CN103685205B - Client, server and the information processing method applied to it - Google Patents

Client, server and the information processing method applied to it Download PDF

Info

Publication number
CN103685205B
CN103685205B CN201210359537.8A CN201210359537A CN103685205B CN 103685205 B CN103685205 B CN 103685205B CN 201210359537 A CN201210359537 A CN 201210359537A CN 103685205 B CN103685205 B CN 103685205B
Authority
CN
China
Prior art keywords
code book
server
client
sampling
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210359537.8A
Other languages
Chinese (zh)
Other versions
CN103685205A (en
Inventor
李栋
马辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201210359537.8A priority Critical patent/CN103685205B/en
Publication of CN103685205A publication Critical patent/CN103685205A/en
Application granted granted Critical
Publication of CN103685205B publication Critical patent/CN103685205B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

Disclose client, server and the information processing method applied to it.The client, is connected by ad hoc fashion with server, including:First checking information transmitting element, to first checking information of the server transmission to identify specific user;Code book download unit, in the first checking information on the server by checking in the case of, receive corresponding with the first checking information code book;Memory cell, for storing code book;Method of sampling receiving unit, the information for receiving the method for sampling for indicating the second checking information from server;Second checking information generation unit, for according to the method for sampling received, being sampled in the code book stored from memory cell, the second checking information is used in generation;Second checking information transmitting element, for the second checking information of generation to be sent into server;User data receiving unit, in the second checking information on the server by checking in the case of, from server receive user data.

Description

Client, server and the information processing method applied to it
Technical field
The present invention relates to client, server and the information processing method applied to it.More specifically to based on The client of HTML5 Web server and the server communication and visited for the safety ensured between server and client The method asked.
Background technology
During the existing WEB based on HTTP is accessed, due to HTTP itself ill-mannered step response, generally require to protect in browser Deposit specific access information, such as Token, Session id.When browser is accessing server every time, these information are carried As access state, to support specific function, such as access control, user are identified.
Cookie is the mode of the most frequently used carrying information under B/S frameworks, but cookie has some obviously defects:
1.cookie can be attached in each HTTP request, so virtually adding flow.
2. because the cookie in HTTP request is to transmit in plain text, so security is a problem.
The content of the invention
In view of problem above, expects to provide the server for being able to ensure that data safety, client and the letter applied to it Cease processing method.
The present invention proposes a kind of using HTML 5Local Storage technologies, the dynamic transmission for the information that conducts interviews, from And solve the problem of above-mentioned utilization cookie is brought.
According to an aspect of the invention, there is provided a kind of client, is connected by ad hoc fashion with server, including:
First checking information transmitting element, for when client attempts to access that the user data on server, to service Device sends the first checking information to identify specific user;
Code book download unit, in the first checking information on the server by checking in the case of, connect from server Receive code book corresponding with the first checking information;
Memory cell, for storing the code book downloaded by code book download unit;
Method of sampling receiving unit, for receiving second checking information of the instruction for identifying specific user from server The information of the method for sampling;
Second checking information generation unit, for according to the method for sampling that is received by method of sampling receiving unit, from depositing Sampled in the code book of storage unit storage, produce the second checking information to identify specific user;
Second checking information transmitting element, for the second checking information of generation to be sent into server;
User data receiving unit, in the second checking information on the server by checking in the case of, from service Device receives user data.
Preferably, further comprised according to the client of the present invention:
Code book validity check unit, in the first checking information on the server by checking in the case of, check Whether effective code book is stored in memory cell;
Also, only when code book validity check unit determines not having effective code book in memory cell, activation code book is downloaded Unit.
Preferably, in the client according to the present invention, the method for sampling is effective only for time data access is worked as.
Preferably, in the client according to the present invention, the code book is encryption code book.
Preferably, according to the present invention client in, the method for sampling be according to certain rule, it is any one to code book Individual or some fields are spliced or map function.
Preferably, in the client according to the present invention, the method for sampling further comprises the word to splicing or converting Duan Jiami.
According to another aspect of the present invention there is provided a kind of server, it is connected, is wrapped with client by ad hoc fashion Include:
First authentication unit, for when client attempts to access that the data on server, verify it is being sent from client, The first checking information identified as the first user;
Code book transmitting element, in the case of in the first checking information by checking, sends to client and is tested with first Demonstrate,prove the corresponding code book of information;
Method of sampling transmitting element, for determining the second checking information for identifying specific user according to ad hoc rules The method of sampling, and the information for indicating the method for sampling is sent to client;
Second authentication unit, for verify from client send, according to the method for sampling sample, as marking Know the second checking information of specific user;
User data transmitting element, in the case of in the second checking information by checking, user is sent to client Data.
Preferably, further comprised according to the server of the present invention:
Code book validity check unit, in the case of in the first checking information by checking, checking in client is It is no to store effective code book;
Also, only when code book validity check unit determines not having effective code book in memory cell, activation code book is sent Unit.
Preferably, in the server according to the present invention, the method for sampling is effective only for time data access is worked as.
Preferably, in the server according to the present invention, the code book is encryption code book.
Preferably, according to the present invention server in, the method for sampling be according to certain rule, it is any one to code book Individual or some fields are spliced or map function.
Preferably, in the server according to the present invention, the method for sampling further comprises the word to splicing or converting Duan Jiami.
According to a further aspect of the invention there is provided a kind of information processing method, for a client, the client It is connected, is comprised the following steps with server by ad hoc fashion:
When client attempts to access that the user data on server, to server send for identify specific user One checking information;
In the first checking information on the server by checking in the case of, from server download with the first checking information pair The code book answered and the code book for storing download;
Received from server and indicate to be used to identify the information of the method for sampling of the second checking information of specific user;
According to the method for sampling received by method of sampling receiving unit, adopted in the code book stored from memory cell Sample, produces the second checking information for identifying specific user;
Second checking information of generation is sent to server;
In the second checking information on the server by checking in the case of, from server receive user data.
Preferably, in the method according to the invention,:
Before code book corresponding with the first checking information is downloaded from server, further check whether stored in client Effective code book.
Preferably, in the method according to the invention, the method for sampling is effective only for time data access is worked as.
Preferably, in the method according to the invention, the code book is encryption code book.
Preferably, in the method according to the invention, the method for sampling be according to certain rule, to code book any one Or some fields are spliced or map function.
Preferably, in the method according to the invention, the method for sampling further comprises the field to splicing or converting Encryption.
According to a further aspect of the invention there is provided a kind of information processing method, for a server, the server It is connected, is comprised the following steps with client by ad hoc fashion:
When client attempts to access that the data on server, verify from client send, for identifying specific user The first checking information;
In the case where the first checking information is by checking, code book corresponding with the first checking information is sent to client;
The method of sampling of the second checking information for identifying specific user is determined according to ad hoc rules, and will indicate to sample The information of method is sent to client;
Verify the second checking information being sent from client, being sampled according to the method for sampling;
In the case where the second checking information is by checking, user data is sent to client.
Preferably, in the method according to the invention, to client send corresponding with the first checking information code book it Before, further check in client whether store effective code book.
Preferably, in the method according to the invention, the method for sampling is effective only for time data access is worked as.
Preferably, in the method according to the invention, the code book is encryption code book.
Preferably, in the method according to the invention, the method for sampling be according to certain rule, to code book any one Or some fields are spliced or map function.
Preferably, in the method according to the invention, the method for sampling further comprises the field to splicing or converting Encryption.
Pass through client according to embodiments of the present invention, server and the information processing method applied to it, Neng Gouke The problems such as taking flow, the security that cookie is brought.Further, since any once sample all is to work as secondary effective, therefore further Improve security.
Brief description of the drawings
Fig. 1 is the block diagram for the configuration for showing client according to embodiments of the present invention;
Fig. 2 is the block diagram for the configuration for showing server according to embodiments of the present invention;
Fig. 3 is the flow for the flow for showing the information processing method applied to client according to embodiments of the present invention Figure;And
Fig. 4 is the flow for the flow for showing the information processing method applied to server according to embodiments of the present invention Figure.
Embodiment
Below with reference to accompanying drawings to the present invention each be preferred embodiment described.There is provided referring to the drawings Description, to help the understanding of the example embodiment of the invention to being limited by appended claims and their equivalents.It includes side Assistant solution various details, but they can only be counted as it is exemplary.Therefore, it would be recognized by those skilled in the art that Embodiment described herein can be made various changes and modifications, without departing from scope and spirit of the present invention.Moreover, in order to Make specification more clear succinct, will omit pair it is well known that function and the detailed description of construction.
First, by reference picture 1, client according to embodiments of the present invention is described.As shown in figure 1, client 100 includes the One checking information transmitting element 101, code book download unit 102, memory cell 103, method of sampling receiving unit 104, second are tested Demonstrate,prove information generating unit 105, the second checking information transmitting element 106 and user data receiving unit 107.In addition, client 100 It is connected by ad hoc fashion with external server 200.For example, client 100 can pass through wired or wireless mode and service Device 200 is connected.In the first checking information on server 200 by checking in the case of, it is in other words, successful in User logs in In the case of, code book download unit 102 downloads code book corresponding with the first checking information from server 200.That is, server 200 send different code books respectively for different users.It is pointed out that code book here can be the code book of encryption, It can also be the code book of unencryption.
After code book is received from server 200, store it in memory cell 103.
More preferably, however, client 100 may further include code book validity check unit 108.In the first checking In the case that information is by checking, code book validity check unit 108 first checks for locally whether storing effective code book.This is needed Judge two kinds of situations:(1)Locally whether store code book corresponding with the first checking information;(2)Whether the code book is out of date (For example, if used threshold number).It should be noted that code book validity check unit 108 can be by itself Check, can also apply for that server 200 assists inspection.Only when code book validity check unit 108 determines do not have in memory cell During effective code book, code book download unit is activated.
In addition, the first checking information on server 200 by checking in the case of, in other words, User logs in success In the case of, method of sampling receiving unit 104 also receives the second checking indicated as second user identification information from server The information of the method for sampling of information.The method of sampling can be according to certain rule, to any one or more parts in code book Field is spliced or map function, can also further comprise the field encryption to splicing or changing.Certainly, according to the present invention Method of sampling not limited to this, any other suitable method of sampling can be applied to the present invention.
Then, the second checking information generation unit 105 is according to the sampling side received by method of sampling receiving unit 104 Sampled in method, the effective code book stored from memory cell 103, produce the second checking information to identify specific user.
Second checking information of generation is sent to server 200 by the second checking information transmitting element 106.
In the second checking information on server 200 by checking in the case of, in other words, the is determined in server 200 Two checking informations are servers 200 in the case of carrying out the correct data that sampling is obtained from code book according to the above-mentioned method of sampling Client 100 is allowed to obtain the data authorized, and then user data receiving unit 107 receives user data from server 200.Separately On the one hand, if the second checking information is on server 200 not over checking, refusal client 100 is to authorization data Access.
It is to be herein pointed out the method for sampling is effective only for time data access is worked as.Therefore, passed even in certain Occur in that access information is lost during defeated, will not also be stolen to steal user network data.
Next, by reference picture 2, describing server according to embodiments of the present invention.As shown in Fig. 2 server 200 includes First authentication unit 201, code book transmitting element 202, method of sampling transmitting element 203, the second authentication unit 204 and user data Transmitting element 205.In addition, server 200 is connected by ad hoc fashion with client 100.For example, server 200 can pass through Wired or wireless mode is connected with client 100.
When client 100 attempts to access that the data on server 200, the first authentication unit 201 is verified from client hair The first checking information send, for identifying specific user.
In the case where the first checking information is by checking, in other words, in the case of User logs in is successful, code book is sent Unit 202 sends code book corresponding with the first checking information to client.As mentioned above it is possible, the code corresponding to different users This difference.In addition, it is necessary to which, it is noted that code book here can be the code book of encryption or the code book of unencryption.
More preferably, however, server 200 may further include code book validity check unit 206.In the first checking In the case that information is by checking, code book validity check unit 206 checks whether client stores effective code book.Only work as code When this validity check unit determines not having effective code book in client, allow through client application by under code book transmitting element Carry code book.
Method of sampling transmitting element 203 determines adopting for the second verification method for identifying specific user according to ad hoc rules Quadrat method, and the information for indicating the method for sampling is sent to client 100.As mentioned above it is possible, the method for sampling can be Arbitrarily some fields are spliced or converted from code book, the field encryption to splicing can also be further comprised.Certainly, root According to the method for sampling not limited to this of the present invention, any other suitable method of sampling can be applied to the present invention.
Second authentication unit 204 verifies that the second checking being sent from client 100, being sampled according to the method for sampling is believed Breath.
In the case where the second checking information is by checking, user data transmitting element 205 sends user to client 100 Data.
As mentioned above it is possible, the method for sampling is only for time data access is worked as effectively, so as to effectively improve number According to security.
Hereinbefore, client and server according to embodiments of the present invention is described referring to Figures 1 and 2.Under Wen Zhong, will respectively refer to the information processing that Fig. 3 and Fig. 4 descriptions are performed on client and server according to embodiments of the present invention Method.
First, information processing method of the description of reference picture 3 applied to client.As shown in figure 3, methods described 300 includes Following steps:
In step S301, when client attempts to access that the user data on server, sent to server for identifying The first checking information of specific user.As mentioned above it is possible, first checking information can be username and password.
Then, in step S302, judge the first checking information whether on the server by checking.If by checking, Then processing proceeds to step S303.In step S303, code book corresponding with the first checking information is downloaded from server.The opposing party Face, if not verified, processing terminates.
Then, in step S304, the code book downloaded by code book download unit is stored.
It is highly preferred that before code book corresponding with the first checking information is downloaded from server, further checking client In whether store effective code book.Only when it is determined that there is no effective code book in client, download and believe with the first checking from server Cease corresponding code book.
In step S305, the method for sampling of second checking information of the instruction for identifying specific user is received from server Information.It is pointed out that the step of receiving and store code book can be simultaneously the step of the information of the method for sampling is indicated with receiving Capable.It is of course also possible to first receive and store code book, the information for indicating the method for sampling is then received again.Alternately, can also The information for indicating the method for sampling is first received and stored, then receives again and stores code book.
Then, in step S306, according to the method for sampling received, sampled from the code book of storage, produce second Checking information.
Next, in step S307, the second checking information of generation is sent into server.
In step S308, judge the second checking information whether on the server by checking.If by checking, handled Proceed to step S309.In step S309, user data is received from server.Otherwise processing terminates.
Finally, by reference picture 4, information processing method of the description applied to server.As shown in figure 4, methods described 400 is wrapped Include following steps:
In step S401, when client attempts to access that the data on server, verify from client send, be used as use In the first checking information of mark specific user.
Then, in step S402, the first checking information is verified.If by checking, processing proceeds to step S403.It is no Then processing terminates.
In step S403, code book corresponding with the first checking information is sent to client.
Preferably, before correspondence code book is sent to client, judge effective code book whether is stored in client.Only work as visitor When not having effective code book in the end of family, correspondence code book is sent to client.
In addition, in step S404, the second verification method of second user identification information is determined as according to ad hoc rules The method of sampling, and the information for indicating the method for sampling is sent to client.As described above, it should be pointed out that send code book The step of step is with information and the transmission for determining to indicate the method for sampling can be parallel.It is of course also possible to after one first one.
Next, in step S405, the second checking information of its generation is received from client.
Then, in step S406, verify that the second checking being sent from client, being sampled according to the method for sampling is believed Breath.
In the case where the second checking information is by checking, processing proceeds to step S408, and number of users is sent to client According to.Otherwise processing terminates.
Below, the present invention will be more fully understood by describing several specific embodiments.
Example 1:
First, user uses the browser access website for supporting HTML5.For example, the website is an Email website.This When, web site prompts user carries out authentication.Then, user inputs correct user authentication information, such as user name+password.Net Stand and user name+password is verified first.If website is by the authentication of user, through client application directly to it Transmission code book is simultaneously stored in Local Storage.User checks web site contents by browser selection.For example, user's selection is looked into See the content of inbox.Now, Website page JS codes obtain specific identification code according to rule from code book, are such as intercepted from code book Partial content, and splice.Then, Website page JS codes return to identification code to Website server, Website server checking identification Code.Specifically, the identification code that Website server returns to Website page JS codes is compared with correct identification code.If Unanimously, then identification code verification passes through.In this case, Website server returns to correct page data to browser, for Family is checked.For example, now, the information of inbox is presented to user.
Example 2:
First, user uses the browser access website for supporting HTML5.For example, the website is an Email website.This When, web site prompts user carries out authentication.Then, user inputs correct user authentication information, such as user name+password.Net Stand and user name+password is verified first.If website is loaded into use by the authentication of user from server The Website page JavaSript of family end browser(JS)Code is ageing by its own checking local code book of user terminal.Such as Fruit is locally failed without code book, or code book, then the JS pages in website download new code book from website, and are stored in local Local Storage.User checks web site contents by browser selection.For example, the content of inbox is checked in user's selection.Now, net Page JS codes stand according to rule, obtains specific identification code from code book, such as intercepts partial content from code book, and splice.Then, net Page JS codes of standing return to identification code to Website server, Website server checking identification code.Specifically, Website server will The identification code that Website page JS codes are returned is compared with correct identification code.If consistent, identification code verification passes through. In this case, Website server returns to correct page data to browser, is checked for user.For example, now, being in user The information of existing inbox.
Example 3:
First, user uses the browser access website for supporting HTML5.For example, the website is an Email website.This When, web site prompts user carries out authentication.Then, user inputs correct user authentication information, such as user name+password.Net Stand and user name+password is verified first.If website is loaded into use by the authentication of user from server The Website page JavaSript of family end browser(JS)Code by ask website assist verify the local code book of user terminal when Effect property.If locally without code book, or code book fails, then the JS pages in website download new code book from website, and are stored in local Local Storage.User checks web site contents by browser selection.For example, the content of inbox is checked in user's selection.This When, Website page JS codes obtain specific identification code according to rule from code book, such as intercept partial content from code book, and splice.So Afterwards, Website page JS codes return to identification code to Website server, Website server checking identification code.Specifically, website takes The identification code that business device returns to Website page JS codes is compared with correct identification code.If consistent, identification code verification Pass through.In this case, Website server returns to correct page data to browser, is checked for user.For example, now, The information of inbox is presented to user.
Hereinbefore, client and server according to embodiments of the present invention is described referring to figs. 1 to Fig. 4 and should For its information processing method.By apparatus and method according to the invention, do not recycled between client and server Cookie conducts interviews the transmission of data, it is to avoid the problems such as flow that cookie is brought, security.Also, pass through server Client is controlled to carry out information code book sampling, any once sample all is to work as secondary effective, therefore in certain transmitting procedure Occur in that access information is lost, will not also be stolen to steal user network data.
It is pointed out that in actual use, client is not the client of customization, but standard, support The browser of HTML5 technologies, the connected mode of itself and server is also the http protocol of standard.
Just with browser access server data(Such as access some website for supporting the art of this patent point)Process In make use of HTML5 Local Storage technologies, an original step is demonstrate,proved, subsequent access carries the mode of checking information, Strengthen to utilize code book, the mode of individual authentication is accessed every time.
It should be noted that in this manual, term " comprising ", "comprising" or its any other variant are intended to Nonexcludability is included, so that process, method, article or equipment including a series of key elements not only will including those Element, but also other key elements including being not expressly set out, or also include being this process, method, article or equipment Intrinsic key element.In the absence of more restrictions, the key element limited by sentence " including ... ", it is not excluded that including Also there is other identical element in process, method, article or the equipment of the key element.
Finally, in addition it is also necessary to explanation, a series of above-mentioned processing are not only included with order described here in temporal sequence The processing of execution, and the processing including performing parallel or respectively rather than in chronological order.
Through the above description of the embodiments, those skilled in the art can be understood that the present invention can be by Software adds the mode of required hardware platform to realize, naturally it is also possible to all implemented by software.Understood based on such, What technical scheme contributed to background technology can be embodied in the form of software product in whole or in part, The computer software product can be stored in storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are to make Obtain a computer equipment(Can be personal computer, server, or network equipment etc.)Perform each embodiment of the invention Or the method described in some parts of embodiment.
The present invention is described in detail above, principle and embodiment party of the specific case used herein to the present invention Formula is set forth, and the explanation of above example is only intended to the method and its core concept for helping to understand the present invention;Meanwhile, it is right In those of ordinary skill in the art, according to the thought of the present invention, change is had in specific embodiments and applications Part, in summary, this specification content should not be construed as limiting the invention.

Claims (24)

1. a kind of client, is connected by ad hoc fashion with server, including:
First checking information transmitting element, for when client attempts to access that the user data on server, being sent out to server Send to identify the first checking information of specific user;
Code book download unit, in the first checking information on the server by checking in the case of, from server download with The corresponding code book of first checking information;
Memory cell, for storing the code book that the code book download unit is downloaded;
Method of sampling receiving unit, indicates to be used to identify the sampling of the second checking information of specific user for receiving from server The information of method;
Second checking information generation unit, it is single from storage for according to the method for sampling received by method of sampling receiving unit Sampled in effective code book of member storage, produce the second checking information;
Second checking information transmitting element, for the second checking information of generation to be sent into server;
User data receiving unit, in the second checking information on the server by checking in the case of, connect from server Receive user data.
2. client according to claim 1, further comprises:
Code book validity check unit, in the first checking information on the server by checking in the case of, check storage Whether effective code book is stored in unit;
Also, only when code book validity check unit determines not having effective code book in memory cell, activate code book download unit.
3. client according to claim 1, wherein the method for sampling is effective only for time data access is worked as.
4. client according to claim 1, wherein the code book is encryption code book.
5. the client according to claim 1 or 4, wherein the method for sampling is according to certain rule, in code book Any one or more part fields are spliced or map function.
6. client according to claim 5, wherein the method for sampling further comprises the field encryption to splicing.
7. a kind of server, is connected by ad hoc fashion with client, including:
First authentication unit, for when client attempts to access that the data on server, verifying sent from client, conduct First checking information of the first user mark;
Code book transmitting element, in the case of in the first checking information by checking, correspondence code book is sent to client;
Method of sampling transmitting element, the sampling for determining the second checking information for identifying specific user according to ad hoc rules Method, and the information for indicating the method for sampling is sent to client;
Second authentication unit, for verifying the second checking information being sent from client, being sampled according to the method for sampling;
User data transmitting element, in the case of in the second checking information by checking, user data is sent to client.
8. server according to claim 7, further comprises:
Code book validity check unit, in the case of in the first checking information by checking, checks whether deposited in client Effective code book is stored up;
Also, only when code book validity check unit determines not having effective code book in memory cell, activate code book transmitting element.
9. server according to claim 7, wherein the method for sampling is effective only for time data access is worked as.
10. server according to claim 7, wherein the code book is encryption code book.
11. server according to claim 7, wherein the method for sampling is according to certain rule, to any in code book One or more part fields are spliced or map function.
12. server according to claim 11, wherein the method for sampling further comprises the word to splicing or converting Duan Jiami.
13. a kind of information processing method, for a client, the client is connected by ad hoc fashion with server, including Following steps:
When client attempts to access that the user data on server, send and tested for identifying the first of specific user to server Demonstrate,prove information;
In the first checking information on the server by checking in the case of, from server download it is corresponding with the first checking information Code book and the code book for storing download;
Received from server and indicate to be used to identify the information of the method for sampling of the second checking information of specific user;
According to the method for sampling received by method of sampling receiving unit, sampled from effective code book of storage, produce the Two checking informations;
Second checking information of generation is sent to server;
In the second checking information on the server by checking in the case of, from server receive user data.
14. method according to claim 13, wherein:From server download corresponding with the first checking information code book it Before, further check in client whether store effective code book.
15. method according to claim 13, wherein the method for sampling is effective only for time data access is worked as.
16. method according to claim 13, wherein the code book is encryption code book.
17. the method according to claim 13 or 16, wherein the method for sampling is according to certain rule, to appointing in code book One or more part fields of anticipating are spliced or map function.
18. method according to claim 17, wherein the method for sampling further comprises the field to splicing or converting Encryption.
19. a kind of information processing method, for a server, the server is connected by ad hoc fashion with client, including Following steps:
When client attempts to access that the data on server, verify it is being sent from client, for identify specific user the One checking information;
In the case where the first checking information is by checking, code book corresponding with the first checking information is sent to client;
The method of sampling of the second checking information for identifying specific user is determined according to ad hoc rules, and the method for sampling will be indicated Information be sent to client;
Verify the second checking information being sent from client, being sampled according to the method for sampling;
In the case where the second checking information is by checking, user data is sent to client.
20. method according to claim 19, wherein to client send code book corresponding with the first checking information it Before, further check in client whether store effective code book.
21. method according to claim 19, wherein the method for sampling is effective only for time data access is worked as.
22. method according to claim 19, wherein the code book is encryption code book.
23. method according to claim 19, wherein the method for sampling is according to certain rule, to any one in code book Individual or some fields are spliced or map function.
24. method according to claim 23, wherein the method for sampling further comprises the field to splicing or converting Encryption.
CN201210359537.8A 2012-09-24 2012-09-24 Client, server and the information processing method applied to it Active CN103685205B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210359537.8A CN103685205B (en) 2012-09-24 2012-09-24 Client, server and the information processing method applied to it

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210359537.8A CN103685205B (en) 2012-09-24 2012-09-24 Client, server and the information processing method applied to it

Publications (2)

Publication Number Publication Date
CN103685205A CN103685205A (en) 2014-03-26
CN103685205B true CN103685205B (en) 2017-09-29

Family

ID=50321531

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210359537.8A Active CN103685205B (en) 2012-09-24 2012-09-24 Client, server and the information processing method applied to it

Country Status (1)

Country Link
CN (1) CN103685205B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197822A (en) * 2006-12-04 2008-06-11 西门子公司 System for preventing information leakage and method based on the same
CN101599919A (en) * 2008-06-02 2009-12-09 鸿富锦精密工业(深圳)有限公司 The system and method for single-sign-on mail server
CN101645890A (en) * 2009-08-06 2010-02-10 北京飞天诚信科技有限公司 Method, system and corresponding equipment for verifying information source integrality
CN101699820A (en) * 2009-10-30 2010-04-28 北京飞天诚信科技有限公司 Method and device for authenticating dynamic passwords

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1956375A (en) * 2005-10-24 2007-05-02 潘静 Dynamic password identity authentication method and system based on network
US20080256613A1 (en) * 2007-03-13 2008-10-16 Grover Noel J Voice print identification portal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197822A (en) * 2006-12-04 2008-06-11 西门子公司 System for preventing information leakage and method based on the same
CN101599919A (en) * 2008-06-02 2009-12-09 鸿富锦精密工业(深圳)有限公司 The system and method for single-sign-on mail server
CN101645890A (en) * 2009-08-06 2010-02-10 北京飞天诚信科技有限公司 Method, system and corresponding equipment for verifying information source integrality
CN101699820A (en) * 2009-10-30 2010-04-28 北京飞天诚信科技有限公司 Method and device for authenticating dynamic passwords

Also Published As

Publication number Publication date
CN103685205A (en) 2014-03-26

Similar Documents

Publication Publication Date Title
CN101523859B (en) System and method for authenticating remote server access
CN105007280B (en) A kind of application login method and device
CN104021333B (en) Mobile security watch bag
CN104113551B (en) A kind of platform authorization method, platform service end and applications client and system
CN107395614A (en) Single-point logging method and system
CN108809988A (en) A kind of authentication method and system of request
CN106656952A (en) Authentication method, device and system for registration equipment
CN105991589A (en) Method, apparatus, and system for redirection
CN105099707B (en) A kind of offline authentication method, server and system
CN1937498A (en) Dynamic cipher authentication method, system and device
CN112491881A (en) Cross-platform single sign-on method, system, electronic equipment and storage medium
CN102073822A (en) Method and system for preventing user information from leaking
CN106341233A (en) Authentication method for client to log into server, device, system and electronic device
CN106953831A (en) A kind of authorization method of user resources, apparatus and system
CN110113366A (en) A kind of detection method and device of CSRF loophole
CN109040069A (en) A kind of dissemination method, delivery system and the access method of cloud application program
CN104837134B (en) A kind of web authentication user login method, equipment and system
CN107277017A (en) Purview certification method, apparatus and system based on encryption key and device-fingerprint
CN110113329A (en) A kind of verification method and device of identifying code
CN105095729B (en) A kind of Quick Response Code login method, server and system
CN106559386A (en) A kind of authentication method and device
CN110166471A (en) A kind of portal authentication method and device
CN110248356A (en) Information acquisition method and device
CN109495458A (en) A kind of method, system and the associated component of data transmission
CN103685205B (en) Client, server and the information processing method applied to it

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant