined.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the disclosure
A little information should not necessarily be limited by these terms.These terms are only used for same type of information being distinguished from each other out.For example, do not departing from
In the case of disclosure scope, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as
One information.Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determining ".
URL is commonly called as web page address, is the address of the resource of standard on internet.For example, URL form can be:Association
Discuss type:[// [accesses the credential information@that resource needs] server address [:Port numbers]] [/ resource level unix file road
Footpath] filename [Inquiry] [# fragments ID].Wherein it is possible to including part be:
Transportation protocol (such as http)
Level URL label symbols (for [//], immobilize)
Access the credential information (can omit) that resource needs
Server (being usually domain name, be sometimes IP address)
Port numbers (represent in a digital manner, if HTTP default value ":80 " can omit)
(each directory name in path is distinguished with "/" character) in path
Inquiry (the forms parameter of GET patterns, be properly termed as argument section, search part, inquiry unit grade, with "" character
For starting point, each parameter can be separated with " & ", then separate parameter name and data with "=", can be encoded with UTF8 URL,
The problem of avoiding character conflict)
Fragment (often using " # " character as starting point, part to the last can be anchor section)
It is understood that wherein access credentials information, port numbers, fragment etc. belong to optional part, it is not composition URL
Necessary component.Query portion includes the original query parameter for query resource, due to separating parameter name with "="
With data, then original query parameter can be including the data on the right of "=", for example, original query parameter can include ID value.
For example, https://item.mi.com/product.doIn id=10000030, id value 10000030 is
The original query parameter of plaintext.
And for example, ftp://prep.ai.mit.edu/pub/gnu;Type=dIn item=123, item value 123 is
For the original query parameter of plaintext.
As shown in figure 1, Fig. 1 is a kind of application scenario diagram of the disclosure according to an exemplary embodiment.In the application
In scene, new resource can be added in service end, and URL is created for the new resources, URL is issued to each client, respectively
Individual client can send the request that resource is corresponded to for accessing URL to service end according to the triggering command received, so as to
The resource corresponding to request URL from service end.Because query argument can be used for inquiring about resource to be visited, and URL other compositions
In the case that part is constant, different resources to be visited is may have access to by the query argument changed in URL.For example, it is based on
Above-mentioned URL:https://item.mi.com/product.doId=10000030, it is as follows URL can be forged:
https://item.mi.com/product.doId=10000031
https://item.mi.com/product.doId=10000032
…
https://item.mi.com/product.doId=10000099
If in consideration of it, query argument is write in URL in clear text manner, disabled user easily joins according to clear text queries
Number deduces other query arguments, then forges URL using the query argument deduced, and have access to entirely using the URL of forgery
Portion's resource, this mode do not possess security, easily cause resource leakage.For example, disabled user may be accessed by forging URL
To the resource do not issued or do not expected user and see.
In order to avoid the unsafe problem of above-mentioned resource, the embodiment of the present disclosure provides a kind of URL generations scheme, in the program
It is middle that query argument is encrypted using temporal information, the complexity of query argument can be increased, and then increase disabled user's profit
The difficulty of other query arguments is speculated with existing encrypted query parameter, so as to avoid disabled user from being visited by forging URL
Resource is asked, and then improves the security of resource.
Next the embodiment of the present disclosure is illustrated with reference to accompanying drawing.
As shown in Fig. 2 Fig. 2 is a kind of flow chart of URL generation method of the disclosure according to an exemplary embodiment,
It may comprise steps of:
In step 201, temporal information and the original query parameter for inquiring about the resource are obtained.
In step 202, the original query parameter is encrypted based on the temporal information, obtains encrypted query ginseng
Number;
In step 203, URL corresponding to the resource is generated based on the encrypted query parameter.
As one of which implementation, the embodiment of the present disclosure can be applied in service end, and service end can be service
Device, server cluster, cloud server terminal etc..After service end generation URL, URL can be issued to corresponding client, so as to user
Based on client request and check resource corresponding to URL.
On URL generation opportunity, URL can be generated when creating new resources, after new resources are created and can also connect
URL etc. is generated when receiving URL generation instructions, generation opportunity of the present embodiment to URL is not limited.
During URL corresponding to generation resource, the original query parameter for inquiring about the resource can be obtained.It is original
Query argument can be based on default parameter generation strategy and obtain.In one example, can be in establishing resource based on establishment
Resource is numbered order, so as to the new resources distribution original query parameter to create, such as ID.In another example,
Center requests original query parameter can be generated to parameter in establishing resource, so as to obtain the original query parameter of new resources
Deng.
In order to which strengthen original query parameter cracks difficulty, temporal information can also be obtained.Time corresponding to different URL believes
Breath can be different, particularly, for other components are identical, the only different URL of original query parameter, its corresponding time letter
Breath can be different.Again because temporal information complexity itself is stronger, therefore time information encryption original query parameter is utilized, can be with
Strengthen the complexity of original query parameter, the difficulty of original query parameter is forged in increase.
Wherein, temporal information is the information for describing the time, for example, the form of temporal information can be:During the date
Every minute and second, such as:20170804000000.It can be seen that complexity can be strengthened using the temporal information of this form.
In one example, temporal information can obtain in random generation during URL corresponding to generation resource.Due to
The randomness of machine generation is stronger, then disabled user is difficult to deduce the temporal information generated at random.
In another example, temporal information can be creation time, for example, the temporal information includes the URL's
One or more in creation time, the creation time of the original query parameter, the creation time of the resource.It is if a variety of
When creation time combines, it can be combined according to specified order, so that later use specifies order is counter to be solved.If three kinds
Creation time is identical, then can select one as temporal information.
It can be seen that the embodiment is by the use of creation time as temporal information, because creation time corresponding to every resource compares
It is stable, and the creation time of different resource data is most of different, for using identical creation time compared to different resource,
Former improve the difficulty that encrypted query parameter is cracked.
After temporal information is obtained, the corresponding relation of original query parameter and temporal information can be recorded, is easy to follow-up profit
URL checkings are carried out with corresponding relation.
Obtain temporal information purpose be in order to which original query parameter is encrypted, it is original to avoid disabled user from cracking
Query argument., can be by temporal information or based on the derivation information that temporal information obtains and original as one of which cryptographic means
Beginning query argument is combined, so as to obtain encrypted query parameter., can be by temporal information or base as another cryptographic means
In the derivation information (parameter of type one) that temporal information obtains, with original query parameter or spreading out based on original query gain of parameter
Raw parameter (parameter of type two) is combined, so as to obtain encrypted query parameter.When encrypted query parameter is joined based on polytype
When array closes acquisition, all kinds parameter can be combined using combined strategy, for example, combined strategy can be able to be by finger
After fixed order arranges or one of which type parameter is inserted into the default position character of another type parameter, may be used also
It is numerous to list herein to be other combinations.
In an optional implementation, the encrypted query parameter is based in original query parameter and derivative parameter
At least one parameter and temporal information, shift time information, mapping time information, reversing time information, mixed processing time
At least one of information parameter combination obtains.It can be seen that can at least it be selected from original query parameter and derivative parameter a kind of
Parameter, from temporal information, shift time information, mapping time information, reversing time information, mixed processing temporal information at least
A kind of parameter is selected, selected parameter is combined, you can obtains encrypted query parameter.When encrypted query parameter is including more
During kind parameter, many kinds of parameters can be arranged in certain sequence, so as to obtain encrypted query parameter, and it is suitable to record the arrangement
Sequence;After one of which parameter can also be inserted into the default position character of another information, and record this insertion relation etc..
Wherein, the shift time information can be based on the temporal information carrying out circulative shift operation acquisition, described
Loopy moving operation includes each original character in character string specifying digit along assigned direction loopy moving.Temporal information can be with
A character string, each character in temporal information is properly termed as original character, in order to in follow-up mapping relations
Mapping character make a distinction.Assigned direction can be leftward or rightward, and specified digit can be preset, it is assumed that temporal information
In original character number be n, then it can be Any Digit in 1 to n-1 to specify digit.For example, it is assumed that temporal information is
" 20170804123021 ", assigned direction are 3 to the right, to specify digit, then the shift time information after shifting is
“02120170804123”。
The mapping time information can be based on the temporal information carrying out map operation acquisition, the map operation bag
Include and each original character in character string is mapped as corresponding mapping character according to default mapping relations, the mapping relations include
The corresponding relation of original character and mapping character.Temporal information can be a character string, and original character can in temporal information
To be referred to as original character.Default mapping relations can be the mapping relations constructed in advance, and mapping relations can be based on random configuration
Obtain, user instruction construction can also be based on and obtained.
Default mapping relations can be constructed based on the type of original character, and type can be by numeral, letter, symbol etc.
Divided.For example, if original character only includes numerical character, digital mapping relations are built, if original character includes
The different type character such as numerical character and alphabetic character, then build corresponding mapping relations for different type character.Numeral is right
The mapping character answered can be digital or alphabetical grade other characters different from the numeral, mapping word corresponding to letter
Symbol can be alphabetical or digital grade other characters different from the letter.It is understood that in mapping relations, no
It is different with mapping character corresponding to original character, corresponded with realizing.Hereinafter signal is carried out by taking digital mapping relations as an example to say
It is bright:
'0'->'9'
'1'->'D'
'2'->'N'
'3'->'Q'
'4'->'H'
'5'->'2'
'6'->'E'
'7'->'A'
'8'->'B'
'9'->'0'
In one example, after presetting mapping relations structure, all original query parameters are using the default mapping relations.
In another example, in order to be further ensured that the security of original query parameter, for different storage zone
The different default mapping relations of the use such as resource or different type resource that resource or different time sections create, and
After obtaining for inquiring about the original query parameter of the resource, the relation of the default mapping relations and original query parameter is recorded, with
Continue to get in verification process after an action of the bowels and mapping relations are preset corresponding to original query parameter, utilize corresponding default mapping relations
Carry out reflection to penetrate, recovery time information.
The reversing time information is based on the temporal information carrying out reverse turn operation acquisition, and the reverse turn operation includes will
Character string is integrally inverted and is inverted each original character in character string.For example, can be first whole by temporal information
Body is inverted, and is then inverted each character in the information after reversion, obtains reversing time information;And for example, Ke Yixian
Each original character in temporal information is inverted, then integrally inverted the information after reversion, obtains reversing time
Information.For effect, equivalent to i-th of original character in character string is exchanged with (N-i+1) individual character and (replaced
Change), wherein, N is the number of the original character of character string, and i is integer, andFor example, it is assumed that temporal information is
" 20170804000000 ", then the reversing time information after reverse turn operation is " 00000040807102 ".
It can be seen that after temporal information is carried out into reverse turn operation, the reversing time information of acquisition is difficult to find out relevant with the time, is carried
High the information is deduced from reversing time information is that the reversion of passage time information obtains, and then improves and crack query argument
Difficulty.
It should be appreciated that above-mentioned circulative shift operation, map operation and reverse turn operation can also be combined, then it is described
Mixed processing temporal information is based on the temporal information is carried out in loopy moving operation, map operation and reverse turn operation at least
Two kinds of operations are obtained, and a variety of operations are carried out to temporal information so as to realize.The execution sequence of operations can not be limited.Example
Such as, the mixed processing temporal information is based on the temporal information carrying out loopy moving operation and map operation obtains;And for example,
Mixed processing temporal information is based on the temporal information carrying out loopy moving operation and reverse turn operation obtains;And for example, at mixing
Temporal information is managed to be based on the temporal information carrying out map operation and reverse turn operation acquisition;And for example, mixed processing temporal information
Obtained etc. based on the temporal information is carried out into loopy moving operation, map operation and reverse turn operation.
On derivative parameter, derivative parameter is based on original query gain of parameter, for example, can be based on the original query
Parameter carries out circulative shift operation acquisition, can also be based on the original query parameter carrying out map operation acquisition, can be with
Based on the original query parameter is carried out into reverse turn operation acquisition, or even it is also based on being followed the original query parameter
At least two operations in ring moving operation, map operation and reverse turn operation obtain, and derivative gain of parameter mode is with being based on the time
Derivation information mode that information derives (such as shift time information, mapping time information, reversing time information, mixed processing
Temporal information) it is similar, it is numerous to list herein.Character in original query parameter is referred to as original character.
At least selected first, and the time from original query parameter and in the derivative parameter based on the original query gain of parameter
One or more parameters in information, shift time information, mapping time information, mixed processing temporal information are combined, can
To obtain multiple combinations, every kind of combination can obtain corresponding encrypted query parameter.
Illustrated below with wherein several combinations.
The first combination:The encrypted query parameter is based on shift time information and original query parameter combination obtains
.
It is described that the original query parameter is encrypted based on the temporal information, encrypted query parameter is obtained, including:
Each original character in the temporal information is specified into digit along the assigned direction loopy moving;
The shift time information for shifting acquisition is combined with original query parameter, obtains encrypted query parameter.
Wherein, in one example, can be suitable by specifying when shift time information and original query parameter being combined
Sequence is arranged, such as is combined by the order of shift time information+original query parameter, it is assumed that shift time information is
" 02120170804123 ", it is assumed that original query parameter is " 3 ", then the encrypted query parameter for combining acquisition is
“021201708041233”.In another example, original query parameter can be inserted into shift time information and preset position word
Fu Hou, such as default position is 5, then after original query parameter being inserted into the 5th character of shift time information, obtains encrypted query
Parameter " 021203170804123 ".It can be seen that by way of insertion, the possibility that makes the encrypted query parameter of acquisition be cracked
It is lower.
Second of combination:The encrypted query parameter is based on shift time information and derivative parameter combination obtains.
The embodiment is exemplified by deriving parameter as based on the original query parameter is carried out into the parameter of map operation acquisition
Illustrate.It is described that the original query parameter is encrypted based on the temporal information, obtain encrypted query parameter, bag
Include:
Each original character in the temporal information is specified into digit along the assigned direction loopy moving;
According to the default mapping relations, each original character in the original query parameter is mapped as corresponding mapping
Character;
The shift time information obtained will be shifted and the derivative parameter of mapping acquisition is combined, obtain encrypted query ginseng
Number.
In the embodiment, it is combined by the derivative parameter for obtaining shift time information with mapping, makes adding for acquisition
The difficulty that close query argument is cracked is bigger.
The third combination:The encrypted query parameter is based on mapping time information and derivative parameter combination obtains.
The embodiment is exemplified by deriving parameter as based on the original query parameter is carried out into the parameter of map operation acquisition
Illustrate.It is described that the original query parameter is encrypted based on the temporal information, obtain encrypted query parameter, bag
Include:
According to the default mapping relations, each original character in the temporal information is mapped as corresponding mapping word
Symbol, obtain mapping time information;
According to the default mapping relations, each original character in the original query parameter is mapped as corresponding mapping
Character, obtain derivative parameter;
The mapping time information obtained will be mapped and the derivative parameter of mapping acquisition is combined, obtain encrypted query ginseng
Number.
Wherein, temporal information is carried out presetting mapping relations used by map operation, with carrying out original query parameter
Mapping relations are preset used by map operation, be able to can also be differed with identical, the present embodiment carries out example exemplified by identical
Explanation.
4th kind of combination:The encrypted query parameter is based on mixed processing temporal information and derivative parameter combination obtains
.
The embodiment is exemplified by deriving parameter as based on the original query parameter is carried out into the parameter of map operation acquisition
Illustrate.It is described that the original query parameter is encrypted based on the temporal information, obtain encrypted query parameter, bag
Include:
The temporal information is subjected to reverse turn operation and obtains reversing time information, for example, the temporal information is integrally entered
Row reversion, and each character is inverted in the information that will invert acquisition, obtains reversing time information;
According to the default mapping relations, each original character in the reversing time information is mapped as corresponding mapping
Character, obtain mixed processing temporal information;
According to the default mapping relations, each original character in the original query parameter is mapped as corresponding mapping
Character, obtain derivative parameter;
The derivative parameter that the mixed processing temporal information obtains with mapping is combined, obtains encrypted query parameter.
Wherein, after temporal information is integrally inverted, not only the position of each character is modified, and each character also enters
Reversion is gone, for this reason, it may be necessary to which each character after reversion is inverted back into correct direction again.
It can be seen that being combined by the derivative parameter for obtaining mixed processing temporal information with mapping, complexity can be obtained
The higher encrypted query parameter of degree, so as to avoid encrypted query parameter from being cracked by disabled user.
It is understood that above-mentioned only include several combinations, other combinations are can also be, herein not one by one
Enumerate.
In another optional implementation, the encrypted query parameter is also obtained based on designated character string.Its middle finger
It can be magic numeral to determine character string, can be a fixed character string e.g., arbitrarily set according to demand, can be with after setting
Do not rechange, so as to later use, the character string carries out query argument preliminary identification.In consideration of it, the encrypted query parameter is based on
At least one of original query parameter and derivative parameter parameter and designated character string and temporal information, shift time letter
At least one of breath, mapping time information, reversing time information, mixed processing temporal information gain of parameter.It can be seen that encrypted query
Parameter is influenceed by three class parameters, and one kind is that at least one of original query parameter and derivative parameter parameter, one kind are designated words
Symbol string, one kind are to specify character string and temporal information, shift time information, mapping time information, reversing time information, mixed
At least one of processing time information parameter is closed, and then is understood, encrypted query parameter is not only with original query relating to parameters but also with referring to
It is relevant, also relevant with temporal information to determine character string, so as to increase the complexity of encrypted query parameter.It is exemplified below one of which group
Conjunction is illustrated.
5th kind of combination:It is described that the original query parameter is encrypted based on the temporal information, added
Close query argument, including:
The temporal information is subjected to reverse turn operation and obtains reversing time information, for example, the temporal information is integrally entered
Row reversion, and each character is inverted in the temporal information that will invert acquisition, obtains reversing time information;
According to the default mapping relations, each original character in the reversing time information is mapped as corresponding mapping
Character, obtain mixed processing temporal information;
According to the default mapping relations, each original character in the original query parameter is mapped as corresponding mapping
Character, obtain derivative parameter;
The derivative parameter that designated character string, the mixed processing temporal information obtain with mapping is combined, added
Close query argument.
It can be seen that the derivative parameter that the present embodiment combination designated character string, mixed processing temporal information obtain with mapping, makes to obtain
The encrypted query parameter complexity obtained is higher, and the possibility being decrypted is smaller.
It is understood that other combinations are can also be, for example, the encrypted query parameter is based on derivative parameter, specified
Character string, the acquisition of reversing time information combination etc., it is numerous to list herein.
Various technical characteristics in embodiment of above can be arbitrarily combined, as long as the combination between feature is not present
Conflict or contradiction, but as space is limited, do not described one by one, therefore the various technical characteristics in above-mentioned embodiment is any
It is combined the scope for falling within this disclosure.For example, combined as one of which, encrypted query parameter=M (designated words
Symbol string)+mapping reversing time information+carry out original query parameter the derivative parameter of map operation acquisition.It is with creation time
2017-08-04 00:00:00th, exemplified by original query parameter is 7, then:
It is initial to combine:M+20170804000000+7
Temporal information reverse turn operation:M+00000040807102+7
Digital map operation:M+999999H9B9AD9N+A
Obtain encrypted query parameter:M 999999H9B9AD9N A
After encrypted query parameter is obtained, encrypted query parameter can be replaced original query parameter, other groups with URL
URL is formed into part, such as obtains the parts such as host-host protocol, server, port numbers, path, the generation of combining encryption query argument
URL, it is specifically how identical with correlation technique using encrypted query parameter generation URL mode, do not repeat one by one herein, the disclosure
How embodiment encrypts original query parameter if mainly being introduced.
Accordingly, the embodiment of the present disclosure also provides query argument proof scheme in a kind of URL, and as shown in Figure 3A, Fig. 3 A are
The flow chart of query argument verification method, methods described include in a kind of URL of the disclosure according to an exemplary embodiment:
In step 301, receive when corresponding to the request of resource for accessing URL, extract the encrypted query ginseng in URL
Number, original query gain of parameter of the encrypted query parameter based on temporal information and for query resource.
In step 302, original query parameter and temporal information are extracted from the encrypted query parameter.
In step 303, from default query argument and the corresponding relation of temporal information, lookup is original with being extracted
Target time information corresponding to query argument.
In step 304, by the temporal information extracted compared with the target time information, according to comparative result
Verify whether encrypted query parameter is effective.
In this embodiment, when receive correspond to the request of resource for accessing URL when, encryption can be extracted from URL
Query argument.Wherein, the mode for extracting encrypted query parameter can be with the mode phase of extraction original query parameter in correlation technique
Seemingly, it is not limited herein.
Original query gain of parameter due to encrypted query parameter based on temporal information and for query resource, therefore can
To extract original query parameter and temporal information from encrypted query parameter.The strategy of extracting time information and original query parameter
With it is tactful corresponding based on temporal information and original query gain of parameter encrypted query parameter.
On temporal information, in one example, temporal information can give birth at random during URL corresponding to generation resource
Into acquisition.Because the randomness generated at random is stronger, then disabled user is difficult to deduce the temporal information generated at random.Another
In one example, temporal information can be creation time, for example, the creation time of the temporal information including the URL, described
One or more in the creation time of original query parameter, the creation time of the resource.If a variety of creation time combinations
When, it can be combined according to specified order.
On encrypted query parameter, encrypted query parameter is based at least one of original query parameter and derivative parameter ginseng
One in number and temporal information, shift time information, mapping time information, reversing time information, mixed processing temporal information
Kind or many kinds of parameters combination obtain.When encrypted query parameter, which is based on polytype parameter combination, to be obtained, combination plan can be used
Slightly all kinds parameter is combined, for example, combined strategy can be arranged many kinds of parameters in certain sequence, so as to
Encrypted query parameter is obtained, and records this and puts in order;Combined strategy can also be inserted into one of which type parameter separately
After a kind of default position character of type parameter, and record this insertion relation etc..
Wherein, the shift time information is based on the temporal information carrying out circulative shift operation acquisition;The mapping
Temporal information is based on the temporal information carrying out map operation acquisition;The reversing time information is based on the temporal information
Carry out reverse turn operation acquisition;The mixed processing temporal information is based on the temporal information carrying out loopy moving operation, mapping
At least two operations in operation and reverse turn operation obtain;The derivative parameter is based on being circulated the original query parameter
Shifting function obtains, or based on the original query parameter is carried out into map operation acquisition, or based on the original query is joined
Number carries out reverse turn operation acquisition, or is grasped based on the original query parameter is carried out into loopy moving operation, map operation and reversion
At least two operations in work obtain;The loopy moving operation includes following each original character in character string along assigned direction
Digit is specified in ring movement;The map operation includes each original character in character string being mapped as pair according to default mapping relations
The mapping character answered, the mapping relations include the corresponding relation of original character and mapping character;The reverse turn operation includes will
Character string is integrally inverted and is inverted each original character in character string.The technology related to encrypted query parameter
Reference can be made to the introduction in URL generating process to encrypted query parameter, is not introduced one by one herein.
Every kind of combined strategy is corresponding with fractionation strategy, and combination can be obtained to the progress of encrypted query parameter using strategy is split
Split, obtain two class parameters, one kind is original query parameter or the derivative parameter based on original query gain of parameter, another kind of to be
Temporal information or the colouring information obtained based on temporal information.
In one example, if encrypted query parameter combines acquisition, extraction ginseng in a designated order based on many kinds of parameters
During number, encrypted query parameter can be split in a designated order, so as to obtain different two class parameters.For example, if encryption is looked into
Ask parameter and acquisition is combined based on derivative parameter, mixed processing temporal information in a designated order, then can in a designated order split and add
Close query argument, obtain derivative parameter and mixed processing temporal information.
In another example, if encrypted query parameter is based on the default position word that the first parameter is inserted into the second parameter
Obtained after symbol, if the first parameter digit is target digit, the word of target digit is extracted after the default position character of the second parameter
Symbol, so as to obtain the first parameter and the second parameter.
It should be appreciated that in extracting parameter, can tentatively be extracted using strategy is split corresponding to combined strategy,
It is above-mentioned to list two kinds of preliminary extracting modes, it is numerous to list herein for other modes.If the parameter extracted is as original
Query argument and temporal information, then without further extraction, if the parameter extracted is not original query parameter or time
Information, then the parameter extracted is subjected to inverse operation, so as to obtain corresponding original query parameter or temporal information.Inverse operation can
To be the inverse operation of loopy moving operation or the inverse operation of map operation, inverse operation of reverse turn operation etc. can also be.
For example, the inverse operation of loopy moving operation, can be by each opposite direction of the original character along the assigned direction in character string
Loopy moving specifies digit;The inverse operation of the map operation, can be by described default by each mapping character in character string
Mapping relations carry out reflection and penetrated;The inverse operation of the reverse turn operation is identical with reverse turn operation, can integrally enter character string e.g.
Row inverts and is inverted each original character in character string.
The encrypted query parameter obtained for various combination mode, using different parameters extracting mode, given birth to below for URL
The encrypted query parameter that several combinations enumerated into method obtain, it is corresponding to introduce corresponding parameter extraction mode.
The encrypted query parameter obtained for the first combination, the encrypted query parameter are based on shift time information
Obtained with original query parameter combination.It is described that original query parameter and temporal information, bag are extracted from the encrypted query parameter
Include:
Shift time information and original query parameter are extracted from the encrypted query parameter.For example, combination can be based on
Strategy is split corresponding to tactful shift time information and original query parameter are extracted from encrypted query parameter.
By opposite direction loopy moving specific bit of each original character along the assigned direction in the shift time information
Number, obtain temporal information.
For the second combination obtain encrypted query parameter, the encrypted query parameter be based on shift time information and
Derivative parameter combination obtains.The embodiment is to derive parameter as based on the original query parameter is carried out into map operation acquisition
Illustrated exemplified by parameter.In consideration of it, described extract original query parameter and temporal information, bag from the encrypted query parameter
Include:
Shift time information and derivative parameter are extracted from the encrypted query parameter.
By opposite direction loopy moving specific bit of each original character along the assigned direction in the shift time information
Number, obtain temporal information.
Each mapping character in the derivative parameter is carried out into reflection by the default mapping relations to penetrate, obtains original query
Parameter.
For the 3rd combination obtain encrypted query parameter, the encrypted query parameter be based on mapping time information and
Derivative parameter combination obtains.The embodiment is to derive parameter as based on the original query parameter is carried out into map operation acquisition
Illustrated exemplified by parameter.In consideration of it, described extract original query parameter and temporal information, bag from the encrypted query parameter
Include:
Mapping time information and derivative parameter are extracted from the encrypted query parameter.
The mapping character in the mapping time information is carried out into reflection by the default mapping relations to penetrate, obtains time letter
Breath.
Each mapping character in the derivative parameter is carried out into reflection by the default mapping relations to penetrate, obtains original query
Parameter.
For the 4th combination obtain encrypted query parameter, the encrypted query parameter be based on incorporation time information with
And derivative parameter combination obtains, the incorporation time information is based on temporal information carrying out map operation and reverse turn operation obtains,
The derivative parameter is based on original query parameter carrying out map operation acquisition, described that original is extracted from the encrypted query parameter
Beginning query argument and temporal information, including:
The incorporation time information and the derivative parameter are extracted from the encrypted query parameter;
The mapping character in the mixed processing temporal information is carried out into reflection by the default mapping relations to penetrate;And will be anti-
The character string that mapping obtains carries out reverse turn operation, obtains temporal information;
The mapping character in the derivative parameter is carried out into reflection by the default mapping relations to penetrate, obtains original query ginseng
Number.
The encrypted query parameter obtained for the 5th combination, the encrypted query parameter are believed based on the incorporation time
Breath, designated character string and derivative parameter combination obtain, and the incorporation time information is based on temporal information carrying out map operation
Obtained with reverse turn operation, the derivative parameter is based on original query parameter carrying out map operation acquisition, described from the encryption
Original query parameter and temporal information are extracted in query argument, including:
The designated character string is extracted from the encrypted query parameter;
If the designated character string extracted meets well-formedness condition, when extracting the mixing from the encrypted query parameter
Between information and the derivative parameter;
The mapping character in the mixed processing temporal information is carried out into reflection by the default mapping relations to penetrate, and will be anti-
The character string that mapping obtains carries out reverse turn operation, obtains temporal information;
The mapping character in the derivative parameter is carried out into reflection by the default mapping relations to penetrate, obtains original query ginseng
Number.
Wherein, identical designated character string can be used for different original query parameters, received for accessing URL
During the request of corresponding resource, designated character string can be extracted from encrypted query parameter, utilizes designated character string and the finger to prestore
Determine character string to be compared, with check extracted designated character string whether with the designated character String matching that prestores, during matching, then
Judge that extracted designated character string meets well-formedness condition, other specification can be further extracted, if the designated word extracted
When symbol string is unsatisfactory for well-formedness condition, then encrypted query invalid parameters are judged, and then judge that URL is invalid, directly ignore the request,
Without being verified again to other specification, so as to improve verification efficiency.
It is understood that encrypted query parameter can also use other combinations to obtain, from encrypted query parameter
The method of extracting parameter can carry out being adapted adjustment, numerous to list herein.
Various technical characteristics in embodiment of above can be arbitrarily combined, as long as the combination between feature is not present
Conflict or contradiction, but as space is limited, do not described one by one, therefore the various technical characteristics in above-mentioned embodiment is any
It is combined the scope for falling within this disclosure.For example, combined as one of which, encrypted query parameter=M (designated words
Symbol string)+mapping reversing time information+carry out original query parameter the color parameter of map operation acquisition.Therefore, extracting
After encrypted query parameter M999999H9B9AD9N A, following steps are performed:
Fractured operation:M+999999H9B9AD9N+A
Verification operation:Checking M whether with the designated character String matching that prestores, if matching, performs next operation, if not
Match somebody with somebody, ignore this request.
Anti- map operation:M+00000040807102+7
Reverse turn operation:M+20170804000000+7
In consideration of it, obtain temporal information:20170804000000 and original query parameter 7.
In order to improve the security of resource to be visited, temporal information can be verified.In consideration of it, from default inquiry
In the corresponding relation of parameter and temporal information, target time information corresponding with the original query parameter extracted is searched;By institute
The temporal information of extraction verifies whether encrypted query parameter has compared with the target time information, according to comparative result
Effect.In encrypted query invalid parameters, it is possible to determine that URL is invalid.
Wherein, default query argument and the corresponding relation of temporal information are to record to obtain when generating URL, if carried
The temporal information taken differs with the target time information, then judges the encrypted query invalid parameters, so judge URL without
Effect.If the temporal information extracted is identical with the target time information, judge that encrypted query parameter is effective, can be right
URL carries out other verification process, such as signature verification etc., or after all be verified, returns to resource corresponding to URL.
As seen from the above-described embodiment, the embodiment of the present disclosure is by testing the temporal information extracted in encrypted query parameter
Card, to judge whether encrypted query parameter is effective, forgery URL is avoided to cause resource unsafe condition.This method is cleverly
The creation time of data be make use of as slat, so needing to enumerate all possible creation time point in theory, can just be cracked
Query argument (such as ID).The ID of a plaintext, ciphertext is converted into;The data letter of full dose can not be obtained by allowing malice to grab taker
Breath, ensures information security.
As shown in Figure 3 B, Fig. 3 B are a kind of interactive schematic diagram of the disclosure according to an exemplary embodiment.Show at this
In intention, service end can obtain temporal information and the original query parameter (step 401) for inquiring about the resource;Based on institute
State temporal information the original query parameter is encrypted, obtain encrypted query parameter (step 402);Looked into based on the encryption
Ask parameter and generate URL (steps 403) corresponding to the resource, URL is issued to client (step 404) by service end.Work as client
When termination receives user's triggering URL instruction, the request (step 405) that resource is corresponded to for accessing URL is sent to service end.Clothes
Encrypted query parameter (the step 406) being engaged in end extraction URL;From the encrypted query parameter extract original query parameter and when
Between information (step 407);From default query argument and the corresponding relation of temporal information, the original query with being extracted is searched
Target time information (step 408) corresponding to parameter;By the temporal information extracted compared with the target time information,
Whether effectively encrypted query parameter (step 409) is verified according to comparative result;If invalid, directly ignore request or to client
End returns to request failure message (step 410);If other verification operations, such as signature verification further effectively, are carried out to URL
Deng after all be verified, to resource (step 411) corresponding to client return URL.For other verification operations with related
Technology is identical, numerous to list herein.
As seen from the above-described embodiment, query argument is encrypted using temporal information for the present embodiment, can increase encryption
The difficulty that query argument is cracked, and then increase disabled user and speculate other query arguments using existing encrypted query parameter
Difficulty.After service end issues URL to client, client can send resource based on the instruction received to service end please
Ask, service end to the temporal information extracted in encrypted query parameter by verifying, to judge whether encrypted query parameter has
Effect, forgery URL is avoided to cause resource unsafe condition.
Corresponding with the embodiment of foregoing URL generation methods, the disclosure additionally provides URL generating means, device is applied
Equipment and storage medium embodiment.
As shown in figure 4, Fig. 4 is a kind of block diagram of URL generating means of the disclosure according to an exemplary embodiment, institute
Stating device includes:
Data obtaining module 41, it is configured as obtaining temporal information and the original query parameter for inquiring about the resource.
Information encrypting module 42, it is configured as that the original query parameter is encrypted based on the temporal information, obtains
Obtain encrypted query parameter.
Information generating module 43, it is configured as generating URL corresponding to the resource based on the encrypted query parameter.
In an optional implementation, the temporal information includes creation time, the original query of the URL
One or more in the creation time of parameter, the creation time of the resource.
In an optional implementation, the encrypted query parameter is based in original query parameter and derivative parameter
At least one parameter and temporal information, shift time information, mapping time information, reversing time information, mixed processing time
One or more parameter combinations obtain in information;
Wherein, the shift time information is based on the temporal information carrying out circulative shift operation acquisition;The mapping
Temporal information is based on the temporal information carrying out map operation acquisition;The reversing time information is based on the temporal information
Carry out reverse turn operation acquisition;The mixed processing temporal information is based on the temporal information carrying out loopy moving operation, mapping
At least two operations in operation and reverse turn operation obtain;The derivative parameter is based on being circulated the original query parameter
Shifting function obtains, or based on the original query parameter is carried out into map operation acquisition, or based on the original query is joined
Number carries out reverse turn operation acquisition, or is grasped based on the original query parameter is carried out into loopy moving operation, map operation and reversion
At least two operations in work obtain;
The loopy moving operation includes each original character in character string specifying digit along assigned direction loopy moving;
The map operation includes each original character in character string being mapped as corresponding mapping character, institute according to default mapping relations
Stating mapping relations includes the corresponding relation of original character and mapping character;The reverse turn operation includes integrally carrying out character string instead
Turn and inverted each original character in character string.
As shown in figure 5, Fig. 5 is the block diagram of another URL generating means of the disclosure according to an exemplary embodiment,
On the basis of foregoing embodiment illustrated in fig. 4, described information encrypting module 42 includes the embodiment:
First encryption submodule 421, is configured as each original character in the temporal information along the assigned direction
Loopy moving specifies digit;According to the default mapping relations, each original character in the original query parameter is mapped as
Corresponding mapping character;The shift time information obtained will be shifted and the derivative parameter of mapping acquisition is combined, encrypted
Query argument.
As shown in fig. 6, Fig. 6 is the block diagram of another URL generating means of the disclosure according to an exemplary embodiment,
On the basis of foregoing embodiment illustrated in fig. 4, described information encrypting module 42 includes the embodiment:
Second encryption submodule 422, is configured as according to the default mapping relations, will be each former in the temporal information
Beginning character is mapped as corresponding mapping character, obtains mapping time information;According to the default mapping relations, original looked into described
Ask each original character in parameter and be mapped as corresponding mapping character, obtain derivative parameter;The mapping time letter obtained will be mapped
Cease the derivative parameter obtained with mapping to be combined, obtain encrypted query parameter.
As shown in fig. 7, Fig. 7 is the block diagram of another URL generating means of the disclosure according to an exemplary embodiment,
On the basis of foregoing embodiment illustrated in fig. 4, described information encrypting module 42 includes the embodiment:
3rd encryption submodule 423, is configured as integrally being inverted the temporal information, and will invert the letter obtained
Each character is inverted in breath, obtains reversing time information;According to the default mapping relations, by the reversing time information
In each original character be mapped as corresponding mapping character, obtain mixed processing temporal information;According to the default mapping relations,
Each original character in the original query parameter is mapped as corresponding mapping character, obtains derivative parameter;By the mixing
The derivative parameter that processing time information obtains with mapping is combined, and obtains encrypted query parameter.
As shown in figure 8, Fig. 8 is the block diagram of another URL generating means of the disclosure according to an exemplary embodiment,
On the basis of foregoing embodiment illustrated in fig. 4, described information encrypting module 42 includes the embodiment:
Submodule 424 is inverted, is configured as integrally being inverted the temporal information, and the time letter obtained will be inverted
Each character is inverted in breath, obtains reversing time information.
First mapping submodule 425, it is configured as according to the default mapping relations, will be every in the reversing time information
Individual original character is mapped as corresponding mapping character, obtains mixed processing temporal information.
Second mapping submodule 426, it is configured as according to the default mapping relations, will be every in the original query parameter
Individual original character is mapped as corresponding mapping character, obtains derivative parameter.
Submodule 427 is combined, is configured as spreading out designated character string, the mixed processing temporal information with what mapping obtained
Raw parameter is combined, and obtains encrypted query parameter.
Accordingly, the disclosure also provides a kind of server device, including:Processor;For storing, processor is executable to be referred to
The memory of order;Wherein, the processor is configured as:
Obtain temporal information and the original query parameter for inquiring about the resource.
The original query parameter is encrypted based on the temporal information, obtains encrypted query parameter.
URL corresponding to the resource is generated based on the encrypted query parameter.
Accordingly, the disclosure also provides a kind of computer-readable recording medium, is stored thereon with computer program, the program
The step of URL generation methods described in any of the above-described are realized when being executed by processor.
The disclosure can use the storage medium for wherein including program code in one or more (to include but is not limited to disk
Memory, CD-ROM, optical memory etc.) on the form of computer program product implemented.Computer-usable storage medium bag
Permanent and non-permanent, removable and non-removable media is included, can realize that information stores by any method or technique.Letter
Breath can be computer-readable instruction, data structure, the module of program or other data.The example bag of the storage medium of computer
Include but be not limited to:Phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM),
Other kinds of random access memory (RAM), read-only storage (ROM), Electrically Erasable Read Only Memory
(EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), digital versatile disc
(DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus or any other non-biography
Defeated medium, the information that can be accessed by a computing device available for storage.
The function of modules and the specific details of implementation process of effect, which are shown in, in said apparatus corresponds to step in the above method
Implementation process, will not be repeated here.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part is real referring to method
Apply the part explanation of example.Device embodiment described above is only schematical, wherein described be used as separating component
The module of explanation can be or may not be physically separate, can be as the part that module is shown or can also
It is not physical module, you can with positioned at a place, or can also be distributed on multiple mixed-media network modules mixed-medias.Can be according to reality
Need to select some or all of module therein to realize the purpose of disclosure scheme.Those of ordinary skill in the art are not paying
In the case of going out creative work, you can to understand and implement.
As shown in figure 9, Fig. 9 is a kind of block diagram of device for URL generations according to an exemplary embodiment.
For example, device 900 may be provided in server device.Reference picture 9, device 900 include processing component 922, its
Further comprise one or more processors, and as the memory resource representated by memory 932, can be by handling for storing
The instruction of the execution of part 922, such as application program.The application program stored in memory 932 can include one or one
Above each corresponds to the module of one group of instruction.In addition, processing component 922 is configured as execute instruction, it is above-mentioned to perform
URL generation methods.
Device 900 can also include the power management that a power supply module 926 is configured as performs device 900, and one has
Line or radio network interface 950 are configured as device 900 being connected to network, and input and output (I/O) interface 958.Dress
Putting 900 can operate based on the operating system for being stored in memory 932.
Wherein, when the instruction in the memory 932 is performed by the processing component 922 so that device 900 can be held
A kind of URL generation methods of row, including:
Obtain temporal information and the original query parameter for inquiring about the resource;
The original query parameter is encrypted based on the temporal information, obtains encrypted query parameter;
URL corresponding to the resource is generated based on the encrypted query parameter.
Corresponding with the embodiment of query argument verification method in foregoing URL, the disclosure additionally provides query argument in URL
Verify the embodiment of device, the equipment that device is applied and storage medium.
As shown in Figure 10, Figure 10 is that query argument is verified in a kind of URL of the disclosure according to an exemplary embodiment
The block diagram of device, described device include:
First extraction module 101, it is configured as receiving when corresponding to the request of resource for accessing URL, extracts in URL
Encrypted query parameter, original query gain of parameter of the encrypted query parameter based on temporal information and for query resource.
Second extraction module 102, it is configured as extracting original query parameter and time letter from the encrypted query parameter
Breath.
Information inquiry module 103, be configured as from default query argument and the corresponding relation of temporal information, search with
Target time information corresponding to the original query parameter extracted.
Information authentication module 104, the temporal information for being configured as being extracted compared with the target time information,
Verify whether encrypted query parameter is effective according to comparative result.
In an optional implementation, the temporal information includes creation time, the original query of the URL
One or more in the creation time of parameter, the creation time of the resource.
In an optional implementation, the encrypted query parameter is based in original query parameter and derivative parameter
At least one parameter and temporal information, shift time information, mapping time information, reversing time information, mixed processing time
One or more parameter combinations obtain in information;
Wherein, the shift time information is based on the temporal information carrying out circulative shift operation acquisition;The mapping
Temporal information is based on the temporal information carrying out map operation acquisition;The reversing time information is based on the temporal information
Carry out reverse turn operation acquisition;The mixed processing temporal information is based on the temporal information carrying out loopy moving operation, mapping
At least two operations in operation and reverse turn operation obtain;The derivative parameter is based on being circulated the original query parameter
Shifting function obtains, or based on the original query parameter is carried out into map operation acquisition, or based on the original query is joined
Number carries out reverse turn operation acquisition, or is grasped based on the original query parameter is carried out into loopy moving operation, map operation and reversion
At least two operations in work obtain;
The loopy moving operation includes each original character in character string specifying digit along assigned direction loopy moving;
The map operation includes each original character in character string being mapped as corresponding mapping character, institute according to default mapping relations
Stating mapping relations includes the corresponding relation of original character and mapping character;The reverse turn operation includes integrally carrying out character string instead
Turn and inverted each original character in character string.
As shown in figure 11, Figure 11 is that query argument is tested in another URL of the disclosure according to an exemplary embodiment
The block diagram of card device, on the basis of foregoing embodiment illustrated in fig. 10, the encrypted query parameter is based on described mixed the embodiment
Close temporal information and derive parameter combination and obtain, the incorporation time information is based on by temporal information progress map operation and instead
Turn operation to obtain, the derivative parameter is based on original query parameter carrying out map operation acquisition, second extraction module 102
Including:
First extracting sub-module 1021, be configured as extracting from the encrypted query parameter incorporation time information and
The derivative parameter.
Very first time determination sub-module 1022, it is configured as the mapping character in the mixed processing temporal information by institute
State default mapping relations and carry out reflection and penetrate;And will reflect that the character string for penetrating acquisition carries out reverse turn operation, obtain temporal information.
First parameter determination submodule 1023, it is configured as reflecting the mapping character in the derivative parameter by described preset
The relation of penetrating carries out reflection and penetrated, and obtains original query parameter.
As shown in figure 12, Figure 12 is that query argument is tested in another URL of the disclosure according to an exemplary embodiment
The block diagram of card device, on the basis of foregoing embodiment illustrated in fig. 10, the encrypted query parameter is based on described mixed the embodiment
Close temporal information, designated character string and derivative parameter combination to obtain, the incorporation time information is based on carrying out temporal information
Map operation and reverse turn operation obtain, and the derivative parameter is based on original query parameter carrying out map operation acquisition, and described the
Two extraction modules 102 include:
Text string extracting submodule 1024, it is configured as extracting the designated character string from the encrypted query parameter.
Second extracting sub-module 1025, if the designated character string for being configured as being extracted meets well-formedness condition, from described
The incorporation time information and the derivative parameter are extracted in encrypted query parameter.
Second time determination sub-module 1026, it is configured as the mapping character in the mixed processing temporal information by institute
State default mapping relations and carry out reflection and penetrate, and will reflect that the character string for penetrating acquisition carries out reverse turn operation, obtain temporal information.
Second parameter determination submodule 1027, it is configured as reflecting the mapping character in the derivative parameter by described preset
The relation of penetrating carries out reflection and penetrated, and obtains original query parameter.
Accordingly, the disclosure also provides a kind of server device, including:Processor;For storing, processor is executable to be referred to
The memory of order;Wherein, the processor is configured as:
Receive when corresponding to the request of resource for accessing URL, extract the encrypted query parameter in URL, the encryption is looked into
Ask original query gain of parameter of the parameter based on temporal information and for query resource;
Original query parameter and temporal information are extracted from the encrypted query parameter;
From default query argument and the corresponding relation of temporal information, search corresponding with the original query parameter extracted
Target time information;
By the temporal information extracted compared with the target time information, encrypted query is verified according to comparative result
Whether parameter is effective.
Accordingly, the disclosure also provides a kind of computer-readable recording medium, is stored thereon with computer program, the program
The step of URL query arguments verification method described in any of the above-described is realized when being executed by processor.
The disclosure can use the storage medium for wherein including program code in one or more (to include but is not limited to disk
Memory, CD-ROM, optical memory etc.) on the form of computer program product implemented.Computer-usable storage medium bag
Permanent and non-permanent, removable and non-removable media is included, can realize that information stores by any method or technique.Letter
Breath can be computer-readable instruction, data structure, the module of program or other data.The example bag of the storage medium of computer
Include but be not limited to:Phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM),
Other kinds of random access memory (RAM), read-only storage (ROM), Electrically Erasable Read Only Memory
(EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), digital versatile disc
(DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus or any other non-biography
Defeated medium, the information that can be accessed by a computing device available for storage.
The function of modules and the specific details of implementation process of effect, which are shown in, in said apparatus corresponds to step in the above method
Implementation process, will not be repeated here.
For device embodiment, because it corresponds essentially to embodiment of the method, so related part is real referring to method
Apply the part explanation of example.Device embodiment described above is only schematical, wherein described be used as separating component
The module of explanation can be or may not be physically separate, can be as the part that module is shown or can also
It is not physical module, you can with positioned at a place, or can also be distributed on multiple mixed-media network modules mixed-medias.Can be according to reality
Need to select some or all of module therein to realize the purpose of disclosure scheme.Those of ordinary skill in the art are not paying
In the case of going out creative work, you can to understand and implement.
As shown in figure 13, Figure 13 be according to an exemplary embodiment it is a kind of be used for URL in query argument verify
The block diagram of device.
For example, device 1300 may be provided in server device.Reference picture 13, device 1300 include processing component
1322, it further comprises one or more processors, and as the memory resource representated by memory 1332, for storing
Can be by the instruction of the execution of processing component 1322, such as application program.The application program stored in memory 1332 can include
It is one or more each correspond to the module of one group of instruction.In addition, processing component 1322 is configured as execute instruction,
To perform query argument verification method in above-mentioned URL.
Device 1300 can also include a power supply module 1326 and be configured as the power management of performs device 1300, one
Wired or wireless network interface 1350 is configured as device 1300 being connected to network, and input and output (I/O) interface
1358.Device 1300 can be operated based on the operating system for being stored in memory 1332.
Wherein, when the instruction in the memory 1332 is performed by the processing component 1322 so that the energy of device 1300
Query argument verification method in a kind of URL is enough performed, including:
Receive when corresponding to the request of resource for accessing URL, extract the encrypted query parameter in URL, the encryption is looked into
Ask original query gain of parameter of the parameter based on temporal information and for query resource;
Original query parameter and temporal information are extracted from the encrypted query parameter;
From default query argument and the corresponding relation of temporal information, search corresponding with the original query parameter extracted
Target time information;
By the temporal information extracted compared with the target time information, encrypted query is verified according to comparative result
Whether parameter is effective.
Those skilled in the art will readily occur to the disclosure its after considering specification and putting into practice invention disclosed herein
Its embodiment.The disclosure is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or
Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledges in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following
Claim is pointed out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.
The preferred embodiment of the disclosure is the foregoing is only, not limiting the disclosure, all essences in the disclosure
God any modification, equivalent substitution and improvements done etc., should be included within the scope of disclosure protection with principle.
Claims (16)
1. a kind of URL generation methods, it is characterised in that methods described includes:
Obtain temporal information and the original query parameter for inquiring about the resource;
The original query parameter is encrypted based on the temporal information, obtains encrypted query parameter;
URL corresponding to the resource is generated based on the encrypted query parameter.
2. according to the method for claim 1, it is characterised in that the temporal information includes the creation time of the URL, institute
State the one or more in the creation time of original query parameter, the creation time of the resource.
3. method according to claim 1 or 2, it is characterised in that the encrypted query parameter is based on original query parameter
With at least one of derivative parameter parameter and temporal information, shift time information, mapping time information, reversing time letter
One or more parameter combinations obtain in breath, mixed processing temporal information;
Wherein, the shift time information is based on the temporal information carrying out circulative shift operation acquisition;The mapping time
Information is based on the temporal information carrying out map operation acquisition;The reversing time information is based on carrying out the temporal information
Reverse turn operation obtains;The mixed processing temporal information is based on the temporal information carrying out loopy moving operation, map operation
Obtained with least two operations in reverse turn operation;The derivative parameter is based on the original query parameter carrying out cyclic shift
Operation obtains, or based on the original query parameter is carried out into map operation acquisition, or based on the original query parameter is entered
Row reverse turn operation obtains, or based on by the operation of original query parameter progress loopy moving, map operation and reverse turn operation
At least two operation obtain;
The loopy moving operation includes each original character in character string specifying digit along assigned direction loopy moving;It is described
Map operation includes each original character in character string being mapped as corresponding mapping character according to default mapping relations, described to reflect
Penetrating relation includes the corresponding relation of original character and mapping character;The reverse turn operation include character string is integrally inverted with
And each original character in character string is inverted.
4. according to the method for claim 3, it is characterised in that described that the original query is joined based on the temporal information
Number is encrypted, and obtains encrypted query parameter, including:
Each original character in the temporal information is specified into digit along the assigned direction loopy moving;Reflected according to described preset
Relation is penetrated, each original character in the original query parameter is mapped as corresponding mapping character;The displacement obtained will be shifted
The derivative parameter that temporal information obtains with mapping is combined, and obtains encrypted query parameter;Or,
According to the default mapping relations, each original character in the temporal information is mapped as corresponding mapping character, obtained
Obtain mapping time information;According to the default mapping relations, each original character in the original query parameter is mapped as pair
The mapping character answered, obtain derivative parameter;The mapping time information obtained will be mapped and the derivative parameter of mapping acquisition carries out group
Close, obtain encrypted query parameter;Or,
The temporal information is integrally inverted, and each character is inverted in the information that will invert acquisition, is inverted
Temporal information;According to the default mapping relations, each original character in the reversing time information is mapped as corresponding reflect
Character is penetrated, obtains mixed processing temporal information;, will be each original in the original query parameter according to the default mapping relations
Character is mapped as corresponding mapping character, obtains derivative parameter;The derivative that the mixed processing temporal information is obtained with mapping
Parameter is combined, and obtains encrypted query parameter.
5. according to the method for claim 3, it is characterised in that described that the original query is joined based on the temporal information
Number is encrypted, and obtains encrypted query parameter, including:
The temporal information is integrally inverted, and each character is inverted in the temporal information that will invert acquisition, is obtained
Reversing time information;
According to the default mapping relations, each original character in the reversing time information is mapped as corresponding mapping word
Symbol, obtain mixed processing temporal information;
According to the default mapping relations, each original character in the original query parameter is mapped as corresponding mapping word
Symbol, obtain derivative parameter;
The derivative parameter that designated character string, the mixed processing temporal information obtain with mapping is combined, encryption is obtained and looks into
Ask parameter.
6. query argument verification method in a kind of URL, it is characterised in that methods described includes:
Receive when corresponding to the request of resource for accessing URL, extract the encrypted query parameter in URL, the encrypted query ginseng
Base is in temporal information and original query gain of parameter for query resource;
Original query parameter and temporal information are extracted from the encrypted query parameter;
From default query argument and the corresponding relation of temporal information, mesh corresponding with the original query parameter extracted is searched
Mark temporal information;
By the temporal information extracted compared with the target time information, encrypted query parameter is verified according to comparative result
It is whether effective.
7. a kind of URL generating means, it is characterised in that described device includes:
Data obtaining module, it is configured as obtaining temporal information and the original query parameter for inquiring about the resource;
Information encrypting module, it is configured as that the original query parameter is encrypted based on the temporal information, is encrypted
Query argument;
Information generating module, it is configured as generating URL corresponding to the resource based on the encrypted query parameter.
8. device according to claim 7, it is characterised in that the temporal information includes the creation time of the URL, institute
State the one or more in the creation time of original query parameter, the creation time of the resource.
9. the device according to claim 7 or 8, it is characterised in that the encrypted query parameter is based on original query parameter
With at least one of derivative parameter parameter and temporal information, shift time information, mapping time information, reversing time letter
One or more parameter combinations obtain in breath, mixed processing temporal information;
Wherein, the shift time information is based on the temporal information carrying out circulative shift operation acquisition;The mapping time
Information is based on the temporal information carrying out map operation acquisition;The reversing time information is based on carrying out the temporal information
Reverse turn operation obtains;The mixed processing temporal information is based on the temporal information carrying out loopy moving operation, map operation
Obtained with least two operations in reverse turn operation;The derivative parameter is based on the original query parameter carrying out cyclic shift
Operation obtains, or based on the original query parameter is carried out into map operation acquisition, or based on the original query parameter is entered
Row reverse turn operation obtains, or based on by the operation of original query parameter progress loopy moving, map operation and reverse turn operation
At least two operation obtain;
The loopy moving operation includes each original character in character string specifying digit along assigned direction loopy moving;It is described
Map operation includes each original character in character string being mapped as corresponding mapping character according to default mapping relations, described to reflect
Penetrating relation includes the corresponding relation of original character and mapping character;The reverse turn operation include character string is integrally inverted with
And each original character in character string is inverted.
10. device according to claim 9, it is characterised in that described information encrypting module is included with next sub- module:
First encryption submodule, is configured as each original character in the temporal information along the assigned direction loopy moving
Specify digit;According to the default mapping relations, each original character in the original query parameter is mapped as corresponding reflect
Penetrate character;The shift time information obtained will be shifted and the derivative parameter of mapping acquisition is combined, obtain encrypted query parameter;
Second encryption submodule, is configured as according to the default mapping relations, by each original character in the temporal information
Corresponding mapping character is mapped as, obtains mapping time information;According to the default mapping relations, by the original query parameter
In each original character be mapped as corresponding mapping character, obtain derivative parameter;The mapping time information obtained will be mapped with reflecting
The derivative parameter for penetrating acquisition is combined, and obtains encrypted query parameter;
3rd encryption submodule, is configured as integrally being inverted the temporal information, and will be every in the information for inverting acquisition
Individual character is inverted, and obtains reversing time information;, will be each in the reversing time information according to the default mapping relations
Original character is mapped as corresponding mapping character, obtains mixed processing temporal information;According to the default mapping relations, by described in
Each original character is mapped as corresponding mapping character in original query parameter, obtains derivative parameter;During by the mixed processing
Between information and mapping obtain derivative parameter be combined, obtain encrypted query parameter.
11. device according to claim 9, it is characterised in that described information encrypting module includes:
Submodule is inverted, is configured as integrally being inverted the temporal information, and will be every in the temporal information for inverting acquisition
Individual character is inverted, and obtains reversing time information;
First mapping submodule, it is configured as according to the default mapping relations, will be each original in the reversing time information
Character is mapped as corresponding mapping character, obtains mixed processing temporal information;
Second mapping submodule, it is configured as according to the default mapping relations, will be each original in the original query parameter
Character is mapped as corresponding mapping character, obtains derivative parameter;
Submodule is combined, is configured as the derivative parameter for obtaining designated character string, the mixed processing temporal information with mapping
It is combined, obtains encrypted query parameter.
12. query argument verifies device in a kind of URL, it is characterised in that described device includes:
First extraction module, it is configured as receiving when corresponding to the request of resource for accessing URL, the encryption extracted in URL is looked into
Ask parameter, original query gain of parameter of the encrypted query parameter based on temporal information and for query resource;
Second extraction module, it is configured as extracting original query parameter and temporal information from the encrypted query parameter;
Information inquiry module, it is configured as from default query argument and the corresponding relation of temporal information, searches with being extracted
Original query parameter corresponding to target time information;
Information authentication module, the temporal information for being configured as being extracted compared with the target time information, according to than
It is whether effective compared with result verification encrypted query parameter.
A kind of 13. server device, it is characterised in that including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Obtain temporal information and the original query parameter for inquiring about the resource;
The original query parameter is encrypted based on the temporal information, obtains encrypted query parameter;
URL corresponding to the resource is generated based on the encrypted query parameter.
A kind of 14. server device, it is characterised in that including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Receive when corresponding to the request of resource for accessing URL, extract the encrypted query parameter in URL, the encrypted query ginseng
Base is in temporal information and original query gain of parameter for query resource;
Original query parameter and temporal information are extracted from the encrypted query parameter;
From default query argument and the corresponding relation of temporal information, mesh corresponding with the original query parameter extracted is searched
Mark temporal information;
By the temporal information extracted compared with the target time information, encrypted query parameter is verified according to comparative result
It is whether effective.
15. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is by processor
The step of any one of claim 1 to 5 methods described is realized during execution.
16. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is by processor
The step of claim 6 methods described is realized during execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710834278.2A CN107707532B (en) | 2017-09-15 | 2017-09-15 | URL (Uniform resource locator) generation and query parameter verification method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710834278.2A CN107707532B (en) | 2017-09-15 | 2017-09-15 | URL (Uniform resource locator) generation and query parameter verification method, device, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107707532A true CN107707532A (en) | 2018-02-16 |
CN107707532B CN107707532B (en) | 2022-05-13 |
Family
ID=61172620
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710834278.2A Active CN107707532B (en) | 2017-09-15 | 2017-09-15 | URL (Uniform resource locator) generation and query parameter verification method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107707532B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108650183A (en) * | 2018-05-15 | 2018-10-12 | 南京邮电大学 | A kind of unmanned plane information query system based on Web dynamic routing matching techniques |
CN110061967A (en) * | 2019-03-15 | 2019-07-26 | 平安科技(深圳)有限公司 | Business datum providing method, device, equipment and computer readable storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100192210A1 (en) * | 2009-01-26 | 2010-07-29 | Apple Inc. | Method and system for verifying entitlement to access content by url validation |
US20120124372A1 (en) * | 2010-10-13 | 2012-05-17 | Akamai Technologies, Inc. | Protecting Websites and Website Users By Obscuring URLs |
CN102594557A (en) * | 2012-01-10 | 2012-07-18 | 深圳市汉普电子技术开发有限公司 | Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL |
CN103067156A (en) * | 2012-12-28 | 2013-04-24 | 北京移数通电讯有限公司 | Uniform resource locator (URL) encryption and validation method for mobile internet user resource access and device provided with the same |
CN104009989A (en) * | 2014-05-22 | 2014-08-27 | Tcl集团股份有限公司 | Link-stealing-prevention method and system for media files and server |
US9075778B1 (en) * | 2011-07-15 | 2015-07-07 | Google Inc. | Predicting user navigation events within a browser |
CN106101133A (en) * | 2016-07-14 | 2016-11-09 | 观止云(北京)信息技术有限公司 | A kind of method and system of Streaming Media door chain |
-
2017
- 2017-09-15 CN CN201710834278.2A patent/CN107707532B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100192210A1 (en) * | 2009-01-26 | 2010-07-29 | Apple Inc. | Method and system for verifying entitlement to access content by url validation |
US20120124372A1 (en) * | 2010-10-13 | 2012-05-17 | Akamai Technologies, Inc. | Protecting Websites and Website Users By Obscuring URLs |
CN103229181A (en) * | 2010-10-13 | 2013-07-31 | 阿卡麦科技公司 | Protecting websites and website users by obscuring URLs |
US9075778B1 (en) * | 2011-07-15 | 2015-07-07 | Google Inc. | Predicting user navigation events within a browser |
CN102594557A (en) * | 2012-01-10 | 2012-07-18 | 深圳市汉普电子技术开发有限公司 | Method and device for encrypting uniform resource locator (URL) and method and device for authenticating URL |
CN103067156A (en) * | 2012-12-28 | 2013-04-24 | 北京移数通电讯有限公司 | Uniform resource locator (URL) encryption and validation method for mobile internet user resource access and device provided with the same |
CN104009989A (en) * | 2014-05-22 | 2014-08-27 | Tcl集团股份有限公司 | Link-stealing-prevention method and system for media files and server |
CN106101133A (en) * | 2016-07-14 | 2016-11-09 | 观止云(北京)信息技术有限公司 | A kind of method and system of Streaming Media door chain |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108650183A (en) * | 2018-05-15 | 2018-10-12 | 南京邮电大学 | A kind of unmanned plane information query system based on Web dynamic routing matching techniques |
CN110061967A (en) * | 2019-03-15 | 2019-07-26 | 平安科技(深圳)有限公司 | Business datum providing method, device, equipment and computer readable storage medium |
CN110061967B (en) * | 2019-03-15 | 2022-02-22 | 平安科技(深圳)有限公司 | Service data providing method, device, equipment and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107707532B (en) | 2022-05-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7467456B2 (en) | SYSTEM AND METHOD FOR EFFICIENT AND SECURE PROCESSING, ACCESSING, AND TRANSMITTING DATA VIA A BLOCKCHAIN NETWORK | |
CN111930881B (en) | Connection keyword authentication searchable encryption method based on state cryptographic algorithm | |
CN108170753A (en) | A kind of method of Key-Value data base encryptions and Safety query in shared cloud | |
CN107707532A (en) | URL generations, query argument verification method, device, equipment and storage medium | |
Wang et al. | A multi-keyword searchable encryption sensitive data trusted sharing scheme in multi-user scenario | |
CN114629713B (en) | Identity verification method, device and system | |
Huang et al. | Privacy-Preserving Data Search in Cloud Storage | |
Fang et al. | Practical Verification of Data Encryption for Cloud Storage Services | |
Zhao et al. | Obric: Oblivious Keyword Search in Hyperledger Fabric Platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |