Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Service request processing method, terminal browser and anti-attack server

A technology of business requests and processing methods, which is applied in the field of Internet security, can solve problems such as not being able to intercept attacks in time, and achieve the effect of reducing the processing burden and preventing attacks

Active Publication Date: 2015-10-21
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing mechanism is usually post-identification, that is, after the relevant service request initiated by the terminal is responded to, the response result is analyzed to determine whether the entire request process is triggered by a non-human operation, and the attack cannot be intercepted in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service request processing method, terminal browser and anti-attack server
  • Service request processing method, terminal browser and anti-attack server
  • Service request processing method, terminal browser and anti-attack server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] figure 1 It is a schematic flowchart of a service request processing method provided in Embodiment 1 of the present invention. This embodiment is applicable to a network architecture composed of a terminal browser, an application server, and an attack prevention server. The method can be executed by a browser on a terminal, and the terminal can be an electronic device such as a notebook computer, a desktop computer, etc., which has functions of mouse input and web page browsing. see figure 1 , the service request processing method provided in this embodiment specifically includes the following operations:

[0038] Operation 110, monitor the service request generated based on the currently displayed webpage.

[0039] The displayed webpage can be obtained by the browser from the application server. A web page contains at least one component. After obtaining a trigger event for any component in the webpage, the browser will generate one or more service requests (that ...

Embodiment 2

[0052] figure 2 It is a schematic flowchart of a service request processing method provided in Embodiment 2 of the present invention. In this embodiment, on the basis of the first embodiment above, an operation of acquiring the anti-attack monitoring code is added. The method provided in this embodiment can still be executed by the browser on the terminal. see figure 2 , the method provided in this embodiment specifically includes the following operations:

[0053] Operation 210, accessing and displaying the webpage provided by the application server.

[0054] Operation 220, according to the anti-attack service interface and the code resource identifier configured in the webpage, acquire the anti-attack monitoring code of the webpage from the anti-attack server.

[0055] The webpage accessed by the browser is configured with an attack prevention service interface and a code resource identifier. Wherein, the code resource identifier is a character string uniquely identif...

Embodiment 3

[0065] image 3 It is a schematic flowchart of a service request processing method provided in Embodiment 3 of the present invention. This embodiment is still applicable to a network architecture composed of a terminal browser, an application server, and an attack prevention server. The method can be executed by the attack defense server, and can be executed in cooperation with the service request processing method implemented by the terminal browser provided by any embodiment of the present invention. As a third-party physical device that provides anti-attack services for application servers, the anti-attack server can perform anti-attack monitoring on service requests before the terminal browser initiates service requests to the application server. see image 3 , the service request processing method provided in this embodiment specifically includes the following operations:

[0066] Operation 310, receiving the data sent by the browser on the terminal, the data is the in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a service request processing method, a terminal browser and an anti-attack server. The service request processing method implemented by a browser comprises the following steps: monitoring a service request generated on the basis of a currently-displayed webpage; if the service request is monitored, acquiring input behavior data recorded in the display process of the webpage; transmitting the input behavior data to the anti-attack server in order to obtain return information generated on the basis of an identification result after the anti-attack server performs attack behavior identification according to the input behavior data; and determining whether or not to initiate a service request to an application server providing the webpage according to the return information. Through the technical scheme provided by the embodiment of the invention, service request attacks triggered by non-human operation can be intercepted in time.

Description

technical field [0001] The embodiment of the present invention relates to the field of Internet security technologies, and in particular to a service request processing method, a terminal browser, and an attack prevention server. Background technique [0002] With the rapid development of mobile Internet technology, application servers can provide users with more and more webpage information, so that users can enjoy more and more in-depth services. For a webpage displayed on a terminal browser, it may contain information such as multiple components, and after the user triggers a click operation on a certain component, one or more service requests will be initiated to the application server based on the operation , so that the application server can perform business processing according to these requests, such as delivering other web pages. [0003] However, driven by illegitimate interests, some illegal users usually use malicious software tools to perform a large number of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/12H04L63/1416
Inventor 杨谱李智翔张立志翟万里
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products