CN105915364A - Method for preventing malicious sharing of user identity and device thereof - Google Patents
Method for preventing malicious sharing of user identity and device thereof Download PDFInfo
- Publication number
- CN105915364A CN105915364A CN201510900282.5A CN201510900282A CN105915364A CN 105915364 A CN105915364 A CN 105915364A CN 201510900282 A CN201510900282 A CN 201510900282A CN 105915364 A CN105915364 A CN 105915364A
- Authority
- CN
- China
- Prior art keywords
- user
- content
- access
- information
- maliciously
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/28—Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
Abstract
The application provides a method for preventing malicious sharing of user identity and a device thereof. The method comprises the steps that user identity information and address information performing content accessing through a client side are recorded; the number of times of the same user accessing the same content by adopting different addresses is acquired within a first time period according to the user identity information and the address information; and if the number of times of the same user accessing the same content by adopting different addresses exceeds a first threshold, malicious sharing of the user identity is determined. Screening of the user identity information can be simply and conveniently realized so that malicious sharing of the user identity can be prevented, operation is convenient and rapid and accuracy is high.
Description
Technical field
The application relates to access to content and controls technical field, particularly relates to one and prevents user identity by malice
The method shared and device thereof.
Background technology
Along with the development of Internet technology, user logs in content by specific identity information and provides website,
Carry out access to content, have become as the important way that the network information provides.Such as, user can buy and regard
Frequently content provides the account of website, watches its video content provided by the way of paying.
But when user logs in content offer website by identity informations such as the accounts of purchase, user identity holds
The most stolen, and then maliciously shared, thus provide website to cause damage to content.
Therefore, the easiest user identity that prevents maliciously is shared, and becomes and needs solution in prior art badly
Technical problem.
Summary of the invention
In view of this, the application provides a kind of method preventing user identity from maliciously being shared and device thereof,
Can be easy realize the investigation to subscriber identity information, prevent user identity from maliciously being shared, operation is just
Victory, accuracy rate is high.
A kind of method preventing user identity from maliciously being shared please be provided itself, including:
Record carries out subscriber identity information and the address information of access to content by client;
According to described subscriber identity information and address information, it is thus achieved that within the cycle very first time, same user
Different addresses is used to access the number of times of same content;
The number of times using different addresses to access same content such as described same user exceedes first threshold, then
Determine that described user identity is maliciously shared.
In the application one specific embodiment, described subscriber identity information is the account information of user.
In the application one specific embodiment, described address information is IP address information.
In the application one specific embodiment, described method also includes:
Within the second time cycle, forbid that user that described quilt maliciously shares is to the content in its extent of competence
Conduct interviews.
In the application one specific embodiment, described method also includes:
Second Threshold is exceeded, the most forever as described user is denied access the number of times of the content in its extent of competence
Forbid that user accesses the content in its extent of competence for a long time.
The application also provides for a kind of device preventing user identity from maliciously being shared, including:
Record carries out subscriber identity information and the address information of access to content by client;
According to described subscriber identity information and address information, it is thus achieved that within the cycle very first time, same user
Different addresses is used to access the number of times of same content;
The number of times using different addresses to access same content such as described same user exceedes first threshold, then
Determine that described user identity is maliciously shared.
In the application one specific embodiment, described subscriber identity information is the account information of user.
In the application one specific embodiment, described address information is IP address information.
In the application one specific embodiment, described device also includes:
Within the second time cycle, forbid that user that described quilt maliciously shares is to the content in its extent of competence
Conduct interviews.
In the application one specific embodiment, described device also includes:
Second Threshold is exceeded, the most forever as described user is denied access the number of times of the content in its extent of competence
Forbid that user accesses the content in its extent of competence for a long time.
From above technical scheme, the application record carries out the user identity of access to content by client
Information and address information, and according to described subscriber identity information and address information, it is thus achieved that in the week very first time
In phase, same user uses different addresses to access the number of times of same content.As described same user uses
Different addresses accesses the number of times of same content and exceedes first threshold, it is determined that described user identity is by malice
Share.The application can be easy realize the investigation to subscriber identity information, prevent user identity by malice
Sharing, simple operation, accuracy rate is high.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present application or technical scheme of the prior art, below will be to reality
Execute the required accompanying drawing used in example or description of the prior art to be briefly described, it should be apparent that below,
Accompanying drawing in description is only some embodiments described in the application, for those of ordinary skill in the art
From the point of view of, it is also possible to other accompanying drawing is obtained according to these accompanying drawings.
Fig. 1 is the hardware structure diagram of the server that the application is applied;
Fig. 2 is the flow chart of a kind of method one embodiment preventing user identity from maliciously being shared of the application;
Fig. 3 is the flow chart of a kind of another embodiment of method preventing user identity from maliciously being shared of the application;
Fig. 4 is the flow chart of a kind of method another embodiment preventing user identity from maliciously being shared of the application;
Fig. 5 is the structure chart of a kind of device one embodiment preventing user identity from maliciously being shared of the application;
Fig. 6 is the structure chart of a kind of another embodiment of device preventing user identity from maliciously being shared of the application;
Fig. 7 is the structure chart of a kind of device another embodiment preventing user identity from maliciously being shared of the application;
Fig. 8 is the flow chart of the concrete application of a kind of method preventing user identity from maliciously being shared of the application.
Detailed description of the invention
The application record carries out subscriber identity information and the address information of access to content, and root by client
According to described subscriber identity information and address information, it is thus achieved that within the cycle very first time, same user uses not
Same address accesses the number of times of same content.In using different address access same such as described same user
The number of times held exceedes first threshold, it is determined that described user identity is maliciously shared.The application can be easy
Realize investigation to subscriber identity information, prevent user identity from maliciously being shared, simple operation, accurately
Rate is high.
Certainly, implement arbitrary technical scheme of the application and must be not necessarily required to reach above all excellent simultaneously
Point.
For the technical scheme making those skilled in the art be more fully understood that in the application, below in conjunction with this Shen
Please accompanying drawing in embodiment, the technical scheme in the embodiment of the present application is clearly and completely described,
Obviously, described embodiment is only some embodiments of the present application rather than whole embodiments.Base
Embodiment in the application, the every other embodiment that those of ordinary skill in the art are obtained, all answer
When the scope belonging to the application protection.
Further illustrate the application below in conjunction with illustrations to implement.
The application provides a kind of method preventing user identity from maliciously being shared, and being commonly used to content provides
Other distributions of identification verification function are provided in the Authentication server of website, or content offer website
Formula server.
See Fig. 1, described Authentication server or other distributed servers to generally include: master control
Chip 11, memorizer 12 and other hardware 13.Described main control chip 11 controls each functional module,
Memorizer 12 stores each application program and data.
Seeing Fig. 2, described method includes:
S1, record carry out subscriber identity information and the address information of access to content by client.
Specifically, the account information due to user can provide the unique identities of website as user in content
Mark, herein described subscriber identity information is the account information of user, including account name and password.
IP address refers to Internet protocol address (Internet Protocol Address), is IP Address
Abbreviation.IP address is a kind of unified address format that IP agreement provides, and it is every on the Internet
One network and each hardware device one logical address of distribution, shield the difference of physical address with this.
Owing to IP address is the logical address of the different hardware equipment being connected into the Internet, herein described address
Information is IP address information.
S2, according to described subscriber identity information and address information, it is thus achieved that within the cycle very first time, same
User uses different addresses to access the number of times of same content.
According to described account information and IP address information, it is thus achieved that same account, within the cycle very first time, is adopted
The number of times of same content is accessed with different IP addresses.
Art technology technical staff arranges the described cycle very first time according to demand, is such as set to 24
Hour.
S3, the number of times using different address to access same content such as described same user exceed first threshold,
Then determine that described user identity is maliciously shared.
If within the cycle very first time, same account uses different IP addresses to access the secondary of same content
Number exceedes first threshold, then show that different hardware devices uses same account by different logical addresses
Accessing identical content in a period of time, therefore also non-user itself is carrying out access to content, really
Determine user identity maliciously to be shared.
Art technology technical staff arranges described first threshold according to demand, is such as set to 50 times.
The application can be easy realize the investigation to subscriber identity information, prevent user identity by malice point
Enjoying, simple operation, accuracy rate is high.
During another implements in the application, seeing Fig. 3, described method also includes:
S4, within the second time cycle, forbid that the content in its extent of competence is conducted interviews by described user.
Specifically, if user identity is maliciously shared, then within the second time cycle, forbid that user continues
Content in continuous access authority range, user still can access free content.Thus, it is to avoid due to user
Account is maliciously shared with the loss that content provides website to bring.
Art technology technical staff arranges described second time cycle according to demand, is such as set to 24
Hour.
In the application further implements, seeing Fig. 4, described method also includes:
S4, the number of times being denied access the content in its extent of competence such as described user exceed Second Threshold,
Content in then permanent ban user accesses its extent of competence.
Art technology technical staff arranges described Second Threshold according to demand, is such as set to 10 times.
If the number of times that user is denied access the content in its extent of competence exceedes Second Threshold, namely
Say that the number of times that user account is maliciously shared exceedes Second Threshold, then show user account the most simply quilt
Steal, but malice actively is shared, then the content in permanent ban user accesses its extent of competence.Thus,
Avoid owing to user's actively malice shares the loss that account provides website to bring to content.
Corresponding to said method, the application provides a kind of device preventing user identity from maliciously being shared, logical
It is commonly applied to that the Authentication server of content offer website, or content offer website have identity test
Other distributed servers of card function.
See Fig. 1, described Authentication server or other distributed servers to generally include: master control
Chip 21, memorizer 22 and other hardware 23.Described main control chip 21 controls each functional module,
Memorizer 22 stores each application program and data.
Seeing Fig. 5, described device includes:
Information logging modle 51, for record by client carry out access to content subscriber identity information and
Address information.
Number of times obtains module 52, for according to described subscriber identity information and address information, it is thus achieved that first
In time cycle, same user uses different addresses to access the number of times of same content.
Share and determine module 53, for using different addresses to access same content as described same user
Number of times exceedes first threshold, it is determined that described user identity is maliciously shared.
The application can be easy realize the investigation to subscriber identity information, prevent user identity by malice point
Enjoying, simple operation, accuracy rate is high.
Specifically, the account information due to user can provide the unique identities of website as user in content
Mark, herein described subscriber identity information is the account information of user, including account name and password.
IP address refers to Internet protocol address (Internet Protocol Address), is IP Address
Abbreviation.IP address is a kind of unified address format that IP agreement provides, and it is every on the Internet
One network and each hardware device one logical address of distribution, shield the difference of physical address with this.
Owing to IP address is the logical address of the different hardware equipment being connected into the Internet, herein described address
Information is IP address information.
According to described account information and IP address information, it is thus achieved that same account, within the cycle very first time, is adopted
The number of times of same content is accessed with different IP addresses.
Art technology technical staff arranges the described cycle very first time according to demand, is such as set to 24
Hour.
Art technology technical staff arranges described first threshold according to demand, is such as set to 50 times.
If within the cycle very first time, same account uses different IP addresses to access the secondary of same content
Number exceedes first threshold, then show that different hardware devices uses same account by different logical addresses
Accessing identical content in a period of time, therefore also non-user itself is carrying out access to content, really
Determine user identity maliciously to be shared.
During another implements in the application, seeing Fig. 6, described device also includes:
Access disabled module 54, within the second time cycle, forbid that described user is to its extent of competence
Interior content conducts interviews.
Specifically, if user identity is maliciously shared, then within the second time cycle, forbid that user continues
Content in continuous access authority range, user still can access free content.Thus, it is to avoid due to user
Account is maliciously shared with the loss that content provides website to bring.
Art technology technical staff arranges described second time cycle according to demand, is such as set to 24
Hour.
In the application further implements, seeing Fig. 7, described device also includes:
Permanent ban module 55, for content in described user is denied access its extent of competence time
Number exceedes Second Threshold, then the content in permanent ban user accesses its extent of competence.
Art technology technical staff arranges described Second Threshold according to demand, is such as set to 10 times.
If the number of times that user is denied access the content in its extent of competence exceedes Second Threshold, namely
Say that the number of times that user account is maliciously shared exceedes Second Threshold, then show user account the most simply quilt
Steal, but malice actively is shared, then the content in permanent ban user accesses its extent of competence.Thus,
Avoid owing to user's actively malice shares the loss that account provides website to bring to content.
Further illustrate the application below by the concrete application scenarios of the application one to realize.
The application is applied to a video content and provides the Authentication server of website, and user have purchased video
Content provides the member account of website, thus logs in video content by member's account number and provide website, viewing
Video in member's authority.
Seeing Fig. 8, the method preventing user identity from maliciously being shared of this application scene includes:
801, record carries out member account information and the IP address information of access to content by client.
802, according to described member account information and IP address information, it is thus achieved that in 24 hours, same use
Family uses different IP addresses to access the number of times of same content.
803, the number of times using different IP addresses to access same content such as described same member account exceedes
50 times, it is determined that described member account is maliciously shared.
804, in 24 hours, forbid that the member account being defined as maliciously sharing is in its extent of competence
Content conducts interviews.
805, it is denied access the number of times of the content in its extent of competence more than 10 times such as described member account,
Content in then permanent ban member account accesses its extent of competence.
The application can be easy realize the investigation to subscriber identity information, prevent user identity by malice point
Enjoying, simple operation, accuracy rate is high.
It will be understood by those skilled in the art that embodiments herein can be provided as method, device (equipment),
Or computer program.Therefore, the application can use complete hardware embodiment, complete software implementation,
Or combine the form of embodiment in terms of software and hardware.And, the application can use one or more
The computer-usable storage medium wherein including computer usable program code (includes but not limited to disk
Memorizer, CD-ROM, optical memory etc.) form of the upper computer program implemented.
The application is with reference to method, device (equipment) and the computer program according to the embodiment of the present application
Flow chart and/or block diagram describe.It should be understood that can by computer program instructions flowchart and/
Or the flow process in each flow process in block diagram and/or square frame and flow chart and/or block diagram and/or side
The combination of frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embedded
The processor of datatron or other programmable data processing device is to produce a machine so that by calculating
The instruction that the processor of machine or other programmable data processing device performs produces for realizing at flow chart one
The device of the function specified in individual flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and computer or the process of other programmable datas can be guided to set
In the standby computer-readable memory worked in a specific way so that be stored in this computer-readable memory
In instruction produce and include the manufacture of command device, this command device realize in one flow process of flow chart or
The function specified in multiple flow processs and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device,
Make on computer or other programmable devices, perform sequence of operations step computer implemented to produce
Process, thus the instruction performed on computer or other programmable devices provides for realizing at flow chart
The step of the function specified in one flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
Although having been described for the preferred embodiment of the application, but those skilled in the art once knowing
Basic creative concept, then can make other change and amendment to these embodiments.So, appended power
Profit requires to be intended to be construed to include preferred embodiment and fall into all changes and the amendment of the application scope.
Obviously, those skilled in the art can carry out various change and modification without deviating from the application to the application
Spirit and scope.So, if the application these amendment and modification belong to the application claim and
Within the scope of its equivalent technologies, then the application is also intended to comprise these change and modification.
Claims (10)
1. the method preventing user identity from maliciously being shared, it is characterised in that including:
Record carries out subscriber identity information and the address information of access to content by client;
According to described subscriber identity information and address information, it is thus achieved that within the cycle very first time, same user
Different addresses is used to access the number of times of same content;
The number of times using different addresses to access same content such as described same user exceedes first threshold, then
Determine that described user identity is maliciously shared.
Method the most according to claim 1, it is characterised in that described subscriber identity information is user
Account information.
Method the most according to claim 1, it is characterised in that described address information is IP address
Information.
The most according to the method in any one of claims 1 to 3, it is characterised in that described method is also
Including:
Within the second time cycle, forbid that user that described quilt maliciously shares is to the content in its extent of competence
Conduct interviews.
Method the most according to claim 4, it is characterised in that described method also includes:
Second Threshold is exceeded, the most forever as described user is denied access the number of times of the content in its extent of competence
Forbid that user accesses the content in its extent of competence for a long time.
6. the device preventing user identity from maliciously being shared, it is characterised in that including:
Record carries out subscriber identity information and the address information of access to content by client;
According to described subscriber identity information and address information, it is thus achieved that within the cycle very first time, same user
Different addresses is used to access the number of times of same content;
The number of times using different addresses to access same content such as described same user exceedes first threshold, then
Determine that described user identity is maliciously shared.
Device the most according to claim 6, it is characterised in that described subscriber identity information is user
Account information.
Device the most according to claim 6, it is characterised in that described address information is IP address
Information.
9. according to the device according to any one of claim 6 to 8, it is characterised in that described device is also
Including:
Within the second time cycle, forbid that user that described quilt maliciously shares is to the content in its extent of competence
Conduct interviews.
Device the most according to claim 9, it is characterised in that described device also includes:
Second Threshold is exceeded, the most forever as described user is denied access the number of times of the content in its extent of competence
Forbid that user accesses the content in its extent of competence for a long time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510900282.5A CN105915364A (en) | 2015-12-08 | 2015-12-08 | Method for preventing malicious sharing of user identity and device thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510900282.5A CN105915364A (en) | 2015-12-08 | 2015-12-08 | Method for preventing malicious sharing of user identity and device thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105915364A true CN105915364A (en) | 2016-08-31 |
Family
ID=56744055
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510900282.5A Pending CN105915364A (en) | 2015-12-08 | 2015-12-08 | Method for preventing malicious sharing of user identity and device thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105915364A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108038729A (en) * | 2017-12-18 | 2018-05-15 | 广东欧珀移动通信有限公司 | Reward distribution method, device and server |
CN108197976A (en) * | 2017-12-18 | 2018-06-22 | 广东欧珀移动通信有限公司 | Reward distribution method, device and server |
CN108280692A (en) * | 2018-02-05 | 2018-07-13 | 广州华多网络科技有限公司 | Reward distribution method, device, computer readable storage medium and terminal |
CN110175438A (en) * | 2019-05-27 | 2019-08-27 | 北京奇艺世纪科技有限公司 | Share account detection method and relevant device |
CN110730367A (en) * | 2018-07-17 | 2020-01-24 | 中兴通讯股份有限公司 | Video playing limiting method, device, system and storage medium |
CN111970250A (en) * | 2020-07-27 | 2020-11-20 | 深信服科技股份有限公司 | Method for identifying account sharing, electronic device and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101340332A (en) * | 2007-07-02 | 2009-01-07 | 郑志豪 | Method for preventing website login by illegal user |
CN101626295A (en) * | 2008-07-08 | 2010-01-13 | 中国移动通信集团公司 | Method, device and system for guaranteeing security of network logon |
CN102402517A (en) * | 2010-09-09 | 2012-04-04 | 北京启明星辰信息技术股份有限公司 | Method and system for establishing normal database login model and method and system for detecting abnormal login behavior |
CN103095658A (en) * | 2011-11-03 | 2013-05-08 | 北京神州泰岳软件股份有限公司 | Account login method and system |
CN103427999A (en) * | 2013-08-23 | 2013-12-04 | 北京易优安信息技术有限公司 | User authentication method and system |
CN103607419A (en) * | 2013-08-23 | 2014-02-26 | 合一网络技术(北京)有限公司 | High-quality user account anti-sharing method and system |
CN104065634A (en) * | 2013-05-07 | 2014-09-24 | 腾讯科技(深圳)有限公司 | Online game account stealing processing method and system |
-
2015
- 2015-12-08 CN CN201510900282.5A patent/CN105915364A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101340332A (en) * | 2007-07-02 | 2009-01-07 | 郑志豪 | Method for preventing website login by illegal user |
CN101626295A (en) * | 2008-07-08 | 2010-01-13 | 中国移动通信集团公司 | Method, device and system for guaranteeing security of network logon |
CN102402517A (en) * | 2010-09-09 | 2012-04-04 | 北京启明星辰信息技术股份有限公司 | Method and system for establishing normal database login model and method and system for detecting abnormal login behavior |
CN103095658A (en) * | 2011-11-03 | 2013-05-08 | 北京神州泰岳软件股份有限公司 | Account login method and system |
CN104065634A (en) * | 2013-05-07 | 2014-09-24 | 腾讯科技(深圳)有限公司 | Online game account stealing processing method and system |
CN103427999A (en) * | 2013-08-23 | 2013-12-04 | 北京易优安信息技术有限公司 | User authentication method and system |
CN103607419A (en) * | 2013-08-23 | 2014-02-26 | 合一网络技术(北京)有限公司 | High-quality user account anti-sharing method and system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108038729A (en) * | 2017-12-18 | 2018-05-15 | 广东欧珀移动通信有限公司 | Reward distribution method, device and server |
CN108197976A (en) * | 2017-12-18 | 2018-06-22 | 广东欧珀移动通信有限公司 | Reward distribution method, device and server |
CN108038729B (en) * | 2017-12-18 | 2022-01-11 | Oppo广东移动通信有限公司 | Reward issuing method, device and server |
CN108280692A (en) * | 2018-02-05 | 2018-07-13 | 广州华多网络科技有限公司 | Reward distribution method, device, computer readable storage medium and terminal |
CN110730367A (en) * | 2018-07-17 | 2020-01-24 | 中兴通讯股份有限公司 | Video playing limiting method, device, system and storage medium |
CN110175438A (en) * | 2019-05-27 | 2019-08-27 | 北京奇艺世纪科技有限公司 | Share account detection method and relevant device |
CN111970250A (en) * | 2020-07-27 | 2020-11-20 | 深信服科技股份有限公司 | Method for identifying account sharing, electronic device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105915364A (en) | Method for preventing malicious sharing of user identity and device thereof | |
AU2017323588B2 (en) | Systems and methods for providing identity assurance for decentralized applications | |
US10091127B2 (en) | Enrolling a mobile device with an enterprise mobile device management environment | |
US11582040B2 (en) | Permissions from entities to access information | |
CN107196951B (en) | A kind of implementation method and firewall system of HDFS system firewall | |
CN104717223B (en) | Data access method and device | |
CN110086768B (en) | Service processing method and device | |
US9769654B2 (en) | Method of implementing a right over a content | |
TW201914354A (en) | A binding method, device and system for smart apparatus, and telecommunications system | |
CN106063185A (en) | Methods and apparatus to securely share data | |
CN106878250B (en) | Cross-application single-state login method and device | |
US20120272301A1 (en) | Controlled user account access with automatically revocable temporary password | |
JP7049480B2 (en) | Location-based access to access-controlled resources | |
CN106506511B (en) | A kind of address list information processing method, device | |
US11470067B1 (en) | Secure authentication of devices | |
US10387872B2 (en) | Browser-based payment for content | |
US11281773B2 (en) | Access card penetration testing | |
US20160364565A1 (en) | Authentication and secure communication with application extensions | |
US20210281555A1 (en) | Api key access authorization | |
CN114024751B (en) | Application access control method and device, computer equipment and storage medium | |
CN105224541B (en) | Uniqueness control method, information storage means and the device of data | |
CN105227532B (en) | A kind of blocking-up method and device of malicious act | |
CN104202164B (en) | A kind of method and Cloud Server for protecting cloud service information using digital certificate | |
CN109145621A (en) | Document management method and device | |
CN104426834A (en) | Webpage requesting method, client, server and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160831 |
|
WD01 | Invention patent application deemed withdrawn after publication |