CN107704765A - A kind of interface access method, server and computer-readable recording medium - Google Patents
A kind of interface access method, server and computer-readable recording medium Download PDFInfo
- Publication number
- CN107704765A CN107704765A CN201710753466.2A CN201710753466A CN107704765A CN 107704765 A CN107704765 A CN 107704765A CN 201710753466 A CN201710753466 A CN 201710753466A CN 107704765 A CN107704765 A CN 107704765A
- Authority
- CN
- China
- Prior art keywords
- access
- targeted customer
- interface
- server
- institute
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The embodiment of the invention discloses a kind of interface access method, server and computer-readable recording medium, wherein method includes:When receiving the interface access request of targeted customer, the access rights of the targeted customer are verified;If verify and successfully, inquire about the history access frequency that the targeted customer is directed to institute's request interface;If the history access frequency is less than predetermined threshold value, the targeted customer is then allowed to access institute's request interface, control of the embodiment of the present invention by being verified to the access rights of targeted customer and to history access frequency, provide a kind of more flexible and efficient interface access safety mechanism, the security of interface access can be effectively improved, and ensures the availability of interface.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of interface access method, server and computer-readable
Storage medium.
Background technology
With the development of computer technology, user is more and more to the demand of the Internet, applications, the development of the Internet, applications
It is more and more faster.For the Internet, applications of high concurrent, the call number of server interface is very high, therefore can not arbitrarily be opened
The interface of oneself server, if interface arbitrarily exposed, the access of docking port is not any limitation as, and is easily caused improper user and is led to
Crossing interface attacks server, malice, frequently access interface causes servers go down to influence normal users use, even with interface
Steal a series of safety problem such as server user's information.
The safety problem accessed currently for interface, is mainly established IP address-based black using the fire wall of server
White list access mechanism, however, this security mechanism also has many drawbacks, flexibility ratio is poor, such as partner's server ip
Address, which changes, will cause its interface access request to be rejected, and user's use be influenceed, in addition, improper in white list
Also None- identified and worry remove access request.Therefore it provides a kind of more flexible and efficient interface access safety mechanism has significantly
Application value.
The content of the invention
The embodiment of the present invention provides a kind of interface access method, server and computer-readable recording medium, to provide one
The more flexible and efficient interface access safety mechanism of kind.
In a first aspect, the embodiments of the invention provide a kind of interface access method, this method includes:
When receiving the interface access request of targeted customer, the access rights of the targeted customer are verified;
If verify and successfully, inquire about the history access frequency that the targeted customer is directed to institute's request interface;
If the history access frequency is less than predetermined threshold value, the targeted customer is allowed to access institute's request interface.
Second aspect, the embodiments of the invention provide a kind of server, the server includes being used to perform above-mentioned first party
The unit of the method in face.
The third aspect, the embodiments of the invention provide another server, including processor, input equipment, output equipment
And memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store
Support server to perform the computer program of the above method, the computer program includes programmed instruction, the processor by with
Put for calling described program to instruct, the method for performing above-mentioned first aspect.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium
Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor
The method for stating the above-mentioned first aspect of computing device.
The embodiment of the present invention is by when receiving the interface access request of targeted customer, to the access right of the targeted customer
Limit is verified, and the history access frequency that the targeted customer is directed to institute's request interface successfully, is inquired about if verifying, if the history is visited
Ask that frequency is less than predetermined threshold value, then allow the targeted customer to access institute's request interface.The embodiment of the present invention compared to prior art,
Provide a kind of more flexible and efficient interface access safety mechanism.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area
For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow diagram of interface access method provided in an embodiment of the present invention;
Fig. 2 is the schematic flow diagram of another interface access method provided in an embodiment of the present invention;
Fig. 3 is a kind of schematic block diagram of server provided in an embodiment of the present invention;
Fig. 4 is another server schematic block diagram provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but it is not precluded from one or more of the other feature, whole
Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and appended claims is
Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the server described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface
The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just
Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile
Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the server including display and touch sensitive surface is described.It is, however, to be understood that
, server can include such as physical keyboard, mouse and/or control-rod one or more of the other physical user interface set
It is standby.
Server supports various application programs, such as one or more of following:Drawing application program, demonstration application journey
Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application
Program, telephony application, videoconference application, email application, instant messaging applications, exercise
Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application
Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed on the server can use at least one public affairs of such as touch sensitive surface
Physical user-interface device altogether.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitivity
The corresponding information shown in the one or more functions and server on surface.So, the public physical structure (example of server
Such as, touch sensitive surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
The embodiment of the present invention, server can reach before the interface access request of targeted customer is received with targeted customer
Into cooperative relationship, server is in advance to public key and agreement encryption data to be encrypted corresponding to the targeted customer of cooperation.Service
Device can receive the interface access request of targeted customer, and checking information is carried in the interface access request, the checking information bag
Check value, public key and agreement encryption data to be encrypted are included, server can be according to the checking information to the targeted customer's
Access rights are verified.Specifically, server can be by predetermined order algorithm, to being stored in local private key, receiving
Public key and agreement encryption data to be encrypted be ranked up, the ranking value got is spliced into a character string, passed through
The character string is encrypted preset AES, obtains encrypted result data, server by the encrypted result data with
Received check value carries out matching checking, if verifying successfully, inquires about the targeted customer going through for institute's request interface
History access frequency, if the history access frequency is less than predetermined threshold value, the targeted customer is allowed to access institute's request interface.
It should be noted that the check value in the checking information that server receives is used to verify whether the targeted customer has
Authority calls institute's request interface, will not be a fixed value because the check value is generated according to different data encryptions,
Therefore only targeted customer could be according to correct method call to corresponding interface.
In one embodiment, server is after the interface access request of targeted customer is received, to the targeted customer
Access rights verified before, the targeted customer can be detected to asking according to the public key in the checking information received
The Action Events of interface are sought, if detecting malicious operation event, server can cancel the targeted customer to asking to connect
The access rights of mouth.
In one embodiment, the encrypted result data can be carried out matching with received check value and test by server
Card, if the encrypted result data mismatch with received check value, verification failure, refuse the targeted customer and visit
Ask institute's request interface.
In one embodiment, if server judges that the history access frequency of the targeted customer is less than predetermined threshold value,
Allow the targeted customer to access institute's request interface, and by it is accumulative it is incremental in a manner of store the history access frequency, server
If in preset time range threshold value, inquire stored history access frequency and be more than or equal to predetermined threshold value, then server
Access of the targeted customer to institute's request interface can be stopped.
A kind of interface access method that the embodiment of the present invention is provided, by the checking of the access rights to targeted customer,
The security of interface access is improved, after to being verified of the access rights of targeted customer, passes through control targe user
To the access frequency of institute's request interface, prevent targeted customer from excessively calling institute's request interface to be imitated to reach anti-brush within the unit interval
Fruit, ensure the availability of interface.
Referring to Fig. 1, Fig. 1 is a kind of schematic flow diagram of interface access method provided in an embodiment of the present invention, as shown in Figure 1
Interface access method, this method may include:
S101:When receiving the interface access request of targeted customer, the access rights of the targeted customer are verified.
In the embodiment of the present invention, server can receive the interface access request of user, when receiving connecing for targeted customer
During mouth access request, server can verify to the access rights of the targeted customer.Wherein, the target that server receives
Checking information is carried in the interface access request of user, the checking information includes check value, public key and agreement encryption data.
In one embodiment, server can obtain the interface when receiving the interface access request of targeted customer
The checking information carried in access request, the checking information include check value, public key and agreement encryption data.Server can
So that the agreement encryption data to be encrypted, obtain encrypted result data, and by the encrypted result data with it is described
Check value carries out matching checking.
In one embodiment, server can pass through default row when receiving the interface access request of targeted customer
Sequence algorithm, the public key and agreement encryption data for being stored in local private key, receiving are ranked up, by what is got
Ranking value is spliced into a character string, and the character string is encrypted by preset AES, obtains encrypted result number
According to.Specifically, server can when receiving the interface access request including check value, public key and agreement encryption data,
It is ranked up by predetermined order algorithm to being stored in local private key, the public key received and agreement encryption data, and
The ranking value got is spliced into a character string, the character string is encrypted by preset AES, added
Close result data, and the encrypted result data and received check value are subjected to matching checking.
Specifically can be for example, server be being received including check value sign values, public key key and agreement to be encrypted
During the interface access request of encryption data, the server can be by predetermined order algorithm rsort, to being stored in local private key
Secret, the public key key received and user name and user cipher (agreement encryption data) are ranked up, and obtain ranking value,
The ranking value got can be spliced into a character string by server, and by Hash hashing algorithm Hash, (preset encryption is calculated
Method) character string is encrypted, encrypted result data are obtained, and the encrypted result data are entered with received check value
Row matching checking.
In one embodiment, if server detects that the encrypted result data match with the check value, really
Verify successfully calmly, if the encrypted result data mismatch with the check value, it is determined that verification failure, server will be refused
The targeted customer accesses institute's request interface.
In one embodiment, server is after the interface access request of targeted customer is received, to the targeted customer
Access rights verified before, the targeted customer can be detected to asking according to the public key in the checking information received
The Action Events of interface are sought, if detecting malicious operation event, server can cancel the targeted customer to asking to connect
The access rights of mouth.Specifically can for example, server after the interface access request of targeted customer is received, to the target
Before the access rights of user are verified, the targeted customer can be detected according to the public key key in the checking information received
To the Action Events of institute's request interface, Action Events are distorted if detected, server can cancel the targeted customer to institute
The access rights of request interface.
Embodiment of the present invention is verified to the access rights of targeted customer by the interface access request received,
Non-targeted user's brush interface can be prevented, so as to improve the access safety of interface.
S102:If verify and successfully, inquire about the history access frequency that the targeted customer is directed to institute's request interface.
In the embodiment of the present invention, server can obtain encrypted result according to the checking information of the targeted customer received
Data, and the encrypted result data and received check value are subjected to matching checking, if encrypted result data are with being connect
The check value matching received, then server, which can confirm that, verifies successfully, and server can inquire about the targeted customer for being asked
The history access frequency of interface, the access frequency refer to the access times in the unit interval.Specifically can be for example, server can
To obtain history access frequency of the targeted customer for institute's request interface as 10 beats/min.It can be seen that the embodiment passes through in school
After testing successfully, the history access frequency that the targeted customer is directed to institute's request interface is inquired about, in order to which server judges the target
Whether the access frequency of user exceedes predetermined threshold value.
S103:If the history access frequency is less than predetermined threshold value, the targeted customer is allowed to access institute's request interface.
In the embodiment of the present invention, server is when confirming to verify successfully the access rights of targeted customer, it can be determined that should
Whether the history access frequency of targeted customer is less than predetermined threshold value, if being less than, allows the targeted customer to access institute's request interface.
In one embodiment, server can obtain the history access frequency that targeted customer is directed to institute's request interface, inspection
Survey whether the history access frequency is less than predetermined threshold value, the history access frequency of the targeted customer is less than default threshold if detecting
Value, then allow the targeted customer to access institute's request interface, and by it is accumulative it is incremental in a manner of store the history access frequency.Tool
Body can for example, server can obtain targeted customer for institute's request interface history access frequency be 10 beats/min, its
In, predetermined threshold value is 20 beats/min, server detect 10 beats/min of the history access frequency be less than predetermined threshold value 20 times/
Minute, i.e., 10<20, then the server allow the targeted customer to access institute's request interface, and by it is accumulative it is incremental in a manner of store
The history access frequency is 11 beats/min, i.e., 10+1=11 beats/min, server by utilizing caching technology redis stores this and gone through
History access frequency, to limit access times of the targeted customer in preset time.
In one embodiment, if server is in preset time range threshold value, the stored history access frequency of detection
Whether it is less than predetermined threshold value, if testing result is no, stops access of the targeted customer to institute's request interface, and export
Prompt message, the prompt message are used to prompt the targeted customer that the access times in preset time range threshold value have been used
It is complete.If specifically can for example, server in 1 minute (in preset time range threshold value), if detecting the targeted customer
History access frequency for 21 times be more than it is per minute access 20 times (predetermined threshold values), then server can stop the targeted customer couple
The access of institute's request interface, and prompt message is exported, the prompt message is used to prompt the targeted customer in preset time model
The access times enclosed in threshold value have been used up.It can be seen that embodiment of the present invention is by after verifying successfully, the visit to targeted customer
Ask that frequency is limited, the irrational calling interface of targeted customer can be prevented, so as to improve the availability of interface access.
The embodiment of the present invention, by when receiving the interface access request of targeted customer, the access to the targeted customer
Authority is verified, and after verifying successfully, then the history access frequency that the targeted customer is directed to institute's request interface is inquired about, if this is gone through
History access frequency is less than predetermined threshold value, then allows the targeted customer to access institute's request interface, and targeted customer is accessed so as to realize
The checking of authority and unreasonable calling of the targeted customer to institute's request interface is prevented, so as to, there is provided a kind of more flexible height
The interface access safety mechanism of effect.
Referring to Fig. 2, Fig. 2 is the schematic flow diagram of another interface access method provided in an embodiment of the present invention, as schemed institute
The interface access method shown may include:
S201:Obtain check value, public key and agreement encryption data.
In the embodiment of the present invention, server can obtain check value, public key and agreement encryption data.Specifically, service
For device when receiving the interface access request of targeted customer, server can obtain the checking letter carried in the interface access request
Breath, the checking information include check value, public key and agreement encryption data.
S202:By predetermined order algorithm, to being stored in local private key, the public key received and agreement encryption data
It is ranked up.
In the embodiment of the present invention, server can be by predetermined order algorithm, to being stored in local private key, receiving
Public key and agreement encryption data are ranked up.Specifically, server can receive the interface access request of targeted customer
When, by predetermined order algorithm, it is ranked up to being stored in local private key, the public key received and agreement encryption data,
So as to acquire ranking value.
It can specifically be wrapped in the interface access request for example, server receives the interface access request of targeted customer
Checking information is included, the checking information includes check value sign values, public key key and agreement encryption data user_id, user_
pwd;Server, which can obtain, is stored in local private key secret.Wherein, each parameter in the checking information that server is got
Value be:
Key=900150983cd24fb0d6963f7d28e17f72;
Secret=011134986548f3458aa3e7e2a7fceb8d;
User_id=100;
User_pwd=123wqe.
Server after being handled by rsort sort algorithms, can acquire sequence according to the value of above-mentioned each parameter
Value, i.e. array " array (' user_pwd', ' user_id', ' secret', ' key') ".
In one embodiment, server is after the interface access request of targeted customer is received, to the targeted customer
Access rights verified before, the targeted customer can be detected to asking according to the public key in the checking information received
The Action Events of interface are sought, if detecting malicious operation event, server can cancel the targeted customer to asking to connect
The access rights of mouth.Specifically can for example, server after the interface access request of targeted customer is received, to the target
Before the access rights of user are verified, the targeted customer can be detected according to the public key key in the checking information received
To the Action Events of institute's request interface, Action Events are distorted if detected, server can cancel the targeted customer to institute
The access rights of request interface.
Embodiment of the present invention is verified to the access rights of targeted customer by the interface access request received,
Non-targeted user's brush interface can be prevented, so as to improve the access safety of interface.
S203:The ranking value got is spliced into a character string.
In the embodiment of the present invention, server is calculated when receiving the interface access request of targeted customer by predetermined order
Method, the data for being stored in local private key, the public key received and needs are encrypted are ranked up, acquire ranking value it
Afterwards, the ranking value got can be spliced into a character string.Specifically can be for example, as described above, server be got
Checking information in the value of each parameter be:
Key=900150983cd24fb0d6963f7d28e17f72;
Secret=011134986548f3458aa3e7e2a7fceb8d;
User_id=100;
User_pwd=123wqe.
Server can be sorted by rsort sort algorithms (predetermined order algorithm) to above-mentioned checking information, will be got
Ranking value " array (' user_pwd', ' user_id', ' secret', ' key') " splicing, obtain character string
“123wqe100011134986548f3458aa3e7e2a7fceb8d900150983cd24fb0d6963f7d28e17f72”。
S204:The character string is encrypted by preset AES, obtains encrypted result data.
In the embodiment of the present invention, server the character string got can be encrypted by preset AES,
Obtain encrypted result data.Specifically can be for example, server can be by hash algorithm (preset AES), will be above-mentioned
The character string that splicing obtains is ranked up to checking information by rsort sort algorithms
" 123wqe100011134986548f3458aa3e7e2a7fceb8d900150983cd24fb 0d6963f7d28e17f72 " enter
Row encryption, after the encryption, server can obtain encrypted result data
“88935c46d6d1fbc62e626de2cb3e2f970e61fa98”。
S205:The encrypted result data and the check value are subjected to matching checking.
In the embodiment of the present invention, the encrypted result data can be carried out matching with received check value and tested by server
Card.For example, server will can be encrypted above by hash algorithm (preset AES), the encrypted result number acquired
According to " 88935c46d6d1fbc62e626de2cb3e2f970e61fa98 ", matched with received check value sign values
Checking.
S206:If verify and successfully, inquire about the history access frequency that the targeted customer is directed to institute's request interface.
In the embodiment of the present invention, server can obtain encrypted result according to the checking information of the targeted customer received
Data, and the encrypted result data and received check value are subjected to matching checking, if encrypted result data are with being connect
The check value matching received, then server, which can confirm that, verifies successfully, and server can inquire about the targeted customer for being asked
The history access frequency of interface, the access frequency refer to the access times in the unit interval.Specifically can be for example, server can
To obtain history access frequency of the targeted customer for institute's request interface as 10 beats/min.It can be seen that the embodiment passes through in school
After testing successfully, the history access frequency that the targeted customer is directed to institute's request interface is inquired about, in order to which server judges the target
Whether the access frequency of user exceedes predetermined threshold value.
In one embodiment, server can obtain encrypted result according to the checking information of the targeted customer received
Data, and the encrypted result data and received check value are subjected to matching checking, if encrypted result data are with being connect
The check value received is mismatched, then server can confirm that verification failure, and institute's request interface is accessed so as to refuse the targeted customer.
S207:If the history access frequency is less than predetermined threshold value, the targeted customer is allowed to access institute request interface, and with
Add up incremental mode and store the history access frequency.
In the embodiment of the present invention, server is when confirming to verify successfully the access rights of targeted customer, it can be determined that should
Whether the history access frequency of targeted customer is less than predetermined threshold value, if being less than, allows the targeted customer to access institute's request interface.
Specifically, server can obtain the history access frequency that targeted customer is directed to institute's request interface, be gone through described in detection
Whether history access frequency is less than predetermined threshold value, if detecting, the history access frequency of the targeted customer is less than predetermined threshold value, permits
Perhaps the targeted customer accesses institute's request interface, and by it is accumulative it is incremental in a manner of store the history access frequency.It can specifically lift
Example explanation, it is 10 beats/min that server, which can obtain targeted customer for the history access frequency of institute's request interface, wherein, in advance
If threshold value is 20 beats/min, server detects that 10 beats/min of the history access frequency is less than 20 beats/min of predetermined threshold value,
I.e. 10<20, then the server allow the targeted customer to access institute's request interface, and by it is accumulative it is incremental in a manner of store described go through
History access frequency is 11 beats/min, i.e., 10+1=11 beats/min.
In one embodiment, if server is in preset time range threshold value, the stored history access frequency of detection
Whether it is less than predetermined threshold value, if testing result is no, stops access of the targeted customer to institute's request interface, and export
Prompt message, the prompt message are used to prompt the targeted customer that the access times in preset time range threshold value have been used
It is complete.If specifically can for example, server in 1 minute (in preset time range threshold value), if detecting the targeted customer
History access frequency for 21 times be more than it is per minute access 20 times (predetermined threshold values), then server can stop the targeted customer couple
The access of institute's request interface, and prompt message is exported, the prompt message is used to prompt the targeted customer in preset time model
The access times enclosed in threshold value have been used up.It can be seen that embodiment of the present invention is by after verifying successfully, the visit to targeted customer
Ask that frequency is limited, the irrational calling interface of targeted customer can be prevented, so as to improve the availability of interface access.
The embodiment of the present invention, server by predetermined order algorithm, to the public key that is stored in local key, receives with
And agreement encryption data is ranked up, the ranking value got is spliced into a character string, passes through preset AES pair
The character string is encrypted, and the encrypted result data got and received check value are carried out into matching checking, if verification
Success, then the history access frequency that the targeted customer is directed to institute's request interface is inquired about, if the history access frequency is less than default threshold
Value, then allow the targeted customer to access institute request interface, and by it is accumulative it is incremental in a manner of store the history access frequency, if pre-
If in time range threshold value, inquiring stored history access frequency and being more than or equal to predetermined threshold value, then stop target use
Access of the family to institute's request interface, it thereby may be ensured that the security of interface access and the availability of interface.
The embodiment of the present invention also provides a kind of server, and the server is used for the list for performing the method described in foregoing any one
Member.Specifically, referring to Fig. 3, Fig. 3 is a kind of schematic block diagram of server provided in an embodiment of the present invention.The service of the present embodiment
Device includes:Verification unit 301, query unit 302, access unit 303.
Verification unit 301, for when receiving the interface access request of targeted customer, the access to the targeted customer
Authority is verified;
Query unit 302, if for verifying the history access for successfully, inquiring about the targeted customer for institute's request interface
Frequency;
Access unit 303, if being less than predetermined threshold value for the history access frequency, the targeted customer is allowed to access
Institute's request interface.
Specifically, checking information is carried in the interface access request;The checking information include check value, public key and
Need the agreement encryption data encrypted;The verification unit 301, add specifically for obtaining check value, public key and the agreement
Ciphertext data;The agreement encryption data is encrypted, obtains encrypted result data;By the encrypted result data and institute
State check value and carry out matching checking.
Specifically, the verification unit 301, it is additionally operable to by predetermined order algorithm, to being stored in local private key, receiving
To public key and agreement encryption data be ranked up;The ranking value got is spliced into a character string;By preset
The character string is encrypted AES, obtains encrypted result data.
Specifically, the verification unit 301, matched if being additionally operable to the encrypted result data with the check value,
Verify successfully;If the encrypted result data mismatch with the check value, verification failure, refuse the targeted customer and visit
Ask institute's request interface.
Specifically, the access unit 303, specifically for obtaining the history access frequency;The history is detected to access
Whether frequency is less than predetermined threshold value;If testing result is yes, the targeted customer is allowed to access institute's request interface, and with tired
Count incremental mode and store the history access frequency.
Specifically, the access unit 303, is additionally operable in preset time range threshold value, and the stored history of detection is visited
Ask whether frequency is less than predetermined threshold value;If testing result is no, stop access of the targeted customer to institute's request interface,
And prompt message is exported, the prompt message is used to prompt access times of the targeted customer in preset time range threshold value
Have been used up.
Specifically, the server also includes:
Detection unit 304, for according to the public key received, detecting behaviour of the targeted customer to institute's request interface
Make event;If detecting malicious operation event, cancel access rights of the targeted customer to institute's request interface.
The embodiment of the present invention, server can receive the interface access request of targeted customer by verification unit 301
When by, the access rights of the targeted customer are verified, after verifying successfully, pass through query unit 302 inquire about the target
User is directed to the history access frequency of institute's request interface, if the history access frequency is less than predetermined threshold value, passes through access interface
303 allow the targeted customer to access institute's request interface, so as to realize the checking to targeted customer's access rights and prevent target
User, so as to provide a kind of more flexible and efficient interface access safety mechanism, carries to the unreasonable calling of institute's request interface
The security and availability that high interface accesses.
Referring to Fig. 4, Fig. 4 is another server schematic block diagram provided in an embodiment of the present invention.This implementation as depicted
Server in example can include:One or more processors 401;One or more input equipments 402, one or more output
Equipment 403 and memory 404.Above-mentioned processor 401, input equipment 402, output equipment 403 and memory 404 pass through bus
405 connections.Memory 402 is used for store instruction, and processor 401 is used for the instruction for performing the storage of memory 402.Wherein, handle
Device 401 is used for:
When receiving the interface access request of targeted customer, the access rights of the targeted customer are verified;
If verify and successfully, inquire about the history access frequency that the targeted customer is directed to institute's request interface;
If the history access frequency is less than predetermined threshold value, the targeted customer is allowed to access institute's request interface.
Further, the processor 401 is additionally operable to perform following steps:
Obtain the check value, public key and agreement encryption data;
The agreement encryption data is encrypted, obtains encrypted result data;
The encrypted result data and the check value are subjected to matching checking.
Further, the processor 401 is additionally operable to perform following steps:
By predetermined order algorithm, carried out to being stored in local private key, the public key received and agreement encryption data
Sequence;
The ranking value got is spliced into a character string;
The character string is encrypted by preset AES, obtains encrypted result data;
The encryption data and received check value are subjected to matching checking.
Further, the processor 401 is additionally operable to perform following steps:
If the encrypted result data match with the check value, verify successfully;
If the encrypted result data mismatch with the check value, verification failure, refuse the targeted customer and visit
Ask institute's request interface.
Further, the processor 401 is additionally operable to perform following steps:
Obtain the history access frequency;
Detect whether the history access frequency is less than predetermined threshold value;
If testing result is yes, allow the targeted customer to access institute's request interface, and by it is accumulative it is incremental in a manner of
Store the history access frequency.
Further, the processor 401 is additionally operable to perform following steps:
In preset time range threshold value, whether the stored history access frequency of detection is less than predetermined threshold value;
If testing result is no, stop access of the targeted customer to institute's request interface, and export prompt message,
The prompt message is used to prompt the targeted customer that the access times in preset time range threshold value have been used up.
Further, the processor 401 is additionally operable to perform following steps:
According to the public key received, Action Events of the targeted customer to institute's request interface are detected;
If detecting malicious operation event, cancel access rights of the targeted customer to institute's request interface.
The embodiment of the present invention is by when receiving the interface access request of targeted customer, to the access right of the targeted customer
Limit is verified, and the history access frequency that the targeted customer is directed to institute's request interface successfully, is inquired about if verifying, if the history is visited
Ask that frequency is less than predetermined threshold value, then allow the targeted customer to access institute's request interface.The embodiment of the present invention compared to prior art,
A kind of more flexible and efficient interface access safety mechanism is provided, improves the security and availability of interface access.
It should be appreciated that in embodiments of the present invention, alleged processor 401 can be CPU (Central
Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
It can also be any conventional processor etc. to manage device.
Input equipment 402 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint
Directional information), microphone etc., output equipment 403 can include display (LCD etc.), loudspeaker etc..
The memory 404 can include read-only storage and random access memory, and to processor 401 provide instruction and
Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited
Store up the information of device type.
In the specific implementation, processor 401, input equipment 402, the output equipment 403 described in the embodiment of the present invention can
Perform institute in the embodiment described in a kind of Fig. 1 of interface access method provided in an embodiment of the present invention or the embodiment described in Fig. 2
The implementation of description, the implementation of the server described by the embodiment of the present invention is also can perform, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable storage medium are additionally provided in an embodiment of the present invention
Matter is stored with computer program, and the computer program is realized when being executed by processor in embodiment described in Fig. 1 or Fig. 2 of the present invention
Described implementation, the implementation of the server described by Fig. 3 of the present invention is also can perform, will not be repeated here.
The computer-readable recording medium can be the internal storage unit of the server described in foregoing any embodiment,
Such as the hard disk or internal memory of server.The computer-readable recording medium can also be that the external storage of the server is set
Plug-in type hard disk that is standby, such as being equipped with the server, intelligent memory card (Smart Media Card, SMC), secure digital
(Secure Digital, SD) blocks, flash card (Flash Card) etc..Further, the computer-readable recording medium is also
The internal storage unit of the server can both be included or including External memory equipment.The computer-readable recording medium is used
In other programs and data needed for the storage computer program and the server.The computer-readable recording medium
It can be also used for temporarily storing the data that has exported or will export.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware
With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This
A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially
Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not
It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the clothes of foregoing description
The specific work process of business device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed server and method, can pass through
Other modes are realized.For example, server example described above is only schematical, for example, the unit is drawn
Point, only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can
To combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is in addition, shown or discussed
Mutual coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication by some interfaces or unit
Connection or electricity, the connection of mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs
Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated
Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to be contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product
Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced
Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right
It is required that protection domain be defined.
Claims (10)
- A kind of 1. interface access method, it is characterised in that including:When receiving the interface access request of targeted customer, the access rights of the targeted customer are verified;If verify and successfully, inquire about the history access frequency that the targeted customer is directed to institute's request interface;If the history access frequency is less than predetermined threshold value, the targeted customer is allowed to access institute's request interface.
- 2. according to the method for claim 1, it is characterised in that carry checking information in the interface access request;It is described Checking information includes check value, public key and agreement encryption data;It is described that the access rights of the targeted customer are verified when receiving the interface access request of targeted customer, bag Include:Obtain the check value, public key and agreement encryption data;The agreement encryption data is encrypted, obtains encrypted result data;The encrypted result data and the check value are subjected to matching checking.
- 3. according to the method for claim 2, it is characterised in that it is described that the agreement encryption data is encrypted, Encrypted result data are obtained, including:By predetermined order algorithm, the public key and agreement encryption data for being stored in local private key, receiving are carried out Sequence;The ranking value got is spliced into a character string;The character string is encrypted by preset AES, obtains encrypted result data.
- 4. according to the method for claim 2, it is characterised in that described to enter the encrypted result data with the check value Row matching checking, including:If the encrypted result data match with the check value, verify successfully;If the encrypted result data mismatch with the check value, verification failure, refuse the targeted customer and access institute Request interface.
- 5. according to the method for claim 1, it is characterised in that if the history access frequency is less than predetermined threshold value, The targeted customer is then allowed to access institute's request interface, including:Obtain the history access frequency;Detect whether the history access frequency is less than predetermined threshold value;If testing result is yes, allow the targeted customer to access institute's request interface, and by it is accumulative it is incremental in a manner of store The history access frequency.
- 6. according to the method for claim 5, it is characterised in that it is default whether the detection history access frequency is less than Threshold value, in addition to:In preset time range threshold value, whether the stored history access frequency of detection is less than predetermined threshold value;If testing result is no, stop access of the targeted customer to institute's request interface, and export prompt message, it is described Prompt message is used to prompt the targeted customer that the access times in preset time range threshold value have been used up.
- 7. according to the method for claim 2, it is characterised in that the access rights to the targeted customer verify Before, including:According to the public key received, Action Events of the targeted customer to institute's request interface are detected;If detecting malicious operation event, cancel access rights of the targeted customer to institute's request interface.
- 8. a kind of server, it is characterised in that including for performing the method as described in claim 1-7 any claims Unit.
- A kind of 9. server, it is characterised in that including processor, input equipment, output equipment and memory, the processor, Input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store computer program, the calculating Machine program includes programmed instruction, and the processor is arranged to call described program instruction, performed as claim 1-7 is any Method described in.
- A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, The computer program includes programmed instruction, and described program instruction makes the computing device such as right when being executed by a processor It is required that the method described in any one of 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710753466.2A CN107704765A (en) | 2017-08-28 | 2017-08-28 | A kind of interface access method, server and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710753466.2A CN107704765A (en) | 2017-08-28 | 2017-08-28 | A kind of interface access method, server and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107704765A true CN107704765A (en) | 2018-02-16 |
Family
ID=61169895
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710753466.2A Withdrawn CN107704765A (en) | 2017-08-28 | 2017-08-28 | A kind of interface access method, server and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107704765A (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108628611A (en) * | 2018-04-20 | 2018-10-09 | 无锡盈达聚力科技有限公司 | A kind of data calling method and data call device |
CN108804940A (en) * | 2018-05-11 | 2018-11-13 | 同程网络科技股份有限公司 | A kind of anti-brush method of Web Api interfaces |
CN109298939A (en) * | 2018-09-26 | 2019-02-01 | 腾讯科技(深圳)有限公司 | Access frequency control method, device, system and the server of distributed system |
CN109309667A (en) * | 2018-08-28 | 2019-02-05 | 东软集团股份有限公司 | The authentication method and device, storage medium and electronic equipment that interface calls |
CN109728969A (en) * | 2018-05-18 | 2019-05-07 | 平安普惠企业管理有限公司 | Abnormal user method for detecting, monitoring service end and the storage medium of application software |
CN110191004A (en) * | 2019-06-18 | 2019-08-30 | 北京搜狐新媒体信息技术有限公司 | A kind of port detecting method and system |
CN110222504A (en) * | 2019-05-21 | 2019-09-10 | 平安银行股份有限公司 | Monitoring method, device, terminal device and the medium of user's operation |
CN110300125A (en) * | 2019-02-02 | 2019-10-01 | 奇安信科技集团股份有限公司 | API Access control method and API Access agent apparatus |
CN110417615A (en) * | 2019-06-21 | 2019-11-05 | 中国平安财产保险股份有限公司 | Verify method of controlling switch, device, equipment and computer readable storage medium |
CN111083057A (en) * | 2019-11-26 | 2020-04-28 | 苏宁云计算有限公司 | Flow control method and device and computer storage medium |
CN111262737A (en) * | 2020-01-16 | 2020-06-09 | Tcl移动通信科技(宁波)有限公司 | Port configuration management method and device, storage medium and terminal |
CN111274291A (en) * | 2020-01-20 | 2020-06-12 | 中国平安人寿保险股份有限公司 | Query method, device, equipment and medium for user access data |
CN111770126A (en) * | 2019-06-28 | 2020-10-13 | 北京京东尚科信息技术有限公司 | Service request processing method, device and storage medium |
CN111953635A (en) * | 2019-05-15 | 2020-11-17 | 福建天晴数码有限公司 | Interface request processing method and computer-readable storage medium |
CN112839006A (en) * | 2019-11-22 | 2021-05-25 | Oppo广东移动通信有限公司 | Open platform interface calling method and related product |
CN113377605A (en) * | 2021-02-10 | 2021-09-10 | 北京声智科技有限公司 | Access monitoring method, device, server and computer readable storage medium |
CN113645217A (en) * | 2021-08-06 | 2021-11-12 | 上海中通吉网络技术有限公司 | Method for adaptively adjusting access threshold |
CN114640700A (en) * | 2020-11-30 | 2022-06-17 | 腾讯科技(深圳)有限公司 | Calling frequency control method and device |
CN115758300A (en) * | 2022-11-28 | 2023-03-07 | 北京淘友天下技术有限公司 | Data processing method and device, electronic equipment and storage medium |
CN116232720A (en) * | 2023-03-02 | 2023-06-06 | 国网河南省电力公司信息通信分公司 | API (application program interface) encryption authentication method and storage device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104639650A (en) * | 2015-02-27 | 2015-05-20 | 杭州华三通信技术有限公司 | Fine granularity distributive interface access control method and device |
CN105306534A (en) * | 2015-09-21 | 2016-02-03 | 拉扎斯网络科技(上海)有限公司 | Information verification method based on open platform and open platform |
CN106656959A (en) * | 2016-09-28 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Access request regulation and control method and device |
-
2017
- 2017-08-28 CN CN201710753466.2A patent/CN107704765A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104639650A (en) * | 2015-02-27 | 2015-05-20 | 杭州华三通信技术有限公司 | Fine granularity distributive interface access control method and device |
CN105306534A (en) * | 2015-09-21 | 2016-02-03 | 拉扎斯网络科技(上海)有限公司 | Information verification method based on open platform and open platform |
CN106656959A (en) * | 2016-09-28 | 2017-05-10 | 腾讯科技(深圳)有限公司 | Access request regulation and control method and device |
Cited By (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108628611A (en) * | 2018-04-20 | 2018-10-09 | 无锡盈达聚力科技有限公司 | A kind of data calling method and data call device |
CN108628611B (en) * | 2018-04-20 | 2022-02-01 | 无锡盈达聚力科技有限公司 | Data calling method and data calling device |
CN108804940A (en) * | 2018-05-11 | 2018-11-13 | 同程网络科技股份有限公司 | A kind of anti-brush method of Web Api interfaces |
CN109728969A (en) * | 2018-05-18 | 2019-05-07 | 平安普惠企业管理有限公司 | Abnormal user method for detecting, monitoring service end and the storage medium of application software |
CN109728969B (en) * | 2018-05-18 | 2022-04-15 | 平安普惠企业管理有限公司 | Abnormal user detection method of application software, monitoring server and storage medium |
CN109309667A (en) * | 2018-08-28 | 2019-02-05 | 东软集团股份有限公司 | The authentication method and device, storage medium and electronic equipment that interface calls |
CN109309667B (en) * | 2018-08-28 | 2021-08-13 | 东软集团股份有限公司 | Authentication method and device for interface call, storage medium and electronic equipment |
CN109298939B (en) * | 2018-09-26 | 2021-04-20 | 腾讯科技(深圳)有限公司 | Access frequency control method, device and system of distributed system and server |
CN109298939A (en) * | 2018-09-26 | 2019-02-01 | 腾讯科技(深圳)有限公司 | Access frequency control method, device, system and the server of distributed system |
CN110300125B (en) * | 2019-02-02 | 2022-07-08 | 奇安信科技集团股份有限公司 | API access control method and API access agent device |
CN110300125A (en) * | 2019-02-02 | 2019-10-01 | 奇安信科技集团股份有限公司 | API Access control method and API Access agent apparatus |
CN111953635A (en) * | 2019-05-15 | 2020-11-17 | 福建天晴数码有限公司 | Interface request processing method and computer-readable storage medium |
CN110222504B (en) * | 2019-05-21 | 2024-02-13 | 平安银行股份有限公司 | User operation monitoring method, device, terminal equipment and medium |
CN110222504A (en) * | 2019-05-21 | 2019-09-10 | 平安银行股份有限公司 | Monitoring method, device, terminal device and the medium of user's operation |
CN110191004A (en) * | 2019-06-18 | 2019-08-30 | 北京搜狐新媒体信息技术有限公司 | A kind of port detecting method and system |
CN110191004B (en) * | 2019-06-18 | 2022-05-27 | 北京搜狐新媒体信息技术有限公司 | Port detection method and system |
CN110417615B (en) * | 2019-06-21 | 2022-04-12 | 中国平安财产保险股份有限公司 | Check switch control method, device and equipment and computer readable storage medium |
CN110417615A (en) * | 2019-06-21 | 2019-11-05 | 中国平安财产保险股份有限公司 | Verify method of controlling switch, device, equipment and computer readable storage medium |
CN111770126A (en) * | 2019-06-28 | 2020-10-13 | 北京京东尚科信息技术有限公司 | Service request processing method, device and storage medium |
CN111770126B (en) * | 2019-06-28 | 2023-08-04 | 北京京东尚科信息技术有限公司 | Service request processing method, device and storage medium |
CN112839006A (en) * | 2019-11-22 | 2021-05-25 | Oppo广东移动通信有限公司 | Open platform interface calling method and related product |
CN111083057A (en) * | 2019-11-26 | 2020-04-28 | 苏宁云计算有限公司 | Flow control method and device and computer storage medium |
CN111262737A (en) * | 2020-01-16 | 2020-06-09 | Tcl移动通信科技(宁波)有限公司 | Port configuration management method and device, storage medium and terminal |
CN111262737B (en) * | 2020-01-16 | 2023-11-28 | 圆山电子科技(深圳)有限公司 | Port configuration management method and device, storage medium and terminal |
CN111274291A (en) * | 2020-01-20 | 2020-06-12 | 中国平安人寿保险股份有限公司 | Query method, device, equipment and medium for user access data |
CN111274291B (en) * | 2020-01-20 | 2024-04-05 | 中国平安人寿保险股份有限公司 | Query method, device, equipment and medium for user access data |
CN114640700A (en) * | 2020-11-30 | 2022-06-17 | 腾讯科技(深圳)有限公司 | Calling frequency control method and device |
CN113377605A (en) * | 2021-02-10 | 2021-09-10 | 北京声智科技有限公司 | Access monitoring method, device, server and computer readable storage medium |
CN113645217A (en) * | 2021-08-06 | 2021-11-12 | 上海中通吉网络技术有限公司 | Method for adaptively adjusting access threshold |
CN115758300A (en) * | 2022-11-28 | 2023-03-07 | 北京淘友天下技术有限公司 | Data processing method and device, electronic equipment and storage medium |
CN115758300B (en) * | 2022-11-28 | 2023-08-01 | 北京淘友天下技术有限公司 | Data processing method, device, electronic equipment and storage medium |
CN116232720A (en) * | 2023-03-02 | 2023-06-06 | 国网河南省电力公司信息通信分公司 | API (application program interface) encryption authentication method and storage device |
CN116232720B (en) * | 2023-03-02 | 2024-01-16 | 国网河南省电力公司信息通信分公司 | API (application program interface) encryption authentication method and storage device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107704765A (en) | A kind of interface access method, server and computer-readable recording medium | |
CN107786328A (en) | A kind of method, service node device and computer-readable medium for generating key | |
US20230164166A1 (en) | Systems and methods for effective delivery of simulated phishing campaigns | |
CN107480519A (en) | A kind of method and server for identifying risk application | |
CN106357672B (en) | A kind of login method and terminal | |
US11895105B2 (en) | Authenticated interface element interactions | |
CN105683988A (en) | Managed software remediation | |
CN107169343A (en) | A kind of method and terminal of control application program | |
CN107612901A (en) | One kind applies encryption method and terminal | |
CN107358114A (en) | A kind of method and terminal for preventing user data loss | |
CN106161367A (en) | A kind of verifying dynamic password method and system, client and server | |
CN107465730A (en) | A kind of service request method and terminal | |
CN106254626A (en) | A kind of incoming display method and terminal | |
CN108400868A (en) | Storage method, device and the mobile terminal of seed key | |
CN108289028A (en) | A kind of signature authentication method, relevant device and computer readable storage medium | |
CN106603510A (en) | Data processing method and terminal | |
US20220191233A1 (en) | Systems and methods for improving assessment of security risk based on personal internet account data | |
CN106685945B (en) | Service request processing method, service handling number verification method and terminal thereof | |
CN107766708A (en) | Nullify method, terminal and the computer-readable recording medium of account Entered state | |
CN106851613A (en) | Service request method, the verification method of business handling number and its terminal | |
CN107257328A (en) | A kind of safety of payment dispositions method, system, terminal and proof of identity method | |
CN108171063A (en) | Method, terminal and the computer readable storage medium of access safety element | |
CN109522683A (en) | Software source tracing method, system, computer equipment and storage medium | |
CN108520186A (en) | Record screen method, mobile terminal and computer readable storage medium | |
CN108092795A (en) | A kind of reminding method, terminal device and computer-readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180216 |