CN108959879A - Data capture method, device, electronic equipment and the server of application program - Google Patents
Data capture method, device, electronic equipment and the server of application program Download PDFInfo
- Publication number
- CN108959879A CN108959879A CN201810552903.9A CN201810552903A CN108959879A CN 108959879 A CN108959879 A CN 108959879A CN 201810552903 A CN201810552903 A CN 201810552903A CN 108959879 A CN108959879 A CN 108959879A
- Authority
- CN
- China
- Prior art keywords
- client
- server
- bio
- identification
- verifying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the present invention provides data capture method, device, electronic equipment and the server of a kind of application program, this method comprises: requesting current presentation page data to server;The bio-identification checking request of server push is received, the bio-identification checking request determines that the client generates after blacklist by the server;According to the bio-identification checking request, bio-identification verifying is carried out;If being verified, information is verified to server transmission;Receive the current presentation page data that the server is verified information transmission according to.This method makes user that verifying can be rapidly completed without executing any complex operations, and then guarantees that client quickly can get display data, the experience of significant increase user from server.
Description
Technical field
The present embodiments relate to computer technology more particularly to a kind of data capture methods of application program, device, electricity
Sub- equipment and server.
Background technique
Application program (Application, abbreviation APP) client needs to obtain by access server in the process of running
Various data are taken, and then complete a series of function.For the APP more for some user volumes, it is understood that there may be visitor
The family end frequent interface of multiple request server in a short time, this can cause larger pressure to server, may cause clothes
Business device is unavailable.Therefore, it is necessary to the access to client to control.
In the prior art, when client accesses server every time, server will record the mark of each client, if
Some client repeatedly accesses the interface of server in a short time, then blacklist can be added in the client by server.Work as visitor
When family end accesses server again, server may require that client verifies user, allow client again after being verified
Continue to access the interface of server in end.
But to will lead to user complicated for operation when carrying out verification operation for the method for the prior art, and client is caused to access
The server used time is longer, and user experience is bad.
Summary of the invention
The embodiment of the present invention provides data capture method, device, electronic equipment and the server of a kind of application program, is used for
The caused client access server used time complicated for operation is longer when solution prior art user progress verification operation, user's body
Test bad problem.
First aspect of the embodiment of the present invention provides a kind of data capture method of application program, comprising:
Current presentation page data is requested to server;
The bio-identification checking request of server push is received, the bio-identification checking request is determined by the server
The client generates after blacklist;
According to the bio-identification checking request, bio-identification verifying is carried out;
If being verified, information is verified to server transmission;
Receive the current presentation page data that the server is verified information transmission according to.
Further, the bio-identification verifying includes: fingerprint recognition verifying or recognition of face verifying.
Second aspect of the embodiment of the present invention provides a kind of data capture method of application program, comprising:
Receive the request for the current presentation page data that client is sent;
If the client is in blacklist, to the client push bio-identification checking request;
Receive the client return is verified information;
It is verified information according to described, returns to the current presentation page data to the client.
Further, the method also includes:
It is verified information according to described, the client is removed from blacklist.
Further, the method also includes:
If the client not in the blacklist, judges that the access times of the client within the set time are
No is more than threshold value, if being more than, sends bio-identification checking request to the client.
Further, the method also includes:
If the access times of the client within the set time are more than the threshold value, black name is added in the client
Dan Zhong.
Further, the bio-identification verifying includes: fingerprint recognition verifying or recognition of face verifying.
The third aspect of the embodiment of the present invention provides a kind of data acquisition facility of application program, comprising:
Request module, for requesting current presentation page data to server;
First receiving module, for receiving the bio-identification checking request of server push, the bio-identification verifying is asked
It asks and determines that the client generates after blacklist by the server;
Authentication module, for carrying out bio-identification verifying according to the bio-identification checking request;
Sending module, for being verified information to server transmission when being verified;
Second receiving module, the current presentation page that information transmission is verified according to for receiving the server
Data.
Further, the bio-identification verifying includes: fingerprint recognition verifying or recognition of face verifying.
Fourth aspect of the embodiment of the present invention provides a kind of data acquisition facility of application program, comprising:
First receiving module, the request of the current presentation page data for receiving client transmission;
Pushing module, for being asked to client push bio-identification verifying when the client is in blacklist
It asks;
Second receiving module is verified information for receive that the client returns;
Sending module returns to the current presentation page number to the client for being verified information according to
According to.
Further, further includes:
Remove module removes the client for being verified information according to from blacklist.
Further, further includes:
Judgment module, for judging the client in setting time when the client is not in the blacklist
Whether interior access times are more than threshold value, if being more than, send bio-identification checking request to the client.
Further, further includes:
Module is added, it, will be described for when client access times within the set time are more than the threshold value
Client is added in blacklist.
Further, the bio-identification verifying includes: fingerprint recognition verifying or recognition of face verifying.
The 5th aspect of the embodiment of the present invention provides a kind of electronic equipment, comprising:
Memory, for storing program instruction;
Processor executes side described in above-mentioned first aspect for calling and executing the program instruction in the memory
Method step.
The 6th aspect of the embodiment of the present invention provides a kind of server, comprising:
Memory, for storing program instruction;
Processor executes side described in above-mentioned second aspect for calling and executing the program instruction in the memory
Method step.
The 7th aspect of the embodiment of the present invention provides a kind of readable storage medium storing program for executing, and calculating is stored in the readable storage medium storing program for executing
Machine program, the computer program are used to execute the data capture method of application program described in above-mentioned first aspect.
Eighth aspect of the embodiment of the present invention provides a kind of readable storage medium storing program for executing, and calculating is stored in the readable storage medium storing program for executing
Machine program, the computer program are used to execute the data capture method of application program described in above-mentioned second aspect.
Data capture method, device, electronic equipment and the server of application program provided by the embodiment of the present invention, work as visitor
When family end requires client to verify user due to being accessed frequently, client uses the verification mode of bio-identification,
So that verifying can be rapidly completed without executing any complex operations in user, and then guarantee that client can be obtained quickly from server
Get display data, the experience of significant increase user.In addition, using the obtained verification result phase of verification mode of bio-identification
Than in the verification method of the prior art, accuracy rate is higher, therefore server can be further avoided by malicious attack, guarantee clothes
The operational safety of business device.
Detailed description of the invention
It, below will be to embodiment or the prior art in order to illustrate more clearly of the present invention or technical solution in the prior art
Attached drawing needed in description is briefly described, it should be apparent that, the accompanying drawings in the following description is of the invention one
A little embodiments for those of ordinary skill in the art without any creative labor, can also be according to this
A little attached drawings obtain other attached drawings.
Fig. 1 is the system architecture diagram of the data capture method of application program provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of the data capture method embodiment one of application program provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of the data capture method embodiment two of application program provided in an embodiment of the present invention;
Fig. 4 is the flow diagram of the data capture method embodiment three of application program provided in an embodiment of the present invention;
Fig. 5 is a kind of function structure chart of the data acquisition facility of application program provided in an embodiment of the present invention;
Fig. 6 is the modular structure of the data acquisition facility embodiment one of another application program provided in an embodiment of the present invention
Figure;
Fig. 7 is the modular structure of the data acquisition facility embodiment two of another application program provided in an embodiment of the present invention
Figure;
Fig. 8 is the modular structure of the data acquisition facility embodiment three of another application program provided in an embodiment of the present invention
Figure;
Fig. 9 is the modular structure of the data acquisition facility example IV of another application program provided in an embodiment of the present invention
Figure;
Figure 10 is the entity block diagram of a kind of electronic equipment provided in an embodiment of the present invention;
Figure 11 is a kind of entity block diagram of server provided in an embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached in the embodiment of the present invention
Figure, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is the present invention
A part of the embodiment, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not having
Every other embodiment obtained under the premise of creative work is made, shall fall within the protection scope of the present invention.
In the prior art, after server requirement client verifies user, client will use picture validation code, mention
Ask that identifying code etc. verifies user.But the method for the prior art requires user and executes more complex verification operation.With
For picture validation code, machine automatic identification, may do some processing in order to prevent, change original identifying code character shape
Shape, user need the long period and carry out careful identification just be verified, and only pass through rear client in user's checking
End could continue to server request data, therefore, the method for the prior art will lead to client access the server used time it is longer,
User experience is bad.
The embodiment of the present invention based on the above issues, proposes a kind of data capture method of application program, by using biology
The verification mode of identification so that verifying can be rapidly completed without executing any complex operations in user, and then guarantees that client can
Quickly to get display data, the experience of significant increase user from server.In addition, using the verification mode institute of bio-identification
The verification method of obtained verification result compared with the prior art, accuracy rate is higher, therefore can further avoid server
By malicious attack, guarantee the operational safety of server.
Fig. 1 is the system architecture diagram of the data capture method of application program provided in an embodiment of the present invention, as shown in Figure 1,
This method is related to client and server.Wherein, client refers to the APP client operated in the equipment such as mobile phone, tablet computer
End, server are the server of APP.Client in the process of running, needs from server request data and shows user.
Illustrate the scheme of the embodiment of the present invention from the angle of client first below.
Fig. 2 is the flow diagram of the data capture method embodiment one of application program provided in an embodiment of the present invention, should
The executing subject of method is above-mentioned client, as shown in Fig. 2, this method comprises:
S201, current presentation page data is requested to server.
Optionally, when client judges to need to open a page depending on the user's operation, client need first to
Server requests the data of the page to be opened, i.e. current presentation page data, in the current page for receiving server return
After display data, client opens the page and loads data into the current presentation page and then shown.
S202, the bio-identification checking request for receiving server push, the bio-identification checking request is by above-mentioned server
Determine that above-mentioned client generates after blacklist.
If client is according to normal frequency to server request data, server can return to current page to client
Face data.And if the frequency of user end to server request data is excessively high, client may be added to black name by server
It is single, and client is required to verify user, to prevent server by malicious attack.The concrete processing procedure of server will be
It is described in detail in following embodiments.
In turn, in this step, client can receive the bio-identification checking request of server transmission, and client can be with
Directly need to carry out bio-identification verifying according to identity validation entrained in request message or request message.
S203, according to above-mentioned bio-identification checking request, carry out bio-identification verifying.
Optionally, server is can specify specifically in bio-identification checking request using which kind of bio-identification authentication
Formula selects bio-identification verifying according to the tenability of place terminal by client oneself alternatively, server can not also be specified
Mode.
Optionally, client can initiate checking request to the operating system of place terminal, corresponding by operating system tune
Proving program execute verification process, and by transmitting verification result to client.
If S204, being verified, information is verified to the transmission of above-mentioned server.
If the result of verifying is to be verified, user end to server transmission is verified information, such as client
A response message is sent to server, carries the mark being verified in message.
In another case, if verifying does not pass through, client can choose two ways.A kind of mode is visitor
Family end does not return any as a result, server, which does not receive response, to return to any page data to client to server.
Another way is that user end to server sends authentication failed information, and server should according to authentication failed information decision
The user of client is illegal user, and continues that the client is stored in blacklist or takes further control arrange
It applies.
S205, above-mentioned server is received according to the above-mentioned current presentation page data for being verified information transmission.
Server receive client transmission be verified information after, can determine client and for by machine malice grasp
Control, therefore current presentation page data can be returned to client.
In turn, it after client receives current presentation page data, opens the page and loads data into current presentation page
Face is shown in turn.
In the present embodiment, when client requires client to verify user due to being accessed frequently, client
Using the verification mode of bio-identification, so that verifying can be rapidly completed without executing any complex operations in user, and then guarantee
Client quickly can get display data, the experience of significant increase user from server.In addition, testing using bio-identification
The verification method of the obtained verification result of card mode compared with the prior art, accuracy rate is higher, therefore can further keep away
Exempt from server by malicious attack, guarantees the operational safety of server.
In a kind of optional embodiment, above-mentioned bio-identification verifying includes that fingerprint recognition verifying or recognition of face are tested
Card.
Optionally, when being verified using fingerprint recognition, client plays fingerprint recognition program by operating system tune, by user
Fingerprint is inputted in the fingerprint input area of terminal, fingerprint recognition program is verified according to the fingerprint that user inputs, and is verified knot
Fruit, operating system transmit verification result to client.
Optionally, when being verified using recognition of face, client plays recognition of face program by operating system tune, and face is known
Other program tune plays the camera of terminal, by the face of camera shooting active user, and by recognition of face program according to capture
Face is verified, and is verified as a result, operating system transmits verification result to client.
Illustrate the scheme of the embodiment of the present invention from the angle of server below.
Fig. 3 is the flow diagram of the data capture method embodiment two of application program provided in an embodiment of the present invention, should
The executing subject of method is above-mentioned server, as shown in figure 3, this method comprises:
S301, the request for receiving the current presentation page data that client is sent.
If S302, above-mentioned client are in blacklist, to above-mentioned client push bio-identification checking request.
Wherein, the mark of the client of one or more frequently access servers is had recorded in above-mentioned blacklist.
If the number that some client accesses server within the regular hour is excessive, server can be added into black
List.
If client is singly added into blacklist, when it accesses server again, server just may require that the client
User is verified at end, i.e., to client push bio-identification checking request, to be confirmed whether to be legitimate user in operation visitor
Family end.
What S303, the above-mentioned client of reception returned is verified information.
S304, it is verified information according to above-mentioned, returns to above-mentioned current presentation page data to above-mentioned client.
User end to server transmission is verified information, and explanation is that legitimate user is operating client, therefore server
Can current page data directly be returned to client.
In another case, if client is that verifying does not pass through to the verification result of user, client can be selected
Select two ways.A kind of mode is that client does not return to any result to server.In this manner, server can not
Any operation is executed, until next time client sends request of data or other message.Another way is, client is to clothes
Business device sends authentication failed information.In this manner, server is according to the user of authentication failed information decision client
For illegal user, server can continue for the client to be stored in blacklist, also, according to the subsequent request of client
Further control measure are taken, for example, taking if client still sends request of data to server after authentication failed
Business device can shield the transmission interface of the client, and the user end to server is forbidden to continue to send message.
In the present embodiment, when client requires client to verify user due to being accessed frequently, client
Using the verification mode of bio-identification, server further according to bio-identification verification result to client returned data.Pass through this
Kind treatment process so that verifying can be rapidly completed without executing any complex operations in user, and then guarantees that client can be fast
Speed gets display data, the experience of significant increase user from server.In addition, obtained by verification mode using bio-identification
Verification result verification method compared with the prior art, accuracy rate is higher, therefore can further avoid server and be disliked
Meaning attack, guarantees the operational safety of server.
On the basis of the above embodiments, the present embodiment be related to server to client return current presentation page data it
Treatment process afterwards.
Fig. 4 is the flow diagram of the data capture method embodiment three of application program provided in an embodiment of the present invention, such as
Shown in Fig. 4, this method comprises:
S401, the request for receiving the current presentation page data that client is sent.
If S402, above-mentioned client are in blacklist, to above-mentioned client push bio-identification checking request.
What S403, the above-mentioned client of reception returned is verified information.
S404, it is verified information according to above-mentioned, returns to above-mentioned current presentation page data to above-mentioned client.
The specific implementation procedure of above-mentioned steps S401-S404 is referred to embodiment two above-mentioned, and details are not described herein again.
S405, it is verified information according to above-mentioned, above-mentioned client is removed from blacklist.
When server from client receive it is above-mentioned be verified information after, it can determination is legitimate user in operation visitor
Family end, therefore, other than returning to current page data to client, server can also move above-mentioned client from blacklist
It removes.In turn, when client next time again to server request data when, server can normally to the client returned data,
Without carrying out bio-identification verifying again.
In the present embodiment, server is verified information according to what client was sent, and client is removed from blacklist,
To guarantee that client directly can obtain data from server in the follow-up process, without being verified again.
On the basis of the above embodiments, the present embodiment is related to treatment process of the client not in blacklist.
Optionally, if above-mentioned client is not in blacklist, server judges above-mentioned client within the set time
Access times whether be more than threshold value, if being more than, to above-mentioned client send bio-identification checking request.
It in turn, optionally, will be above-mentioned if the access times of above-mentioned client within the set time are more than above-mentioned threshold value
Client is added in blacklist.
Specifically, server judges that the client is being set for the not request of data transmitted by the client of blacklist
Whether the access times in fixing time are more than certain threshold value, if it does, then illustrate the client in a short time frequently to
Server request data, then the client exists by the possibility of malicious operation.In this case, server can be sent out to client
Biological plant checking request is sent, to be confirmed whether to be legitimate user in operation client.
In turn, also above-mentioned client can be added in blacklist for server.It is not removed from blacklist in client
Before, as long as user end to server request data, server can all be wanted according to the process in above-described embodiment two or embodiment three
Client is asked to carry out bio-identification verifying to user.
Fig. 5 is a kind of function structure chart of the data acquisition facility of application program provided in an embodiment of the present invention, such as Fig. 5 institute
Show, which includes:
Request module 501, for requesting current presentation page data to server.
First receiving module 502, for receiving the bio-identification checking request of server push, the bio-identification verifying
Request determines that the client generates after blacklist by the server.
Authentication module 503, for carrying out bio-identification verifying according to the bio-identification checking request.
Sending module 504, for being verified information to server transmission when being verified.
Second receiving module 505, the current presentation that information transmission is verified according to for receiving the server
Page data.
In the device, when client requires client to verify user due to being accessed frequently, client makes
With the verification mode of bio-identification, so that verifying can be rapidly completed without executing any complex operations in user, and then guarantee visitor
Family end quickly can get display data, the experience of significant increase user from server.In addition, using the verifying of bio-identification
The verification method of the obtained verification result of mode compared with the prior art, accuracy rate is higher, therefore can further avoid
Server guarantees the operational safety of server by malicious attack.
In another embodiment, above-mentioned bio-identification verifying includes: fingerprint recognition verifying or recognition of face verifying.
Fig. 6 is the modular structure of the data acquisition facility embodiment one of another application program provided in an embodiment of the present invention
Figure, as shown in fig. 6, the device includes:
First receiving module 601, the request of the current presentation page data for receiving client transmission.
Pushing module 602, for being verified to the client push bio-identification when the client is in blacklist
Request.
Second receiving module 603 is verified information for receive that the client returns.
Sending module 604 returns to the current presentation page to the client for being verified information according to
Data.
In the device, when client requires client to verify user due to being accessed frequently, client makes
With the verification mode of bio-identification, server further according to bio-identification verification result to client returned data.By this
Treatment process so that verifying can be rapidly completed without executing any complex operations in user, and then guarantees that client can be quick
Display data, the experience of significant increase user are got from server.In addition, the verification mode using bio-identification is obtained
The verification method of verification result compared with the prior art, accuracy rate is higher, therefore can further avoid server by malice
Attack, guarantees the operational safety of server.
Fig. 7 is the modular structure of the data acquisition facility embodiment two of another application program provided in an embodiment of the present invention
Figure, as shown in fig. 7, the device includes:
First receiving module 601, the request of the current presentation page data for receiving client transmission.
Pushing module 602, for being verified to the client push bio-identification when the client is in blacklist
Request.
Second receiving module 603 is verified information for receive that the client returns.
Sending module 604 returns to the current presentation page to the client for being verified information according to
Data.
Further include:
Remove module 605 removes the client for being verified information according to from blacklist.
In the device, server is verified information according to what client was sent, and client is removed from blacklist, from
And guarantee that client directly can obtain data from server in the follow-up process, without being verified again.
Fig. 8 is the modular structure of the data acquisition facility embodiment three of another application program provided in an embodiment of the present invention
Figure, as shown in figure 8, the device includes:
First receiving module 601, the request of the current presentation page data for receiving client transmission.
Pushing module 602, for being verified to the client push bio-identification when the client is in blacklist
Request.
Second receiving module 603 is verified information for receive that the client returns.
Sending module 604 returns to the current presentation page to the client for being verified information according to
Data.
Further include:
Remove module 605 removes the client for being verified information according to from blacklist.
Further include:
Judgment module 606, for when the client is not in the blacklist, judging the client in setting
Whether interior access times are more than threshold value, if being more than, send bio-identification checking request to the client.
Fig. 9 is the modular structure of the data acquisition facility example IV of another application program provided in an embodiment of the present invention
Figure, as shown in figure 9, the device includes:
First receiving module 601, the request of the current presentation page data for receiving client transmission.
Pushing module 602, for being verified to the client push bio-identification when the client is in blacklist
Request.
Second receiving module 603 is verified information for receive that the client returns.
Sending module 604 returns to the current presentation page to the client for being verified information according to
Data.
Further include:
Remove module 605 removes the client for being verified information according to from blacklist.
Further include:
Judgment module 606, for when the client is not in the blacklist, judging the client in setting
Whether interior access times are more than threshold value, if being more than, send bio-identification checking request to the client.
Further include:
Module 607 is added, for when client access times within the set time are more than the threshold value, by institute
Client is stated to be added in blacklist.
In another embodiment, the upper bio-identification verifying includes: fingerprint recognition verifying or recognition of face verifying.
Figure 10 is the entity block diagram of a kind of electronic equipment provided in an embodiment of the present invention, as shown in Figure 10, the electronic equipment
Include:
Memory 1001, for storing program instruction.
Processor 1002 executes in above method embodiment for calling and executing the program instruction in memory 1001
Method and step performed by client.
Figure 11 is a kind of entity block diagram of server provided in an embodiment of the present invention, and as shown in figure 11, which includes:
Memory 1101, for storing program instruction.
Processor 1102 executes in above method embodiment for calling and executing the program instruction in memory 1101
Method and step performed by server.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above-mentioned each method embodiment can lead to
The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer readable storage medium.The journey
When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned include: ROM, RAM, magnetic disk or
The various media that can store program code such as person's CD.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (18)
1. a kind of data capture method of application program characterized by comprising
Current presentation page data is requested to server;
The bio-identification checking request of server push is received, described in the bio-identification checking request is determined as the server
Client generates after blacklist;
According to the bio-identification checking request, bio-identification verifying is carried out;
If being verified, information is verified to server transmission;
Receive the current presentation page data that the server is verified information transmission according to.
2. the method according to claim 1, wherein the bio-identification verifying include: fingerprint recognition verifying or
Recognition of face verifying.
3. a kind of data capture method of application program characterized by comprising
Receive the request for the current presentation page data that client is sent;
If the client is in blacklist, to the client push bio-identification checking request;
Receive the client return is verified information;
It is verified information according to described, returns to the current presentation page data to the client.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
It is verified information according to described, the client is removed from blacklist.
5. the method according to claim 3 or 4, which is characterized in that the method also includes:
If the client not in the blacklist, judges whether the access times of the client within the set time surpass
Threshold value is crossed, if being more than, sends bio-identification checking request to the client.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
If the access times of the client within the set time are more than the threshold value, blacklist is added in the client
In.
7. according to the method described in claim 3, it is characterized in that, the bio-identification verifying include: fingerprint recognition verifying or
Recognition of face verifying.
8. a kind of data acquisition facility of application program characterized by comprising
Request module, for requesting current presentation page data to server;
First receiving module, for receiving the bio-identification checking request of server push, the bio-identification checking request by
The server determines that the client generates after blacklist;
Authentication module, for carrying out bio-identification verifying according to the bio-identification checking request;
Sending module, for being verified information to server transmission when being verified;
Second receiving module, the current presentation page number that information transmission is verified according to for receiving the server
According to.
9. device according to claim 8, which is characterized in that bio-identification verifying include: fingerprint recognition verifying or
Recognition of face verifying.
10. a kind of data acquisition facility of application program characterized by comprising
First receiving module, the request of the current presentation page data for receiving client transmission;
Pushing module is used for when the client is in blacklist, to the client push bio-identification checking request;
Second receiving module is verified information for receive that the client returns;
Sending module returns to the current presentation page data to the client for being verified information according to.
11. device according to claim 10, which is characterized in that further include:
Remove module removes the client for being verified information according to from blacklist.
12. device described in 0 or 11 according to claim 1, which is characterized in that further include:
Judgment module judges the client within the set time for when the client is not in the blacklist
Whether access times are more than threshold value, if being more than, send bio-identification checking request to the client.
13. device according to claim 12, which is characterized in that further include:
Module is added, for when client access times within the set time are more than the threshold value, by the client
End is added in blacklist.
14. device according to claim 10, which is characterized in that the bio-identification verifying includes: fingerprint recognition verifying
Or recognition of face verifying.
15. a kind of electronic equipment characterized by comprising
Memory, for storing program instruction;
Processor, for calling and executing the program instruction in the memory, method step described in perform claim requirement 1 or 2
Suddenly.
16. a kind of server characterized by comprising
Memory, for storing program instruction;
Processor, for calling and executing the program instruction in the memory, perform claim requires the described in any item sides of 3-7
Method step.
17. a kind of readable storage medium storing program for executing, which is characterized in that be stored with computer program, the meter in the readable storage medium storing program for executing
Data capture method of the calculation machine program for application program described in perform claim requirement 1 or 2.
18. a kind of readable storage medium storing program for executing, which is characterized in that be stored with computer program, the meter in the readable storage medium storing program for executing
Calculation machine program requires the data capture method of the described in any item application programs of 3-7 for perform claim.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810552903.9A CN108959879A (en) | 2018-05-31 | 2018-05-31 | Data capture method, device, electronic equipment and the server of application program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810552903.9A CN108959879A (en) | 2018-05-31 | 2018-05-31 | Data capture method, device, electronic equipment and the server of application program |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108959879A true CN108959879A (en) | 2018-12-07 |
Family
ID=64492826
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810552903.9A Pending CN108959879A (en) | 2018-05-31 | 2018-05-31 | Data capture method, device, electronic equipment and the server of application program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108959879A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110188577A (en) * | 2019-05-22 | 2019-08-30 | 上海上湖信息技术有限公司 | A kind of information display method, device, equipment and medium |
CN111198736A (en) * | 2019-12-16 | 2020-05-26 | 上海淇玥信息技术有限公司 | Page display method based on user state characteristics, and device, system, server and storage medium thereof |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102630046A (en) * | 2012-03-13 | 2012-08-08 | 深圳市九洲电器有限公司 | Data acquisition system, method, set-top box, network server |
CN103841130A (en) * | 2012-11-21 | 2014-06-04 | 深圳市腾讯计算机系统有限公司 | Verification information pushing method and device, and identity authentication method and device |
CN105160572A (en) * | 2015-09-30 | 2015-12-16 | 努比亚技术有限公司 | Device and method for controlling order to generate, and seckilling system |
CN105939326A (en) * | 2016-01-18 | 2016-09-14 | 杭州迪普科技有限公司 | Message processing method and device |
-
2018
- 2018-05-31 CN CN201810552903.9A patent/CN108959879A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102630046A (en) * | 2012-03-13 | 2012-08-08 | 深圳市九洲电器有限公司 | Data acquisition system, method, set-top box, network server |
CN103841130A (en) * | 2012-11-21 | 2014-06-04 | 深圳市腾讯计算机系统有限公司 | Verification information pushing method and device, and identity authentication method and device |
CN105160572A (en) * | 2015-09-30 | 2015-12-16 | 努比亚技术有限公司 | Device and method for controlling order to generate, and seckilling system |
CN105939326A (en) * | 2016-01-18 | 2016-09-14 | 杭州迪普科技有限公司 | Message processing method and device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110188577A (en) * | 2019-05-22 | 2019-08-30 | 上海上湖信息技术有限公司 | A kind of information display method, device, equipment and medium |
CN111198736A (en) * | 2019-12-16 | 2020-05-26 | 上海淇玥信息技术有限公司 | Page display method based on user state characteristics, and device, system, server and storage medium thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3694170B1 (en) | Method and device for withstanding denial-of-service attack | |
CN107908485B (en) | Interface parameter transmission method, device, equipment and computer readable storage medium | |
KR20180005660A (en) | Mobile Payment Device and Mobile Payment System | |
CN107533596B (en) | Fingerprint identification method and mobile terminal | |
CN111447245A (en) | Authentication method, authentication device, electronic equipment and server | |
WO2013173238A1 (en) | Electronic transaction notification system and method | |
US20210174331A1 (en) | Transferring a customer from an atm transaction to a device-based transaction during an error state, and applications thereof | |
CN112767133A (en) | Service decision method and device, storage medium and computer equipment | |
CN108959879A (en) | Data capture method, device, electronic equipment and the server of application program | |
CN104935548A (en) | Identity verification method, device and system based on intelligent tattooing equipment | |
CN107819758A (en) | A kind of IP Camera leak remote detecting method and device | |
CN106559385B (en) | A kind of data authentication method and apparatus | |
CN108306937B (en) | Sending method and obtaining method of short message verification code, server and storage medium | |
CN110781500A (en) | Data wind control system and method | |
CN110177096A (en) | Client certificate method, apparatus, medium and calculating equipment | |
CN109710692A (en) | User information processing method, device and storage medium in a kind of block chain network | |
CN111784355B (en) | Transaction security verification method and device based on edge calculation | |
CN105281963A (en) | nginx server vulnerability detection method and device | |
CN105577607A (en) | User identity authentication method and user identity authentication device | |
CN112187561B (en) | Communication module testing method, device, computer equipment and storage medium | |
CN112788017A (en) | Safety verification method, device, equipment and medium | |
CN108229127A (en) | Verification data are generated in advance to distinguish the system and method for client | |
CN105718314A (en) | Event execution method, device and system | |
CN111859322A (en) | Identity verification method and device and electronic equipment | |
CN112261051B (en) | User registration method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181207 |
|
RJ01 | Rejection of invention patent application after publication |