CN105447715A - Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party - Google Patents
Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party Download PDFInfo
- Publication number
- CN105447715A CN105447715A CN201510737225.XA CN201510737225A CN105447715A CN 105447715 A CN105447715 A CN 105447715A CN 201510737225 A CN201510737225 A CN 201510737225A CN 105447715 A CN105447715 A CN 105447715A
- Authority
- CN
- China
- Prior art keywords
- request
- signature
- ciphertext
- subscriber equipment
- party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0208—Trade or exchange of goods or services in exchange for incentives or rewards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0222—During e-commerce, i.e. online transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0633—Lists, e.g. purchase orders, compilation or processing
- G06Q30/0635—Processing of requisition or of purchase orders
- G06Q30/0637—Approvals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/387—Payment using discounts or coupons
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
Landscapes
- Business, Economics & Management (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Economics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a method for anti-theft electronic coupon sweeping by cooperating with a third party. The method comprises: user equipment provided with a third-party application receives a request of taking an electronic coupon, wherein the request includes a ciphertext and a signature that are generated by the user equipment; decryption is carried out on the ciphertext to obtain a plain text; and whether the plain text matches the signature is verified; if so, normal taking is determined. According to the invention, the behavior of the user is verified at different levels during the whole coupon taking processing and whether the behavior is a malicious coupon taking behavior is determined, thereby achieving an objective of coupon sweeping prevention. In addition, the invention also provides a corresponding apparatus.
Description
Technical field
The present invention relates to e-commerce field, be specifically related to a kind of method and apparatus of the illegal electronic coupons cooperated with third party.
Background technology
Day by day universal along with mobile Internet, businessman cooperates with third party APP, sends out reward voucher to corresponding A PP user, has become a lot of businessman and has pulled one of important means of new user and promotion.Businessman generally oneself has a set of neck certificate system, the neck certificate page of oneself can be generated, then an entry position is determined with the APP of cooperation, be arranged to the neck certificate page link address of businessman, when user accesses APP, click this neck certificate address, both entered the neck certificate page, then input handset number or allow user log in carry out getting reward voucher.
Get in reward voucher mode at existing hacker's brush, general employing uninterruptedly simulates normal users neck certificate procedure request, and the modes such as Brute Force identifying code reach the object that reward voucher got by brush.Due to reward voucher restricted number, real user is got less than reward voucher, thus businessman is suffered a loss.
Reward voucher is got in order to prevent above-mentioned hackers brush, getting in reward voucher process, general employing allows user input picture validation code, or when user's input handset number, the cell-phone number to correspondence sends the mode of a checking note to carry out illegal reward voucher.
By existing user's input validation information that directly allows to prevent the stolen brush of reward voucher, have following shortcoming:
1, sacrifice Mobile solution APP Consumer's Experience, reduce reward voucher and get rate: in whole neck certificate flow process, increase allows user read identifying code more, and user fills in identifying code two steps, improves user operation complicacy, user can be made to lead certificate desire to lower;
If 2 adopt picture validation code, or short-message verification prevents brush from getting reward voucher as neck certificate system the only resource, and security is not high, and hacker still can utilize the modes such as Brute Force to carry out robber's brush reward voucher;
3, businessman's cost is improved: sending note is not free dispach (FD), needs to pay certain expense cost to operator.
Summary of the invention
In view of this, the present invention proposes a kind of method of the illegal electronic coupons cooperated with third party, comprise: receive the request of getting electronic coupons from the subscriber equipment being provided with third-party application, described request comprises the ciphertext and signature that are generated by described subscriber equipment; Be decrypted to obtain expressly to described ciphertext; And verify whether described plaintext and signature mate, if coupling, then think normally to get.
The invention allows for a kind of device of the illegal electronic coupons cooperated with third party, comprise: request receiving module, for receiving the request of getting electronic coupons from the subscriber equipment being provided with third-party application, described request comprises the ciphertext and signature that are generated by described subscriber equipment; Deciphering module, for being decrypted described ciphertext; And authentication module, for verifying whether described plaintext and signature mate, if coupling, then think normally to get.
The invention provides a kind of method and apparatus of the illegal electronic coupons for cooperating with third party.Mainly by the behavior in hierarchical authentication of users whole neck certificate process, determine whether that malice leads certificate, prevent reward voucher by the object of brushing to reach.
Accompanying drawing explanation
Accompanying drawing is used for understanding the present invention better, does not form limitation of the invention, wherein:
Fig. 1 shows the overall flow figure getting electronic coupons cooperated with third party APP according to the embodiment of the present invention.
Fig. 2 shows the schematic block diagram verifying the request of neck certificate according to the use encryption of the embodiment of the present invention and digital signature.
Fig. 3 shows the process flow diagram of the method for the statistical study request according to the embodiment of the present invention.
Fig. 4 shows the method 400 of the illegal electronic coupons cooperated with third party according to the embodiment of the present invention.
Fig. 5 shows the device 500 of the illegal electronic coupons cooperated with third party according to the embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing, exemplary embodiment of the present invention is explained, comprising the embodiment of the present invention various details with contribute to understand, they should be thought it is only exemplary.Therefore, one of ordinary skill in the art appreciates that and can make various amendment and change to embodiment described herein, and do not depart from the scope of the present invention and spirit.Also for ease of clear and simple and clear, in below describing, eliminate the description to known function and structure.
Fig. 1 shows the overall flow figure getting electronic coupons cooperated with third party APP according to the embodiment of the present invention.Four modules that this flow process relates to, are respectively encrypting module, request statistical analysis module, and deciphering module, gets number of times statistical analysis module, below in conjunction with the detailed description of Fig. 1 to modules:
1, encrypting module: this module is at APP end, is, before asking neck certificate chained address for user, be encrypted and digital signature according to agreement to related clear data, then ciphertext and signature is passed to neck certificate system.Expressly energy unique identification cell phone apparatus or a user, generally can adopt mobile phone IMEI code or APP unique identification.
2, deciphering module: this module is at neck certificate system end, is lead in certificate process for user, to the transmission ciphertext in above-mentioned encrypting module with digital signature is decrypted and signature verification.
3, number of times statistical analysis module is got: this module is that counting user has got reward voucher number of times, if exceeded institute's configured number, then no longer gets at neck certificate system end.Get on to improve hacker's brush from business rule and get reward voucher cost.
4, statistical analysis module is asked: this module is at neck certificate system end, for adding up the frequency of all request IP, if exceed configuration frequency, thinks machine simulation request.Configuration frequency can adopt often asks the such form of how many times to be configured for how many minutes.
Fig. 2 shows the schematic block diagram verifying the request of neck certificate according to the use encryption of the embodiment of the present invention and digital signature.
Encrypting module is encrypted data, is sightless to user simultaneously.Neck certificate system regards as A end, and APP application regards as B end, and wherein A end can provide a pair public and private key, for PKI A and private key A, B end also can provide a pair public and private key, is PKI B and private key B.The concrete grammar performed in APP application end is as follows:
1, determine encrypting plaintext, APP and neck certificate system can be arranged, general employing mobile phone IMEI code, or APP unique identification is as plaintext;
2, APP end uses the PKI A that neck certificate system provides, and to being expressly encrypted, such as, adopts rsa encryption;
3, the plaintext that APP holds the private key B of use oneself and step 1 to determine generates digital signature;
4, ciphertext step 2 and step 3 generated and signature, along with user clicks the link of neck certificate, send to neck certificate system, to ask electronic coupons.
Then, deciphering module is decrypted the encrypted content that above-mentioned encrypting module transmits, and verifies digital signature.Deciphering and verification object be judge this request be whether user from APP entrance to getting the behavior of reward voucher normal request, instead of hacker directly goes for and asks neck certificate system to carry out neck certificate.The concrete steps performed in neck certificate system are as follows:
1, ciphertext is decrypted: the private key A using neck certificate system to provide, adopts RSA deciphering to be decrypted ciphertext;
2, decipher unsuccessful, then think malice get, directly get failure; Successful decryption, then continue step 3;
3, do digital signature to verify, use APP to provide PKI B, to expressly and digital signature verify, verify that whether and signatures match this plaintext, if do not mated, then thinks maliciously to get, directly get failure; If coupling, then think normally to get, then can select to continue to get number of times module analysis.
Get number of times module analysis and belong to business rules module, fundamental purpose is got reward voucher get cost to improve hackers brush.Such as: if a setting cell-phone number can only get a reward voucher, hacker thinks to get reward voucher on a large scale, then must need in advance to prepare a lot of cell-phone number.Concrete steps are as follows:
1, buffer memory is used to add up number of times: using the plaintext that decrypts in above-mentioned deciphering module as buffer memory Key, when this user gets successfully, then the Value value corresponding to the plaintext Key after this user being asked entrained deciphering to add 1;
2, after user leads certificate request to come in, inquire about the neck certificate number of times Value value that this user is corresponding in the buffer, if exceed institute's configured threshold, then lead certificate unsuccessful; If do not exceeded, then get successfully or continue to ask statistical analysis module.
Fig. 3 shows the process flow diagram of the method 300 of the statistical study request according to the embodiment of the present invention.The method can be performed by request statistical analysis module.
Request statistical analysis module uses the User IP of buffer memory to all requests to do frequency statistics, and analysis statisticaling data, if exceed configuration frequency, be then judged to be it may is machine simulation access, concrete steps are as follows:
1, at neck certificate system end configuration of IP threshold frequency, as every 5 minutes 30 times;
2, read requests IP, use buffer memory by IP and minute add up IP access times, buffer memory Key is the current the number of minutes of IP+, and Value is number of times; By above-mentioned buffer structure, same IP accessed in same minute, then Key is the same, just on corresponding Value, added 1.
3, the number of times occurred in first 5 minutes of analyzing IP; By the Key value described by step 3 from buffer memory, read the value corresponding to 5 Key in first 5 minutes of this IP, then sue for peace, if exceed institute's configured threshold, because Agent IP or the same situation of same gateway outlet IP can be there is, then think and for machine is in analog access, may needs to do further verification process, enter step 4; If do not exceeded, then current for IP minute access times are added 1, and terminate;
4, return client, allow user input picture validation code, or send checking note, do further checking;
5, terminate.
Although in the further verification step 4 of this module, also adopting allows user have input picture validation code, or send the mode of checking note, but when being through this step, by above-mentioned decryption verification with get number of times authentication module and tackle most of malicious requests, just further confirmation is done to the doubtful malice request of getting, reduce reward voucher by brush risk.
Fig. 4 shows the method 400 of the illegal electronic coupons cooperated with third party according to the embodiment of the present invention.
In step 410, receive the request of getting electronic coupons from the subscriber equipment being provided with third-party application, described request comprises the ciphertext and signature that are generated by described subscriber equipment.
In step 420, be decrypted to obtain expressly, if decipher unsuccessfully, getting failure to described ciphertext;
In step 430, verify whether described plaintext and signature mate, if do not mated, get failure, if coupling, then think normally to get.
Preferably, described ciphertext and signature are generated by the unique identifier of the mobile phone IMEI code of arranging and/or third-party application in advance.
Preferably, described ciphertext and signature are generated by RSA Algorithm.
Preferably, step 440 and step 450 can also optionally be performed to verify request further.In step 440, inquire about and corresponding with described plaintext get number of times, if more than the first predetermined threshold, then get failure, if do not exceeded, number of times will be got and increase progressively and advance to step 450.
In step 450, the IP address adding up described subscriber equipment sends the number of times getting coupon-request in the given time, if more than the second predetermined threshold, sends picture validation code or verify that note is to verify further to subscriber equipment.
Fig. 5 shows the device 500 of illegal electronic coupons for cooperating with third party according to the embodiment of the present invention.
Described device 500 comprises: request receiving module 510, and for receiving the request of getting electronic coupons from the subscriber equipment being provided with third-party application, described request comprises the ciphertext and signature that are generated by described subscriber equipment; Decoder module 520, for being decrypted described ciphertext, if decipher unsuccessfully, gets failure; Authentication module 530, for verifying whether described plaintext and signature mate, if do not mated, get failure.
Preferably, described ciphertext and signature are generated by the unique identifier of the mobile phone IMEI code of arranging and/or third-party application in advance.
Preferably, wherein said ciphertext and signature are generated by RSA Algorithm.
Preferably, described device 500 also comprises gets number of times statistical analysis module 440, corresponding with described plaintext getting number of times, if more than the first predetermined threshold, then get failure, if do not exceeded, will get number of times and increasing progressively for inquiring about.
Preferably you, described device 500 also comprises request statistical analysis module 550, IP address for adding up described subscriber equipment sends the number of times getting coupon-request in the given time, if more than the second predetermined threshold, send picture validation code to subscriber equipment or verify that note is to verify further.
It should be noted that above steps and module hierarchical verify the request of getting electronic coupons.Therefore, it will be appreciated by those skilled in the art that and can therefrom select the step of any appropriate and module to combine, or the adjustment of any appropriate is carried out to execution sequence, to reach getting from third-party application the object that coupon-request verifies.
It should be noted that and these are only preferred embodiment of the present invention and principle.Person of skill in the art will appreciate that, the invention is not restricted to specific embodiment here.Those skilled in the art can make various significant change, adjustment and substitute, and does not depart from protection scope of the present invention.Scope of the present invention is defined by claims.
Claims (10)
1. a method for the illegal electronic coupons cooperated with third party, comprising:
Receive the request of getting electronic coupons from the subscriber equipment being provided with third-party application, described request comprises the ciphertext and signature that are generated by described subscriber equipment;
Be decrypted to obtain expressly to described ciphertext; And
Verify whether described plaintext and signature mate, if coupling, then think normally to get.
2. method according to claim 1, wherein said ciphertext and signature are generated by the unique identifier of the mobile phone IMEI code of arranging and/or third-party application in advance.
3. method according to claim 1 and 2, wherein said ciphertext and signature are generated by RSA Algorithm.
4. method according to claim 1, also comprises
Inquire about and corresponding with described plaintext get number of times, if more than the first predetermined threshold, then get failure, if do not exceeded, number of times will be got and increase progressively.
5. the method according to claim 1 or 4, also comprises
The IP address adding up described subscriber equipment sends the number of times getting coupon-request in the given time, if more than the second predetermined threshold, sends picture validation code or verify that note is to verify further to subscriber equipment.
6. a device for the illegal electronic coupons cooperated with third party, comprising:
Request receiving module, for receiving the request of getting electronic coupons from the subscriber equipment being provided with third-party application, described request comprises the ciphertext and signature that are generated by described subscriber equipment;
Deciphering module, for being decrypted described ciphertext; And
Authentication module, for verifying whether described plaintext and signature mate, if coupling, then think normally to get.
7. device according to claim 6, wherein said ciphertext and signature are generated by the unique identifier of the mobile phone IMEI code of arranging and/or third-party application in advance.
8. the device according to claim 6 or 7, wherein said ciphertext and signature are generated by RSA Algorithm.
9. device according to claim 6, also comprises
Get number of times statistical analysis module, corresponding with described plaintext getting number of times for inquiring about, if more than the first predetermined threshold, then get failure, if do not exceeded, number of times will be got and increase progressively.
10. the device according to claim 6 or 9, also comprises
Request statistical analysis module, sends for the IP address adding up described subscriber equipment the number of times getting coupon-request in the given time, if more than the second predetermined threshold, sends picture validation code or verify that note is to verify further to subscriber equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510737225.XA CN105447715A (en) | 2015-11-03 | 2015-11-03 | Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510737225.XA CN105447715A (en) | 2015-11-03 | 2015-11-03 | Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105447715A true CN105447715A (en) | 2016-03-30 |
Family
ID=55557852
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510737225.XA Pending CN105447715A (en) | 2015-11-03 | 2015-11-03 | Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105447715A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106992972A (en) * | 2017-03-15 | 2017-07-28 | 咪咕数字传媒有限公司 | A kind of cut-in method and device |
CN107484032A (en) * | 2017-09-08 | 2017-12-15 | 武汉斗鱼网络科技有限公司 | Prevent the verification method and device brushed |
CN107529078A (en) * | 2017-09-08 | 2017-12-29 | 武汉斗鱼网络科技有限公司 | Prevent the verification method and device brushed |
CN108733728A (en) * | 2017-04-25 | 2018-11-02 | 北京京东尚科信息技术有限公司 | Time series data statistical method, device, computer equipment and readable storage medium storing program for executing |
CN109102314A (en) * | 2017-06-20 | 2018-12-28 | 北京嘀嘀无限科技发展有限公司 | Information processing method, system and computer installation |
CN109213598A (en) * | 2018-07-03 | 2019-01-15 | 努比亚技术有限公司 | A kind of resource allocation methods, device and computer readable storage medium |
CN109509020A (en) * | 2018-10-22 | 2019-03-22 | 阿里巴巴集团控股有限公司 | A kind of discount coupon amount of money checking method and device |
CN110580782A (en) * | 2019-09-12 | 2019-12-17 | 深圳市丰巢科技有限公司 | Method, device and equipment for processing electronic ticket of express delivery cabinet and storage medium |
CN111865600A (en) * | 2019-04-26 | 2020-10-30 | 卡西欧计算机株式会社 | Server device, recording medium, information processing system, and information processing method |
CN111932290A (en) * | 2020-06-30 | 2020-11-13 | 五八到家有限公司 | Request processing method, device, equipment and storage medium |
US11341198B2 (en) | 2017-06-20 | 2022-05-24 | Beijing Didi Infinity Technology And Development Co., Ltd. | Systems and methods for data processing related to an online to offline service |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1746809A (en) * | 2004-09-07 | 2006-03-15 | 索尼株式会社 | Biometric identification system |
CN101179374A (en) * | 2006-11-09 | 2008-05-14 | 日电(中国)有限公司 | Communication equipment, communications system and method therefor |
CN103093375A (en) * | 2012-12-31 | 2013-05-08 | 邬国锐 | Electronic coupon processing system and method |
CN104618226A (en) * | 2015-02-16 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Information processing method, client and server |
CN104899747A (en) * | 2014-08-28 | 2015-09-09 | 腾讯科技(深圳)有限公司 | Virtual bill generating and verifying method, apparatus and system |
-
2015
- 2015-11-03 CN CN201510737225.XA patent/CN105447715A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1746809A (en) * | 2004-09-07 | 2006-03-15 | 索尼株式会社 | Biometric identification system |
CN101179374A (en) * | 2006-11-09 | 2008-05-14 | 日电(中国)有限公司 | Communication equipment, communications system and method therefor |
CN103093375A (en) * | 2012-12-31 | 2013-05-08 | 邬国锐 | Electronic coupon processing system and method |
CN104899747A (en) * | 2014-08-28 | 2015-09-09 | 腾讯科技(深圳)有限公司 | Virtual bill generating and verifying method, apparatus and system |
CN104618226A (en) * | 2015-02-16 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Information processing method, client and server |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106992972A (en) * | 2017-03-15 | 2017-07-28 | 咪咕数字传媒有限公司 | A kind of cut-in method and device |
CN106992972B (en) * | 2017-03-15 | 2018-09-04 | 咪咕数字传媒有限公司 | A kind of cut-in method and device |
CN108733728A (en) * | 2017-04-25 | 2018-11-02 | 北京京东尚科信息技术有限公司 | Time series data statistical method, device, computer equipment and readable storage medium storing program for executing |
CN108733728B (en) * | 2017-04-25 | 2020-12-22 | 北京京东尚科信息技术有限公司 | Time sequence data statistical method and device, computer equipment and readable storage medium |
CN112862531A (en) * | 2017-06-20 | 2021-05-28 | 北京嘀嘀无限科技发展有限公司 | Information processing method, apparatus and computer readable storage medium |
CN109102314A (en) * | 2017-06-20 | 2018-12-28 | 北京嘀嘀无限科技发展有限公司 | Information processing method, system and computer installation |
US11341198B2 (en) | 2017-06-20 | 2022-05-24 | Beijing Didi Infinity Technology And Development Co., Ltd. | Systems and methods for data processing related to an online to offline service |
CN107529078A (en) * | 2017-09-08 | 2017-12-29 | 武汉斗鱼网络科技有限公司 | Prevent the verification method and device brushed |
WO2019047375A1 (en) * | 2017-09-08 | 2019-03-14 | 武汉斗鱼网络科技有限公司 | Authentication method, device, server and storage medium for preventing automated gift farming |
CN107529078B (en) * | 2017-09-08 | 2019-08-02 | 武汉斗鱼网络科技有限公司 | Prevent the verification method brushed and device |
WO2019047511A1 (en) * | 2017-09-08 | 2019-03-14 | 武汉斗鱼网络科技有限公司 | Method, device, and live broadcast system for preventing automated farming |
CN107484032A (en) * | 2017-09-08 | 2017-12-15 | 武汉斗鱼网络科技有限公司 | Prevent the verification method and device brushed |
CN109213598A (en) * | 2018-07-03 | 2019-01-15 | 努比亚技术有限公司 | A kind of resource allocation methods, device and computer readable storage medium |
CN109509020A (en) * | 2018-10-22 | 2019-03-22 | 阿里巴巴集团控股有限公司 | A kind of discount coupon amount of money checking method and device |
CN109509020B (en) * | 2018-10-22 | 2023-10-17 | 创新先进技术有限公司 | Coupon amount checking method and device |
CN111865600A (en) * | 2019-04-26 | 2020-10-30 | 卡西欧计算机株式会社 | Server device, recording medium, information processing system, and information processing method |
CN111865600B (en) * | 2019-04-26 | 2024-03-15 | 卡西欧计算机株式会社 | Coupon providing system and coupon providing method |
CN110580782A (en) * | 2019-09-12 | 2019-12-17 | 深圳市丰巢科技有限公司 | Method, device and equipment for processing electronic ticket of express delivery cabinet and storage medium |
CN110580782B (en) * | 2019-09-12 | 2022-01-07 | 深圳市丰巢科技有限公司 | Method, device and equipment for processing electronic ticket of express delivery cabinet and storage medium |
CN111932290A (en) * | 2020-06-30 | 2020-11-13 | 五八到家有限公司 | Request processing method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105447715A (en) | Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party | |
CN103685282B (en) | A kind of identity identifying method based on single-sign-on | |
US9197420B2 (en) | Using information in a digital certificate to authenticate a network of a wireless access point | |
CN106161032B (en) | A kind of identity authentication method and device | |
WO2018050081A1 (en) | Device identity authentication method and apparatus, electric device, and storage medium | |
CN111615105B (en) | Information providing and acquiring method, device and terminal | |
CN107295011B (en) | Webpage security authentication method and device | |
CN103684766B (en) | A kind of private key protection method of terminal use and system | |
US20170208049A1 (en) | Key agreement method and device for verification information | |
CN108243176B (en) | Data transmission method and device | |
CN110690956B (en) | Bidirectional authentication method and system, server and terminal | |
CN108322416B (en) | Security authentication implementation method, device and system | |
WO2015003503A1 (en) | Network device, terminal device and information security improving method | |
CN105814837B (en) | Method, equipment and system for directionally counting flow | |
CN101621794A (en) | Method for realizing safe authentication of wireless application service system | |
CN112823503B (en) | Data access method, data access device and mobile terminal | |
CN104243452B (en) | A kind of cloud computing access control method and system | |
KR20150135032A (en) | System and method for updating secret key using physical unclonable function | |
CN110035035B (en) | Secondary authentication method and system for single sign-on | |
CN104463584A (en) | Method for achieving mobile terminal App safety payment | |
CN106656955A (en) | Communication method and system and user terminal | |
CN105024813A (en) | Server, user equipment and interactive method of the user equipment and the server | |
CN109495458A (en) | A kind of method, system and the associated component of data transmission | |
KR101358375B1 (en) | Prevention security system and method for smishing | |
CN114338091B (en) | Data transmission method, device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160330 |
|
RJ01 | Rejection of invention patent application after publication |