CN106534193A - Request data processing method and request data processing system - Google Patents
Request data processing method and request data processing system Download PDFInfo
- Publication number
- CN106534193A CN106534193A CN201611169321.XA CN201611169321A CN106534193A CN 106534193 A CN106534193 A CN 106534193A CN 201611169321 A CN201611169321 A CN 201611169321A CN 106534193 A CN106534193 A CN 106534193A
- Authority
- CN
- China
- Prior art keywords
- request data
- request
- data processing
- client
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a request data processing method and a request data processing system. The request data processing method comprises the steps that: (S1) a client initiates a request, (S2) a server receives the request, generates request data, and encrypts the request data, and (S3) the server returns the encrypted data to the client. According to the request data processing method and the request data processing system, based on the secondary encryption of a request result, when the request result is obtained by a crawler, the crawler is effectively prevented from obtaining request information, the difficulty of crawler break is raised, and the crawler is effectively intercepted. The zero injury of the request result encryption can be realized, the process is transparent for the user, for the crawler, data can not be directly obtained after obtaining the request result, and thus in the condition of not affecting an accidental injure rate and nearly not affecting performance, the difficulty of obtaining the data by crawler is greatly increased.
Description
Technical field
The present invention relates to a kind of Internet technical field, more particularly to a kind of request data processing method and request data
Processing system.
Background technology
As the development of internet, the reptile amount on current internet increasingly increase, reptile can forge user behavior, constantly
Ground access server obtains information, so can drag significantly slow rate server, and private information resource can be caused to be obtained in batches
The risk for taking.How advanced reptile means are sent out it be badly in need of solution protecting company's private information resource to have become one by taking
Problem certainly.
If traditional anti-means complexity enough of climbing for reptile identification can actually effectively prevent crawler capturing data,
But there is certain accidental injury rate, and complexity is higher, accidental injury rate is also higher.Once being cracked, reptile just easily can intercept
Required data.
The content of the invention
The technical problem to be solved in the present invention is traditional in prior art to climb hand for the counter of reptile identification to overcome
Once section has certain accidental injury rate and is cracked, reptile just easily intercepts the defect of required data, there is provided a kind of
Request data processing method and request data processing system.
The present invention is solving above-mentioned technical problem by following technical proposals:
The invention provides a kind of request data processing method, its feature is to comprise the following steps:
S1, client initiate request;
S2, after server receives request, generate request data, and request data be encrypted;
S3, server the data after encryption are back to into client.
It is preferred that the request data processing method also includes:
S4, client receive encryption after request data after, the request data after encryption is decrypted.
It is preferred that step S4In carry out business logic processing always according to the request data after decryption.
It is preferred that step S4In the request data after encryption is decrypted by shell script.
It is an object of the invention to additionally provide a kind of request data processing system, its feature is, including client and
Server;
The client is used to initiate request;
The server is used for upon receiving a request, generates request data, and request data is encrypted;
The server is additionally operable to for the data after encryption to be back to client.
It is preferred that after the client is additionally operable to the request data after encryption is received, to the request data after encryption
It is decrypted.
It is preferred that the request data after the client is additionally operable to according to decryption carries out business logic processing.
It is preferred that the client is used to be decrypted the request data after encryption by shell script.
The present invention positive effect be:Secondary encryption of the present invention based on request results, can be in request results
When being obtained by reptile, effectively prevent reptile from obtaining solicited message, improve the difficulty that reptile is cracked, reptile is more effectively blocked
Cut.Also, the present invention to request results encryption can realize zero accidental injury, for a user this process be it is transparent, for
For reptile, direct access data after taking request results, are unable to, so as to realize not affecting accidental injury rate, having little influence on property
In the case of energy, the difficulty that reptile obtains data is greatly increased.
Description of the drawings
Module diagrams of the Fig. 1 for the request data processing system of presently preferred embodiments of the present invention.
Flow charts of the Fig. 2 for the request data processing method of presently preferred embodiments of the present invention.
Specific embodiment
The present invention is further illustrated below by the mode of embodiment, but does not therefore limit the present invention to described reality
Among applying a scope.
As shown in figure 1, the request data processing system of the present invention includes client 1 and server 2, wherein, the client
End 1 is used to initiate request, with to 2 request data of server;The server 2 is used for upon receiving a request, generates number of request
According to, and request data is encrypted;The server 2 is additionally operable to for the data after encryption to be back to client 1.
After the client 1 is additionally operable to the request data after encryption is received, asking after shell script is to encryption
Ask data to be decrypted, conventional business logic processing is carried out according to the request data after decryption then.
Present invention also offers a kind of request data processing method, is realized using above-mentioned request data processing system, such as
Shown in Fig. 2, comprise the following steps:
Step 101, client initiate request;
After step 102, server receive request, request data is generated, and request data is encrypted;
Data after encryption are back to client by step 103, server;
After step 104, client receive the request data after encryption, by shell script to the request data after encryption
It is decrypted, and business logic processing is carried out according to the request data after decryption.
Although the foregoing describing the specific embodiment of the present invention, it will be appreciated by those of skill in the art that these
It is merely illustrative of, protection scope of the present invention is defined by the appended claims.Those skilled in the art is not carrying on the back
On the premise of the principle and essence of the present invention, various changes or modifications, but these changes can be made to these embodiments
Protection scope of the present invention is each fallen within modification.
Claims (8)
1. a kind of request data processing method, it is characterised in that comprise the following steps:
S1, client initiate request;
S2, after server receives request, generate request data, and request data be encrypted;
S3, server the data after encryption are back to into client.
2. request data processing method as claimed in claim 1, it is characterised in that the request data processing method is also wrapped
Include:
S4, client receive encryption after request data after, the request data after encryption is decrypted.
3. request data processing method as claimed in claim 2, it is characterised in that step S4In always according to the request after decryption
Data carry out business logic processing.
4. request data processing method as claimed in claim 2, it is characterised in that step S4In by shell script to encryption
Request data afterwards is decrypted.
5. a kind of request data processing system, it is characterised in that including client and server;
The client is used to initiate request;
The server is used for upon receiving a request, generates request data, and request data is encrypted;
The server is additionally operable to for the data after encryption to be back to client.
6. request data processing system as claimed in claim 5, it is characterised in that the client be additionally operable to receiving plus
After request data after close, the request data after encryption is decrypted.
7. request data processing system as claimed in claim 6, it is characterised in that the client is additionally operable to according to after decryption
Request data carry out business logic processing.
8. request data processing system as claimed in claim 6, it is characterised in that the client is used for by shell script
Request data after encryption is decrypted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611169321.XA CN106534193A (en) | 2016-12-16 | 2016-12-16 | Request data processing method and request data processing system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611169321.XA CN106534193A (en) | 2016-12-16 | 2016-12-16 | Request data processing method and request data processing system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106534193A true CN106534193A (en) | 2017-03-22 |
Family
ID=58340968
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611169321.XA Pending CN106534193A (en) | 2016-12-16 | 2016-12-16 | Request data processing method and request data processing system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106534193A (en) |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105577701A (en) * | 2016-03-09 | 2016-05-11 | 携程计算机技术(上海)有限公司 | Web crawler recognition method and system |
-
2016
- 2016-12-16 CN CN201611169321.XA patent/CN106534193A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105577701A (en) * | 2016-03-09 | 2016-05-11 | 携程计算机技术(上海)有限公司 | Web crawler recognition method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3893170B1 (en) | Federated learning-based model parameter training method, apparatus and device, and medium | |
US11321734B2 (en) | Information processing method, server, and computer storage medium | |
EP3424195B1 (en) | Encrypted password transport across untrusted cloud network | |
US10050982B1 (en) | Systems and methods for reverse-engineering malware protocols | |
US11671509B2 (en) | Anonymous eCommerce behavior tracking | |
US20180091486A1 (en) | Secured file transfer management on augmented reality (ar) and virtual reality (vr) devices | |
US20130061298A1 (en) | Authenticating session passwords | |
EP2614458B1 (en) | Method of authentification for access to a website | |
Zheng et al. | A session and dialogue-based social engineering framework | |
CN113536250B (en) | Token generation method, login verification method and related equipment | |
CN104283686A (en) | Digital right management method and system | |
US20230306114A1 (en) | Method and system for automatically generating malware signature | |
CN109977703A (en) | A kind of encryption method of safety keyboard, storage medium and terminal device | |
US10826901B2 (en) | Systems and method for cross-channel device binding | |
CN106911628A (en) | A kind of user registers the method and device of application software on the client | |
CN111147447A (en) | Data protection method and system | |
CN116781425B (en) | Service data acquisition method, device, equipment and storage medium | |
CN111901335B (en) | Block chain data transmission management method and system based on middle station | |
CN106295366B (en) | Sensitive data identification method and device | |
CN103997730A (en) | Method for decrypting, copying and pasting encrypted data | |
CN106534193A (en) | Request data processing method and request data processing system | |
CN109936448A (en) | A kind of data transmission method and device | |
CN103997483B (en) | A kind of information security control method, device and electronic equipment | |
CN111181831A (en) | Communication data processing method and device, storage medium and electronic device | |
CN112019418B (en) | Method and device for establishing IPSec tunnel based on brutal mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170322 |