CN106815734B - Information transmission method and device - Google Patents

Information transmission method and device Download PDF

Info

Publication number
CN106815734B
CN106815734B CN201510850327.2A CN201510850327A CN106815734B CN 106815734 B CN106815734 B CN 106815734B CN 201510850327 A CN201510850327 A CN 201510850327A CN 106815734 B CN106815734 B CN 106815734B
Authority
CN
China
Prior art keywords
information
identifier
check code
code
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510850327.2A
Other languages
Chinese (zh)
Other versions
CN106815734A (en
Inventor
马明智
高超霖
杨友林
陈国斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Founder International Beijing Co Ltd
Original Assignee
Founder International Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Founder International Beijing Co Ltd filed Critical Founder International Beijing Co Ltd
Priority to CN201510850327.2A priority Critical patent/CN106815734B/en
Publication of CN106815734A publication Critical patent/CN106815734A/en
Application granted granted Critical
Publication of CN106815734B publication Critical patent/CN106815734B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0248Avoiding fraud

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses an information transmission method and device, comprising the following steps: receiving a table carrying information parameters at an information receiving end, wherein the information parameters are used for generating an identifier; generating a first identifier according to the table; sending a request for issuing information to a server, wherein the request carries the first identifier; receiving an information code and a first check code sent by a server, wherein the first check code is determined by the server according to the information code and a first identifier; generating a second check code according to the first identification and the received information code; and receiving the information issued by the server when the first check code is determined to be the same as the second check code. At an information sending end, sending a table carrying information parameters; receiving a request for sending information from a client, wherein the request carries a first identifier; generating a first check code according to the first identifier and the information code; sending an information code and a first check code; and sending the information. By adopting the scheme, whether the information is tampered or not can be accurately detected.

Description

Information transmission method and device
Technical Field
The present invention relates to the field of information network technologies, and in particular, to an information transmission method and apparatus.
Background
In recent years, along with the development of technologies such as network packet interception, traffic hijacking, route interception, cross-site scripting attack, DoS (Denial of Service) attack, click cheating and the like, and the defects of a network transmission protocol, browser loopholes, Domain Name System (DNS) hijacking in the telecommunication industry, illegal persons adopt limiting measures such as interception, filtration, shielding and the like on various advertisements rightfully operated by other people by utilizing various illegal software and plug-ins to realize the benefits of the illegal persons; hijacking network transmission data by using modes such as communication lines, plug-ins, virus programs, domain name resolution and the like, tampering various advertisements which are rightly managed by others, and recommending advertisements; damage the legitimate interests of others, detract the business reputation of others; enticing the consumer to enter the wrong website; malicious releases inappropriate speech or pictures that violate national laws and regulations. This practice not only violates the normal order of market competition, but also infringes the legitimate interests of the advertising publishers and the awareness of consumers.
The technical scheme of the existing tamper-resistant advertisement is that a server side encrypts and generates a corresponding decryption key to send to a client side, and the client side decrypts according to the decryption key.
The defects of the prior art are as follows: it is not possible to accurately detect whether the information has been tampered with.
Disclosure of Invention
The invention provides an information transmission method and device, which are used for accurately detecting whether information is tampered.
The embodiment of the invention provides an information receiving method, which comprises the following steps:
receiving a table carrying information parameters, wherein the information parameters are used for generating an identifier;
generating a first identifier according to the table;
sending a request for issuing information to a server, wherein the request carries the first identifier;
receiving an information code and a first check code sent by a server, wherein the first check code is determined by the server according to the information code and a first identifier;
generating a second check code according to the first identification and the received information code;
and receiving the information issued by the server when the first check code is determined to be the same as the second check code.
Preferably, the information parameter includes one or a combination of the following parameters and the system standard time: information label, information playing position and IP address.
Preferably, the generating the first identifier according to the table is generating the first identifier according to the table at a set time.
Preferably, further comprising:
if the first check code is different from the second check code, the information is discarded.
The embodiment of the invention provides an information sending method, which comprises the following steps:
sending a table carrying information parameters;
receiving a request for sending information by a client, wherein the request carries a first identifier, and the first identifier is generated by the client according to the table carrying the information parameters;
generating a first check code according to the first identifier and the information code;
sending an information code and a first check code;
and sending the information.
Preferably, after receiving a request for sending information from a client, before generating a first check code according to the first identifier and the information code, the method further includes:
determining that the first identifier carried in the request is unique.
Preferably, if the number of the first identifiers carried in the request is greater than 1, the first check code is not generated.
Preferably, before generating the first check code according to the first identifier and the information code, the method further includes:
and determining whether the second identifier generated according to the table carrying the information parameters is the same as the first identifier carried in the request.
An embodiment of the present invention provides an information receiving apparatus, including:
the first receiving module is used for receiving a table carrying information parameters, and the information parameters are used for generating an identifier;
the first generation module is used for generating a first identifier according to the table;
the first sending module is used for sending a request for sending information to a server, wherein the request carries the first identifier;
the second receiving module is used for receiving the information code and the first check code sent by the server, wherein the first check code is determined by the server according to the information code and the first identifier;
the second generating module is used for generating a second check code according to the first identifier and the received information code;
and the third receiving module is used for receiving the information issued by the server when the first check code is determined to be the same as the second check code.
Preferably, the first receiving module is further configured to receive a table carrying information parameters including one or a combination of the following parameters and system standard time: information label, information playing position and IP address.
Preferably, the first generating module is further configured to generate the first identifier according to the table at a set time.
Preferably, the third receiving module is further configured to discard the information when it is determined that the first check code is not identical to the second check code.
An embodiment of the present invention provides an information sending apparatus, including:
the second sending module is used for sending the table carrying the information parameters;
a fourth receiving module, configured to receive a request for sending information by a client, where the request carries a first identifier, and the first identifier is generated by the client according to the table with information parameters;
the third generating module is used for generating a first check code according to the first identifier and the information code;
the third sending module is used for sending the information code and the first check code;
and the fourth sending module is used for sending the information.
Preferably, the third generating module is further configured to determine that the first identifier carried in the request is unique after receiving the request for sending information from the client and before generating the first check code according to the first identifier and the information code.
Preferably, the third generating module is further configured to not generate the first check code when it is determined that the number of the first identifiers carried in the request is greater than 1.
Preferably, the third generating module is further configured to determine whether a second identifier generated according to the table carrying the information parameter is the same as the first identifier carried in the request before generating the first check code according to the first identifier and the information code.
The invention has the following beneficial effects:
in one solution of the technical solutions provided in the embodiments of the present invention, at an information receiving end, a first identifier is generated according to a parameter table carrying information acquired from a server end, and an information issuing request is made to the server end through the first identifier.
In another scheme, at an information sending end, an information code and a first check code generated according to the information code and a first identifier are sent to a client.
Then, the information receiving end can generate a second check code by the received information code and the first identification, and compare the second check code with the first check code, and if the check codes are the same, the information is not tampered. Therefore, whether the information is tampered or not can be accurately detected by adopting the scheme.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic flow chart of an information receiving method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an implementation flow of an information sending method in an embodiment of the present invention;
FIG. 3 is a flow chart of advertisement delivery in an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of an information receiving apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an information sending apparatus according to an embodiment of the present invention.
Detailed Description
The following describes embodiments of the present invention with reference to the drawings.
The embodiment of the invention provides a scheme for information transmission at an information receiving end and an information sending end respectively.
In the embodiment, a table for generating an identifier is added, and then the first identifier is an identifier generated by the information receiving terminal according to the table and can be used for requesting the server to issue information; the second identification is the identification generated by the information sending end according to the table, and if the first identification is the same as the second identification, the request is considered to be legal. The first check code is generated by the information sending end according to the information code and the first identification, the second check code is generated by the information receiving end according to the received information code and the first identification, and if the first check code is the same as the second check code, the information is considered to be legal. The information receiving end may be a device capable of transmitting and receiving information, such as a client or a terminal, and the information transmitting end may be a device capable of transmitting and receiving information, such as a server.
In the embodiments, a client is mainly used as an information receiving end, and a server is used as an information sending end, and the following detailed description will be given by taking the sending and receiving of advertisements as an example.
Fig. 1 is a schematic flow chart of an implementation of an information receiving method, which may include the following steps as shown in the figure:
step 101, receiving a table carrying information parameters, wherein the information parameters are used for generating an identifier;
102, generating a first identifier according to the table;
103, sending a request for issuing information to a server, wherein the request carries the first identifier;
step 104, receiving an information code and a first check code sent by a server, wherein the first check code is determined by the server according to the information code and a first identifier;
105, generating a second check code according to the first identifier and the received information code;
and 106, receiving the information issued by the server when the first check code is determined to be the same as the second check code.
In an implementation, the information parameter includes one or a combination of the following parameters and a system standard time: information label, information playing position and IP address.
Specifically, the advertisement parameters may include system standard time, advertisement ID, ad spot ID, client IP address, and the like.
In an implementation, the generating the first identifier according to the table is to generate the first identifier according to the table at a set time.
Specifically, the key value may be generated from the advertisement parameter, using the key value as the identifier. The client and the server generate synchronously changed identifications at intervals, so that the cracking difficulty is further increased, and the safety of network transmission is improved. The timing and synchronization mode can adopt a single or combined mode of advertisement position ID, advertisement ID, client IP and the like to take the surplus of the standard time minutes of the current system, namely, a mode of key-IP% min and the like, so as to ensure that the same key is obtained in the same minute.
In practice, if the first check code is not the same as the second check code, the message is discarded.
Receiving a check code c (first check code) generated by the advertisement server according to the key and the delivered advertisement code; after receiving the first check code and the advertisement code sent by the advertisement server, the client generates c '(second check code) according to the key and the advertisement code, and judges whether c is the same as c':
(1) if c is the same as c', the advertisement is considered to be a legal advertisement, and the advertisement is presented on the browser;
(2) if c is different from c', the advertisement is considered illegal and is shielded.
Fig. 2 is a schematic flow chart of an implementation of an information sending method, as shown in the figure, the method may include the following steps:
step 201, sending a table carrying information parameters;
step 202, receiving a request for sending information by a client, wherein the request carries a first identifier, and the first identifier is generated by the client according to the table carrying information parameters;
step 203, generating a first check code according to the first identifier and the information code;
step 204, sending the information code and the first check code;
step 205, sending the information.
In the implementation, after receiving a request for sending information from a client, before generating a first check code according to the first identifier and the information code, the method further includes:
determining that the first identifier carried in the request is unique.
In implementation, if the number of the first identifiers carried in the request is greater than 1, the first check code is not generated.
Specifically, after receiving a client request, the advertisement server firstly queries a request queue, and if the request queue only has a unique key, the advertisement server performs the next processing; if the same key exists in the request queue, the request queue is considered to be frequently clicked, the processing is stopped, and the DoS attack can be effectively resisted.
In implementation, before generating the first check code according to the first identifier and the information code, the method further includes:
and determining whether the second identifier generated according to the table carrying the information parameters is the same as the first identifier carried in the request.
The advertisement server judges the validity of the key according to the table for generating the identification, if the key received by the advertisement server is the same as the key generated by the advertisement server, the key is legal, namely the request for issuing the advertisement is legal, and the next processing can be carried out, namely a check code is generated; otherwise, the process is stopped.
In order to understand the technical solutions provided by the embodiments of the present invention as a whole, the following provides an implementation flow between an information receiving end and an information sending end, and a client is still used as the information receiving end, a server is used as the information sending end to describe, and a specific implementation manner is described by taking sending and receiving of an advertisement as an example.
Fig. 3 is a flow chart of advertisement delivery, which may include the following steps:
step 301, start;
step 302, the client side obtains a table used by the advertisement server side for generating the identification;
step 303, the client generates a key value according to the table and sends the key value to the advertisement server;
step 304, the advertisement server receives a key;
step 305, inquiring a request queue, judging whether the same key exists, if so, turning to step 313, and if not, turning to step 306;
step 306, the advertisement server judges whether the key is legal or not according to the table for generating the identifier, if so, the step 307 is carried out, and if not, the step 313 is carried out;
step 307, the advertisement server receives the request and generates a check code c according to the advertisement code to be launched and the key;
step 308, the advertisement server responds to the request and sends the advertisement code and c to the client;
step 309, the client generates a check code c' according to the key value and the advertisement code;
step 310, judging whether c is the same as c', if so, turning to step 311, otherwise, turning to step 312;
311, normally delivering advertisements, and turning to 313;
step 312, shielding the advertisement;
and step 313, finishing.
According to the embodiment, the technical scheme provided by the embodiment can realize the functions of improving the security of network transmission, resisting DoS attack, preventing the tampering of legal advertisements, preventing the clicking cheating of the advertisements and the like. Specifically, the method comprises the following steps:
(1) dynamic strategy: the client and the server dynamically and synchronously change the generation mode of the identification so as to increase the cracking difficulty and improve the safety of network transmission;
(2) and (3) an anti-attack strategy: after receiving the client request, the advertisement server firstly queries whether the request queue has the request with the same identifier, if so, the packet is discarded, and the method can effectively resist DoS attack;
(3) tamper-proof policy: the client generates a check code according to the self identification and the advertisement code, and compares the check code with the check code sent by the advertisement server to verify the validity of the advertisement;
(4) anti-cheating strategy: the advertisement server only responds to the requests with the same identification once in the same time interval so as to standardize the advertisement click recording mode and ensure the legal rights and interests of the advertisers.
Based on the same inventive concept, the embodiment of the invention also provides an information receiving device and an information sending device, and because the principle of solving the problems of the devices is similar to the principle of an information receiving method and an information sending method, the implementation of the devices can refer to the implementation of the methods, and repeated parts are not described again.
Fig. 4 is a schematic structural diagram of an information receiving apparatus, as shown in the figure, the apparatus may include:
a first receiving module 401, configured to receive a table carrying information parameters, where the information parameters are used to generate an identifier;
a first generating module 402, configured to generate a first identifier according to the table;
a first sending module 403, configured to send a request for sending information to a server, where the request carries the first identifier;
a second receiving module 404, configured to receive an information code and a first check code sent by a server, where the first check code is determined by the server according to the information code and the first identifier;
a second generating module 405, configured to generate a second check code according to the first identifier and the received information code;
and a third receiving module 406, configured to receive the information sent by the server when it is determined that the first check code is the same as the second check code.
In an implementation, the first receiving module may be further configured to receive a table carrying information parameters including one or a combination of the following parameters and the system standard time: information label, information playing position and IP address.
In an implementation, the first generating module may be further configured to generate the first identifier according to the table at a set time.
In an implementation, the third receiving module may be further configured to discard the information when it is determined that the first check code is different from the second check code.
Fig. 5 is a schematic structural diagram of an information sending apparatus, as shown in the figure, the apparatus may include:
a second sending module 501, configured to send a table with information parameters;
a fourth receiving module 502, configured to receive a request for sending information by a client, where the request carries a first identifier, and the first identifier is generated by the client according to the table with information parameters;
a third generating module 503, configured to generate a first check code according to the first identifier and the information code;
a third sending module 504, configured to send the information code and the first check code;
a fourth sending module 505, configured to send information.
In implementation, the third generating module may be further configured to determine that the first identifier carried in the request is unique after receiving a request for sending information from the client and before generating the first check code according to the first identifier and the information code.
In an implementation, the third generating module may be further configured to not generate the first check code when it is determined that the number of the first identifiers carried in the request is greater than 1.
In an implementation, the third generating module may be further configured to determine whether the second identifier generated according to the table carrying the information parameter is the same as the first identifier carried in the request, before generating the first check code according to the first identifier and the information code.
In summary, in one solution of the technical solutions provided in the embodiments of the present invention, in an information receiving end, a first identifier is generated according to a parameter table carrying information acquired from a server end, and the first identifier requests the server end to send information. In another scheme, at an information sending end, an information code and a first check code generated according to the information code and a first identifier are sent to a client. The information receiving end can generate a second check code by the received information code and the first identification, and compares the second check code with the first check code, and if the check codes are the same, the information is not tampered. Therefore, whether the information is tampered or not can be accurately detected by adopting the scheme.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (16)

1. An information receiving method, comprising:
receiving a table carrying information parameters, wherein the information parameters are used for generating an identifier;
generating a first identifier according to the table;
sending a request for issuing information to a server, wherein the request carries the first identifier;
receiving an information code and a first check code sent by a server, wherein the first check code is determined by the server according to the information code and a first identifier;
generating a second check code according to the first identification and the received information code;
and receiving the information issued by the server when the first check code is determined to be the same as the second check code.
2. The method of claim 1, wherein the information parameter comprises: and the combination of at least any one of the information label, the information playing position and the IP address and the system standard time.
3. The method of claim 1, wherein generating the first identifier from the table is generating the first identifier from the table at a set time.
4. The method of claim 1, further comprising:
if the first check code is different from the second check code, the information is discarded.
5. An information transmission method, comprising:
sending a table carrying information parameters;
receiving a request for sending information by a client, wherein the request carries a first identifier, and the first identifier is generated by the client according to the table carrying the information parameters;
generating a first check code according to the first identifier and the information code;
sending an information code and a first check code;
and sending the information.
6. The method of claim 5, wherein after receiving a request for sending information from a client, before generating a first check code according to the first identifier and an information code, the method further comprises:
determining that the first identifier carried in the request is unique.
7. The method of claim 6, wherein if the number of the first identifiers carried in the request is greater than 1, no first check code is generated.
8. The method of claim 6, wherein before generating the first check code based on the first identification and the information code, further comprising:
and determining whether the second identifier generated according to the table carrying the information parameters is the same as the first identifier carried in the request.
9. An information receiving apparatus, comprising:
the first receiving module is used for receiving a table carrying information parameters, and the information parameters are used for generating an identifier;
the first generation module is used for generating a first identifier according to the table;
the first sending module is used for sending a request for sending information to a server, wherein the request carries the first identifier;
the second receiving module is used for receiving the information code and the first check code sent by the server, wherein the first check code is determined by the server according to the information code and the first identifier;
the second generating module is used for generating a second check code according to the first identifier and the received information code;
and the third receiving module is used for receiving the information issued by the server when the first check code is determined to be the same as the second check code.
10. The apparatus of claim 9, wherein the first receiving module is further configured to receive a table carrying information parameters including: and the combination of at least any one of the information label, the information playing position and the IP address and the system standard time.
11. The apparatus of claim 9, wherein the first generating module is further configured to generate the first identifier according to the table at a set time.
12. The apparatus of claim 9, wherein the third receiving module is further configured to discard the information if the first check code is determined to be different from the second check code.
13. An information transmission apparatus, comprising:
the second sending module is used for sending the table carrying the information parameters;
a fourth receiving module, configured to receive a request for sending information by a client, where the request carries a first identifier, and the first identifier is generated by the client according to the table with information parameters;
the third generating module is used for generating a first check code according to the first identifier and the information code;
the third sending module is used for sending the information code and the first check code;
and the fourth sending module is used for sending the information.
14. The apparatus of claim 13, wherein the third generating module is further configured to determine that the first identifier carried in the request is unique after receiving a request for sending information from a client and before generating the first check code according to the first identifier and the information code.
15. The apparatus of claim 14, wherein the third generating module is further configured to not generate the first check code when it is determined that the number of the first identifiers carried in the request is greater than 1.
16. The apparatus of claim 14, wherein the third generating module is further configured to determine whether the second identifier generated according to the table carrying the information parameter is the same as the first identifier carried in the request before generating the first check code according to the first identifier and the information code.
CN201510850327.2A 2015-11-27 2015-11-27 Information transmission method and device Active CN106815734B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510850327.2A CN106815734B (en) 2015-11-27 2015-11-27 Information transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510850327.2A CN106815734B (en) 2015-11-27 2015-11-27 Information transmission method and device

Publications (2)

Publication Number Publication Date
CN106815734A CN106815734A (en) 2017-06-09
CN106815734B true CN106815734B (en) 2022-02-08

Family

ID=59155405

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510850327.2A Active CN106815734B (en) 2015-11-27 2015-11-27 Information transmission method and device

Country Status (1)

Country Link
CN (1) CN106815734B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108962141A (en) * 2018-07-25 2018-12-07 昆山国显光电有限公司 Display panel and offset data transfer check method
CN108766351A (en) * 2018-07-25 2018-11-06 昆山国显光电有限公司 Display panel and offset data transfer check method
CN111245877A (en) * 2018-11-29 2020-06-05 北京京东尚科信息技术有限公司 User risk index query method and device, electronic equipment and medium
CN109672756B (en) * 2019-02-14 2022-04-19 网宿科技股份有限公司 Data transmission method and related device, server and storage medium
CN112488109B (en) * 2020-12-10 2024-03-29 深圳市云辉牧联科技有限公司 Method and device for identifying livestock and poultry identification codes and computer readable storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0404452A2 (en) * 1989-06-16 1990-12-27 Canon Kabushiki Kaisha System utilizing portable device
US5569897A (en) * 1994-01-26 1996-10-29 Nippon Shinpan Co., Ltd. Credit card system and method of issuing credit card using such a system
CN101034985A (en) * 2007-02-09 2007-09-12 华中科技大学 Method and system for the anti-counterfeit of the mobile phone with the dynamic code
CN101197822A (en) * 2006-12-04 2008-06-11 西门子公司 System for preventing information leakage and method based on the same
CN101741823A (en) * 2008-11-12 2010-06-16 北京大学 Cross-validation safety communication method and system
CN101950403A (en) * 2010-09-15 2011-01-19 中国工商银行股份有限公司 Data processing method, device and system based on internet banking
CN103138922A (en) * 2011-11-24 2013-06-05 北大方正集团有限公司 Method, system and device for transmitting digital contents
CN103905474A (en) * 2012-12-25 2014-07-02 腾讯数码(天津)有限公司 Information sharing method, terminal, server and system
CN104469736A (en) * 2014-11-05 2015-03-25 中兴通讯股份有限公司 Data processing method, server and terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100670005B1 (en) * 2005-02-23 2007-01-19 삼성전자주식회사 Apparatus for verifying memory integrity remotely for mobile platform and system thereof and method for verifying integrity
CN102594806B (en) * 2012-01-31 2015-11-25 华为技术有限公司 Verification method and advertisement releasing server
CN104092647B (en) * 2013-11-25 2016-04-13 腾讯科技(深圳)有限公司 Network access method, system and client

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0404452A2 (en) * 1989-06-16 1990-12-27 Canon Kabushiki Kaisha System utilizing portable device
US5569897A (en) * 1994-01-26 1996-10-29 Nippon Shinpan Co., Ltd. Credit card system and method of issuing credit card using such a system
CN101197822A (en) * 2006-12-04 2008-06-11 西门子公司 System for preventing information leakage and method based on the same
CN101034985A (en) * 2007-02-09 2007-09-12 华中科技大学 Method and system for the anti-counterfeit of the mobile phone with the dynamic code
CN101741823A (en) * 2008-11-12 2010-06-16 北京大学 Cross-validation safety communication method and system
CN101950403A (en) * 2010-09-15 2011-01-19 中国工商银行股份有限公司 Data processing method, device and system based on internet banking
CN103138922A (en) * 2011-11-24 2013-06-05 北大方正集团有限公司 Method, system and device for transmitting digital contents
CN103905474A (en) * 2012-12-25 2014-07-02 腾讯数码(天津)有限公司 Information sharing method, terminal, server and system
CN104469736A (en) * 2014-11-05 2015-03-25 中兴通讯股份有限公司 Data processing method, server and terminal

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"第3章数字签名技术与应用";shituhao;《https://www.docin.com/p-950867675.html》;20141106;1-35 *
Spam Detection and Filtering on P2P System Using Agents;Packiavathy, M等;《2009 INTERNATIONAL CONFERENCE ON INTELLIGENT AGENT & MULTI-AGENT SYSTEMS》;20091230;152-158 *
现场总线通信技术的研究与实现;王征;《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》;20040915;I140-244 *

Also Published As

Publication number Publication date
CN106815734A (en) 2017-06-09

Similar Documents

Publication Publication Date Title
CN106815734B (en) Information transmission method and device
CN107135073B (en) Interface calling method and device
CN104113534B (en) The login system and method for application APP
CN105897782B (en) A kind of processing method and processing device of the call request for interface
US8813181B2 (en) Electronic verification systems
TWI633775B (en) Terminal identification method, machine identification code registration method, corresponding system and equipment
WO2016184216A1 (en) Link-stealing prevention method, link-stealing prevention server, and client side
CN104954330B (en) A kind of methods, devices and systems to be conducted interviews to data resource
CN107046544B (en) Method and device for identifying illegal access request to website
CN101075866B (en) Method and system for loading message on Internet
CN109474916B (en) Equipment authentication method, device and machine readable medium
CN105635126A (en) Malicious URL access protection method, client side, security server and system
CN111030812A (en) Token verification method, device, storage medium and server
CN109714370B (en) HTTP (hyper text transport protocol) -based cloud security communication implementation method
JP2011514588A (en) CAPTCHA advertising
CN105357190A (en) Method and system for performing authentication on access request
CN107613316B (en) Live network push stream verification method and system
CN106331042B (en) Single sign-on method and device for heterogeneous user system
US8176539B2 (en) Methods for protecting against cookie-poisoning attacks in networked-communication applications
CN108737110B (en) Data encryption transmission method and device for preventing replay attack
CN101860540A (en) Method and device for identifying legality of website service
CN105915494A (en) Anti-stealing-link method and system
CN106330968B (en) Identity authentication method and device for access equipment
CN111935095A (en) Source code leakage monitoring method and device and computer storage medium
CN106453305A (en) Member live broadcast link stealing prevention method and device, and network server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant