CN102857496A - Network information verifying method - Google Patents
Network information verifying method Download PDFInfo
- Publication number
- CN102857496A CN102857496A CN2012102844123A CN201210284412A CN102857496A CN 102857496 A CN102857496 A CN 102857496A CN 2012102844123 A CN2012102844123 A CN 2012102844123A CN 201210284412 A CN201210284412 A CN 201210284412A CN 102857496 A CN102857496 A CN 102857496A
- Authority
- CN
- China
- Prior art keywords
- terminal
- webpage
- network
- network information
- identifying code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention relates to the Internet information safety technology, in particular to a network information verifying method. The method comprises the steps of: first, adding a verification code to a provided webpage by a network server end; then transmitting the verification code to a terminal through the network; storing the received verification code in a terminal database by the terminal; obtaining the verification code of the webpage when the terminal accesses the webpage of the server end; and finally, matching and inquiring in the terminal database by using the obtained verification code as a retrieval value and opening the webpage with a match value. The network information verifying method provided by the invention has the beneficial effects that the safety of Internet can be further supplemented, a user can be prompted immediately when network information is falsified by verifying the integrity of the network information, and the risk of infecting viruses or Trojans of the user on the Internet is reduced. The network information verifying method provided by the invention is applied to the Internet information safety technology.
Description
Technical field
The present invention relates to the internet information safe practice, relate to specifically a kind of network information verification method.
Background technology
Along with the fast development of the Internet, Grid information sharing has become the requisite part of people's Working Life.But network is providing various many problems that also are faced with simultaneously easily to people, wherein particularly outstanding is information security issue, internet worm, network wooden horse are seen everywhere at present, and most domestic consumer does not have to distinguish whether the network information that receives carries virus and the ability of wooden horse, thereby may cause the situation appearance such as personal information is stolen.Again because the intrinsic opening in the Internet has very large difficulty so that Internet-based network self solves information security issue, therefore how on the existing network basis, realize that by relevant supplementary means the most basic network information security checking is the greatest problem that the network information security faces.
Summary of the invention
Problem solved by the invention is exactly the security hidden trouble that exists for the present network information, proposes a kind of network information verification method.
The present invention solves the problems of the technologies described above the technical scheme that adopts: network information verification method, it is characterized in that, and may further comprise the steps:
A. the webpage additional identification code of network server end to providing;
B. with identifying code by network delivery to terminal;
C. terminal deposits the identifying code that receives in terminal database;
D. during the webpage of terminal access server end, obtain the identifying code of webpage;
E. take the identifying code that gets access to as index value matching inquiry in terminal database, if find matching value, then safe web page is opened, if can not find matching value, is proved that then the network information goes wrong, with result feedback to the terminal use.
The technical scheme that the present invention is total, the network information additional identification code that proposition is provided self by network server end, then identifying code is delivered to terminal, by terminal storage, the identifying code that again obtains identifying code and preserve before when terminal receives the network information relatively reaches and verifies whether complete original purpose of the network information.
Concrete, network server end described in the step a is carried out MD5 numerical computations for network server end to each webpage that provides to the method for the webpage additional identification code that provides, forms 128 corresponding secure Hash value.
Concrete, described in the step b with identifying code by network delivery to the method for terminal for by the DVB channel 128 secure Hash value of each webpage are sent to the terminal use with broadcast mode.
Concrete, terminal described in the step c is that terminal receives the parsing broadcast data with the method that the identifying code that receives deposits terminal database in, extracts 128 secure Hash value, and deposits the terminal dynamic data base in.
Concrete, during the webpage of the server end of terminal access described in the steps d, obtain the method for identifying code of webpage for by Network Capture is carried out local md5 calculating and obtains corresponding md5 value to local data.
Beneficial effect of the present invention is, can effectively assist the safety of the Internet and replenish, and by the integrity degree of the checking network information, timely prompting user when the network information is tampered reduces the user because online and the risk of infection virus or wooden horse.
Embodiment
The below describes technical scheme of the present invention in detail:
Network information verification method of the present invention, key step is: at first by Network Provider at the webpage additional identification code of network server end to providing, described identifying code be have be easy to transmit, the numerical value with uniqueness or the character of convenient storage, and can real-time update; Will be to the additional identifying code of webpage first by network delivery to the terminal use; Then terminal deposits the identifying code that receives in terminal database, and the database here is the local security identifying code Value Data storehouse that is arranged on the terminal, is used for storing that to represent info web be the network information that is tampered the former beginning and end; When the webpage of terminal access server end, obtain the identifying code of webpage; At last take the identifying code that gets access to as index value matching inquiry in terminal database, if find matching value, then represent webpage and the information change do not occur, be the original network information, should open safe web page this moment, if can not find matching value, prove that then the network information goes wrong, with result feedback to the terminal use.
A kind of concrete realization network server end to the method for the webpage additional identification code that provides is: network server end is carried out the MD5 numerical computations to each webpage that provides, and forms 128 corresponding secure Hash value.Wherein, D5 is Message-Digest Algorithm 5(Message-Digest Algorithm 5), be used for guaranteeing that communication is complete consistent, be one of widely used hash algorithm of computer, having the output regular length is 128 specific, and therefore the secure Hash value here is 128.
A kind of concrete realization with identifying code by network delivery to the method for terminal is: by the DVB channel 128 secure Hash value of each webpage with broadcast mode, the dynamic push of wide spectrum is given the terminal use.Wherein, DVB(Digital Video Broadcasting, digital television broadcasting) channel, per second can transmit 310,000 corresponding secure Hash value of webpage of about 38Mb/128bit ≈ in theory, therefore very be applicable to the webserver to the terminal transmission of information, the relative the Internet of DVB channel does not have virus simultaneously, has safe, controlled advantage, can guarantee the fail safe of secure Hash value transmission.
A kind of concrete terminal with the method that the identifying code that receives deposits terminal database in is: terminal receives resolves broadcast data, extracts 128 secure Hash value, and deposits the terminal dynamic data base in.If terminal database is the space of 4GB capacity, can store in theory 2.6 hundred million webpages of 4GB/128bit ≈ the secure Hash value to using.And after the database storage is full, will carries out data according to new and old principle of access time and delete in real time.Therefore terminal database does not take the use how many spaces can be satisfied most applications.
During a kind of webpage of concrete terminal access server end, the method for obtaining the identifying code of webpage is: calculate and obtain corresponding md5 value by Network Capture is carried out local md5 to local data.As when the web page contents web-A of terminal use by internet access network information content provider, user terminal obtains corresponding md5 value value-A (Download) by Network Capture is carried out local md5 calculating to local web-A (Download) data, and then take value-A (Download) as index value, in local stored data base, search coupling, if find corresponding matching value, prove that then web-A (Download) data that get access to are identical with original web-A, then surperficial webpage is not illegally distorted.
Because the webpage that server end provides in the reality is to be at any time among dynamically updating, therefore for the real-time ensuring fail safe, server end should be in real time provides the identifying code of new webpage according to the proposed method for terminal in new web page more, thereby be implemented in the integrity degree whenever terminal can both be verified the information of the webpage that will open, reduce the risk of viral in the mistake and wooden horse.
Claims (5)
1. network information verification method is characterized in that, may further comprise the steps:
A. the webpage additional identification code of network server end to providing;
B. with identifying code by network delivery to terminal;
C. terminal deposits the identifying code that receives in terminal database;
D. during the webpage of terminal access server end, obtain the identifying code of webpage;
E. take the identifying code that gets access to as index value matching inquiry in terminal database, if find matching value, then safe web page is opened, if can not find matching value, is proved that then the network information goes wrong, with result feedback to the terminal use.
2. network information verification method according to claim 1, it is characterized in that, network server end described in the step a is carried out MD5 numerical computations for network server end to each webpage that provides to the method for the webpage additional identification code that provides, forms 128 corresponding secure Hash value.
3. network information verification method according to claim 2 is characterized in that, described in the step b with identifying code by network delivery to the method for terminal for by the DVB channel 128 secure Hash value of each webpage are sent to the terminal use with broadcast mode.
4. network information verification method according to claim 3, it is characterized in that, terminal described in the step c is that terminal receives the parsing broadcast data with the method that the identifying code that receives deposits terminal database in, extracts 128 secure Hash value, and deposits the terminal dynamic data base in.
5. network information verification method according to claim 4, it is characterized in that, during the webpage of the server end of terminal access described in the steps d, obtain the method for identifying code of webpage for by Network Capture is carried out local md5 calculating and obtains corresponding md5 value to local data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012102844123A CN102857496A (en) | 2012-08-10 | 2012-08-10 | Network information verifying method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012102844123A CN102857496A (en) | 2012-08-10 | 2012-08-10 | Network information verifying method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102857496A true CN102857496A (en) | 2013-01-02 |
Family
ID=47403690
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012102844123A Pending CN102857496A (en) | 2012-08-10 | 2012-08-10 | Network information verifying method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102857496A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103929406A (en) * | 2013-01-15 | 2014-07-16 | 中国银联股份有限公司 | Fake web page detection method and system |
CN106164960A (en) * | 2014-02-05 | 2016-11-23 | 株式会社咕嘟妈咪 | Authentication processing system and authentication processing server |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101155028A (en) * | 2006-09-26 | 2008-04-02 | 阿里巴巴公司 | Method and system for safe login of website |
CN102611707A (en) * | 2012-03-21 | 2012-07-25 | 北龙中网(北京)科技有限责任公司 | Credible website identity installation and identification method |
-
2012
- 2012-08-10 CN CN2012102844123A patent/CN102857496A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101155028A (en) * | 2006-09-26 | 2008-04-02 | 阿里巴巴公司 | Method and system for safe login of website |
CN102611707A (en) * | 2012-03-21 | 2012-07-25 | 北龙中网(北京)科技有限责任公司 | Credible website identity installation and identification method |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103929406A (en) * | 2013-01-15 | 2014-07-16 | 中国银联股份有限公司 | Fake web page detection method and system |
CN103929406B (en) * | 2013-01-15 | 2017-03-01 | 中国银联股份有限公司 | Pseudo- Web page detection method and system |
CN106164960A (en) * | 2014-02-05 | 2016-11-23 | 株式会社咕嘟妈咪 | Authentication processing system and authentication processing server |
CN106164960B (en) * | 2014-02-05 | 2020-01-21 | 株式会社咕嘟妈咪 | Authentication processing system and authentication processing server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102724310B (en) | A kind of method that realizes cloud search by mobile terminal | |
US8051484B2 (en) | Method and security system for indentifying and blocking web attacks by enforcing read-only parameters | |
CN101251881A (en) | Device, system and method for recognizing content | |
WO2020143317A1 (en) | Fragmented file verification method and terminal device | |
WO2019161774A1 (en) | Methods, application server, block chain node and media for logistics tracking and source tracing | |
US11375292B2 (en) | Verifying the rendering of video content at client devices using trusted platform modules | |
CN104333580A (en) | Account management system and method based on cloud service | |
US8572366B1 (en) | Authenticating clients | |
US20130030912A1 (en) | Method for updating advertisement content using drm | |
CN106557704A (en) | Information and data framework in content center network | |
CN105491030A (en) | Website user password encryption and verification method | |
Kim et al. | Client‐Side Deduplication to Enhance Security and Reduce Communication Costs | |
Schneier | One‐Way Hash Functions | |
US8307457B2 (en) | Method and terminal for receiving rights object for content on behalf of memory card | |
US20130145174A1 (en) | Infrastructure independent recovery key release | |
US10506282B2 (en) | Generating media signature for content delivery | |
CN102857496A (en) | Network information verifying method | |
CN101739522A (en) | DRM file integrity protection method and device | |
Bieniasz et al. | SocialStegDisc: Application of steganography in social networks to create a file system | |
Hong et al. | Query integrity verification based-on mac chain in cloud storage | |
CN102291414A (en) | C/S (Client Server) mode based mobile terminal trusted access and management system and method | |
CN102594812A (en) | Method and system for authenticating identity (ID) of Internet Protocol television dynamic network | |
CN107657294B (en) | Method and system for improving security of two-dimension code on publication | |
TWI750252B (en) | Method and device for recording website access log | |
CN110704451A (en) | Ownership registration and evidence-providing method and device based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130102 |