CN108959879A - Data capture method, device, electronic equipment and the server of application program - Google Patents

Data capture method, device, electronic equipment and the server of application program Download PDF

Info

Publication number
CN108959879A
CN108959879A CN201810552903.9A CN201810552903A CN108959879A CN 108959879 A CN108959879 A CN 108959879A CN 201810552903 A CN201810552903 A CN 201810552903A CN 108959879 A CN108959879 A CN 108959879A
Authority
CN
China
Prior art keywords
client
server
bio
identification
verifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810552903.9A
Other languages
Chinese (zh)
Inventor
刘帅
吕庆春
彭飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing 58 Information Technology Co Ltd
Original Assignee
Beijing 58 Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing 58 Information Technology Co Ltd filed Critical Beijing 58 Information Technology Co Ltd
Priority to CN201810552903.9A priority Critical patent/CN108959879A/en
Publication of CN108959879A publication Critical patent/CN108959879A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the present invention provides data capture method, device, electronic equipment and the server of a kind of application program, this method comprises: requesting current presentation page data to server;The bio-identification checking request of server push is received, the bio-identification checking request determines that the client generates after blacklist by the server;According to the bio-identification checking request, bio-identification verifying is carried out;If being verified, information is verified to server transmission;Receive the current presentation page data that the server is verified information transmission according to.This method makes user that verifying can be rapidly completed without executing any complex operations, and then guarantees that client quickly can get display data, the experience of significant increase user from server.

Description

Data capture method, device, electronic equipment and the server of application program
Technical field
The present embodiments relate to computer technology more particularly to a kind of data capture methods of application program, device, electricity Sub- equipment and server.
Background technique
Application program (Application, abbreviation APP) client needs to obtain by access server in the process of running Various data are taken, and then complete a series of function.For the APP more for some user volumes, it is understood that there may be visitor The family end frequent interface of multiple request server in a short time, this can cause larger pressure to server, may cause clothes Business device is unavailable.Therefore, it is necessary to the access to client to control.
In the prior art, when client accesses server every time, server will record the mark of each client, if Some client repeatedly accesses the interface of server in a short time, then blacklist can be added in the client by server.Work as visitor When family end accesses server again, server may require that client verifies user, allow client again after being verified Continue to access the interface of server in end.
But to will lead to user complicated for operation when carrying out verification operation for the method for the prior art, and client is caused to access The server used time is longer, and user experience is bad.
Summary of the invention
The embodiment of the present invention provides data capture method, device, electronic equipment and the server of a kind of application program, is used for The caused client access server used time complicated for operation is longer when solution prior art user progress verification operation, user's body Test bad problem.
First aspect of the embodiment of the present invention provides a kind of data capture method of application program, comprising:
Current presentation page data is requested to server;
The bio-identification checking request of server push is received, the bio-identification checking request is determined by the server The client generates after blacklist;
According to the bio-identification checking request, bio-identification verifying is carried out;
If being verified, information is verified to server transmission;
Receive the current presentation page data that the server is verified information transmission according to.
Further, the bio-identification verifying includes: fingerprint recognition verifying or recognition of face verifying.
Second aspect of the embodiment of the present invention provides a kind of data capture method of application program, comprising:
Receive the request for the current presentation page data that client is sent;
If the client is in blacklist, to the client push bio-identification checking request;
Receive the client return is verified information;
It is verified information according to described, returns to the current presentation page data to the client.
Further, the method also includes:
It is verified information according to described, the client is removed from blacklist.
Further, the method also includes:
If the client not in the blacklist, judges that the access times of the client within the set time are No is more than threshold value, if being more than, sends bio-identification checking request to the client.
Further, the method also includes:
If the access times of the client within the set time are more than the threshold value, black name is added in the client Dan Zhong.
Further, the bio-identification verifying includes: fingerprint recognition verifying or recognition of face verifying.
The third aspect of the embodiment of the present invention provides a kind of data acquisition facility of application program, comprising:
Request module, for requesting current presentation page data to server;
First receiving module, for receiving the bio-identification checking request of server push, the bio-identification verifying is asked It asks and determines that the client generates after blacklist by the server;
Authentication module, for carrying out bio-identification verifying according to the bio-identification checking request;
Sending module, for being verified information to server transmission when being verified;
Second receiving module, the current presentation page that information transmission is verified according to for receiving the server Data.
Further, the bio-identification verifying includes: fingerprint recognition verifying or recognition of face verifying.
Fourth aspect of the embodiment of the present invention provides a kind of data acquisition facility of application program, comprising:
First receiving module, the request of the current presentation page data for receiving client transmission;
Pushing module, for being asked to client push bio-identification verifying when the client is in blacklist It asks;
Second receiving module is verified information for receive that the client returns;
Sending module returns to the current presentation page number to the client for being verified information according to According to.
Further, further includes:
Remove module removes the client for being verified information according to from blacklist.
Further, further includes:
Judgment module, for judging the client in setting time when the client is not in the blacklist Whether interior access times are more than threshold value, if being more than, send bio-identification checking request to the client.
Further, further includes:
Module is added, it, will be described for when client access times within the set time are more than the threshold value Client is added in blacklist.
Further, the bio-identification verifying includes: fingerprint recognition verifying or recognition of face verifying.
The 5th aspect of the embodiment of the present invention provides a kind of electronic equipment, comprising:
Memory, for storing program instruction;
Processor executes side described in above-mentioned first aspect for calling and executing the program instruction in the memory Method step.
The 6th aspect of the embodiment of the present invention provides a kind of server, comprising:
Memory, for storing program instruction;
Processor executes side described in above-mentioned second aspect for calling and executing the program instruction in the memory Method step.
The 7th aspect of the embodiment of the present invention provides a kind of readable storage medium storing program for executing, and calculating is stored in the readable storage medium storing program for executing Machine program, the computer program are used to execute the data capture method of application program described in above-mentioned first aspect.
Eighth aspect of the embodiment of the present invention provides a kind of readable storage medium storing program for executing, and calculating is stored in the readable storage medium storing program for executing Machine program, the computer program are used to execute the data capture method of application program described in above-mentioned second aspect.
Data capture method, device, electronic equipment and the server of application program provided by the embodiment of the present invention, work as visitor When family end requires client to verify user due to being accessed frequently, client uses the verification mode of bio-identification, So that verifying can be rapidly completed without executing any complex operations in user, and then guarantee that client can be obtained quickly from server Get display data, the experience of significant increase user.In addition, using the obtained verification result phase of verification mode of bio-identification Than in the verification method of the prior art, accuracy rate is higher, therefore server can be further avoided by malicious attack, guarantee clothes The operational safety of business device.
Detailed description of the invention
It, below will be to embodiment or the prior art in order to illustrate more clearly of the present invention or technical solution in the prior art Attached drawing needed in description is briefly described, it should be apparent that, the accompanying drawings in the following description is of the invention one A little embodiments for those of ordinary skill in the art without any creative labor, can also be according to this A little attached drawings obtain other attached drawings.
Fig. 1 is the system architecture diagram of the data capture method of application program provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of the data capture method embodiment one of application program provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of the data capture method embodiment two of application program provided in an embodiment of the present invention;
Fig. 4 is the flow diagram of the data capture method embodiment three of application program provided in an embodiment of the present invention;
Fig. 5 is a kind of function structure chart of the data acquisition facility of application program provided in an embodiment of the present invention;
Fig. 6 is the modular structure of the data acquisition facility embodiment one of another application program provided in an embodiment of the present invention Figure;
Fig. 7 is the modular structure of the data acquisition facility embodiment two of another application program provided in an embodiment of the present invention Figure;
Fig. 8 is the modular structure of the data acquisition facility embodiment three of another application program provided in an embodiment of the present invention Figure;
Fig. 9 is the modular structure of the data acquisition facility example IV of another application program provided in an embodiment of the present invention Figure;
Figure 10 is the entity block diagram of a kind of electronic equipment provided in an embodiment of the present invention;
Figure 11 is a kind of entity block diagram of server provided in an embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached in the embodiment of the present invention Figure, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is the present invention A part of the embodiment, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not having Every other embodiment obtained under the premise of creative work is made, shall fall within the protection scope of the present invention.
In the prior art, after server requirement client verifies user, client will use picture validation code, mention Ask that identifying code etc. verifies user.But the method for the prior art requires user and executes more complex verification operation.With For picture validation code, machine automatic identification, may do some processing in order to prevent, change original identifying code character shape Shape, user need the long period and carry out careful identification just be verified, and only pass through rear client in user's checking End could continue to server request data, therefore, the method for the prior art will lead to client access the server used time it is longer, User experience is bad.
The embodiment of the present invention based on the above issues, proposes a kind of data capture method of application program, by using biology The verification mode of identification so that verifying can be rapidly completed without executing any complex operations in user, and then guarantees that client can Quickly to get display data, the experience of significant increase user from server.In addition, using the verification mode institute of bio-identification The verification method of obtained verification result compared with the prior art, accuracy rate is higher, therefore can further avoid server By malicious attack, guarantee the operational safety of server.
Fig. 1 is the system architecture diagram of the data capture method of application program provided in an embodiment of the present invention, as shown in Figure 1, This method is related to client and server.Wherein, client refers to the APP client operated in the equipment such as mobile phone, tablet computer End, server are the server of APP.Client in the process of running, needs from server request data and shows user.
Illustrate the scheme of the embodiment of the present invention from the angle of client first below.
Fig. 2 is the flow diagram of the data capture method embodiment one of application program provided in an embodiment of the present invention, should The executing subject of method is above-mentioned client, as shown in Fig. 2, this method comprises:
S201, current presentation page data is requested to server.
Optionally, when client judges to need to open a page depending on the user's operation, client need first to Server requests the data of the page to be opened, i.e. current presentation page data, in the current page for receiving server return After display data, client opens the page and loads data into the current presentation page and then shown.
S202, the bio-identification checking request for receiving server push, the bio-identification checking request is by above-mentioned server Determine that above-mentioned client generates after blacklist.
If client is according to normal frequency to server request data, server can return to current page to client Face data.And if the frequency of user end to server request data is excessively high, client may be added to black name by server It is single, and client is required to verify user, to prevent server by malicious attack.The concrete processing procedure of server will be It is described in detail in following embodiments.
In turn, in this step, client can receive the bio-identification checking request of server transmission, and client can be with Directly need to carry out bio-identification verifying according to identity validation entrained in request message or request message.
S203, according to above-mentioned bio-identification checking request, carry out bio-identification verifying.
Optionally, server is can specify specifically in bio-identification checking request using which kind of bio-identification authentication Formula selects bio-identification verifying according to the tenability of place terminal by client oneself alternatively, server can not also be specified Mode.
Optionally, client can initiate checking request to the operating system of place terminal, corresponding by operating system tune Proving program execute verification process, and by transmitting verification result to client.
If S204, being verified, information is verified to the transmission of above-mentioned server.
If the result of verifying is to be verified, user end to server transmission is verified information, such as client A response message is sent to server, carries the mark being verified in message.
In another case, if verifying does not pass through, client can choose two ways.A kind of mode is visitor Family end does not return any as a result, server, which does not receive response, to return to any page data to client to server. Another way is that user end to server sends authentication failed information, and server should according to authentication failed information decision The user of client is illegal user, and continues that the client is stored in blacklist or takes further control arrange It applies.
S205, above-mentioned server is received according to the above-mentioned current presentation page data for being verified information transmission.
Server receive client transmission be verified information after, can determine client and for by machine malice grasp Control, therefore current presentation page data can be returned to client.
In turn, it after client receives current presentation page data, opens the page and loads data into current presentation page Face is shown in turn.
In the present embodiment, when client requires client to verify user due to being accessed frequently, client Using the verification mode of bio-identification, so that verifying can be rapidly completed without executing any complex operations in user, and then guarantee Client quickly can get display data, the experience of significant increase user from server.In addition, testing using bio-identification The verification method of the obtained verification result of card mode compared with the prior art, accuracy rate is higher, therefore can further keep away Exempt from server by malicious attack, guarantees the operational safety of server.
In a kind of optional embodiment, above-mentioned bio-identification verifying includes that fingerprint recognition verifying or recognition of face are tested Card.
Optionally, when being verified using fingerprint recognition, client plays fingerprint recognition program by operating system tune, by user Fingerprint is inputted in the fingerprint input area of terminal, fingerprint recognition program is verified according to the fingerprint that user inputs, and is verified knot Fruit, operating system transmit verification result to client.
Optionally, when being verified using recognition of face, client plays recognition of face program by operating system tune, and face is known Other program tune plays the camera of terminal, by the face of camera shooting active user, and by recognition of face program according to capture Face is verified, and is verified as a result, operating system transmits verification result to client.
Illustrate the scheme of the embodiment of the present invention from the angle of server below.
Fig. 3 is the flow diagram of the data capture method embodiment two of application program provided in an embodiment of the present invention, should The executing subject of method is above-mentioned server, as shown in figure 3, this method comprises:
S301, the request for receiving the current presentation page data that client is sent.
If S302, above-mentioned client are in blacklist, to above-mentioned client push bio-identification checking request.
Wherein, the mark of the client of one or more frequently access servers is had recorded in above-mentioned blacklist.
If the number that some client accesses server within the regular hour is excessive, server can be added into black List.
If client is singly added into blacklist, when it accesses server again, server just may require that the client User is verified at end, i.e., to client push bio-identification checking request, to be confirmed whether to be legitimate user in operation visitor Family end.
What S303, the above-mentioned client of reception returned is verified information.
S304, it is verified information according to above-mentioned, returns to above-mentioned current presentation page data to above-mentioned client.
User end to server transmission is verified information, and explanation is that legitimate user is operating client, therefore server Can current page data directly be returned to client.
In another case, if client is that verifying does not pass through to the verification result of user, client can be selected Select two ways.A kind of mode is that client does not return to any result to server.In this manner, server can not Any operation is executed, until next time client sends request of data or other message.Another way is, client is to clothes Business device sends authentication failed information.In this manner, server is according to the user of authentication failed information decision client For illegal user, server can continue for the client to be stored in blacklist, also, according to the subsequent request of client Further control measure are taken, for example, taking if client still sends request of data to server after authentication failed Business device can shield the transmission interface of the client, and the user end to server is forbidden to continue to send message.
In the present embodiment, when client requires client to verify user due to being accessed frequently, client Using the verification mode of bio-identification, server further according to bio-identification verification result to client returned data.Pass through this Kind treatment process so that verifying can be rapidly completed without executing any complex operations in user, and then guarantees that client can be fast Speed gets display data, the experience of significant increase user from server.In addition, obtained by verification mode using bio-identification Verification result verification method compared with the prior art, accuracy rate is higher, therefore can further avoid server and be disliked Meaning attack, guarantees the operational safety of server.
On the basis of the above embodiments, the present embodiment be related to server to client return current presentation page data it Treatment process afterwards.
Fig. 4 is the flow diagram of the data capture method embodiment three of application program provided in an embodiment of the present invention, such as Shown in Fig. 4, this method comprises:
S401, the request for receiving the current presentation page data that client is sent.
If S402, above-mentioned client are in blacklist, to above-mentioned client push bio-identification checking request.
What S403, the above-mentioned client of reception returned is verified information.
S404, it is verified information according to above-mentioned, returns to above-mentioned current presentation page data to above-mentioned client.
The specific implementation procedure of above-mentioned steps S401-S404 is referred to embodiment two above-mentioned, and details are not described herein again.
S405, it is verified information according to above-mentioned, above-mentioned client is removed from blacklist.
When server from client receive it is above-mentioned be verified information after, it can determination is legitimate user in operation visitor Family end, therefore, other than returning to current page data to client, server can also move above-mentioned client from blacklist It removes.In turn, when client next time again to server request data when, server can normally to the client returned data, Without carrying out bio-identification verifying again.
In the present embodiment, server is verified information according to what client was sent, and client is removed from blacklist, To guarantee that client directly can obtain data from server in the follow-up process, without being verified again.
On the basis of the above embodiments, the present embodiment is related to treatment process of the client not in blacklist.
Optionally, if above-mentioned client is not in blacklist, server judges above-mentioned client within the set time Access times whether be more than threshold value, if being more than, to above-mentioned client send bio-identification checking request.
It in turn, optionally, will be above-mentioned if the access times of above-mentioned client within the set time are more than above-mentioned threshold value Client is added in blacklist.
Specifically, server judges that the client is being set for the not request of data transmitted by the client of blacklist Whether the access times in fixing time are more than certain threshold value, if it does, then illustrate the client in a short time frequently to Server request data, then the client exists by the possibility of malicious operation.In this case, server can be sent out to client Biological plant checking request is sent, to be confirmed whether to be legitimate user in operation client.
In turn, also above-mentioned client can be added in blacklist for server.It is not removed from blacklist in client Before, as long as user end to server request data, server can all be wanted according to the process in above-described embodiment two or embodiment three Client is asked to carry out bio-identification verifying to user.
Fig. 5 is a kind of function structure chart of the data acquisition facility of application program provided in an embodiment of the present invention, such as Fig. 5 institute Show, which includes:
Request module 501, for requesting current presentation page data to server.
First receiving module 502, for receiving the bio-identification checking request of server push, the bio-identification verifying Request determines that the client generates after blacklist by the server.
Authentication module 503, for carrying out bio-identification verifying according to the bio-identification checking request.
Sending module 504, for being verified information to server transmission when being verified.
Second receiving module 505, the current presentation that information transmission is verified according to for receiving the server Page data.
In the device, when client requires client to verify user due to being accessed frequently, client makes With the verification mode of bio-identification, so that verifying can be rapidly completed without executing any complex operations in user, and then guarantee visitor Family end quickly can get display data, the experience of significant increase user from server.In addition, using the verifying of bio-identification The verification method of the obtained verification result of mode compared with the prior art, accuracy rate is higher, therefore can further avoid Server guarantees the operational safety of server by malicious attack.
In another embodiment, above-mentioned bio-identification verifying includes: fingerprint recognition verifying or recognition of face verifying.
Fig. 6 is the modular structure of the data acquisition facility embodiment one of another application program provided in an embodiment of the present invention Figure, as shown in fig. 6, the device includes:
First receiving module 601, the request of the current presentation page data for receiving client transmission.
Pushing module 602, for being verified to the client push bio-identification when the client is in blacklist Request.
Second receiving module 603 is verified information for receive that the client returns.
Sending module 604 returns to the current presentation page to the client for being verified information according to Data.
In the device, when client requires client to verify user due to being accessed frequently, client makes With the verification mode of bio-identification, server further according to bio-identification verification result to client returned data.By this Treatment process so that verifying can be rapidly completed without executing any complex operations in user, and then guarantees that client can be quick Display data, the experience of significant increase user are got from server.In addition, the verification mode using bio-identification is obtained The verification method of verification result compared with the prior art, accuracy rate is higher, therefore can further avoid server by malice Attack, guarantees the operational safety of server.
Fig. 7 is the modular structure of the data acquisition facility embodiment two of another application program provided in an embodiment of the present invention Figure, as shown in fig. 7, the device includes:
First receiving module 601, the request of the current presentation page data for receiving client transmission.
Pushing module 602, for being verified to the client push bio-identification when the client is in blacklist Request.
Second receiving module 603 is verified information for receive that the client returns.
Sending module 604 returns to the current presentation page to the client for being verified information according to Data.
Further include:
Remove module 605 removes the client for being verified information according to from blacklist.
In the device, server is verified information according to what client was sent, and client is removed from blacklist, from And guarantee that client directly can obtain data from server in the follow-up process, without being verified again.
Fig. 8 is the modular structure of the data acquisition facility embodiment three of another application program provided in an embodiment of the present invention Figure, as shown in figure 8, the device includes:
First receiving module 601, the request of the current presentation page data for receiving client transmission.
Pushing module 602, for being verified to the client push bio-identification when the client is in blacklist Request.
Second receiving module 603 is verified information for receive that the client returns.
Sending module 604 returns to the current presentation page to the client for being verified information according to Data.
Further include:
Remove module 605 removes the client for being verified information according to from blacklist.
Further include:
Judgment module 606, for when the client is not in the blacklist, judging the client in setting Whether interior access times are more than threshold value, if being more than, send bio-identification checking request to the client.
Fig. 9 is the modular structure of the data acquisition facility example IV of another application program provided in an embodiment of the present invention Figure, as shown in figure 9, the device includes:
First receiving module 601, the request of the current presentation page data for receiving client transmission.
Pushing module 602, for being verified to the client push bio-identification when the client is in blacklist Request.
Second receiving module 603 is verified information for receive that the client returns.
Sending module 604 returns to the current presentation page to the client for being verified information according to Data.
Further include:
Remove module 605 removes the client for being verified information according to from blacklist.
Further include:
Judgment module 606, for when the client is not in the blacklist, judging the client in setting Whether interior access times are more than threshold value, if being more than, send bio-identification checking request to the client.
Further include:
Module 607 is added, for when client access times within the set time are more than the threshold value, by institute Client is stated to be added in blacklist.
In another embodiment, the upper bio-identification verifying includes: fingerprint recognition verifying or recognition of face verifying.
Figure 10 is the entity block diagram of a kind of electronic equipment provided in an embodiment of the present invention, as shown in Figure 10, the electronic equipment Include:
Memory 1001, for storing program instruction.
Processor 1002 executes in above method embodiment for calling and executing the program instruction in memory 1001 Method and step performed by client.
Figure 11 is a kind of entity block diagram of server provided in an embodiment of the present invention, and as shown in figure 11, which includes:
Memory 1101, for storing program instruction.
Processor 1102 executes in above method embodiment for calling and executing the program instruction in memory 1101 Method and step performed by server.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above-mentioned each method embodiment can lead to The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer readable storage medium.The journey When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned include: ROM, RAM, magnetic disk or The various media that can store program code such as person's CD.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (18)

1. a kind of data capture method of application program characterized by comprising
Current presentation page data is requested to server;
The bio-identification checking request of server push is received, described in the bio-identification checking request is determined as the server Client generates after blacklist;
According to the bio-identification checking request, bio-identification verifying is carried out;
If being verified, information is verified to server transmission;
Receive the current presentation page data that the server is verified information transmission according to.
2. the method according to claim 1, wherein the bio-identification verifying include: fingerprint recognition verifying or Recognition of face verifying.
3. a kind of data capture method of application program characterized by comprising
Receive the request for the current presentation page data that client is sent;
If the client is in blacklist, to the client push bio-identification checking request;
Receive the client return is verified information;
It is verified information according to described, returns to the current presentation page data to the client.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
It is verified information according to described, the client is removed from blacklist.
5. the method according to claim 3 or 4, which is characterized in that the method also includes:
If the client not in the blacklist, judges whether the access times of the client within the set time surpass Threshold value is crossed, if being more than, sends bio-identification checking request to the client.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
If the access times of the client within the set time are more than the threshold value, blacklist is added in the client In.
7. according to the method described in claim 3, it is characterized in that, the bio-identification verifying include: fingerprint recognition verifying or Recognition of face verifying.
8. a kind of data acquisition facility of application program characterized by comprising
Request module, for requesting current presentation page data to server;
First receiving module, for receiving the bio-identification checking request of server push, the bio-identification checking request by The server determines that the client generates after blacklist;
Authentication module, for carrying out bio-identification verifying according to the bio-identification checking request;
Sending module, for being verified information to server transmission when being verified;
Second receiving module, the current presentation page number that information transmission is verified according to for receiving the server According to.
9. device according to claim 8, which is characterized in that bio-identification verifying include: fingerprint recognition verifying or Recognition of face verifying.
10. a kind of data acquisition facility of application program characterized by comprising
First receiving module, the request of the current presentation page data for receiving client transmission;
Pushing module is used for when the client is in blacklist, to the client push bio-identification checking request;
Second receiving module is verified information for receive that the client returns;
Sending module returns to the current presentation page data to the client for being verified information according to.
11. device according to claim 10, which is characterized in that further include:
Remove module removes the client for being verified information according to from blacklist.
12. device described in 0 or 11 according to claim 1, which is characterized in that further include:
Judgment module judges the client within the set time for when the client is not in the blacklist Whether access times are more than threshold value, if being more than, send bio-identification checking request to the client.
13. device according to claim 12, which is characterized in that further include:
Module is added, for when client access times within the set time are more than the threshold value, by the client End is added in blacklist.
14. device according to claim 10, which is characterized in that the bio-identification verifying includes: fingerprint recognition verifying Or recognition of face verifying.
15. a kind of electronic equipment characterized by comprising
Memory, for storing program instruction;
Processor, for calling and executing the program instruction in the memory, method step described in perform claim requirement 1 or 2 Suddenly.
16. a kind of server characterized by comprising
Memory, for storing program instruction;
Processor, for calling and executing the program instruction in the memory, perform claim requires the described in any item sides of 3-7 Method step.
17. a kind of readable storage medium storing program for executing, which is characterized in that be stored with computer program, the meter in the readable storage medium storing program for executing Data capture method of the calculation machine program for application program described in perform claim requirement 1 or 2.
18. a kind of readable storage medium storing program for executing, which is characterized in that be stored with computer program, the meter in the readable storage medium storing program for executing Calculation machine program requires the data capture method of the described in any item application programs of 3-7 for perform claim.
CN201810552903.9A 2018-05-31 2018-05-31 Data capture method, device, electronic equipment and the server of application program Pending CN108959879A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810552903.9A CN108959879A (en) 2018-05-31 2018-05-31 Data capture method, device, electronic equipment and the server of application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810552903.9A CN108959879A (en) 2018-05-31 2018-05-31 Data capture method, device, electronic equipment and the server of application program

Publications (1)

Publication Number Publication Date
CN108959879A true CN108959879A (en) 2018-12-07

Family

ID=64492826

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810552903.9A Pending CN108959879A (en) 2018-05-31 2018-05-31 Data capture method, device, electronic equipment and the server of application program

Country Status (1)

Country Link
CN (1) CN108959879A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110188577A (en) * 2019-05-22 2019-08-30 上海上湖信息技术有限公司 A kind of information display method, device, equipment and medium
CN111198736A (en) * 2019-12-16 2020-05-26 上海淇玥信息技术有限公司 Page display method based on user state characteristics, and device, system, server and storage medium thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102630046A (en) * 2012-03-13 2012-08-08 深圳市九洲电器有限公司 Data acquisition system, method, set-top box, network server
CN103841130A (en) * 2012-11-21 2014-06-04 深圳市腾讯计算机系统有限公司 Verification information pushing method and device, and identity authentication method and device
CN105160572A (en) * 2015-09-30 2015-12-16 努比亚技术有限公司 Device and method for controlling order to generate, and seckilling system
CN105939326A (en) * 2016-01-18 2016-09-14 杭州迪普科技有限公司 Message processing method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102630046A (en) * 2012-03-13 2012-08-08 深圳市九洲电器有限公司 Data acquisition system, method, set-top box, network server
CN103841130A (en) * 2012-11-21 2014-06-04 深圳市腾讯计算机系统有限公司 Verification information pushing method and device, and identity authentication method and device
CN105160572A (en) * 2015-09-30 2015-12-16 努比亚技术有限公司 Device and method for controlling order to generate, and seckilling system
CN105939326A (en) * 2016-01-18 2016-09-14 杭州迪普科技有限公司 Message processing method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110188577A (en) * 2019-05-22 2019-08-30 上海上湖信息技术有限公司 A kind of information display method, device, equipment and medium
CN111198736A (en) * 2019-12-16 2020-05-26 上海淇玥信息技术有限公司 Page display method based on user state characteristics, and device, system, server and storage medium thereof

Similar Documents

Publication Publication Date Title
EP3694170B1 (en) Method and device for withstanding denial-of-service attack
CN107908485B (en) Interface parameter transmission method, device, equipment and computer readable storage medium
KR20180005660A (en) Mobile Payment Device and Mobile Payment System
CN107533596B (en) Fingerprint identification method and mobile terminal
CN111447245A (en) Authentication method, authentication device, electronic equipment and server
WO2013173238A1 (en) Electronic transaction notification system and method
US20210174331A1 (en) Transferring a customer from an atm transaction to a device-based transaction during an error state, and applications thereof
CN112767133A (en) Service decision method and device, storage medium and computer equipment
CN108959879A (en) Data capture method, device, electronic equipment and the server of application program
CN104935548A (en) Identity verification method, device and system based on intelligent tattooing equipment
CN107819758A (en) A kind of IP Camera leak remote detecting method and device
CN106559385B (en) A kind of data authentication method and apparatus
CN108306937B (en) Sending method and obtaining method of short message verification code, server and storage medium
CN110781500A (en) Data wind control system and method
CN110177096A (en) Client certificate method, apparatus, medium and calculating equipment
CN109710692A (en) User information processing method, device and storage medium in a kind of block chain network
CN111784355B (en) Transaction security verification method and device based on edge calculation
CN105281963A (en) nginx server vulnerability detection method and device
CN105577607A (en) User identity authentication method and user identity authentication device
CN112187561B (en) Communication module testing method, device, computer equipment and storage medium
CN112788017A (en) Safety verification method, device, equipment and medium
CN108229127A (en) Verification data are generated in advance to distinguish the system and method for client
CN105718314A (en) Event execution method, device and system
CN111859322A (en) Identity verification method and device and electronic equipment
CN112261051B (en) User registration method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181207

RJ01 Rejection of invention patent application after publication