CN109413105A - A kind of network request processing method, device, computer equipment and storage medium - Google Patents

A kind of network request processing method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109413105A
CN109413105A CN201811517802.4A CN201811517802A CN109413105A CN 109413105 A CN109413105 A CN 109413105A CN 201811517802 A CN201811517802 A CN 201811517802A CN 109413105 A CN109413105 A CN 109413105A
Authority
CN
China
Prior art keywords
parameter
network request
encrypted
request
characters string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811517802.4A
Other languages
Chinese (zh)
Inventor
熊雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Hive Box Technology Co Ltd
Original Assignee
Shenzhen Hive Box Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hive Box Technology Co Ltd filed Critical Shenzhen Hive Box Technology Co Ltd
Priority to CN201811517802.4A priority Critical patent/CN109413105A/en
Publication of CN109413105A publication Critical patent/CN109413105A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Abstract

The embodiment of the invention discloses a kind of network request processing method, device, computer equipment and storage mediums, which comprises is encrypted to form the first encrypted characters string by raw requests parameter of the shared key to network request;The first encrypted characters string is encrypted to form the first CIPHERING REQUEST parameter by predetermined encryption algorithm;Network request is initiated to server according to the raw requests parameter and the first CIPHERING REQUEST parameter.The technical solution of the embodiment of the present invention can effectively avoid malice from grabbing data and malicious requests, and reduce cost, mitigate the burden of server, while can be improved access speed.

Description

A kind of network request processing method, device, computer equipment and storage medium
Technical field
The present embodiments relate to technical field of communication network more particularly to a kind of network request processing methods, device, meter Calculate machine equipment and storage medium.
Background technique
With the development of mobile terminal, mobile terminal application field is more and more extensive.The mistake that client is interacted with server Cheng Zhong, when the network request initiated is held as a hostage or installation kit is cracked, attacker can simulate a large amount of requests of progress to obtain Access evidence carries out malicious attack.
In the prior art, malice grabs data and malicious requests in order to prevent, is proposed HTTPS (Hyper Text Transfer Protocol over Secure Socket Layer, Hyper text transfer security protocol) it is client and service The data transmission of encryption is provided between device, to protect data safety.
In the implementation of the present invention, the discovery prior art has following defects that the HTTPS certificate of necessity is tested to inventor Card, and certificate needs annual fee, therefore will increase cost, while can also aggravate the burden of server, reduces access speed.
Summary of the invention
The embodiment of the present invention provides a kind of network request processing method, device, computer equipment and storage medium, Neng Gouyou Effect avoids malice from grabbing data and malicious requests, and reduces cost, mitigates the burden of server, while can be improved access speed Degree.
In a first aspect, being applied to terminal the embodiment of the invention provides a kind of network request processing method, comprising:
It is encrypted to form the first encrypted characters string by raw requests parameter of the shared key to network request;
The first encrypted characters string is encrypted to form the first CIPHERING REQUEST parameter by predetermined encryption algorithm;
Network request is initiated to server according to the raw requests parameter and the first CIPHERING REQUEST parameter.
Second aspect, the embodiment of the invention also provides a kind of network request processing methods, are applied to server, comprising:
Receive the network request that terminal is initiated according to the raw requests parameter of network request and the first CIPHERING REQUEST parameter;
The raw requests parameter is encrypted to form the second encrypted characters string by shared key;
The second encrypted characters string is encrypted to form the second CIPHERING REQUEST parameter by predetermined encryption algorithm;
The first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter are compared, if it is determined that comparison at Function then responds the network request.
The third aspect, the embodiment of the invention also provides a kind of network request processing units, are configured at terminal, comprising:
First encrypted characters string generation module, for being added by raw requests parameter of the shared key to network request Close processing forms the first encrypted characters string;
First CIPHERING REQUEST parameter generation module, for being carried out by predetermined encryption algorithm to the first encrypted characters string Encryption forms the first CIPHERING REQUEST parameter;
Network request initiation module, for according to the raw requests parameter and the first CIPHERING REQUEST parameter to service Device initiates network request.
Fourth aspect, the embodiment of the invention also provides a kind of network request processing units, are configured at server, comprising:
Network request receiving module, for receiving terminal according to the raw requests parameter and the first CIPHERING REQUEST of network request The network request that parameter is initiated;
Second encrypted characters string generation module, for the raw requests parameter to be encrypted by shared key Form the second encrypted characters string;
Second CIPHERING REQUEST parameter generation module, for being carried out by predetermined encryption algorithm to the second encrypted characters string Encryption forms the second CIPHERING REQUEST parameter;
Parameter comparison module, for being carried out pair to the first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter Than, if it is determined that it compares successfully, then responds the network request.
5th aspect, the embodiment of the invention also provides a kind of computer equipment, the computer equipment includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes network request processing method provided by any embodiment of the invention.
6th aspect, the embodiment of the invention also provides a kind of computer storage mediums, are stored thereon with computer program, The program realizes network request processing method provided by any embodiment of the invention when being executed by processor.
The raw requests parameter and encryption that the embodiment of the present invention includes by the network request that server receiving terminal is sent Required parameter carries out encryption using the cipher mode that terminal uses according to raw requests parameter and generates new CIPHERING REQUEST parameter, And the new required parameter of received CIPHERING REQUEST parameter and generation is compared, the network for comparing successfully then corresponding terminal is asked It asks, solves existing at high cost, burden weight existing when guaranteeing data security by HTTPS and access speed is more low asks Topic is realized and malice is effectively avoided to grab data and malicious requests, and reduces cost, mitigates the burden of server, while can mention The beneficial effect of high access speed.
Detailed description of the invention
Fig. 1 is a kind of flow chart for network request processing method that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow chart of network request processing method provided by Embodiment 2 of the present invention;
Fig. 3 is a kind of schematic diagram for network request processing unit that the embodiment of the present invention three provides;
Fig. 4 is a kind of schematic diagram for network request processing unit that the embodiment of the present invention four provides;
Fig. 5 is a kind of structural schematic diagram for terminal that the embodiment of the present invention five provides.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.
It also should be noted that only the parts related to the present invention are shown for ease of description, in attached drawing rather than Full content.It should be mentioned that some exemplary embodiments are described before exemplary embodiment is discussed in greater detail At the processing or method described as flow chart.Although operations (or step) are described as the processing of sequence by flow chart, It is that many of these operations can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of operations can be by again It arranges.The processing can be terminated when its operations are completed, it is also possible to have the additional step being not included in attached drawing. The processing can correspond to method, function, regulation, subroutine, subprogram etc..
Embodiment one
Fig. 1 is a kind of flow chart for network request processing method that the embodiment of the present invention one provides, and the present embodiment is applicable In send network request to server the case where, this method can be executed by network request processing unit, which can be by The mode of software and/or hardware can be generally integrated in terminal device to realize, with the server requested for response to network It is used cooperatively.Correspondingly, as shown in Figure 1, this method includes following operation:
S110, it is encrypted to form the first encrypted characters by raw requests parameter of the shared key to network request String.
Wherein, shared key can be preset, the character string being made of letter, number or symbol etc., character The content and number of string can be set according to actual needs, and the embodiment of the present invention does not limit the concrete form of shared key It is fixed.
In embodiments of the present invention, when terminal needs to initiate network request to server, network request quilt in order to prevent It kidnaps, shape can be encrypted to the raw requests parameter for including in network request by pre-set shared key At the first encrypted characters string.
In an alternate embodiment of the present invention where, it is carried out by raw requests parameter of the shared key to network request Encryption is formed before the first encrypted characters string, may include: to obtain the shared key from cloud and be stored in primary bottom Layer.It is encrypted to form the first encrypted characters string by raw requests parameter of the shared key to network request, can wrap It includes: the raw requests parameter and the shared key is spliced, form the first encrypted characters string.
Optionally, preset shared key can save beyond the clouds.Terminal can be shared close from cloud request Key, and save it in primary bottom, wherein primary bottom can be C or C++ layers.The shared key that terminal will acquire saves Shared key can be effectively prevented in primary bottom to be cracked.
Correspondingly, being encrypted to form the first encryption by raw requests parameter of the shared key to network request When character string, directly raw requests parameter and shared key can be spliced, to form the first encrypted characters string.Its In, the mode of splicing can be raw requests parameter and shared key head and the tail splice, alternatively, be also possible to raw requests parameter and Shared key intersects splicing, and the embodiment of the present invention is not spliced to form the first encrypted characters to raw requests parameter and shared key Mode used by going here and there is defined.
S120, the first encrypted characters string is encrypted to form the first CIPHERING REQUEST by predetermined encryption algorithm Parameter.
In embodiments of the present invention, when shape is encrypted to the raw requests parameter of network request in use shared key After the first encrypted characters string, it can continue to carry out at encryption the first encrypted characters string of generation using predetermined encryption algorithm Reason, so that the first CIPHERING REQUEST parameter is formed, with the safety of further Logistics networks required parameter.Optionally, described default Encryption Algorithm can choose MD5 algorithm.
S130, network request is initiated to server according to the raw requests parameter and the first CIPHERING REQUEST parameter.
Correspondingly, terminal after forming the first CIPHERING REQUEST parameter, can simultaneously encrypt raw requests parameter and first Required parameter is sent to server simultaneously, to initiate network request.Received server-side is encrypted to raw requests parameter and first After required parameter, it is new to generate the same mode of the first CIPHERING REQUEST parameter can be generated using terminal according to raw requests parameter CIPHERING REQUEST parameter, and when the new CIPHERING REQUEST parameter of determination is consistent with the first CIPHERING REQUEST parameter, ability response to network is asked It asks.Therefore, during terminal initiates network request, even if raw requests parameter or the first CIPHERING REQUEST parameter are held as a hostage, It is used to form the shared key of the first CIPHERING REQUEST parameter since attacker can not obtain, direction of attack server, which is sent, robs When the raw requests parameter or the first CIPHERING REQUEST parameter held, server will not be responded, so that malice effectively be avoided to grab number According to and malicious requests.Meanwhile network request processing method provided by the embodiment of the present invention is not necessarily to certification authentication, therefore can drop Low cost, and mitigate the burden of server, improve access speed.
The technical solution of the present embodiment carries out at encryption by using raw requests parameter of the shared key to network request Reason forms the first encrypted characters string, and by predetermined encryption algorithm the first encrypted characters string is encrypted to form first and add Close required parameter, and then network request is initiated to server according to raw requests parameter and the first CIPHERING REQUEST parameter, it solves It the problems such as existing existing at high cost, burden weight and access speed is lower when being guaranteed data security by HTTPS, realizes effective It avoids malice from grabbing data and malicious requests, and reduces cost, mitigates the burden of server, while can be improved access speed Beneficial effect.
Embodiment two
Fig. 2 is a kind of flow chart of network request processing method provided by Embodiment 2 of the present invention, and the present embodiment is applicable In server response to network request the case where, this method can be executed by network request processing unit, which can be by soft The mode of part and/or hardware is realized, and can generally be integrated in the server, is made with the terminal cooperation for initiating network request With.Correspondingly, as shown in Fig. 2, this method includes following operation:
S210, reception terminal are asked according to the network that the raw requests parameter of network request and the first CIPHERING REQUEST parameter are initiated It asks.
In embodiments of the present invention, terminal is according to the raw requests parameter of network request and the first CIPHERING REQUEST parameter to clothes It is engaged in after the network request that device is initiated, server can receive the raw requests parameter and the first CIPHERING REQUEST that network request includes Parameter.
In an alternate embodiment of the present invention where, terminal is being received according to the raw requests parameter of network request and first It may include: to obtain the shared key from cloud and be stored in database before the network request that CIPHERING REQUEST parameter is initiated.
Wherein, shared key can be preset, the character string being made of letter, number or symbol etc., character The content and number of string can be set according to actual needs, and the embodiment of the present invention does not limit the concrete form of shared key It is fixed.
Optionally, server can be obtained in advance from cloud and be preset before the network request that response terminal is initiated Shared key, and save it in database.
S220, the raw requests parameter is encrypted to form the second encrypted characters string by shared key.
In embodiments of the present invention, added when server receives terminal according to the raw requests parameter of network request and first When the network request that close required parameter is initiated, received raw requests parameter can be carried out by the shared key locally saved Encryption forms the second encrypted characters string.
In an alternate embodiment of the present invention where, the raw requests parameter is encrypted by shared key The second encrypted characters string is formed, may include: to splice the raw requests parameter and the shared key, described in formation Second encrypted characters string.
Correspondingly, being encrypted to form by raw requests parameter of the shared key to network request in server When two encrypted characters strings, directly raw requests parameter and shared key can be spliced, to form the second encrypted characters String.Wherein, the mode of splicing can be raw requests parameter and shared key head and the tail splice, alternatively, being also possible to raw requests Parameter and shared key intersect splicing, and the embodiment of the present invention is not spliced to form second to raw requests parameter and shared key and adds Mode used by close character string is defined, but its connecting method needs are identical as connecting method used by terminal.
S230, the second encrypted characters string is encrypted to form the second CIPHERING REQUEST by predetermined encryption algorithm Parameter.
In embodiments of the present invention, when shape is encrypted to the raw requests parameter of network request in use shared key After the second encrypted characters string, it can continue to carry out at encryption the second encrypted characters string of generation using predetermined encryption algorithm Reason, so that the second CIPHERING REQUEST parameter is formed, to use the second CIPHERING REQUEST parameter to compare with the first CIPHERING REQUEST parameter Verifying.Optionally, the predetermined encryption algorithm can choose MD5 algorithm.
S240, the first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter are compared, if it is determined that right Than success, then the network request is responded.
Correspondingly, the first encryption that server can send the second CIPHERING REQUEST parameter of generation with received terminal is asked Parameter is asked to compare verifying.If it is determined that comparing successfully, i.e., the first CIPHERING REQUEST parameter is consistent with the second CIPHERING REQUEST parameter, The network request of terminal initiation can then be responded;Otherwise it determines comparison failure, is then not responding to the network request of terminal initiation.Thus As it can be seen that during terminal initiates network request, even if raw requests parameter or the first CIPHERING REQUEST parameter are held as a hostage, due to Attacker can not obtain the shared key for being used to form the first CIPHERING REQUEST parameter, therefore direction of attack server sends abduction When raw requests parameter or the first CIPHERING REQUEST parameter, server will not be responded, thus effectively avoid malice grab data and Malicious requests.Meanwhile network request processing method provided by the embodiment of the present invention is not necessarily to certification authentication, therefore can reduce into This, and mitigate the burden of server, improve access speed.
The technical solution of the present embodiment is asked by receiving terminal according to the raw requests parameter of network request and the first encryption The network request for asking parameter to initiate, to be encrypted to form the second encrypted characters to raw requests parameter by shared key String, and the second encrypted characters string is encrypted to form the second CIPHERING REQUEST parameter by predetermined encryption algorithm, it is finally right First CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter compare, if it is determined that compare successfully, then response to network is requested, solution It has determined the problems such as existing existing at high cost, burden weight and access speed is lower when being guaranteed data security by HTTPS, has realized It effectively avoids malice from grabbing data and malicious requests, and reduces cost, mitigates the burden of server, while can be improved access speed The beneficial effect of degree.
Embodiment three
Fig. 3 is a kind of schematic diagram for network request processing unit that the embodiment of the present invention three provides, as shown in figure 3, described Device includes: the first encrypted characters string generation module 310, the first CIPHERING REQUEST parameter generation module 320 and network request hair Play module 330, in which:
First encrypted characters string generation module 310, for by shared key to the raw requests parameter of network request into Row encryption forms the first encrypted characters string;
First CIPHERING REQUEST parameter generation module 320, for passing through predetermined encryption algorithm to the first encrypted characters string It is encrypted to form the first CIPHERING REQUEST parameter;
Network request initiation module 330, for according to the raw requests parameter and the first CIPHERING REQUEST parameter to Server initiates network request.
The technical solution of the present embodiment carries out at encryption by using raw requests parameter of the shared key to network request Reason forms the first encrypted characters string, and by predetermined encryption algorithm the first encrypted characters string is encrypted to form first and add Close required parameter, and then network request is initiated to server according to raw requests parameter and the first CIPHERING REQUEST parameter, it solves It the problems such as existing existing at high cost, burden weight and access speed is lower when being guaranteed data security by HTTPS, realizes effective It avoids malice from grabbing data and malicious requests, and reduces cost, mitigates the burden of server, while can be improved access speed Beneficial effect.
Optionally, described device further include: the first shared key obtains module, for obtaining the shared key from cloud And it is stored in primary bottom;First CIPHERING REQUEST parameter generation module 320 is specifically used for the raw requests parameter and described Shared key is spliced, and the first encrypted characters string is formed.
Optionally, the predetermined encryption algorithm is MD5 algorithm.
Network request processing method provided by the embodiment of the present invention one can be performed in above-mentioned network request processing unit, has The corresponding functional module of execution method and beneficial effect.The not technical detail of detailed description in the present embodiment, reference can be made to this hair The network request processing method that bright any embodiment provides.
Since above-mentioned introduced network request processing unit is at the network request that can be executed in the embodiment of the present invention The device of reason method, so based on network request processing method described in the embodiment of the present invention, the affiliated technology people in this field Member can understand the specific embodiment and its various change form of the network request processing unit of the present embodiment, so herein How network request processing method in the embodiment of the present invention is realized if being no longer discussed in detail for the network request processing unit.Only It wants those skilled in the art to implement device used by network request processing method in the embodiment of the present invention, belongs to this Shen The range that please be protect.
Example IV
Fig. 4 is a kind of schematic diagram for network request processing unit that the embodiment of the present invention four provides, as shown in figure 4, described Device includes: network request receiving module 410, the second encrypted characters string generation module 420, the second CIPHERING REQUEST parameter generation mould Block 430 and parameter comparison module 440, in which:
Network request receiving module 410 is encrypted for receiving terminal according to the raw requests parameter of network request and first The network request that required parameter is initiated;
Second encrypted characters string generation module 420, for being encrypted by shared key to the raw requests parameter Processing forms the second encrypted characters string;
Second CIPHERING REQUEST parameter generation module 430, for passing through predetermined encryption algorithm to the second encrypted characters string It is encrypted to form the second CIPHERING REQUEST parameter;
Parameter comparison module 440, for being carried out to the first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter Comparison, if it is determined that compare successfully, then respond the network request.
The technical solution of the present embodiment is asked by receiving terminal according to the raw requests parameter of network request and the first encryption The network request for asking parameter to initiate, to be encrypted to form the second encrypted characters to raw requests parameter by shared key String, and the second encrypted characters string is encrypted to form the second CIPHERING REQUEST parameter by predetermined encryption algorithm, it is finally right First CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter compare, if it is determined that compare successfully, then response to network is requested, solution It has determined the problems such as existing existing at high cost, burden weight and access speed is lower when being guaranteed data security by HTTPS, has realized It effectively avoids malice from grabbing data and malicious requests, and reduces cost, mitigates the burden of server, while can be improved access speed The beneficial effect of degree.
Optionally, described device further include: the second shared key obtains module, for obtaining the shared key from cloud And it is stored in database;Second CIPHERING REQUEST parameter generation module 430 is specifically used for the raw requests parameter and described total It enjoys key to be spliced, forms the second encrypted characters string.
Optionally, the predetermined encryption algorithm is MD5 algorithm.
Network request processing method provided by the embodiment of the present invention two can be performed in above-mentioned network request processing unit, has The corresponding functional module of execution method and beneficial effect.The not technical detail of detailed description in the present embodiment, reference can be made to this hair The network request processing method that bright any embodiment provides.
Since above-mentioned introduced network request processing unit is at the network request that can be executed in the embodiment of the present invention The device of reason method, so based on network request processing method described in the embodiment of the present invention, the affiliated technology people in this field Member can understand the specific embodiment and its various change form of the network request processing unit of the present embodiment, so herein How network request processing method in the embodiment of the present invention is realized if being no longer discussed in detail for the network request processing unit.Only It wants those skilled in the art to implement device used by network request processing method in the embodiment of the present invention, belongs to this Shen The range that please be protect.
Embodiment five
Fig. 5 is a kind of structural schematic diagram for terminal that the embodiment of the present invention five provides.Fig. 5, which is shown, to be suitable for being used to realizing this The block diagram of the terminal 512 of invention embodiment.The terminal 512 that Fig. 5 is shown is only an example, should not be to the embodiment of the present invention Function and use scope bring any restrictions.
As shown in figure 5, terminal 512 is showed in the form of universal computing device.The component of terminal 512 may include but unlimited In one or more processor 516, storage device 528, different system components (including storage device 528 and processor are connected 516) bus 518.
Bus 518 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts For example, these architectures include but is not limited to industry standard architecture (Industry Standard Architecture, ISA) bus, microchannel architecture (Micro Channel Architecture, MCA) bus, enhancing Type isa bus, Video Electronics Standards Association (Video Electronics Standards Association, VESA) local Bus and peripheral component interconnection (Peripheral Component Interconnect, PCI) bus.
Terminal 512 typically comprises a variety of computer system readable media.These media can be it is any can be by terminal The usable medium of 512 access, including volatile and non-volatile media, moveable and immovable medium.
Storage device 528 may include the computer system readable media of form of volatile memory, such as arbitrary access Memory (Random Access Memory, RAM) 530 and/or cache memory 532.Terminal 512 can be wrapped further Include other removable/nonremovable, volatile/non-volatile computer system storage mediums.Only as an example, storage system 534 can be used for reading and writing immovable, non-volatile magnetic media (Fig. 5 do not show, commonly referred to as " hard disk drive ").Although It is not shown in Fig. 5, the disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") can be provided, and To removable anonvolatile optical disk (such as CD-ROM (Compact Disc-Read Only Memory, CD-ROM), number Optic disk (Digital Video Disc-Read Only Memory, DVD-ROM) or other optical mediums) read-write CD drive Dynamic device.In these cases, each driver can be connected by one or more data media interfaces with bus 518.It deposits Storage device 528 may include at least one program product, which has one group of (for example, at least one) program module, this A little program modules are configured to perform the function of various embodiments of the present invention.
Program 536 with one group of (at least one) program module 526, can store in such as storage device 528, this The program module 526 of sample includes but is not limited to operating system, one or more application program, other program modules and program It may include the realization of network environment in data, each of these examples or certain combination.Program module 526 usually executes Function and/or method in embodiment described in the invention.
Terminal 512 can also be with one or more external equipments 514 (such as keyboard, sensing equipment, camera, display 524 etc.) communicate, can also be enabled a user to one or more equipment interact with the terminal 512 communicate, and/or with make Any equipment (such as network interface card, modem etc. that the terminal 512 can be communicated with one or more of the other calculating equipment Deng) communication.This communication can be carried out by input/output (Input/Output, I/O) interface 522.Also, terminal 512 is also Can by network adapter 520 and one or more network (such as local area network (Local Area Network, LAN), extensively Net Wide Area Network, WAN in domain) and/or public network, such as internet) communication.As shown, network adapter 520 are communicated by bus 518 with other modules of terminal 512.It should be understood that although not shown in the drawings, terminal 512 can be combined Using other hardware and/or software module, including but not limited to: microcode, device driver, redundant processing unit, external magnetic Dish driving array, disk array (Redundant Arrays of Independent Disks, RAID) system, magnetic tape drive Device and data backup storage system etc..
The program that processor 516 is stored in storage device 528 by operation, thereby executing various function application and number According to processing, such as realize network request processing method provided by the above embodiment of the present invention.
That is, the processing unit is realized when executing described program: the raw requests by shared key to network request Parameter is encrypted to form the first encrypted characters string;The first encrypted characters string is added by predetermined encryption algorithm Close processing forms the first CIPHERING REQUEST parameter;According to the raw requests parameter and the first CIPHERING REQUEST parameter to server Initiate network request.
Embodiment six
The present embodiment is sixth is that provided in an embodiment of the present invention a kind of for executing network provided by the embodiment of the present invention two The server of request processing method, the server include: one or more processors;Storage device, for storing one or more A program;When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes the network request processing method as provided by the embodiment of the present invention two: receiving terminal according to the raw requests of network request The network request that parameter and the first CIPHERING REQUEST parameter are initiated;The raw requests parameter is carried out at encryption by shared key Reason forms the second encrypted characters string;The second encrypted characters string is encrypted to form second by predetermined encryption algorithm CIPHERING REQUEST parameter;The first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter are compared, if it is determined that right Than success, then the network request is responded.Its specific structure and detail content can refer to Fig. 5 and embodiment five.
Embodiment seven
The embodiment of the present invention seven also provides a kind of computer storage medium for storing computer program, the computer program When being executed as computer processor for executing network request processing method described in the above embodiment of the present invention one: by altogether The raw requests parameter for enjoying key pair network request is encrypted to form the first encrypted characters string;Pass through predetermined encryption algorithm The first encrypted characters string is encrypted to form the first CIPHERING REQUEST parameter;According to the raw requests parameter and institute It states the first CIPHERING REQUEST parameter and initiates network request to server.
The computer storage medium of the embodiment of the present invention, can be using any of one or more computer-readable media Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or Device, or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: tool There are electrical connection, the portable computer diskette, hard disk, random access memory (RAM), read-only memory of one or more conducting wires (Read Only Memory, ROM), erasable programmable read only memory ((Erasable Programmable Read Only Memory, EPROM) or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic Memory device or above-mentioned any appropriate combination.In this document, computer readable storage medium, which can be, any includes Or the tangible medium of storage program, which can be commanded execution system, device or device use or in connection make With.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In wireless, electric wire, optical cable, radio frequency (Radio Frequency, RF) etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, Further include conventional procedural programming language --- such as " C " language or similar programming language.Program code can Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package, Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part. In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN) Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service Provider is connected by internet).
Embodiment eight
The embodiment of the present invention eight additionally provides a kind of computer readable storage medium, is stored thereon with computer program, should Program can realize network request processing method described in above-described embodiment two when being executed by processor: receiving terminal and asked according to network The network request that the raw requests parameter asked and the first CIPHERING REQUEST parameter are initiated;The raw requests are joined by shared key Number is encrypted to form the second encrypted characters string;The second encrypted characters string is encrypted by predetermined encryption algorithm Processing forms the second CIPHERING REQUEST parameter;The first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter are carried out pair Than, if it is determined that it compares successfully, then responds the network request.The description of its concrete details content can refer to embodiment seven.
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.

Claims (10)

1. a kind of network request processing method, which is characterized in that be applied to terminal, comprising:
It is encrypted to form the first encrypted characters string by raw requests parameter of the shared key to network request;
The first encrypted characters string is encrypted to form the first CIPHERING REQUEST parameter by predetermined encryption algorithm;
Network request is initiated to server according to the raw requests parameter and the first CIPHERING REQUEST parameter.
2. the method according to claim 1, wherein joining by raw requests of the shared key to network request Number is encrypted before forming the first encrypted characters string, comprising:
The shared key is obtained from cloud and is stored in primary bottom;
It is encrypted to form the first encrypted characters string by raw requests parameter of the shared key to network request, comprising:
The raw requests parameter and the shared key are spliced, the first encrypted characters string is formed.
3. the method according to claim 1, wherein the predetermined encryption algorithm is Message Digest Algorithm 5 MD5 algorithm.
4. a kind of network request processing method, which is characterized in that be applied to server, comprising:
Receive the network request that terminal is initiated according to the raw requests parameter of network request and the first CIPHERING REQUEST parameter;
The raw requests parameter is encrypted to form the second encrypted characters string by shared key;
The second encrypted characters string is encrypted to form the second CIPHERING REQUEST parameter by predetermined encryption algorithm;
The first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter are compared, if it is determined that compare successfully, then Respond the network request.
5. according to the method described in claim 4, it is characterized in that, receiving terminal according to the raw requests parameter of network request Before the network request initiated with the first CIPHERING REQUEST parameter, comprising:
The shared key is obtained from cloud and is stored in database;
The raw requests parameter is encrypted to form the second encrypted characters string by shared key, comprising:
The raw requests parameter and the shared key are spliced, the second encrypted characters string is formed.
6. according to the method described in claim 4, it is characterized in that, the predetermined encryption algorithm is MD5 algorithm.
7. a kind of network request processing unit, which is characterized in that be configured at terminal, comprising:
First encrypted characters string generation module, for being carried out at encryption by raw requests parameter of the shared key to network request Reason forms the first encrypted characters string;
First CIPHERING REQUEST parameter generation module, for being encrypted by predetermined encryption algorithm to the first encrypted characters string Processing forms the first CIPHERING REQUEST parameter;
Network request initiation module, for being sent out according to the raw requests parameter and the first CIPHERING REQUEST parameter to server Play network request.
8. a kind of network request processing unit, which is characterized in that be configured at server, comprising:
Network request receiving module, for receiving terminal according to the raw requests parameter and the first CIPHERING REQUEST parameter of network request The network request of initiation;
Second encrypted characters string generation module, to form for the raw requests parameter to be encrypted by shared key Second encrypted characters string;
Second CIPHERING REQUEST parameter generation module, for being encrypted by predetermined encryption algorithm to the second encrypted characters string Processing forms the second CIPHERING REQUEST parameter;
Parameter comparison module, for being compared to the first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter, such as Fruit determination compares successfully, then responds the network request.
9. a kind of computer equipment, which is characterized in that the equipment includes:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real Now such as network request processing method as claimed in any one of claims 1-3, or realize as described in any in claim 4-6 Network request processing method.
10. a kind of computer storage medium, is stored thereon with computer program, which is characterized in that the program is executed by processor Shi Shixian network request processing method for example as claimed in any one of claims 1-3, or realize such as institute any in claim 4-6 The network request processing method stated.
CN201811517802.4A 2018-12-12 2018-12-12 A kind of network request processing method, device, computer equipment and storage medium Pending CN109413105A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811517802.4A CN109413105A (en) 2018-12-12 2018-12-12 A kind of network request processing method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811517802.4A CN109413105A (en) 2018-12-12 2018-12-12 A kind of network request processing method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109413105A true CN109413105A (en) 2019-03-01

Family

ID=65458730

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811517802.4A Pending CN109413105A (en) 2018-12-12 2018-12-12 A kind of network request processing method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109413105A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112532586A (en) * 2020-11-03 2021-03-19 华帝股份有限公司 Network communication method, system, computer equipment and storage medium
CN115086428A (en) * 2021-03-11 2022-09-20 中国电信股份有限公司 Network request sending method and device and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8190905B1 (en) * 2006-09-29 2012-05-29 Netapp, Inc. Authorizing administrative operations using a split knowledge protocol
CN102624740A (en) * 2012-03-30 2012-08-01 奇智软件(北京)有限公司 Data interaction method, client and server
CN103647746A (en) * 2013-11-01 2014-03-19 北京奇虎科技有限公司 User login method, device and system
CN103973695A (en) * 2014-05-16 2014-08-06 浪潮电子信息产业股份有限公司 Signature algorithm for server validation
CN107911219A (en) * 2017-11-09 2018-04-13 成都知道创宇信息技术有限公司 A kind of anti-CC methods of API based on key signature
CN109309655A (en) * 2017-07-28 2019-02-05 深圳光峰科技股份有限公司 Stateless communication security endorsement method, terminal and server end

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8190905B1 (en) * 2006-09-29 2012-05-29 Netapp, Inc. Authorizing administrative operations using a split knowledge protocol
CN102624740A (en) * 2012-03-30 2012-08-01 奇智软件(北京)有限公司 Data interaction method, client and server
CN103647746A (en) * 2013-11-01 2014-03-19 北京奇虎科技有限公司 User login method, device and system
CN103973695A (en) * 2014-05-16 2014-08-06 浪潮电子信息产业股份有限公司 Signature algorithm for server validation
CN109309655A (en) * 2017-07-28 2019-02-05 深圳光峰科技股份有限公司 Stateless communication security endorsement method, terminal and server end
CN107911219A (en) * 2017-11-09 2018-04-13 成都知道创宇信息技术有限公司 A kind of anti-CC methods of API based on key signature

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112532586A (en) * 2020-11-03 2021-03-19 华帝股份有限公司 Network communication method, system, computer equipment and storage medium
CN115086428A (en) * 2021-03-11 2022-09-20 中国电信股份有限公司 Network request sending method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN110336774B (en) Mixed encryption and decryption method, equipment and system
EP2948864B1 (en) Secure virtual machine migration
US20200076585A1 (en) Storage device key management for encrypted host data
US9948616B2 (en) Apparatus and method for providing security service based on virtualization
CN110414268A (en) Access control method, device, equipment and storage medium
CN108566381A (en) A kind of security upgrading method, device, server, equipment and medium
US20150113618A1 (en) Verifying the security of a remote server
CN104753855B (en) Single-point logging method, applications client, browser, terminal and server
CN110492990A (en) Private key management method, apparatus and system under block chain scene
US10601590B1 (en) Secure secrets in hardware security module for use by protected function in trusted execution environment
US9906518B2 (en) Managing exchanges of sensitive data
CN107204850A (en) A kind of lightweight car networking safety communicating method
CN109150907A (en) Vehicle-mounted industrial personal computer login method, device, system, computer equipment and medium
CN109840398A (en) Software authorization method, device, equipment and storage medium
CN109951295A (en) Key handling and application method, device, equipment and medium
CN108335105A (en) Data processing method and relevant device
CN110190958A (en) A kind of auth method of vehicle, device, electronic equipment and storage medium
US9544287B1 (en) Systems and methods for performing authentication at a network device
US8589683B2 (en) Authentication of a secure virtual network computing (VNC) connection
US11050748B2 (en) Web-based authentication for non-web clients
CN109413105A (en) A kind of network request processing method, device, computer equipment and storage medium
CN112308236A (en) Method, device, electronic equipment and storage medium for processing user request
CN111488169A (en) Method and device for hot updating of application program, storage medium and electronic equipment
CN116738503B (en) Collaborative encryption method for hardware system and operating system and electronic equipment
CN115629824B (en) GPU starting method, device, equipment, storage medium and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190301

RJ01 Rejection of invention patent application after publication