<!DOCTYPE html>
<html>
    <head>
        <meta charset="utf-8"/>
        <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"/>
        <title>AJ Security/Timestamp Request Validation</title>
        <meta name="description" content="A Practical Java Web Security Library. Timestamp Request Validation"/>
        <meta name="keywords" content="security, xss, csrf, captcha, timestamp"/>
        <meta name="viewport" content="width=device-width, initial-scale=1"/>
         <link rel="stylesheet" href="https://framework.ajaxjs.com/static/font/font.css" />
        <link rel="stylesheet" href="/asset/main.css"/>
        <link rel="icon" type="image/x-icon" href="https://framework.ajaxjs.com/aj-logo/logo.ico"/>
        <script src="https://framework.ajaxjs.com/static/aj-docs/common.js"></script>
        <script>
            // 获取用户的默认语言
            var userLang = navigator.language || navigator.userLanguage;

            // 检查是否为中文环境（包括简体和繁体）
            if (userLang.startsWith('zh') && location.pathname.indexOf('cn') == -1) {
                 confirm('欢迎！您可以改为访问中文内容。是否继续？') && location.assign('/cn');  // 如果是中文，则弹出提示
            }

            var _hmt = _hmt || [];
            (function() {
              var hm = document.createElement("script");
              hm.src = "https://hm.baidu.com/hm.js?950ba5ba1f1fe4906c3b4cf836080f03";
              var s = document.getElementsByTagName("script")[0];
              s.parentNode.insertBefore(hm, s);
            })();
        </script>
    </head>
    <body>
        <nav>
            <div>
                <div class="links">
                    <a href="/">🏠 Home</a>
                    | ⚙️ Source:
                    <a target="_blank" href="https://github.com/lightweight-component/aj-security">Github</a>/<a target="_blank" href="https://gitcode.com/lightweight-component/aj-security">Gitcode</a>
                    |
                    <a href="/cn">Chinese Version</a>
                </div>
                <h1><img src="https://framework.ajaxjs.com/aj-logo/logo.png" style="vertical-align: middle;height: 45px;margin-bottom: 6px;" /> AJ Security</h1>
                <h3>User Manual</h3>
            </div>
        </nav>
        <div>
            <menu>
                <ul>
                    <li class="selected">
                        <a href="/">Home</a>
                    </li>
                    <li>
                        <a href="/install">Installation & Configuration</a>
                    </li>
                </ul>
                <h3>HTTP Web Security</h3>
                <ul>
                    <li>
                        <a href="/http/http-referer">HTTP Referer Validation</a>
                    </li>
                    <li>
                        <a href="/http/timestamp">Timestamp Encrypted Token Validation</a>
                    </li>
         <li>
                       <a href="/http/paramssign">Parameter Signature</a>
                    </li>
                    <li>
                        <a href="/http/ip-list">IP Whitelist/Blacklist</a>
                    </li>
                    <li>
                        <a href="/http/nonrepeatsubmit">Prevent Duplicate Submission</a>
                    </li>
                </ul>
                <h3>General Web Validation</h3>
                <ul>
                    <li>
                        <a href="/classic/xss">Prevent XSS Attacks</a>
                    </li>
                    <li>
                        <a href="/classic/crlf">Prevent CRLF Attacks</a>
                    </li>
                </ul>

                <h3>Captcha Mechanism</h3>
                <ul>
                    <li><a href="/captcha/img-captcha">Image Captcha</a></li>
                    <li><a href="/captcha/google">Google-based Captcha</a></li>
                    <li><a href="/captcha/cf">CloudFlare-based Captcha</a></li>
                </ul>
                <h3>HTTP Standard Authentication</h3>
                <ul>
                    <li><a href="/auth/http-basic-auth">HTTP Basic Auth</a></li>
                    <li><a href="/auth/http-digest-auth">HTTP Digest Auth</a></li>
                </ul>
                <h3>API Features</h3>
                <ul>
                    <li><a href="/api/limit">Rate Limiting</a></li>
                </ul>
                <h3>Other Practical Features</h3>
                <ul>
                    <li><a href="/misc/desensitize">Field Desensitization</a></li>
                    <li><a href="/misc/encryption-api">API Encryption</a></li>
                    <li><a href="/misc/trace-id">Trace Tracking</a></li>
                </ul>
            </menu>
            <article>
                <h1>Timestamp Request Validation</h1>
<p>Timestamp request validation is mainly used to prevent replay attacks. The principle is to include a timestamp (usually
in milliseconds) in each request, and the backend checks whether the timestamp falls within an allowed time window. This
is often used together with a signature mechanism to ensure the timeliness and uniqueness of the request, but it can
also be used standalone.</p>
<p>Usage scenarios: When resetting a password, the URL sent should include this encrypted timestamp as a parameter; for
APIs with high confidentiality, and for server-to-server calls (not browser calls, because if the key is stored in the
browser, it is not secure).</p>
<h2>Common Validation Logic</h2>
<ol>
<li>The client includes the timestamp (e.g., parameter <code>timestamp=xxx</code>) ciphertext in the request. This timestamp
ciphertext is generated by a secret key and stored by either the server or client (be careful not to leak it).</li>
<li>The backend checks whether the difference between the current server time and the request timestamp is within a
reasonable range (e.g., ±5 minutes).</li>
<li>If the request is expired, it is rejected.</li>
</ol>
<p>Replay attack: Timestamp validation alone cannot prevent the same request from being submitted multiple times. You need
to use a unique <code>nonce</code> along with it and, for interfaces with business idempotency requirements, also check whether
the <code>nonce</code> has already been used.</p>
<h1>Usage</h1>
<h2>YAML Configuration</h2>
<p>Currently, AES symmetric encryption is used. Add your AES secret key.</p>
<pre><code class="language-yaml">security:
    TimeSignature: # Timestamp control
        enabled: true
        secretKey: der3@x7Az#2 # Secret key, required
</code></pre>
<h2>Interceptor Validation</h2>
<p>Add the <code>@TimeSignatureVerify</code> annotation to the interface in use:</p>
<pre><code class="language-java">@GetMapping(&quot;/TimeSignatureVerify&quot;)
@TimeSignatureVerify
int TimeSignatureVerify();
</code></pre>
<h2>Generate Timestamp Token</h2>
<p>Distribute the token as a parameter in your business code.</p>
<pre><code class="language-java">// Static method call
String token = SecurityInterceptor.getBean(TimeSignature.class).generateSignature();
</code></pre>
<h1>Roadmap</h1>
<p>More complex encryption rules, separate configuration for each annotation</p>

            </article>
        </div>
        <footer>
            AJ Security, a part of
            <a href="https://framework.ajaxjs.com" target="_blank">AJ-Framework</a>
            open source. Mail:frank@ajaxjs.com, visit
            <a href="https://blog.csdn.net/zhangxin09" target="_blank">my blog(In Chinese)</a>. <br/> <br/> Copyright © 2025 Frank Cheung. All rights reserved.
        </footer>
    </body>
</html>