CN110807202B - Processing method and device of verification information, electronic equipment and computer readable medium - Google Patents

Processing method and device of verification information, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN110807202B
CN110807202B CN201911052650.XA CN201911052650A CN110807202B CN 110807202 B CN110807202 B CN 110807202B CN 201911052650 A CN201911052650 A CN 201911052650A CN 110807202 B CN110807202 B CN 110807202B
Authority
CN
China
Prior art keywords
information
terminal
access
verification information
accessed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911052650.XA
Other languages
Chinese (zh)
Other versions
CN110807202A (en
Inventor
刘高
吴佳明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Douyin Vision Co Ltd
Douyin Vision Beijing Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN201911052650.XA priority Critical patent/CN110807202B/en
Publication of CN110807202A publication Critical patent/CN110807202A/en
Application granted granted Critical
Publication of CN110807202B publication Critical patent/CN110807202B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The disclosure provides a processing method and device of verification information, electronic equipment and a computer readable storage medium, and relates to the technical field of information processing. The method comprises the following steps: receiving an access request sent by an access initiating terminal, and acquiring verification information of the access initiating terminal based on the access request; converting the verification information according to a preset conversion rule to obtain secret key information, and sending the secret key information to an accessed terminal; the accessed terminal is used for performing reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule, and verifying verification information obtained through the reverse conversion so as to allow the access initiating terminal to access when the verification information meets a preset condition. The processing method of the verification information can improve safety.

Description

Processing method and device of verification information, electronic equipment and computer readable medium
Technical Field
The present disclosure relates to the field of information processing technologies, and in particular, to a method and an apparatus for processing verification information, an electronic device, and a computer-readable medium.
Background
With the development of the internet and the arrival of the big data era, the security of the software system is more and more concerned. When the access initiating terminal requests to access the accessed terminal, the verification information of the access initiating terminal generally needs to be verified, and in order to avoid the verification information being modified, the verification information is generally encrypted.
In the prior art, when an accessed terminal is accessed by a plurality of different access initiating terminals, the same key is usually adopted to encrypt the verification information, which results in lower security.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
In a first aspect, a method for processing verification information is provided, where the method includes:
receiving an access request sent by an access initiating terminal, and acquiring verification information of the access initiating terminal based on the access request;
converting the verification information according to a preset conversion rule to obtain secret key information, and sending the secret key information to the accessed terminal;
the accessed terminal is used for performing reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule, and verifying the verification information obtained through the reverse conversion so as to allow the access initiating terminal to access when the verification information meets a preset condition.
In a second aspect, a method for processing verification information is provided, and the method includes:
receiving key information sent by a key generation terminal; the secret key information is obtained by converting the verification information according to a preset conversion rule; the verification information is acquired from the access initiating terminal by the secret key generating terminal based on the access request sent by the access initiating terminal;
according to the reverse conversion rule corresponding to the conversion rule, the secret key information is reversely converted;
and verifying the verification information obtained by the reverse conversion, and if the verification information meets the preset condition, allowing the access initiating terminal to access.
In a third aspect, a method for processing check information is provided, where the method includes:
the access initiating terminal sends an access request to the secret key generating terminal, and the secret key generating terminal acquires the verification information of the access initiating terminal based on the access request;
the secret key generating terminal converts the verification information according to a preset conversion rule to obtain secret key information, and sends the secret key information to the accessed terminal;
the accessed terminal carries out reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule, and verifies the verification information obtained by the reverse conversion; and if the verification information meets the preset condition, allowing the access initiating terminal to access.
In a fourth aspect, there is provided a processing apparatus for checking information, the apparatus including:
the first receiving module is used for receiving an access request sent by an access initiating terminal and acquiring verification information of the access initiating terminal based on the access request;
the conversion module is used for converting the verification information according to a preset conversion rule to obtain secret key information and sending the secret key information to the accessed terminal;
and the accessed terminal is used for performing reverse conversion on the key information according to a reverse conversion rule corresponding to the conversion rule, and verifying the verification information obtained through the reverse conversion so as to allow the access initiating terminal to access when the verification information meets a preset condition.
In a fifth aspect, there is provided a processing apparatus for verifying information, the apparatus comprising:
the second receiving module is used for receiving the key information sent by the key generation terminal; the secret key information is obtained by converting the verification information according to a preset conversion rule; the verification information is acquired from the access initiating terminal by the secret key generating terminal based on the access request sent by the access initiating terminal;
the reverse conversion module is used for performing reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule;
and the second check module is used for checking the check information obtained by the reverse conversion, and allowing the access initiating terminal to access if the check information meets the preset condition.
In a sixth aspect, there is provided a processing apparatus for verifying information, comprising:
the third receiving module is used for enabling the access initiating terminal to send the access request to the secret key generating terminal, and the secret key generating terminal obtains the verification information of the access initiating terminal based on the access request;
the sending module is used for converting the verification information by the secret key generating terminal according to a preset conversion rule to obtain secret key information and sending the secret key information to the accessed terminal;
the third verification module is used for enabling the accessed terminal to perform reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule and verify the verification information obtained through the reverse conversion; and if the verification information meets the preset condition, allowing the access initiating terminal to access.
In a seventh aspect, an electronic device is provided, which includes:
one or more processors;
a memory;
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the processing method for realizing the verification information shown in the first aspect of the present disclosure is executed.
In an eighth aspect, a computer-readable medium is provided, on which a computer program is stored, wherein the computer program is used for implementing the processing method of checking information shown in the first aspect of the present disclosure when executed by a processor.
The technical scheme provided by the disclosure has the following beneficial effects:
in the scheme of the embodiment of the disclosure, when an access request sent by an access initiating terminal is received, check information of the access initiating terminal is obtained, the check information is converted according to a preset conversion rule to obtain key information, the key information is sent to an accessed terminal, the accessed terminal performs reverse conversion on the key information according to a reverse conversion rule corresponding to the conversion rule, and the check information obtained through the reverse conversion is checked, so that the access initiating terminal is allowed to access when the check information meets a preset condition, and for access of different access initiating terminals, a plurality of groups of different key information can be generated, and the security can be effectively improved.
Further, the conversion rule may be set correspondingly according to different pieces of verification information, or the verification information may include the type of the conversion rule, so that different internet protocol addresses, different access initiating terminals, or different time periods may be set correspondingly with different conversion rules, and the security of the verification information may be further improved.
Furthermore, when the key generation terminal acquires the terminal identification information of the access initiating terminal, the identification encryption information corresponding to the terminal identification information is inquired, the verification information is generated, and encryption is performed before the verification information is converted, so that the safety of the verification information can be further improved.
Additional aspects and advantages of the disclosure will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the disclosure.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale.
Fig. 1 is an application environment diagram of a processing method for verifying information according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a processing method for checking information according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of a processing method for checking information according to an embodiment of the present disclosure;
fig. 4 is a schematic flowchart of a processing method for checking information according to an embodiment of the present disclosure;
fig. 5 is a timing diagram of a processing method for checking information according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a processing apparatus for checking information according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of a processing apparatus for checking information according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of a processing apparatus for checking information according to an embodiment of the present disclosure;
fig. 9 is a schematic structural diagram of an electronic device for processing verification information according to an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing the devices, modules or units, and are not used for limiting the devices, modules or units to be different devices, modules or units, and also for limiting the sequence or interdependence relationship of the functions executed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The present disclosure provides a processing method and apparatus for verification information, an electronic device, and a computer-readable medium, which are intended to solve the above technical problems in the prior art.
The following describes the technical solutions of the present disclosure and how to solve the above technical problems in specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present disclosure will be described below with reference to the accompanying drawings.
The processing method of the verification information provided by the application can be applied to the application environment shown in fig. 1. Specifically, the access initiating terminal 101 includes an access initiating terminal 101a and an access initiating terminal 101b, the access initiating terminal 101 sends an access request to the key generating terminal 102, and the key generating terminal 102 obtains the verification information of the access initiating terminal 101 based on the access request; the key generation terminal 102 converts the verification information according to a preset conversion rule to obtain key information, and sends the key information to the accessed terminal 103; the accessed terminal 103 performs inverse transformation on the key information according to an inverse transformation rule corresponding to the transformation rule, and verifies the verification information obtained by the inverse transformation; if the verification information meets the preset condition, the access initiating terminal 101 is allowed to access.
In other embodiments, the key generation terminal may also use a server instead, and convert the verification information to obtain the key information.
Those skilled in the art will understand that the "terminal" used herein may be a Mobile phone, a tablet computer, a PDA (Personal Digital Assistant), an MID (Mobile Internet Device), etc.; a "server" may be implemented as a stand-alone server or as a server cluster comprised of multiple servers.
The embodiment of the present disclosure provides a processing method for checking information, which may be applied to a key generation terminal shown in fig. 1, where the method includes:
step S201, receiving an access request sent by an access initiating terminal, and acquiring verification information of the access initiating terminal based on the access request.
Specifically, when the access initiating terminal accesses the accessed terminal, the access initiating terminal sends an access request to the key generating terminal, and then the key generating terminal acquires the verification information from the access initiating terminal.
The verification information may include at least one of a current internet protocol address of the access initiating terminal, a first receiving time of receiving the access request, and identification encryption information of the access initiating terminal; the identification encryption information is used for representing the identity of the access initiating terminal.
Step S202, converting the verification information according to a preset conversion rule to obtain secret key information, and sending the secret key information to the accessed terminal; the accessed terminal is used for performing reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule, and verifying the verification information obtained through the reverse conversion so as to allow the access initiating terminal to access when the verification information meets a preset condition.
In the specific implementation process, before the verification information reaches the accessed terminal, the verification information is converted into the key information, and the accessed terminal performs reverse conversion, so that the verification information can be prevented from being intercepted and modified before reaching the accessed terminal, the access authority of the accessed terminal is prevented from being cracked, and the access safety of the accessed terminal can be effectively improved.
Specifically, the set conversion rule may be pre-stored in the key generation terminal and the visited terminal.
The preset conversion rule may be a reordering rule, for example, the check information is converted according to the preset reordering rule to obtain the key information, and the inverse conversion rule may be an inverse ordering rule corresponding to the reordering rule, and the key information is inversely ordered according to an inverse order to obtain the check information.
For example, the check information includes a character string "ABC", and the corresponding conversion rule is reverse sorting, the obtained key information is "CBA", and the accessed terminal reorders the key information to obtain the check information "ABC".
The preset conversion rule may be a conversion according to a preset corresponding relationship, and a conversion database corresponding to the conversion rule may be provided in the key generation terminal and the accessed terminal, so as to query the converted characters corresponding to each character in the verification information.
For example, if the conversion rule is to convert letters into numbers, the letters "a-Z" correspond to "1-26", and the verification information includes the character string "ABC", the key information obtained by the conversion is "123", and the accessed terminal performs inverse conversion according to the inverse conversion rule corresponding to the conversion rule to obtain the verification information "123".
There are other ways of setting the transformation rules, which will be described in detail below.
Specifically, if the verification information includes the current internet protocol address, the verification process is to match the current internet protocol address with a preset internet protocol address requesting access, and if the current internet protocol address and the preset internet protocol address are matched, the verification information is judged to be legal and meets a preset condition; if the verification information comprises first receiving time, second receiving time for receiving the key information is obtained, a time difference value between the second receiving time and the first receiving time is calculated, and if the time difference value is smaller than a preset threshold value, the verification information is judged to be legal and meets a preset condition; and if the verification information comprises the identification encryption information of the access initiating terminal, matching the identification encryption information with the preset encryption information, and if the identification encryption information is matched with the preset encryption information, judging that the verification information is legal and meets the preset condition.
In the above embodiment, when an access request sent by an access initiating terminal is received, check information of the access initiating terminal is obtained, the check information is converted according to a preset conversion rule to obtain key information, the key information is sent to an accessed terminal, the accessed terminal performs inverse conversion on the key information according to an inverse conversion rule corresponding to the conversion rule, and verifies the check information obtained by the inverse conversion, so as to allow the access initiating terminal to access when the check information meets a preset condition, and for access of different access initiating terminals, a plurality of groups of different sets of key information can be generated, so that the security can be effectively improved.
In the above embodiment, the conversion rule is a preset one, in other embodiments, multiple conversion rules may be set in the key generation terminal, and different conversion rules are set according to different verification information, and the setting of the multiple different conversion rules will be further described below.
In one implementation, the conversion rule may be set according to an address type of the current internet protocol address in the check information: the key generation terminal is pre-stored with a plurality of conversion rules and a plurality of address types, each conversion rule is respectively arranged corresponding to each address type, the accessed terminal is pre-stored with a plurality of reverse conversion rules and a plurality of address types, and each reverse conversion rule is respectively arranged corresponding to each address type; when the verification information is received, the key generation terminal inquires the address type of the current internet protocol address in the verification information, inquires the conversion rule corresponding to the address type, converts the verification information according to the corresponding conversion rule to obtain key information, then sends the address type and the key information to the accessed terminal, the accessed terminal inquires the corresponding reverse conversion rule according to the address type, and then reversely converts the key information according to the inquired reverse conversion rule to obtain the verification information.
In an implementation process, the conversion rule may be further set according to the first receiving time in the verification information: the key generation terminal is prestored with a plurality of conversion rules and a plurality of time periods, each conversion rule is respectively corresponding to each time period, the accessed terminal is prestored with a plurality of reverse conversion rules and a plurality of time periods, and each reverse conversion rule is respectively corresponding to each time period; when the verification information is received, the secret key generation terminal inquires a time period of the first receiving time in the verification information, inquires a conversion rule corresponding to the time period, converts the verification information according to the corresponding conversion rule to obtain secret key information, then sends the time period and the secret key information to the accessed terminal, the accessed terminal inquires a corresponding reverse conversion rule according to the time period, and then reversely converts the secret key information according to the inquired reverse conversion rule to obtain the verification information.
In another implementation process, the conversion rule may also be set according to the terminal type corresponding to the identifier encryption information of the access initiating terminal: the key generation terminal is prestored with a plurality of conversion rules and a plurality of terminal types, each conversion rule is respectively arranged corresponding to each terminal type, the accessed terminal is prestored with a plurality of reverse conversion rules and a plurality of terminal types, and each reverse conversion rule is respectively arranged corresponding to each terminal type; when the verification information is received, the secret key generation terminal inquires a terminal type corresponding to identification encryption information in the verification information, inquires a conversion rule corresponding to the terminal type, converts the verification information according to the corresponding conversion rule to obtain secret key information, sends the terminal type and the secret key information to the accessed terminal, the accessed terminal inquires a corresponding reverse conversion rule according to the terminal type, and then reversely converts the secret key information according to the inquired reverse conversion rule to obtain the verification information.
In another implementation process, the verification information may further include a conversion rule type, the key generating terminal pre-stores a plurality of conversion rules and a plurality of rule types, each conversion rule is respectively set corresponding to each rule type, the accessed terminal pre-stores a plurality of inverse conversion rules and a plurality of rule types, and each inverse conversion rule is respectively set corresponding to each rule type; when the verification information is received, the secret key generation terminal obtains a corresponding conversion rule according to the rule type in the verification information, and converts the verification information according to the corresponding conversion rule to obtain secret key information; and then the rule type and the key information are sent to the accessed terminal together, the accessed terminal inquires a corresponding reverse conversion rule according to the rule type, and then the key information is reversely converted according to the inquired reverse conversion rule to obtain the verification information.
In the above embodiment, the conversion rule may be set correspondingly according to different pieces of verification information, or the verification information may include the type of the conversion rule, so that different internet protocol addresses, different access initiating terminals, or different time periods may be set correspondingly with different conversion rules, and the security of the verification information may be further improved.
The embodiment of the present disclosure provides a possible implementation manner, where the verification information includes identification encryption information; before acquiring the verification information of the access initiating terminal based on the access request in step S201, the method may further include:
and acquiring the terminal identification information of the access initiating terminal, and inquiring identification encryption information corresponding to the terminal identification information.
Specifically, the terminal identification information may include cluster information of the access initiating terminal or a terminal service type.
In a specific implementation process, the key generation terminal may also pre-store various terminal identification information and corresponding identification encryption information, when the terminal identification information of the access initiating terminal is obtained, the identification encryption information corresponding to the terminal identification information is queried to generate verification information, and encryption is performed before the verification information is converted, so that the security of the verification information can be further improved.
The embodiment of the present disclosure provides a possible implementation manner, where the verification information includes a current internet protocol address, a first receiving time, and identification encryption information; the step of verifying the verification information obtained by the inverse conversion comprises the following steps:
(1) matching the identification encryption information with preset encryption information;
(2) if the identification encryption information is matched with the preset encryption information, second receiving time of the accessed terminal for receiving the secret key information is obtained, and a time difference value between the second receiving time and the first receiving time is calculated;
(3) if the time difference is smaller than the preset threshold value, matching the current internet protocol address with the internet protocol address requested to be accessed by the access request;
(4) and if the current internet protocol address is matched with the internet protocol address requested to be accessed, judging that the verification information meets the preset condition.
Specifically, in the verification process, whether the identification encryption information in the received verification information is legal or not can be judged, that is, whether the identification encryption information is matched with the preset encryption information or not can be judged; if the identification encrypted information is legal, calculating a time difference value between the second receiving time and the first receiving time, if the time difference value is greater than a preset threshold value, the verification information is possibly intercepted and processed before reaching the accessed terminal, and the verification information is possibly modified; if the time difference is smaller than the preset threshold value, the possibility that the verification information is modified is low, whether the current internet protocol address is legal or not is further judged, and if the current internet protocol address is matched with the internet protocol address requesting access, the verification information is judged to be in accordance with the preset condition.
And if the identification encryption information is not matched with the preset encryption information, or the time difference value is larger than the preset threshold value, or the current internet protocol address is not matched with the internet protocol address requesting access, returning a response that the verification information is illegal to the access initiating terminal.
According to the processing method of the verification information, when an access request sent by an access initiating terminal is received, the verification information of the access initiating terminal is obtained, the verification information is converted according to a preset conversion rule to obtain key information, the key information is sent to an accessed terminal, the accessed terminal performs reverse conversion on the key information according to a reverse conversion rule corresponding to the conversion rule, the verification information obtained through the reverse conversion is verified, the access initiating terminal is allowed to access when the verification information meets a preset condition, and for access of different access initiating terminals, a plurality of groups of different key information can be generated, so that the safety can be effectively improved.
Further, the conversion rule may be set correspondingly according to different pieces of verification information, or the verification information may include the type of the conversion rule, so that different internet protocol addresses, different access initiating terminals, or different time periods may be set correspondingly with different conversion rules, and the security of the verification information may be further improved.
Furthermore, when the key generation terminal acquires the terminal identification information of the access initiating terminal, the identification encryption information corresponding to the terminal identification information is inquired, the verification information is generated, and encryption is performed before the verification information is converted, so that the safety of the verification information can be further improved.
The embodiment of the present disclosure provides a processing method for checking information, which may be applied to a key generation terminal shown in fig. 1, and as shown in fig. 3, the method may include:
step S301, receiving key information sent by a key generation terminal; the secret key information is obtained by converting the verification information according to a preset conversion rule; the verification information is acquired from the access initiating terminal by the key generating terminal based on the access request sent by the access initiating terminal.
Specifically, when the access initiating terminal accesses the accessed terminal, the access initiating terminal sends an access request to the key generating terminal, and then the key generating terminal acquires the verification information from the access initiating terminal.
The verification information may include at least one of a current internet protocol address of the access initiating terminal, a first receiving time of receiving the access request, and identification encryption information of the access initiating terminal; the identification encryption information is used for representing the identity of the access initiating terminal.
In the specific implementation process, before the verification information reaches the accessed terminal, the verification information is converted into the key information, and the accessed terminal performs reverse conversion, so that the verification information can be prevented from being intercepted and modified before reaching the accessed terminal, the access authority of the accessed terminal is prevented from being cracked, and the access safety of the accessed terminal can be effectively improved.
In step S302, the key information is inversely transformed according to the inverse transformation rule corresponding to the transformation rule.
Specifically, the set conversion rule may be pre-stored in the key generation terminal and the visited terminal.
The preset conversion rule may be a reordering rule, for example, the check information is converted according to the preset reordering rule to obtain the key information, and the inverse conversion rule may be an inverse ordering rule corresponding to the reordering rule, and the key information is inversely ordered according to an inverse order to obtain the check information.
The preset conversion rule may be a conversion according to a preset corresponding relationship, and a conversion database corresponding to the conversion rule may be provided in the key generation terminal and the accessed terminal, so as to query the converted characters corresponding to each character in the verification information.
Step S303, the verification information obtained by the inverse conversion is verified, and if the verification information meets the preset condition, the access initiating terminal is allowed to access.
Specifically, if the verification information includes the current internet protocol address, the verification process is to match the current internet protocol address with a preset internet protocol address requesting access, and if the current internet protocol address and the preset internet protocol address are matched, the verification information is judged to be legal and meets a preset condition; if the verification information comprises first receiving time, second receiving time for receiving the key information is obtained, a time difference value between the second receiving time and the first receiving time is calculated, and if the time difference value is smaller than a preset threshold value, the verification information is judged to be legal and meets a preset condition; and if the verification information comprises the identification encryption information of the access initiating terminal, matching the identification encryption information with the preset encryption information, and if the identification encryption information is matched with the preset encryption information, judging that the verification information is legal and meets the preset condition.
In the above embodiment, when an access request sent by an access initiating terminal is received, check information of the access initiating terminal is obtained, the check information is converted according to a preset conversion rule to obtain key information, the key information is sent to an accessed terminal, the accessed terminal performs inverse conversion on the key information according to an inverse conversion rule corresponding to the conversion rule, and verifies the check information obtained by the inverse conversion, so as to allow the access initiating terminal to access when the check information meets a preset condition, and for access of different access initiating terminals, a plurality of groups of different sets of key information can be generated, so that the security can be effectively improved.
In the above embodiment, the conversion rule is a preset one, in other embodiments, multiple conversion rules may be set in the key generation terminal, and different conversion rules are set according to different verification information, and the setting of the multiple different conversion rules will be further described below.
In one implementation, the conversion rule may be set according to an address type of the current internet protocol address in the check information: the key generation terminal is pre-stored with a plurality of conversion rules and a plurality of address types, each conversion rule is respectively arranged corresponding to each address type, the accessed terminal is pre-stored with a plurality of reverse conversion rules and a plurality of address types, and each reverse conversion rule is respectively arranged corresponding to each address type; when the verification information is received, the key generation terminal inquires the address type of the current internet protocol address in the verification information, inquires the conversion rule corresponding to the address type, converts the verification information according to the corresponding conversion rule to obtain key information, then sends the address type and the key information to the accessed terminal, the accessed terminal inquires the corresponding reverse conversion rule according to the address type, and then reversely converts the key information according to the inquired reverse conversion rule to obtain the verification information.
In an implementation process, the conversion rule may be further set according to the first receiving time in the verification information: the key generation terminal is prestored with a plurality of conversion rules and a plurality of time periods, each conversion rule is respectively corresponding to each time period, the accessed terminal is prestored with a plurality of reverse conversion rules and a plurality of time periods, and each reverse conversion rule is respectively corresponding to each time period; when the verification information is received, the secret key generation terminal inquires a time period of the first receiving time in the verification information, inquires a conversion rule corresponding to the time period, converts the verification information according to the corresponding conversion rule to obtain secret key information, then sends the time period and the secret key information to the accessed terminal, the accessed terminal inquires a corresponding reverse conversion rule according to the time period, and then reversely converts the secret key information according to the inquired reverse conversion rule to obtain the verification information.
In another implementation process, the conversion rule may also be set according to the terminal type corresponding to the identifier encryption information of the access initiating terminal: the key generation terminal is prestored with a plurality of conversion rules and a plurality of terminal types, each conversion rule is respectively arranged corresponding to each terminal type, the accessed terminal is prestored with a plurality of reverse conversion rules and a plurality of terminal types, and each reverse conversion rule is respectively arranged corresponding to each terminal type; when the verification information is received, the secret key generation terminal inquires a terminal type corresponding to identification encryption information in the verification information, inquires a conversion rule corresponding to the terminal type, converts the verification information according to the corresponding conversion rule to obtain secret key information, sends the terminal type and the secret key information to the accessed terminal, the accessed terminal inquires a corresponding reverse conversion rule according to the terminal type, and then reversely converts the secret key information according to the inquired reverse conversion rule to obtain the verification information.
In another implementation process, the verification information may further include a conversion rule type, the key generating terminal pre-stores a plurality of conversion rules and a plurality of rule types, each conversion rule is respectively set corresponding to each rule type, the accessed terminal pre-stores a plurality of inverse conversion rules and a plurality of rule types, and each inverse conversion rule is respectively set corresponding to each rule type; when the verification information is received, the secret key generation terminal obtains a corresponding conversion rule according to the rule type in the verification information, and converts the verification information according to the corresponding conversion rule to obtain secret key information; and then the rule type and the key information are sent to the accessed terminal together, the accessed terminal inquires a corresponding reverse conversion rule according to the rule type, and then the key information is reversely converted according to the inquired reverse conversion rule to obtain the verification information.
In the above embodiment, the conversion rule may be set correspondingly according to different pieces of verification information, or the verification information may include the type of the conversion rule, so that different internet protocol addresses, different access initiating terminals, or different time periods may be set correspondingly with different conversion rules, and the security of the verification information may be further improved.
The embodiment of the present disclosure provides a possible implementation manner, where the verification information includes a current internet protocol address, a first receiving time, and identification encryption information; the step S303 of verifying the verification information obtained by inverse conversion may include:
(1) matching the identification encryption information with preset encryption information;
(2) if the identification encryption information is matched with the preset encryption information, second receiving time for receiving the secret key information is obtained, and a time difference value between the second receiving time and the first receiving time is calculated;
(3) if the time difference is smaller than the preset threshold value, matching the current internet protocol address with the internet protocol address requested to be accessed by the access request;
(4) and if the current internet protocol address is matched with the internet protocol address requested to be accessed, judging that the verification information meets the preset condition.
Specifically, in the verification process, whether the identification encryption information in the received verification information is legal or not can be judged, that is, whether the identification encryption information is matched with the preset encryption information or not can be judged; if the identification encrypted information is legal, calculating a time difference value between the second receiving time and the first receiving time, if the time difference value is greater than a preset threshold value, the verification information is possibly intercepted and processed before reaching the accessed terminal, and the verification information is possibly modified; if the time difference is smaller than the preset threshold value, the possibility that the verification information is modified is low, whether the current internet protocol address is legal or not is further judged, and if the current internet protocol address is matched with the internet protocol address requesting access, the verification information is judged to be in accordance with the preset condition.
And if the identification encryption information is not matched with the preset encryption information, or the time difference value is larger than the preset threshold value, or the current internet protocol address is not matched with the internet protocol address requesting access, returning a response that the verification information is illegal to the access initiating terminal.
The following explains a processing method of the verification information from an interactive process between the access initiating terminal, the key generating terminal and the accessed terminal.
The embodiment of the present disclosure provides a processing method for checking information, as shown in fig. 4, the method includes:
step S401, an access initiating terminal sends an access request to a secret key generating terminal, and the secret key generating terminal acquires verification information of the access initiating terminal based on the access request;
step S402, the secret key generating terminal converts the verification information according to a preset conversion rule to obtain secret key information, and sends the secret key information to the accessed terminal;
step S403, the accessed terminal performs inverse transformation on the secret key information according to an inverse transformation rule corresponding to the transformation rule, and verifies the verification information obtained by the inverse transformation; and if the verification information meets the preset condition, allowing the access initiating terminal to access.
According to the processing method of the verification information, when an access request sent by an access initiating terminal is received, the verification information of the access initiating terminal is obtained, the verification information is converted according to a preset conversion rule to obtain key information, the key information is sent to an accessed terminal, the accessed terminal performs reverse conversion on the key information according to a reverse conversion rule corresponding to the conversion rule, the verification information obtained through the reverse conversion is verified, the access initiating terminal is allowed to access when the verification information meets a preset condition, and for access of different access initiating terminals, a plurality of groups of different key information can be generated, so that the safety can be effectively improved.
In order to better understand the particle calculation method, as shown in fig. 5, an example of the processing method of the verification information of the present disclosure is explained in detail below.
In one example, the verification information processing method provided by the present application includes the following steps:
step S501, the access initiating terminal sends an access request to the key generating terminal;
step S502, the secret key generating terminal acquires the verification information of the access initiating terminal, wherein the verification information comprises the current Internet protocol address, the first receiving time of the received access request and the identification encryption information of the access initiating terminal;
step S503, the secret key generation terminal converts the verification information according to a preset conversion rule to obtain secret key information;
step S504, the secret key generating terminal sends the secret key information to the accessed terminal;
step S505, the accessed terminal reversely converts the secret key information according to a reverse conversion rule corresponding to the conversion rule;
step S506, the accessed terminal judges whether the identification encryption information is matched with the preset encryption information; if not, executing step S507; if yes, go to step S508;
step S507, returning a response identifying the illegal encryption information to the access initiating terminal;
step S508, the accessed terminal obtains a second receiving time when the key information is received, and calculates whether a time difference between the second receiving time and the first receiving time is less than a preset threshold; if not, go to step S509; if yes, go to step S510;
step S509, returning a response with illegal reception time to the access initiating terminal;
step S510, the accessed terminal judges whether the current Internet protocol address is matched with the Internet protocol address requested to be accessed; if not, executing step S511; if yes, go to step S512;
step S511, returning the response that the current Internet protocol address is illegal to the access initiating terminal;
and step S512, judging that the verification information meets the preset condition, and allowing access.
In the above example, when receiving an access request sent by an access initiating terminal, a key generating terminal obtains check information of the access initiating terminal, then converts the check information according to a preset conversion rule to obtain key information, sends the key information to an accessed terminal, and the accessed terminal performs inverse conversion on the key information according to an inverse conversion rule corresponding to the conversion rule and verifies the check information obtained by the inverse conversion, so as to allow the access initiating terminal to access when the check information meets a preset condition.
The embodiment of the present disclosure provides a processing apparatus for checking information, and as shown in fig. 6, the processing apparatus 60 for checking information may include: a first receiving module 601, a converting module 602 and a first checking module 603, wherein,
a first receiving module 601, configured to receive an access request sent by an access initiating terminal, and obtain verification information of the access initiating terminal based on the access request;
the conversion module 602 is configured to convert the verification information according to a preset conversion rule to obtain key information, and send the key information to the accessed terminal;
the first checking module 603 is configured to, where the accessed terminal is configured to perform inverse transformation on the key information according to an inverse transformation rule corresponding to the transformation rule, and check the verification information obtained through the inverse transformation, so as to allow the access initiating terminal to access when the verification information meets a preset condition.
According to the processing device for the verification information, when an access request sent by an access initiating terminal is received, the verification information of the access initiating terminal is obtained, the verification information is converted according to a preset conversion rule to obtain the secret key information, the secret key information is sent to an accessed terminal, the accessed terminal performs reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule, the verification information obtained through the reverse conversion is verified, the access initiating terminal is allowed to access when the verification information meets a preset condition, multiple groups of different secret key information can be generated aiming at different access initiating terminals, and the safety can be effectively improved.
The embodiment of the present disclosure provides a possible implementation manner, where the verification information includes at least one of a current internet protocol address of the access initiating terminal, a first receiving time of receiving the access request, and identification encryption information of the access initiating terminal; the identification encryption information is used for representing the identity of the access initiating terminal.
The embodiment of the present disclosure provides a possible implementation manner, where the verification information includes identification encryption information; the processing device 60 for verifying information further includes:
and the query module is used for acquiring the terminal identification information of the access initiating terminal and querying the identification encryption information corresponding to the terminal identification information.
The embodiment of the present disclosure provides a possible implementation manner, where the verification information includes a current internet protocol address, a first receiving time, and identification encryption information; when the first checking module 603 checks the checking information obtained by the inverse conversion, it is specifically configured to:
matching the identification encryption information with preset encryption information;
if the identification encryption information is matched with the preset encryption information, second receiving time of the accessed terminal for receiving the secret key information is obtained, and a time difference value between the second receiving time and the first receiving time is calculated;
if the time difference is smaller than the preset threshold value, matching the current internet protocol address with the internet protocol address requested to be accessed by the access request;
and if the current internet protocol address is matched with the internet protocol address requested to be accessed, judging that the verification information meets the preset condition.
The embodiment of the present disclosure provides a processing apparatus 70 for checking information, which includes a second receiving module 701, a reverse conversion module 702, and a second checking module 703, wherein,
a second receiving module 701, configured to receive key information sent by a key generation terminal; the secret key information is obtained by converting the verification information according to a preset conversion rule; the verification information is acquired from the access initiating terminal by the secret key generating terminal based on the access request sent by the access initiating terminal;
an inverse transformation module 702, configured to perform inverse transformation on the key information according to an inverse transformation rule corresponding to the transformation rule;
the second checking module 703 is configured to check the check information obtained by the inverse conversion, and allow the access initiating terminal to access if the check information meets a preset condition.
The embodiment of the present disclosure provides a possible implementation manner, where the check information includes at least one of a current internet protocol address of the access initiating terminal, first receiving time when the key generating terminal receives an access request sent by the access initiating terminal, and identifier encryption information of the access initiating terminal; the identification encryption information is used for representing the identity of the access initiating terminal.
The embodiment of the present disclosure provides a possible implementation manner, where the verification information includes a current internet protocol address, a first receiving time, and identification encryption information; when the second check module 703 checks the check information obtained by the inverse conversion, it is specifically configured to:
matching the identification encryption information with preset encryption information;
if the identification encryption information is matched with the preset encryption information, second receiving time for receiving the secret key information is obtained, and a time difference value between the second receiving time and the first receiving time is calculated;
if the time difference is smaller than the preset threshold value, matching the current internet protocol address with the internet protocol address requested to be accessed by the access request;
and if the current internet protocol address is matched with the internet protocol address requested to be accessed, judging that the verification information meets the preset condition.
The embodiment of the present disclosure provides a processing apparatus 80 for checking information, which includes a third receiving module 801, a sending module 802, and a third checking module 803, wherein,
a third receiving module 801, configured to enable the access initiating terminal to send an access request to the key generating terminal, where the key generating terminal obtains, based on the access request, verification information of the access initiating terminal;
a sending module 802, configured to enable the key generation terminal to convert the verification information according to a preset conversion rule to obtain key information, and send the key information to the accessed terminal;
a third verification module 803, configured to enable the accessed terminal to perform inverse transformation on the key information according to an inverse transformation rule corresponding to the transformation rule, and verify the verification information obtained through the inverse transformation; and if the verification information meets the preset condition, allowing the access initiating terminal to access.
The processing device for processing check information according to the embodiments of the present disclosure may execute the processing method for check information provided by the embodiments of the present disclosure, and the implementation principles thereof are similar, the actions performed by each module in the processing device for check information according to the embodiments of the present disclosure correspond to the steps in the processing method for check information according to the embodiments of the present disclosure, and for the detailed function description of each module of the processing device for processing check information of a picture, reference may be specifically made to the description in the processing method for corresponding check information shown in the foregoing, and details are not repeated here.
Referring now to FIG. 9, shown is a schematic diagram of an electronic device 900 suitable for use in implementing embodiments of the present disclosure. The electronic devices in the embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., car navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 9 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
The electronic device includes: a memory and a processor, wherein the processor herein may be referred to as the processing device 901 below, and the memory may include at least one of a Read Only Memory (ROM)902, a Random Access Memory (RAM)903 and a storage device 908 below, which are specifically shown as follows:
as shown in fig. 9, the electronic device 900 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 901 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)902 or a program loaded from a storage means 908 into a Random Access Memory (RAM) 903. In the RAM 903, various programs and data necessary for the operation of the electronic apparatus 900 are also stored. The processing apparatus 901, the ROM 902, and the RAM 903 are connected to each other through a bus 904. An input/output (I/O) interface 905 is also connected to bus 904.
Generally, the following devices may be connected to the I/O interface 905: input devices 906 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 907 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 908 including, for example, magnetic tape, hard disk, etc.; and a communication device 909. The communication device 909 may allow the electronic apparatus 900 to perform wireless or wired communication with other apparatuses to exchange data. While fig. 9 illustrates an electronic device 900 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication device 909, or installed from the storage device 908, or installed from the ROM 902. The computer program performs the above-described functions defined in the methods of the embodiments of the present disclosure when executed by the processing apparatus 901.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to:
receiving an access request sent by an access initiating terminal, and acquiring verification information of the access initiating terminal based on the access request;
converting the verification information according to a preset conversion rule to obtain secret key information, and sending the secret key information to the accessed terminal;
the accessed terminal is used for performing reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule, and verifying the verification information obtained through the reverse conversion so as to allow the access initiating terminal to access when the verification information meets a preset condition.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules or units described in the embodiments of the present disclosure may be implemented by software or hardware. The name of a module or a unit does not in some cases form a limitation of the unit itself, and for example, a conversion module may also be described as a "module that converts check information".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
According to one or more embodiments of the present disclosure, there is provided a processing method of checking information, including:
receiving an access request sent by an access initiating terminal, and acquiring verification information of the access initiating terminal based on the access request;
converting the verification information according to a preset conversion rule to obtain secret key information, and sending the secret key information to the accessed terminal;
the accessed terminal is used for performing reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule, and verifying the verification information obtained through the reverse conversion so as to allow the access initiating terminal to access when the verification information meets a preset condition.
According to one or more embodiments of the present disclosure, the verification information includes at least one of a current internet protocol address of the access origination terminal, a first reception time at which the access request is received, and identification encryption information of the access origination terminal; the identification encryption information is used for representing the identity of the access initiating terminal.
According to one or more embodiments of the present disclosure, the verification information includes identification encryption information;
before the step of obtaining the verification information of the access initiating terminal based on the access request, the method further comprises the following steps:
and acquiring the terminal identification information of the access initiating terminal, and inquiring identification encryption information corresponding to the terminal identification information.
According to one or more embodiments of the present disclosure, the verification information includes a current internet protocol address, a first reception time, and identification encryption information; the step of verifying the verification information obtained by the inverse conversion comprises the following steps:
matching the identification encryption information with preset encryption information;
if the identification encryption information is matched with the preset encryption information, second receiving time of the accessed terminal for receiving the secret key information is obtained, and a time difference value between the second receiving time and the first receiving time is calculated;
if the time difference is smaller than the preset threshold value, matching the current internet protocol address with the internet protocol address requested to be accessed by the access request;
and if the current internet protocol address is matched with the internet protocol address requested to be accessed, judging that the verification information meets the preset condition.
According to one or more embodiments of the present disclosure, there is provided a processing method of checking information, including:
receiving key information sent by a key generation terminal; the secret key information is obtained by converting the verification information according to a preset conversion rule; the verification information is acquired from the access initiating terminal by the secret key generating terminal based on the access request sent by the access initiating terminal;
according to the reverse conversion rule corresponding to the conversion rule, the secret key information is reversely converted;
and verifying the verification information obtained by the reverse conversion, and if the verification information meets the preset condition, allowing the access initiating terminal to access.
According to one or more embodiments of the present disclosure, the verification information includes at least one of a current internet protocol address of the access initiating terminal, a first receiving time when the key generating terminal receives an access request sent by the access initiating terminal, and identification encryption information of the access initiating terminal; the identification encryption information is used for representing the identity of the access initiating terminal.
According to one or more embodiments of the present disclosure, the verification information includes a current internet protocol address, a first reception time, and identification encryption information; the step of verifying the verification information obtained by the inverse conversion comprises the following steps:
matching the identification encryption information with preset encryption information;
if the identification encryption information is matched with the preset encryption information, second receiving time for receiving the secret key information is obtained, and a time difference value between the second receiving time and the first receiving time is calculated;
if the time difference is smaller than the preset threshold value, matching the current internet protocol address with the internet protocol address requested to be accessed by the access request;
and if the current internet protocol address is matched with the internet protocol address requested to be accessed, judging that the verification information meets the preset condition.
According to one or more embodiments of the present disclosure, there is provided a processing method of checking information, including:
the access initiating terminal sends an access request to the secret key generating terminal, and the secret key generating terminal acquires the verification information of the access initiating terminal based on the access request;
the secret key generating terminal converts the verification information according to a preset conversion rule to obtain secret key information, and sends the secret key information to the accessed terminal;
the accessed terminal carries out reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule, and verifies the verification information obtained by the reverse conversion; and if the verification information meets the preset condition, allowing the access initiating terminal to access.
According to one or more embodiments of the present disclosure, there is provided a processing apparatus for verifying information, including:
the first receiving module is used for receiving an access request sent by an access initiating terminal and acquiring verification information of the access initiating terminal based on the access request;
the conversion module is used for converting the verification information according to a preset conversion rule to obtain secret key information and sending the secret key information to the accessed terminal;
and the accessed terminal is used for performing reverse conversion on the key information according to a reverse conversion rule corresponding to the conversion rule, and verifying the verification information obtained through the reverse conversion so as to allow the access initiating terminal to access when the verification information meets a preset condition.
According to one or more embodiments of the present disclosure, there is provided a processing apparatus for verifying information, including:
the second receiving module is used for receiving the key information sent by the key generation terminal; the secret key information is obtained by converting the verification information according to a preset conversion rule; the verification information is acquired from the access initiating terminal by the secret key generating terminal based on the access request sent by the access initiating terminal;
the reverse conversion module is used for performing reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule;
and the second check module is used for checking the check information obtained by the reverse conversion, and allowing the access initiating terminal to access if the check information meets the preset condition.
According to one or more embodiments of the present disclosure, there is provided a processing apparatus for verifying information, including:
the third receiving module is used for enabling the access initiating terminal to send the access request to the secret key generating terminal, and the secret key generating terminal obtains the verification information of the access initiating terminal based on the access request;
the sending module is used for converting the verification information by the secret key generating terminal according to a preset conversion rule to obtain secret key information and sending the secret key information to the accessed terminal;
the third verification module is used for enabling the accessed terminal to perform reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule and verify the verification information obtained through the reverse conversion; and if the verification information meets the preset condition, allowing the access initiating terminal to access.
According to one or more embodiments of the present disclosure, there is provided an electronic device including:
one or more processors;
a memory;
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the method of processing the verification information according to any of the above embodiments is performed.
According to one or more embodiments of the present disclosure, there is provided a computer-readable medium on which a computer program is stored, the program, when executed by a processor, implementing the method of processing verification information of any of the above-described embodiments.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (11)

1. A processing method of check information is applied to a key generation terminal, and is characterized by comprising the following steps:
receiving an access request sent by an access initiating terminal, and acquiring verification information of the access initiating terminal based on the access request;
converting the verification information according to a preset conversion rule to obtain secret key information, and sending the secret key information to an accessed terminal;
the accessed terminal is used for performing reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule, and verifying verification information obtained through the reverse conversion so as to allow the access initiating terminal to access when the verification information meets a preset condition;
wherein, the checking information obtained by the inverse conversion comprises:
matching the identification encryption information with preset encryption information;
if the identification encryption information is matched with the preset encryption information, second receiving time of the accessed terminal for receiving the key information is obtained, and a time difference value between the second receiving time and the first receiving time is calculated;
if the time difference is smaller than a preset threshold value, matching the current internet protocol address with the internet protocol address requested to be accessed by the access request;
if the current internet protocol address is matched with the internet protocol address requested to be accessed, judging that the verification information meets the preset condition;
the identifier encryption information is determined by the key generation terminal according to the cluster information or the terminal service type of the access initiating terminal, and the first receiving time is the time when the key generation terminal receives the access request.
2. The method for processing verification information according to claim 1, wherein the verification information includes at least one of a current internet protocol address of the access initiating terminal, a first receiving time when the access request is received, and identification encryption information of the access initiating terminal; the identification encryption information is used for representing the identity of the access initiating terminal.
3. The processing method of the verification information according to claim 2, wherein the verification information includes the identification encryption information;
before the step of obtaining the verification information of the access initiating terminal based on the access request, the method further includes:
and acquiring the terminal identification information of the access initiating terminal, and inquiring the identification encryption information corresponding to the terminal identification information.
4. A processing method for checking information is applied to an accessed terminal, and is characterized in that the method comprises the following steps:
receiving key information sent by a key generation terminal; the key information is obtained by converting the verification information according to a preset conversion rule; the verification information is acquired from the access initiating terminal by the secret key generating terminal based on an access request sent by the access initiating terminal;
according to a reverse conversion rule corresponding to the conversion rule, performing reverse conversion on the secret key information;
verifying the verification information obtained by the reverse conversion, and allowing the access initiating terminal to access if the verification information meets a preset condition;
wherein, the checking information obtained by the inverse conversion comprises:
matching the identification encryption information with preset encryption information;
if the identification encryption information is matched with the preset encryption information, second receiving time of the accessed terminal for receiving the key information is obtained, and a time difference value between the second receiving time and the first receiving time is calculated;
if the time difference is smaller than a preset threshold value, matching the current internet protocol address with the internet protocol address requested to be accessed by the access request;
if the current internet protocol address is matched with the internet protocol address requested to be accessed, judging that the verification information meets the preset condition;
the identifier encryption information is determined by the key generation terminal according to the cluster information or the terminal service type of the access initiating terminal, and the first receiving time is the time when the key generation terminal receives the access request.
5. The method for processing verification information according to claim 4, wherein the verification information includes at least one of a current internet protocol address of the access initiating terminal, a first receiving time at which the key generating terminal receives the access request sent by the access initiating terminal, and identification encryption information of the access initiating terminal; the identification encryption information is used for representing the identity of the access initiating terminal.
6. A processing method for checking information is characterized by comprising the following steps:
the method comprises the steps that an access initiating terminal sends an access request to a secret key generating terminal, and the secret key generating terminal obtains verification information of the access initiating terminal based on the access request;
the secret key generation terminal converts the verification information according to a preset conversion rule to obtain secret key information, and sends the secret key information to the accessed terminal;
the accessed terminal carries out reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule, and verifies the verification information obtained by the reverse conversion; if the verification information meets the preset condition, allowing the access initiating terminal to access;
wherein, the checking information obtained by the inverse conversion comprises:
matching the identification encryption information with preset encryption information;
if the identification encryption information is matched with the preset encryption information, second receiving time of the accessed terminal for receiving the key information is obtained, and a time difference value between the second receiving time and the first receiving time is calculated;
if the time difference is smaller than a preset threshold value, matching the current internet protocol address with the internet protocol address requested to be accessed by the access request;
if the current internet protocol address is matched with the internet protocol address requested to be accessed, judging that the verification information meets the preset condition;
the identifier encryption information is determined by the key generation terminal according to the cluster information or the terminal service type of the access initiating terminal, and the first receiving time is the time when the key generation terminal receives the access request.
7. A processing apparatus for verifying information, comprising:
the first receiving module is used for receiving an access request sent by an access initiating terminal and acquiring verification information of the access initiating terminal based on the access request;
the conversion module is used for converting the verification information according to a preset conversion rule to obtain key information and sending the key information to the accessed terminal;
the accessed terminal is used for performing reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule, and verifying verification information obtained through the reverse conversion so as to allow the access initiating terminal to access when the verification information meets a preset condition;
wherein, the checking information obtained by the inverse conversion comprises:
matching the identification encryption information with preset encryption information;
if the identification encryption information is matched with the preset encryption information, second receiving time of the accessed terminal for receiving the key information is obtained, and a time difference value between the second receiving time and the first receiving time is calculated;
if the time difference is smaller than a preset threshold value, matching the current internet protocol address with the internet protocol address requested to be accessed by the access request;
if the current internet protocol address is matched with the internet protocol address requested to be accessed, judging that the verification information meets the preset condition;
the identifier encryption information is determined by a key generation terminal according to cluster information or a terminal service type of an access initiating terminal, and the first receiving time is the time when the key generation terminal receives the access request.
8. A processing apparatus for verifying information of a visited terminal, comprising:
the second receiving module is used for receiving the key information sent by the key generation terminal; the key information is obtained by converting the verification information according to a preset conversion rule; the verification information is acquired from the access initiating terminal by the secret key generating terminal based on an access request sent by the access initiating terminal;
the reverse conversion module is used for performing reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule;
the first verification module is used for verifying the verification information obtained by the inverse conversion, and if the verification information meets the preset condition, the access initiating terminal is allowed to access;
wherein, the checking information obtained by the inverse conversion comprises:
matching the identification encryption information with preset encryption information;
if the identification encryption information is matched with the preset encryption information, second receiving time of the accessed terminal for receiving the key information is obtained, and a time difference value between the second receiving time and the first receiving time is calculated;
if the time difference is smaller than a preset threshold value, matching the current internet protocol address with the internet protocol address requested to be accessed by the access request;
if the current internet protocol address is matched with the internet protocol address requested to be accessed, judging that the verification information meets the preset condition;
the identifier encryption information is determined by the key generation terminal according to the cluster information or the terminal service type of the access initiating terminal, and the first receiving time is the time when the key generation terminal receives the access request.
9. A processing apparatus for verifying information, comprising:
a third receiving module, configured to enable an access initiating terminal to send an access request to a key generating terminal, where the key generating terminal obtains verification information of the access initiating terminal based on the access request;
the sending module is used for converting the verification information by the secret key generating terminal according to a preset conversion rule to obtain secret key information and sending the secret key information to the accessed terminal;
the second check module is used for enabling the accessed terminal to perform reverse conversion on the secret key information according to a reverse conversion rule corresponding to the conversion rule and check the check information obtained through the reverse conversion; if the verification information meets the preset condition, allowing the access initiating terminal to access;
wherein, the checking information obtained by the inverse conversion comprises:
matching the identification encryption information with preset encryption information;
if the identification encryption information is matched with the preset encryption information, second receiving time of the accessed terminal for receiving the key information is obtained, and a time difference value between the second receiving time and the first receiving time is calculated;
if the time difference is smaller than a preset threshold value, matching the current internet protocol address with the internet protocol address requested to be accessed by the access request;
if the current internet protocol address is matched with the internet protocol address requested to be accessed, judging that the verification information meets the preset condition;
the identifier encryption information is determined by the key generation terminal according to the cluster information or the terminal service type of the access initiating terminal, and the first receiving time is the time when the key generation terminal receives the access request.
10. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: -executing the processing method of the verification information according to any of claims 1-6.
11. A computer-readable medium, on which a computer program is stored, which program, when being executed by a processor, is adapted to carry out the method of processing verification information according to any one of claims 1 to 6.
CN201911052650.XA 2019-10-31 2019-10-31 Processing method and device of verification information, electronic equipment and computer readable medium Active CN110807202B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911052650.XA CN110807202B (en) 2019-10-31 2019-10-31 Processing method and device of verification information, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911052650.XA CN110807202B (en) 2019-10-31 2019-10-31 Processing method and device of verification information, electronic equipment and computer readable medium

Publications (2)

Publication Number Publication Date
CN110807202A CN110807202A (en) 2020-02-18
CN110807202B true CN110807202B (en) 2022-03-18

Family

ID=69489798

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911052650.XA Active CN110807202B (en) 2019-10-31 2019-10-31 Processing method and device of verification information, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN110807202B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8538015B2 (en) * 2007-03-28 2013-09-17 Intel Corporation Flexible architecture and instruction for advanced encryption standard (AES)
JP5276940B2 (en) * 2008-09-19 2013-08-28 日立オートモティブシステムズ株式会社 Center device, terminal device, and authentication system
CN107566323B (en) * 2016-06-30 2020-11-20 北京金山安全软件有限公司 Application system login method and device
CN109587097A (en) * 2017-09-29 2019-04-05 阿里巴巴集团控股有限公司 A kind of system, method and apparatus for realizing secure access internal network

Also Published As

Publication number Publication date
CN110807202A (en) 2020-02-18

Similar Documents

Publication Publication Date Title
CN111639319B (en) User resource authorization method, device and computer readable storage medium
CN112866385B (en) Interface calling method and device, electronic equipment and storage medium
CN110555300A (en) application program authorization method, client, server, terminal device and medium
CN111209306A (en) Business logic judgment method and device, electronic equipment and storage medium
CN111199037A (en) Login method, system and device
CN110781373A (en) List updating method and device, readable medium and electronic equipment
CN112968871B (en) Login method and device of application program, readable medium and electronic equipment
CN112329044A (en) Information acquisition method and device, electronic equipment and computer readable medium
CN110719499B (en) Video downloading method, system, medium and electronic device
CN111798251A (en) Verification method and device of house source data and electronic equipment
CN110807202B (en) Processing method and device of verification information, electronic equipment and computer readable medium
CN116502189A (en) Software authorization method, system, device and storage medium
CN114780124A (en) Differential upgrading method, device, medium and electronic equipment
CN111460020B (en) Method, device, electronic equipment and medium for resolving message
CN114640533A (en) Method, device, storage medium and electronic equipment for transmitting messages
CN115801686A (en) Service request processing method, device, equipment and storage medium
CN111897620A (en) Interaction method and device and electronic equipment
CN113890772A (en) Information processing method and device and electronic equipment
CN111752625A (en) Method and device for interface mock
CN107466038B (en) Authentication method and device
CN111680754A (en) Image classification method and device, electronic equipment and computer-readable storage medium
CN110781523A (en) Method and apparatus for processing information
CN111625707B (en) Recommendation response method, device, medium and equipment
CN111314320B (en) Communication method, terminal, server and system based on HTTP
CN112261659B (en) Control method and device for terminal and server, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee after: Tiktok vision (Beijing) Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee before: BEIJING BYTEDANCE NETWORK TECHNOLOGY Co.,Ltd.

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee after: Douyin Vision Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee before: Tiktok vision (Beijing) Co.,Ltd.

CP01 Change in the name or title of a patent holder