CN108629216A - A kind of verification method of DOI, device and system - Google Patents

A kind of verification method of DOI, device and system Download PDF

Info

Publication number
CN108629216A
CN108629216A CN201810291833.6A CN201810291833A CN108629216A CN 108629216 A CN108629216 A CN 108629216A CN 201810291833 A CN201810291833 A CN 201810291833A CN 108629216 A CN108629216 A CN 108629216A
Authority
CN
China
Prior art keywords
verified
content
doi
legal
verification result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810291833.6A
Other languages
Chinese (zh)
Other versions
CN108629216B (en
Inventor
李立中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810291833.6A priority Critical patent/CN108629216B/en
Publication of CN108629216A publication Critical patent/CN108629216A/en
Application granted granted Critical
Publication of CN108629216B publication Critical patent/CN108629216B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application involves a kind of methods, devices and systems of the verification of DOI.This method includes:Obtain the content to be verified parsed from DOI;According to pre-stored content and the content to be verified, whether legal the DOI is verified;When verification result is legal, the corresponding operation of operation information for including in the content to be verified is executed;When verification result is illegal, refusal executes the corresponding operation of operation information for including in the content to be verified.According to the application, client can avoid when executing corresponding operation according to DOI since client executes corresponding operating according to the DOI for carrying illegal contents and brings risk to user, so as to make user more safely use DOI.

Description

A kind of verification method of DOI, device and system
The application is the submission of on May 26th, 2014 Patent Office of the People's Republic of China, application No. is 201410225414.4, denominations of invention For the divisional application of the Chinese patent application of " a kind of the verification method of DOI, device and system ".
Technical field
This application involves field of computer technology, more particularly, to a kind of verification method of DOI, device and system.
Background technology
Digital Object Unique Identifier (Digital Object Unique Identifier, DOI) is one kind to number The tool that information is identified, its original are the electricity for being used for its publication of unique mark that external Digital Literature manufacturer more early uses The identifier that Ziwen is offered.Then, it is based on the identifier, and forms the identifier of many applications under various circumstances, such as two dimension Code and bar code etc., they are all referred to as Digital Object Unique Identifier.Wherein, Quick Response Code is a kind of comprising readable data Bar code indicates the mode of binary data by using chequered with black and white geometric figure, and the Chinese can be carried in Quick Response Code The contents such as word, letter, number.
In the prior art, user is according to Quick Response Code when executing corresponding operation, can first pass through that client is included to sweep The device scan Quick Response Code is retouched, and it is parsed, to obtain the content carried in Quick Response Code.Then, client according to The operation information for including in the content executes the corresponding operation of the operation information.
However, despite the presence of said program, still, the program has the following defects:Since Quick Response Code signed by is generating When Quick Response Code, any content can be carried wherein, that is to say, that legal content can be not only carried in Quick Response Code, it can also Illegal contents are carried, and user can not be by visually directly knowing whether the content in the Quick Response Code is legal content.Therefore, when When content in Quick Response Code is illegal contents, user is corresponded to by operation information included in the client executing illegal contents Operation after, risk will be brought to user, or even loss.
For example, Quick Response Code signed by carries the station address of certain fishing website in Quick Response Code, user A is unwitting In the case of, using client scan and after parsing the Quick Response Code, the fishing website will be logged on automatically, to give user's A bands Risk is carried out.
Therefore, in the art, a kind of proof scheme of DOI is needed, can be solved illegal according to carrying due to client The problem of DOI of content executes corresponding operating and brings risk to user.
Invention content
The main purpose of the application is to provide a kind of verification technique of DOI, to solve in the prior art due to client root The problem of corresponding operating being executed according to the DOI for carrying illegal contents and bringing risk to user.
According to the application's in a first aspect, providing a kind of verification method of Digital Object Unique Identifier DOI, including: Obtain the content to be verified parsed from DOI;According to pre-stored content and the content to be verified, described in verification Whether DOI is legal;When verification result is legal, the corresponding operation of operation information for including in the content to be verified is executed; When verification result is illegal, refusal executes the corresponding operation of operation information for including in the content to be verified.
According to the second aspect of the application, a kind of verification method of Digital Object Unique Identifier DOI is provided, including: The content to be verified parsed from DOI is sent to server;Receive the verification result that server returns;When the verification knot of reception When fruit is legal, the corresponding operation of operation information for including in the content to be verified is executed;When the verification result of reception is non- When method, refusal executes the corresponding operation of operation information for including in the content to be verified.
According to the third aspect of the application, a kind of verification system of Digital Object Unique Identifier DOI is provided, including: Server, for receiving the content to be verified parsed in the slave DOI that client is sent, according to pre-stored content and institute Content to be verified is stated, whether legal, verification result is returned to client if verifying the DOI;Client, for being sent to server The content to be verified parsed from DOI receives the verification result that server returns, when the verification result of reception is legal, The corresponding operation of operation information for including in the content to be verified is executed, when the verification result of reception is illegal, refusal is held The corresponding operation of operation information for including in the row content to be verified.
According to the fourth aspect of the application, a kind of verification device of Digital Object Unique Identifier DOI, feature are provided It is, including:Acquisition module, for obtaining the content to be verified parsed from DOI;Authentication module is deposited in advance for basis Whether legal the content of storage and the content to be verified, verify the DOI;Execution module, for being legal when verification result When, the corresponding operation of operation information for including in the content to be verified is executed, when verification result is illegal, refusal executes institute State the corresponding operation of the operation information for including in content to be verified.
According to the 5th of the application the aspect, a kind of verification device of Digital Object Unique Identifier DOI, feature are provided It is, including:Sending module, for sending the content to be verified parsed from DOI to server;Receiving module, for connecing Receive the verification result that server returns;Execution module, it is described to be verified interior for when the verification result of reception is legal, executing The corresponding operation of operation information for including in appearance, when the verification result of reception is illegal, refusal executes the content to be verified In include the corresponding operation of operation information.
According to the technical solution of the application, before executing corresponding operation according to DOI, first according to pre-stored content And the content to be verified parsed from DOI, verify whether the DOI is legal, and when verification result is legal, execution is to be verified The corresponding operation of operation information for including in content corresponds to conversely, then refusing to execute the operation information for including in content to be verified Operation.Compared with prior art, according to the technical solution of the application, when executing corresponding operation according to DOI, can avoid by Corresponding operating is executed according to the DOI for carrying illegal contents in client and brings risk to user, so as to keep user safer Ground uses DOI.
Description of the drawings
Attached drawing described herein is used for providing further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please do not constitute the improper restriction to the application for explaining the application.In the accompanying drawings:
Fig. 1 is the flow chart according to the verification method of the DOI of the application one embodiment;
Fig. 2 is the flow chart according to the verification method of the more detailed DOI of the application one embodiment;
Fig. 3 is the schematic diagram according to the verification system of the DOI of the application one embodiment;
Fig. 4 is the block diagram according to the verification device of the DOI of the application one embodiment;And
Fig. 5 is the block diagram according to the verification device of the DOI of the client of the application one embodiment.
Specific implementation mode
The main idea of the present application lies in that before executing corresponding operation according to DOI, first according to pre-stored content And the content to be verified parsed from DOI, verify whether the DOI is legal, and when verification result is legal, execution is to be verified The corresponding operation of operation information for including in content corresponds to conversely, then refusing to execute the operation information for including in content to be verified Operation.Compared with prior art, according to the technical solution of the application, when executing corresponding operation according to DOI, can avoid by Corresponding operating is executed according to the DOI for carrying illegal contents in client and brings risk to user, so as to keep user safer Ground uses DOI.
To keep the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Go out the every other embodiment obtained under the premise of creative work, shall fall in the protection scope of this application.
With reference to figure 1, Fig. 1 is the flow chart according to the verification method of the DOI of the application one embodiment.
Step 101, the content to be verified parsed from DOI is obtained.
Specifically, when user is intended to execute corresponding operating according to DOI, the image capture device that can first pass through client is adopted Collect and parse the DOI, to obtain the content carried in the DOI.Wherein, client includes but not limited to that mobile phone, computer etc. are whole End equipment.It, can in order to avoid bringing risk to client according to the DOI execution corresponding operatings for carrying illegal contents due to client After the content carried during client parses DOI, it is corresponding the operation information carried in the content parsed is not executed directly Operation, but first the content carried in the DOI is verified.In a step 101, client acquisition is parsed from DOI , can be using the content as content to be verified after content, and it is verified by client, alternatively, client can also incite somebody to action The content to be verified is sent to server, after server receives the content to be verified, is carried out to the content to be verified by server Verification.
Step 102, according to pre-stored content and the content to be verified, whether legal the DOI is verified.When verification is tied When fruit is legal, 103 are thened follow the steps, otherwise, executes step 104.
Specifically, when the signed by of DOI to be issued is when generating DOI, it can be using the content carried in DOI as legal interior Store storage in the server.In the legal content including but not limited to:The operation information for including in DOI.Alternatively, can also be by certain Determining illegal contents prestore in the server a bit, for example, certain fishing websites chained address etc..In this way, working as server Receive in the slave DOI of client transmission after the content to be verified that parses, can according to pre-stored content and this wait for Content is verified, verifies whether the DOI is legal, so that it is determined that whether client executes the operation information for including in the content to be verified Corresponding operation.
According to one embodiment of the application, pre-stored content includes:Pre-stored legal content;According to advance The content of storage and the content to be verified, whether legal, further comprise if verifying the DOI:Judge pre-stored conjunction It whether there is the content to be verified in method content;If so, determining that the verification result of the DOI is legal;Otherwise, it determines described The verification result of DOI is illegal.
Specifically, legal content can be prestored only in the server, by being in the server authentication legal content No there are contents to be verified, and if it exists, shows that the confidence level of the content to be verified is higher, it is determined that the verification result of the DOI is It is legal, otherwise, show that the confidence level of the content to be verified is relatively low, it is determined that the verification result of the DOI is illegal.Certainly, in order to The content to be verified is avoided not to be saved in the legal content of server for legal content, when prestoring in the server Legal content in be not present the content to be verified when, the verification result of the DOI can be undetermined.When verification result is undetermined When, it is preferable that user's message for including " there are security risks by the DOI of the content to be verified " can be provided, be by user's selection It is no to continue to execute the corresponding operation of operation information for including in the content to be verified, when user selects to execute, client executing The corresponding operation of operation information for including in the content to be verified, when user selects refusal to execute, client refusal executes The corresponding operation of operation information for including in the content to be verified.
According to another embodiment of the application, pre-stored content includes:Pre-stored illegal contents;According to advance The content of storage and the content to be verified, whether legal, further comprise if verifying the DOI:It verifies pre-stored non- It whether there is the content to be verified in method content;If so, determining that the verification result of the DOI is illegal;Otherwise the DOI Verification result is legal.Certainly, it is not saved in the illegal interior of server for illegal contents in order to avoid the content to be verified Rong Zhong, when the content to be verified is not present in pre-stored illegal contents in the server, the verification result of the DOI can be with It is undetermined.When verification result is to wait for timing, it is preferable that it includes that " it is hidden that the DOI of the content to be verified has safety that can provide user The message of trouble ", chooses whether to continue to execute the corresponding operation of operation information for including in the content to be verified by user, works as user When selection executes, the corresponding operation of operation information for including in content to be verified described in client executing, when user selects to refuse When execution, client refusal executes the corresponding operation of operation information for including in the content to be verified.
Specifically, illegal contents can be prestored only in the server, for example, certain fishing websites chained address Deng by whether there is content to be verified in the server authentication illegal contents, and if it exists, then determine that the verification result of the DOI is Illegally, otherwise, show that the confidence level of the content to be verified is higher, the verification result of the DOI is legal.
According to another embodiment of the application, pre-stored content includes:Pre-stored legal content and it is illegal in Hold;According to pre-stored content and the content to be verified, whether legal, further comprise if verifying the DOI:Verification is pre- It whether there is the content to be verified in the legal content and illegal contents that first store;Exist when in pre-stored legal content When the content to be verified, determine that the verification result of the DOI is legal;When there is described wait in pre-stored illegal contents When verifying content, determine that the verification result of the DOI is illegal;When not deposited in pre-stored legal content and illegal contents In the content to be verified, determine that the verification result of the DOI is undetermined.
Specifically, legal content can be prestored both in the server, while illegal contents are also prestored, by taking Business device, which is verified, whether there is content to be verified in the legal content and illegal contents.Wherein, to be tested if there are this in legal content Demonstrate,prove content, it is determined that the verification result of the DOI is legal;If there are the contents to be verified in illegal contents, it is determined that the DOI's Verification result is illegal;If the content to be verified is not present in legal content and illegal contents, in order to avoid this is to be verified interior Appearance is not saved in for legal content in the legal content of server, also for avoiding the content to be verified from being illegal contents Risk is brought to user, the verification result of the DOI of the content to be verified can be undetermined.When the verification of the DOI of content to be verified When can be as a result undetermined, it is preferable that it includes disappearing for " there are security risks by the DOI of the content to be verified " that can provide user Breath, chooses whether to continue to execute the corresponding operation of operation information for including in the content to be verified by user, when user's selection is held When row, the corresponding operation of operation information for including in content to be verified described in client executing, when user selects refusal to execute, Client refusal executes the corresponding operation of operation information for including in the content to be verified.
It is to prestore content in the server and verify whether legal specific of the DOI by server authentication to retouch above State, when client has enough memory spaces and computing capability, can also prestore in the client content and by Whether the DOI is verified in client validation legal.
Step 103, the corresponding operation of operation information for including in the content to be verified is executed.
Specifically, by step 102, when it is legal to determine verification result, show the confidence level of the content to be verified The corresponding operation of operation information that is higher, then including in the client executing content to be verified.
Step 104, refusal executes the corresponding operation of operation information for including in the content to be verified.
Specifically, by step 102, when it is illegal to determine verification result, show the confidence level of the content to be verified Relatively low, then client refusal executes the corresponding operation of operation information for including in the content to be verified, to avoid to user Bring risk.
In step 101 to step 104, can the content to be verified that parsed from DOI be sent by user end to server, For server whether according to pre-stored content and the content to be verified of reception, it is legal to verify the DOI, then, server to Client returns to verification result, when the verification result that client receives is legal, in content to be verified described in client executing Including the corresponding operation of operation information, when client receive verification result be it is illegal when, client refusal execute described in wait for The corresponding operation of operation information for including in verification content.In addition it is also possible to be parsed from DOI by client acquisition to be tested Content is demonstrate,proved, then whether client verifies the DOI according to the content to be verified in its own pre-stored content and reception It is legal, when verification result is legal, the corresponding operation of operation information for including in content to be verified described in client executing, when When verification result is illegal, client refusal executes the corresponding operation of operation information for including in the content to be verified.
For example, it is assumed that when generating the Quick Response Code B for the chained address for carrying website C, it can be using the chained address as conjunction Method content stores in the server, and legal content is only stored in server.When user A is intended to be carried out accordingly according to Quick Response Code B Operation before, first pass through the chained address that cell-phone customer terminal is parsed from Quick Response Code B and be sent to server and verified.Service Device receives behind the chained address parsed in Quick Response Code B, verifies in pre-stored legal content and whether there is from two dimension The chained address parsed in code B, it is assumed that server determines that there are chain ground connection in pre-stored legal content by verification Location then returns to verification result " legal " to the client of user A.After the client of user A receives verification result " legal ", step on The corresponding website C in the land chained address.
By upper example it is found that client is behind the chained address carried in parsing Quick Response Code B, there is no directly log in the chain It is grounded the corresponding website C in location, but first the chained address parsed is verified, determines that verification result is visitor after " legal " Family end logs in the corresponding website C in the chained address according to verification result.Compared with prior art, according to the technical side of the application Case can avoid since client executing carries the Quick Response Code execution corresponding operating of illegal contents and brings risk to user A, thus Family A can be used more safely to use Quick Response Code B.
It is larger in view of the data volume of the full dose information of the operation information carried in DOI, therefore when server according to depositing in advance When the legal content of storage judges wherein to whether there is the operation information in content to be verified, longer query time is needed.In order to The inquiry is rapidly completed, other than carrying corresponding operation information in DOI, can also be taken in DOI when generating DOI It identifies with corresponding DOI, also, correspondingly, in the server other than storing the operation information, also stores in the server The DOI is identified.Wherein, DOI marks can be made of number, letter or any other character.In this way, working as client from DOI In parse the DOI marks carried in the DOI and the contents such as operation information after, which can be identified and operation information is as waiting for Verification DOI marks and operation information to be verified are sent to server.For operation information to be verified, due to be verified The data volume of DOI marks is smaller, therefore server can be identified more quickly according to DOI to be verified pre-stored legal interior It is inquired in appearance, to more quickly determine the verification result of DOI.Wherein, when the DOI in pre-stored legal content is marked There is no when DOI to be verified marks in knowledge, determine that the verification result for the DOI for carrying content to be verified is illegal.
In addition, when being identified there are DOI to be verified in the DOI marks in pre-stored legal content, it can not be direct Determine that the verification result for the DOI for carrying content to be verified is legal, as it is possible that there are the forgery of the signed by of illegal DOI is legal The case where DOI marks of DOI.Specifically, the DOI carried in DOI can be identified and is forged into server in advance by DOI signed bies DOI marks in the legal content of preservation, but the operation information carried in the DOI is corresponding with DOI marks in legal content Operation information is different, that is, what is carried is illegal operation information.In order to avoid user executes the corresponding operations of DOI in this case And risk is generated, when being identified there are DOI to be verified in the DOI marks in pre-stored legal content, it can be determined that exist Whether the operation information and operation information to be verified in the legal content of the DOI marks to be verified are identical, to behaviour to be verified Make information and carry out full dose comparison, if identical, it is determined that it is legal to carry the verification result of the DOI of content to be verified, if it is different, then Determine that the verification result for the DOI for carrying content to be verified is illegal.
In view of the foregoing, in Fig. 1, according to one embodiment of the application, step 101 may further include:It obtains Take the operation information to be verified parsed from DOI, DOI to be verified marks.Pre-stored legal content is judged in step 102 In whether there is the content to be verified, may further include, when in pre-stored legal content DOI mark in do not deposit In the DOI marks to be verified, determine that the verification result of the DOI is illegal, the DOI in pre-stored legal content There are when the DOI marks to be verified, judge that there are the operation informations in the legal content of the DOI marks to be verified in mark It is whether identical as the operation information to be verified, if identical, it is determined that the verification result of the DOI is legal, if it is different, then really The verification result of the fixed DOI is illegal.
For example, pre-stored legal content is as shown in table 1 in server:
DOI is identified Operation information
123 www.abcde.com
Table 1
Operation information to be verified, the DOI to be verified mark such as table 2 parsed in the slave DOI that server is received from client It is shown:
DOI marks to be verified Operation information to be verified
123 www.xyz.com
Table 2
Then, first, it is determined that the DOI in the pre-stored legal content of server is to be verified with the presence or absence of this in identifying DOI identifies " 123 ", judged, determines that there are the DOI to be verified to identify " 123 " in legal content.Then, then judge there is this Operation information " www.abcde.com " in the legal content of DOI marks " 123 " to be verified and the operation information to be verified Whether " www.xyz.com " be identical, is as a result determined as differing, it is determined that carries the verification result of the DOI of the content to be verified It is illegal, that is, the DOI marks in DOI as shown in Table 2 have been forged into the DOI in legal content as shown in Table 1 by signed by Mark.After the verification result is returned to client by server, client refusal logs in the corresponding website " www.xyz.com ", from And it avoids bringing risk to user due to logging in the website.
The foregoing describe servers to obtain after the operation information to be verified parsed in DOI and DOI to be verified marks, root The process that the verification result of the DOI is determined according to pre-stored legal content, when client has enough memory space and meter When calculation ability, client can also obtain the operation information to be verified parsed from DOI and DOI to be verified marks, and root The verification result of the DOI is determined according to pre-stored legal content.
In actual application scenarios, when wishing that certain user executes corresponding operation only in certain number according to DOI, It is limited to execute the number operated accordingly according to the DOI to the user, server, which can pre-save, allows the use The effective degree of the content to be verified carried in the DOI is verified at family, so that it is determined that whether the user can execute phase according to the DOI The operation answered.It, can be with specifically, client is to server other than sending the content to be verified that is parsed from DOI It obtains and sends user identifier to server.The user identifier can prestore in the client, can also be user It is manually entered client.In addition, the user identifier can be the user user name or the used client of the user it is mutual The equipment unique marks such as the address networking protocol address (Internet Protocol, IP).Server is in addition to according to pre-stored Other than legal content judges the content to be verified of reception, it can also continue to according to the user identifier received from client, In the effective degree pre-saved, the corresponding effective degree for allowing to verify the verification content of the user identifier is searched.When true When the fixed effective degree is more than zero, determines that the verification result of DOI is legal, conversely, when the effective degree is not more than zero, determine The verification result of DOI is illegal.Wherein, whenever the corresponding user of the user identifier by server authentication the content one to be verified Secondary, the user identifier is corresponding to allow the effective degree for verifying the content to be verified just to reduce once.
Further include before the verification result for determining the DOI is legal according to one embodiment of the application as a result,: User identifier is obtained, in the effective degree pre-saved, searches that the user identifier is corresponding to be allowed to verify the content to be verified Effective degree, judge whether the effective degree is more than zero, when more than zero, determine that the DOI for carrying the content to be verified is tested It is legal to demonstrate,prove result, when no more than zero, determines that the verification result for the DOI for carrying the content to be verified is illegal.
Server is according to the verification result of the corresponding true DOI of effective degree for allowing to verify content to be verified of user identifier Afterwards, verification result can be returned to client.
Allow to be added by scanning the two-dimensional code B for example, the group master of certain chat group is corresponding to the user identifier of all users This group of effective degrees are preset as 1.Wherein, after chat group is added by scanning the two-dimensional code B in user A, because often in chat group Middle publication carries the Quick Response Code of advertising information, and the group is kicked out of by group master.At this moment, B is scanned the two-dimensional code in first passage due to user A After the group is added, the user identifier is corresponding to be allowed to scan the two-dimensional code B and this group of effective degrees are added are reduced to 0.Assuming that user A User identifier is " 666 ", then when user A is intended to again by scanning the two-dimensional code B and being added this group, server receives user A's Client is sent after the user identifier " 666 " of the content to be verified and user A that are parsed in Quick Response Code B, can be protected in advance The corresponding effective degree for allowing to verify the content to be verified of the user identifier " 666 " is found in the effective degree deposited, when looking into When the effective degree found is 0, determine that the verification result for the DOI for carrying the content to be verified is illegal, and return to client Return the verification result.After the client of user A receives verification result " illegal ", the group can not be added by Quick Response Code B.
The foregoing describe servers determined according to the corresponding effective degree of user identifier DOI verification result process, when When client has enough memory spaces and computing capability, client can also be true according to the corresponding effective degree of user identifier Determine the verification result of DOI.
Further, in actual application scenarios, when only allow user regular hour range use certain DOI when, The effective time range for verifying the content to be verified carried in the DOI can be defined.Specifically, server can be preset Effective time range corresponding with content to be verified.Therefore, when there are client transmissions in pre-stored legal content Content to be verified, determine carry the content to be verified DOI verification result be it is legal before, can continue verification with it is to be verified The corresponding effective time range of content, so that it is determined that the verification result of DOI.Wherein, specifically, server can determine in advance first If the corresponding effective time range of the content to be verified, then determine whether current time exceeds the effective time range, when Beyond when, determine the verification result of DOI be it is illegal, it is on the contrary, it is determined that the verification result of DOI be it is legal.
For these reasons, according to one embodiment of the application, when there are to be verified in pre-stored legal content When content, before determining that the verification result for the DOI for carrying the content to be verified is legal, further include:Determine that preset this is to be tested The corresponding effective time range of content is demonstrate,proved, determines current time without departing from the effective time range, when beyond the effective time model When enclosing, determines that the verification result for the DOI for carrying the content to be verified is legal, when without departing from the effective time range, determine The verification result for carrying the DOI of the content to be verified is illegal.
For example, certain website A, for certain activity publication Quick Response Code B, user can step on according to the chained address carried in Quick Response Code B The corresponding webpage C of the land activity.Assuming that ranging from 2 months 2014 on March 1st, 1 day 1 movable effective time, and, The corresponding effective time range in the preset chained address is 2 months 2014 on March 1st, 1 day 1 in the server, then When user D is intended to according to Quick Response Code B logon web page C, server in the slave Quick Response Code B that is received from the client of user D to parsing The chained address gone out is verified, when determining in pre-stored legal content there are behind the chained address, further really Determine whether current time exceeds the corresponding effective time range in the preset chained address.Assuming that current time is May 1 in 2014 Day, exceed the corresponding effective time range in the preset chained address, then server determines the two dimension for carrying the chained address The verification result of code B is illegal, and the verification result is returned to the client of user D.The client receives verification knot After fruit " illegal ", refusal logs in the corresponding website C in the chained address.
It should be noted that determining the verification result of DOI according to the corresponding effective degree of user identifier and according to be verified The corresponding term of validity of content determines that the verification result of DOI, the two do not collide, and can select a use, also can be used simultaneously.
The foregoing describe servers determined according to the corresponding term of validity of content to be verified DOI verification result process, when When client has enough memory spaces and computing capability, client can also be true according to the corresponding term of validity of content to be verified Determine the verification result of DOI.
In the following, the verification method based on DOI shown in FIG. 1, in conjunction with the corresponding effective degree of user identifier and/or according to waiting for The corresponding term of validity of verification content determines the verification result of DOI, a kind of flow chart of the verification method of DOI is provided, such as Fig. 2 institutes Show.
Step 201, user end to server sends the content to be verified parsed from DOI.
Step 202, server receives the content to be verified that client is sent.
Step 203, judge to identify with the presence or absence of DOI to be verified in legal content.If so, 205 are thened follow the steps, otherwise, Execute step 204.
Step 204, it determines that the verification result for the DOI for carrying content to be verified is illegal, executes step 214.
Step 205, judge whether operation information in legal content and operation information to be verified are identical, if so, executing Step 207, otherwise, step 206 is executed.
Step 206, it determines that the verification result for the DOI for carrying content to be verified is illegal, executes step 214.
Step 207, the user identifier that client is sent is received.
Step 208, the corresponding effective degree for allowing to verify content to be verified of user identifier is determined.
Step 209, judge whether effective degree is more than zero, if so, thening follow the steps 211, otherwise, execute step 210.
Step 212, it determines that the verification result for the DOI for carrying content to be verified is illegal, executes step 214.
Step 211, according to current time, determine whether current time exceeds the corresponding effective time model of content to be verified It encloses, if so, thening follow the steps 212, otherwise, executes step 213.
Step 212, it determines that the verification result for the DOI for carrying content to be verified is illegal, executes step 213.
Step 213, determine that the verification result for the DOI for carrying content to be verified is legal.
Step 214, verification result is returned to client.
Step 215, client receives the verification result that server returns.
Step 216, judge whether the verification result is legal, if so, thening follow the steps 217, otherwise, execute step 218.
Step 217, the corresponding operation of the operation information for including in content to be verified is executed.
Step 218, refusal executes the corresponding operation of operation information for including in content to be verified.
Further, in actual application scenarios, exist for being identified there are the DOI to be verified in legal content Operation information in the legal content of DOI to be verified mark illegal DOI different from the operation information to be verified, in the application In, illegal DOI in this case can be known as falseness DOI.The number for the false DOI that server can be issued according to signed by Amount carries out the signed by grading of credit grade.
Specifically, when the signed by of DOI to be issued generates DOI, corresponding DOI signed bies can be stored in the server Information.It can include but is not limited to the Name or Designation of signed by the DOI signed by information.In addition, by statistics, can calculate Go out the quantity for the false DOI that a signed by is issued and the ratio of the quantity of all DOI that the signed by is signed and issued.According to this ratio Example, can comparative example be more than predetermined threshold value signed by mark credit grade label.It, can be to the label according to the credit grade label Permission etc. of signing and issuing of hair people limits.When client receives the verification result of server return, even if the verification result To be legal, the corresponding operation of the operation information carried in DOI can also not be executed temporarily, but can continue waiting for receiving service The credit grade label for the DOI signed bies that device is sent.It, will after client receives the credit grade label of the DOI signed bies The credit grade label display is to user, by user according to the credit grade label, voluntarily chooses whether to execute in the DOI and includes The corresponding operation of operation information, to further decrease since client executes corresponding behaviour according to the DOI for carrying illegal contents Make and brings risk to user.
For example, signed by A has signed and issued 10 Quick Response Codes altogether, wherein there is 5 Quick Response Codes to be determined as false two dimension by server Code, signed by B have signed and issued 20 Quick Response Codes altogether, wherein and there are 15 Quick Response Codes to be confirmed as false Quick Response Code, then, and signed by A label The ratio of the quantity of the false Quick Response Code of hair and the quantity of its all Quick Response Code signed and issued is 50%, the falseness that signed by B is signed and issued The ratio of the quantity of Quick Response Code and the quantity of its all Quick Response Code signed and issued is 75%.Assuming that predetermined threshold value is 30%, then to label It sends out people A and signed by B marks credit grade label.Specifically, it is assumed that when the ratio is 30%~50%, then to signed by mark The credit grade of note be " in ", when the ratio is 51%~100%, to signed by mark credit grade be " poor ".Then, originally In example, the credit grade to signed by A mark be " in ", the credit grade to signed by B marks is " poor ".When user C is intended to root When executing corresponding operating according to Quick Response Code D, it is assumed that Quick Response Code D's signs and issues artificial signed by A.By server authentication, the visitor of user C After family termination receives verification result " legal ", the credit grade for also receiving the signed by A of the Quick Response Code D of server transmission is " in ", and user C is prompted to choose whether that continue to execute Quick Response Code D operates accordingly.When user C is when being selected as " not executing ", Client refusal executes Quick Response Code D and operates accordingly.In this way, can further decrease since client is according to carrying illegal contents Quick Response Code execute corresponding operating and bring risk to user.
The quantity for the false DOI that the foregoing describe servers to issue according to signed by carries out credit grade to the signed by The process of grading, when client has enough memory spaces and computing capability, client can also be issued according to signed by False DOI quantity to the signed by carry out credit grade grading.
The above-mentioned verification method for DOI provided by the embodiments of the present application is based on same thinking, and present invention also provides one The verification device of the verification system and corresponding DOI of kind DOI, as shown in Figures 3 to 5.
Fig. 3 is the verification system structure diagram according to the DOI of the application one embodiment, is specifically included:
Server 301, the content to be verified that parses in the slave DOI for receiving the transmission of client 302, according to depositing in advance Whether the content of storage and the content to be verified, it is legal to verify the DOI, and verification result is returned to client 302;
Client 302 receives server 301 for sending the content to be verified parsed from DOI to server 301 The verification result of return executes the operation information pair for including in the content to be verified when the verification result of reception is legal The operation answered, when the verification result of reception is illegal, refusal executes the operation information for including in the content to be verified and corresponds to Operation.
According to one embodiment of the application, 301 pre-stored content of server includes:It is pre-stored legal interior Hold;The client 302 is further used for:To the server 301 send parsed from DOI operation information to be verified, DOI marks to be verified;The server 301 is further used for:It is parsed in the slave DOI that reception client 302 is sent to be tested Operation information, DOI to be verified marks are demonstrate,proved, is judged in the DOI marks in pre-stored legal content with the presence or absence of described to be tested DOI marks are demonstrate,proved, when there is no described in when the DOI to be verified mark, determining in the DOI marks in pre-stored legal content The verification result of DOI is illegal, when being identified there are the DOI to be verified in the DOI marks in pre-stored legal content, Whether the operation information and the operation information to be verified in the legal content that judgement is identified there are the DOI to be verified are identical, If identical, it is determined that the verification result of the DOI is legal, if it is different, determining that the verification result of the DOI is illegal.
According to one embodiment of the application, the client 302 is further used for:It sends and uses to the server 301 Family identifies;The server 301 is additionally operable to, and before determining that the verification result of the DOI is legal, is received client 302 and is sent User identifier, in the effective degree pre-saved, search the user identifier it is corresponding allow to verify it is described it is to be verified in The effective degree of appearance determines that the effective degree found is more than zero.
Fig. 4 is the block diagram according to the verification device of the DOI of the application one embodiment.
As shown in figure 4, the verification device of DOI a kind of, including:Acquisition module 401 is parsed for obtaining from DOI Content to be verified;Authentication module 402, for according to pre-stored content and the content to be verified, verifying the DOI to be It is no legal;Execution module 403, for when verification result is legal, executing the operation information for including in the content to be verified Corresponding operation, when verification result is illegal, refusal executes the corresponding behaviour of operation information for including in the content to be verified Make.
According to one embodiment of the application, pre-stored content includes:Pre-stored legal content;The verification Module 402 is further used for:It verifies and whether there is the content to be verified in pre-stored legal content;If so, determining institute The verification result for stating DOI is legal;Otherwise, it determines the verification result of the DOI is illegal.
According to one embodiment of the application, pre-stored content includes:Pre-stored illegal contents;The verification Module 402 is further used for:Judge to whether there is the content to be verified in pre-stored illegal contents;If so, determining institute The verification result for stating DOI is illegal;Otherwise, it determines the verification result of the DOI is legal.
According to one embodiment of the application, pre-stored content includes:Pre-stored legal content and it is illegal in Hold;The authentication module 402 is further used for:It verifies in pre-stored legal content and illegal contents and is waited for the presence or absence of described Verify content;When there are when the content to be verified, determine that the verification result of the DOI is to close in pre-stored legal content Method;When there are when the content to be verified, determine that the verification result of the DOI is illegal in pre-stored illegal contents;When When the content to be verified being not present in pre-stored legal content and illegal contents, the verification result of the DOI is determined It is undetermined;Described device is additionally operable to:When whether verification result is to wait for periodically, providing a user to execute and wrapping in the content to be verified The message of the corresponding operation of operation information contained executes the operation for including in the content to be verified when user selects to execute The corresponding operation of information, when user selects refusal to execute, refusal executes the operation information pair for including in the content to be verified The operation answered.
According to one embodiment of the application, the acquisition module 401 is further used for:What acquisition was parsed from DOI Operation information to be verified, DOI to be verified marks;The authentication module 402 is further used for:Judge pre-stored legal content In DOI marks in the presence or absence of the DOI to be verified mark, do not deposited when in the DOI marks in pre-stored legal content In the DOI marks to be verified, determine that the verification result of the DOI is illegal, the DOI in pre-stored legal content There are when the DOI marks to be verified, judge that there are the operation informations in the legal content of the DOI marks to be verified in mark It is whether identical as the operation information to be verified, if identical, it is determined that the verification result of the DOI is legal, when if it is different, then Determine that the verification result of the DOI is illegal.
According to one embodiment of the application, the authentication module 402 is additionally operable to:Determine that the verification result of the DOI is Before legal, receive the user identifier that the client is sent and search the user identifier in the effective degree pre-saved The corresponding effective degree for allowing to verify the content to be verified determines that the effective degree found is more than zero.
According to one embodiment of the application, the authentication module 402 is additionally operable to:Determine that the verification result of the DOI is Before legal, determine the corresponding effective time range of the preset content to be verified, determine that current time has without departing from all Imitate time range.
Fig. 5 is the block diagram according to the verification device of the DOI of the client of the application one embodiment.
As shown in figure 5, the verification device of DOI a kind of, including:Sending module 501, for being sent from DOI to server The content to be verified parsed;Receiving module 502, the verification result for receiving server return;Execution module 503, is used for When the verification result of reception is legal, the corresponding operation of operation information for including in the content to be verified is executed, reception is worked as Verification result when being illegal, refusal executes the corresponding operation of operation information for including in the content to be verified.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include computer-readable medium in impermanency include device, arbitrary access include device (RAM) and/or The forms such as Nonvolatile memory, such as read-only includes device (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology includes to realize information.Information can be computer-readable instruction, data structure, the module of program or other data. The example comprising medium of computer includes, but are not limited to phase transition internal memory (PRAM), static random-access includes device (SRAM), dynamic State arbitrary access include device (DRAM), other kinds of arbitrary access include device (RAM), it is read-only comprising device (ROM), electric erasable It is programmable it is read-only comprising device (EEPROM), fast flash memory bank or other memory techniques, CD-ROM it is read-only comprising device (CD-ROM), Digital versatile disc (DVD) or other optics include, magnetic tape cassette, and tape magnetic rigid disk includes or other magnetism include equipment Or any other non-transmission medium, it can be used for including that can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability Including so that process, method, commodity or equipment including a series of elements include not only those elements, but also wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described There is also other identical elements in the process of element, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.Moreover, the application can be used can use packet in the computer that one or more wherein includes computer usable program code Shape containing the computer program product implemented on medium (including but not limited to that disk includes device etc. comprising device, CD-ROM, optics) Formula.
Above is only an example of the present application, it is not intended to limit this application.For those skilled in the art For, the application can have various modifications and variations.It is all within spirit herein and principle made by any modification, equivalent Replace, improve etc., it should be included within the scope of claims hereof.

Claims (24)

1. a kind of verification method of Digital Object Unique Identifier DOI, which is characterized in that including:
Obtain the content to be verified parsed from DOI;The content to be verified includes DOI marks to be verified;
According to pre-stored content and the content to be verified, the verification DOI to be verified identifies whether corresponding DOI closes Method;
According to verification result, the content to be verified is handled.
2. according to the method described in claim 1, it is characterized in that, further including operation letter to be verified in the content to be verified Breath,
It is described that the content to be verified is handled according to verification result, including:
When verification result is legal, the corresponding behaviour of include in the content to be verified described operation information to be verified is executed Make;
When verification result is illegal, it is corresponding that refusal executes the operation information to be verified for including in the content to be verified Operation.
3. according to the method described in claim 2, it is characterized in that, pre-stored content includes:It is pre-stored legal interior Hold;
According to pre-stored content and the content to be verified, the verification DOI to be verified identifies whether corresponding DOI closes Method further comprises:
Judge to whether there is the content to be verified in pre-stored legal content;
If so, determining that the verification result of the DOI is legal;
Otherwise, it determines the verification result of the DOI is illegal.
4. according to the method described in claim 2, it is characterized in that, pre-stored content includes:It is pre-stored illegal interior Hold;
According to pre-stored content and the content to be verified, the verification DOI to be verified identifies whether corresponding DOI closes Method further comprises:
Judge to whether there is the content to be verified in pre-stored illegal contents;
If so, determining that the verification result of the DOI is illegal;
Otherwise, it determines the verification result of the DOI is legal.
5. according to the method described in claim 2, it is characterized in that, pre-stored content includes:It is pre-stored legal interior Appearance and illegal contents;
According to pre-stored content and the content to be verified, the verification DOI to be verified identifies whether corresponding DOI closes Method further comprises:
When there are when the content to be verified, determine that the verification result of the DOI is legal in pre-stored legal content;
When there are when the content to be verified, determine that the verification result of the DOI is illegal in pre-stored illegal contents;
When the content to be verified is not present in pre-stored legal content and illegal contents, testing for the DOI is determined It is undetermined to demonstrate,prove result;
The method further includes:
When verification result is to wait for periodically, it is corresponding providing a user the operation information for whether executing and including in the content to be verified The message of operation executes the corresponding operation of operation information for including in the content to be verified when user selects to execute, when with When family selection refusal executes, refusal executes the corresponding operation of operation information for including in the content to be verified.
6. according to the method described in claim 3, it is characterized in that, judging in pre-stored legal content with the presence or absence of described Content to be verified, further comprises:
When being identified there is no the DOI to be verified in the DOI marks in pre-stored legal content, determine the DOI's Verification result is illegal;
When, there are when the DOI marks to be verified, there are described to be tested for judgement in the DOI marks in pre-stored legal content Whether the operation information and the operation information to be verified in the legal content of card DOI marks are identical;
If identical, it is determined that the verification result of the DOI is legal;
If it is different, then determining that the verification result of the DOI is illegal.
7. according to the method described in claim 2, it is characterized in that, before determining that the verification result of the DOI is legal, also wrap It includes:
Obtain user identifier;
In the effective degree pre-saved, search that the user identifier is corresponding to be allowed to verify the effective of the content to be verified Number;
Determine that the effective degree found is more than zero.
8. according to the method described in claim 2, it is characterized in that, before determining that the verification result of the DOI is legal, also wrap It includes:
Determine the corresponding effective time range of the preset content to be verified;
Determine current time without departing from the effective time range.
9. a kind of verification method of Digital Object Unique Identifier DOI, which is characterized in that including:
The content to be verified parsed from DOI is sent to server;The content to be verified includes DOI marks to be verified;
Receive the verification result that server returns;
According to verification result, the content to be verified is handled.
10. according to the method described in claim 9, it is characterized in that, described according to verification result, to the content to be verified into Row processing, including:
When the verification result of reception is legal, executes the operation information to be verified for including in the content to be verified and correspond to Operation;
When the verification result of reception is illegal, refusal executes the operation information to be verified for including in the content to be verified Corresponding operation.
11. a kind of verification system of Digital Object Unique Identifier DOI, which is characterized in that including:
Server, the content to be verified that parses in the slave DOI for receiving client transmission, according to pre-stored content with And the content to be verified, whether legal, verification result is returned to client if verifying the DOI;It is wrapped in the content to be verified Include DOI marks to be verified;
Client receives the verification knot that server returns for sending the content to be verified parsed from DOI to server Fruit is handled the content to be verified according to verification result.
12. system according to claim 11, which is characterized in that further include operation letter to be verified in the content to be verified Breath, the client are additionally operable to when the verification result of reception is legal, are executed include in the content to be verified described and are waited for The corresponding operation of verification operation information, when the verification result of reception is illegal, refusal, which executes in the content to be verified, includes The corresponding operation of the operation information to be verified.
13. system according to claim 12, which is characterized in that the pre-stored content of server includes:It prestores Legal content;
The server is further used for:Operation information to be verified, the DOI to be verified marks that client is sent are received, is judged pre- With the presence or absence of the DOI marks to be verified in DOI marks in the legal content first stored, when in pre-stored legal content DOI marks there is no when the DOI to be verified mark, determine that the verification result of the DOI is illegal, when pre-stored conjunction There are when the DOI marks to be verified, judge that there are the legal contents of the DOI marks to be verified for DOI marks in method content In operation information and the operation information to be verified it is whether identical, if identical, it is determined that the verification result of the DOI be close Method, if it is different, then determining that the verification result of the DOI is illegal.
14. system according to claim 12, which is characterized in that the client is further used for:To the server Send user identifier;
The server is additionally operable to, and before determining that the verification result of the DOI is legal, receives the user that the client is sent Mark searches that the user identifier is corresponding to be allowed to verify having for the content to be verified in the effective degree pre-saved Number is imitated, determines that the effective degree found is more than zero.
15. a kind of verification device of Digital Object Unique Identifier DOI, which is characterized in that including:
Acquisition module, for obtaining the content to be verified parsed from DOI;The content to be verified includes DOI to be verified Mark;
Authentication module, for according to pre-stored content and the content to be verified, the verification DOI marks pair to be verified Whether the DOI answered is legal;
Execution module, for according to verification result, handling the content to be verified.
16. device according to claim 15, which is characterized in that further include operation letter to be verified in the content to be verified Breath, the execution module, for when verification result is legal, executing the behaviour to be verified for including in the content to be verified Make the corresponding operation of information, when verification result is illegal, include in the refusal execution content to be verified is described to be verified The corresponding operation of operation information.
17. device according to claim 16, which is characterized in that pre-stored content includes:It is pre-stored legal Content;
The authentication module is further used for:It verifies and whether there is the content to be verified in pre-stored legal content;If It is to determine that the verification result of the DOI is legal;Otherwise, it determines the verification result of the DOI is illegal.
18. device according to claim 16, which is characterized in that pre-stored content includes:It is pre-stored illegal Content;
The authentication module is further used for:Judge to whether there is the content to be verified in pre-stored illegal contents;If It is to determine that the verification result of the DOI is illegal;Otherwise, it determines the verification result of the DOI is legal.
19. device according to claim 16, which is characterized in that pre-stored content includes:It is pre-stored legal Content and illegal contents;
The authentication module is further used for:It verifies in pre-stored legal content and illegal contents with the presence or absence of described to be tested Demonstrate,prove content;When there are when the content to be verified, determine that the verification result of the DOI is to close in pre-stored legal content Method;When there are when the content to be verified, determine that the verification result of the DOI is illegal in pre-stored illegal contents;When When the content to be verified being not present in pre-stored legal content and illegal contents, the verification result of the DOI is determined It is undetermined;
Described device is additionally operable to:When verification result is to wait for timing, provides a user whether to execute in the content to be verified and include The message of the corresponding operation of operation information execute the operation letter for including in the content to be verified when user selects to execute Corresponding operation is ceased, when user selects refusal to execute, refusal executes the operation information for including in the content to be verified and corresponds to Operation.
20. device according to claim 17, which is characterized in that the authentication module is further used for:Judgement is deposited in advance With the presence or absence of the DOI marks to be verified in DOI marks in the legal content of storage, when in pre-stored legal content There is no when the DOI marks to be verified in DOI marks, determine that the verification result of the DOI is illegal, when pre-stored conjunction There are when the DOI marks to be verified, judge that there are the legal interior of the DOI marks to be verified in DOI marks in method content Whether the operation information and the operation information to be verified in appearance are identical, if identical, it is determined that the verification result of the DOI is to close Method, when if it is different, then determining that the verification result of the DOI is illegal.
21. device according to claim 16, which is characterized in that the authentication module is additionally operable to:Determine testing for the DOI Before card result is legal, user identifier is obtained, in the effective degree pre-saved, it is corresponding fair to search the user identifier Perhaps the effective degree of the content to be verified is verified, determines that the effective degree found is more than zero.
22. device according to claim 16, which is characterized in that the authentication module is additionally operable to:Determine testing for the DOI It demonstrate,proves before result is legal, determines the corresponding effective time range of the preset content to be verified, determine that current time does not surpass Go out all effective time ranges.
23. a kind of verification device of Digital Object Unique Identifier DOI, which is characterized in that including:
Sending module, for sending the content to be verified parsed from DOI to server;The content to be verified includes waiting for Verify DOI marks;
Receiving module, the verification result for receiving server return;
Execution module, for according to verification result, handling the content to be verified.
24. device according to claim 23, which is characterized in that the execution module, for when the verification result received When being legal, the corresponding operation of include in the content to be verified described operation information to be verified is executed, when the verification of reception When being as a result illegal, refusal executes the corresponding operation of include in the content to be verified described operation information to be verified.
CN201810291833.6A 2014-05-26 2014-05-26 DOI verification method, device and system Active CN108629216B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810291833.6A CN108629216B (en) 2014-05-26 2014-05-26 DOI verification method, device and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810291833.6A CN108629216B (en) 2014-05-26 2014-05-26 DOI verification method, device and system
CN201410225414.4A CN105260692B (en) 2014-05-26 2014-05-26 A kind of DOI verification method, device and system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201410225414.4A Division CN105260692B (en) 2014-05-26 2014-05-26 A kind of DOI verification method, device and system

Publications (2)

Publication Number Publication Date
CN108629216A true CN108629216A (en) 2018-10-09
CN108629216B CN108629216B (en) 2021-02-05

Family

ID=55100374

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810291833.6A Active CN108629216B (en) 2014-05-26 2014-05-26 DOI verification method, device and system
CN201410225414.4A Active CN105260692B (en) 2014-05-26 2014-05-26 A kind of DOI verification method, device and system

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201410225414.4A Active CN105260692B (en) 2014-05-26 2014-05-26 A kind of DOI verification method, device and system

Country Status (2)

Country Link
CN (2) CN108629216B (en)
HK (1) HK1215744A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022095B (en) * 2016-01-21 2019-06-28 李明 A kind of safety device, method of controlling security and identity card card-reading terminal
CN108282452A (en) * 2017-01-20 2018-07-13 广州市动景计算机科技有限公司 Data processing method, device, server and user terminal
CN108696338A (en) * 2018-04-11 2018-10-23 宇龙计算机通信科技(深圳)有限公司 A kind of 2 D code information sends and receives method, apparatus

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1784063A (en) * 2004-12-01 2006-06-07 华为技术有限公司 Movable terminal verifying method
CN101656711A (en) * 2008-08-22 2010-02-24 中国科学院计算机网络信息中心 System and method for verifying website information
CN102202051A (en) * 2011-04-07 2011-09-28 华南农业大学 Credible two-dimensional code system and application method thereof
CN102664987A (en) * 2012-03-23 2012-09-12 叶明� Mobile-phone two-dimensional-code based method for warning before using mobile-phone two-dimensional-code to scan and link website
CN102831373A (en) * 2012-07-25 2012-12-19 罗晨 Method for outputting data of multi concatenated code
CN102841997A (en) * 2012-07-10 2012-12-26 郭小卫 Method and device for achieving authentication on intelligent device by mobile terminal
CN103023638A (en) * 2011-09-22 2013-04-03 阿里巴巴集团控股有限公司 Identity verification method and device based on mobile terminal
CN103065244A (en) * 2011-10-18 2013-04-24 杨筑平 Two-dimensional barcode anti-counterfeiting, checking and service method
CN103226688A (en) * 2013-02-28 2013-07-31 中国地质大学(武汉) Authentication method for preventing two-dimension code from being tampered and faked
CN103810767A (en) * 2014-02-17 2014-05-21 百度在线网络技术(北京)有限公司 Off-line activity signing-in method and off-line activity signing-in system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102215228A (en) * 2011-05-31 2011-10-12 北京亿赞普网络技术有限公司 Web service unique user identification method based on carrier-class network platform
CN102571803B (en) * 2012-01-19 2016-04-27 北京远鉴科技有限公司 A kind of graphic based Quick Response Code protection account, prevent order from distorting and the method and system of phishing attack
CN103729770B (en) * 2013-12-26 2017-07-07 重庆文理学院 A kind of anti-fake traceability system and its method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1784063A (en) * 2004-12-01 2006-06-07 华为技术有限公司 Movable terminal verifying method
CN101656711A (en) * 2008-08-22 2010-02-24 中国科学院计算机网络信息中心 System and method for verifying website information
CN102202051A (en) * 2011-04-07 2011-09-28 华南农业大学 Credible two-dimensional code system and application method thereof
CN103023638A (en) * 2011-09-22 2013-04-03 阿里巴巴集团控股有限公司 Identity verification method and device based on mobile terminal
CN103065244A (en) * 2011-10-18 2013-04-24 杨筑平 Two-dimensional barcode anti-counterfeiting, checking and service method
CN102664987A (en) * 2012-03-23 2012-09-12 叶明� Mobile-phone two-dimensional-code based method for warning before using mobile-phone two-dimensional-code to scan and link website
CN102841997A (en) * 2012-07-10 2012-12-26 郭小卫 Method and device for achieving authentication on intelligent device by mobile terminal
CN102831373A (en) * 2012-07-25 2012-12-19 罗晨 Method for outputting data of multi concatenated code
CN103226688A (en) * 2013-02-28 2013-07-31 中国地质大学(武汉) Authentication method for preventing two-dimension code from being tampered and faked
CN103810767A (en) * 2014-02-17 2014-05-21 百度在线网络技术(北京)有限公司 Off-line activity signing-in method and off-line activity signing-in system

Also Published As

Publication number Publication date
CN105260692A (en) 2016-01-20
CN108629216B (en) 2021-02-05
HK1215744A1 (en) 2016-09-09
CN105260692B (en) 2018-04-03

Similar Documents

Publication Publication Date Title
CN101267299B (en) A method and system for securely display data on the webpage
CN103607385B (en) Method and apparatus for security detection based on browser
CN109274632B (en) Website identification method and device
CN107295116B (en) Domain name resolution method, device and system
CN105635126A (en) Malicious URL access protection method, client side, security server and system
CN103929411B (en) Information displaying method, terminal, safety server and system
CN104010064B (en) The method and device for searching number of networking
CN104579909B (en) Method and equipment for classifying user information and acquiring user grouping information
CN104166822A (en) Data protecting method and device
CN105631688A (en) Anti-fake and anti-commodity-fleeing query method and system based on public platform
CN109889469B (en) Short message verification method, device, storage medium, short message verification system and terminal
US9721259B2 (en) Rules-based selection of counterfeit detection techniques
CN104601712B (en) Resource supplying method and system
CN110765374B (en) Risk link identification method and device and computer equipment
CN103368957A (en) Method, system, client and server for processing webpage access behavior
CN106713242B (en) Data request processing method and processing device
CN107733883B (en) Method and device for detecting account numbers registered in batches
CN108259514A (en) Leak detection method, device, computer equipment and storage medium
CN107733581A (en) Based on the fast Internet assets feature detection method and device under the whole network environment
CN110245953B (en) Information verification method, information verification device and electronic equipment
CN106131078A (en) A kind of method and device processing service request
CN110581835B (en) Vulnerability detection method and device and terminal equipment
CN106776973A (en) Blacklist data generation method and device
CN108629216A (en) A kind of verification method of DOI, device and system
CN106657096B (en) WEB vulnerability detection method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant