CN107704765A - A kind of interface access method, server and computer-readable recording medium - Google Patents

A kind of interface access method, server and computer-readable recording medium Download PDF

Info

Publication number
CN107704765A
CN107704765A CN201710753466.2A CN201710753466A CN107704765A CN 107704765 A CN107704765 A CN 107704765A CN 201710753466 A CN201710753466 A CN 201710753466A CN 107704765 A CN107704765 A CN 107704765A
Authority
CN
China
Prior art keywords
access
targeted customer
interface
server
institute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710753466.2A
Other languages
Chinese (zh)
Inventor
冯宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen One Cheng Technology Co Ltd
Original Assignee
Shenzhen One Cheng Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen One Cheng Technology Co Ltd filed Critical Shenzhen One Cheng Technology Co Ltd
Priority to CN201710753466.2A priority Critical patent/CN107704765A/en
Publication of CN107704765A publication Critical patent/CN107704765A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The embodiment of the invention discloses a kind of interface access method, server and computer-readable recording medium, wherein method includes:When receiving the interface access request of targeted customer, the access rights of the targeted customer are verified;If verify and successfully, inquire about the history access frequency that the targeted customer is directed to institute's request interface;If the history access frequency is less than predetermined threshold value, the targeted customer is then allowed to access institute's request interface, control of the embodiment of the present invention by being verified to the access rights of targeted customer and to history access frequency, provide a kind of more flexible and efficient interface access safety mechanism, the security of interface access can be effectively improved, and ensures the availability of interface.

Description

A kind of interface access method, server and computer-readable recording medium
Technical field
The present invention relates to field of computer technology, more particularly to a kind of interface access method, server and computer-readable Storage medium.
Background technology
With the development of computer technology, user is more and more to the demand of the Internet, applications, the development of the Internet, applications It is more and more faster.For the Internet, applications of high concurrent, the call number of server interface is very high, therefore can not arbitrarily be opened The interface of oneself server, if interface arbitrarily exposed, the access of docking port is not any limitation as, and is easily caused improper user and is led to Crossing interface attacks server, malice, frequently access interface causes servers go down to influence normal users use, even with interface Steal a series of safety problem such as server user's information.
The safety problem accessed currently for interface, is mainly established IP address-based black using the fire wall of server White list access mechanism, however, this security mechanism also has many drawbacks, flexibility ratio is poor, such as partner's server ip Address, which changes, will cause its interface access request to be rejected, and user's use be influenceed, in addition, improper in white list Also None- identified and worry remove access request.Therefore it provides a kind of more flexible and efficient interface access safety mechanism has significantly Application value.
The content of the invention
The embodiment of the present invention provides a kind of interface access method, server and computer-readable recording medium, to provide one The more flexible and efficient interface access safety mechanism of kind.
In a first aspect, the embodiments of the invention provide a kind of interface access method, this method includes:
When receiving the interface access request of targeted customer, the access rights of the targeted customer are verified;
If verify and successfully, inquire about the history access frequency that the targeted customer is directed to institute's request interface;
If the history access frequency is less than predetermined threshold value, the targeted customer is allowed to access institute's request interface.
Second aspect, the embodiments of the invention provide a kind of server, the server includes being used to perform above-mentioned first party The unit of the method in face.
The third aspect, the embodiments of the invention provide another server, including processor, input equipment, output equipment And memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store Support server to perform the computer program of the above method, the computer program includes programmed instruction, the processor by with Put for calling described program to instruct, the method for performing above-mentioned first aspect.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor The method for stating the above-mentioned first aspect of computing device.
The embodiment of the present invention is by when receiving the interface access request of targeted customer, to the access right of the targeted customer Limit is verified, and the history access frequency that the targeted customer is directed to institute's request interface successfully, is inquired about if verifying, if the history is visited Ask that frequency is less than predetermined threshold value, then allow the targeted customer to access institute's request interface.The embodiment of the present invention compared to prior art, Provide a kind of more flexible and efficient interface access safety mechanism.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow diagram of interface access method provided in an embodiment of the present invention;
Fig. 2 is the schematic flow diagram of another interface access method provided in an embodiment of the present invention;
Fig. 3 is a kind of schematic block diagram of server provided in an embodiment of the present invention;
Fig. 4 is another server schematic block diagram provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but it is not precluded from one or more of the other feature, whole Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the server described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the server including display and touch sensitive surface is described.It is, however, to be understood that , server can include such as physical keyboard, mouse and/or control-rod one or more of the other physical user interface set It is standby.
Server supports various application programs, such as one or more of following:Drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed on the server can use at least one public affairs of such as touch sensitive surface Physical user-interface device altogether.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitivity The corresponding information shown in the one or more functions and server on surface.So, the public physical structure (example of server Such as, touch sensitive surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
The embodiment of the present invention, server can reach before the interface access request of targeted customer is received with targeted customer Into cooperative relationship, server is in advance to public key and agreement encryption data to be encrypted corresponding to the targeted customer of cooperation.Service Device can receive the interface access request of targeted customer, and checking information is carried in the interface access request, the checking information bag Check value, public key and agreement encryption data to be encrypted are included, server can be according to the checking information to the targeted customer's Access rights are verified.Specifically, server can be by predetermined order algorithm, to being stored in local private key, receiving Public key and agreement encryption data to be encrypted be ranked up, the ranking value got is spliced into a character string, passed through The character string is encrypted preset AES, obtains encrypted result data, server by the encrypted result data with Received check value carries out matching checking, if verifying successfully, inquires about the targeted customer going through for institute's request interface History access frequency, if the history access frequency is less than predetermined threshold value, the targeted customer is allowed to access institute's request interface.
It should be noted that the check value in the checking information that server receives is used to verify whether the targeted customer has Authority calls institute's request interface, will not be a fixed value because the check value is generated according to different data encryptions, Therefore only targeted customer could be according to correct method call to corresponding interface.
In one embodiment, server is after the interface access request of targeted customer is received, to the targeted customer Access rights verified before, the targeted customer can be detected to asking according to the public key in the checking information received The Action Events of interface are sought, if detecting malicious operation event, server can cancel the targeted customer to asking to connect The access rights of mouth.
In one embodiment, the encrypted result data can be carried out matching with received check value and test by server Card, if the encrypted result data mismatch with received check value, verification failure, refuse the targeted customer and visit Ask institute's request interface.
In one embodiment, if server judges that the history access frequency of the targeted customer is less than predetermined threshold value, Allow the targeted customer to access institute's request interface, and by it is accumulative it is incremental in a manner of store the history access frequency, server If in preset time range threshold value, inquire stored history access frequency and be more than or equal to predetermined threshold value, then server Access of the targeted customer to institute's request interface can be stopped.
A kind of interface access method that the embodiment of the present invention is provided, by the checking of the access rights to targeted customer, The security of interface access is improved, after to being verified of the access rights of targeted customer, passes through control targe user To the access frequency of institute's request interface, prevent targeted customer from excessively calling institute's request interface to be imitated to reach anti-brush within the unit interval Fruit, ensure the availability of interface.
Referring to Fig. 1, Fig. 1 is a kind of schematic flow diagram of interface access method provided in an embodiment of the present invention, as shown in Figure 1 Interface access method, this method may include:
S101:When receiving the interface access request of targeted customer, the access rights of the targeted customer are verified.
In the embodiment of the present invention, server can receive the interface access request of user, when receiving connecing for targeted customer During mouth access request, server can verify to the access rights of the targeted customer.Wherein, the target that server receives Checking information is carried in the interface access request of user, the checking information includes check value, public key and agreement encryption data.
In one embodiment, server can obtain the interface when receiving the interface access request of targeted customer The checking information carried in access request, the checking information include check value, public key and agreement encryption data.Server can So that the agreement encryption data to be encrypted, obtain encrypted result data, and by the encrypted result data with it is described Check value carries out matching checking.
In one embodiment, server can pass through default row when receiving the interface access request of targeted customer Sequence algorithm, the public key and agreement encryption data for being stored in local private key, receiving are ranked up, by what is got Ranking value is spliced into a character string, and the character string is encrypted by preset AES, obtains encrypted result number According to.Specifically, server can when receiving the interface access request including check value, public key and agreement encryption data, It is ranked up by predetermined order algorithm to being stored in local private key, the public key received and agreement encryption data, and The ranking value got is spliced into a character string, the character string is encrypted by preset AES, added Close result data, and the encrypted result data and received check value are subjected to matching checking.
Specifically can be for example, server be being received including check value sign values, public key key and agreement to be encrypted During the interface access request of encryption data, the server can be by predetermined order algorithm rsort, to being stored in local private key Secret, the public key key received and user name and user cipher (agreement encryption data) are ranked up, and obtain ranking value, The ranking value got can be spliced into a character string by server, and by Hash hashing algorithm Hash, (preset encryption is calculated Method) character string is encrypted, encrypted result data are obtained, and the encrypted result data are entered with received check value Row matching checking.
In one embodiment, if server detects that the encrypted result data match with the check value, really Verify successfully calmly, if the encrypted result data mismatch with the check value, it is determined that verification failure, server will be refused The targeted customer accesses institute's request interface.
In one embodiment, server is after the interface access request of targeted customer is received, to the targeted customer Access rights verified before, the targeted customer can be detected to asking according to the public key in the checking information received The Action Events of interface are sought, if detecting malicious operation event, server can cancel the targeted customer to asking to connect The access rights of mouth.Specifically can for example, server after the interface access request of targeted customer is received, to the target Before the access rights of user are verified, the targeted customer can be detected according to the public key key in the checking information received To the Action Events of institute's request interface, Action Events are distorted if detected, server can cancel the targeted customer to institute The access rights of request interface.
Embodiment of the present invention is verified to the access rights of targeted customer by the interface access request received, Non-targeted user's brush interface can be prevented, so as to improve the access safety of interface.
S102:If verify and successfully, inquire about the history access frequency that the targeted customer is directed to institute's request interface.
In the embodiment of the present invention, server can obtain encrypted result according to the checking information of the targeted customer received Data, and the encrypted result data and received check value are subjected to matching checking, if encrypted result data are with being connect The check value matching received, then server, which can confirm that, verifies successfully, and server can inquire about the targeted customer for being asked The history access frequency of interface, the access frequency refer to the access times in the unit interval.Specifically can be for example, server can To obtain history access frequency of the targeted customer for institute's request interface as 10 beats/min.It can be seen that the embodiment passes through in school After testing successfully, the history access frequency that the targeted customer is directed to institute's request interface is inquired about, in order to which server judges the target Whether the access frequency of user exceedes predetermined threshold value.
S103:If the history access frequency is less than predetermined threshold value, the targeted customer is allowed to access institute's request interface.
In the embodiment of the present invention, server is when confirming to verify successfully the access rights of targeted customer, it can be determined that should Whether the history access frequency of targeted customer is less than predetermined threshold value, if being less than, allows the targeted customer to access institute's request interface.
In one embodiment, server can obtain the history access frequency that targeted customer is directed to institute's request interface, inspection Survey whether the history access frequency is less than predetermined threshold value, the history access frequency of the targeted customer is less than default threshold if detecting Value, then allow the targeted customer to access institute's request interface, and by it is accumulative it is incremental in a manner of store the history access frequency.Tool Body can for example, server can obtain targeted customer for institute's request interface history access frequency be 10 beats/min, its In, predetermined threshold value is 20 beats/min, server detect 10 beats/min of the history access frequency be less than predetermined threshold value 20 times/ Minute, i.e., 10<20, then the server allow the targeted customer to access institute's request interface, and by it is accumulative it is incremental in a manner of store The history access frequency is 11 beats/min, i.e., 10+1=11 beats/min, server by utilizing caching technology redis stores this and gone through History access frequency, to limit access times of the targeted customer in preset time.
In one embodiment, if server is in preset time range threshold value, the stored history access frequency of detection Whether it is less than predetermined threshold value, if testing result is no, stops access of the targeted customer to institute's request interface, and export Prompt message, the prompt message are used to prompt the targeted customer that the access times in preset time range threshold value have been used It is complete.If specifically can for example, server in 1 minute (in preset time range threshold value), if detecting the targeted customer History access frequency for 21 times be more than it is per minute access 20 times (predetermined threshold values), then server can stop the targeted customer couple The access of institute's request interface, and prompt message is exported, the prompt message is used to prompt the targeted customer in preset time model The access times enclosed in threshold value have been used up.It can be seen that embodiment of the present invention is by after verifying successfully, the visit to targeted customer Ask that frequency is limited, the irrational calling interface of targeted customer can be prevented, so as to improve the availability of interface access.
The embodiment of the present invention, by when receiving the interface access request of targeted customer, the access to the targeted customer Authority is verified, and after verifying successfully, then the history access frequency that the targeted customer is directed to institute's request interface is inquired about, if this is gone through History access frequency is less than predetermined threshold value, then allows the targeted customer to access institute's request interface, and targeted customer is accessed so as to realize The checking of authority and unreasonable calling of the targeted customer to institute's request interface is prevented, so as to, there is provided a kind of more flexible height The interface access safety mechanism of effect.
Referring to Fig. 2, Fig. 2 is the schematic flow diagram of another interface access method provided in an embodiment of the present invention, as schemed institute The interface access method shown may include:
S201:Obtain check value, public key and agreement encryption data.
In the embodiment of the present invention, server can obtain check value, public key and agreement encryption data.Specifically, service For device when receiving the interface access request of targeted customer, server can obtain the checking letter carried in the interface access request Breath, the checking information include check value, public key and agreement encryption data.
S202:By predetermined order algorithm, to being stored in local private key, the public key received and agreement encryption data It is ranked up.
In the embodiment of the present invention, server can be by predetermined order algorithm, to being stored in local private key, receiving Public key and agreement encryption data are ranked up.Specifically, server can receive the interface access request of targeted customer When, by predetermined order algorithm, it is ranked up to being stored in local private key, the public key received and agreement encryption data, So as to acquire ranking value.
It can specifically be wrapped in the interface access request for example, server receives the interface access request of targeted customer Checking information is included, the checking information includes check value sign values, public key key and agreement encryption data user_id, user_ pwd;Server, which can obtain, is stored in local private key secret.Wherein, each parameter in the checking information that server is got Value be:
Key=900150983cd24fb0d6963f7d28e17f72;
Secret=011134986548f3458aa3e7e2a7fceb8d;
User_id=100;
User_pwd=123wqe.
Server after being handled by rsort sort algorithms, can acquire sequence according to the value of above-mentioned each parameter Value, i.e. array " array (' user_pwd', ' user_id', ' secret', ' key') ".
In one embodiment, server is after the interface access request of targeted customer is received, to the targeted customer Access rights verified before, the targeted customer can be detected to asking according to the public key in the checking information received The Action Events of interface are sought, if detecting malicious operation event, server can cancel the targeted customer to asking to connect The access rights of mouth.Specifically can for example, server after the interface access request of targeted customer is received, to the target Before the access rights of user are verified, the targeted customer can be detected according to the public key key in the checking information received To the Action Events of institute's request interface, Action Events are distorted if detected, server can cancel the targeted customer to institute The access rights of request interface.
Embodiment of the present invention is verified to the access rights of targeted customer by the interface access request received, Non-targeted user's brush interface can be prevented, so as to improve the access safety of interface.
S203:The ranking value got is spliced into a character string.
In the embodiment of the present invention, server is calculated when receiving the interface access request of targeted customer by predetermined order Method, the data for being stored in local private key, the public key received and needs are encrypted are ranked up, acquire ranking value it Afterwards, the ranking value got can be spliced into a character string.Specifically can be for example, as described above, server be got Checking information in the value of each parameter be:
Key=900150983cd24fb0d6963f7d28e17f72;
Secret=011134986548f3458aa3e7e2a7fceb8d;
User_id=100;
User_pwd=123wqe.
Server can be sorted by rsort sort algorithms (predetermined order algorithm) to above-mentioned checking information, will be got Ranking value " array (' user_pwd', ' user_id', ' secret', ' key') " splicing, obtain character string “123wqe100011134986548f3458aa3e7e2a7fceb8d900150983cd24fb0d6963f7d28e17f72”。
S204:The character string is encrypted by preset AES, obtains encrypted result data.
In the embodiment of the present invention, server the character string got can be encrypted by preset AES, Obtain encrypted result data.Specifically can be for example, server can be by hash algorithm (preset AES), will be above-mentioned The character string that splicing obtains is ranked up to checking information by rsort sort algorithms " 123wqe100011134986548f3458aa3e7e2a7fceb8d900150983cd24fb 0d6963f7d28e17f72 " enter Row encryption, after the encryption, server can obtain encrypted result data “88935c46d6d1fbc62e626de2cb3e2f970e61fa98”。
S205:The encrypted result data and the check value are subjected to matching checking.
In the embodiment of the present invention, the encrypted result data can be carried out matching with received check value and tested by server Card.For example, server will can be encrypted above by hash algorithm (preset AES), the encrypted result number acquired According to " 88935c46d6d1fbc62e626de2cb3e2f970e61fa98 ", matched with received check value sign values Checking.
S206:If verify and successfully, inquire about the history access frequency that the targeted customer is directed to institute's request interface.
In the embodiment of the present invention, server can obtain encrypted result according to the checking information of the targeted customer received Data, and the encrypted result data and received check value are subjected to matching checking, if encrypted result data are with being connect The check value matching received, then server, which can confirm that, verifies successfully, and server can inquire about the targeted customer for being asked The history access frequency of interface, the access frequency refer to the access times in the unit interval.Specifically can be for example, server can To obtain history access frequency of the targeted customer for institute's request interface as 10 beats/min.It can be seen that the embodiment passes through in school After testing successfully, the history access frequency that the targeted customer is directed to institute's request interface is inquired about, in order to which server judges the target Whether the access frequency of user exceedes predetermined threshold value.
In one embodiment, server can obtain encrypted result according to the checking information of the targeted customer received Data, and the encrypted result data and received check value are subjected to matching checking, if encrypted result data are with being connect The check value received is mismatched, then server can confirm that verification failure, and institute's request interface is accessed so as to refuse the targeted customer.
S207:If the history access frequency is less than predetermined threshold value, the targeted customer is allowed to access institute request interface, and with Add up incremental mode and store the history access frequency.
In the embodiment of the present invention, server is when confirming to verify successfully the access rights of targeted customer, it can be determined that should Whether the history access frequency of targeted customer is less than predetermined threshold value, if being less than, allows the targeted customer to access institute's request interface.
Specifically, server can obtain the history access frequency that targeted customer is directed to institute's request interface, be gone through described in detection Whether history access frequency is less than predetermined threshold value, if detecting, the history access frequency of the targeted customer is less than predetermined threshold value, permits Perhaps the targeted customer accesses institute's request interface, and by it is accumulative it is incremental in a manner of store the history access frequency.It can specifically lift Example explanation, it is 10 beats/min that server, which can obtain targeted customer for the history access frequency of institute's request interface, wherein, in advance If threshold value is 20 beats/min, server detects that 10 beats/min of the history access frequency is less than 20 beats/min of predetermined threshold value, I.e. 10<20, then the server allow the targeted customer to access institute's request interface, and by it is accumulative it is incremental in a manner of store described go through History access frequency is 11 beats/min, i.e., 10+1=11 beats/min.
In one embodiment, if server is in preset time range threshold value, the stored history access frequency of detection Whether it is less than predetermined threshold value, if testing result is no, stops access of the targeted customer to institute's request interface, and export Prompt message, the prompt message are used to prompt the targeted customer that the access times in preset time range threshold value have been used It is complete.If specifically can for example, server in 1 minute (in preset time range threshold value), if detecting the targeted customer History access frequency for 21 times be more than it is per minute access 20 times (predetermined threshold values), then server can stop the targeted customer couple The access of institute's request interface, and prompt message is exported, the prompt message is used to prompt the targeted customer in preset time model The access times enclosed in threshold value have been used up.It can be seen that embodiment of the present invention is by after verifying successfully, the visit to targeted customer Ask that frequency is limited, the irrational calling interface of targeted customer can be prevented, so as to improve the availability of interface access.
The embodiment of the present invention, server by predetermined order algorithm, to the public key that is stored in local key, receives with And agreement encryption data is ranked up, the ranking value got is spliced into a character string, passes through preset AES pair The character string is encrypted, and the encrypted result data got and received check value are carried out into matching checking, if verification Success, then the history access frequency that the targeted customer is directed to institute's request interface is inquired about, if the history access frequency is less than default threshold Value, then allow the targeted customer to access institute request interface, and by it is accumulative it is incremental in a manner of store the history access frequency, if pre- If in time range threshold value, inquiring stored history access frequency and being more than or equal to predetermined threshold value, then stop target use Access of the family to institute's request interface, it thereby may be ensured that the security of interface access and the availability of interface.
The embodiment of the present invention also provides a kind of server, and the server is used for the list for performing the method described in foregoing any one Member.Specifically, referring to Fig. 3, Fig. 3 is a kind of schematic block diagram of server provided in an embodiment of the present invention.The service of the present embodiment Device includes:Verification unit 301, query unit 302, access unit 303.
Verification unit 301, for when receiving the interface access request of targeted customer, the access to the targeted customer Authority is verified;
Query unit 302, if for verifying the history access for successfully, inquiring about the targeted customer for institute's request interface Frequency;
Access unit 303, if being less than predetermined threshold value for the history access frequency, the targeted customer is allowed to access Institute's request interface.
Specifically, checking information is carried in the interface access request;The checking information include check value, public key and Need the agreement encryption data encrypted;The verification unit 301, add specifically for obtaining check value, public key and the agreement Ciphertext data;The agreement encryption data is encrypted, obtains encrypted result data;By the encrypted result data and institute State check value and carry out matching checking.
Specifically, the verification unit 301, it is additionally operable to by predetermined order algorithm, to being stored in local private key, receiving To public key and agreement encryption data be ranked up;The ranking value got is spliced into a character string;By preset The character string is encrypted AES, obtains encrypted result data.
Specifically, the verification unit 301, matched if being additionally operable to the encrypted result data with the check value, Verify successfully;If the encrypted result data mismatch with the check value, verification failure, refuse the targeted customer and visit Ask institute's request interface.
Specifically, the access unit 303, specifically for obtaining the history access frequency;The history is detected to access Whether frequency is less than predetermined threshold value;If testing result is yes, the targeted customer is allowed to access institute's request interface, and with tired Count incremental mode and store the history access frequency.
Specifically, the access unit 303, is additionally operable in preset time range threshold value, and the stored history of detection is visited Ask whether frequency is less than predetermined threshold value;If testing result is no, stop access of the targeted customer to institute's request interface, And prompt message is exported, the prompt message is used to prompt access times of the targeted customer in preset time range threshold value Have been used up.
Specifically, the server also includes:
Detection unit 304, for according to the public key received, detecting behaviour of the targeted customer to institute's request interface Make event;If detecting malicious operation event, cancel access rights of the targeted customer to institute's request interface.
The embodiment of the present invention, server can receive the interface access request of targeted customer by verification unit 301 When by, the access rights of the targeted customer are verified, after verifying successfully, pass through query unit 302 inquire about the target User is directed to the history access frequency of institute's request interface, if the history access frequency is less than predetermined threshold value, passes through access interface 303 allow the targeted customer to access institute's request interface, so as to realize the checking to targeted customer's access rights and prevent target User, so as to provide a kind of more flexible and efficient interface access safety mechanism, carries to the unreasonable calling of institute's request interface The security and availability that high interface accesses.
Referring to Fig. 4, Fig. 4 is another server schematic block diagram provided in an embodiment of the present invention.This implementation as depicted Server in example can include:One or more processors 401;One or more input equipments 402, one or more output Equipment 403 and memory 404.Above-mentioned processor 401, input equipment 402, output equipment 403 and memory 404 pass through bus 405 connections.Memory 402 is used for store instruction, and processor 401 is used for the instruction for performing the storage of memory 402.Wherein, handle Device 401 is used for:
When receiving the interface access request of targeted customer, the access rights of the targeted customer are verified;
If verify and successfully, inquire about the history access frequency that the targeted customer is directed to institute's request interface;
If the history access frequency is less than predetermined threshold value, the targeted customer is allowed to access institute's request interface.
Further, the processor 401 is additionally operable to perform following steps:
Obtain the check value, public key and agreement encryption data;
The agreement encryption data is encrypted, obtains encrypted result data;
The encrypted result data and the check value are subjected to matching checking.
Further, the processor 401 is additionally operable to perform following steps:
By predetermined order algorithm, carried out to being stored in local private key, the public key received and agreement encryption data Sequence;
The ranking value got is spliced into a character string;
The character string is encrypted by preset AES, obtains encrypted result data;
The encryption data and received check value are subjected to matching checking.
Further, the processor 401 is additionally operable to perform following steps:
If the encrypted result data match with the check value, verify successfully;
If the encrypted result data mismatch with the check value, verification failure, refuse the targeted customer and visit Ask institute's request interface.
Further, the processor 401 is additionally operable to perform following steps:
Obtain the history access frequency;
Detect whether the history access frequency is less than predetermined threshold value;
If testing result is yes, allow the targeted customer to access institute's request interface, and by it is accumulative it is incremental in a manner of Store the history access frequency.
Further, the processor 401 is additionally operable to perform following steps:
In preset time range threshold value, whether the stored history access frequency of detection is less than predetermined threshold value;
If testing result is no, stop access of the targeted customer to institute's request interface, and export prompt message, The prompt message is used to prompt the targeted customer that the access times in preset time range threshold value have been used up.
Further, the processor 401 is additionally operable to perform following steps:
According to the public key received, Action Events of the targeted customer to institute's request interface are detected;
If detecting malicious operation event, cancel access rights of the targeted customer to institute's request interface.
The embodiment of the present invention is by when receiving the interface access request of targeted customer, to the access right of the targeted customer Limit is verified, and the history access frequency that the targeted customer is directed to institute's request interface successfully, is inquired about if verifying, if the history is visited Ask that frequency is less than predetermined threshold value, then allow the targeted customer to access institute's request interface.The embodiment of the present invention compared to prior art, A kind of more flexible and efficient interface access safety mechanism is provided, improves the security and availability of interface access.
It should be appreciated that in embodiments of the present invention, alleged processor 401 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.
Input equipment 402 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint Directional information), microphone etc., output equipment 403 can include display (LCD etc.), loudspeaker etc..
The memory 404 can include read-only storage and random access memory, and to processor 401 provide instruction and Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited Store up the information of device type.
In the specific implementation, processor 401, input equipment 402, the output equipment 403 described in the embodiment of the present invention can Perform institute in the embodiment described in a kind of Fig. 1 of interface access method provided in an embodiment of the present invention or the embodiment described in Fig. 2 The implementation of description, the implementation of the server described by the embodiment of the present invention is also can perform, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable storage medium are additionally provided in an embodiment of the present invention Matter is stored with computer program, and the computer program is realized when being executed by processor in embodiment described in Fig. 1 or Fig. 2 of the present invention Described implementation, the implementation of the server described by Fig. 3 of the present invention is also can perform, will not be repeated here.
The computer-readable recording medium can be the internal storage unit of the server described in foregoing any embodiment, Such as the hard disk or internal memory of server.The computer-readable recording medium can also be that the external storage of the server is set Plug-in type hard disk that is standby, such as being equipped with the server, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) blocks, flash card (Flash Card) etc..Further, the computer-readable recording medium is also The internal storage unit of the server can both be included or including External memory equipment.The computer-readable recording medium is used In other programs and data needed for the storage computer program and the server.The computer-readable recording medium It can be also used for temporarily storing the data that has exported or will export.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the clothes of foregoing description The specific work process of business device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed server and method, can pass through Other modes are realized.For example, server example described above is only schematical, for example, the unit is drawn Point, only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can To combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is in addition, shown or discussed Mutual coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication by some interfaces or unit Connection or electricity, the connection of mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection domain be defined.

Claims (10)

  1. A kind of 1. interface access method, it is characterised in that including:
    When receiving the interface access request of targeted customer, the access rights of the targeted customer are verified;
    If verify and successfully, inquire about the history access frequency that the targeted customer is directed to institute's request interface;
    If the history access frequency is less than predetermined threshold value, the targeted customer is allowed to access institute's request interface.
  2. 2. according to the method for claim 1, it is characterised in that carry checking information in the interface access request;It is described Checking information includes check value, public key and agreement encryption data;
    It is described that the access rights of the targeted customer are verified when receiving the interface access request of targeted customer, bag Include:
    Obtain the check value, public key and agreement encryption data;
    The agreement encryption data is encrypted, obtains encrypted result data;
    The encrypted result data and the check value are subjected to matching checking.
  3. 3. according to the method for claim 2, it is characterised in that it is described that the agreement encryption data is encrypted, Encrypted result data are obtained, including:
    By predetermined order algorithm, the public key and agreement encryption data for being stored in local private key, receiving are carried out Sequence;
    The ranking value got is spliced into a character string;
    The character string is encrypted by preset AES, obtains encrypted result data.
  4. 4. according to the method for claim 2, it is characterised in that described to enter the encrypted result data with the check value Row matching checking, including:
    If the encrypted result data match with the check value, verify successfully;
    If the encrypted result data mismatch with the check value, verification failure, refuse the targeted customer and access institute Request interface.
  5. 5. according to the method for claim 1, it is characterised in that if the history access frequency is less than predetermined threshold value, The targeted customer is then allowed to access institute's request interface, including:
    Obtain the history access frequency;
    Detect whether the history access frequency is less than predetermined threshold value;
    If testing result is yes, allow the targeted customer to access institute's request interface, and by it is accumulative it is incremental in a manner of store The history access frequency.
  6. 6. according to the method for claim 5, it is characterised in that it is default whether the detection history access frequency is less than Threshold value, in addition to:
    In preset time range threshold value, whether the stored history access frequency of detection is less than predetermined threshold value;
    If testing result is no, stop access of the targeted customer to institute's request interface, and export prompt message, it is described Prompt message is used to prompt the targeted customer that the access times in preset time range threshold value have been used up.
  7. 7. according to the method for claim 2, it is characterised in that the access rights to the targeted customer verify Before, including:
    According to the public key received, Action Events of the targeted customer to institute's request interface are detected;
    If detecting malicious operation event, cancel access rights of the targeted customer to institute's request interface.
  8. 8. a kind of server, it is characterised in that including for performing the method as described in claim 1-7 any claims Unit.
  9. A kind of 9. server, it is characterised in that including processor, input equipment, output equipment and memory, the processor, Input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store computer program, the calculating Machine program includes programmed instruction, and the processor is arranged to call described program instruction, performed as claim 1-7 is any Method described in.
  10. A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, The computer program includes programmed instruction, and described program instruction makes the computing device such as right when being executed by a processor It is required that the method described in any one of 1-7.
CN201710753466.2A 2017-08-28 2017-08-28 A kind of interface access method, server and computer-readable recording medium Withdrawn CN107704765A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710753466.2A CN107704765A (en) 2017-08-28 2017-08-28 A kind of interface access method, server and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710753466.2A CN107704765A (en) 2017-08-28 2017-08-28 A kind of interface access method, server and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107704765A true CN107704765A (en) 2018-02-16

Family

ID=61169895

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710753466.2A Withdrawn CN107704765A (en) 2017-08-28 2017-08-28 A kind of interface access method, server and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107704765A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108628611A (en) * 2018-04-20 2018-10-09 无锡盈达聚力科技有限公司 A kind of data calling method and data call device
CN108804940A (en) * 2018-05-11 2018-11-13 同程网络科技股份有限公司 A kind of anti-brush method of Web Api interfaces
CN109298939A (en) * 2018-09-26 2019-02-01 腾讯科技(深圳)有限公司 Access frequency control method, device, system and the server of distributed system
CN109309667A (en) * 2018-08-28 2019-02-05 东软集团股份有限公司 The authentication method and device, storage medium and electronic equipment that interface calls
CN109728969A (en) * 2018-05-18 2019-05-07 平安普惠企业管理有限公司 Abnormal user method for detecting, monitoring service end and the storage medium of application software
CN110191004A (en) * 2019-06-18 2019-08-30 北京搜狐新媒体信息技术有限公司 A kind of port detecting method and system
CN110222504A (en) * 2019-05-21 2019-09-10 平安银行股份有限公司 Monitoring method, device, terminal device and the medium of user's operation
CN110300125A (en) * 2019-02-02 2019-10-01 奇安信科技集团股份有限公司 API Access control method and API Access agent apparatus
CN110417615A (en) * 2019-06-21 2019-11-05 中国平安财产保险股份有限公司 Verify method of controlling switch, device, equipment and computer readable storage medium
CN111083057A (en) * 2019-11-26 2020-04-28 苏宁云计算有限公司 Flow control method and device and computer storage medium
CN111262737A (en) * 2020-01-16 2020-06-09 Tcl移动通信科技(宁波)有限公司 Port configuration management method and device, storage medium and terminal
CN111274291A (en) * 2020-01-20 2020-06-12 中国平安人寿保险股份有限公司 Query method, device, equipment and medium for user access data
CN111770126A (en) * 2019-06-28 2020-10-13 北京京东尚科信息技术有限公司 Service request processing method, device and storage medium
CN111953635A (en) * 2019-05-15 2020-11-17 福建天晴数码有限公司 Interface request processing method and computer-readable storage medium
CN112839006A (en) * 2019-11-22 2021-05-25 Oppo广东移动通信有限公司 Open platform interface calling method and related product
CN113377605A (en) * 2021-02-10 2021-09-10 北京声智科技有限公司 Access monitoring method, device, server and computer readable storage medium
CN113645217A (en) * 2021-08-06 2021-11-12 上海中通吉网络技术有限公司 Method for adaptively adjusting access threshold
CN114640700A (en) * 2020-11-30 2022-06-17 腾讯科技(深圳)有限公司 Calling frequency control method and device
CN115758300A (en) * 2022-11-28 2023-03-07 北京淘友天下技术有限公司 Data processing method and device, electronic equipment and storage medium
CN116232720A (en) * 2023-03-02 2023-06-06 国网河南省电力公司信息通信分公司 API (application program interface) encryption authentication method and storage device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104639650A (en) * 2015-02-27 2015-05-20 杭州华三通信技术有限公司 Fine granularity distributive interface access control method and device
CN105306534A (en) * 2015-09-21 2016-02-03 拉扎斯网络科技(上海)有限公司 Information verification method based on open platform and open platform
CN106656959A (en) * 2016-09-28 2017-05-10 腾讯科技(深圳)有限公司 Access request regulation and control method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104639650A (en) * 2015-02-27 2015-05-20 杭州华三通信技术有限公司 Fine granularity distributive interface access control method and device
CN105306534A (en) * 2015-09-21 2016-02-03 拉扎斯网络科技(上海)有限公司 Information verification method based on open platform and open platform
CN106656959A (en) * 2016-09-28 2017-05-10 腾讯科技(深圳)有限公司 Access request regulation and control method and device

Cited By (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108628611A (en) * 2018-04-20 2018-10-09 无锡盈达聚力科技有限公司 A kind of data calling method and data call device
CN108628611B (en) * 2018-04-20 2022-02-01 无锡盈达聚力科技有限公司 Data calling method and data calling device
CN108804940A (en) * 2018-05-11 2018-11-13 同程网络科技股份有限公司 A kind of anti-brush method of Web Api interfaces
CN109728969A (en) * 2018-05-18 2019-05-07 平安普惠企业管理有限公司 Abnormal user method for detecting, monitoring service end and the storage medium of application software
CN109728969B (en) * 2018-05-18 2022-04-15 平安普惠企业管理有限公司 Abnormal user detection method of application software, monitoring server and storage medium
CN109309667A (en) * 2018-08-28 2019-02-05 东软集团股份有限公司 The authentication method and device, storage medium and electronic equipment that interface calls
CN109309667B (en) * 2018-08-28 2021-08-13 东软集团股份有限公司 Authentication method and device for interface call, storage medium and electronic equipment
CN109298939B (en) * 2018-09-26 2021-04-20 腾讯科技(深圳)有限公司 Access frequency control method, device and system of distributed system and server
CN109298939A (en) * 2018-09-26 2019-02-01 腾讯科技(深圳)有限公司 Access frequency control method, device, system and the server of distributed system
CN110300125B (en) * 2019-02-02 2022-07-08 奇安信科技集团股份有限公司 API access control method and API access agent device
CN110300125A (en) * 2019-02-02 2019-10-01 奇安信科技集团股份有限公司 API Access control method and API Access agent apparatus
CN111953635A (en) * 2019-05-15 2020-11-17 福建天晴数码有限公司 Interface request processing method and computer-readable storage medium
CN110222504B (en) * 2019-05-21 2024-02-13 平安银行股份有限公司 User operation monitoring method, device, terminal equipment and medium
CN110222504A (en) * 2019-05-21 2019-09-10 平安银行股份有限公司 Monitoring method, device, terminal device and the medium of user's operation
CN110191004A (en) * 2019-06-18 2019-08-30 北京搜狐新媒体信息技术有限公司 A kind of port detecting method and system
CN110191004B (en) * 2019-06-18 2022-05-27 北京搜狐新媒体信息技术有限公司 Port detection method and system
CN110417615B (en) * 2019-06-21 2022-04-12 中国平安财产保险股份有限公司 Check switch control method, device and equipment and computer readable storage medium
CN110417615A (en) * 2019-06-21 2019-11-05 中国平安财产保险股份有限公司 Verify method of controlling switch, device, equipment and computer readable storage medium
CN111770126A (en) * 2019-06-28 2020-10-13 北京京东尚科信息技术有限公司 Service request processing method, device and storage medium
CN111770126B (en) * 2019-06-28 2023-08-04 北京京东尚科信息技术有限公司 Service request processing method, device and storage medium
CN112839006A (en) * 2019-11-22 2021-05-25 Oppo广东移动通信有限公司 Open platform interface calling method and related product
CN111083057A (en) * 2019-11-26 2020-04-28 苏宁云计算有限公司 Flow control method and device and computer storage medium
CN111262737A (en) * 2020-01-16 2020-06-09 Tcl移动通信科技(宁波)有限公司 Port configuration management method and device, storage medium and terminal
CN111262737B (en) * 2020-01-16 2023-11-28 圆山电子科技(深圳)有限公司 Port configuration management method and device, storage medium and terminal
CN111274291A (en) * 2020-01-20 2020-06-12 中国平安人寿保险股份有限公司 Query method, device, equipment and medium for user access data
CN111274291B (en) * 2020-01-20 2024-04-05 中国平安人寿保险股份有限公司 Query method, device, equipment and medium for user access data
CN114640700A (en) * 2020-11-30 2022-06-17 腾讯科技(深圳)有限公司 Calling frequency control method and device
CN113377605A (en) * 2021-02-10 2021-09-10 北京声智科技有限公司 Access monitoring method, device, server and computer readable storage medium
CN113645217A (en) * 2021-08-06 2021-11-12 上海中通吉网络技术有限公司 Method for adaptively adjusting access threshold
CN115758300A (en) * 2022-11-28 2023-03-07 北京淘友天下技术有限公司 Data processing method and device, electronic equipment and storage medium
CN115758300B (en) * 2022-11-28 2023-08-01 北京淘友天下技术有限公司 Data processing method, device, electronic equipment and storage medium
CN116232720A (en) * 2023-03-02 2023-06-06 国网河南省电力公司信息通信分公司 API (application program interface) encryption authentication method and storage device
CN116232720B (en) * 2023-03-02 2024-01-16 国网河南省电力公司信息通信分公司 API (application program interface) encryption authentication method and storage device

Similar Documents

Publication Publication Date Title
CN107704765A (en) A kind of interface access method, server and computer-readable recording medium
CN107786328A (en) A kind of method, service node device and computer-readable medium for generating key
US20230164166A1 (en) Systems and methods for effective delivery of simulated phishing campaigns
CN107480519A (en) A kind of method and server for identifying risk application
CN106357672B (en) A kind of login method and terminal
US11895105B2 (en) Authenticated interface element interactions
CN105683988A (en) Managed software remediation
CN107169343A (en) A kind of method and terminal of control application program
CN107612901A (en) One kind applies encryption method and terminal
CN107358114A (en) A kind of method and terminal for preventing user data loss
CN106161367A (en) A kind of verifying dynamic password method and system, client and server
CN107465730A (en) A kind of service request method and terminal
CN106254626A (en) A kind of incoming display method and terminal
CN108400868A (en) Storage method, device and the mobile terminal of seed key
CN108289028A (en) A kind of signature authentication method, relevant device and computer readable storage medium
CN106603510A (en) Data processing method and terminal
US20220191233A1 (en) Systems and methods for improving assessment of security risk based on personal internet account data
CN106685945B (en) Service request processing method, service handling number verification method and terminal thereof
CN107766708A (en) Nullify method, terminal and the computer-readable recording medium of account Entered state
CN106851613A (en) Service request method, the verification method of business handling number and its terminal
CN107257328A (en) A kind of safety of payment dispositions method, system, terminal and proof of identity method
CN108171063A (en) Method, terminal and the computer readable storage medium of access safety element
CN109522683A (en) Software source tracing method, system, computer equipment and storage medium
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
CN108092795A (en) A kind of reminding method, terminal device and computer-readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180216