CN106534193A - Request data processing method and request data processing system - Google Patents

Request data processing method and request data processing system Download PDF

Info

Publication number
CN106534193A
CN106534193A CN201611169321.XA CN201611169321A CN106534193A CN 106534193 A CN106534193 A CN 106534193A CN 201611169321 A CN201611169321 A CN 201611169321A CN 106534193 A CN106534193 A CN 106534193A
Authority
CN
China
Prior art keywords
request data
request
data processing
client
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611169321.XA
Other languages
Chinese (zh)
Inventor
苟顺涛
李巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ctrip Computer Technology Shanghai Co Ltd
Original Assignee
Ctrip Computer Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ctrip Computer Technology Shanghai Co Ltd filed Critical Ctrip Computer Technology Shanghai Co Ltd
Priority to CN201611169321.XA priority Critical patent/CN106534193A/en
Publication of CN106534193A publication Critical patent/CN106534193A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a request data processing method and a request data processing system. The request data processing method comprises the steps that: (S1) a client initiates a request, (S2) a server receives the request, generates request data, and encrypts the request data, and (S3) the server returns the encrypted data to the client. According to the request data processing method and the request data processing system, based on the secondary encryption of a request result, when the request result is obtained by a crawler, the crawler is effectively prevented from obtaining request information, the difficulty of crawler break is raised, and the crawler is effectively intercepted. The zero injury of the request result encryption can be realized, the process is transparent for the user, for the crawler, data can not be directly obtained after obtaining the request result, and thus in the condition of not affecting an accidental injure rate and nearly not affecting performance, the difficulty of obtaining the data by crawler is greatly increased.

Description

Request data processing method and request data processing system
Technical field
The present invention relates to a kind of Internet technical field, more particularly to a kind of request data processing method and request data Processing system.
Background technology
As the development of internet, the reptile amount on current internet increasingly increase, reptile can forge user behavior, constantly Ground access server obtains information, so can drag significantly slow rate server, and private information resource can be caused to be obtained in batches The risk for taking.How advanced reptile means are sent out it be badly in need of solution protecting company's private information resource to have become one by taking Problem certainly.
If traditional anti-means complexity enough of climbing for reptile identification can actually effectively prevent crawler capturing data, But there is certain accidental injury rate, and complexity is higher, accidental injury rate is also higher.Once being cracked, reptile just easily can intercept Required data.
The content of the invention
The technical problem to be solved in the present invention is traditional in prior art to climb hand for the counter of reptile identification to overcome Once section has certain accidental injury rate and is cracked, reptile just easily intercepts the defect of required data, there is provided a kind of Request data processing method and request data processing system.
The present invention is solving above-mentioned technical problem by following technical proposals:
The invention provides a kind of request data processing method, its feature is to comprise the following steps:
S1, client initiate request;
S2, after server receives request, generate request data, and request data be encrypted;
S3, server the data after encryption are back to into client.
It is preferred that the request data processing method also includes:
S4, client receive encryption after request data after, the request data after encryption is decrypted.
It is preferred that step S4In carry out business logic processing always according to the request data after decryption.
It is preferred that step S4In the request data after encryption is decrypted by shell script.
It is an object of the invention to additionally provide a kind of request data processing system, its feature is, including client and Server;
The client is used to initiate request;
The server is used for upon receiving a request, generates request data, and request data is encrypted;
The server is additionally operable to for the data after encryption to be back to client.
It is preferred that after the client is additionally operable to the request data after encryption is received, to the request data after encryption It is decrypted.
It is preferred that the request data after the client is additionally operable to according to decryption carries out business logic processing.
It is preferred that the client is used to be decrypted the request data after encryption by shell script.
The present invention positive effect be:Secondary encryption of the present invention based on request results, can be in request results When being obtained by reptile, effectively prevent reptile from obtaining solicited message, improve the difficulty that reptile is cracked, reptile is more effectively blocked Cut.Also, the present invention to request results encryption can realize zero accidental injury, for a user this process be it is transparent, for For reptile, direct access data after taking request results, are unable to, so as to realize not affecting accidental injury rate, having little influence on property In the case of energy, the difficulty that reptile obtains data is greatly increased.
Description of the drawings
Module diagrams of the Fig. 1 for the request data processing system of presently preferred embodiments of the present invention.
Flow charts of the Fig. 2 for the request data processing method of presently preferred embodiments of the present invention.
Specific embodiment
The present invention is further illustrated below by the mode of embodiment, but does not therefore limit the present invention to described reality Among applying a scope.
As shown in figure 1, the request data processing system of the present invention includes client 1 and server 2, wherein, the client End 1 is used to initiate request, with to 2 request data of server;The server 2 is used for upon receiving a request, generates number of request According to, and request data is encrypted;The server 2 is additionally operable to for the data after encryption to be back to client 1.
After the client 1 is additionally operable to the request data after encryption is received, asking after shell script is to encryption Ask data to be decrypted, conventional business logic processing is carried out according to the request data after decryption then.
Present invention also offers a kind of request data processing method, is realized using above-mentioned request data processing system, such as Shown in Fig. 2, comprise the following steps:
Step 101, client initiate request;
After step 102, server receive request, request data is generated, and request data is encrypted;
Data after encryption are back to client by step 103, server;
After step 104, client receive the request data after encryption, by shell script to the request data after encryption It is decrypted, and business logic processing is carried out according to the request data after decryption.
Although the foregoing describing the specific embodiment of the present invention, it will be appreciated by those of skill in the art that these It is merely illustrative of, protection scope of the present invention is defined by the appended claims.Those skilled in the art is not carrying on the back On the premise of the principle and essence of the present invention, various changes or modifications, but these changes can be made to these embodiments Protection scope of the present invention is each fallen within modification.

Claims (8)

1. a kind of request data processing method, it is characterised in that comprise the following steps:
S1, client initiate request;
S2, after server receives request, generate request data, and request data be encrypted;
S3, server the data after encryption are back to into client.
2. request data processing method as claimed in claim 1, it is characterised in that the request data processing method is also wrapped Include:
S4, client receive encryption after request data after, the request data after encryption is decrypted.
3. request data processing method as claimed in claim 2, it is characterised in that step S4In always according to the request after decryption Data carry out business logic processing.
4. request data processing method as claimed in claim 2, it is characterised in that step S4In by shell script to encryption Request data afterwards is decrypted.
5. a kind of request data processing system, it is characterised in that including client and server;
The client is used to initiate request;
The server is used for upon receiving a request, generates request data, and request data is encrypted;
The server is additionally operable to for the data after encryption to be back to client.
6. request data processing system as claimed in claim 5, it is characterised in that the client be additionally operable to receiving plus After request data after close, the request data after encryption is decrypted.
7. request data processing system as claimed in claim 6, it is characterised in that the client is additionally operable to according to after decryption Request data carry out business logic processing.
8. request data processing system as claimed in claim 6, it is characterised in that the client is used for by shell script Request data after encryption is decrypted.
CN201611169321.XA 2016-12-16 2016-12-16 Request data processing method and request data processing system Pending CN106534193A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611169321.XA CN106534193A (en) 2016-12-16 2016-12-16 Request data processing method and request data processing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611169321.XA CN106534193A (en) 2016-12-16 2016-12-16 Request data processing method and request data processing system

Publications (1)

Publication Number Publication Date
CN106534193A true CN106534193A (en) 2017-03-22

Family

ID=58340968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611169321.XA Pending CN106534193A (en) 2016-12-16 2016-12-16 Request data processing method and request data processing system

Country Status (1)

Country Link
CN (1) CN106534193A (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577701A (en) * 2016-03-09 2016-05-11 携程计算机技术(上海)有限公司 Web crawler recognition method and system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105577701A (en) * 2016-03-09 2016-05-11 携程计算机技术(上海)有限公司 Web crawler recognition method and system

Similar Documents

Publication Publication Date Title
EP3893170B1 (en) Federated learning-based model parameter training method, apparatus and device, and medium
US11321734B2 (en) Information processing method, server, and computer storage medium
EP3424195B1 (en) Encrypted password transport across untrusted cloud network
US10050982B1 (en) Systems and methods for reverse-engineering malware protocols
US11671509B2 (en) Anonymous eCommerce behavior tracking
US20180091486A1 (en) Secured file transfer management on augmented reality (ar) and virtual reality (vr) devices
US20130061298A1 (en) Authenticating session passwords
EP2614458B1 (en) Method of authentification for access to a website
Zheng et al. A session and dialogue-based social engineering framework
CN113536250B (en) Token generation method, login verification method and related equipment
CN104283686A (en) Digital right management method and system
US20230306114A1 (en) Method and system for automatically generating malware signature
CN109977703A (en) A kind of encryption method of safety keyboard, storage medium and terminal device
US10826901B2 (en) Systems and method for cross-channel device binding
CN106911628A (en) A kind of user registers the method and device of application software on the client
CN111147447A (en) Data protection method and system
CN116781425B (en) Service data acquisition method, device, equipment and storage medium
CN111901335B (en) Block chain data transmission management method and system based on middle station
CN106295366B (en) Sensitive data identification method and device
CN103997730A (en) Method for decrypting, copying and pasting encrypted data
CN106534193A (en) Request data processing method and request data processing system
CN109936448A (en) A kind of data transmission method and device
CN103997483B (en) A kind of information security control method, device and electronic equipment
CN111181831A (en) Communication data processing method and device, storage medium and electronic device
CN112019418B (en) Method and device for establishing IPSec tunnel based on brutal mode

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170322