CN106357694B - Access request processing method and device - Google Patents
Access request processing method and device Download PDFInfo
- Publication number
- CN106357694B CN106357694B CN201610992581.0A CN201610992581A CN106357694B CN 106357694 B CN106357694 B CN 106357694B CN 201610992581 A CN201610992581 A CN 201610992581A CN 106357694 B CN106357694 B CN 106357694B
- Authority
- CN
- China
- Prior art keywords
- information
- verified
- access request
- target terminal
- time interval
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an access request processing method and device, which are used for improving the security of user access. The method comprises the following steps: receiving an access request sent by a target terminal; the access request carries information to be verified and a timestamp; judging whether the time interval between the time corresponding to the timestamp and the current time is smaller than a preset time interval or not; when the time interval is smaller than the preset time interval, judging whether information which is the same as the information to be verified is stored locally; and when the information which is the same as the information to be verified is locally stored, rejecting the access request of the target terminal. By adopting the method provided by the invention, each piece of information to be verified can be ensured to be used only once, and the information to be verified is prevented from being reused, so that the information to be verified is prevented from being reused by other users except the target terminal, and the safety of user access is improved.
Description
Technical Field
The present invention relates to the field of internet technologies, and in particular, to a method and an apparatus for processing an access request.
Background
When a user requests a resource on a certain server through a terminal, an access request is sent to the server, and the access request contains information to be verified. The server verifies the received request, namely verifies the information to be verified in the request: rejecting the request when the authentication fails; and when the verification is passed, transmitting the resource requested by the terminal to the terminal. The information to be verified can be used repeatedly, that is, when the information to be verified can be verified by the server, the user can repeatedly request the resource on the server through the information to be verified.
However, such a manner has a security risk, for example, when a third party intercepts a request sent by a user to the server, the third party may not only illegally obtain resources in the server, but also know what resources the legitimate user requests from the server through the information to be authenticated, thereby causing privacy disclosure of the user.
Disclosure of Invention
The invention provides an access request processing method and device, which are used for improving the security of user access.
The invention provides an access request processing method, which comprises the following steps:
receiving an access request sent by a target terminal; the access request carries information to be verified and a timestamp;
judging whether the time interval between the time corresponding to the timestamp and the current time is smaller than a preset time interval or not;
when the time interval is smaller than the preset time interval, judging whether information which is the same as the information to be verified is stored locally;
and when the information which is the same as the information to be verified is locally stored, rejecting the access request of the target terminal.
The invention has the beneficial effects that: when the time interval between the timestamp carried in the access request and the current time is smaller than the preset time interval, whether the information which is the same as the information to be verified is stored locally or not is judged, and when the information which is the same as the information to be verified is stored, the information to be verified is used once, so that the access request of the target terminal is rejected, each piece of information to be verified can be used only once, the repeated use of the information to be verified is avoided, further, the repeated use of the piece of information to be verified by other users except the target terminal is avoided, and the safety of user access is improved.
In one embodiment, before the receiving the access request sent by the target terminal, the method further includes:
receiving local equipment information sent by a target terminal, wherein the local equipment information comprises at least one of the following equipment information:
presetting a serial number, a software identifier, a software version and an internet protocol address;
generating a signature according to the local device information;
and sending the signature and the timestamp corresponding to the signature generation time to the target terminal.
The method and the device have the advantages that after the signature is generated according to the local device identifier, the time corresponding to the signature and the time corresponding to the signature generation time are sent to the target terminal, so that the signature generation time is identified, and the situation that a user modifies the generation time of the signature is avoided.
In one embodiment, the method further comprises:
and when the time interval between the timestamp and the current time is greater than a preset time interval, rejecting the access request of the target terminal.
The beneficial effect of this embodiment lies in: and when the time interval between the timestamp and the current time is greater than the preset time interval, rejecting the access request of the target terminal, so that the information to be verified is only effective within the preset time interval, the use time of the information to be verified is shortened, the probability that the information to be verified is used by other users except the target terminal user is reduced, and the access security of the user is further improved.
In one embodiment, after the determining whether the same information as the information to be verified is locally stored, the method further includes:
when the information which is the same as the information to be verified is not stored locally, verifying the information to be verified;
when the verification is not passed, rejecting the access request of the target terminal;
and when the verification is passed, responding to the access request of the target terminal, and storing the information to be verified locally.
The beneficial effect of this embodiment lies in: the information to be verified is verified, and when the verification fails, the access request of the target terminal is rejected, so that other users without correct information to be verified can be prevented from illegally accessing the server, the access security of the users is improved, and secondly, when the verification passes, the access request of the target terminal is responded, and the information to be verified is stored locally, so that the repeated use of the information to be verified is avoided.
In one embodiment, the method further comprises:
when the information to be verified is stored locally, timing the time of the information to be verified stored locally;
and deleting the information to be verified when the time interval between the time when the information to be verified is stored locally and the current time reaches the preset time interval.
The beneficial effect of this embodiment lies in: and when the time interval between the time when the information to be verified is stored in the local and the current time reaches a preset time interval, deleting the information to be verified, thereby avoiding the waste of local storage resources caused by the long-time storage of the information to be verified in the local.
The present invention also provides an access request processing apparatus, including:
the first receiving module is used for receiving an access request sent by a target terminal; the access request carries information to be verified and a timestamp;
the first judging module is used for judging whether the time interval between the time corresponding to the timestamp and the current time is smaller than a preset time interval or not;
the second judging module is used for judging whether the information which is the same as the information to be verified is stored locally or not when the time interval is smaller than the preset time interval;
and the first processing module is used for rejecting the access request of the target terminal when the information which is the same as the information to be verified is locally stored.
In one embodiment, the apparatus further comprises:
a second receiving module, configured to receive, before the receiving of the access request sent by the target terminal, local device information sent by the target terminal, where the local device information includes at least one of the following device information:
presetting a serial number, a software identifier, a software version and an internet protocol address;
the generating module is used for generating a signature according to the local equipment information;
and the sending module is used for sending the signature and the timestamp corresponding to the signature generation time to the target terminal.
In one embodiment, the apparatus further comprises:
and the second processing module is used for rejecting the access request of the target terminal when the time interval between the timestamp and the current time is greater than a preset time interval.
In one embodiment, the apparatus further comprises:
the verification module is used for verifying the information to be verified when the same information as the information to be verified is not stored locally;
the third processing module is used for refusing the access request of the target terminal when the verification is not passed;
and the response module is used for responding to the access request of the target terminal when the verification is passed, and storing the information to be verified locally.
In one embodiment, the apparatus further comprises:
the timing module is used for timing the time of the information to be verified stored locally when the information to be verified is stored locally;
and the deleting module is used for deleting the information to be verified when the time interval between the time when the information to be verified is stored locally and the current time reaches the preset time interval.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a flow chart of a method for processing an access request according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method for processing an access request according to an embodiment of the present invention;
FIG. 3 is a block diagram of an access request processing apparatus according to an embodiment of the present invention;
fig. 4 is a block diagram of an access request processing apparatus according to an embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Fig. 1 is a flowchart of an access request processing method according to an embodiment of the present invention, and as shown in fig. 1, the access request processing method according to the present invention can be applied to a server, and the method can be implemented as the following steps S101-S104:
in step S101, an access request sent by a target terminal is received; the access request carries information to be verified and a timestamp;
in step S102, it is determined whether a time interval between the time corresponding to the timestamp and the current time is smaller than a preset time interval;
in step S103, when the time interval is smaller than the preset time interval, it is determined whether information identical to the information to be verified is stored locally;
in step S104, when the information that is the same as the information to be verified is locally stored, the access request of the target terminal is rejected.
Before this embodiment, when a user sends an access request through a target terminal to access a resource in a server, the server first receives local device information sent by the target terminal, where the local device information may be a preset serial number, a software identifier, a software version, an internet protocol address, and the like. And generating a unique signature according to the local equipment information, sending the unique signature to the target terminal, generating a timestamp corresponding to the unique signature generation time in order to avoid the generation time modification by the user or the inconsistency between the target terminal time and the server time, and sending the timestamp to the target terminal corresponding to the user.
And when the target terminal receives the signature and the time stamp, generating a fingerprint to be verified according to the local equipment information and the time stamp. And sending a resource request to the server again, wherein the resource request sent this time comprises a signature, a fingerprint to be verified and a timestamp, and the timestamp and the value to be verified corresponding to the signature and the signature generation time are taken as information to be verified.
When the server receives an access request sent again by a target terminal, extracting a timestamp carried in the access request, judging whether a time interval between time corresponding to the timestamp and current time is smaller than a preset time interval, judging whether information identical to the information to be verified is stored locally when the time interval is smaller than the preset time interval, and rejecting the access request of the target terminal when the information identical to the information to be verified is stored locally and indicates that the target terminal has used the information to be verified to request resources once.
The invention has the beneficial effects that: when the time interval between the timestamp carried in the access request and the current time is smaller than the preset time interval, whether the information which is the same as the information to be verified is stored locally or not is judged, and when the information which is the same as the information to be verified is stored, the information to be verified is used once, so that the access request of the target terminal is rejected, each piece of information to be verified can be used only once, the repeated use of the information to be verified is avoided, further, the repeated use of the piece of information to be verified by other users except the target terminal is avoided, and the safety of user access is improved.
In one embodiment, as shown in fig. 2, before the above step S101, the method may further be implemented as the following steps S201 to S203:
in step S201, local device information sent by a target terminal is received, where the local device information includes at least one of the following device information:
presetting a serial number, a software identifier, a software version and an internet protocol address;
in step S202, a signature is generated according to the local device information;
in step S203, a timestamp corresponding to the signature and the signature generation time is sent to the target terminal.
In this embodiment, the server receives local device information sent by the target terminal, where the local device information may be a preset serial number, a software identifier, a software version, an internet protocol address, and the like. And generating a unique signature according to the local equipment information, sending the unique signature to the target terminal, generating a timestamp corresponding to the unique signature generation time in order to avoid the generation time modification by the user or the inconsistency between the target terminal time and the server time, and sending the timestamp to the target terminal corresponding to the user.
The method and the device have the advantages that after the signature is generated according to the local device identifier, the time corresponding to the signature and the time corresponding to the signature generation time are sent to the target terminal, so that the signature generation time is identified, and the situation that a user modifies the generation time of the signature is avoided.
In one embodiment, after the above step S102, the method may further be implemented as the following steps:
and when the time interval between the timestamp and the current time is greater than a preset time interval, rejecting the access request of the target terminal.
In this embodiment, the signature sent by the server is preset to be valid only within a certain time. After the signature is generated, the signature is valid for only two minutes. And when the time interval between the timestamp and the current time is greater than the preset time interval, rejecting the access request of the target terminal.
For example, the signature preset in the server is valid within 2 minutes. The time when the server generates the signature according to the local device information of the target terminal is 16: 00: 00 (four o' clock in the afternoon); and when the time when the access request carrying the signature and the time stamp corresponding to the signature generation time is received by the user is 16:03:21, the interval between the time corresponding to the time stamp and the time when the access request is received is 3 minutes and 21 seconds, and is greater than the preset time interval (2 minutes), the signature carried in the access request sent by the target terminal is invalid, and therefore the access request of the target terminal is rejected.
The beneficial effect of this embodiment lies in: and when the time interval between the timestamp and the current time is greater than the preset time interval, rejecting the access request of the target terminal, so that the information to be verified is only effective within the preset time interval, the use time of the information to be verified is shortened, the probability that the information to be verified is used by other users except the target terminal user is reduced, and the access security of the user is further improved.
In one embodiment, after the above step S103, the method may further be implemented as the following steps A1-A3:
in step a1, when the same information as the information to be verified is not stored locally, verifying the information to be verified;
in step a2, when the authentication is not passed, rejecting the access request of the target terminal;
in step a3, when the authentication is passed, the access request of the target terminal is responded, and the information to be authenticated is stored locally.
In this embodiment, when it is determined that the information stored in the local area is not the same as the information to be verified, it is determined that the information to be verified is not used, and at this time, the information to be verified is verified. When the information to be verified is the signature and the fingerprint to be verified, performing back calculation on the signature to obtain local equipment information, performing back calculation on the fingerprint to be verified to obtain local equipment information, and comparing the local equipment information obtained twice: when the comparison result is inconsistent, determining that the verification is not passed, and rejecting the access request of the target terminal; when the comparison result is consistent, the verification is confirmed to be passed, the access request of the target terminal is corresponded, the information to be verified is stored locally, the information to be verified is prevented from being reused, the information to be verified is guaranteed to be invalid only after being used once, resources of a server are prevented from being requested according to the information to be verified when other users obtain the information to be verified, and accordingly user privacy disclosure is avoided.
The beneficial effect of this embodiment lies in: the information to be verified is verified, and when the verification fails, the access request of the target terminal is rejected, so that other users without correct information to be verified can be prevented from illegally accessing the server, the access security of the users is improved, and secondly, when the verification passes, the access request of the target terminal is responded, and the information to be verified is stored locally, so that the repeated use of the information to be verified is avoided.
In one embodiment, after the above step A3, the method may also be implemented as the following steps B1-B2:
in step B1, when the information to be verified is stored locally, timing the time when the information to be verified is stored locally;
in step B2, when the time interval between the time when the information to be verified is stored locally and the current time reaches the preset time interval, deleting the information to be verified.
In this embodiment, starting from the moment when the information to be verified is stored locally, a local timer of the server is started, so as to time the time when the information to be verified is stored locally, and deleting the information to be verified when the time interval between the time when the information to be verified is stored locally and the current time reaches a preset time interval, so as to avoid the waste of local storage resources caused by the long-time storage of the information to be verified locally.
It should be noted that the preset time interval is the same time interval as the preset time interval appearing in the foregoing embodiment. Therefore, the signature sent by the server to the target terminal can be ensured to be invalid when the information to be verified is deleted.
The beneficial effect of this embodiment lies in: and when the time interval between the time when the information to be verified is stored in the local and the current time reaches a preset time interval, deleting the information to be verified, thereby avoiding the waste of local storage resources caused by the long-time storage of the information to be verified in the local.
Fig. 3 is a block diagram of an access request processing apparatus according to an embodiment of the present invention, and as shown in fig. 3, the access request processing apparatus according to the present invention may be used in a server, and the apparatus includes the following modules:
a first receiving module 31, configured to receive an access request sent by a target terminal; the access request carries information to be verified and a timestamp;
a first determining module 32, configured to determine whether a time interval between the time corresponding to the timestamp and the current time is smaller than a preset time interval;
a second judging module 33, configured to, when the time interval is smaller than the preset time interval, judge whether information that is the same as the information to be verified is locally stored;
the first processing module 34 is configured to reject the access request of the target terminal when the information that is the same as the information to be verified is locally stored.
In one embodiment, as shown in fig. 4, the apparatus further comprises:
a second receiving module 41, configured to receive, before the access request sent by the target terminal is received, local device information sent by the target terminal, where the local device information includes at least one of the following device information:
presetting a serial number, a software identifier, a software version and an internet protocol address;
a generating module 42, configured to generate a signature according to the local device information;
a sending module 43, configured to send the signature and the timestamp corresponding to the signature generation time to the target terminal.
In one embodiment, the apparatus further comprises:
and the second processing module is used for rejecting the access request of the target terminal when the time interval between the timestamp and the current time is greater than a preset time interval.
In one embodiment, the apparatus further comprises:
the verification module is used for verifying the information to be verified when the same information as the information to be verified is not stored locally;
the third processing module is used for refusing the access request of the target terminal when the verification is not passed;
and the response module is used for responding to the access request of the target terminal when the verification is passed, and storing the information to be verified locally.
In one embodiment, the apparatus further comprises:
the timing module is used for timing the time of the information to be verified stored locally when the information to be verified is stored locally;
and the deleting module is used for deleting the information to be verified when the time interval between the time when the information to be verified is stored locally and the current time reaches the preset time interval.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (8)
1. An access request processing method, comprising:
receiving local equipment information sent by a target terminal, wherein the local equipment information comprises at least one of the following equipment information:
presetting a serial number, a software identifier, a software version and an internet protocol address;
generating a signature according to the local device information;
sending the signature and a timestamp corresponding to the signature generation time to the target terminal;
receiving an access request sent by a target terminal; the access request carries information to be verified and the timestamp;
judging whether the time interval between the time corresponding to the timestamp and the current time is smaller than a preset time interval or not;
when the time interval is smaller than the preset time interval, judging whether information which is the same as the information to be verified is stored locally;
and when the information which is the same as the information to be verified is locally stored, rejecting the access request of the target terminal.
2. The method of claim 1, wherein the method further comprises:
and when the time interval between the timestamp and the current time is greater than a preset time interval, rejecting the access request of the target terminal.
3. The method of claim 1, wherein after the determining whether the same information as the information to be authenticated is stored locally, the method further comprises:
when the information which is the same as the information to be verified is not stored locally, verifying the information to be verified;
when the verification is not passed, rejecting the access request of the target terminal;
and when the verification is passed, responding to the access request of the target terminal, and storing the information to be verified locally.
4. The method of claim 3, wherein the method further comprises:
when the information to be verified is stored locally, timing the time of the information to be verified stored locally;
and deleting the information to be verified when the time interval between the time when the information to be verified is stored locally and the current time reaches the preset time interval.
5. An access request processing apparatus, comprising:
a second receiving module, configured to receive, before the receiving of the access request sent by the target terminal, local device information sent by the target terminal, where the local device information includes at least one of the following device information:
presetting a serial number, a software identifier, a software version and an internet protocol address;
the generating module is used for generating a signature according to the local equipment information;
a sending module, configured to send the signature and a timestamp corresponding to the signature generation time to the target terminal;
the first receiving module is used for receiving an access request sent by a target terminal; the access request carries information to be verified and the timestamp;
the first judging module is used for judging whether the time interval between the time corresponding to the timestamp and the current time is smaller than a preset time interval or not;
the second judging module is used for judging whether the information which is the same as the information to be verified is stored locally or not when the time interval is smaller than the preset time interval;
and the first processing module is used for rejecting the access request of the target terminal when the information which is the same as the information to be verified is locally stored.
6. The apparatus of claim 5, wherein the apparatus further comprises:
and the second processing module is used for rejecting the access request of the target terminal when the time interval between the timestamp and the current time is greater than a preset time interval.
7. The apparatus of claim 5, wherein the apparatus further comprises:
the verification module is used for verifying the information to be verified when the same information as the information to be verified is not stored locally;
the third processing module is used for refusing the access request of the target terminal when the verification is not passed;
and the response module is used for responding to the access request of the target terminal when the verification is passed, and storing the information to be verified locally.
8. The apparatus of claim 7, wherein the apparatus further comprises:
the timing module is used for timing the time of the information to be verified stored locally when the information to be verified is stored locally;
and the deleting module is used for deleting the information to be verified when the time interval between the time when the information to be verified is stored locally and the current time reaches the preset time interval.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610992581.0A CN106357694B (en) | 2016-11-10 | 2016-11-10 | Access request processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610992581.0A CN106357694B (en) | 2016-11-10 | 2016-11-10 | Access request processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106357694A CN106357694A (en) | 2017-01-25 |
CN106357694B true CN106357694B (en) | 2020-02-07 |
Family
ID=57861534
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610992581.0A Expired - Fee Related CN106357694B (en) | 2016-11-10 | 2016-11-10 | Access request processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106357694B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106878336A (en) * | 2017-03-29 | 2017-06-20 | 福建中金在线信息科技有限公司 | A kind of data interactive method and device |
CN108390882A (en) * | 2018-02-26 | 2018-08-10 | 成都六零加信息技术有限公司 | Connected reference method, apparatus and electronic equipment |
CN109670801B (en) * | 2018-12-10 | 2021-02-12 | 华中科技大学 | Digital encryption money transfer method for block chain |
CN112527826B (en) * | 2019-09-19 | 2024-06-18 | 北京京东振世信息技术有限公司 | Method and device for processing request |
CN112039674B (en) * | 2020-08-06 | 2021-07-20 | 珠海格力电器股份有限公司 | Central control system access and signature identification generation method and device and storage medium |
CN111917787B (en) * | 2020-08-06 | 2023-07-21 | 北京奇艺世纪科技有限公司 | Request detection method, request detection device, electronic equipment and computer readable storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2127308A1 (en) * | 2007-02-23 | 2009-12-02 | Sony Ericsson Mobile Communications AB | Authorizing secure resources |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPWO2007007690A1 (en) * | 2005-07-07 | 2009-01-29 | 株式会社東芝 | Authentication system, apparatus and program |
CN103491084B (en) * | 2013-09-17 | 2016-06-15 | 天脉聚源(北京)传媒科技有限公司 | The authentication method of a kind of client and device |
CN104580154A (en) * | 2014-12-09 | 2015-04-29 | 上海斐讯数据通信技术有限公司 | Web service security access method, system and corresponding server |
CN104468589A (en) * | 2014-12-12 | 2015-03-25 | 上海斐讯数据通信技术有限公司 | Method and system for achieving lightweight-level conversation |
CN104869117B (en) * | 2015-05-14 | 2018-08-24 | 新华三技术有限公司 | A kind of safety certifying method and device |
-
2016
- 2016-11-10 CN CN201610992581.0A patent/CN106357694B/en not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2127308A1 (en) * | 2007-02-23 | 2009-12-02 | Sony Ericsson Mobile Communications AB | Authorizing secure resources |
Also Published As
Publication number | Publication date |
---|---|
CN106357694A (en) | 2017-01-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106357694B (en) | Access request processing method and device | |
CN107135073B (en) | Interface calling method and device | |
CN110213276B (en) | Authorization verification method under micro-service architecture, server, terminal and medium | |
JP6574168B2 (en) | Terminal identification method, and method, system, and apparatus for registering machine identification code | |
US10419431B2 (en) | Preventing cross-site request forgery using environment fingerprints of a client device | |
JP2021504832A (en) | Model training system and method and storage medium | |
CN111107073B (en) | Application automatic login method and device, computer equipment and storage medium | |
CN108243188B (en) | Interface access, interface call and interface verification processing method and device | |
CN112559993B (en) | Identity authentication method, device and system and electronic equipment | |
CN111030812A (en) | Token verification method, device, storage medium and server | |
EP3206329B1 (en) | Security check method, device, terminal and server | |
CN109474600B (en) | Account binding method, system, device and equipment | |
CN104753674A (en) | Application identity authentication method and device | |
CN112380501B (en) | Equipment operation method, device, equipment and storage medium | |
CN112560009A (en) | Authentication method, terminal, client and computer storage medium | |
CN107566329A (en) | A kind of access control method and device | |
CN114117551B (en) | Access verification method and device | |
CN111294337A (en) | Token-based authentication method and device | |
CN106888200B (en) | Identification association method, information sending method and device | |
CN110971609A (en) | Anti-cloning method of DRM client certificate, storage medium and electronic equipment | |
CN109710692B (en) | User information processing method and device in block chain network and storage medium | |
CN108965335B (en) | Method for preventing malicious access to login interface, electronic device and computer medium | |
CN111585978A (en) | Method, client, server and system for intercepting false requests | |
CN110581833B (en) | Service security protection method and device | |
CN105100030B (en) | Access control method, system and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: An access request processing method and device Effective date of registration: 20210104 Granted publication date: 20200207 Pledgee: Inner Mongolia Huipu Energy Co.,Ltd. Pledgor: TVMINING (BEIJING) MEDIA TECHNOLOGY Co.,Ltd. Registration number: Y2020990001527 |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200207 Termination date: 20211110 |