The application is the submission of on May 26th, 2014 Patent Office of the People's Republic of China, application No. is 201410225414.4, denominations of invention
For the divisional application of the Chinese patent application of " a kind of the verification method of DOI, device and system ".
Specific implementation mode
The main idea of the present application lies in that before executing corresponding operation according to DOI, first according to pre-stored content
And the content to be verified parsed from DOI, verify whether the DOI is legal, and when verification result is legal, execution is to be verified
The corresponding operation of operation information for including in content corresponds to conversely, then refusing to execute the operation information for including in content to be verified
Operation.Compared with prior art, according to the technical solution of the application, when executing corresponding operation according to DOI, can avoid by
Corresponding operating is executed according to the DOI for carrying illegal contents in client and brings risk to user, so as to keep user safer
Ground uses DOI.
To keep the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and
Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one
Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing
Go out the every other embodiment obtained under the premise of creative work, shall fall in the protection scope of this application.
With reference to figure 1, Fig. 1 is the flow chart according to the verification method of the DOI of the application one embodiment.
Step 101, the content to be verified parsed from DOI is obtained.
Specifically, when user is intended to execute corresponding operating according to DOI, the image capture device that can first pass through client is adopted
Collect and parse the DOI, to obtain the content carried in the DOI.Wherein, client includes but not limited to that mobile phone, computer etc. are whole
End equipment.It, can in order to avoid bringing risk to client according to the DOI execution corresponding operatings for carrying illegal contents due to client
After the content carried during client parses DOI, it is corresponding the operation information carried in the content parsed is not executed directly
Operation, but first the content carried in the DOI is verified.In a step 101, client acquisition is parsed from DOI
, can be using the content as content to be verified after content, and it is verified by client, alternatively, client can also incite somebody to action
The content to be verified is sent to server, after server receives the content to be verified, is carried out to the content to be verified by server
Verification.
Step 102, according to pre-stored content and the content to be verified, whether legal the DOI is verified.When verification is tied
When fruit is legal, 103 are thened follow the steps, otherwise, executes step 104.
Specifically, when the signed by of DOI to be issued is when generating DOI, it can be using the content carried in DOI as legal interior
Store storage in the server.In the legal content including but not limited to:The operation information for including in DOI.Alternatively, can also be by certain
Determining illegal contents prestore in the server a bit, for example, certain fishing websites chained address etc..In this way, working as server
Receive in the slave DOI of client transmission after the content to be verified that parses, can according to pre-stored content and this wait for
Content is verified, verifies whether the DOI is legal, so that it is determined that whether client executes the operation information for including in the content to be verified
Corresponding operation.
According to one embodiment of the application, pre-stored content includes:Pre-stored legal content;According to advance
The content of storage and the content to be verified, whether legal, further comprise if verifying the DOI:Judge pre-stored conjunction
It whether there is the content to be verified in method content;If so, determining that the verification result of the DOI is legal;Otherwise, it determines described
The verification result of DOI is illegal.
Specifically, legal content can be prestored only in the server, by being in the server authentication legal content
No there are contents to be verified, and if it exists, shows that the confidence level of the content to be verified is higher, it is determined that the verification result of the DOI is
It is legal, otherwise, show that the confidence level of the content to be verified is relatively low, it is determined that the verification result of the DOI is illegal.Certainly, in order to
The content to be verified is avoided not to be saved in the legal content of server for legal content, when prestoring in the server
Legal content in be not present the content to be verified when, the verification result of the DOI can be undetermined.When verification result is undetermined
When, it is preferable that user's message for including " there are security risks by the DOI of the content to be verified " can be provided, be by user's selection
It is no to continue to execute the corresponding operation of operation information for including in the content to be verified, when user selects to execute, client executing
The corresponding operation of operation information for including in the content to be verified, when user selects refusal to execute, client refusal executes
The corresponding operation of operation information for including in the content to be verified.
According to another embodiment of the application, pre-stored content includes:Pre-stored illegal contents;According to advance
The content of storage and the content to be verified, whether legal, further comprise if verifying the DOI:It verifies pre-stored non-
It whether there is the content to be verified in method content;If so, determining that the verification result of the DOI is illegal;Otherwise the DOI
Verification result is legal.Certainly, it is not saved in the illegal interior of server for illegal contents in order to avoid the content to be verified
Rong Zhong, when the content to be verified is not present in pre-stored illegal contents in the server, the verification result of the DOI can be with
It is undetermined.When verification result is to wait for timing, it is preferable that it includes that " it is hidden that the DOI of the content to be verified has safety that can provide user
The message of trouble ", chooses whether to continue to execute the corresponding operation of operation information for including in the content to be verified by user, works as user
When selection executes, the corresponding operation of operation information for including in content to be verified described in client executing, when user selects to refuse
When execution, client refusal executes the corresponding operation of operation information for including in the content to be verified.
Specifically, illegal contents can be prestored only in the server, for example, certain fishing websites chained address
Deng by whether there is content to be verified in the server authentication illegal contents, and if it exists, then determine that the verification result of the DOI is
Illegally, otherwise, show that the confidence level of the content to be verified is higher, the verification result of the DOI is legal.
According to another embodiment of the application, pre-stored content includes:Pre-stored legal content and it is illegal in
Hold;According to pre-stored content and the content to be verified, whether legal, further comprise if verifying the DOI:Verification is pre-
It whether there is the content to be verified in the legal content and illegal contents that first store;Exist when in pre-stored legal content
When the content to be verified, determine that the verification result of the DOI is legal;When there is described wait in pre-stored illegal contents
When verifying content, determine that the verification result of the DOI is illegal;When not deposited in pre-stored legal content and illegal contents
In the content to be verified, determine that the verification result of the DOI is undetermined.
Specifically, legal content can be prestored both in the server, while illegal contents are also prestored, by taking
Business device, which is verified, whether there is content to be verified in the legal content and illegal contents.Wherein, to be tested if there are this in legal content
Demonstrate,prove content, it is determined that the verification result of the DOI is legal;If there are the contents to be verified in illegal contents, it is determined that the DOI's
Verification result is illegal;If the content to be verified is not present in legal content and illegal contents, in order to avoid this is to be verified interior
Appearance is not saved in for legal content in the legal content of server, also for avoiding the content to be verified from being illegal contents
Risk is brought to user, the verification result of the DOI of the content to be verified can be undetermined.When the verification of the DOI of content to be verified
When can be as a result undetermined, it is preferable that it includes disappearing for " there are security risks by the DOI of the content to be verified " that can provide user
Breath, chooses whether to continue to execute the corresponding operation of operation information for including in the content to be verified by user, when user's selection is held
When row, the corresponding operation of operation information for including in content to be verified described in client executing, when user selects refusal to execute,
Client refusal executes the corresponding operation of operation information for including in the content to be verified.
It is to prestore content in the server and verify whether legal specific of the DOI by server authentication to retouch above
State, when client has enough memory spaces and computing capability, can also prestore in the client content and by
Whether the DOI is verified in client validation legal.
Step 103, the corresponding operation of operation information for including in the content to be verified is executed.
Specifically, by step 102, when it is legal to determine verification result, show the confidence level of the content to be verified
The corresponding operation of operation information that is higher, then including in the client executing content to be verified.
Step 104, refusal executes the corresponding operation of operation information for including in the content to be verified.
Specifically, by step 102, when it is illegal to determine verification result, show the confidence level of the content to be verified
Relatively low, then client refusal executes the corresponding operation of operation information for including in the content to be verified, to avoid to user
Bring risk.
In step 101 to step 104, can the content to be verified that parsed from DOI be sent by user end to server,
For server whether according to pre-stored content and the content to be verified of reception, it is legal to verify the DOI, then, server to
Client returns to verification result, when the verification result that client receives is legal, in content to be verified described in client executing
Including the corresponding operation of operation information, when client receive verification result be it is illegal when, client refusal execute described in wait for
The corresponding operation of operation information for including in verification content.In addition it is also possible to be parsed from DOI by client acquisition to be tested
Content is demonstrate,proved, then whether client verifies the DOI according to the content to be verified in its own pre-stored content and reception
It is legal, when verification result is legal, the corresponding operation of operation information for including in content to be verified described in client executing, when
When verification result is illegal, client refusal executes the corresponding operation of operation information for including in the content to be verified.
For example, it is assumed that when generating the Quick Response Code B for the chained address for carrying website C, it can be using the chained address as conjunction
Method content stores in the server, and legal content is only stored in server.When user A is intended to be carried out accordingly according to Quick Response Code B
Operation before, first pass through the chained address that cell-phone customer terminal is parsed from Quick Response Code B and be sent to server and verified.Service
Device receives behind the chained address parsed in Quick Response Code B, verifies in pre-stored legal content and whether there is from two dimension
The chained address parsed in code B, it is assumed that server determines that there are chain ground connection in pre-stored legal content by verification
Location then returns to verification result " legal " to the client of user A.After the client of user A receives verification result " legal ", step on
The corresponding website C in the land chained address.
By upper example it is found that client is behind the chained address carried in parsing Quick Response Code B, there is no directly log in the chain
It is grounded the corresponding website C in location, but first the chained address parsed is verified, determines that verification result is visitor after " legal "
Family end logs in the corresponding website C in the chained address according to verification result.Compared with prior art, according to the technical side of the application
Case can avoid since client executing carries the Quick Response Code execution corresponding operating of illegal contents and brings risk to user A, thus
Family A can be used more safely to use Quick Response Code B.
It is larger in view of the data volume of the full dose information of the operation information carried in DOI, therefore when server according to depositing in advance
When the legal content of storage judges wherein to whether there is the operation information in content to be verified, longer query time is needed.In order to
The inquiry is rapidly completed, other than carrying corresponding operation information in DOI, can also be taken in DOI when generating DOI
It identifies with corresponding DOI, also, correspondingly, in the server other than storing the operation information, also stores in the server
The DOI is identified.Wherein, DOI marks can be made of number, letter or any other character.In this way, working as client from DOI
In parse the DOI marks carried in the DOI and the contents such as operation information after, which can be identified and operation information is as waiting for
Verification DOI marks and operation information to be verified are sent to server.For operation information to be verified, due to be verified
The data volume of DOI marks is smaller, therefore server can be identified more quickly according to DOI to be verified pre-stored legal interior
It is inquired in appearance, to more quickly determine the verification result of DOI.Wherein, when the DOI in pre-stored legal content is marked
There is no when DOI to be verified marks in knowledge, determine that the verification result for the DOI for carrying content to be verified is illegal.
In addition, when being identified there are DOI to be verified in the DOI marks in pre-stored legal content, it can not be direct
Determine that the verification result for the DOI for carrying content to be verified is legal, as it is possible that there are the forgery of the signed by of illegal DOI is legal
The case where DOI marks of DOI.Specifically, the DOI carried in DOI can be identified and is forged into server in advance by DOI signed bies
DOI marks in the legal content of preservation, but the operation information carried in the DOI is corresponding with DOI marks in legal content
Operation information is different, that is, what is carried is illegal operation information.In order to avoid user executes the corresponding operations of DOI in this case
And risk is generated, when being identified there are DOI to be verified in the DOI marks in pre-stored legal content, it can be determined that exist
Whether the operation information and operation information to be verified in the legal content of the DOI marks to be verified are identical, to behaviour to be verified
Make information and carry out full dose comparison, if identical, it is determined that it is legal to carry the verification result of the DOI of content to be verified, if it is different, then
Determine that the verification result for the DOI for carrying content to be verified is illegal.
In view of the foregoing, in Fig. 1, according to one embodiment of the application, step 101 may further include:It obtains
Take the operation information to be verified parsed from DOI, DOI to be verified marks.Pre-stored legal content is judged in step 102
In whether there is the content to be verified, may further include, when in pre-stored legal content DOI mark in do not deposit
In the DOI marks to be verified, determine that the verification result of the DOI is illegal, the DOI in pre-stored legal content
There are when the DOI marks to be verified, judge that there are the operation informations in the legal content of the DOI marks to be verified in mark
It is whether identical as the operation information to be verified, if identical, it is determined that the verification result of the DOI is legal, if it is different, then really
The verification result of the fixed DOI is illegal.
For example, pre-stored legal content is as shown in table 1 in server:
DOI is identified |
Operation information |
123 |
www.abcde.com |
Table 1
Operation information to be verified, the DOI to be verified mark such as table 2 parsed in the slave DOI that server is received from client
It is shown:
DOI marks to be verified |
Operation information to be verified |
123 |
www.xyz.com |
Table 2
Then, first, it is determined that the DOI in the pre-stored legal content of server is to be verified with the presence or absence of this in identifying
DOI identifies " 123 ", judged, determines that there are the DOI to be verified to identify " 123 " in legal content.Then, then judge there is this
Operation information " www.abcde.com " in the legal content of DOI marks " 123 " to be verified and the operation information to be verified
Whether " www.xyz.com " be identical, is as a result determined as differing, it is determined that carries the verification result of the DOI of the content to be verified
It is illegal, that is, the DOI marks in DOI as shown in Table 2 have been forged into the DOI in legal content as shown in Table 1 by signed by
Mark.After the verification result is returned to client by server, client refusal logs in the corresponding website " www.xyz.com ", from
And it avoids bringing risk to user due to logging in the website.
The foregoing describe servers to obtain after the operation information to be verified parsed in DOI and DOI to be verified marks, root
The process that the verification result of the DOI is determined according to pre-stored legal content, when client has enough memory space and meter
When calculation ability, client can also obtain the operation information to be verified parsed from DOI and DOI to be verified marks, and root
The verification result of the DOI is determined according to pre-stored legal content.
In actual application scenarios, when wishing that certain user executes corresponding operation only in certain number according to DOI,
It is limited to execute the number operated accordingly according to the DOI to the user, server, which can pre-save, allows the use
The effective degree of the content to be verified carried in the DOI is verified at family, so that it is determined that whether the user can execute phase according to the DOI
The operation answered.It, can be with specifically, client is to server other than sending the content to be verified that is parsed from DOI
It obtains and sends user identifier to server.The user identifier can prestore in the client, can also be user
It is manually entered client.In addition, the user identifier can be the user user name or the used client of the user it is mutual
The equipment unique marks such as the address networking protocol address (Internet Protocol, IP).Server is in addition to according to pre-stored
Other than legal content judges the content to be verified of reception, it can also continue to according to the user identifier received from client,
In the effective degree pre-saved, the corresponding effective degree for allowing to verify the verification content of the user identifier is searched.When true
When the fixed effective degree is more than zero, determines that the verification result of DOI is legal, conversely, when the effective degree is not more than zero, determine
The verification result of DOI is illegal.Wherein, whenever the corresponding user of the user identifier by server authentication the content one to be verified
Secondary, the user identifier is corresponding to allow the effective degree for verifying the content to be verified just to reduce once.
Further include before the verification result for determining the DOI is legal according to one embodiment of the application as a result,:
User identifier is obtained, in the effective degree pre-saved, searches that the user identifier is corresponding to be allowed to verify the content to be verified
Effective degree, judge whether the effective degree is more than zero, when more than zero, determine that the DOI for carrying the content to be verified is tested
It is legal to demonstrate,prove result, when no more than zero, determines that the verification result for the DOI for carrying the content to be verified is illegal.
Server is according to the verification result of the corresponding true DOI of effective degree for allowing to verify content to be verified of user identifier
Afterwards, verification result can be returned to client.
Allow to be added by scanning the two-dimensional code B for example, the group master of certain chat group is corresponding to the user identifier of all users
This group of effective degrees are preset as 1.Wherein, after chat group is added by scanning the two-dimensional code B in user A, because often in chat group
Middle publication carries the Quick Response Code of advertising information, and the group is kicked out of by group master.At this moment, B is scanned the two-dimensional code in first passage due to user A
After the group is added, the user identifier is corresponding to be allowed to scan the two-dimensional code B and this group of effective degrees are added are reduced to 0.Assuming that user A
User identifier is " 666 ", then when user A is intended to again by scanning the two-dimensional code B and being added this group, server receives user A's
Client is sent after the user identifier " 666 " of the content to be verified and user A that are parsed in Quick Response Code B, can be protected in advance
The corresponding effective degree for allowing to verify the content to be verified of the user identifier " 666 " is found in the effective degree deposited, when looking into
When the effective degree found is 0, determine that the verification result for the DOI for carrying the content to be verified is illegal, and return to client
Return the verification result.After the client of user A receives verification result " illegal ", the group can not be added by Quick Response Code B.
The foregoing describe servers determined according to the corresponding effective degree of user identifier DOI verification result process, when
When client has enough memory spaces and computing capability, client can also be true according to the corresponding effective degree of user identifier
Determine the verification result of DOI.
Further, in actual application scenarios, when only allow user regular hour range use certain DOI when,
The effective time range for verifying the content to be verified carried in the DOI can be defined.Specifically, server can be preset
Effective time range corresponding with content to be verified.Therefore, when there are client transmissions in pre-stored legal content
Content to be verified, determine carry the content to be verified DOI verification result be it is legal before, can continue verification with it is to be verified
The corresponding effective time range of content, so that it is determined that the verification result of DOI.Wherein, specifically, server can determine in advance first
If the corresponding effective time range of the content to be verified, then determine whether current time exceeds the effective time range, when
Beyond when, determine the verification result of DOI be it is illegal, it is on the contrary, it is determined that the verification result of DOI be it is legal.
For these reasons, according to one embodiment of the application, when there are to be verified in pre-stored legal content
When content, before determining that the verification result for the DOI for carrying the content to be verified is legal, further include:Determine that preset this is to be tested
The corresponding effective time range of content is demonstrate,proved, determines current time without departing from the effective time range, when beyond the effective time model
When enclosing, determines that the verification result for the DOI for carrying the content to be verified is legal, when without departing from the effective time range, determine
The verification result for carrying the DOI of the content to be verified is illegal.
For example, certain website A, for certain activity publication Quick Response Code B, user can step on according to the chained address carried in Quick Response Code B
The corresponding webpage C of the land activity.Assuming that ranging from 2 months 2014 on March 1st, 1 day 1 movable effective time, and,
The corresponding effective time range in the preset chained address is 2 months 2014 on March 1st, 1 day 1 in the server, then
When user D is intended to according to Quick Response Code B logon web page C, server in the slave Quick Response Code B that is received from the client of user D to parsing
The chained address gone out is verified, when determining in pre-stored legal content there are behind the chained address, further really
Determine whether current time exceeds the corresponding effective time range in the preset chained address.Assuming that current time is May 1 in 2014
Day, exceed the corresponding effective time range in the preset chained address, then server determines the two dimension for carrying the chained address
The verification result of code B is illegal, and the verification result is returned to the client of user D.The client receives verification knot
After fruit " illegal ", refusal logs in the corresponding website C in the chained address.
It should be noted that determining the verification result of DOI according to the corresponding effective degree of user identifier and according to be verified
The corresponding term of validity of content determines that the verification result of DOI, the two do not collide, and can select a use, also can be used simultaneously.
The foregoing describe servers determined according to the corresponding term of validity of content to be verified DOI verification result process, when
When client has enough memory spaces and computing capability, client can also be true according to the corresponding term of validity of content to be verified
Determine the verification result of DOI.
In the following, the verification method based on DOI shown in FIG. 1, in conjunction with the corresponding effective degree of user identifier and/or according to waiting for
The corresponding term of validity of verification content determines the verification result of DOI, a kind of flow chart of the verification method of DOI is provided, such as Fig. 2 institutes
Show.
Step 201, user end to server sends the content to be verified parsed from DOI.
Step 202, server receives the content to be verified that client is sent.
Step 203, judge to identify with the presence or absence of DOI to be verified in legal content.If so, 205 are thened follow the steps, otherwise,
Execute step 204.
Step 204, it determines that the verification result for the DOI for carrying content to be verified is illegal, executes step 214.
Step 205, judge whether operation information in legal content and operation information to be verified are identical, if so, executing
Step 207, otherwise, step 206 is executed.
Step 206, it determines that the verification result for the DOI for carrying content to be verified is illegal, executes step 214.
Step 207, the user identifier that client is sent is received.
Step 208, the corresponding effective degree for allowing to verify content to be verified of user identifier is determined.
Step 209, judge whether effective degree is more than zero, if so, thening follow the steps 211, otherwise, execute step 210.
Step 212, it determines that the verification result for the DOI for carrying content to be verified is illegal, executes step 214.
Step 211, according to current time, determine whether current time exceeds the corresponding effective time model of content to be verified
It encloses, if so, thening follow the steps 212, otherwise, executes step 213.
Step 212, it determines that the verification result for the DOI for carrying content to be verified is illegal, executes step 213.
Step 213, determine that the verification result for the DOI for carrying content to be verified is legal.
Step 214, verification result is returned to client.
Step 215, client receives the verification result that server returns.
Step 216, judge whether the verification result is legal, if so, thening follow the steps 217, otherwise, execute step 218.
Step 217, the corresponding operation of the operation information for including in content to be verified is executed.
Step 218, refusal executes the corresponding operation of operation information for including in content to be verified.
Further, in actual application scenarios, exist for being identified there are the DOI to be verified in legal content
Operation information in the legal content of DOI to be verified mark illegal DOI different from the operation information to be verified, in the application
In, illegal DOI in this case can be known as falseness DOI.The number for the false DOI that server can be issued according to signed by
Amount carries out the signed by grading of credit grade.
Specifically, when the signed by of DOI to be issued generates DOI, corresponding DOI signed bies can be stored in the server
Information.It can include but is not limited to the Name or Designation of signed by the DOI signed by information.In addition, by statistics, can calculate
Go out the quantity for the false DOI that a signed by is issued and the ratio of the quantity of all DOI that the signed by is signed and issued.According to this ratio
Example, can comparative example be more than predetermined threshold value signed by mark credit grade label.It, can be to the label according to the credit grade label
Permission etc. of signing and issuing of hair people limits.When client receives the verification result of server return, even if the verification result
To be legal, the corresponding operation of the operation information carried in DOI can also not be executed temporarily, but can continue waiting for receiving service
The credit grade label for the DOI signed bies that device is sent.It, will after client receives the credit grade label of the DOI signed bies
The credit grade label display is to user, by user according to the credit grade label, voluntarily chooses whether to execute in the DOI and includes
The corresponding operation of operation information, to further decrease since client executes corresponding behaviour according to the DOI for carrying illegal contents
Make and brings risk to user.
For example, signed by A has signed and issued 10 Quick Response Codes altogether, wherein there is 5 Quick Response Codes to be determined as false two dimension by server
Code, signed by B have signed and issued 20 Quick Response Codes altogether, wherein and there are 15 Quick Response Codes to be confirmed as false Quick Response Code, then, and signed by A label
The ratio of the quantity of the false Quick Response Code of hair and the quantity of its all Quick Response Code signed and issued is 50%, the falseness that signed by B is signed and issued
The ratio of the quantity of Quick Response Code and the quantity of its all Quick Response Code signed and issued is 75%.Assuming that predetermined threshold value is 30%, then to label
It sends out people A and signed by B marks credit grade label.Specifically, it is assumed that when the ratio is 30%~50%, then to signed by mark
The credit grade of note be " in ", when the ratio is 51%~100%, to signed by mark credit grade be " poor ".Then, originally
In example, the credit grade to signed by A mark be " in ", the credit grade to signed by B marks is " poor ".When user C is intended to root
When executing corresponding operating according to Quick Response Code D, it is assumed that Quick Response Code D's signs and issues artificial signed by A.By server authentication, the visitor of user C
After family termination receives verification result " legal ", the credit grade for also receiving the signed by A of the Quick Response Code D of server transmission is
" in ", and user C is prompted to choose whether that continue to execute Quick Response Code D operates accordingly.When user C is when being selected as " not executing ",
Client refusal executes Quick Response Code D and operates accordingly.In this way, can further decrease since client is according to carrying illegal contents
Quick Response Code execute corresponding operating and bring risk to user.
The quantity for the false DOI that the foregoing describe servers to issue according to signed by carries out credit grade to the signed by
The process of grading, when client has enough memory spaces and computing capability, client can also be issued according to signed by
False DOI quantity to the signed by carry out credit grade grading.
The above-mentioned verification method for DOI provided by the embodiments of the present application is based on same thinking, and present invention also provides one
The verification device of the verification system and corresponding DOI of kind DOI, as shown in Figures 3 to 5.
Fig. 3 is the verification system structure diagram according to the DOI of the application one embodiment, is specifically included:
Server 301, the content to be verified that parses in the slave DOI for receiving the transmission of client 302, according to depositing in advance
Whether the content of storage and the content to be verified, it is legal to verify the DOI, and verification result is returned to client 302;
Client 302 receives server 301 for sending the content to be verified parsed from DOI to server 301
The verification result of return executes the operation information pair for including in the content to be verified when the verification result of reception is legal
The operation answered, when the verification result of reception is illegal, refusal executes the operation information for including in the content to be verified and corresponds to
Operation.
According to one embodiment of the application, 301 pre-stored content of server includes:It is pre-stored legal interior
Hold;The client 302 is further used for:To the server 301 send parsed from DOI operation information to be verified,
DOI marks to be verified;The server 301 is further used for:It is parsed in the slave DOI that reception client 302 is sent to be tested
Operation information, DOI to be verified marks are demonstrate,proved, is judged in the DOI marks in pre-stored legal content with the presence or absence of described to be tested
DOI marks are demonstrate,proved, when there is no described in when the DOI to be verified mark, determining in the DOI marks in pre-stored legal content
The verification result of DOI is illegal, when being identified there are the DOI to be verified in the DOI marks in pre-stored legal content,
Whether the operation information and the operation information to be verified in the legal content that judgement is identified there are the DOI to be verified are identical,
If identical, it is determined that the verification result of the DOI is legal, if it is different, determining that the verification result of the DOI is illegal.
According to one embodiment of the application, the client 302 is further used for:It sends and uses to the server 301
Family identifies;The server 301 is additionally operable to, and before determining that the verification result of the DOI is legal, is received client 302 and is sent
User identifier, in the effective degree pre-saved, search the user identifier it is corresponding allow to verify it is described it is to be verified in
The effective degree of appearance determines that the effective degree found is more than zero.
Fig. 4 is the block diagram according to the verification device of the DOI of the application one embodiment.
As shown in figure 4, the verification device of DOI a kind of, including:Acquisition module 401 is parsed for obtaining from DOI
Content to be verified;Authentication module 402, for according to pre-stored content and the content to be verified, verifying the DOI to be
It is no legal;Execution module 403, for when verification result is legal, executing the operation information for including in the content to be verified
Corresponding operation, when verification result is illegal, refusal executes the corresponding behaviour of operation information for including in the content to be verified
Make.
According to one embodiment of the application, pre-stored content includes:Pre-stored legal content;The verification
Module 402 is further used for:It verifies and whether there is the content to be verified in pre-stored legal content;If so, determining institute
The verification result for stating DOI is legal;Otherwise, it determines the verification result of the DOI is illegal.
According to one embodiment of the application, pre-stored content includes:Pre-stored illegal contents;The verification
Module 402 is further used for:Judge to whether there is the content to be verified in pre-stored illegal contents;If so, determining institute
The verification result for stating DOI is illegal;Otherwise, it determines the verification result of the DOI is legal.
According to one embodiment of the application, pre-stored content includes:Pre-stored legal content and it is illegal in
Hold;The authentication module 402 is further used for:It verifies in pre-stored legal content and illegal contents and is waited for the presence or absence of described
Verify content;When there are when the content to be verified, determine that the verification result of the DOI is to close in pre-stored legal content
Method;When there are when the content to be verified, determine that the verification result of the DOI is illegal in pre-stored illegal contents;When
When the content to be verified being not present in pre-stored legal content and illegal contents, the verification result of the DOI is determined
It is undetermined;Described device is additionally operable to:When whether verification result is to wait for periodically, providing a user to execute and wrapping in the content to be verified
The message of the corresponding operation of operation information contained executes the operation for including in the content to be verified when user selects to execute
The corresponding operation of information, when user selects refusal to execute, refusal executes the operation information pair for including in the content to be verified
The operation answered.
According to one embodiment of the application, the acquisition module 401 is further used for:What acquisition was parsed from DOI
Operation information to be verified, DOI to be verified marks;The authentication module 402 is further used for:Judge pre-stored legal content
In DOI marks in the presence or absence of the DOI to be verified mark, do not deposited when in the DOI marks in pre-stored legal content
In the DOI marks to be verified, determine that the verification result of the DOI is illegal, the DOI in pre-stored legal content
There are when the DOI marks to be verified, judge that there are the operation informations in the legal content of the DOI marks to be verified in mark
It is whether identical as the operation information to be verified, if identical, it is determined that the verification result of the DOI is legal, when if it is different, then
Determine that the verification result of the DOI is illegal.
According to one embodiment of the application, the authentication module 402 is additionally operable to:Determine that the verification result of the DOI is
Before legal, receive the user identifier that the client is sent and search the user identifier in the effective degree pre-saved
The corresponding effective degree for allowing to verify the content to be verified determines that the effective degree found is more than zero.
According to one embodiment of the application, the authentication module 402 is additionally operable to:Determine that the verification result of the DOI is
Before legal, determine the corresponding effective time range of the preset content to be verified, determine that current time has without departing from all
Imitate time range.
Fig. 5 is the block diagram according to the verification device of the DOI of the client of the application one embodiment.
As shown in figure 5, the verification device of DOI a kind of, including:Sending module 501, for being sent from DOI to server
The content to be verified parsed;Receiving module 502, the verification result for receiving server return;Execution module 503, is used for
When the verification result of reception is legal, the corresponding operation of operation information for including in the content to be verified is executed, reception is worked as
Verification result when being illegal, refusal executes the corresponding operation of operation information for including in the content to be verified.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include computer-readable medium in impermanency include device, arbitrary access include device (RAM) and/or
The forms such as Nonvolatile memory, such as read-only includes device (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology includes to realize information.Information can be computer-readable instruction, data structure, the module of program or other data.
The example comprising medium of computer includes, but are not limited to phase transition internal memory (PRAM), static random-access includes device (SRAM), dynamic
State arbitrary access include device (DRAM), other kinds of arbitrary access include device (RAM), it is read-only comprising device (ROM), electric erasable
It is programmable it is read-only comprising device (EEPROM), fast flash memory bank or other memory techniques, CD-ROM it is read-only comprising device (CD-ROM),
Digital versatile disc (DVD) or other optics include, magnetic tape cassette, and tape magnetic rigid disk includes or other magnetism include equipment
Or any other non-transmission medium, it can be used for including that can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
Including so that process, method, commodity or equipment including a series of elements include not only those elements, but also wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described
There is also other identical elements in the process of element, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.Moreover, the application can be used can use packet in the computer that one or more wherein includes computer usable program code
Shape containing the computer program product implemented on medium (including but not limited to that disk includes device etc. comprising device, CD-ROM, optics)
Formula.
Above is only an example of the present application, it is not intended to limit this application.For those skilled in the art
For, the application can have various modifications and variations.It is all within spirit herein and principle made by any modification, equivalent
Replace, improve etc., it should be included within the scope of claims hereof.