CN107911335A - Verify the methods, devices and systems of Uniform Resource Identifier URI - Google Patents

Verify the methods, devices and systems of Uniform Resource Identifier URI Download PDF

Info

Publication number
CN107911335A
CN107911335A CN201710883109.8A CN201710883109A CN107911335A CN 107911335 A CN107911335 A CN 107911335A CN 201710883109 A CN201710883109 A CN 201710883109A CN 107911335 A CN107911335 A CN 107911335A
Authority
CN
China
Prior art keywords
uri
verified
item
terminal
interception
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710883109.8A
Other languages
Chinese (zh)
Other versions
CN107911335B (en
Inventor
徐萌阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuba Co Ltd
Original Assignee
Wuba Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuba Co Ltd filed Critical Wuba Co Ltd
Priority to CN201710883109.8A priority Critical patent/CN107911335B/en
Publication of CN107911335A publication Critical patent/CN107911335A/en
Application granted granted Critical
Publication of CN107911335B publication Critical patent/CN107911335B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9566URL specific, e.g. using aliases, detecting broken or misspelled links
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Abstract

The present invention provides a kind of methods, devices and systems for verifying Uniform Resource Identifier URI.The method of verification URI provided by the invention includes:When obtaining destination application and calling third party application loaded targets file, the URI to be verified that is transmitted into the interface of third party application;The first checking information of URI bags to be verified;By the naming mechanism item of the access resource in URI to be verified, Hostname item, the corresponding information of path entry according to preset rules corresponding with terminal, the second checking information is generated;If the second checking information is consistent with the first checking information, the result that URI to be verified is verified is obtained.The methods, devices and systems of verification URI provided by the invention, the check results for reducing the consumption of terminal capabilities and obtaining are reliable, avoid at the same time destination application in a terminal method of calibration be cracked after, destination application in other terminals also can not normal operation phenomenon generation.

Description

Verify the methods, devices and systems of Uniform Resource Identifier URI
Technical field
The present invention relates to communication engineering technology, more particularly to a kind of method, apparatus for verifying Uniform Resource Identifier URI and System.
Background technology
Since the code of application program (Application, abbreviation APP) operates in the terminal sheet for departing from server and supervising Ground, if a certain application program needs to call third party application to load a certain file destination the URI, it is necessary to by the file destination The interface of third party application is sent to, so that third party application obtains file destination according to the URI and loads the mesh Mark file.But during the URI of file destination is sent to the interface of third party application, the URI of file destination By malicious intercepted and can distort so that the operation result of application program does not meet expection, or even occur application crash or The phenomenon that user information is tampered.Therefore, during the URI of file destination is sent to the interface of third party application The URI transmitted is obtained, its legitimacy is verified and has great importance.
In the prior art, the scheme for verifying URI uploads onto the server the URI transmitted of acquisition for terminal, by taking Business device verifies the legitimacy of the URI.But the program uploads onto the server the URI transmitted of acquisition due to needing, and The check results that server returns are received, add the consumption of handset capability.And the check results that server returns are also easy By malicious intercepted or distort, so that terminal does not receive check results or receives the check results of mistake, have impact on The usage experience of user.
The content of the invention
The present invention provides a kind of methods, devices and systems for verifying Uniform Resource Identifier URI, to overcome in the prior art Verify URI handset capabilities consumption is larger and the insecure technical problem of check results.
In a first aspect, the present embodiment provides a kind of method for verifying Uniform Resource Identifier URI, applied to terminal, including:
When obtaining destination application calling third party application loaded targets file, to the third party application Interface in the URI to be verified that transmits;The URI to be verified includes the naming mechanism item, Hostname item, path for accessing resource Item and the first authentication information items;
By the naming mechanism item of the access resource in the URI to be verified, Hostname item, the corresponding letter of path entry Breath generates the second checking information according to preset rules corresponding with the terminal;
Judge whether second checking information the first checking information corresponding with first authentication information items is consistent, if It is then to obtain the result that the URI to be verified is verified.
Method as described above, naming mechanism item, the Hostname of the access resource by the URI to be verified , the information that each includes of path entry according to preset rules corresponding with the terminal, generate the second checking information, including:
Naming mechanism item, Hostname item, road of the MD5 algorithms to the access resource in the URI to be verified is respectively adopted The corresponding information in footpath is encrypted, and obtains every corresponding MD5 values;
MD5 values corresponding for each single item, according to it is corresponding with MD5 values interception numeral, extract MD5 values in the interception Character at corresponding at least two position of numeral, obtains prefetching character string, the interception numeral is used for the word for indicating extraction The position in MD5 values is accorded with, the interception numeral is that server is issued according to the balance of plant identification code IMEI of the terminal;
By it is each it is described prefetch character string combinations, obtain the second checking information.
Method as described above, third party application loaded targets file is called in the acquisition destination application When, before the URI to be verified transmitted into the interface of the third party application, the method further includes:
After the installation kit for obtaining the destination application from server, world EIC equipment identification code IMEI is sent to described Server;
Receive every corresponding interception numeral including the URI to be verified that server is returned according to the IMEI Interception set of digits.
Method as described above, third party application loaded targets file is called in the acquisition destination application When, before the URI to be verified transmitted into the interface of the third party application, the method further includes:
The original URI of the file destination is generated, the original URI includes accessing naming mechanism item, the host name of resource Claim item, path entry;
By the naming mechanism item of the access resource in the original URI, Hostname item, the corresponding information of path entry The 3rd checking information is generated according to the preset rules;
By the naming mechanism item of the access resource in the original URI, Hostname item, path entry and the 3rd verification Information combines, and obtains URI to be transmitted;
Wherein, if the URI to be verified is identical with the URI to be transmitted by verification, the URI to be verified.
Second aspect, the present invention also provides a kind of method for verifying Uniform Resource Identifier URI, applied to server, bag Include:
Obtain the source code of destination application and URI check codes corresponding with the destination application;
The URI check codes are woven into Software Development Kit SDK using towards tangent plane programming AOP, are obtained SDK after processing;
The installation kit of destination application is obtained according to the SDK after the source code of the destination application, the processing, So that terminal is according to the URI to be verified with the URI check codes in installation kit and preset rules corresponding with terminal verification acquisition It is whether legal, when the URI to be verified is that destination application calls third party application loaded targets file, to described the The URI transmitted in the interface of tripartite's application program.
Method as described above, the method further include:
The balance of plant identification code IMEI that receiving terminal is sent;
According to naming mechanism item from the IMEI to the terminal transmission URI to be verified, the Hostname of access resources of The corresponding interception numeral of item, path entry.
The third aspect, the present invention also provides a kind of device for verifying Uniform Resource Identifier URI, applied to terminal, including:
Acquisition module, when calling third party application loaded targets file for obtaining destination application, to described The URI to be verified transmitted in the interface of third party application;Naming mechanism items of the URI to be verified including access resource, Hostname item, path entry and the first authentication information items;
Checking information generation module, for by naming mechanism item, the Hostname of the access resource in the URI to be verified Item, the corresponding information of path entry generate the second checking information according to preset rules corresponding with the terminal;
Judgment module, for judging second checking information and the corresponding first verification letter of first authentication information items Whether breath is consistent, if so, then obtaining the result that the URI to be verified is verified.
Device as described above, the checking information generation module are specifically used for:
Naming mechanism item, Hostname item, road of the MD5 algorithms to the access resource in the URI to be verified is respectively adopted The corresponding information in footpath is encrypted, and obtains every corresponding MD5 values;
MD5 values corresponding for each single item, according to it is corresponding with MD5 values interception numeral, extract MD5 values in the interception Character at the corresponding position of numeral, obtains prefetching character string, the character that the interception numeral is used to indicate extraction is in MD5 values In position, it is described interception numeral be that server is issued according to the balance of plant identification code IMEI of the terminal;
By it is each it is described prefetch character string combinations, obtain the second checking information.
Fourth aspect, the present invention also provides a kind of device for verifying Uniform Resource Identifier URI, applied to server, bag Include:
Acquisition module, for the source code for obtaining destination application and URI schools corresponding with the destination application Test code;
Module is woven, for the URI check codes to be woven into Software Development Kit using towards tangent plane programming AOP In SDK, the SDK after obtained processing;
Installation kit generation module, mesh is obtained for the SDK after the source code according to the destination application, the processing Mark application program installation kit so that terminal according to the URI check codes in installation kit and preset rules corresponding with terminal Verify whether the URI to be verified obtained is legal, the URI to be verified is that destination application calls third party application loading During file destination, the URI that is transmitted into the interface of the third party application.
5th aspect, the present invention also provides a kind of system for verifying Uniform Resource Identifier URI, including:Such as the third aspect The device, and the device described in fourth aspect.
The method of verification Uniform Resource Identifier URI provided by the invention, including:Obtain destination application and call the 3rd During square application program loaded targets file, the URI to be verified that is transmitted into the interface of third party application;URI bags to be verified Include naming mechanism item, Hostname item, path entry and the first authentication information items for accessing resource;By the access in URI to be verified The naming mechanism item of resource, Hostname item, the corresponding information of path entry are according to preset rules corresponding with terminal, generation Second checking information;Judge whether the second checking information and the first checking information that the first authentication information items include are consistent, if so, Then obtain the result that URI to be verified is verified.The method of the verification Uniform Resource Identifier URI of the present invention, reduces end The check results held the consumption of performance and obtained are reliable, while avoid the method for calibration quilt of destination application in a terminal After cracking, destination application in other terminals also can not normal operation phenomenon generation.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is attached drawing needed in technology description to be briefly described, it should be apparent that, drawings in the following description are this hairs Some bright embodiments, for those of ordinary skill in the art, without having to pay creative labor, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of possible system architecture diagram provided by the invention;
Fig. 2 is the flow chart of the embodiment of the method one of verification Uniform Resource Identifier URI provided by the invention;
Fig. 3 is the flow chart of the embodiment of the method two of verification Uniform Resource Identifier URI provided by the invention;
Fig. 4 is the flow chart of the embodiment of the method three of verification Uniform Resource Identifier URI provided by the invention;
Fig. 5 is the flow chart of the embodiment of the method four of verification Uniform Resource Identifier URI provided by the invention;
Fig. 6 is the structure diagram of the device embodiment one of verification Uniform Resource Identifier URI provided by the invention;
Fig. 7 is the structure diagram of the device embodiment two of verification Uniform Resource Identifier URI provided by the invention
Fig. 8 is the structure diagram of the device embodiment three of verification Uniform Resource Identifier URI provided by the invention;
Fig. 9 is the structure diagram of the device embodiment four of verification Uniform Resource Identifier URI provided by the invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art All other embodiments obtained without creative efforts, belong to the scope of protection of the invention.
Fig. 1 is a kind of possible system architecture diagram provided by the invention;Referring to Fig. 1, system architecture diagram of the invention includes: Server 11 and terminal 12.The balance of plant identification code IMEI of each terminal is stored with server 11, and can be also stored with each Used interception set of digits during the corresponding verification Uniform Resource Identifier URI of IMEI.
Specifically, after destination application installation, terminal 12 obtains corresponding section of the IMEI of the terminal from server Take set of digits.When verifying URI, when terminal 12 obtains destination application calling third party application loaded targets file, to The URI to be verified transmitted in the interface of third party application;URI to be verified includes naming mechanism item, the host for accessing resource Name item, path entry and the first authentication information items;Terminal 12 is according to interception set of digits and the naming mechanism item, the host that access resource Name item, path entry generate the second checking information, if the second checking information is identical with the first checking information, obtain to be verified It is that URI is verified as a result, the URI to be verified being verified is sent to the interface of third party application so that third party should With program loaded targets file.In the present invention, during starting to verify Uniform Resource Identifier URI not with server Interaction, the performance consumption of terminal is low, and check results are reliable, improves the usage experience of user.
The method of verification URI provided by the invention is described in detail using specific embodiment below.
Fig. 2 is the flow chart of the embodiment of the method one of verification Uniform Resource Identifier URI provided by the invention, such as Fig. 2 institutes Show, the method for the present embodiment can include:
, should to third party when step S201, obtaining destination application calling third party application loaded targets file With the URI to be verified transmitted in the interface of program;URI to be verified includes the naming mechanism item, Hostname item, road for accessing resource Footpath and the first authentication information items;
Step S202, it is the naming mechanism item, Hostname item, path entry of the access resource in URI to be verified is each right The information answered generates the second checking information according to preset rules corresponding with terminal;
Step S203, judge whether the second checking information the first checking information corresponding with the first authentication information items is consistent, If so, then obtain the result that URI to be verified is verified.
Specifically, the executive agent in the present embodiment can be the terminal 12 in the Organization Chart shown in Fig. 1.
Destination application in the present embodiment refers to be currently running and needs to call third party application loading at end The application program of a certain file stored on end.Obvious, destination application is mounted in the application program in the terminal.This File destination in embodiment is that destination application needs to call storing on the terminal for third party application loading File.
For example destination application is " drop drop express ", after passenger takes the stroke of " drop drop express ", can to The page of family display payment, the corresponding file of the page of the payment is file destination, if the payment method of user's selection is " micro- Letter is paid ", then " wechat " is third party application.When passenger pays the bill, " drop drop express " application program can call third party The corresponding file of the page of application program " wechat " loading payment is to complete to pay the bill." drop drop express " application call third party During the corresponding file of the page of application program " wechat " loading payment, need to be sent to the interface of third party application " wechat " should The URI of file, so that third party application finds this document by URI and loads this document, after the completion of loading, payment operation Just complete.Wherein, URI generally comprises naming mechanism item, Hostname item and the path entry for accessing resource, such as following URI:files://app.58.com/data/user/0/com.wuba/files/rn/7/7_103.bundle, wherein, The corresponding information of naming mechanism item for the access resource that files is, that is to say, that the access resource is a file, app.58.com The Hostname of resource, data/user/0/com.wuba/ are accessed for the corresponding information of host name item, that is, storage Files/rn/7/7_103.bundle is the corresponding information of path entry, that is, accesses the title of resource.It is available on web Every kind of resource (document, image, video etc.) can all be positioned by URI.
Therefore, if the URI that the interface of third party application " wechat " is sent is an illegal URI, for example it is cheating The URI for the corresponding file of the page that person swindles money, when third party application " wechat " is according to the illegal URI load documents, The money of passenger is just abducted by cribber.Therefore, the URI of the interface transmission to third party application is obtained at this time, verifies it Legitimacy, has great importance.
The idiographic flow of the verification URI in the present embodiment is described in detail below.
For step S101, terminal obtains destination application and calls the mesh stored in third party application loading terminal When marking file, the URI to be verified that is transmitted into the interface of third party application;URI to be verified includes accessing the name of resource Mechanism item, Hostname item, path entry and the first authentication information items.
At this time, the URI to be verified that terminal obtains is the URI transmitted into the interface of third party application.It is to be tested Demonstrate,prove in URI except naming mechanism item, Hostname item and path entry including accessing resource, further include the first authentication information items, First authentication information items include the first checking information.
For step S202~step S203, naming mechanism item, Hostname by the access resource in URI to be verified Item, the corresponding information of path entry generate the second checking information according to preset rules corresponding with terminal;Tested obtaining second After demonstrate,proving information, judge whether the second checking information the first checking information corresponding with the first authentication information items is consistent, if so, then The result being verified to URI to be verified.If the second checking information and the first checking information are inconsistent, illustrate URI to be verified For illegal URI, at this time, should stop transmitting the URI to be verified to the interface of third party application in time.
That is, for different terminals, preset rules are different.The advantage of doing so is that:Even in A The A codes (including source code and check code) corresponding with destination application installed in terminal are by decompiling, cribber Know destination application preset rules corresponding with check code, that is, method of calibration, thus cribber can cause it is non- The URI of method is also verified;But due to generating the preset rules of the second checking information in B terminals with generating second in A terminals The preset rules of checking information differ, i.e., the destination application installed in B terminals is corresponded in method of calibration and A terminals The corresponding method of calibration of the destination application of installation differs, and cheating scope can only be also locked in A terminals by cribber The destination application of installation, the destination application of the installation in B terminals still can normally be run.
In addition, it will be appreciated by persons skilled in the art that the generation method of the second checking information be with URI to be verified The first checking information generation method it is identical.
In the present embodiment, the process for verifying URI is completed by terminal, without the interaction of server and terminal, reduces end The check results held the consumption of performance and obtained are reliable.And the preset rules of the second checking information of each corresponding generation of terminal Difference, avoid destination application in a terminal method of calibration be cracked after, the destination application in other terminals Also can not normal operation phenomenon generation.
The method of verification Uniform Resource Identifier URI in the present embodiment, including:Obtain destination application and call the 3rd During square application program loaded targets file, the URI to be verified that is transmitted into the interface of third party application;URI bags to be verified Include naming mechanism item, Hostname item, path entry and the first authentication information items for accessing resource;By the access in URI to be verified The naming mechanism item of resource, Hostname item, the corresponding information of path entry are according to preset rules corresponding with terminal, generation Second checking information;Judge whether the second checking information and the first checking information that the first authentication information items include are consistent, if so, Then obtain the result that URI to be verified is verified.The method of the verification Uniform Resource Identifier URI of the present embodiment, reduces The check results for consuming and obtaining of terminal capabilities are reliable, while avoid the method for calibration of destination application in a terminal After being cracked, destination application in other terminals also can not normal operation phenomenon generation.
A kind of possible generation method using specific embodiment to the second checking information in a upper embodiment below It is described in detail.
Fig. 3 is the flow chart of the embodiment of the method two of verification Uniform Resource Identifier URI provided by the invention, such as Fig. 3 institutes Show, the method for the present embodiment can include:
Step S301, MD5 algorithms are respectively adopted to accessing the naming mechanism item, Hostname item, path entry of resource each Corresponding information is encrypted, and obtains every corresponding MD5 values;
Step S302, for the corresponding MD5 values of each single item, according to interception numeral corresponding with MD5 values, extract in MD5 values With the character at corresponding at least two position of interception numeral, obtain prefetching character string, interception numeral is used to indicate extraction Position of the character in MD5 values, interception numeral is that server is issued according to the balance of plant identification code IMEI of terminal;
Step S303, character string combinations will be respectively prefetched, obtains the second checking information.
Specifically, MD5 algorithms are respectively adopted to add the naming mechanism item, Hostname item, path entry that access resource It is close, obtain every corresponding MD5 values.
For example it is files to access the naming mechanism item of resource, the access obtained after MD5 algorithm for encryption is used to " files " The corresponding MD5 values of naming mechanism item of resource are " 45B963397AA40D4A0063E0D85E4FE7A1 ".
Hostname item is app.58.com, and the Hostname obtained after MD5 algorithm for encryption is used to " app.58.com " The corresponding MD5 values of item are " D84C625C96FB1EC88D308C38C2CD08BF ".
Path entry is data/user/0/com.wuba/files/rn/7/7_103.bundle, " data/user/0/ Com.wuba/files/rn/7/7_103.bundle " use the corresponding MD5 values of the path entry obtained after MD5 algorithm for encryption for “A4A1B89C63B6DA52DB34E47B0F379DD4”。
The corresponding first MD5 values of naming mechanism item for accessing resource " 45B963397AA40D4A0063E0D85E4FE7A1 " is using the corresponding with the naming mechanism item of the access resource first interception Numeral, extract in the first MD5 values with the character at the digital corresponding position of the first interception.Such as first interception numeral be 2,6, Then by the character " 5B963 " of the 2nd to the 6th in the first MD5 values " 45B963397AA40D4A0063E0D85E4FE7A1 " Extract, obtain first and prefetch character string.The corresponding MD5 values of naming mechanism item due to accessing resource are the lives with asking resource Name mechanism item is corresponding, then alternatively the first interception numeral is MD5 values phase corresponding with accessing the naming mechanism item of resource It is corresponding.
For the corresponding 2nd MD5 values " D84C625C96FB1EC88D308C38C2CD08BF " of Hostname item using with The corresponding second interception numeral of the Hostname item, extracts in the 2nd MD5 values and is intercepted with second at the corresponding position of numeral Character.Such as second interception numeral be 8,13, then by the 2nd MD5 values " D84C625C96FB1EC88D308C38C2CD08BF " The character " C96FB1 " of the 8th to the 13rd extract, obtain second and prefetch character string.Since Hostname item is corresponding MD5 values are corresponding with Hostname item, then alternatively the second interception numeral is MD5 value phases corresponding with Hostname item It is corresponding.
Used and the road for the corresponding 3rd MD5 values " A4A1B89C63B6DA52DB34E47B0F379DD4 " of path entry Footpath the corresponding 3rd intercepts numeral, intercepts the character at the corresponding position of numeral in the 3rd MD5 values of extraction with the 3rd.Such as 3rd interception numeral is 18,20, then by the 18th in the 3rd MD5 values " A4A1B89C63B6DA52DB34E47B0F379DD4 " Extracted to the character " B34 " of the 20th, obtain the 3rd and prefetch character string.Since the corresponding MD5 values of path entry are and path Item is corresponding, then alternatively the 3rd interception numeral is that MD5 values corresponding with path entry are corresponding.
Character string is prefetched by first, second character string and the 3rd is prefetched and prefetches character string combinations and obtain the second checking information, Such as first prefetch character string, second prefetch character string and the 3rd prefetch character string combinations after be:" 5B963C96FB1B34 ", the Two checking informations are just " 5B963C96FB1B34 ".
Wherein, every corresponding interception numeral is that server is sent to terminal according to the international identification code of terminal, Specially:Terminal sends international EIC equipment identification code IMEI to service after the installation kit for obtaining destination application from server Device;The balance of plant identification code IMEI that server receiving terminal is sent, obtains interception set of digits corresponding with IMEI, interception numeral Concentrate naming mechanism item, Hostname item, the corresponding interception number of path entry of the access resource included in URI to be verified Word;Server, which will intercept set of digits and send to terminal, terminal reception, includes the naming mechanism of the access resource in URI to be verified The interception set of digits of item, Hostname item, path entry and corresponding interception numeral.
That is, for different IMEI:The naming mechanism item, Hostname item, path entry for accessing resource are each right The interception numeral answered is different.For example the IMEI of A terminals is the first IMEI, server receives the first of A terminals transmission After IMEI, interception set of digits a, b, c, d, e, f corresponding with the first IMEI are sent to A terminals, wherein, a, b can be to access money The corresponding interception numeral of naming mechanism item in source, c, d can be the corresponding interception numeral of host name item, and e, f can be path entry pair The interception numeral answered;The IMEI of B terminals is the 2nd IMEI, will be with second after server receives the 2nd IMEI of B terminals transmission Corresponding interception set of digits h, i, j, k, l, the m of IMEI is sent to B terminals, wherein, h, i can be that the naming mechanism item of access resource is right The interception numeral answered, j, k can be the corresponding interception numeral of host name item, and l, m can be the corresponding interception numeral of path entry.Its In, the corresponding interception set of digits of IMEI of each terminal can be what is be previously set, store in the server, or server Receive what is generated at random after IMEI, since MD5 values are 32, each numeral of interception digital convergence is no more than 32.
It will be appreciated by those skilled in the art that the preset rules in a upper embodiment are the MD5 algorithms in the present embodiment And interception rule corresponding with terminal, the corresponding difference for intercepting rule of each terminal, determines the corresponding default rule of each terminal Difference then.
In the present embodiment, the second checking information is obtained by MD5 algorithms and interception rule corresponding with terminal, is reduced Cribber cracks the probability of destination application, avoid destination application in a terminal method of calibration be cracked after, Destination application in other terminals also can not normal operation phenomenon generation.
, need to be to third party application since destination application calls third party application loaded targets file URI is transmitted in interface, therefore, the method for verification Uniform Resource Identifier URI provided by the invention further includes generation file destination URI to be transmitted process.The process of the URI to be transmitted to generating file destination is described in detail below.
Fig. 4 is the flow chart of the embodiment of the method three of verification Uniform Resource Identifier URI provided by the invention, such as Fig. 4 institutes Show, the method for the present embodiment can include:
Step S401, the original URI of file destination is generated, original URI includes accessing naming mechanism item, the host name of resource Claim item, path entry;
Step S402, the naming mechanism item, Hostname item, path entry of the access resource in original URI are each corresponded to Information according to preset rules generate the 3rd checking information;
Step S403, the naming mechanism item, Hostname item, path entry and the 3rd of the access resource in original URI are tested Information combination is demonstrate,proved, obtains URI to be transmitted.
Specifically, the URI to be transmitted generated in the present embodiment during the interface of third party application is sent to, If being not tampered with, URI to be transmitted is URI to be verified, in the 3rd checking information and URI to be verified in URI to be transmitted The first checking information it is identical.
For the original URI of step S401, generation file destination, original URI includes naming mechanism item, the master for accessing resource Machine name item, path entry.Specific generation method is repeated no more in the present embodiment referring to generation method of the prior art.
For step S402, by the naming mechanism item, Hostname item, path entry of the access resource in original URI each Corresponding information generates the 3rd checking information according to preset rules.Namely generate method and the generation the 3rd of the second checking information The method of checking information is identical.That is, if URI to be transmitted does not have during the interface of third party application is sent to It is tampered, URI generations to be verified the verify using the method identical with generating the 3rd checking information in URI to be transmitted Two checking informations, the checking information generated twice is necessarily identical, this is also the principle that the present invention is verified.
By the naming mechanism item of the access resource in original URI, Hostname item, the corresponding information of path entry according to Preset rules generate the 3rd checking information, specifically include:Name of the MD5 algorithms to the access resource in original URI is respectively adopted Mechanism item, Hostname item, the corresponding information of path entry are encrypted, and obtain every corresponding MD5 values;For original The corresponding MD5 values of each single item in beginning URI, according to interception numeral corresponding with MD5 values, are extracted in MD5 values with intercepting digital phase Character at corresponding at least two position, obtains prefetching character string, the character that interception numeral is used to indicate extraction is in MD5 values Position, interception numeral be that server is issued according to the balance of plant identification code IMEI of terminal;Character string combinations will be respectively prefetched, Obtain the 3rd checking information.Wherein, it is every in original URI for the one-time authentication process of same destination application Every corresponding interception numeral is identical in URI to be verified when corresponding interception numeral is with verifying URI to be verified.
For step S403, by the naming mechanism item of the access resource in original URI, Hostname item, path entry and Three checking informations combine, and obtain URI to be transmitted;Obtain the URI to be transmitted with checking information.
Due to the characteristic of md5 encryption algorithm, the naming mechanism item of the access resource in URI to be transmitted, Hostname item, road Any one in footpath is tampered, and can make it that the second checking information for being obtained using preset rules is to be transmitted with being originally generated The 3rd checking information in URI has very big difference.
Therefore, if URI to be transmitted is tampered in transmit process, and not decode destination application relevant by cribber Code (including method of calibration), then be difficult to cause the first checking information in the URI to be verified after distorting with terminal according to default The second checking information that rule verification obtains is identical, that is, hardly results in the result that URI to be verified is verified.
In addition, the combination of interception set of digits is up to 122023939 kinds, therefore, the relevant code of destination application is broken The probability of solution is very low.
It will be appreciated by those skilled in the art that being, after the completion of current checking procedure, terminal can also be repeated to clothes Business device sends the process of international EIC equipment identification code IMEI, so that server generates interception numeral at random according to international identification code again Collection, then used interception numeral when the URI to be transmitted and verification URI to be verified of same generation terminal next time file destination Collect and be currently generated the URI to be transmitted of file destination and verify that used interception set of digits is different during URI to be verified. The step in embodiment one is " each by the naming mechanism item, Hostname item, path entry of the access resource in URI to be verified at this time Self-corresponding information generates the second checking information according to preset rules corresponding with the terminal " it is specially " by URI to be verified The naming mechanism item of access resource, Hostname item, the corresponding information of path entry it is current according to being carried out with the terminal The corresponding preset rules of checking procedure, generate the second checking information ".This kind of scheme further adds cribber and decodes target The difficulty of the relevant code of application program.
In the present embodiment, the verification in URI to be transmitted is obtained by MD5 algorithms and interception rule corresponding with terminal Breath, reduces the probability that cribber cracks destination application, avoids the method for calibration of destination application in a terminal After being cracked, destination application in other terminals also can not normal operation phenomenon generation.
The generation method of the installation kit of destination application in the various embodiments described above is illustrated below, next embodiment In executive agent can be Fig. 1 shown in server.
Fig. 5 is the flow chart of the embodiment of the method four of verification Uniform Resource Identifier URI provided by the invention, such as Fig. 5 institutes Show, the method for the present embodiment can include:
Step S501, the source code of destination application and URI check codes corresponding with destination application are obtained;
Step S502, after using URI check codes are woven into Software Development Kit SDK towards tangent plane programming AOP SDK after obtained processing;
Step S503, the installation of destination application is obtained according to the SDK after the source code of destination application, processing Bag, so that terminal verifies the to be verified of acquisition according to the URI check codes in installation kit and preset rules corresponding with terminal Whether URI is legal, when URI to be verified is that destination application calls third party application loaded targets file, to third party The URI transmitted in the interface of application program.
Specifically, the source code and and target of destination application are obtained when obtaining the installation kit of destination application first The corresponding URI check codes of application program, are then woven into software development using towards tangent plane programming AOP by URI check codes SDK after the processing obtained after in kit SDK.
Wherein, SDK is provided by third party application, and SDK includes the 3rd that destination application can call The interface relevant parameter of square application program, so that destination application can transmit URI to the interface of third party application.
Use in the present embodiment and URI check codes be woven into Software Development Kit SDK towards tangent plane programming AOP, So that the code of URI check codes and third party application is full decoupled, user can flexibly change URI check codes.
Fig. 6 is the structure diagram of the device embodiment one of verification Uniform Resource Identifier URI provided by the invention, is such as schemed Shown in 6, the device of the present embodiment can include:Acquisition module 61, checking information generation module 62 and judgment module 63.
Wherein, acquisition module 61, when calling third party application loaded targets file for obtaining destination application, The URI to be verified transmitted into the interface of third party application;URI to be verified includes naming mechanism item, the master for accessing resource Machine name item, path entry and the first authentication information items;Checking information generation module 62, for the access in URI to be verified to be provided The naming mechanism item in source, Hostname item, the corresponding information of path entry are according to preset rules corresponding with the terminal, generation Second checking information;Judgment module 63, for judging the second checking information and the corresponding first verification letter of the first authentication information items Whether breath is consistent, if so, then obtaining the result that URI to be verified is verified.
Wherein, checking information generation module 62 is specifically used for:MD5 algorithms are respectively adopted to provide the access in URI to be verified The naming mechanism item in source, Hostname item, the corresponding information of path entry are encrypted, and obtain every corresponding MD5 Value;MD5 values corresponding for each single item, according to interception numeral corresponding with MD5 values, are extracted opposite with interception numeral in MD5 values The character at least two positions answered, obtains prefetching character string, the character that interception numeral is used to indicate extraction is in MD5 values Position, interception numeral is that server is issued according to the balance of plant identification code IMEI of terminal;Character string combinations will be respectively prefetched, obtained To the second checking information.
Checking information generation module 62 also particularly useful for:Third party application loading is called obtaining destination application During file destination, before the URI to be verified transmitted into the interface of third party application, the original URI of file destination is generated, Original URI includes the naming mechanism item, Hostname item, path entry for accessing resource;By the name of the access resource in original URI Mechanism item, Hostname item, the corresponding information of path entry generate the 3rd checking information according to preset rules;By original URI In the naming mechanism item of access resource, Hostname item, path entry and the combination of the 3rd checking information, obtain URI to be transmitted;Its In, if URI to be verified is identical with URI to be transmitted by verification, URI to be verified.
The device of the present embodiment, can be used for the technical solution for performing above method embodiment, its realization principle and technology Effect is similar, and details are not described herein again.
Fig. 7 is the structure diagram of the device embodiment two of present invention verification Uniform Resource Identifier URI, as shown in fig. 7, The device of the present embodiment is on the basis of Fig. 6 shown device structures, further, can also include:Sending module 64 and reception Module 65.
The sending module 13 is used for after the installation kit for obtaining destination application from server, sends balance of plant identification Code IMEI is to server;Receiving module 65 is respective for receiving the items including URI to be verified that server is returned according to IMEI The interception set of digits of corresponding interception numeral.
The device of the present embodiment, can be used for the technical solution for performing above method embodiment, its realization principle and technology Effect is similar, and details are not described herein again.
Fig. 8 is the structure diagram of the device embodiment three of verification Uniform Resource Identifier URI provided by the invention, is such as schemed Shown in 8, the device of the present embodiment can include acquisition module 81, braiding module 82 and installation kit generation module 83.
Acquisition module 81, for obtaining source code and URI corresponding with the destination application verifications of destination application Code;Module 82 is woven, for URI check codes to be woven into Software Development Kit SDK using towards tangent plane programming AOP In, the SDK after obtained processing;Installation kit generation module 83, after the source code according to destination application, processing SDK obtains the installation kit of destination application so that terminal according to URI check codes in installation kit and corresponding with terminal Whether the URI to be verified that preset rules verification obtains is legal, and URI to be verified is that destination application calls third party application During loaded targets file, the URI that is transmitted into the interface of third party application.
Fig. 9 is the structure diagram of the device embodiment three of present invention verification Uniform Resource Identifier URI, as shown in figure 9, The device of the present embodiment is on the basis of Fig. 8 shown device structures, further, can also include:Receiving module 84 and transmission Module 85.Receiving module 84, the balance of plant identification code IMEI sent for receiving terminal;Obtain mould 81 be additionally operable to obtain with The corresponding interception set of digits of IMEI, interception digital convergence include the naming mechanism item of the access resource in URI to be verified, host name Claim item, path entry corresponding interception numeral;Sending module 85 is sent set of digits is intercepted to terminal.
The device of the present embodiment, can be used for the technical solution for performing above method embodiment, its realization principle and technology Effect is similar, and details are not described herein again.
The present invention also provides a kind of system for verifying Uniform Resource Identifier URI, the system of the present embodiment includes:First dress Put and second device, wherein, first device can use the structure of Fig. 6~Fig. 7 any device embodiments, and second device can adopt With the structure of Fig. 8~Fig. 9 any device embodiments.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above-mentioned each method embodiment can lead to The relevant hardware of programmed instruction is crossed to complete.Foregoing program can be stored in a computer read/write memory medium.The journey Sequence upon execution, execution the step of including above-mentioned each method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or Person's CD etc. is various can be with the medium of store program codes.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe is described in detail the present invention with reference to foregoing embodiments, it will be understood by those of ordinary skill in the art that:Its according to Can so modify to the technical solution described in foregoing embodiments, either to which part or all technical characteristic into Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme.

Claims (10)

  1. A kind of 1. method for verifying Uniform Resource Identifier URI, applied to terminal, it is characterised in that including:
    When obtaining destination application calling third party application loaded targets file, to connecing for the third party application The URI to be verified transmitted in mouthful;The URI to be verified include accessing the naming mechanism item of resource, Hostname item, path entry and First authentication information items;
    The naming mechanism item of access resource in the URI to be verified, Hostname item, the corresponding information of path entry are pressed According to preset rules corresponding with the terminal, the second checking information is generated;
    Judge whether second checking information the first checking information corresponding with first authentication information items is consistent, if so, Then obtain the result that the URI to be verified is verified.
  2. 2. the according to the method described in claim 1, it is characterized in that, life of the access resource by the URI to be verified Name mechanism item, Hostname item, the corresponding information of path entry are according to preset rules corresponding with the terminal, generation second Checking information, including:
    Naming mechanism item, Hostname item, path entry of the MD5 algorithms to the access resource in the URI to be verified is respectively adopted Corresponding information is encrypted, and obtains every corresponding MD5 values;
    MD5 values corresponding for each single item, according to interception numeral corresponding with MD5 values, are extracted digital with the interception in MD5 values Character at corresponding at least two position, obtains prefetching character string, the interception numeral is used to indicate that the character of extraction exists Position in MD5 values, the interception numeral is that server is issued according to the balance of plant identification code IMEI of the terminal;
    By it is each it is described prefetch character string combinations, obtain the second checking information.
  3. 3. according to the method described in claim 2, it is characterized in that, call third-party application in the acquisition destination application During program loaded targets file, before the URI to be verified transmitted into the interface of the third party application, the method is also Including:
    After the installation kit for obtaining the destination application from server, world EIC equipment identification code IMEI is sent to the service Device;
    Receive server cutting according to the IMEI every corresponding interception numerals including the URI to be verified returned Take set of digits.
  4. 4. according to the method described in claim 3, it is characterized in that, call third-party application in the acquisition destination application During program loaded targets file, before the URI to be verified transmitted into the interface of the third party application, the method is also Including:
    Generate the original URI of the file destination, the original URI include accessing the naming mechanism item of resource, Hostname item, Path entry;
    By the naming mechanism item of the access resource in the original URI, Hostname item, the corresponding information of path entry according to The preset rules generate the 3rd checking information;
    By the naming mechanism item of the access resource in the original URI, Hostname item, path entry and the 3rd checking information Combination, obtains URI to be transmitted;
    Wherein, if the URI to be verified is identical with the URI to be transmitted by verification, the URI to be verified.
  5. A kind of 5. method for verifying Uniform Resource Identifier URI, applied to server, it is characterised in that including:
    Obtain the source code of destination application and URI check codes corresponding with the destination application;
    The URI check codes are woven into Software Development Kit SDK using towards tangent plane programming AOP, obtained processing SDK afterwards;
    The installation kit of destination application is obtained according to the SDK after the source code of the destination application, the processing, so that Whether terminal verifies the URI to be verified obtained according to the URI check codes in installation kit and preset rules corresponding with terminal It is legal, when the URI to be verified is that destination application calls third party application loaded targets file, to the third party The URI transmitted in the interface of application program.
  6. 6. according to the method described in claim 5, it is characterized in that, the method further includes:
    The balance of plant identification code IMEI that receiving terminal is sent;
    Interception set of digits corresponding with the IMEI is obtained, the interception digital convergence includes the access in the URI to be verified The corresponding interception numeral of the naming mechanism item of resource, Hostname item, path entry;
    The interception set of digits is sent to the terminal.
  7. A kind of 7. device for verifying Uniform Resource Identifier URI, applied to terminal, it is characterised in that including:
    Acquisition module, when calling third party application loaded targets file for obtaining destination application, to the described 3rd The URI to be verified transmitted in the interface of square application program;The URI to be verified includes naming mechanism item, the host for accessing resource Name item, path entry and the first authentication information items;
    Checking information generation module, for by the naming mechanism item of the access resource in the URI to be verified, Hostname item, The corresponding information of path entry generates the second checking information according to preset rules corresponding with the terminal;
    Judgment module, for judging that second checking information and corresponding first checking information of first authentication information items be It is no consistent, if so, then obtaining the result that the URI to be verified is verified.
  8. 8. device according to claim 7, it is characterised in that the checking information generation module is specifically used for:
    Naming mechanism item, Hostname item, path entry of the MD5 algorithms to the access resource in the URI to be verified is respectively adopted Corresponding information is encrypted, and obtains every corresponding MD5 values;
    MD5 values corresponding for each single item, according to interception numeral corresponding with MD5 values, are extracted digital with the interception in MD5 values Character at corresponding at least two position, obtains prefetching character string, the interception numeral is used to indicate that the character of extraction exists Position in MD5 values, the interception numeral is that server is issued according to the balance of plant identification code IMEI of the terminal;
    By it is each it is described prefetch character string combinations, obtain the second checking information.
  9. A kind of 9. device for verifying Uniform Resource Identifier URI, applied to server, it is characterised in that including:
    Acquisition module, for obtaining source code and URI corresponding with the destination application verification generations of destination application Code;
    Module is woven, for the URI check codes to be woven into Software Development Kit SDK using towards tangent plane programming AOP In, the SDK after obtained processing;
    Installation kit generation module, obtaining target for the SDK after the source code according to the destination application, the processing should With the installation kit of program so that terminal according to the URI check codes in installation kit and preset rules corresponding with terminal verification Whether the URI to be verified obtained is legal, and the URI to be verified is that destination application calls third party application loaded targets During file, the URI that is transmitted into the interface of the third party application.
  10. A kind of 10. system for verifying Uniform Resource Identifier URI, it is characterised in that including:Dress as claimed in claim 7 or 8 Put, and the device described in claim 9.
CN201710883109.8A 2017-09-26 2017-09-26 Method, device and system for checking Uniform Resource Identifier (URI) Active CN107911335B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710883109.8A CN107911335B (en) 2017-09-26 2017-09-26 Method, device and system for checking Uniform Resource Identifier (URI)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710883109.8A CN107911335B (en) 2017-09-26 2017-09-26 Method, device and system for checking Uniform Resource Identifier (URI)

Publications (2)

Publication Number Publication Date
CN107911335A true CN107911335A (en) 2018-04-13
CN107911335B CN107911335B (en) 2021-02-09

Family

ID=61841015

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710883109.8A Active CN107911335B (en) 2017-09-26 2017-09-26 Method, device and system for checking Uniform Resource Identifier (URI)

Country Status (1)

Country Link
CN (1) CN107911335B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635550A (en) * 2018-12-12 2019-04-16 苏州思必驰信息科技有限公司 Authorization check method, gateway and the system of company-data
CN110310648A (en) * 2019-05-21 2019-10-08 深圳壹账通智能科技有限公司 Control method, device, mobile terminal and the readable storage medium storing program for executing of mobile terminal
CN117472035A (en) * 2023-12-27 2024-01-30 东方电气风电股份有限公司 Verification method for software and hardware of main control system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060106802A1 (en) * 2004-11-18 2006-05-18 International Business Machines Corporation Stateless methods for resource hiding and access control support based on URI encryption
CN101695164A (en) * 2009-09-28 2010-04-14 华为技术有限公司 Verification method, device and system for controlling resource access
US20130268773A1 (en) * 2011-09-07 2013-10-10 Elwha Llc Computational systems and methods for preparing data for double-encryption and anonymous storage
CN103701946A (en) * 2013-12-20 2014-04-02 珠海金山网络游戏科技有限公司 Method and system for client-side to be in communication with server through URL (Universal Resource Locator)
CN104717177A (en) * 2013-12-11 2015-06-17 中国移动通信集团公司 Mobile application security control method and mobile application security control device
CN106020858A (en) * 2016-04-29 2016-10-12 乐视控股(北京)有限公司 Method, terminal and system for downloading and installation of application program

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060106802A1 (en) * 2004-11-18 2006-05-18 International Business Machines Corporation Stateless methods for resource hiding and access control support based on URI encryption
CN101695164A (en) * 2009-09-28 2010-04-14 华为技术有限公司 Verification method, device and system for controlling resource access
US20130268773A1 (en) * 2011-09-07 2013-10-10 Elwha Llc Computational systems and methods for preparing data for double-encryption and anonymous storage
CN104717177A (en) * 2013-12-11 2015-06-17 中国移动通信集团公司 Mobile application security control method and mobile application security control device
CN103701946A (en) * 2013-12-20 2014-04-02 珠海金山网络游戏科技有限公司 Method and system for client-side to be in communication with server through URL (Universal Resource Locator)
CN106020858A (en) * 2016-04-29 2016-10-12 乐视控股(北京)有限公司 Method, terminal and system for downloading and installation of application program

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109635550A (en) * 2018-12-12 2019-04-16 苏州思必驰信息科技有限公司 Authorization check method, gateway and the system of company-data
CN109635550B (en) * 2018-12-12 2021-08-17 苏州思必驰信息科技有限公司 Permission verification method, gateway and system for cluster data
CN110310648A (en) * 2019-05-21 2019-10-08 深圳壹账通智能科技有限公司 Control method, device, mobile terminal and the readable storage medium storing program for executing of mobile terminal
CN117472035A (en) * 2023-12-27 2024-01-30 东方电气风电股份有限公司 Verification method for software and hardware of main control system
CN117472035B (en) * 2023-12-27 2024-03-08 东方电气风电股份有限公司 Verification method for software and hardware of main control system

Also Published As

Publication number Publication date
CN107911335B (en) 2021-02-09

Similar Documents

Publication Publication Date Title
US11943255B2 (en) Methods and apparatus for detecting a presence of a malicious application
CN105512881B (en) A kind of method and terminal for completing payment based on two dimensional code
JP6609047B2 (en) Method and device for application information risk management
US11651468B2 (en) Watermark security
CN105701423B (en) Date storage method and device applied to high in the clouds payment transaction
CN102760219A (en) Android platform software protecting system, method and equipment
EA004693B1 (en) Secure file transfer method and system
CN104965712A (en) Application reinforcing protection method and apparatus and mobile terminal
CN105046482A (en) Mobile terminal payment method, device, and system
Mansfield-Devine Android architecture: attacking the weak points
US10897361B1 (en) Automated hash validation
CN104184892A (en) Mobile terminal intelligent card based data transmission method and mobile terminal
CN107911335A (en) Verify the methods, devices and systems of Uniform Resource Identifier URI
CN110888838A (en) Object storage based request processing method, device, equipment and storage medium
CN106453263A (en) Method and system of binding cellphone number with APP
CN108566374A (en) A kind of application method for down loading and its system, block chain node device, terminal
CN109842616A (en) Account binding method, device and server
CN106664535A (en) Information sending method and apparatus, terminal device, and system
CN107908978A (en) A kind of data processing method, server and system
CN107333151A (en) A kind of video flowing address method for authenticating and device
CN110599140A (en) Digital currency verification method and system
US11057215B1 (en) Automated hash validation
CN106685945A (en) Service request processing method, verifying method of service handling number, and terminal thereof
CN109992955A (en) Detection hold-up interception method, device, system, equipment and the medium of illegal installation kit
US9354849B2 (en) Modification of compiled applications and application management using retrievable policies

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant