CN106257480A - A kind of method and device preventing the robot tool malicious access page - Google Patents
A kind of method and device preventing the robot tool malicious access page Download PDFInfo
- Publication number
- CN106257480A CN106257480A CN201510304220.8A CN201510304220A CN106257480A CN 106257480 A CN106257480 A CN 106257480A CN 201510304220 A CN201510304220 A CN 201510304220A CN 106257480 A CN106257480 A CN 106257480A
- Authority
- CN
- China
- Prior art keywords
- safety check
- feedback information
- check code
- correct
- access page
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
Abstract
The present invention provides a kind of method preventing the robot tool malicious access page, including: send identifying code and safety check code to terminal;Receive the feedback information that terminal is submitted to;Check and whether described feedback information exists safety check code, if existing, then check this safety check code the most correct, otherwise refuse the described terminal access page;In the case of described safety check code is correct, it is judged that the identifying code in described feedback information is the most correct;If correct, then allow the described terminal access page, otherwise refuse the described terminal access page.According to technical scheme, by in the code of the page or in cookie or service end cache implant a safety check code, effectively prevent robot tool to skip and get preferential prerequisite steps, directly get preferential malicious act, the most also effectively prevent robot tool and the most quickly get preferential, reduce robot tool malice and get preferential success rate.
Description
Technical field
The present invention relates to technical field of the computer network, be specifically related to one and prevent robot tool
The method and device of the malicious access page.
Background technology
Along with the fast development of ecommerce, net purchase has become a kind of upsurge, in order to promote to sell,
E-commerce website is issued various marketing activities and is attracted customer consumption, but has some malicious users
Obtain preferential by technological means development machines people's instrument.In order to allow real high-quality client enjoy
By promotional offer, allow e-commerce venture control operation cost simultaneously, this prevent robot
The instrument malicious access page obtains preferential method and arises at the historic moment.
Prevent the robot tool malicious access page from mainly using following two mode at present:
1) identifying code mode: page setup identifying code, just can access after being manually entered identifying code.
2) consumer's risk hierarchical manner: set up consumer's risk Grade Model, prevents risk class high
User prevent webpage.
Application scenarios and the fortune of robot tool malicious access webpage is prevented by analyzing above two
Operation mode, finds that it is respectively present following deficiency:
1) identifying code mode: a, the bad control of identifying code complexity, complexity is low to be easily cracked,
Complexity height can cause normal artificial identification the most out;B, the exam pool amount of exam pool formula identifying code have
Limit, easily is exhausted out;C, interactive identifying code, interactive operation complexity can run off the most conventional
Family.
2) consumer's risk hierarchical manner: a, consumer's risk Grade Model are set up to be needed to rely on big data
Analysis;B, False Rate are the highest.
Summary of the invention
In view of this, the present invention provides a kind of method preventing the robot tool malicious access page
And device, it is possible on the premise of normal clients is not run off in guarantee, effectively prevent robot tool
Malicious access.
For achieving the above object, according to an aspect of the invention, it is provided one prevents machine
The method of people's instrument malicious access page, including: send identifying code and safety check code to terminal;
Receive the feedback information that terminal is submitted to;Check and whether described feedback information exist safety check code,
If existing, then check this safety check code the most correct, otherwise refuse the described terminal access page;
In the case of described safety check code is correct, it is judged that whether the identifying code in described feedback information
Correctly;If correct, then allow the described terminal access page, otherwise refuse described terminal access page
Face.
Alternatively, described feedback information is list.
Alternatively, described safety check code is a Hidden field in described list.
According to another aspect of the present invention, it is provided that one prevents robot tool malicious access
The method of the page, including: send identifying code and safety check code to terminal;Reception terminal is submitted to
Feedback information;Check and whether described feedback information exists safety check code, if existing, then
Check this safety check code the most correct, otherwise refuse the described terminal access page;In described peace
In the case of full check code is correct, obtains the timestamp of the described terminal maiden visit page and judge
Whether the time difference of the timestamp that its feedback information submitted to described terminal is incoming belongs to normal person
Time range for operation;If belonging to, then the most just judging the identifying code in described feedback information
Really, otherwise, the denied access page;In the case of identifying code in described feedback information is correct,
Allow the described terminal access page, otherwise, refuse the described terminal access page.
Alternatively, described feedback information is list.
Alternatively, described safety check code is a Hidden field in described list.
According to an aspect of the invention, it is provided one prevents robot tool malicious access page
The device in face, including: sending module, it is used for sending identifying code and safety check code to terminal;
Receiver module, for receiving the feedback information that terminal is submitted to;Inspection module, is used for checking described
Whether feedback information existing safety check code, if existing, then whether checking this safety check code
Correctly, the described terminal access page is otherwise refused;In the case of described safety check code is correct,
Judge that the identifying code in described feedback information is the most correct;If correct, then described terminal is allowed to visit
Ask the page, otherwise refuse the described terminal access page.
According to another aspect of the present invention, it is provided that one prevents robot tool malicious access
The device of the page, including: sending module, it is used for sending identifying code and safety check code to terminal;
Receiver module, receives the feedback information that terminal is submitted to;Inspection module, is used for checking described feedback
Whether information existing safety check code, if existing, then checking this safety check code the most correct,
Otherwise refuse the described terminal access page;In the case of described safety check code is correct, obtain
The timestamp of the described terminal maiden visit page also judges its feedback information submitted to described terminal
Whether the time difference of incoming timestamp belongs to the time range of normal manual operation;If belonging to,
Then judge that the identifying code in described feedback information is the most correct, otherwise, the denied access page;?
In the case of identifying code in described feedback information is correct, it is allowed to the described terminal access page, no
Then, the described terminal access page is refused.
According to technical scheme, by the code of the page or in cookie or
Service end caching implant a safety check code, effectively prevent robot tool skip get excellent
The prerequisite steps of favour, directly gets preferential malicious act, the most also effectively prevent robot
Instrument is the most quickly got preferential, reduces robot tool malice and gets preferential success rate.
Accompanying drawing explanation
Accompanying drawing is used for being more fully understood that the present invention, does not constitute inappropriate limitation of the present invention.Wherein:
Fig. 1 is a kind of method preventing the robot tool malicious access page according to the present invention
The schematic diagram of key step;
Fig. 2 is the method that the another kind according to the present invention prevents the robot tool malicious access page
The schematic diagram of key step;
Fig. 3 is a kind of device preventing the robot tool malicious access page according to the present invention
The schematic diagram of main modular;
Fig. 4 is the device that the another kind according to the present invention prevents the robot tool malicious access page
The schematic diagram of main modular.
Detailed description of the invention
Below in conjunction with accompanying drawing, the one exemplary embodiment of the present invention is explained, including this
The various details of bright embodiment are to help understanding, it should they are thought the most exemplary.
Therefore, those of ordinary skill in the art are it should be appreciated that can do the embodiments described herein
Go out various changes and modifications, without departing from scope and spirit of the present invention.Equally, in order to clearly
Chu, with simple and clear, eliminates the description to known function and structure in description below.
Below how e-commerce system prevents the robot tool malicious access page for obtaining
Illustrate as a example by taking cyber product coupons, be that the one according to the present invention prevents with reference to Fig. 1, Fig. 1
The schematic diagram of the key step of the method for the robot tool malicious access page.As it is shown in figure 1,
The method mainly includes steps S11 to S13.
Step S11: send identifying code and safety check code to terminal.E-commerce website is led
Take preferential step, be generally divided into two steps: the first step is to enter the identifying code page, when user is led to
After crossing the identifying code that the input of described terminal is correct, just can enter the neck that the page of second step is real
Take preferential.The present invention is when user enters the identifying code page of the first step by described terminal,
In the code of the page or in cookie or server end caching implant a safety check code.
So first identifying code and safety check code can be sent to terminal by server.
Step S12: receive the feedback information that terminal is submitted to.This feedback information can use list or its
He submits to mode.As used list, above-mentioned safety check code be then one in list hidden
Hide territory.The terminal of this invention can be user operation, it is also possible to be the behavior of robot tool.
When user receives identifying code and the safety check code that above-mentioned steps S11 sends, can input and test
Card code, feeds back to server with the form of list, and safety check code is hidden as in list
Hide territory and submit to server.User remains and has only to input validation code, so adding peace
Full check code, while effectively preventing robot behavior, does not increase the operation of user, no
Normal customer loss can be caused.And if if the behavior of robot tool, be by directly
Connect the list submitted to identifying code (without safety check code or carry vicious in list
Safety check code) give server.
Step S13: check and whether there is safety check code in described feedback information, if existing, then
Check this safety check code the most correct, otherwise refuse the described terminal access page;In described peace
In the case of full check code is correct, it is judged that the identifying code in described feedback information is the most correct;If
Correctly, then allow the described terminal access page, otherwise refuse the described terminal access page.User
Or robot tool by described terminal enter second step the acquisition preferential page time, can verify
Whether safety check code incoming from the first step page exist, the most correct.If safe school
Testing if code do not exists or be incorrect, explanation is the malicious access of robot tool, server meeting
Refuse it and continue accession page.If safety check code exists and correct, server continues
Continuous authentication code is the most correct, if identifying code is correct, server allows described terminal to continue
Accession page, if identifying code mistake, server can be refused terminal and continue accession page.
It is that the another kind according to the present invention prevents robot tool malicious access page with reference to Fig. 2, Fig. 2
The schematic diagram of the key step of the method in face.As in figure 2 it is shown, the method mainly includes following
Step S21 to S24:
Step S21: send identifying code and safety check code to terminal.E-commerce website is led
Take preferential step, be generally divided into two steps: the first step is to enter the identifying code page, when user is led to
After crossing the identifying code that the input of described terminal is correct, just can enter the neck that the page of second step is real
Take preferential.The present invention is when user enters the identifying code page of the first step by described terminal,
In the code of the page or in cookie or server end caching implant a safety check code.
So first identifying code and safety check code can be sent to terminal by server.
Step S22: receive the feedback information that terminal is submitted to.This feedback information can use list or its
He submits to mode.As used list, above-mentioned safety check code be then one in list hidden
Hide territory.The terminal of this invention can be user operation, it is also possible to be the behavior of robot tool.
When user receives, by described terminal, identifying code and the safety check code that above-mentioned steps S21 sends
Time, meeting input validation code, feed back to server with the form of list, safety check code is as table
A Hidden field in list submits to server.User remains and has only to input validation code,
So interpolation safety check code is while preventing robot behavior, do not increase the behaviour of user
Make, be not result in normal customer loss.And if if the behavior of robot tool, be
By directly submit to identifying code list (in list without safety check code or with
The safety check code of mistake) give server.
Step S23: check and whether there is safety check code in described feedback information, if existing, then
Check this safety check code the most correct, otherwise refuse the described terminal access page.User or machine
Device people's instrument, can be verified from the when entering the preferential page of acquisition of second step by described terminal
Whether safety check code incoming in the one step page exist, the most correct.If safety check code
If not existing or being incorrect, explanation is the malicious access of robot tool, and server can be refused
It continues accession page.
Step S24: in the case of described safety check code is correct, obtains described terminal and visit for the first time
Ask the timestamp of the page and judge its timestamp incoming with the feedback information that described terminal is submitted to
Whether time difference belongs to the time range of normal manual operation;If belonging to, then judge described feedback
Identifying code in information is the most correct, otherwise, and the denied access page;In described feedback information
Identifying code correct in the case of, it is allowed to the described terminal access page, otherwise, refuse described end
End accession page.
If if user participates in robbing certificate activity by described terminal, input validation code, click
The time submitting button to will not be the shortest.And if if the behavior of robot tool, be to pass through
Directly submitting to the list with identifying code to carry out robbing certificate, the time can be very the briefest.So by testing
The time that the timestamp of the card terminal maiden visit page is incoming with the feedback information of described terminal submission
The time difference of stamp can determine whether that whether the behavior of described terminal is the row of robot tool
For.Can effectively prevent robot tool from skipping and get preferential prerequisite steps, directly get excellent
The malicious act of favour, can also effectively prevent robot tool from the most quickly getting preferential simultaneously.
Below how e-commerce system prevents the robot tool malicious access page for obtaining
Illustrate as a example by taking cyber product coupons, be that the one according to the present invention prevents with reference to Fig. 3, Fig. 3
The schematic diagram of the main modular of the device of the robot tool malicious access page.As it is shown on figure 3,
This device 3 mainly includes sending module 31, receiver module 32 and inspection module 33.
Sending module 31, is used for sending identifying code and safety check code to terminal.In ecommerce
Get preferential step on website, be generally divided into two steps: the first step is to enter the identifying code page,
After user inputs correct identifying code by described terminal, just can enter the page of second step
Real getting is preferential.The present invention is to enter the identifying code of the first step user by described terminal
During the page, in the code of the page or in cookie or server end caching implant a peace
Full check code.So first identifying code and safety check code being sent to terminal by sending module 31.
Receiver module 32, for receiving the feedback information that terminal is submitted to.This feedback information can use
List or other modes are submitted to.As used list, above-mentioned safety check code is then in list
A Hidden field.The terminal of this invention can be user operation, it is also possible to be robot tool
Behavior.When user by described terminal receive above-mentioned sending module 31 send identifying code and
During safety check code, meeting input validation code, submit to receiver module 32 with the form of list, peace
Full check code submits to receiver module 32 as a Hidden field in list.User remains only
Need input validation code, so interpolation safety check code is while preventing robot behavior,
Do not increase the operation of user, be not result in normal customer loss.And if robot
If the behavior of instrument, be by directly submit to list with identifying code (in list without
Safety check code or carry vicious safety check code) give receiver module 32.
Inspection module 33, is used for checking in described feedback information whether there is safety check code, if
Exist, then check this safety check code the most correct, otherwise refuse the described terminal access page;
In the case of described safety check code is correct, it is judged that whether the identifying code in described feedback information
Correctly;If correct, then allow the described terminal access page, otherwise refuse described terminal access page
Face.User by described terminal enter second step the acquisition preferential page time, inspection module 33
Can verify safety check code incoming from the first step page whether exist, the most correct.If
If safety check code does not exists or be incorrect, explanation is the malicious access of robot tool, clothes
Business device can be refused it and continue accession page.If safety check code exists and correct, inspection
Testing module 33 and continue authentication code the most correctly, if identifying code is correct, server allows eventually
End continues accession page, if identifying code mistake, server can be refused terminal and continue accession page.
It is that the another kind according to the present invention prevents robot tool malicious access page with reference to Fig. 4, Fig. 4
The schematic diagram of the main modular of the device in face.As shown in Figure 4, this device 4 mainly includes sending
Module 41, receiver module 42 and inspection module 43.
Sending module 41, is used for sending identifying code and safety check code to terminal.In ecommerce
Get preferential step on website, be generally divided into two steps: the first step is to enter the identifying code page,
After user inputs correct identifying code by described terminal, just can enter the page of second step
Real getting is preferential.The present invention is to enter the identifying code of the first step user by described terminal
During the page, in the code of the page or in cookie or server end caching implant a peace
Full check code.So first identifying code and safety check code being sent to terminal by sending module 41.
Receiver module 42, for receiving the feedback information that terminal is submitted to.This feedback information can use
List or other modes are submitted to.As used list, above-mentioned safety check code is then in list
A Hidden field.The terminal of this invention can be user operation, it is also possible to be robot tool
Behavior.When user by described terminal receive above-mentioned sending module 41 send identifying code and
During safety check code, meeting input validation code, submit to receiver module 42 with the form of list, peace
Full check code submits to receiver module 42 as a Hidden field in list.User remains only
Need input validation code, so interpolation safety check code is while preventing robot behavior,
Do not increase the operation of user, be not result in normal customer loss.And if robot
If the behavior of instrument, be by directly submit to list with identifying code (in list without
Safety check code or carry vicious safety check code) give receiver module 42.
Inspection module 43, is used for checking in described feedback information whether there is safety check code, if
Exist, then check this safety check code the most correct, otherwise refuse the described terminal access page;
In the case of described safety check code is correct, obtain the time of the described terminal maiden visit page
Stab and judge whether the time difference of its timestamp incoming with the feedback information that described terminal is submitted to belongs to
Time range in normal manual operation;If belonging to, then judge the checking in described feedback information
Code is the most correct, otherwise, and the denied access page;Identifying code in described feedback information is correct
In the case of, it is allowed to the described terminal access page, otherwise, refuse the described terminal access page.
User by described terminal enter second step the acquisition preferential page time, inspection module 43
Can verify safety check code incoming from the first step page whether exist, the most correct.If
If safety check code does not exists or be incorrect, explanation is the malicious access of robot tool, clothes
Business device can be refused it and continue accession page.
If if user participates in robbing certificate activity by described terminal, input validation code, click
The time submitting button to will not be the shortest.And if if the behavior of robot tool, be to pass through
Directly submitting to the list with identifying code to carry out robbing certificate, the time can be very the briefest.So inspection mould
The feedback information that block 43 is submitted to described terminal by the timestamp of the checking terminal maiden visit page
The time difference of incoming timestamp can determine whether whether the behavior of described terminal is robot
The behavior of instrument.Can effectively prevent robot tool from skipping and get preferential prerequisite steps, directly
Connect and get preferential malicious act, can also effectively prevent robot tool from the most quickly leading simultaneously
Take preferential.
Above-mentioned detailed description of the invention, is not intended that limiting the scope of the invention.This area
Technical staff, it is to be understood that depend on that design requires and other factors, can occur various
The amendment of various kinds, combination, sub-portfolio and replacement.Any within the spirit and principles in the present invention
Amendment, equivalent and the improvement etc. made, within should be included in scope.
Claims (8)
1. the method preventing the robot tool malicious access page, it is characterised in that including:
Send identifying code and safety check code to terminal;
Receive the feedback information that terminal is submitted to;
Checking and whether described feedback information exists safety check code, if existing, then checking this peace
Full check code is the most correct, otherwise refuses the described terminal access page;
In the case of described safety check code is correct, it is judged that the identifying code in described feedback information
The most correct;If correct, then allow the described terminal access page, otherwise refuse described terminal and visit
Ask the page.
Method the most according to claim 1, it is characterised in that described feedback information is table
Single.
Method the most according to claim 2, it is characterised in that described safety check code is
A Hidden field in described list.
4. the method preventing the robot tool malicious access page, it is characterised in that including:
Send identifying code and safety check code to terminal;
Receive the feedback information that terminal is submitted to;
Checking and whether described feedback information exists safety check code, if existing, then checking this peace
Full check code is the most correct, otherwise refuses the described terminal access page;
In the case of described safety check code is correct, obtain the described terminal maiden visit page
Timestamp also judges that the time difference of its timestamp incoming with the feedback information that described terminal is submitted to is
The no time range belonging to normal manual operation;If belonging to, then judge in described feedback information
Identifying code is the most correct, otherwise, and the denied access page;
In the case of identifying code in described feedback information is correct, it is allowed to described terminal access page
Face, otherwise, refuses the described terminal access page.
A kind of side preventing the robot tool malicious access page the most according to claim 4
Method, it is characterised in that described feedback information is list.
A kind of side preventing the robot tool malicious access page the most according to claim 5
Method, it is characterised in that described safety check code is a Hidden field in described list.
7. the device preventing the robot tool malicious access page, it is characterised in that including:
Sending module, is used for sending identifying code and safety check code to terminal;
Receiver module, for receiving the feedback information that terminal is submitted to;
Inspection module, is used for checking in described feedback information whether there is safety check code, if depositing
, then check this safety check code the most correct, otherwise refuse the described terminal access page;?
In the case of described safety check code is correct, it is judged that the identifying code in described feedback information is the most just
Really;If correct, then allow the described terminal access page, otherwise refuse the described terminal access page.
8. the device preventing the robot tool malicious access page, it is characterised in that including:
Sending module, is used for sending identifying code and safety check code to terminal;
Receiver module, for receiving the feedback information that terminal is submitted to;
Inspection module, is used for checking in described feedback information whether there is safety check code, if depositing
, then check this safety check code the most correct, otherwise refuse the described terminal access page;?
In the case of described safety check code is correct, obtain the timestamp of the described terminal maiden visit page
And judge whether the time difference of its timestamp incoming with the feedback information that described terminal is submitted to belongs to
The time range of normal manual operation;If belonging to, then judge the identifying code in described feedback information
The most correct, otherwise, the denied access page;Identifying code in described feedback information is correct
In the case of, it is allowed to the described terminal access page, otherwise, refuse the described terminal access page.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510304220.8A CN106257480A (en) | 2015-06-05 | 2015-06-05 | A kind of method and device preventing the robot tool malicious access page |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510304220.8A CN106257480A (en) | 2015-06-05 | 2015-06-05 | A kind of method and device preventing the robot tool malicious access page |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106257480A true CN106257480A (en) | 2016-12-28 |
Family
ID=57713287
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510304220.8A Pending CN106257480A (en) | 2015-06-05 | 2015-06-05 | A kind of method and device preventing the robot tool malicious access page |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106257480A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106301787A (en) * | 2016-08-14 | 2017-01-04 | 汪念鸿 | A kind of by the method for time authentication code |
CN107508844A (en) * | 2017-10-23 | 2017-12-22 | 山东浪潮云服务信息科技有限公司 | A kind of access request verification method, apparatus and system |
CN108282443A (en) * | 2017-01-05 | 2018-07-13 | 阿里巴巴集团控股有限公司 | A kind of reptile Activity recognition method and apparatus |
CN109446807A (en) * | 2018-10-17 | 2019-03-08 | 杭州安恒信息技术股份有限公司 | The method, apparatus and electronic equipment of malicious robot are intercepted for identification |
CN109787937A (en) * | 2017-11-14 | 2019-05-21 | 龙芯中科技术有限公司 | Method of counting, device and the server of access times |
CN110138671A (en) * | 2019-05-16 | 2019-08-16 | 重庆八戒传媒有限公司 | A kind of system and method reducing flow flood peak |
CN110830480A (en) * | 2019-11-13 | 2020-02-21 | 国网山西省电力公司信息通信分公司 | Power distribution terminal safety access system based on electric power thing networking |
CN112992136A (en) * | 2020-12-16 | 2021-06-18 | 呼唤(上海)云计算股份有限公司 | Intelligent infant monitoring system and method |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1909552A (en) * | 2006-08-15 | 2007-02-07 | 华为技术有限公司 | Information calling method and system |
CN103532979A (en) * | 2013-10-30 | 2014-01-22 | 蓝盾信息安全技术股份有限公司 | Method for generating and verifying multi-conversation verification codes under CGI (common gateway interface) for web |
CN104320375A (en) * | 2014-08-28 | 2015-01-28 | 福建天晴数码有限公司 | Method and device of preventing illegal registration |
CN104346564A (en) * | 2013-08-02 | 2015-02-11 | 中国银联股份有限公司 | Web-based safe user interaction method |
-
2015
- 2015-06-05 CN CN201510304220.8A patent/CN106257480A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1909552A (en) * | 2006-08-15 | 2007-02-07 | 华为技术有限公司 | Information calling method and system |
CN104346564A (en) * | 2013-08-02 | 2015-02-11 | 中国银联股份有限公司 | Web-based safe user interaction method |
CN103532979A (en) * | 2013-10-30 | 2014-01-22 | 蓝盾信息安全技术股份有限公司 | Method for generating and verifying multi-conversation verification codes under CGI (common gateway interface) for web |
CN104320375A (en) * | 2014-08-28 | 2015-01-28 | 福建天晴数码有限公司 | Method and device of preventing illegal registration |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106301787A (en) * | 2016-08-14 | 2017-01-04 | 汪念鸿 | A kind of by the method for time authentication code |
CN106301787B (en) * | 2016-08-14 | 2019-03-22 | 汪念鸿 | A method of with time authentication code |
CN108282443A (en) * | 2017-01-05 | 2018-07-13 | 阿里巴巴集团控股有限公司 | A kind of reptile Activity recognition method and apparatus |
CN107508844A (en) * | 2017-10-23 | 2017-12-22 | 山东浪潮云服务信息科技有限公司 | A kind of access request verification method, apparatus and system |
CN109787937A (en) * | 2017-11-14 | 2019-05-21 | 龙芯中科技术有限公司 | Method of counting, device and the server of access times |
CN109446807A (en) * | 2018-10-17 | 2019-03-08 | 杭州安恒信息技术股份有限公司 | The method, apparatus and electronic equipment of malicious robot are intercepted for identification |
CN110138671A (en) * | 2019-05-16 | 2019-08-16 | 重庆八戒传媒有限公司 | A kind of system and method reducing flow flood peak |
CN110830480A (en) * | 2019-11-13 | 2020-02-21 | 国网山西省电力公司信息通信分公司 | Power distribution terminal safety access system based on electric power thing networking |
CN110830480B (en) * | 2019-11-13 | 2022-04-15 | 国网山西省电力公司信息通信分公司 | Power distribution terminal safety access system based on electric power thing networking |
CN112992136A (en) * | 2020-12-16 | 2021-06-18 | 呼唤(上海)云计算股份有限公司 | Intelligent infant monitoring system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106257480A (en) | A kind of method and device preventing the robot tool malicious access page | |
Campra et al. | The engagement of stakeholders in nonfinancial reporting: New information‐pressure, stimuli, inertia, under short‐termism in the banking industry | |
CN105760976B (en) | Service checking method and system | |
CN106097023A (en) | A kind of data processing method and device | |
CN104252672B (en) | Payment transaction system integrating cloud service | |
US20230244656A1 (en) | Blockchain-based systems and methods for communicating, storing and processing data over a blockchain network | |
WO2019052169A1 (en) | Agent monitoring method, apparatus and device, and computer-readable storage medium | |
CN102103777A (en) | Network tax declaration system and tax declaration method thereof for fiscal cash register | |
CN104462934B (en) | A kind of information processing method and electronic equipment | |
CN108647960A (en) | A kind of donation fund management method and system based on block chain technology | |
CN103379093B (en) | A kind of method and device for realizing account intercommunication | |
CN108023922A (en) | A kind of method, apparatus and system for issuing and setting configuration data | |
CN106937164A (en) | The Set Top Box of television set and the exchange method of smart mobile phone | |
CN109617755B (en) | Acceptance method and device of access system | |
CN102722780A (en) | One-to-one on-line investment consultation system | |
JP6782794B2 (en) | Internet portal system and how to use it | |
CN108242021A (en) | A kind of processing system of accounting data, method and device | |
Bizimana | E-government Readiness Assessment for Government institutions in Burundi | |
CN105827873B (en) | A kind of solution strange land client traffic handles limited method and device | |
Twaakyondo | Key issues in information communication technology policy review process: The case of Tanzania | |
CN105389390A (en) | Method for publishing tasks on website | |
CN105631669A (en) | Method and device which verifies payment data | |
CN103299336A (en) | Information processing system, information processing method, and storage medium | |
Shouran et al. | Measuring the eGovernment readiness: proposed framework | |
KR20210083457A (en) | Electronic vote record management system based on blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161228 |