Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for preventing network attack performed by using legal data or tampering legal data

A legal data and network attack technology, applied in the field of network security, can solve problems such as calculation theory difficulties, achieve the effect of protecting network and server resources, ensuring timeliness, and preventing attacks

Active Publication Date: 2018-09-04
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The reason why these algorithms are called "safe" is based on the following two points (according to the description of the official standard): 1. It is very difficult to deduce the original input message from the message summary in terms of calculation theory.
2. It is also very difficult to find two sets of different messages corresponding to the same message summary from a computational theory point of view.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing network attack performed by using legal data or tampering legal data
  • Method for preventing network attack performed by using legal data or tampering legal data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] A method to prevent attacks using legal data or tampering with legal data, which can be used in Internet of Things (ipp) projects, launcher projects and other mobile terminal and cloud access, such as figure 2 As shown, in this embodiment, it is mainly applied to an Internet of Things project including various application services 301 .

[0032] Such as figure 1 As shown, the method for preventing attacks using legal data or tampering with legal data is mainly implemented by two modules: a terminal signature module 101 and a cloud signature verification module 201, wherein these two modules have the following functions respectively :

[0033] Terminal signature module 101: the main function is to add timestamp timestamp, non-repetitive random number, such as uuid, salt value salt agreed between the terminal and the cloud to the business data body sent by the business terminal, and perform hash algorithm on the combined data, Get the hash value; among them, the salt v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for preventing a network attack performed by using legal data or tampering the legal data. A timestamp, an unrepeated random number and an appointed salt value are added into requested service data, a hash algorithm is performed on the above data to acquire a hash value, and a service terminal uploads both the above data and the service data to a server while accessing a cloud; a cloud signature verification module verifies whether the timestamp and the hash value accord with signature verification, if yes, the access data, and the timestamp, unrepeated randomnumber and salt value, appointed by the cloud and the terminal, uploaded by the service terminal are subjected to the hash algorithm to acquire the hash value, and then the acquired hash value is compared with the hash value uploaded by the service terminal, if the two hash values are consistent, the verification is passed, the subsequent work can be performed, and the hash value uploaded by the service terminal in this time is cached for being compared with the hash value accessed latterly, and if the above two hash values are inconsistent, a service request is rejected. According to the method provided by the invention, the situation that the normal access is affected due to the fact that the server resources are illegally occupied can be avoided, and thus the purpose of protecting network and server resources is achieved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for preventing network attacks by using legal data or tampering with legal data. Background technique [0002] With the increase of Internet applications, servers serving Internet applications are often attacked by network attackers. Among them, network attackers intercept request data, use legal data or tamper with legal data to make a large number of repeated requests to the server, so as to occupy server and network resources and affect normal business access, which is a very common attack method. The attack method is simple and easy to distribute. It is necessary to adopt an efficient and easy-to-implement method to defend against such attacks. [0003] The hash algorithm is a secure hash algorithm certified by FIPS, which can calculate a fixed-length string (also known as a message digest) corresponding to a digital message. If the input messages are diff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3236H04L9/3247H04L9/3297H04L63/12H04L63/1458H04L63/1466
Inventor 刘剑飞常清雪肖建
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products