CN111709803B - Method and system for preventing unauthorized business handling - Google Patents
Method and system for preventing unauthorized business handling Download PDFInfo
- Publication number
- CN111709803B CN111709803B CN202010536534.1A CN202010536534A CN111709803B CN 111709803 B CN111709803 B CN 111709803B CN 202010536534 A CN202010536534 A CN 202010536534A CN 111709803 B CN111709803 B CN 111709803B
- Authority
- CN
- China
- Prior art keywords
- information
- override
- service
- check
- acceptance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000012795 verification Methods 0.000 claims abstract description 97
- 238000012216 screening Methods 0.000 claims description 6
- 230000009286 beneficial effect Effects 0.000 description 3
- RWSOTUBLDIXVET-UHFFFAOYSA-N Dihydrogen sulfide Chemical compound S RWSOTUBLDIXVET-UHFFFAOYSA-N 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
-
- G06Q50/60—
Abstract
The invention relates to a method and a system for preventing unauthorized business handling, comprising the steps that a client sends business acceptance information and business acceptance ID corresponding to a processed business order to a server; the server determines the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, and sends the override verification information to the client after storing the override verification information in the override verification table; when a client submits a service order, inquiring an override check table according to override check information to obtain first check information and a service acceptance ID, and sending the first check information and the service acceptance ID to a server; the server side inquires an override check table according to the service acceptance ID to obtain second check information, and determines whether the service order passes the override check according to the comparison result of the first check information and the second check information. The invention provides a method for preventing unauthorized attacks, which can prevent unauthorized attacks without depending on encryption and decryption.
Description
Technical Field
The invention relates to the technical field of telecommunication service, in particular to a method and a system for preventing unauthorized business handling.
Background
The CRM system in the telecom industry is a relatively complex IT support system in China, and has the characteristics and needs in the aspect of safety protection.
In the current telecom CRM system, the background of the traditional staff acceptance page and order center is in the enterprise private network of the telecom system, and the technical means such as message encryption and the like are not adopted in the current foreground and background data transmission. Some agent partners are also connected to the private network of the telecommunications enterprise through VPN, and business acceptance pages are also available to the agent's staff. Under the specific background, once a malicious technician intercepts an order creation message of an order center, the purpose of illegally transacting business can be achieved by calling an order creation service of the order center through a malicious program by a technical means of modifying parameters.
Disclosure of Invention
The invention aims to solve the technical problem of providing a method and a system for preventing unauthorized business handling aiming at the defects of the prior art.
The technical scheme for solving the technical problems is as follows:
a method of preventing unauthorized transactions, the method comprising:
the client sends the service acceptance information and the service acceptance ID corresponding to the processed service order to the server;
the server determines override verification information according to the service acceptance information, the service acceptance ID and an override verification rule base, stores the override verification information into an override verification table, and then sends the override verification information to the client;
when the client submits the service order, inquiring the override check table according to the override check information to obtain first check information and the service acceptance ID, and sending the first check information and the service acceptance ID to a server;
and the server side inquires the override check table according to the service acceptance ID to obtain second check information, and determines whether the service order passes the override check according to the comparison result of the first check information and the second check information.
The beneficial effects of the invention are as follows: the method for preventing the unauthorized handling of the business comprises the steps that a client sends business acceptance information and business acceptance ID corresponding to a processed business order to a server, and the server determines unauthorized verification information according to the business acceptance information, the business acceptance ID and an unauthorized verification rule base, stores the unauthorized verification information into an unauthorized verification table and then sends the unauthorized verification information to the client; when a client submits a service order, inquiring an override check table according to override check information to obtain first check information and a service acceptance ID, and sending the first check information and the service acceptance ID to a server; the server side inquires an override check table according to the service acceptance ID to obtain second check information, and determines whether the service order passes the override check according to the comparison result of the first check information and the second check information. The invention provides a method for preventing unauthorized attacks, which can prevent unauthorized attacks without depending on encryption and decryption.
On the basis of the technical scheme, the invention can be improved as follows.
Further, the server determines override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, and specifically includes:
inquiring the override check rule base according to the service acceptance information, and determining an override check rule;
screening out pre-override verification information from the service acceptance information according to the override verification rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
The beneficial effects of adopting the further scheme are as follows: and determining the override verification information according to the service acceptance information, so that the override verification information can be flexibly customized, and the override attack prevention capability is improved.
Further, the server determines whether the service order passes the override check according to the comparison result of the first check information and the second check information, and specifically includes:
the server compares the first check information with the second check information;
when the first check information is consistent with the second check information, determining that the service order passes the override proof check;
otherwise, the service order fails the anti-override verification.
Further, before the client sends the service acceptance information and the service acceptance ID to the server, the method further includes:
and the client acquires service acceptance information corresponding to the service order and generates a service acceptance ID according to the service acceptance information.
Further, the service acceptance information includes staff information for handling the service order, customer information, and information of the service order.
The other technical scheme for solving the technical problems is as follows:
a system for preventing unauthorized business handling comprises a client and a server,
the client is used for sending the service acceptance information and the service acceptance ID corresponding to the processed service order to the server;
the server side is used for determining the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, storing the override verification information into an override verification table and then sending the override verification information to the client side;
the client is used for inquiring the override check table according to the override check information when submitting the service order, obtaining first check information and the service acceptance ID, and sending the first check information and the service acceptance ID to the server;
the server is used for inquiring the override check table according to the service acceptance ID to obtain second check information, and determining whether the service order passes the override check according to the comparison result of the first check information and the second check information.
The beneficial effects of the invention are as follows: the system for preventing the override handling of the business comprises a client, a server and a client, wherein the client is used for sending business acceptance information and business acceptance ID corresponding to a processed business order to the server, and the server determines override verification information according to the business acceptance information, the business acceptance ID and an override verification rule base, saves the override verification information to an override verification table and then sends the override verification information to the client; when a client submits a service order, inquiring an override check table according to override check information to obtain first check information and a service acceptance ID, and sending the first check information and the service acceptance ID to a server; the server side inquires an override check table according to the service acceptance ID to obtain second check information, and determines whether the service order passes the override check according to the comparison result of the first check information and the second check information. The invention provides a system for preventing unauthorized attacks, which can prevent unauthorized attacks without depending on encryption and decryption.
On the basis of the technical scheme, the invention can be improved as follows.
Further, the server is specifically configured to query the override check rule base according to the service acceptance information, and determine an override check rule;
screening out pre-override verification information from the service acceptance information according to the override verification rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
Further, the server is specifically configured to compare the first verification information with the second verification information;
when the first check information is consistent with the second check information, determining that the service order passes the override proof check;
otherwise, the service order fails the anti-override verification.
Further, the client order is further configured to obtain service acceptance information corresponding to the service order, and generate a service acceptance ID according to the service acceptance information.
Further, the service acceptance information includes staff information for handling the service order, customer information, and information of the service order.
Additional aspects of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the following description will briefly explain the embodiments of the present invention or the drawings used in the description of the prior art, and it is obvious that the drawings described below are only some embodiments of the present invention, and other drawings can be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a method for preventing unauthorized business handling according to an embodiment of the invention;
fig. 2 is a schematic diagram of a system for preventing unauthorized business handling according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
As shown in a flow chart of a method for preventing unauthorized business according to an embodiment of the present invention in fig. 1, a method for preventing unauthorized business includes the following steps:
110. and the client sends the service acceptance information and the service acceptance ID corresponding to the processed service order to the server.
120. And the server determines the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, stores the override verification information in the override verification table, and then sends the override verification information to the client.
130. When the client submits a service order, the override check list is queried according to the override check information to obtain first check information and a service acceptance ID, and the first check information and the service acceptance ID are sent to the server.
140. The server side inquires an override check table according to the service acceptance ID to obtain second check information, and determines whether the service order passes the override check according to the comparison result of the first check information and the second check information.
It should be appreciated that the client may be a terminal or other device for personnel in the business hall, and the server may be a server configured with an order center, where the override list may be stored in a database, either as a separate database server or as a database in the order center server.
The method for preventing the override handling of the business provided by the embodiment comprises the steps that a client sends business acceptance information and business acceptance ID corresponding to a processed business order to a server, and the server determines override verification information according to the business acceptance information, the business acceptance ID and an override verification rule base, saves the override verification information to an override verification table and then sends the override verification information to the client; when a client submits a service order, inquiring an override check table according to override check information to obtain first check information and a service acceptance ID, and sending the first check information and the service acceptance ID to a server; the server side inquires an override check table according to the service acceptance ID to obtain second check information, and determines whether the service order passes the override check according to the comparison result of the first check information and the second check information. The invention provides a method for preventing unauthorized attacks, which can prevent unauthorized attacks without depending on encryption and decryption.
Further, the server determines override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, and specifically includes:
inquiring the override check rule base according to the service acceptance information, and determining an override check rule;
screening out pre-override verification information from the service acceptance information according to the override verification rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
Further, the server determines whether the service order passes the override check according to the comparison result of the first check information and the second check information, and specifically includes:
the server compares the first check information with the second check information;
when the first check information is consistent with the second check information, determining that the service order passes the override proof check;
otherwise, the service order fails the anti-override verification.
Further, before the client sends the service acceptance information and the service acceptance ID to the server, the method further includes:
and the client acquires service acceptance information corresponding to the service order and generates a service acceptance ID according to the service acceptance information.
Further, the service acceptance information includes staff information for handling the service order, customer information, and information of the service order.
It should be appreciated that, for example, when a customer needs to transact a service, a worker logs in to a telecommunications CRM acceptance page, inputs a cell phone number to transact the service, obtains service acceptance information, and generates a service acceptance ID based on the service acceptance information, the service acceptance ID being a unique identification of the service order, and communicates the service acceptance information to the order center. The service acceptance information includes basic information of staff and user information for service handling. The order center reads the override verification rule from the database, and records the service acceptance ID and selected part of information in the service acceptance information according to the override verification rule to form override verification information, wherein the selection of the service acceptance information part of information depends on the override verification rule, and the information selected by different rules is different.
When the staff completes filling the information required by the business handling, and submits the order, the override check list is inquired according to the override check information to obtain first check information and business acceptance ID, and the first check information, the business acceptance ID and the business order information are sent to the order center.
The order center analyzes the first check information and the service acceptance ID, then queries the override check list through the service acceptance ID to obtain second check information, compares the first check information with the second check information, if the data are consistent, the override check is passed, an order can be generated to accept the service, and if the data are inconsistent or the data are not queried from the list, the override check is failed, and the order creation is not performed. The override rules table may be stored in an order center or other storage device, and contains fields including "business acceptance ID", "business code", and "rules details". The granularity of the anti-override verification can be controlled through a service code field, and the validation and invalidation rules of the anti-override can be controlled through a switch.
As shown in fig. 2, which is a block diagram of a system for preventing unauthorized business according to an embodiment of the present invention, a system for preventing unauthorized business includes a client and a server,
the client is used for sending the service acceptance information and the service acceptance ID corresponding to the processed service order to the server;
the server side is used for determining the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, storing the override verification information into an override verification table and then sending the override verification information to the client side;
the client is used for inquiring the override check table according to the override check information when submitting the service order, obtaining first check information and the service acceptance ID, and sending the first check information and the service acceptance ID to the server;
the server is used for inquiring the override check table according to the service acceptance ID to obtain second check information, and determining whether the service order passes the override check according to the comparison result of the first check information and the second check information.
Further, the server is specifically configured to query the override check rule base according to the service acceptance information, and determine an override check rule;
screening out pre-override verification information from the service acceptance information according to the override verification rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
Further, the server is specifically configured to compare the first verification information with the second verification information;
when the first check information is consistent with the second check information, determining that the service order passes the override proof check;
otherwise, the service order fails the anti-override verification.
Further, the client order is further configured to obtain service acceptance information corresponding to the service order, and generate a service acceptance ID according to the service acceptance information.
Further, the service acceptance information includes staff information for handling the service order, customer information, and information of the service order.
The present invention is not limited to the above embodiments, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the present invention, and these modifications and substitutions are intended to be included in the scope of the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.
Claims (8)
1. A method for preventing unauthorized transactions, the method comprising:
the client sends the service acceptance information and the service acceptance ID corresponding to the processed service order to the server;
the server determines override verification information according to the service acceptance information, the service acceptance ID and an override verification rule base, stores the override verification information into an override verification table, and then sends the override verification information to the client;
when the client submits the service order, the client queries the override check table according to override check information corresponding to the service order to obtain first check information and a service acceptance ID corresponding to the service order, and sends the first check information and the service acceptance ID corresponding to the service order to a server;
the server side inquires the override check table according to the service acceptance ID corresponding to the service order to obtain second check information, and determines whether the service order passes the override check according to the comparison result of the first check information and the second check information;
the server determines whether the service order passes the override check according to the comparison result of the first check information and the second check information, and specifically comprises the following steps:
the server compares the first check information with the second check information;
when the first check information is consistent with the second check information, determining that the service order passes the override proof check;
otherwise, the service order fails the anti-override verification.
2. The method for preventing unauthorized business according to claim 1, wherein the server determines unauthorized verification information according to the business acceptance information, the business acceptance ID and an unauthorized verification rule base, and specifically comprises:
inquiring the override check rule base according to the service acceptance information, and determining an override check rule;
screening out pre-override verification information from the service acceptance information according to the override verification rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
3. The method for preventing unauthorized transactions according to claim 1, wherein before the client sends the service acceptance information and the service acceptance ID to the server, the method further comprises:
and the client acquires service acceptance information corresponding to the service order and generates a service acceptance ID according to the service acceptance information.
4. A method of preventing unauthorized handling of a service according to any of claims 1-3, characterized in that the service acceptance information comprises staff information handling the service order, customer information and information of the service order.
5. A system for preventing unauthorized business handling is characterized by comprising a client and a server,
the client is used for sending the service acceptance information and the service acceptance ID corresponding to the processed service order to the server;
the server side is used for determining the override verification information according to the service acceptance information, the service acceptance ID and the override verification rule base, storing the override verification information into an override verification table and then sending the override verification information to the client side;
the client is used for inquiring the override check table according to override check information corresponding to the service order when submitting the service order, obtaining first check information and a service acceptance ID corresponding to the service order, and sending the first check information and the service acceptance ID corresponding to the service order to the server;
the server is used for inquiring the override check table according to the service acceptance ID corresponding to the service order to obtain second check information, and determining whether the service order passes the override check according to the comparison result of the first check information and the second check information;
the server is specifically configured to compare the first check information with the second check information;
when the first check information is consistent with the second check information, determining that the service order passes the override proof check;
otherwise, the service order fails the anti-override verification.
6. The system for preventing unauthorized transactions according to claim 5 wherein:
the server is specifically configured to query the override check rule base according to the service acceptance information, and determine an override check rule;
screening out pre-override verification information from the service acceptance information according to the override verification rule;
and combining the pre-override verification information and the service acceptance ID to obtain the override verification information.
7. The system for preventing unauthorized transactions according to claim 5 wherein,
the client list is also used for acquiring service acceptance information corresponding to the service order and generating a service acceptance ID according to the service acceptance information.
8. The system for preventing unauthorized business according to any one of claims 5-7, wherein the business acceptance information includes information of a worker who handles the business order, customer information, and information of the business order.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010536534.1A CN111709803B (en) | 2020-06-12 | 2020-06-12 | Method and system for preventing unauthorized business handling |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010536534.1A CN111709803B (en) | 2020-06-12 | 2020-06-12 | Method and system for preventing unauthorized business handling |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111709803A CN111709803A (en) | 2020-09-25 |
CN111709803B true CN111709803B (en) | 2023-09-05 |
Family
ID=72540251
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010536534.1A Active CN111709803B (en) | 2020-06-12 | 2020-06-12 | Method and system for preventing unauthorized business handling |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111709803B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112445824B (en) * | 2020-11-11 | 2024-02-02 | 北京思特奇信息技术股份有限公司 | Abnormal order user information sharing system and method based on block chain |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932332A (en) * | 2012-09-28 | 2013-02-13 | 用友软件股份有限公司 | Data verifying system and data verifying method |
CN107360187A (en) * | 2017-08-21 | 2017-11-17 | 网宿科技股份有限公司 | A kind of processing method of network abduction, apparatus and system |
CN107395659A (en) * | 2017-03-28 | 2017-11-24 | 阿里巴巴集团控股有限公司 | A kind of method and device of service handling and common recognition |
CN107426169A (en) * | 2017-05-24 | 2017-12-01 | 阿里巴巴集团控股有限公司 | A kind of method for processing business and device based on authority |
CN108616360A (en) * | 2018-03-22 | 2018-10-02 | 阿里巴巴集团控股有限公司 | User identity verification, register method and device |
CN108650214A (en) * | 2018-03-16 | 2018-10-12 | 交通银行股份有限公司 | The anti-method and device of going beyond one's commission of dynamic page encryption |
CN109034816A (en) * | 2018-06-08 | 2018-12-18 | 平安科技(深圳)有限公司 | User information verification method, device, computer equipment and storage medium |
CN109600377A (en) * | 2018-12-13 | 2019-04-09 | 平安科技(深圳)有限公司 | Anti- go beyond one's commission method, apparatus, computer equipment and storage medium |
CN110111188A (en) * | 2019-05-23 | 2019-08-09 | 中国联合网络通信集团有限公司 | Business handling method and apparatus |
CN110381060A (en) * | 2019-07-19 | 2019-10-25 | 百度(中国)有限公司 | Data processing method, device, system and storage medium |
CN110597837A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Service data processing method, device, storage medium and computer equipment |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7269737B2 (en) * | 2001-09-21 | 2007-09-11 | Pay By Touch Checking Resources, Inc. | System and method for biometric authorization for financial transactions |
US8402040B2 (en) * | 2004-08-20 | 2013-03-19 | Morphotrust Usa, Inc. | Method and system to authenticate an object |
-
2020
- 2020-06-12 CN CN202010536534.1A patent/CN111709803B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102932332A (en) * | 2012-09-28 | 2013-02-13 | 用友软件股份有限公司 | Data verifying system and data verifying method |
CN107395659A (en) * | 2017-03-28 | 2017-11-24 | 阿里巴巴集团控股有限公司 | A kind of method and device of service handling and common recognition |
CN107426169A (en) * | 2017-05-24 | 2017-12-01 | 阿里巴巴集团控股有限公司 | A kind of method for processing business and device based on authority |
CN107360187A (en) * | 2017-08-21 | 2017-11-17 | 网宿科技股份有限公司 | A kind of processing method of network abduction, apparatus and system |
CN108650214A (en) * | 2018-03-16 | 2018-10-12 | 交通银行股份有限公司 | The anti-method and device of going beyond one's commission of dynamic page encryption |
CN108616360A (en) * | 2018-03-22 | 2018-10-02 | 阿里巴巴集团控股有限公司 | User identity verification, register method and device |
CN109034816A (en) * | 2018-06-08 | 2018-12-18 | 平安科技(深圳)有限公司 | User information verification method, device, computer equipment and storage medium |
CN109600377A (en) * | 2018-12-13 | 2019-04-09 | 平安科技(深圳)有限公司 | Anti- go beyond one's commission method, apparatus, computer equipment and storage medium |
CN110111188A (en) * | 2019-05-23 | 2019-08-09 | 中国联合网络通信集团有限公司 | Business handling method and apparatus |
CN110381060A (en) * | 2019-07-19 | 2019-10-25 | 百度(中国)有限公司 | Data processing method, device, system and storage medium |
CN110597837A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Service data processing method, device, storage medium and computer equipment |
Non-Patent Citations (1)
Title |
---|
实现安全数据库的一种方法――数据库安全通信服务;戴云, 范平志;计算机工程与应用(第22期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111709803A (en) | 2020-09-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109840591B (en) | Model training system, method and storage medium | |
CN104349324B (en) | Mobile terminal number intelligent protection system and method | |
US10117098B1 (en) | User authentication verification service | |
CN109787991A (en) | Exempt from close login method, device, equipment and storage medium based on mobile terminal | |
CN108307333B (en) | Method and device for transmitting intermediate number for mobile communication equipment and storage medium | |
AU2020241597B2 (en) | Validating telephone calls by verifying entity identities using blockchains | |
CN110765484A (en) | Credit investigation data processing method and electronic equipment | |
CN110636505A (en) | Method and system for protecting account security | |
CN107483477B (en) | Account management method and account management system | |
CN111709803B (en) | Method and system for preventing unauthorized business handling | |
US10333939B2 (en) | System and method for authentication | |
CN111681105B (en) | Account management method and device | |
CN112182546A (en) | Account number protection method and device, terminal equipment and storage medium | |
CN108540374B (en) | Information processing method, device, equipment and storage medium based on instant messaging | |
CN112351048B (en) | Interface access control method, device, equipment and storage medium | |
CN112367302B (en) | Identity authentication method and system suitable for chrome browser | |
CN114553573A (en) | Identity authentication method and device | |
CN112004228B (en) | Real person authentication method and system | |
CN108270567B (en) | Message source verification method, device and system and message sending method and device | |
CN104348839B (en) | Network communication method, device and system | |
CN110807181A (en) | Method, device and system for logging in and verifying database in enterprise | |
CN117237108A (en) | Transaction abnormity detection method and related device | |
CN112019537A (en) | Method and system for accessing data | |
CN116846585A (en) | Digital identity and account authentication method and device thereof and storage medium | |
CN113987437A (en) | Private data query method based on block chain account |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |