CN109413105A - A kind of network request processing method, device, computer equipment and storage medium - Google Patents
A kind of network request processing method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109413105A CN109413105A CN201811517802.4A CN201811517802A CN109413105A CN 109413105 A CN109413105 A CN 109413105A CN 201811517802 A CN201811517802 A CN 201811517802A CN 109413105 A CN109413105 A CN 109413105A
- Authority
- CN
- China
- Prior art keywords
- parameter
- network request
- encrypted
- request
- characters string
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Abstract
The embodiment of the invention discloses a kind of network request processing method, device, computer equipment and storage mediums, which comprises is encrypted to form the first encrypted characters string by raw requests parameter of the shared key to network request;The first encrypted characters string is encrypted to form the first CIPHERING REQUEST parameter by predetermined encryption algorithm;Network request is initiated to server according to the raw requests parameter and the first CIPHERING REQUEST parameter.The technical solution of the embodiment of the present invention can effectively avoid malice from grabbing data and malicious requests, and reduce cost, mitigate the burden of server, while can be improved access speed.
Description
Technical field
The present embodiments relate to technical field of communication network more particularly to a kind of network request processing methods, device, meter
Calculate machine equipment and storage medium.
Background technique
With the development of mobile terminal, mobile terminal application field is more and more extensive.The mistake that client is interacted with server
Cheng Zhong, when the network request initiated is held as a hostage or installation kit is cracked, attacker can simulate a large amount of requests of progress to obtain
Access evidence carries out malicious attack.
In the prior art, malice grabs data and malicious requests in order to prevent, is proposed HTTPS (Hyper Text
Transfer Protocol over Secure Socket Layer, Hyper text transfer security protocol) it is client and service
The data transmission of encryption is provided between device, to protect data safety.
In the implementation of the present invention, the discovery prior art has following defects that the HTTPS certificate of necessity is tested to inventor
Card, and certificate needs annual fee, therefore will increase cost, while can also aggravate the burden of server, reduces access speed.
Summary of the invention
The embodiment of the present invention provides a kind of network request processing method, device, computer equipment and storage medium, Neng Gouyou
Effect avoids malice from grabbing data and malicious requests, and reduces cost, mitigates the burden of server, while can be improved access speed
Degree.
In a first aspect, being applied to terminal the embodiment of the invention provides a kind of network request processing method, comprising:
It is encrypted to form the first encrypted characters string by raw requests parameter of the shared key to network request;
The first encrypted characters string is encrypted to form the first CIPHERING REQUEST parameter by predetermined encryption algorithm;
Network request is initiated to server according to the raw requests parameter and the first CIPHERING REQUEST parameter.
Second aspect, the embodiment of the invention also provides a kind of network request processing methods, are applied to server, comprising:
Receive the network request that terminal is initiated according to the raw requests parameter of network request and the first CIPHERING REQUEST parameter;
The raw requests parameter is encrypted to form the second encrypted characters string by shared key;
The second encrypted characters string is encrypted to form the second CIPHERING REQUEST parameter by predetermined encryption algorithm;
The first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter are compared, if it is determined that comparison at
Function then responds the network request.
The third aspect, the embodiment of the invention also provides a kind of network request processing units, are configured at terminal, comprising:
First encrypted characters string generation module, for being added by raw requests parameter of the shared key to network request
Close processing forms the first encrypted characters string;
First CIPHERING REQUEST parameter generation module, for being carried out by predetermined encryption algorithm to the first encrypted characters string
Encryption forms the first CIPHERING REQUEST parameter;
Network request initiation module, for according to the raw requests parameter and the first CIPHERING REQUEST parameter to service
Device initiates network request.
Fourth aspect, the embodiment of the invention also provides a kind of network request processing units, are configured at server, comprising:
Network request receiving module, for receiving terminal according to the raw requests parameter and the first CIPHERING REQUEST of network request
The network request that parameter is initiated;
Second encrypted characters string generation module, for the raw requests parameter to be encrypted by shared key
Form the second encrypted characters string;
Second CIPHERING REQUEST parameter generation module, for being carried out by predetermined encryption algorithm to the second encrypted characters string
Encryption forms the second CIPHERING REQUEST parameter;
Parameter comparison module, for being carried out pair to the first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter
Than, if it is determined that it compares successfully, then responds the network request.
5th aspect, the embodiment of the invention also provides a kind of computer equipment, the computer equipment includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processing
Device realizes network request processing method provided by any embodiment of the invention.
6th aspect, the embodiment of the invention also provides a kind of computer storage mediums, are stored thereon with computer program,
The program realizes network request processing method provided by any embodiment of the invention when being executed by processor.
The raw requests parameter and encryption that the embodiment of the present invention includes by the network request that server receiving terminal is sent
Required parameter carries out encryption using the cipher mode that terminal uses according to raw requests parameter and generates new CIPHERING REQUEST parameter,
And the new required parameter of received CIPHERING REQUEST parameter and generation is compared, the network for comparing successfully then corresponding terminal is asked
It asks, solves existing at high cost, burden weight existing when guaranteeing data security by HTTPS and access speed is more low asks
Topic is realized and malice is effectively avoided to grab data and malicious requests, and reduces cost, mitigates the burden of server, while can mention
The beneficial effect of high access speed.
Detailed description of the invention
Fig. 1 is a kind of flow chart for network request processing method that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow chart of network request processing method provided by Embodiment 2 of the present invention;
Fig. 3 is a kind of schematic diagram for network request processing unit that the embodiment of the present invention three provides;
Fig. 4 is a kind of schematic diagram for network request processing unit that the embodiment of the present invention four provides;
Fig. 5 is a kind of structural schematic diagram for terminal that the embodiment of the present invention five provides.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.
It also should be noted that only the parts related to the present invention are shown for ease of description, in attached drawing rather than
Full content.It should be mentioned that some exemplary embodiments are described before exemplary embodiment is discussed in greater detail
At the processing or method described as flow chart.Although operations (or step) are described as the processing of sequence by flow chart,
It is that many of these operations can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of operations can be by again
It arranges.The processing can be terminated when its operations are completed, it is also possible to have the additional step being not included in attached drawing.
The processing can correspond to method, function, regulation, subroutine, subprogram etc..
Embodiment one
Fig. 1 is a kind of flow chart for network request processing method that the embodiment of the present invention one provides, and the present embodiment is applicable
In send network request to server the case where, this method can be executed by network request processing unit, which can be by
The mode of software and/or hardware can be generally integrated in terminal device to realize, with the server requested for response to network
It is used cooperatively.Correspondingly, as shown in Figure 1, this method includes following operation:
S110, it is encrypted to form the first encrypted characters by raw requests parameter of the shared key to network request
String.
Wherein, shared key can be preset, the character string being made of letter, number or symbol etc., character
The content and number of string can be set according to actual needs, and the embodiment of the present invention does not limit the concrete form of shared key
It is fixed.
In embodiments of the present invention, when terminal needs to initiate network request to server, network request quilt in order to prevent
It kidnaps, shape can be encrypted to the raw requests parameter for including in network request by pre-set shared key
At the first encrypted characters string.
In an alternate embodiment of the present invention where, it is carried out by raw requests parameter of the shared key to network request
Encryption is formed before the first encrypted characters string, may include: to obtain the shared key from cloud and be stored in primary bottom
Layer.It is encrypted to form the first encrypted characters string by raw requests parameter of the shared key to network request, can wrap
It includes: the raw requests parameter and the shared key is spliced, form the first encrypted characters string.
Optionally, preset shared key can save beyond the clouds.Terminal can be shared close from cloud request
Key, and save it in primary bottom, wherein primary bottom can be C or C++ layers.The shared key that terminal will acquire saves
Shared key can be effectively prevented in primary bottom to be cracked.
Correspondingly, being encrypted to form the first encryption by raw requests parameter of the shared key to network request
When character string, directly raw requests parameter and shared key can be spliced, to form the first encrypted characters string.Its
In, the mode of splicing can be raw requests parameter and shared key head and the tail splice, alternatively, be also possible to raw requests parameter and
Shared key intersects splicing, and the embodiment of the present invention is not spliced to form the first encrypted characters to raw requests parameter and shared key
Mode used by going here and there is defined.
S120, the first encrypted characters string is encrypted to form the first CIPHERING REQUEST by predetermined encryption algorithm
Parameter.
In embodiments of the present invention, when shape is encrypted to the raw requests parameter of network request in use shared key
After the first encrypted characters string, it can continue to carry out at encryption the first encrypted characters string of generation using predetermined encryption algorithm
Reason, so that the first CIPHERING REQUEST parameter is formed, with the safety of further Logistics networks required parameter.Optionally, described default
Encryption Algorithm can choose MD5 algorithm.
S130, network request is initiated to server according to the raw requests parameter and the first CIPHERING REQUEST parameter.
Correspondingly, terminal after forming the first CIPHERING REQUEST parameter, can simultaneously encrypt raw requests parameter and first
Required parameter is sent to server simultaneously, to initiate network request.Received server-side is encrypted to raw requests parameter and first
After required parameter, it is new to generate the same mode of the first CIPHERING REQUEST parameter can be generated using terminal according to raw requests parameter
CIPHERING REQUEST parameter, and when the new CIPHERING REQUEST parameter of determination is consistent with the first CIPHERING REQUEST parameter, ability response to network is asked
It asks.Therefore, during terminal initiates network request, even if raw requests parameter or the first CIPHERING REQUEST parameter are held as a hostage,
It is used to form the shared key of the first CIPHERING REQUEST parameter since attacker can not obtain, direction of attack server, which is sent, robs
When the raw requests parameter or the first CIPHERING REQUEST parameter held, server will not be responded, so that malice effectively be avoided to grab number
According to and malicious requests.Meanwhile network request processing method provided by the embodiment of the present invention is not necessarily to certification authentication, therefore can drop
Low cost, and mitigate the burden of server, improve access speed.
The technical solution of the present embodiment carries out at encryption by using raw requests parameter of the shared key to network request
Reason forms the first encrypted characters string, and by predetermined encryption algorithm the first encrypted characters string is encrypted to form first and add
Close required parameter, and then network request is initiated to server according to raw requests parameter and the first CIPHERING REQUEST parameter, it solves
It the problems such as existing existing at high cost, burden weight and access speed is lower when being guaranteed data security by HTTPS, realizes effective
It avoids malice from grabbing data and malicious requests, and reduces cost, mitigates the burden of server, while can be improved access speed
Beneficial effect.
Embodiment two
Fig. 2 is a kind of flow chart of network request processing method provided by Embodiment 2 of the present invention, and the present embodiment is applicable
In server response to network request the case where, this method can be executed by network request processing unit, which can be by soft
The mode of part and/or hardware is realized, and can generally be integrated in the server, is made with the terminal cooperation for initiating network request
With.Correspondingly, as shown in Fig. 2, this method includes following operation:
S210, reception terminal are asked according to the network that the raw requests parameter of network request and the first CIPHERING REQUEST parameter are initiated
It asks.
In embodiments of the present invention, terminal is according to the raw requests parameter of network request and the first CIPHERING REQUEST parameter to clothes
It is engaged in after the network request that device is initiated, server can receive the raw requests parameter and the first CIPHERING REQUEST that network request includes
Parameter.
In an alternate embodiment of the present invention where, terminal is being received according to the raw requests parameter of network request and first
It may include: to obtain the shared key from cloud and be stored in database before the network request that CIPHERING REQUEST parameter is initiated.
Wherein, shared key can be preset, the character string being made of letter, number or symbol etc., character
The content and number of string can be set according to actual needs, and the embodiment of the present invention does not limit the concrete form of shared key
It is fixed.
Optionally, server can be obtained in advance from cloud and be preset before the network request that response terminal is initiated
Shared key, and save it in database.
S220, the raw requests parameter is encrypted to form the second encrypted characters string by shared key.
In embodiments of the present invention, added when server receives terminal according to the raw requests parameter of network request and first
When the network request that close required parameter is initiated, received raw requests parameter can be carried out by the shared key locally saved
Encryption forms the second encrypted characters string.
In an alternate embodiment of the present invention where, the raw requests parameter is encrypted by shared key
The second encrypted characters string is formed, may include: to splice the raw requests parameter and the shared key, described in formation
Second encrypted characters string.
Correspondingly, being encrypted to form by raw requests parameter of the shared key to network request in server
When two encrypted characters strings, directly raw requests parameter and shared key can be spliced, to form the second encrypted characters
String.Wherein, the mode of splicing can be raw requests parameter and shared key head and the tail splice, alternatively, being also possible to raw requests
Parameter and shared key intersect splicing, and the embodiment of the present invention is not spliced to form second to raw requests parameter and shared key and adds
Mode used by close character string is defined, but its connecting method needs are identical as connecting method used by terminal.
S230, the second encrypted characters string is encrypted to form the second CIPHERING REQUEST by predetermined encryption algorithm
Parameter.
In embodiments of the present invention, when shape is encrypted to the raw requests parameter of network request in use shared key
After the second encrypted characters string, it can continue to carry out at encryption the second encrypted characters string of generation using predetermined encryption algorithm
Reason, so that the second CIPHERING REQUEST parameter is formed, to use the second CIPHERING REQUEST parameter to compare with the first CIPHERING REQUEST parameter
Verifying.Optionally, the predetermined encryption algorithm can choose MD5 algorithm.
S240, the first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter are compared, if it is determined that right
Than success, then the network request is responded.
Correspondingly, the first encryption that server can send the second CIPHERING REQUEST parameter of generation with received terminal is asked
Parameter is asked to compare verifying.If it is determined that comparing successfully, i.e., the first CIPHERING REQUEST parameter is consistent with the second CIPHERING REQUEST parameter,
The network request of terminal initiation can then be responded;Otherwise it determines comparison failure, is then not responding to the network request of terminal initiation.Thus
As it can be seen that during terminal initiates network request, even if raw requests parameter or the first CIPHERING REQUEST parameter are held as a hostage, due to
Attacker can not obtain the shared key for being used to form the first CIPHERING REQUEST parameter, therefore direction of attack server sends abduction
When raw requests parameter or the first CIPHERING REQUEST parameter, server will not be responded, thus effectively avoid malice grab data and
Malicious requests.Meanwhile network request processing method provided by the embodiment of the present invention is not necessarily to certification authentication, therefore can reduce into
This, and mitigate the burden of server, improve access speed.
The technical solution of the present embodiment is asked by receiving terminal according to the raw requests parameter of network request and the first encryption
The network request for asking parameter to initiate, to be encrypted to form the second encrypted characters to raw requests parameter by shared key
String, and the second encrypted characters string is encrypted to form the second CIPHERING REQUEST parameter by predetermined encryption algorithm, it is finally right
First CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter compare, if it is determined that compare successfully, then response to network is requested, solution
It has determined the problems such as existing existing at high cost, burden weight and access speed is lower when being guaranteed data security by HTTPS, has realized
It effectively avoids malice from grabbing data and malicious requests, and reduces cost, mitigates the burden of server, while can be improved access speed
The beneficial effect of degree.
Embodiment three
Fig. 3 is a kind of schematic diagram for network request processing unit that the embodiment of the present invention three provides, as shown in figure 3, described
Device includes: the first encrypted characters string generation module 310, the first CIPHERING REQUEST parameter generation module 320 and network request hair
Play module 330, in which:
First encrypted characters string generation module 310, for by shared key to the raw requests parameter of network request into
Row encryption forms the first encrypted characters string;
First CIPHERING REQUEST parameter generation module 320, for passing through predetermined encryption algorithm to the first encrypted characters string
It is encrypted to form the first CIPHERING REQUEST parameter;
Network request initiation module 330, for according to the raw requests parameter and the first CIPHERING REQUEST parameter to
Server initiates network request.
The technical solution of the present embodiment carries out at encryption by using raw requests parameter of the shared key to network request
Reason forms the first encrypted characters string, and by predetermined encryption algorithm the first encrypted characters string is encrypted to form first and add
Close required parameter, and then network request is initiated to server according to raw requests parameter and the first CIPHERING REQUEST parameter, it solves
It the problems such as existing existing at high cost, burden weight and access speed is lower when being guaranteed data security by HTTPS, realizes effective
It avoids malice from grabbing data and malicious requests, and reduces cost, mitigates the burden of server, while can be improved access speed
Beneficial effect.
Optionally, described device further include: the first shared key obtains module, for obtaining the shared key from cloud
And it is stored in primary bottom;First CIPHERING REQUEST parameter generation module 320 is specifically used for the raw requests parameter and described
Shared key is spliced, and the first encrypted characters string is formed.
Optionally, the predetermined encryption algorithm is MD5 algorithm.
Network request processing method provided by the embodiment of the present invention one can be performed in above-mentioned network request processing unit, has
The corresponding functional module of execution method and beneficial effect.The not technical detail of detailed description in the present embodiment, reference can be made to this hair
The network request processing method that bright any embodiment provides.
Since above-mentioned introduced network request processing unit is at the network request that can be executed in the embodiment of the present invention
The device of reason method, so based on network request processing method described in the embodiment of the present invention, the affiliated technology people in this field
Member can understand the specific embodiment and its various change form of the network request processing unit of the present embodiment, so herein
How network request processing method in the embodiment of the present invention is realized if being no longer discussed in detail for the network request processing unit.Only
It wants those skilled in the art to implement device used by network request processing method in the embodiment of the present invention, belongs to this Shen
The range that please be protect.
Example IV
Fig. 4 is a kind of schematic diagram for network request processing unit that the embodiment of the present invention four provides, as shown in figure 4, described
Device includes: network request receiving module 410, the second encrypted characters string generation module 420, the second CIPHERING REQUEST parameter generation mould
Block 430 and parameter comparison module 440, in which:
Network request receiving module 410 is encrypted for receiving terminal according to the raw requests parameter of network request and first
The network request that required parameter is initiated;
Second encrypted characters string generation module 420, for being encrypted by shared key to the raw requests parameter
Processing forms the second encrypted characters string;
Second CIPHERING REQUEST parameter generation module 430, for passing through predetermined encryption algorithm to the second encrypted characters string
It is encrypted to form the second CIPHERING REQUEST parameter;
Parameter comparison module 440, for being carried out to the first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter
Comparison, if it is determined that compare successfully, then respond the network request.
The technical solution of the present embodiment is asked by receiving terminal according to the raw requests parameter of network request and the first encryption
The network request for asking parameter to initiate, to be encrypted to form the second encrypted characters to raw requests parameter by shared key
String, and the second encrypted characters string is encrypted to form the second CIPHERING REQUEST parameter by predetermined encryption algorithm, it is finally right
First CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter compare, if it is determined that compare successfully, then response to network is requested, solution
It has determined the problems such as existing existing at high cost, burden weight and access speed is lower when being guaranteed data security by HTTPS, has realized
It effectively avoids malice from grabbing data and malicious requests, and reduces cost, mitigates the burden of server, while can be improved access speed
The beneficial effect of degree.
Optionally, described device further include: the second shared key obtains module, for obtaining the shared key from cloud
And it is stored in database;Second CIPHERING REQUEST parameter generation module 430 is specifically used for the raw requests parameter and described total
It enjoys key to be spliced, forms the second encrypted characters string.
Optionally, the predetermined encryption algorithm is MD5 algorithm.
Network request processing method provided by the embodiment of the present invention two can be performed in above-mentioned network request processing unit, has
The corresponding functional module of execution method and beneficial effect.The not technical detail of detailed description in the present embodiment, reference can be made to this hair
The network request processing method that bright any embodiment provides.
Since above-mentioned introduced network request processing unit is at the network request that can be executed in the embodiment of the present invention
The device of reason method, so based on network request processing method described in the embodiment of the present invention, the affiliated technology people in this field
Member can understand the specific embodiment and its various change form of the network request processing unit of the present embodiment, so herein
How network request processing method in the embodiment of the present invention is realized if being no longer discussed in detail for the network request processing unit.Only
It wants those skilled in the art to implement device used by network request processing method in the embodiment of the present invention, belongs to this Shen
The range that please be protect.
Embodiment five
Fig. 5 is a kind of structural schematic diagram for terminal that the embodiment of the present invention five provides.Fig. 5, which is shown, to be suitable for being used to realizing this
The block diagram of the terminal 512 of invention embodiment.The terminal 512 that Fig. 5 is shown is only an example, should not be to the embodiment of the present invention
Function and use scope bring any restrictions.
As shown in figure 5, terminal 512 is showed in the form of universal computing device.The component of terminal 512 may include but unlimited
In one or more processor 516, storage device 528, different system components (including storage device 528 and processor are connected
516) bus 518.
Bus 518 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller,
Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts
For example, these architectures include but is not limited to industry standard architecture (Industry Standard
Architecture, ISA) bus, microchannel architecture (Micro Channel Architecture, MCA) bus, enhancing
Type isa bus, Video Electronics Standards Association (Video Electronics Standards Association, VESA) local
Bus and peripheral component interconnection (Peripheral Component Interconnect, PCI) bus.
Terminal 512 typically comprises a variety of computer system readable media.These media can be it is any can be by terminal
The usable medium of 512 access, including volatile and non-volatile media, moveable and immovable medium.
Storage device 528 may include the computer system readable media of form of volatile memory, such as arbitrary access
Memory (Random Access Memory, RAM) 530 and/or cache memory 532.Terminal 512 can be wrapped further
Include other removable/nonremovable, volatile/non-volatile computer system storage mediums.Only as an example, storage system
534 can be used for reading and writing immovable, non-volatile magnetic media (Fig. 5 do not show, commonly referred to as " hard disk drive ").Although
It is not shown in Fig. 5, the disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") can be provided, and
To removable anonvolatile optical disk (such as CD-ROM (Compact Disc-Read Only Memory, CD-ROM), number
Optic disk (Digital Video Disc-Read Only Memory, DVD-ROM) or other optical mediums) read-write CD drive
Dynamic device.In these cases, each driver can be connected by one or more data media interfaces with bus 518.It deposits
Storage device 528 may include at least one program product, which has one group of (for example, at least one) program module, this
A little program modules are configured to perform the function of various embodiments of the present invention.
Program 536 with one group of (at least one) program module 526, can store in such as storage device 528, this
The program module 526 of sample includes but is not limited to operating system, one or more application program, other program modules and program
It may include the realization of network environment in data, each of these examples or certain combination.Program module 526 usually executes
Function and/or method in embodiment described in the invention.
Terminal 512 can also be with one or more external equipments 514 (such as keyboard, sensing equipment, camera, display
524 etc.) communicate, can also be enabled a user to one or more equipment interact with the terminal 512 communicate, and/or with make
Any equipment (such as network interface card, modem etc. that the terminal 512 can be communicated with one or more of the other calculating equipment
Deng) communication.This communication can be carried out by input/output (Input/Output, I/O) interface 522.Also, terminal 512 is also
Can by network adapter 520 and one or more network (such as local area network (Local Area Network, LAN), extensively
Net Wide Area Network, WAN in domain) and/or public network, such as internet) communication.As shown, network adapter
520 are communicated by bus 518 with other modules of terminal 512.It should be understood that although not shown in the drawings, terminal 512 can be combined
Using other hardware and/or software module, including but not limited to: microcode, device driver, redundant processing unit, external magnetic
Dish driving array, disk array (Redundant Arrays of Independent Disks, RAID) system, magnetic tape drive
Device and data backup storage system etc..
The program that processor 516 is stored in storage device 528 by operation, thereby executing various function application and number
According to processing, such as realize network request processing method provided by the above embodiment of the present invention.
That is, the processing unit is realized when executing described program: the raw requests by shared key to network request
Parameter is encrypted to form the first encrypted characters string;The first encrypted characters string is added by predetermined encryption algorithm
Close processing forms the first CIPHERING REQUEST parameter;According to the raw requests parameter and the first CIPHERING REQUEST parameter to server
Initiate network request.
Embodiment six
The present embodiment is sixth is that provided in an embodiment of the present invention a kind of for executing network provided by the embodiment of the present invention two
The server of request processing method, the server include: one or more processors;Storage device, for storing one or more
A program;When one or more of programs are executed by one or more of processors, so that one or more of processing
Device realizes the network request processing method as provided by the embodiment of the present invention two: receiving terminal according to the raw requests of network request
The network request that parameter and the first CIPHERING REQUEST parameter are initiated;The raw requests parameter is carried out at encryption by shared key
Reason forms the second encrypted characters string;The second encrypted characters string is encrypted to form second by predetermined encryption algorithm
CIPHERING REQUEST parameter;The first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter are compared, if it is determined that right
Than success, then the network request is responded.Its specific structure and detail content can refer to Fig. 5 and embodiment five.
Embodiment seven
The embodiment of the present invention seven also provides a kind of computer storage medium for storing computer program, the computer program
When being executed as computer processor for executing network request processing method described in the above embodiment of the present invention one: by altogether
The raw requests parameter for enjoying key pair network request is encrypted to form the first encrypted characters string;Pass through predetermined encryption algorithm
The first encrypted characters string is encrypted to form the first CIPHERING REQUEST parameter;According to the raw requests parameter and institute
It states the first CIPHERING REQUEST parameter and initiates network request to server.
The computer storage medium of the embodiment of the present invention, can be using any of one or more computer-readable media
Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable
Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or
Device, or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: tool
There are electrical connection, the portable computer diskette, hard disk, random access memory (RAM), read-only memory of one or more conducting wires
(Read Only Memory, ROM), erasable programmable read only memory ((Erasable Programmable Read
Only Memory, EPROM) or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic
Memory device or above-mentioned any appropriate combination.In this document, computer readable storage medium, which can be, any includes
Or the tangible medium of storage program, which can be commanded execution system, device or device use or in connection make
With.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited
In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can
Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for
By the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited
In wireless, electric wire, optical cable, radio frequency (Radio Frequency, RF) etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof
Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++,
Further include conventional procedural programming language --- such as " C " language or similar programming language.Program code can
Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package,
Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part.
In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN)
Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service
Provider is connected by internet).
Embodiment eight
The embodiment of the present invention eight additionally provides a kind of computer readable storage medium, is stored thereon with computer program, should
Program can realize network request processing method described in above-described embodiment two when being executed by processor: receiving terminal and asked according to network
The network request that the raw requests parameter asked and the first CIPHERING REQUEST parameter are initiated;The raw requests are joined by shared key
Number is encrypted to form the second encrypted characters string;The second encrypted characters string is encrypted by predetermined encryption algorithm
Processing forms the second CIPHERING REQUEST parameter;The first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter are carried out pair
Than, if it is determined that it compares successfully, then responds the network request.The description of its concrete details content can refer to embodiment seven.
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that
The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation,
It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention
It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also
It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.
Claims (10)
1. a kind of network request processing method, which is characterized in that be applied to terminal, comprising:
It is encrypted to form the first encrypted characters string by raw requests parameter of the shared key to network request;
The first encrypted characters string is encrypted to form the first CIPHERING REQUEST parameter by predetermined encryption algorithm;
Network request is initiated to server according to the raw requests parameter and the first CIPHERING REQUEST parameter.
2. the method according to claim 1, wherein joining by raw requests of the shared key to network request
Number is encrypted before forming the first encrypted characters string, comprising:
The shared key is obtained from cloud and is stored in primary bottom;
It is encrypted to form the first encrypted characters string by raw requests parameter of the shared key to network request, comprising:
The raw requests parameter and the shared key are spliced, the first encrypted characters string is formed.
3. the method according to claim 1, wherein the predetermined encryption algorithm is Message Digest Algorithm 5
MD5 algorithm.
4. a kind of network request processing method, which is characterized in that be applied to server, comprising:
Receive the network request that terminal is initiated according to the raw requests parameter of network request and the first CIPHERING REQUEST parameter;
The raw requests parameter is encrypted to form the second encrypted characters string by shared key;
The second encrypted characters string is encrypted to form the second CIPHERING REQUEST parameter by predetermined encryption algorithm;
The first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter are compared, if it is determined that compare successfully, then
Respond the network request.
5. according to the method described in claim 4, it is characterized in that, receiving terminal according to the raw requests parameter of network request
Before the network request initiated with the first CIPHERING REQUEST parameter, comprising:
The shared key is obtained from cloud and is stored in database;
The raw requests parameter is encrypted to form the second encrypted characters string by shared key, comprising:
The raw requests parameter and the shared key are spliced, the second encrypted characters string is formed.
6. according to the method described in claim 4, it is characterized in that, the predetermined encryption algorithm is MD5 algorithm.
7. a kind of network request processing unit, which is characterized in that be configured at terminal, comprising:
First encrypted characters string generation module, for being carried out at encryption by raw requests parameter of the shared key to network request
Reason forms the first encrypted characters string;
First CIPHERING REQUEST parameter generation module, for being encrypted by predetermined encryption algorithm to the first encrypted characters string
Processing forms the first CIPHERING REQUEST parameter;
Network request initiation module, for being sent out according to the raw requests parameter and the first CIPHERING REQUEST parameter to server
Play network request.
8. a kind of network request processing unit, which is characterized in that be configured at server, comprising:
Network request receiving module, for receiving terminal according to the raw requests parameter and the first CIPHERING REQUEST parameter of network request
The network request of initiation;
Second encrypted characters string generation module, to form for the raw requests parameter to be encrypted by shared key
Second encrypted characters string;
Second CIPHERING REQUEST parameter generation module, for being encrypted by predetermined encryption algorithm to the second encrypted characters string
Processing forms the second CIPHERING REQUEST parameter;
Parameter comparison module, for being compared to the first CIPHERING REQUEST parameter and the second CIPHERING REQUEST parameter, such as
Fruit determination compares successfully, then responds the network request.
9. a kind of computer equipment, which is characterized in that the equipment includes:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real
Now such as network request processing method as claimed in any one of claims 1-3, or realize as described in any in claim 4-6
Network request processing method.
10. a kind of computer storage medium, is stored thereon with computer program, which is characterized in that the program is executed by processor
Shi Shixian network request processing method for example as claimed in any one of claims 1-3, or realize such as institute any in claim 4-6
The network request processing method stated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811517802.4A CN109413105A (en) | 2018-12-12 | 2018-12-12 | A kind of network request processing method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811517802.4A CN109413105A (en) | 2018-12-12 | 2018-12-12 | A kind of network request processing method, device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109413105A true CN109413105A (en) | 2019-03-01 |
Family
ID=65458730
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811517802.4A Pending CN109413105A (en) | 2018-12-12 | 2018-12-12 | A kind of network request processing method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109413105A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112532586A (en) * | 2020-11-03 | 2021-03-19 | 华帝股份有限公司 | Network communication method, system, computer equipment and storage medium |
CN115086428A (en) * | 2021-03-11 | 2022-09-20 | 中国电信股份有限公司 | Network request sending method and device and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8190905B1 (en) * | 2006-09-29 | 2012-05-29 | Netapp, Inc. | Authorizing administrative operations using a split knowledge protocol |
CN102624740A (en) * | 2012-03-30 | 2012-08-01 | 奇智软件(北京)有限公司 | Data interaction method, client and server |
CN103647746A (en) * | 2013-11-01 | 2014-03-19 | 北京奇虎科技有限公司 | User login method, device and system |
CN103973695A (en) * | 2014-05-16 | 2014-08-06 | 浪潮电子信息产业股份有限公司 | Signature algorithm for server validation |
CN107911219A (en) * | 2017-11-09 | 2018-04-13 | 成都知道创宇信息技术有限公司 | A kind of anti-CC methods of API based on key signature |
CN109309655A (en) * | 2017-07-28 | 2019-02-05 | 深圳光峰科技股份有限公司 | Stateless communication security endorsement method, terminal and server end |
-
2018
- 2018-12-12 CN CN201811517802.4A patent/CN109413105A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8190905B1 (en) * | 2006-09-29 | 2012-05-29 | Netapp, Inc. | Authorizing administrative operations using a split knowledge protocol |
CN102624740A (en) * | 2012-03-30 | 2012-08-01 | 奇智软件(北京)有限公司 | Data interaction method, client and server |
CN103647746A (en) * | 2013-11-01 | 2014-03-19 | 北京奇虎科技有限公司 | User login method, device and system |
CN103973695A (en) * | 2014-05-16 | 2014-08-06 | 浪潮电子信息产业股份有限公司 | Signature algorithm for server validation |
CN109309655A (en) * | 2017-07-28 | 2019-02-05 | 深圳光峰科技股份有限公司 | Stateless communication security endorsement method, terminal and server end |
CN107911219A (en) * | 2017-11-09 | 2018-04-13 | 成都知道创宇信息技术有限公司 | A kind of anti-CC methods of API based on key signature |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112532586A (en) * | 2020-11-03 | 2021-03-19 | 华帝股份有限公司 | Network communication method, system, computer equipment and storage medium |
CN115086428A (en) * | 2021-03-11 | 2022-09-20 | 中国电信股份有限公司 | Network request sending method and device and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110336774B (en) | Mixed encryption and decryption method, equipment and system | |
EP2948864B1 (en) | Secure virtual machine migration | |
US20200076585A1 (en) | Storage device key management for encrypted host data | |
US9948616B2 (en) | Apparatus and method for providing security service based on virtualization | |
CN110414268A (en) | Access control method, device, equipment and storage medium | |
CN108566381A (en) | A kind of security upgrading method, device, server, equipment and medium | |
US20150113618A1 (en) | Verifying the security of a remote server | |
CN104753855B (en) | Single-point logging method, applications client, browser, terminal and server | |
CN110492990A (en) | Private key management method, apparatus and system under block chain scene | |
US10601590B1 (en) | Secure secrets in hardware security module for use by protected function in trusted execution environment | |
US9906518B2 (en) | Managing exchanges of sensitive data | |
CN107204850A (en) | A kind of lightweight car networking safety communicating method | |
CN109150907A (en) | Vehicle-mounted industrial personal computer login method, device, system, computer equipment and medium | |
CN109840398A (en) | Software authorization method, device, equipment and storage medium | |
CN109951295A (en) | Key handling and application method, device, equipment and medium | |
CN108335105A (en) | Data processing method and relevant device | |
CN110190958A (en) | A kind of auth method of vehicle, device, electronic equipment and storage medium | |
US9544287B1 (en) | Systems and methods for performing authentication at a network device | |
US8589683B2 (en) | Authentication of a secure virtual network computing (VNC) connection | |
US11050748B2 (en) | Web-based authentication for non-web clients | |
CN109413105A (en) | A kind of network request processing method, device, computer equipment and storage medium | |
CN112308236A (en) | Method, device, electronic equipment and storage medium for processing user request | |
CN111488169A (en) | Method and device for hot updating of application program, storage medium and electronic equipment | |
CN116738503B (en) | Collaborative encryption method for hardware system and operating system and electronic equipment | |
CN115629824B (en) | GPU starting method, device, equipment, storage medium and program product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190301 |
|
RJ01 | Rejection of invention patent application after publication |