CN103685205B - Client, server and the information processing method applied to it - Google Patents
Client, server and the information processing method applied to it Download PDFInfo
- Publication number
- CN103685205B CN103685205B CN201210359537.8A CN201210359537A CN103685205B CN 103685205 B CN103685205 B CN 103685205B CN 201210359537 A CN201210359537 A CN 201210359537A CN 103685205 B CN103685205 B CN 103685205B
- Authority
- CN
- China
- Prior art keywords
- code book
- server
- client
- sampling
- checking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
Disclose client, server and the information processing method applied to it.The client, is connected by ad hoc fashion with server, including:First checking information transmitting element, to first checking information of the server transmission to identify specific user;Code book download unit, in the first checking information on the server by checking in the case of, receive corresponding with the first checking information code book;Memory cell, for storing code book;Method of sampling receiving unit, the information for receiving the method for sampling for indicating the second checking information from server;Second checking information generation unit, for according to the method for sampling received, being sampled in the code book stored from memory cell, the second checking information is used in generation;Second checking information transmitting element, for the second checking information of generation to be sent into server;User data receiving unit, in the second checking information on the server by checking in the case of, from server receive user data.
Description
Technical field
The present invention relates to client, server and the information processing method applied to it.More specifically to based on
The client of HTML5 Web server and the server communication and visited for the safety ensured between server and client
The method asked.
Background technology
During the existing WEB based on HTTP is accessed, due to HTTP itself ill-mannered step response, generally require to protect in browser
Deposit specific access information, such as Token, Session id.When browser is accessing server every time, these information are carried
As access state, to support specific function, such as access control, user are identified.
Cookie is the mode of the most frequently used carrying information under B/S frameworks, but cookie has some obviously defects:
1.cookie can be attached in each HTTP request, so virtually adding flow.
2. because the cookie in HTTP request is to transmit in plain text, so security is a problem.
The content of the invention
In view of problem above, expects to provide the server for being able to ensure that data safety, client and the letter applied to it
Cease processing method.
The present invention proposes a kind of using HTML 5Local Storage technologies, the dynamic transmission for the information that conducts interviews, from
And solve the problem of above-mentioned utilization cookie is brought.
According to an aspect of the invention, there is provided a kind of client, is connected by ad hoc fashion with server, including:
First checking information transmitting element, for when client attempts to access that the user data on server, to service
Device sends the first checking information to identify specific user;
Code book download unit, in the first checking information on the server by checking in the case of, connect from server
Receive code book corresponding with the first checking information;
Memory cell, for storing the code book downloaded by code book download unit;
Method of sampling receiving unit, for receiving second checking information of the instruction for identifying specific user from server
The information of the method for sampling;
Second checking information generation unit, for according to the method for sampling that is received by method of sampling receiving unit, from depositing
Sampled in the code book of storage unit storage, produce the second checking information to identify specific user;
Second checking information transmitting element, for the second checking information of generation to be sent into server;
User data receiving unit, in the second checking information on the server by checking in the case of, from service
Device receives user data.
Preferably, further comprised according to the client of the present invention:
Code book validity check unit, in the first checking information on the server by checking in the case of, check
Whether effective code book is stored in memory cell;
Also, only when code book validity check unit determines not having effective code book in memory cell, activation code book is downloaded
Unit.
Preferably, in the client according to the present invention, the method for sampling is effective only for time data access is worked as.
Preferably, in the client according to the present invention, the code book is encryption code book.
Preferably, according to the present invention client in, the method for sampling be according to certain rule, it is any one to code book
Individual or some fields are spliced or map function.
Preferably, in the client according to the present invention, the method for sampling further comprises the word to splicing or converting
Duan Jiami.
According to another aspect of the present invention there is provided a kind of server, it is connected, is wrapped with client by ad hoc fashion
Include:
First authentication unit, for when client attempts to access that the data on server, verify it is being sent from client,
The first checking information identified as the first user;
Code book transmitting element, in the case of in the first checking information by checking, sends to client and is tested with first
Demonstrate,prove the corresponding code book of information;
Method of sampling transmitting element, for determining the second checking information for identifying specific user according to ad hoc rules
The method of sampling, and the information for indicating the method for sampling is sent to client;
Second authentication unit, for verify from client send, according to the method for sampling sample, as marking
Know the second checking information of specific user;
User data transmitting element, in the case of in the second checking information by checking, user is sent to client
Data.
Preferably, further comprised according to the server of the present invention:
Code book validity check unit, in the case of in the first checking information by checking, checking in client is
It is no to store effective code book;
Also, only when code book validity check unit determines not having effective code book in memory cell, activation code book is sent
Unit.
Preferably, in the server according to the present invention, the method for sampling is effective only for time data access is worked as.
Preferably, in the server according to the present invention, the code book is encryption code book.
Preferably, according to the present invention server in, the method for sampling be according to certain rule, it is any one to code book
Individual or some fields are spliced or map function.
Preferably, in the server according to the present invention, the method for sampling further comprises the word to splicing or converting
Duan Jiami.
According to a further aspect of the invention there is provided a kind of information processing method, for a client, the client
It is connected, is comprised the following steps with server by ad hoc fashion:
When client attempts to access that the user data on server, to server send for identify specific user
One checking information;
In the first checking information on the server by checking in the case of, from server download with the first checking information pair
The code book answered and the code book for storing download;
Received from server and indicate to be used to identify the information of the method for sampling of the second checking information of specific user;
According to the method for sampling received by method of sampling receiving unit, adopted in the code book stored from memory cell
Sample, produces the second checking information for identifying specific user;
Second checking information of generation is sent to server;
In the second checking information on the server by checking in the case of, from server receive user data.
Preferably, in the method according to the invention,:
Before code book corresponding with the first checking information is downloaded from server, further check whether stored in client
Effective code book.
Preferably, in the method according to the invention, the method for sampling is effective only for time data access is worked as.
Preferably, in the method according to the invention, the code book is encryption code book.
Preferably, in the method according to the invention, the method for sampling be according to certain rule, to code book any one
Or some fields are spliced or map function.
Preferably, in the method according to the invention, the method for sampling further comprises the field to splicing or converting
Encryption.
According to a further aspect of the invention there is provided a kind of information processing method, for a server, the server
It is connected, is comprised the following steps with client by ad hoc fashion:
When client attempts to access that the data on server, verify from client send, for identifying specific user
The first checking information;
In the case where the first checking information is by checking, code book corresponding with the first checking information is sent to client;
The method of sampling of the second checking information for identifying specific user is determined according to ad hoc rules, and will indicate to sample
The information of method is sent to client;
Verify the second checking information being sent from client, being sampled according to the method for sampling;
In the case where the second checking information is by checking, user data is sent to client.
Preferably, in the method according to the invention, to client send corresponding with the first checking information code book it
Before, further check in client whether store effective code book.
Preferably, in the method according to the invention, the method for sampling is effective only for time data access is worked as.
Preferably, in the method according to the invention, the code book is encryption code book.
Preferably, in the method according to the invention, the method for sampling be according to certain rule, to code book any one
Or some fields are spliced or map function.
Preferably, in the method according to the invention, the method for sampling further comprises the field to splicing or converting
Encryption.
Pass through client according to embodiments of the present invention, server and the information processing method applied to it, Neng Gouke
The problems such as taking flow, the security that cookie is brought.Further, since any once sample all is to work as secondary effective, therefore further
Improve security.
Brief description of the drawings
Fig. 1 is the block diagram for the configuration for showing client according to embodiments of the present invention;
Fig. 2 is the block diagram for the configuration for showing server according to embodiments of the present invention;
Fig. 3 is the flow for the flow for showing the information processing method applied to client according to embodiments of the present invention
Figure;And
Fig. 4 is the flow for the flow for showing the information processing method applied to server according to embodiments of the present invention
Figure.
Embodiment
Below with reference to accompanying drawings to the present invention each be preferred embodiment described.There is provided referring to the drawings
Description, to help the understanding of the example embodiment of the invention to being limited by appended claims and their equivalents.It includes side
Assistant solution various details, but they can only be counted as it is exemplary.Therefore, it would be recognized by those skilled in the art that
Embodiment described herein can be made various changes and modifications, without departing from scope and spirit of the present invention.Moreover, in order to
Make specification more clear succinct, will omit pair it is well known that function and the detailed description of construction.
First, by reference picture 1, client according to embodiments of the present invention is described.As shown in figure 1, client 100 includes the
One checking information transmitting element 101, code book download unit 102, memory cell 103, method of sampling receiving unit 104, second are tested
Demonstrate,prove information generating unit 105, the second checking information transmitting element 106 and user data receiving unit 107.In addition, client 100
It is connected by ad hoc fashion with external server 200.For example, client 100 can pass through wired or wireless mode and service
Device 200 is connected.In the first checking information on server 200 by checking in the case of, it is in other words, successful in User logs in
In the case of, code book download unit 102 downloads code book corresponding with the first checking information from server 200.That is, server
200 send different code books respectively for different users.It is pointed out that code book here can be the code book of encryption,
It can also be the code book of unencryption.
After code book is received from server 200, store it in memory cell 103.
More preferably, however, client 100 may further include code book validity check unit 108.In the first checking
In the case that information is by checking, code book validity check unit 108 first checks for locally whether storing effective code book.This is needed
Judge two kinds of situations:(1)Locally whether store code book corresponding with the first checking information;(2)Whether the code book is out of date
(For example, if used threshold number).It should be noted that code book validity check unit 108 can be by itself
Check, can also apply for that server 200 assists inspection.Only when code book validity check unit 108 determines do not have in memory cell
During effective code book, code book download unit is activated.
In addition, the first checking information on server 200 by checking in the case of, in other words, User logs in success
In the case of, method of sampling receiving unit 104 also receives the second checking indicated as second user identification information from server
The information of the method for sampling of information.The method of sampling can be according to certain rule, to any one or more parts in code book
Field is spliced or map function, can also further comprise the field encryption to splicing or changing.Certainly, according to the present invention
Method of sampling not limited to this, any other suitable method of sampling can be applied to the present invention.
Then, the second checking information generation unit 105 is according to the sampling side received by method of sampling receiving unit 104
Sampled in method, the effective code book stored from memory cell 103, produce the second checking information to identify specific user.
Second checking information of generation is sent to server 200 by the second checking information transmitting element 106.
In the second checking information on server 200 by checking in the case of, in other words, the is determined in server 200
Two checking informations are servers 200 in the case of carrying out the correct data that sampling is obtained from code book according to the above-mentioned method of sampling
Client 100 is allowed to obtain the data authorized, and then user data receiving unit 107 receives user data from server 200.Separately
On the one hand, if the second checking information is on server 200 not over checking, refusal client 100 is to authorization data
Access.
It is to be herein pointed out the method for sampling is effective only for time data access is worked as.Therefore, passed even in certain
Occur in that access information is lost during defeated, will not also be stolen to steal user network data.
Next, by reference picture 2, describing server according to embodiments of the present invention.As shown in Fig. 2 server 200 includes
First authentication unit 201, code book transmitting element 202, method of sampling transmitting element 203, the second authentication unit 204 and user data
Transmitting element 205.In addition, server 200 is connected by ad hoc fashion with client 100.For example, server 200 can pass through
Wired or wireless mode is connected with client 100.
When client 100 attempts to access that the data on server 200, the first authentication unit 201 is verified from client hair
The first checking information send, for identifying specific user.
In the case where the first checking information is by checking, in other words, in the case of User logs in is successful, code book is sent
Unit 202 sends code book corresponding with the first checking information to client.As mentioned above it is possible, the code corresponding to different users
This difference.In addition, it is necessary to which, it is noted that code book here can be the code book of encryption or the code book of unencryption.
More preferably, however, server 200 may further include code book validity check unit 206.In the first checking
In the case that information is by checking, code book validity check unit 206 checks whether client stores effective code book.Only work as code
When this validity check unit determines not having effective code book in client, allow through client application by under code book transmitting element
Carry code book.
Method of sampling transmitting element 203 determines adopting for the second verification method for identifying specific user according to ad hoc rules
Quadrat method, and the information for indicating the method for sampling is sent to client 100.As mentioned above it is possible, the method for sampling can be
Arbitrarily some fields are spliced or converted from code book, the field encryption to splicing can also be further comprised.Certainly, root
According to the method for sampling not limited to this of the present invention, any other suitable method of sampling can be applied to the present invention.
Second authentication unit 204 verifies that the second checking being sent from client 100, being sampled according to the method for sampling is believed
Breath.
In the case where the second checking information is by checking, user data transmitting element 205 sends user to client 100
Data.
As mentioned above it is possible, the method for sampling is only for time data access is worked as effectively, so as to effectively improve number
According to security.
Hereinbefore, client and server according to embodiments of the present invention is described referring to Figures 1 and 2.Under
Wen Zhong, will respectively refer to the information processing that Fig. 3 and Fig. 4 descriptions are performed on client and server according to embodiments of the present invention
Method.
First, information processing method of the description of reference picture 3 applied to client.As shown in figure 3, methods described 300 includes
Following steps:
In step S301, when client attempts to access that the user data on server, sent to server for identifying
The first checking information of specific user.As mentioned above it is possible, first checking information can be username and password.
Then, in step S302, judge the first checking information whether on the server by checking.If by checking,
Then processing proceeds to step S303.In step S303, code book corresponding with the first checking information is downloaded from server.The opposing party
Face, if not verified, processing terminates.
Then, in step S304, the code book downloaded by code book download unit is stored.
It is highly preferred that before code book corresponding with the first checking information is downloaded from server, further checking client
In whether store effective code book.Only when it is determined that there is no effective code book in client, download and believe with the first checking from server
Cease corresponding code book.
In step S305, the method for sampling of second checking information of the instruction for identifying specific user is received from server
Information.It is pointed out that the step of receiving and store code book can be simultaneously the step of the information of the method for sampling is indicated with receiving
Capable.It is of course also possible to first receive and store code book, the information for indicating the method for sampling is then received again.Alternately, can also
The information for indicating the method for sampling is first received and stored, then receives again and stores code book.
Then, in step S306, according to the method for sampling received, sampled from the code book of storage, produce second
Checking information.
Next, in step S307, the second checking information of generation is sent into server.
In step S308, judge the second checking information whether on the server by checking.If by checking, handled
Proceed to step S309.In step S309, user data is received from server.Otherwise processing terminates.
Finally, by reference picture 4, information processing method of the description applied to server.As shown in figure 4, methods described 400 is wrapped
Include following steps:
In step S401, when client attempts to access that the data on server, verify from client send, be used as use
In the first checking information of mark specific user.
Then, in step S402, the first checking information is verified.If by checking, processing proceeds to step S403.It is no
Then processing terminates.
In step S403, code book corresponding with the first checking information is sent to client.
Preferably, before correspondence code book is sent to client, judge effective code book whether is stored in client.Only work as visitor
When not having effective code book in the end of family, correspondence code book is sent to client.
In addition, in step S404, the second verification method of second user identification information is determined as according to ad hoc rules
The method of sampling, and the information for indicating the method for sampling is sent to client.As described above, it should be pointed out that send code book
The step of step is with information and the transmission for determining to indicate the method for sampling can be parallel.It is of course also possible to after one first one.
Next, in step S405, the second checking information of its generation is received from client.
Then, in step S406, verify that the second checking being sent from client, being sampled according to the method for sampling is believed
Breath.
In the case where the second checking information is by checking, processing proceeds to step S408, and number of users is sent to client
According to.Otherwise processing terminates.
Below, the present invention will be more fully understood by describing several specific embodiments.
Example 1:
First, user uses the browser access website for supporting HTML5.For example, the website is an Email website.This
When, web site prompts user carries out authentication.Then, user inputs correct user authentication information, such as user name+password.Net
Stand and user name+password is verified first.If website is by the authentication of user, through client application directly to it
Transmission code book is simultaneously stored in Local Storage.User checks web site contents by browser selection.For example, user's selection is looked into
See the content of inbox.Now, Website page JS codes obtain specific identification code according to rule from code book, are such as intercepted from code book
Partial content, and splice.Then, Website page JS codes return to identification code to Website server, Website server checking identification
Code.Specifically, the identification code that Website server returns to Website page JS codes is compared with correct identification code.If
Unanimously, then identification code verification passes through.In this case, Website server returns to correct page data to browser, for
Family is checked.For example, now, the information of inbox is presented to user.
Example 2:
First, user uses the browser access website for supporting HTML5.For example, the website is an Email website.This
When, web site prompts user carries out authentication.Then, user inputs correct user authentication information, such as user name+password.Net
Stand and user name+password is verified first.If website is loaded into use by the authentication of user from server
The Website page JavaSript of family end browser(JS)Code is ageing by its own checking local code book of user terminal.Such as
Fruit is locally failed without code book, or code book, then the JS pages in website download new code book from website, and are stored in local Local
Storage.User checks web site contents by browser selection.For example, the content of inbox is checked in user's selection.Now, net
Page JS codes stand according to rule, obtains specific identification code from code book, such as intercepts partial content from code book, and splice.Then, net
Page JS codes of standing return to identification code to Website server, Website server checking identification code.Specifically, Website server will
The identification code that Website page JS codes are returned is compared with correct identification code.If consistent, identification code verification passes through.
In this case, Website server returns to correct page data to browser, is checked for user.For example, now, being in user
The information of existing inbox.
Example 3:
First, user uses the browser access website for supporting HTML5.For example, the website is an Email website.This
When, web site prompts user carries out authentication.Then, user inputs correct user authentication information, such as user name+password.Net
Stand and user name+password is verified first.If website is loaded into use by the authentication of user from server
The Website page JavaSript of family end browser(JS)Code by ask website assist verify the local code book of user terminal when
Effect property.If locally without code book, or code book fails, then the JS pages in website download new code book from website, and are stored in local
Local Storage.User checks web site contents by browser selection.For example, the content of inbox is checked in user's selection.This
When, Website page JS codes obtain specific identification code according to rule from code book, such as intercept partial content from code book, and splice.So
Afterwards, Website page JS codes return to identification code to Website server, Website server checking identification code.Specifically, website takes
The identification code that business device returns to Website page JS codes is compared with correct identification code.If consistent, identification code verification
Pass through.In this case, Website server returns to correct page data to browser, is checked for user.For example, now,
The information of inbox is presented to user.
Hereinbefore, client and server according to embodiments of the present invention is described referring to figs. 1 to Fig. 4 and should
For its information processing method.By apparatus and method according to the invention, do not recycled between client and server
Cookie conducts interviews the transmission of data, it is to avoid the problems such as flow that cookie is brought, security.Also, pass through server
Client is controlled to carry out information code book sampling, any once sample all is to work as secondary effective, therefore in certain transmitting procedure
Occur in that access information is lost, will not also be stolen to steal user network data.
It is pointed out that in actual use, client is not the client of customization, but standard, support
The browser of HTML5 technologies, the connected mode of itself and server is also the http protocol of standard.
Just with browser access server data(Such as access some website for supporting the art of this patent point)Process
In make use of HTML5 Local Storage technologies, an original step is demonstrate,proved, subsequent access carries the mode of checking information,
Strengthen to utilize code book, the mode of individual authentication is accessed every time.
It should be noted that in this manual, term " comprising ", "comprising" or its any other variant are intended to
Nonexcludability is included, so that process, method, article or equipment including a series of key elements not only will including those
Element, but also other key elements including being not expressly set out, or also include being this process, method, article or equipment
Intrinsic key element.In the absence of more restrictions, the key element limited by sentence " including ... ", it is not excluded that including
Also there is other identical element in process, method, article or the equipment of the key element.
Finally, in addition it is also necessary to explanation, a series of above-mentioned processing are not only included with order described here in temporal sequence
The processing of execution, and the processing including performing parallel or respectively rather than in chronological order.
Through the above description of the embodiments, those skilled in the art can be understood that the present invention can be by
Software adds the mode of required hardware platform to realize, naturally it is also possible to all implemented by software.Understood based on such,
What technical scheme contributed to background technology can be embodied in the form of software product in whole or in part,
The computer software product can be stored in storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are to make
Obtain a computer equipment(Can be personal computer, server, or network equipment etc.)Perform each embodiment of the invention
Or the method described in some parts of embodiment.
The present invention is described in detail above, principle and embodiment party of the specific case used herein to the present invention
Formula is set forth, and the explanation of above example is only intended to the method and its core concept for helping to understand the present invention;Meanwhile, it is right
In those of ordinary skill in the art, according to the thought of the present invention, change is had in specific embodiments and applications
Part, in summary, this specification content should not be construed as limiting the invention.
Claims (24)
1. a kind of client, is connected by ad hoc fashion with server, including:
First checking information transmitting element, for when client attempts to access that the user data on server, being sent out to server
Send to identify the first checking information of specific user;
Code book download unit, in the first checking information on the server by checking in the case of, from server download with
The corresponding code book of first checking information;
Memory cell, for storing the code book that the code book download unit is downloaded;
Method of sampling receiving unit, indicates to be used to identify the sampling of the second checking information of specific user for receiving from server
The information of method;
Second checking information generation unit, it is single from storage for according to the method for sampling received by method of sampling receiving unit
Sampled in effective code book of member storage, produce the second checking information;
Second checking information transmitting element, for the second checking information of generation to be sent into server;
User data receiving unit, in the second checking information on the server by checking in the case of, connect from server
Receive user data.
2. client according to claim 1, further comprises:
Code book validity check unit, in the first checking information on the server by checking in the case of, check storage
Whether effective code book is stored in unit;
Also, only when code book validity check unit determines not having effective code book in memory cell, activate code book download unit.
3. client according to claim 1, wherein the method for sampling is effective only for time data access is worked as.
4. client according to claim 1, wherein the code book is encryption code book.
5. the client according to claim 1 or 4, wherein the method for sampling is according to certain rule, in code book
Any one or more part fields are spliced or map function.
6. client according to claim 5, wherein the method for sampling further comprises the field encryption to splicing.
7. a kind of server, is connected by ad hoc fashion with client, including:
First authentication unit, for when client attempts to access that the data on server, verifying sent from client, conduct
First checking information of the first user mark;
Code book transmitting element, in the case of in the first checking information by checking, correspondence code book is sent to client;
Method of sampling transmitting element, the sampling for determining the second checking information for identifying specific user according to ad hoc rules
Method, and the information for indicating the method for sampling is sent to client;
Second authentication unit, for verifying the second checking information being sent from client, being sampled according to the method for sampling;
User data transmitting element, in the case of in the second checking information by checking, user data is sent to client.
8. server according to claim 7, further comprises:
Code book validity check unit, in the case of in the first checking information by checking, checks whether deposited in client
Effective code book is stored up;
Also, only when code book validity check unit determines not having effective code book in memory cell, activate code book transmitting element.
9. server according to claim 7, wherein the method for sampling is effective only for time data access is worked as.
10. server according to claim 7, wherein the code book is encryption code book.
11. server according to claim 7, wherein the method for sampling is according to certain rule, to any in code book
One or more part fields are spliced or map function.
12. server according to claim 11, wherein the method for sampling further comprises the word to splicing or converting
Duan Jiami.
13. a kind of information processing method, for a client, the client is connected by ad hoc fashion with server, including
Following steps:
When client attempts to access that the user data on server, send and tested for identifying the first of specific user to server
Demonstrate,prove information;
In the first checking information on the server by checking in the case of, from server download it is corresponding with the first checking information
Code book and the code book for storing download;
Received from server and indicate to be used to identify the information of the method for sampling of the second checking information of specific user;
According to the method for sampling received by method of sampling receiving unit, sampled from effective code book of storage, produce the
Two checking informations;
Second checking information of generation is sent to server;
In the second checking information on the server by checking in the case of, from server receive user data.
14. method according to claim 13, wherein:From server download corresponding with the first checking information code book it
Before, further check in client whether store effective code book.
15. method according to claim 13, wherein the method for sampling is effective only for time data access is worked as.
16. method according to claim 13, wherein the code book is encryption code book.
17. the method according to claim 13 or 16, wherein the method for sampling is according to certain rule, to appointing in code book
One or more part fields of anticipating are spliced or map function.
18. method according to claim 17, wherein the method for sampling further comprises the field to splicing or converting
Encryption.
19. a kind of information processing method, for a server, the server is connected by ad hoc fashion with client, including
Following steps:
When client attempts to access that the data on server, verify it is being sent from client, for identify specific user the
One checking information;
In the case where the first checking information is by checking, code book corresponding with the first checking information is sent to client;
The method of sampling of the second checking information for identifying specific user is determined according to ad hoc rules, and the method for sampling will be indicated
Information be sent to client;
Verify the second checking information being sent from client, being sampled according to the method for sampling;
In the case where the second checking information is by checking, user data is sent to client.
20. method according to claim 19, wherein to client send code book corresponding with the first checking information it
Before, further check in client whether store effective code book.
21. method according to claim 19, wherein the method for sampling is effective only for time data access is worked as.
22. method according to claim 19, wherein the code book is encryption code book.
23. method according to claim 19, wherein the method for sampling is according to certain rule, to any one in code book
Individual or some fields are spliced or map function.
24. method according to claim 23, wherein the method for sampling further comprises the field to splicing or converting
Encryption.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210359537.8A CN103685205B (en) | 2012-09-24 | 2012-09-24 | Client, server and the information processing method applied to it |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210359537.8A CN103685205B (en) | 2012-09-24 | 2012-09-24 | Client, server and the information processing method applied to it |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103685205A CN103685205A (en) | 2014-03-26 |
CN103685205B true CN103685205B (en) | 2017-09-29 |
Family
ID=50321531
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210359537.8A Active CN103685205B (en) | 2012-09-24 | 2012-09-24 | Client, server and the information processing method applied to it |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103685205B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101197822A (en) * | 2006-12-04 | 2008-06-11 | 西门子公司 | System for preventing information leakage and method based on the same |
CN101599919A (en) * | 2008-06-02 | 2009-12-09 | 鸿富锦精密工业(深圳)有限公司 | The system and method for single-sign-on mail server |
CN101645890A (en) * | 2009-08-06 | 2010-02-10 | 北京飞天诚信科技有限公司 | Method, system and corresponding equipment for verifying information source integrality |
CN101699820A (en) * | 2009-10-30 | 2010-04-28 | 北京飞天诚信科技有限公司 | Method and device for authenticating dynamic passwords |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1956375A (en) * | 2005-10-24 | 2007-05-02 | 潘静 | Dynamic password identity authentication method and system based on network |
US20080256613A1 (en) * | 2007-03-13 | 2008-10-16 | Grover Noel J | Voice print identification portal |
-
2012
- 2012-09-24 CN CN201210359537.8A patent/CN103685205B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101197822A (en) * | 2006-12-04 | 2008-06-11 | 西门子公司 | System for preventing information leakage and method based on the same |
CN101599919A (en) * | 2008-06-02 | 2009-12-09 | 鸿富锦精密工业(深圳)有限公司 | The system and method for single-sign-on mail server |
CN101645890A (en) * | 2009-08-06 | 2010-02-10 | 北京飞天诚信科技有限公司 | Method, system and corresponding equipment for verifying information source integrality |
CN101699820A (en) * | 2009-10-30 | 2010-04-28 | 北京飞天诚信科技有限公司 | Method and device for authenticating dynamic passwords |
Also Published As
Publication number | Publication date |
---|---|
CN103685205A (en) | 2014-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101523859B (en) | System and method for authenticating remote server access | |
CN105007280B (en) | A kind of application login method and device | |
CN104021333B (en) | Mobile security watch bag | |
CN104113551B (en) | A kind of platform authorization method, platform service end and applications client and system | |
CN107395614A (en) | Single-point logging method and system | |
CN108809988A (en) | A kind of authentication method and system of request | |
CN106656952A (en) | Authentication method, device and system for registration equipment | |
CN105991589A (en) | Method, apparatus, and system for redirection | |
CN105099707B (en) | A kind of offline authentication method, server and system | |
CN1937498A (en) | Dynamic cipher authentication method, system and device | |
CN112491881A (en) | Cross-platform single sign-on method, system, electronic equipment and storage medium | |
CN102073822A (en) | Method and system for preventing user information from leaking | |
CN106341233A (en) | Authentication method for client to log into server, device, system and electronic device | |
CN106953831A (en) | A kind of authorization method of user resources, apparatus and system | |
CN110113366A (en) | A kind of detection method and device of CSRF loophole | |
CN109040069A (en) | A kind of dissemination method, delivery system and the access method of cloud application program | |
CN104837134B (en) | A kind of web authentication user login method, equipment and system | |
CN107277017A (en) | Purview certification method, apparatus and system based on encryption key and device-fingerprint | |
CN110113329A (en) | A kind of verification method and device of identifying code | |
CN105095729B (en) | A kind of Quick Response Code login method, server and system | |
CN106559386A (en) | A kind of authentication method and device | |
CN110166471A (en) | A kind of portal authentication method and device | |
CN110248356A (en) | Information acquisition method and device | |
CN109495458A (en) | A kind of method, system and the associated component of data transmission | |
CN103685205B (en) | Client, server and the information processing method applied to it |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |