×

Method for improving network application security and the system thereof

  • US 8,719,915 B2
  • Filed: 03/18/2010
  • Issued: 05/06/2014
  • Est. Priority Date: 05/31/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for improving network application security, wherein the method comprising:

  • a proxy server in a customer terminal host receiving a protocol message generated and sent by customer terminal software according to information input by a user, parsing the protocol message according to a predetermined protocol, and obtaining protocol content, wherein the proxy server is software installed in the customer terminal host; and

    the proxy server determining whether critical information, which is predetermined by the proxy server, a smart key device and an application server, is included in the protocol content;

    upon determining that the critical information is included in the protocol content, the proxy server sending the protocol content to the smart key device and the smart key device parsing the protocol content to obtain the critical information, and outputting the critical information for user'"'"'s confirmation;

    determining whether the critical information is confirmed correct by the user; and

    upon determining that the critical information is confirmed correct by the user, the smart key device signing the protocol content and returning a signature result to the proxy server, and then the proxy server generating a new protocol message according to the signature result and the protocol content, and sending it to the application server, wherein the new protocol message is obtained by adding a new requirement head field to a second protocol content, wherein the second protocol content is obtained by inserting the signature result into the protocol content;

    orupon determining that the critical information is not confirmed correct by the user within a predetermined time period, the smart key device performing an exception handling;

    upon determining that the critical information is not included in the protocol content, the proxy server sending the protocol message to the application server, wherein the step of the proxy server determining whether critical information, which is predetermined by the proxy server, the smart key device and the application server, is included in the protocol content, comprises;

    the proxy server finding the field predefined by the proxy server, the smart key device and the application server, in the protocol content, determining whether there is data in the field, upon determining that there is, determining that the critical information is included in the protocol content;

    orthe proxy server determining whether a critical information identification, predetermined by the proxy server, the smart key device and the application server, is included in the protocol content, upon determining that it is, the proxy server determining that the critical information is included in the protocol content,wherein both the protocol message and the new protocol message comprise a requirement head field, in which the address of the application server is recorded,wherein the step of the proxy server sending the protocol content to the smart key device further comprises;

    the proxy server parsing the requirement head field of the protocol message and determining whether the address of the application server in the requirement head field matches with an address of the application server stored in the proxy server, upon determining that it does, the proxy server sending the protocol content to the smart key device;

    upon determining that it does not, the proxy server prompting the user of an error in the application server, and the procedure being completed.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×