CN105915364A - Method for preventing malicious sharing of user identity and device thereof - Google Patents

Method for preventing malicious sharing of user identity and device thereof Download PDF

Info

Publication number
CN105915364A
CN105915364A CN201510900282.5A CN201510900282A CN105915364A CN 105915364 A CN105915364 A CN 105915364A CN 201510900282 A CN201510900282 A CN 201510900282A CN 105915364 A CN105915364 A CN 105915364A
Authority
CN
China
Prior art keywords
user
content
access
information
maliciously
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510900282.5A
Other languages
Chinese (zh)
Inventor
黄梦雅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Information Technology Beijing Co Ltd
Original Assignee
LeTV Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Information Technology Beijing Co Ltd filed Critical LeTV Information Technology Beijing Co Ltd
Priority to CN201510900282.5A priority Critical patent/CN105915364A/en
Publication of CN105915364A publication Critical patent/CN105915364A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration

Abstract

The application provides a method for preventing malicious sharing of user identity and a device thereof. The method comprises the steps that user identity information and address information performing content accessing through a client side are recorded; the number of times of the same user accessing the same content by adopting different addresses is acquired within a first time period according to the user identity information and the address information; and if the number of times of the same user accessing the same content by adopting different addresses exceeds a first threshold, malicious sharing of the user identity is determined. Screening of the user identity information can be simply and conveniently realized so that malicious sharing of the user identity can be prevented, operation is convenient and rapid and accuracy is high.

Description

A kind of method preventing user identity from maliciously being shared and device thereof
Technical field
The application relates to access to content and controls technical field, particularly relates to one and prevents user identity by malice The method shared and device thereof.
Background technology
Along with the development of Internet technology, user logs in content by specific identity information and provides website, Carry out access to content, have become as the important way that the network information provides.Such as, user can buy and regard Frequently content provides the account of website, watches its video content provided by the way of paying.
But when user logs in content offer website by identity informations such as the accounts of purchase, user identity holds The most stolen, and then maliciously shared, thus provide website to cause damage to content.
Therefore, the easiest user identity that prevents maliciously is shared, and becomes and needs solution in prior art badly Technical problem.
Summary of the invention
In view of this, the application provides a kind of method preventing user identity from maliciously being shared and device thereof, Can be easy realize the investigation to subscriber identity information, prevent user identity from maliciously being shared, operation is just Victory, accuracy rate is high.
A kind of method preventing user identity from maliciously being shared please be provided itself, including:
Record carries out subscriber identity information and the address information of access to content by client;
According to described subscriber identity information and address information, it is thus achieved that within the cycle very first time, same user Different addresses is used to access the number of times of same content;
The number of times using different addresses to access same content such as described same user exceedes first threshold, then Determine that described user identity is maliciously shared.
In the application one specific embodiment, described subscriber identity information is the account information of user.
In the application one specific embodiment, described address information is IP address information.
In the application one specific embodiment, described method also includes:
Within the second time cycle, forbid that user that described quilt maliciously shares is to the content in its extent of competence Conduct interviews.
In the application one specific embodiment, described method also includes:
Second Threshold is exceeded, the most forever as described user is denied access the number of times of the content in its extent of competence Forbid that user accesses the content in its extent of competence for a long time.
The application also provides for a kind of device preventing user identity from maliciously being shared, including:
Record carries out subscriber identity information and the address information of access to content by client;
According to described subscriber identity information and address information, it is thus achieved that within the cycle very first time, same user Different addresses is used to access the number of times of same content;
The number of times using different addresses to access same content such as described same user exceedes first threshold, then Determine that described user identity is maliciously shared.
In the application one specific embodiment, described subscriber identity information is the account information of user.
In the application one specific embodiment, described address information is IP address information.
In the application one specific embodiment, described device also includes:
Within the second time cycle, forbid that user that described quilt maliciously shares is to the content in its extent of competence Conduct interviews.
In the application one specific embodiment, described device also includes:
Second Threshold is exceeded, the most forever as described user is denied access the number of times of the content in its extent of competence Forbid that user accesses the content in its extent of competence for a long time.
From above technical scheme, the application record carries out the user identity of access to content by client Information and address information, and according to described subscriber identity information and address information, it is thus achieved that in the week very first time In phase, same user uses different addresses to access the number of times of same content.As described same user uses Different addresses accesses the number of times of same content and exceedes first threshold, it is determined that described user identity is by malice Share.The application can be easy realize the investigation to subscriber identity information, prevent user identity by malice Sharing, simple operation, accuracy rate is high.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present application or technical scheme of the prior art, below will be to reality Execute the required accompanying drawing used in example or description of the prior art to be briefly described, it should be apparent that below, Accompanying drawing in description is only some embodiments described in the application, for those of ordinary skill in the art From the point of view of, it is also possible to other accompanying drawing is obtained according to these accompanying drawings.
Fig. 1 is the hardware structure diagram of the server that the application is applied;
Fig. 2 is the flow chart of a kind of method one embodiment preventing user identity from maliciously being shared of the application;
Fig. 3 is the flow chart of a kind of another embodiment of method preventing user identity from maliciously being shared of the application;
Fig. 4 is the flow chart of a kind of method another embodiment preventing user identity from maliciously being shared of the application;
Fig. 5 is the structure chart of a kind of device one embodiment preventing user identity from maliciously being shared of the application;
Fig. 6 is the structure chart of a kind of another embodiment of device preventing user identity from maliciously being shared of the application;
Fig. 7 is the structure chart of a kind of device another embodiment preventing user identity from maliciously being shared of the application;
Fig. 8 is the flow chart of the concrete application of a kind of method preventing user identity from maliciously being shared of the application.
Detailed description of the invention
The application record carries out subscriber identity information and the address information of access to content, and root by client According to described subscriber identity information and address information, it is thus achieved that within the cycle very first time, same user uses not Same address accesses the number of times of same content.In using different address access same such as described same user The number of times held exceedes first threshold, it is determined that described user identity is maliciously shared.The application can be easy Realize investigation to subscriber identity information, prevent user identity from maliciously being shared, simple operation, accurately Rate is high.
Certainly, implement arbitrary technical scheme of the application and must be not necessarily required to reach above all excellent simultaneously Point.
For the technical scheme making those skilled in the art be more fully understood that in the application, below in conjunction with this Shen Please accompanying drawing in embodiment, the technical scheme in the embodiment of the present application is clearly and completely described, Obviously, described embodiment is only some embodiments of the present application rather than whole embodiments.Base Embodiment in the application, the every other embodiment that those of ordinary skill in the art are obtained, all answer When the scope belonging to the application protection.
Further illustrate the application below in conjunction with illustrations to implement.
The application provides a kind of method preventing user identity from maliciously being shared, and being commonly used to content provides Other distributions of identification verification function are provided in the Authentication server of website, or content offer website Formula server.
See Fig. 1, described Authentication server or other distributed servers to generally include: master control Chip 11, memorizer 12 and other hardware 13.Described main control chip 11 controls each functional module, Memorizer 12 stores each application program and data.
Seeing Fig. 2, described method includes:
S1, record carry out subscriber identity information and the address information of access to content by client.
Specifically, the account information due to user can provide the unique identities of website as user in content Mark, herein described subscriber identity information is the account information of user, including account name and password.
IP address refers to Internet protocol address (Internet Protocol Address), is IP Address Abbreviation.IP address is a kind of unified address format that IP agreement provides, and it is every on the Internet One network and each hardware device one logical address of distribution, shield the difference of physical address with this.
Owing to IP address is the logical address of the different hardware equipment being connected into the Internet, herein described address Information is IP address information.
S2, according to described subscriber identity information and address information, it is thus achieved that within the cycle very first time, same User uses different addresses to access the number of times of same content.
According to described account information and IP address information, it is thus achieved that same account, within the cycle very first time, is adopted The number of times of same content is accessed with different IP addresses.
Art technology technical staff arranges the described cycle very first time according to demand, is such as set to 24 Hour.
S3, the number of times using different address to access same content such as described same user exceed first threshold, Then determine that described user identity is maliciously shared.
If within the cycle very first time, same account uses different IP addresses to access the secondary of same content Number exceedes first threshold, then show that different hardware devices uses same account by different logical addresses Accessing identical content in a period of time, therefore also non-user itself is carrying out access to content, really Determine user identity maliciously to be shared.
Art technology technical staff arranges described first threshold according to demand, is such as set to 50 times.
The application can be easy realize the investigation to subscriber identity information, prevent user identity by malice point Enjoying, simple operation, accuracy rate is high.
During another implements in the application, seeing Fig. 3, described method also includes:
S4, within the second time cycle, forbid that the content in its extent of competence is conducted interviews by described user.
Specifically, if user identity is maliciously shared, then within the second time cycle, forbid that user continues Content in continuous access authority range, user still can access free content.Thus, it is to avoid due to user Account is maliciously shared with the loss that content provides website to bring.
Art technology technical staff arranges described second time cycle according to demand, is such as set to 24 Hour.
In the application further implements, seeing Fig. 4, described method also includes:
S4, the number of times being denied access the content in its extent of competence such as described user exceed Second Threshold, Content in then permanent ban user accesses its extent of competence.
Art technology technical staff arranges described Second Threshold according to demand, is such as set to 10 times.
If the number of times that user is denied access the content in its extent of competence exceedes Second Threshold, namely Say that the number of times that user account is maliciously shared exceedes Second Threshold, then show user account the most simply quilt Steal, but malice actively is shared, then the content in permanent ban user accesses its extent of competence.Thus, Avoid owing to user's actively malice shares the loss that account provides website to bring to content.
Corresponding to said method, the application provides a kind of device preventing user identity from maliciously being shared, logical It is commonly applied to that the Authentication server of content offer website, or content offer website have identity test Other distributed servers of card function.
See Fig. 1, described Authentication server or other distributed servers to generally include: master control Chip 21, memorizer 22 and other hardware 23.Described main control chip 21 controls each functional module, Memorizer 22 stores each application program and data.
Seeing Fig. 5, described device includes:
Information logging modle 51, for record by client carry out access to content subscriber identity information and Address information.
Number of times obtains module 52, for according to described subscriber identity information and address information, it is thus achieved that first In time cycle, same user uses different addresses to access the number of times of same content.
Share and determine module 53, for using different addresses to access same content as described same user Number of times exceedes first threshold, it is determined that described user identity is maliciously shared.
The application can be easy realize the investigation to subscriber identity information, prevent user identity by malice point Enjoying, simple operation, accuracy rate is high.
Specifically, the account information due to user can provide the unique identities of website as user in content Mark, herein described subscriber identity information is the account information of user, including account name and password.
IP address refers to Internet protocol address (Internet Protocol Address), is IP Address Abbreviation.IP address is a kind of unified address format that IP agreement provides, and it is every on the Internet One network and each hardware device one logical address of distribution, shield the difference of physical address with this.
Owing to IP address is the logical address of the different hardware equipment being connected into the Internet, herein described address Information is IP address information.
According to described account information and IP address information, it is thus achieved that same account, within the cycle very first time, is adopted The number of times of same content is accessed with different IP addresses.
Art technology technical staff arranges the described cycle very first time according to demand, is such as set to 24 Hour.
Art technology technical staff arranges described first threshold according to demand, is such as set to 50 times.
If within the cycle very first time, same account uses different IP addresses to access the secondary of same content Number exceedes first threshold, then show that different hardware devices uses same account by different logical addresses Accessing identical content in a period of time, therefore also non-user itself is carrying out access to content, really Determine user identity maliciously to be shared.
During another implements in the application, seeing Fig. 6, described device also includes:
Access disabled module 54, within the second time cycle, forbid that described user is to its extent of competence Interior content conducts interviews.
Specifically, if user identity is maliciously shared, then within the second time cycle, forbid that user continues Content in continuous access authority range, user still can access free content.Thus, it is to avoid due to user Account is maliciously shared with the loss that content provides website to bring.
Art technology technical staff arranges described second time cycle according to demand, is such as set to 24 Hour.
In the application further implements, seeing Fig. 7, described device also includes:
Permanent ban module 55, for content in described user is denied access its extent of competence time Number exceedes Second Threshold, then the content in permanent ban user accesses its extent of competence.
Art technology technical staff arranges described Second Threshold according to demand, is such as set to 10 times.
If the number of times that user is denied access the content in its extent of competence exceedes Second Threshold, namely Say that the number of times that user account is maliciously shared exceedes Second Threshold, then show user account the most simply quilt Steal, but malice actively is shared, then the content in permanent ban user accesses its extent of competence.Thus, Avoid owing to user's actively malice shares the loss that account provides website to bring to content.
Further illustrate the application below by the concrete application scenarios of the application one to realize.
The application is applied to a video content and provides the Authentication server of website, and user have purchased video Content provides the member account of website, thus logs in video content by member's account number and provide website, viewing Video in member's authority.
Seeing Fig. 8, the method preventing user identity from maliciously being shared of this application scene includes:
801, record carries out member account information and the IP address information of access to content by client.
802, according to described member account information and IP address information, it is thus achieved that in 24 hours, same use Family uses different IP addresses to access the number of times of same content.
803, the number of times using different IP addresses to access same content such as described same member account exceedes 50 times, it is determined that described member account is maliciously shared.
804, in 24 hours, forbid that the member account being defined as maliciously sharing is in its extent of competence Content conducts interviews.
805, it is denied access the number of times of the content in its extent of competence more than 10 times such as described member account, Content in then permanent ban member account accesses its extent of competence.
The application can be easy realize the investigation to subscriber identity information, prevent user identity by malice point Enjoying, simple operation, accuracy rate is high.
It will be understood by those skilled in the art that embodiments herein can be provided as method, device (equipment), Or computer program.Therefore, the application can use complete hardware embodiment, complete software implementation, Or combine the form of embodiment in terms of software and hardware.And, the application can use one or more The computer-usable storage medium wherein including computer usable program code (includes but not limited to disk Memorizer, CD-ROM, optical memory etc.) form of the upper computer program implemented.
The application is with reference to method, device (equipment) and the computer program according to the embodiment of the present application Flow chart and/or block diagram describe.It should be understood that can by computer program instructions flowchart and/ Or the flow process in each flow process in block diagram and/or square frame and flow chart and/or block diagram and/or side The combination of frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embedded The processor of datatron or other programmable data processing device is to produce a machine so that by calculating The instruction that the processor of machine or other programmable data processing device performs produces for realizing at flow chart one The device of the function specified in individual flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and computer or the process of other programmable datas can be guided to set In the standby computer-readable memory worked in a specific way so that be stored in this computer-readable memory In instruction produce and include the manufacture of command device, this command device realize in one flow process of flow chart or The function specified in multiple flow processs and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, Make on computer or other programmable devices, perform sequence of operations step computer implemented to produce Process, thus the instruction performed on computer or other programmable devices provides for realizing at flow chart The step of the function specified in one flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
Although having been described for the preferred embodiment of the application, but those skilled in the art once knowing Basic creative concept, then can make other change and amendment to these embodiments.So, appended power Profit requires to be intended to be construed to include preferred embodiment and fall into all changes and the amendment of the application scope. Obviously, those skilled in the art can carry out various change and modification without deviating from the application to the application Spirit and scope.So, if the application these amendment and modification belong to the application claim and Within the scope of its equivalent technologies, then the application is also intended to comprise these change and modification.

Claims (10)

1. the method preventing user identity from maliciously being shared, it is characterised in that including:
Record carries out subscriber identity information and the address information of access to content by client;
According to described subscriber identity information and address information, it is thus achieved that within the cycle very first time, same user Different addresses is used to access the number of times of same content;
The number of times using different addresses to access same content such as described same user exceedes first threshold, then Determine that described user identity is maliciously shared.
Method the most according to claim 1, it is characterised in that described subscriber identity information is user Account information.
Method the most according to claim 1, it is characterised in that described address information is IP address Information.
The most according to the method in any one of claims 1 to 3, it is characterised in that described method is also Including:
Within the second time cycle, forbid that user that described quilt maliciously shares is to the content in its extent of competence Conduct interviews.
Method the most according to claim 4, it is characterised in that described method also includes:
Second Threshold is exceeded, the most forever as described user is denied access the number of times of the content in its extent of competence Forbid that user accesses the content in its extent of competence for a long time.
6. the device preventing user identity from maliciously being shared, it is characterised in that including:
Record carries out subscriber identity information and the address information of access to content by client;
According to described subscriber identity information and address information, it is thus achieved that within the cycle very first time, same user Different addresses is used to access the number of times of same content;
The number of times using different addresses to access same content such as described same user exceedes first threshold, then Determine that described user identity is maliciously shared.
Device the most according to claim 6, it is characterised in that described subscriber identity information is user Account information.
Device the most according to claim 6, it is characterised in that described address information is IP address Information.
9. according to the device according to any one of claim 6 to 8, it is characterised in that described device is also Including:
Within the second time cycle, forbid that user that described quilt maliciously shares is to the content in its extent of competence Conduct interviews.
Device the most according to claim 9, it is characterised in that described device also includes:
Second Threshold is exceeded, the most forever as described user is denied access the number of times of the content in its extent of competence Forbid that user accesses the content in its extent of competence for a long time.
CN201510900282.5A 2015-12-08 2015-12-08 Method for preventing malicious sharing of user identity and device thereof Pending CN105915364A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510900282.5A CN105915364A (en) 2015-12-08 2015-12-08 Method for preventing malicious sharing of user identity and device thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510900282.5A CN105915364A (en) 2015-12-08 2015-12-08 Method for preventing malicious sharing of user identity and device thereof

Publications (1)

Publication Number Publication Date
CN105915364A true CN105915364A (en) 2016-08-31

Family

ID=56744055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510900282.5A Pending CN105915364A (en) 2015-12-08 2015-12-08 Method for preventing malicious sharing of user identity and device thereof

Country Status (1)

Country Link
CN (1) CN105915364A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108038729A (en) * 2017-12-18 2018-05-15 广东欧珀移动通信有限公司 Reward distribution method, device and server
CN108197976A (en) * 2017-12-18 2018-06-22 广东欧珀移动通信有限公司 Reward distribution method, device and server
CN108280692A (en) * 2018-02-05 2018-07-13 广州华多网络科技有限公司 Reward distribution method, device, computer readable storage medium and terminal
CN110175438A (en) * 2019-05-27 2019-08-27 北京奇艺世纪科技有限公司 Share account detection method and relevant device
CN110730367A (en) * 2018-07-17 2020-01-24 中兴通讯股份有限公司 Video playing limiting method, device, system and storage medium
CN111970250A (en) * 2020-07-27 2020-11-20 深信服科技股份有限公司 Method for identifying account sharing, electronic device and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340332A (en) * 2007-07-02 2009-01-07 郑志豪 Method for preventing website login by illegal user
CN101626295A (en) * 2008-07-08 2010-01-13 中国移动通信集团公司 Method, device and system for guaranteeing security of network logon
CN102402517A (en) * 2010-09-09 2012-04-04 北京启明星辰信息技术股份有限公司 Method and system for establishing normal database login model and method and system for detecting abnormal login behavior
CN103095658A (en) * 2011-11-03 2013-05-08 北京神州泰岳软件股份有限公司 Account login method and system
CN103427999A (en) * 2013-08-23 2013-12-04 北京易优安信息技术有限公司 User authentication method and system
CN103607419A (en) * 2013-08-23 2014-02-26 合一网络技术(北京)有限公司 High-quality user account anti-sharing method and system
CN104065634A (en) * 2013-05-07 2014-09-24 腾讯科技(深圳)有限公司 Online game account stealing processing method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101340332A (en) * 2007-07-02 2009-01-07 郑志豪 Method for preventing website login by illegal user
CN101626295A (en) * 2008-07-08 2010-01-13 中国移动通信集团公司 Method, device and system for guaranteeing security of network logon
CN102402517A (en) * 2010-09-09 2012-04-04 北京启明星辰信息技术股份有限公司 Method and system for establishing normal database login model and method and system for detecting abnormal login behavior
CN103095658A (en) * 2011-11-03 2013-05-08 北京神州泰岳软件股份有限公司 Account login method and system
CN104065634A (en) * 2013-05-07 2014-09-24 腾讯科技(深圳)有限公司 Online game account stealing processing method and system
CN103427999A (en) * 2013-08-23 2013-12-04 北京易优安信息技术有限公司 User authentication method and system
CN103607419A (en) * 2013-08-23 2014-02-26 合一网络技术(北京)有限公司 High-quality user account anti-sharing method and system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108038729A (en) * 2017-12-18 2018-05-15 广东欧珀移动通信有限公司 Reward distribution method, device and server
CN108197976A (en) * 2017-12-18 2018-06-22 广东欧珀移动通信有限公司 Reward distribution method, device and server
CN108038729B (en) * 2017-12-18 2022-01-11 Oppo广东移动通信有限公司 Reward issuing method, device and server
CN108280692A (en) * 2018-02-05 2018-07-13 广州华多网络科技有限公司 Reward distribution method, device, computer readable storage medium and terminal
CN110730367A (en) * 2018-07-17 2020-01-24 中兴通讯股份有限公司 Video playing limiting method, device, system and storage medium
CN110175438A (en) * 2019-05-27 2019-08-27 北京奇艺世纪科技有限公司 Share account detection method and relevant device
CN111970250A (en) * 2020-07-27 2020-11-20 深信服科技股份有限公司 Method for identifying account sharing, electronic device and storage medium

Similar Documents

Publication Publication Date Title
CN105915364A (en) Method for preventing malicious sharing of user identity and device thereof
AU2017323588B2 (en) Systems and methods for providing identity assurance for decentralized applications
US10091127B2 (en) Enrolling a mobile device with an enterprise mobile device management environment
US11582040B2 (en) Permissions from entities to access information
CN107196951B (en) A kind of implementation method and firewall system of HDFS system firewall
CN104717223B (en) Data access method and device
CN110086768B (en) Service processing method and device
US9769654B2 (en) Method of implementing a right over a content
TW201914354A (en) A binding method, device and system for smart apparatus, and telecommunications system
CN106063185A (en) Methods and apparatus to securely share data
CN106878250B (en) Cross-application single-state login method and device
US20120272301A1 (en) Controlled user account access with automatically revocable temporary password
JP7049480B2 (en) Location-based access to access-controlled resources
CN106506511B (en) A kind of address list information processing method, device
US11470067B1 (en) Secure authentication of devices
US10387872B2 (en) Browser-based payment for content
US11281773B2 (en) Access card penetration testing
US20160364565A1 (en) Authentication and secure communication with application extensions
US20210281555A1 (en) Api key access authorization
CN114024751B (en) Application access control method and device, computer equipment and storage medium
CN105224541B (en) Uniqueness control method, information storage means and the device of data
CN105227532B (en) A kind of blocking-up method and device of malicious act
CN104202164B (en) A kind of method and Cloud Server for protecting cloud service information using digital certificate
CN109145621A (en) Document management method and device
CN104426834A (en) Webpage requesting method, client, server and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160831

WD01 Invention patent application deemed withdrawn after publication