CN108629216B - DOI verification method, device and system - Google Patents

DOI verification method, device and system Download PDF

Info

Publication number
CN108629216B
CN108629216B CN201810291833.6A CN201810291833A CN108629216B CN 108629216 B CN108629216 B CN 108629216B CN 201810291833 A CN201810291833 A CN 201810291833A CN 108629216 B CN108629216 B CN 108629216B
Authority
CN
China
Prior art keywords
content
verified
doi
legal
verification result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810291833.6A
Other languages
Chinese (zh)
Other versions
CN108629216A (en
Inventor
李立中
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201810291833.6A priority Critical patent/CN108629216B/en
Publication of CN108629216A publication Critical patent/CN108629216A/en
Application granted granted Critical
Publication of CN108629216B publication Critical patent/CN108629216B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to a method, a device and a system for verifying DOI. The method comprises the following steps: acquiring content to be verified analyzed from the DOI; verifying whether the DOI is legal or not according to pre-stored content and the content to be verified; when the verification result is legal, executing the operation corresponding to the operation information contained in the content to be verified; and when the verification result is illegal, refusing to execute the operation corresponding to the operation information contained in the content to be verified. According to the method and the device, when the client executes the corresponding operation according to the DOI, the risk brought to the user due to the fact that the client executes the corresponding operation according to the DOI carrying illegal contents can be avoided, and therefore the user can use the DOI more safely.

Description

DOI verification method, device and system
The application is a divisional application of Chinese patent application with application number 201410225414.4 and invented name 'DOI verification method, device and system' filed by Chinese patent office in 26.05.2014.
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, and a system for verifying a DOI.
Background
Digital Object Unique Identifier (DOI) is a tool for identifying Digital information, originally used earlier by foreign producers of Digital documents to uniquely identify their published electronic documents. Then, based on the identifier, a plurality of identifiers applied to different environments are formed, such as two-dimensional codes, bar codes and the like, which are all generally called digital object unique identifiers. The two-dimensional code is a bar code containing readable data, and can carry contents such as Chinese characters, letters, numbers and the like in the two-dimensional code by using a mode of representing binary data by using black and white geometric figures.
In the prior art, when a user executes a corresponding operation according to a two-dimensional code, the two-dimensional code may be scanned by a scanning device carried by the client, and the two-dimensional code may be analyzed, so as to obtain content carried in the two-dimensional code. Then, the client executes the operation corresponding to the operation information according to the operation information contained in the content.
However, despite the above solution, this solution has the following drawbacks: because the two-dimensional code issuer can carry any content when generating the two-dimensional code, that is, the two-dimensional code can carry not only legal content but also illegal content, and the user can not directly know whether the content in the two-dimensional code is legal content through naked eyes. Therefore, when the content in the two-dimensional code is illegal, the user carries out the operation corresponding to the operation information contained in the illegal content through the client, and then risks and even losses are brought to the user.
For example, a two-dimensional code issuer carries a website address of a certain phishing website in a two-dimensional code, and a user a can automatically log in the phishing website after scanning and analyzing the two-dimensional code by using a client under the unknown condition, so that a risk is brought to the user a.
Therefore, there is a need in the art for a DOI authentication scheme that can solve the problem of risk to a user due to a client performing a corresponding operation according to a DOI carrying illegal content.
Disclosure of Invention
The application mainly aims to provide a DOI verification technology to solve the problem that in the prior art, a client executes corresponding operation according to the DOI carrying illegal content to bring risks to a user.
According to a first aspect of the present application, there is provided a method for verifying a unique identifier DOI of a digital object, comprising: acquiring content to be verified analyzed from the DOI; verifying whether the DOI is legal or not according to pre-stored content and the content to be verified; when the verification result is legal, executing the operation corresponding to the operation information contained in the content to be verified; and when the verification result is illegal, refusing to execute the operation corresponding to the operation information contained in the content to be verified.
According to a second aspect of the present application, there is provided a method of verifying a unique identifier DOI of a digital object, comprising: sending the content to be verified analyzed from the DOI to a server; receiving a verification result returned by the server; when the received verification result is legal, executing the operation corresponding to the operation information contained in the content to be verified; and when the received verification result is illegal, refusing to execute the operation corresponding to the operation information contained in the content to be verified.
According to a third aspect of the present application, there is provided a system for verification of a unique identifier DOI of a digital object, comprising: the server is used for receiving the contents to be verified which are analyzed from the DOI and sent by the client, verifying whether the DOI is legal or not according to the prestored contents and the contents to be verified, and returning a verification result to the client; the client is used for sending the content to be verified analyzed from the DOI to the server, receiving a verification result returned by the server, executing the operation corresponding to the operation information contained in the content to be verified when the received verification result is legal, and refusing to execute the operation corresponding to the operation information contained in the content to be verified when the received verification result is illegal.
According to a fourth aspect of the present application, there is provided an apparatus for verifying a unique identifier DOI of a digital object, comprising: the acquisition module is used for acquiring the content to be verified analyzed from the DOI; the verification module is used for verifying whether the DOI is legal or not according to the prestored content and the content to be verified; and the execution module is used for executing the operation corresponding to the operation information contained in the content to be verified when the verification result is legal, and refusing to execute the operation corresponding to the operation information contained in the content to be verified when the verification result is illegal.
According to a fifth aspect of the present application, there is provided an apparatus for verifying a unique identifier DOI of a digital object, comprising: the sending module is used for sending the content to be verified analyzed from the DOI to the server; the receiving module is used for receiving the verification result returned by the server; and the execution module is used for executing the operation corresponding to the operation information contained in the content to be verified when the received verification result is legal, and refusing to execute the operation corresponding to the operation information contained in the content to be verified when the received verification result is illegal.
According to the technical scheme of the application, before corresponding operation is executed according to the DOI, whether the DOI is legal or not is verified according to the prestored content and the content to be verified analyzed from the DOI, when the verification result is legal, the operation corresponding to the operation information contained in the content to be verified is executed, and otherwise, the operation corresponding to the operation information contained in the content to be verified is refused to be executed. Compared with the prior art, according to the technical scheme, when corresponding operation is executed according to the DOI, the risk brought to the user due to the fact that the client executes the corresponding operation according to the DOI carrying illegal contents can be avoided, and therefore the user can use the DOI more safely.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
FIG. 1 is a flow diagram of a method of authentication of a DOI according to one embodiment of the present application;
FIG. 2 is a flow diagram of a more detailed method of authentication of a DOI according to one embodiment of the present application;
FIG. 3 is a schematic diagram of a DOI verification system according to one embodiment of the present application;
FIG. 4 is a block diagram of a DOI authentication device according to one embodiment of the present application; and
fig. 5 is a block diagram of an authentication device of a DOI of a client according to one embodiment of the present application.
Detailed Description
The method comprises the steps that before corresponding operation is executed according to the DOI, whether the DOI is legal or not is verified according to prestored contents and contents to be verified analyzed from the DOI, when the verification result is legal, operation corresponding to operation information contained in the contents to be verified is executed, and otherwise, the operation corresponding to the operation information contained in the contents to be verified is refused to be executed. Compared with the prior art, according to the technical scheme, when corresponding operation is executed according to the DOI, the risk brought to the user due to the fact that the client executes the corresponding operation according to the DOI carrying illegal contents can be avoided, and therefore the user can use the DOI more safely.
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a flow chart of a method of authentication of a DOI according to one embodiment of the present application.
Step 101, obtaining the content to be verified analyzed from the DOI.
Specifically, when a user wants to perform a corresponding operation according to the DOI, the DOI may be acquired and analyzed by an image acquisition device of the client, so as to obtain the content carried in the DOI. The client includes, but is not limited to, a mobile phone, a computer, and other terminal devices. In order to avoid the risk brought to the client by the fact that the client executes corresponding operation according to the DOI carrying the illegal content, after the client analyzes the content carried in the DOI, the client does not directly execute the operation corresponding to the operation information carried in the analyzed content, but firstly verifies the content carried in the DOI. In step 101, after obtaining the content analyzed from the DOI, the client may use the content as the content to be verified and verify the content by the client, or the client may also send the content to be verified to the server, and after receiving the content to be verified, the server verifies the content to be verified.
And 102, verifying whether the DOI is legal or not according to the prestored content and the content to be verified. When the verification result is legal, step 103 is executed, otherwise, step 104 is executed.
Specifically, when an issuer who is to issue a DOI is generating the DOI, the content carried in the DOI may be stored as legitimate content in the server. The legal content includes, but is not limited to: operational information contained in the DOI. Alternatively, some determined illegal contents may be stored in the server in advance, such as link addresses of some phishing websites and the like. In this way, after the server receives the content to be verified analyzed from the DOI sent by the client, whether the DOI is legal or not can be verified according to the content stored in advance and the content to be verified, and therefore whether the client executes the operation corresponding to the operation information contained in the content to be verified or not is determined.
According to one embodiment of the present application, the pre-stored content includes: pre-stored legal content; verifying whether the DOI is legal or not according to the pre-stored content and the content to be verified, and further comprising: judging whether the pre-stored legal content has the content to be verified or not; if so, determining that the DOI verification result is legal; otherwise, determining that the verification result of the DOI is illegal.
Specifically, only legal content may be pre-stored in the server, and the server verifies whether the content to be verified exists in the legal content, if so, it indicates that the reliability of the content to be verified is higher, and determines that the verification result of the DOI is legal, otherwise, it indicates that the reliability of the content to be verified is lower, and determines that the verification result of the DOI is illegal. Of course, in order to avoid that the content to be verified is legal content and is not stored in the legal content of the server, when the content to be verified does not exist in the legal content stored in the server in advance, the verification result of the DOI may be pending. When the verification result is to be determined, preferably, a message that the user includes "there is a potential safety hazard in the DOI of the content to be verified" may be provided, the user selects whether to continue to execute the operation corresponding to the operation information included in the content to be verified, when the user selects to execute, the client executes the operation corresponding to the operation information included in the content to be verified, and when the user selects to reject to execute, the client rejects to execute the operation corresponding to the operation information included in the content to be verified.
According to another embodiment of the present application, the pre-stored content includes: pre-stored illegal content; verifying whether the DOI is legal or not according to the pre-stored content and the content to be verified, and further comprising: verifying whether the content to be verified exists in prestored illegal contents or not; if so, determining that the DOI verification result is illegal; otherwise, the verification result of the DOI is legal. Of course, in order to avoid that the content to be verified is illegal and not stored in the illegal content of the server, the verification result of the DOI may be pending when the content to be verified does not exist in the illegal content stored in advance in the server. When the verification result is to be determined, preferably, a message that the user includes "there is a potential safety hazard in the DOI of the content to be verified" may be provided, the user selects whether to continue to execute the operation corresponding to the operation information included in the content to be verified, when the user selects to execute, the client executes the operation corresponding to the operation information included in the content to be verified, and when the user selects to reject to execute, the client rejects to execute the operation corresponding to the operation information included in the content to be verified.
Specifically, the server may only store the illegal content in advance, such as the link address of some phishing websites, and verify whether the illegal content has the content to be verified, if so, determine that the verification result of the DOI is illegal, otherwise, indicate that the reliability of the content to be verified is higher, and determine that the verification result of the DOI is legal.
According to another embodiment of the present application, the pre-stored content includes: pre-stored legal content and illegal content; verifying whether the DOI is legal or not according to the pre-stored content and the content to be verified, and further comprising: verifying whether the content to be verified exists in prestored legal content and illegal content; when the content to be verified exists in prestored legal content, determining that the verification result of the DOI is legal; when the content to be verified exists in prestored illegal content, determining that the verification result of the DOI is illegal; and when the content to be verified does not exist in the prestored legal content and the illegal content, determining the verification result of the DOI as pending.
Specifically, both legal content and illegal content may be stored in the server in advance, and the server may verify whether or not the content to be verified exists in the legal content and the illegal content. If the content to be verified exists in the legal content, determining that the verification result of the DOI is legal; if the contents to be verified exist in the illegal contents, determining that the verification result of the DOI is illegal; if the content to be verified does not exist in the legal content and the illegal content, in order to avoid the content to be verified being legal content and not being stored in the legal content of the server, and also to avoid the risk brought to the user due to the fact that the content to be verified is illegal content, the verification result of the DOI of the content to be verified can be undetermined. When the verification result of the DOI of the content to be verified is to be determined, preferably, a message that a user includes "there is a potential safety hazard in the DOI of the content to be verified" may be provided, the user selects whether to continue to execute an operation corresponding to the operation information included in the content to be verified, when the user selects to execute, the client executes an operation corresponding to the operation information included in the content to be verified, and when the user selects to reject to execute, the client rejects to execute an operation corresponding to the operation information included in the content to be verified.
The above is a specific description of pre-storing content in the server and verifying whether the DOI is legal by the server, and when the client has sufficient storage space and computing power, the content may also be pre-stored in the client and the DOI is verified whether the DOI is legal by the client.
Step 103, executing the operation corresponding to the operation information contained in the content to be verified.
Specifically, through step 102, when the verification result is determined to be legal, which indicates that the reliability of the content to be verified is higher, the client executes the operation corresponding to the operation information included in the content to be verified.
And 104, refusing to execute the operation corresponding to the operation information contained in the content to be verified.
Specifically, through step 102, when the verification result is determined to be illegal, which indicates that the reliability of the content to be verified is low, the client rejects to execute the operation corresponding to the operation information included in the content to be verified, so as to avoid bringing risks to the user.
In steps 101 to 104, the client may send the content to be verified analyzed from the DOI to the server, the server verifies whether the DOI is legal or not according to the pre-stored content and the received content to be verified, then, the server returns a verification result to the client, when the verification result received by the client is legal, the client executes an operation corresponding to the operation information included in the content to be verified, and when the verification result received by the client is illegal, the client rejects to execute the operation corresponding to the operation information included in the content to be verified. In addition, the client can also obtain the content to be verified analyzed from the DOI, then the client verifies whether the DOI is legal or not according to the content pre-stored in the client and the received content to be verified, when the verification result is legal, the client executes the operation corresponding to the operation information contained in the content to be verified, and when the verification result is illegal, the client refuses to execute the operation corresponding to the operation information contained in the content to be verified.
For example, it is assumed that when the two-dimensional code B carrying the link address of the website C is generated, the link address may be stored as legal content in the server, and only the legal content is stored in the server. Before a user A wants to perform corresponding operation according to the two-dimensional code B, a link address analyzed from the two-dimensional code B through a mobile phone client is sent to a server for verification. And after receiving the link address analyzed from the two-dimensional code B, the server verifies whether the link address analyzed from the two-dimensional code B exists in the prestored legal content, and if the link address exists in the prestored legal content after verification, the server returns a verification result 'legal' to the client of the user A. And after the client of the user A receives the verification result of 'legal', logging in the website C corresponding to the link address.
As can be seen from the above example, after the link address carried in the two-dimensional code B is analyzed, the client does not directly log in the website C corresponding to the link address, but first verifies the analyzed link address, and after the verification result is determined to be "legal", the client logs in the website C corresponding to the link address according to the verification result. Compared with the prior art, according to the technical scheme, the risk brought to the user A due to the fact that the client executes the corresponding operation of the two-dimension code carrying the illegal content can be avoided, and therefore the user A can use the two-dimension code B more safely.
In view of the fact that the data size of the total information of the operation information carried in the DOI is large, when the server judges whether the operation information in the content to be verified exists according to the prestored legal content, a long query time is required. In order to complete the query quickly, when the DOI is generated, in addition to carrying the corresponding operation information in the DOI, a corresponding DOI identifier may be carried in the DOI, and accordingly, in addition to storing the operation information, the DOI identifier may be stored in the server. Wherein, the DOI mark can be composed of numbers, letters or other arbitrary characters. Therefore, after the client analyzes the contents such as the DOI identification and the operation information carried in the DOI from the DOI, the DOI identification and the operation information can be used as the DOI identification to be verified and the operation information to be verified to be sent to the server. Compared with the operation information to be verified, the data volume of the DOI identifier to be verified is small, so that the server can quickly inquire in the prestored legal content according to the DOI identifier to be verified, and the verification result of the DOI can be quickly determined. When the DOI mark to be verified does not exist in the prestored DOI marks in the legal content, the verification result of the DOI carrying the content to be verified is determined to be illegal.
In addition, when the DOI identifier to be verified exists in the DOI identifiers in the prestored legal content, the verification result of the DOI carrying the content to be verified cannot be directly determined to be legal, because there is a possibility that the issuer of the illegal DOI forges the DOI identifier of the legal DOI. Specifically, the DOI issuer may forge the DOI identifier carried in the DOI to the DOI identifier in the legal content pre-stored in the server, but the operation information carried in the DOI is different from the operation information corresponding to the DOI identifier in the legal content, that is, the operation information is illegal operation information. In order to avoid the risk caused by the fact that a user executes the operation corresponding to the DOI under the condition, when the DOI to be verified exists in the DOI identifier in the prestored legal content, whether the operation information in the legal content with the DOI to be verified is the same as the operation information to be verified or not can be judged, so that the operation information to be verified is compared in a full amount mode, if the operation information is the same, the verification result of the DOI carrying the content to be verified is determined to be legal, and if the operation information is different, the verification result of the DOI carrying the content to be verified is determined to be illegal.
In view of the above, in fig. 1, according to an embodiment of the present application, step 101 may further include: and acquiring operation information to be verified and a DOI identifier to be verified which are analyzed from the DOI. In step 102, it is determined whether the content to be verified exists in the prestored legal content, which may further include determining that the verification result of the DOI is illegal when the DOI identifier in the prestored legal content does not exist, determining whether the operation information in the legal content where the DOI identifier exists is the same as the operation information to be verified when the DOI identifier in the prestored legal content exists, if so, determining that the verification result of the DOI is legal, and if not, determining that the verification result of the DOI is illegal.
For example, the legal contents pre-stored in the server are shown in table 1:
DOI identification Operation information
123 www.abcde.com
TABLE 1
The operation information to be verified and the DOI identifier to be verified, which are analyzed from the DOI and received by the server from the client, are shown in table 2:
to-be-verified DOI identifier Operation information to be verified
123 www.xyz.com
TABLE 2
Then, firstly, it is determined whether the DOI identifier "123" to be verified exists in the DOI identifiers in the legal content stored in advance by the server, and it is determined that the DOI identifier "123" to be verified exists in the legal content through the determination. Then, it is determined whether the operation information "www.abcde.com" in the legal content having the to-be-verified DOI identifier "123" is the same as the to-be-verified operation information "www.xyz.com", and if the result is determined to be different, it is determined that the verification result of the DOI carrying the to-be-verified content is illegal, that is, the issuer makes the DOI identifier in the DOI shown in table 2 false, which results in the DOI identifier in the legal content shown in table 1. After the server returns the verification result to the client, the client refuses to log in the website corresponding to the 'www.xyz.com', so that the risk brought to the user by logging in the website is avoided.
The above describes the process of determining the verification result of the DOI according to the prestored legal content after the server obtains the operation information to be verified and the DOI identifier to be verified, which are analyzed from the DOI, and when the client has sufficient storage space and computing capacity, the client can also obtain the operation information to be verified and the DOI identifier to be verified, which are analyzed from the DOI, and determine the verification result of the DOI according to the prestored legal content.
In an actual application scenario, when a user is expected to perform a corresponding operation according to a DOI only within a certain number of times, in order to limit the number of times that the user performs the corresponding operation according to the DOI, the server may pre-store an effective number of times that the user is allowed to verify content to be verified carried in the DOI, thereby determining whether the user can perform the corresponding operation according to the DOI. Specifically, the client may obtain and send the user identifier to the server, in addition to sending the content to be verified that is parsed from the DOI to the server. The user identification may be pre-stored in the client, or may be manually input into the client by the user. In addition, the user identifier may be a device unique identifier such as a user name of the user or an Internet Protocol (IP) address of a client used by the user. The server can not only judge the received content to be verified according to the prestored legal content, but also continuously search the valid times which are allowed to verify the verification content and correspond to the user identification in the valid times which are prestored according to the user identification received from the client. And when the effective times are determined to be larger than zero, determining that the verification result of the DOI is legal, otherwise, determining that the verification result of the DOI is illegal when the effective times are not larger than zero. And when the user corresponding to the user identification verifies the content to be verified once through the server, the valid times of the content to be verified allowed to be verified corresponding to the user identification is reduced once.
Therefore, according to an embodiment of the present application, before determining that the verification result of the DOI is legal, the method further includes: the method comprises the steps of obtaining a user identification, searching the valid times corresponding to the user identification and allowing to verify the content to be verified in the valid times stored in advance, judging whether the valid times are larger than zero, determining that the verification result of the DOI carrying the content to be verified is legal when the valid times are larger than zero, and determining that the verification result of the DOI carrying the content to be verified is illegal when the valid times are not larger than zero.
And after the server confirms the verification result of the DOI according to the valid times of the contents to be verified, which are allowed to be verified and correspond to the user identification, the server can return the verification result to the client.
For example, the effective number of times that the group owner of a certain chat group allows the group to be joined by scanning the two-dimensional code B corresponding to the user identifiers of all users is preset to 1. After the user A joins the chat group by scanning the two-dimensional code B, the user A is kicked out of the chat group by a group owner because the user A frequently publishes the two-dimensional code carrying the advertisement information in the chat group. At this time, after the user a joins the group by scanning the two-dimensional code B for the first time, the effective number of times that the user identifier corresponds to the scanning-allowed two-dimensional code B to join the group is reduced to 0. Assuming that the user identifier of the user a is "666", when the user a wants to join the group by scanning the two-dimensional code B again, after receiving the content to be verified and the user identifier "666" of the user a, which are analyzed from the two-dimensional code B, sent by the client of the user a, the server may find the valid times corresponding to the user identifier "666" that allow the content to be verified among the valid times stored in advance, when the found valid times are 0, determine that the verification result of the DOI carrying the content to be verified is illegal, and return the verification result to the client. And after the client of the user A receives the verification result 'illegal', the client can not join the group through the two-dimensional code B.
The above describes the process in which the server determines the validation result of the DOI according to the valid times corresponding to the user identifier, and when the client has sufficient storage space and computing power, the client may also determine the validation result of the DOI according to the valid times corresponding to the user identifier.
Further, in an actual application scenario, when only a user is allowed to use a certain DOI in a certain time range, a valid time range for verifying the to-be-verified content carried in the DOI may be defined. Specifically, the server may preset a valid time range corresponding to the content to be verified. Therefore, when the content to be verified sent by the client exists in the prestored legal content, and before the verification result of the DOI carrying the content to be verified is determined to be legal, the valid time range corresponding to the content to be verified can be continuously verified, so that the verification result of the DOI is determined. Specifically, the server may first determine a preset valid time range corresponding to the content to be verified, then determine whether the current time exceeds the valid time range, and when the current time exceeds the valid time range, determine that the verification result of the DOI is illegal, otherwise, determine that the verification result of the DOI is legal.
In view of the foregoing, according to an embodiment of the present application, when there is content to be verified in prestored legal content, before determining that a verification result of a DOI carrying the content to be verified is legal, the method further includes: determining a preset valid time range corresponding to the content to be verified, determining that the current time does not exceed the valid time range, determining that the verification result of the DOI carrying the content to be verified is legal when the valid time range is exceeded, and determining that the verification result of the DOI carrying the content to be verified is illegal when the valid time range is not exceeded.
For example, a website a issues a two-dimensional code B for an activity, and a user can log in a webpage C corresponding to the activity according to a link address carried in the two-dimensional code B. Assuming that the valid time range of the activity is from 2014 to 2/1/3/1/2014, and the valid time range corresponding to the link address preset in the server is from 2014 to 2/1/3/1/2014, when the user D wants to log in the web page C according to the two-dimensional code B, the server verifies the link address analyzed from the two-dimensional code B received from the client of the user D, and when the link address exists in the prestored legal content, further determines whether the current time exceeds the preset valid time range corresponding to the link address. Assuming that the current time is 5/1/2014 and exceeds a preset valid time range corresponding to the link address, the server determines that the verification result of the two-dimensional code B carrying the link address is illegal, and returns the verification result to the client of the user D. And after receiving the verification result of 'illegal', the client refuses to log in the website C corresponding to the link address.
It should be noted that, the validation result of the DOI is determined according to the valid times corresponding to the user identifier and the validation result of the DOI is determined according to the valid period corresponding to the content to be validated, which are not in conflict, and may be used either simultaneously or selectively.
The above describes the process of determining the validation result of the DOI by the server according to the validity period corresponding to the content to be validated, and when the client has sufficient storage space and computing power, the client may also determine the validation result of the DOI according to the validity period corresponding to the content to be validated.
Next, based on the DOI verification method shown in fig. 1, a flowchart of the DOI verification method is provided in combination with the valid times corresponding to the user identifier and/or the DOI verification result determined according to the valid period corresponding to the content to be verified, as shown in fig. 2.
In step 201, the client sends the content to be verified analyzed from the DOI to the server.
In step 202, the server receives the content to be verified sent by the client.
Step 203, judging whether the DOI identification to be verified exists in the legal content. If so, go to step 205, otherwise, go to step 204.
Step 204, determining that the verification result of the DOI carrying the content to be verified is illegal, and executing step 214.
Step 205, determining whether the operation information in the legal content is the same as the operation information to be verified, if yes, executing step 207, otherwise, executing step 206.
In step 206, the verification result of the DOI carrying the content to be verified is determined to be illegal, and step 214 is executed.
Step 207, receiving the user identifier sent by the client.
And step 208, determining the valid times of the content to be verified allowed to be verified corresponding to the user identification.
In step 209, it is determined whether the valid number is greater than zero, if yes, step 211 is executed, otherwise, step 210 is executed.
In step 212, the verification result of the DOI carrying the content to be verified is determined to be illegal, and step 214 is executed.
Step 211, determining whether the current time exceeds the valid time range corresponding to the content to be verified according to the current time, if so, executing step 212, otherwise, executing step 213.
In step 212, the verification result of the DOI carrying the content to be verified is determined to be illegal, and step 213 is executed.
Step 213, determining that the verification result of the DOI carrying the content to be verified is legal.
Step 214, returning the verification result to the client.
In step 215, the client receives the verification result returned by the server.
In step 216, it is determined whether the verification result is legal, if so, step 217 is performed, otherwise, step 218 is performed.
Step 217, executing the operation corresponding to the operation information contained in the content to be verified.
In step 218, the operation corresponding to the operation information included in the content to be verified is rejected.
Further, in an actual application scenario, for an illegal DOI that has the to-be-verified DOI identifier in the legal content, but has the operation information in the legal content of the to-be-verified DOI identifier different from the to-be-verified operation information, in the present application, the illegal DOI in such a case may be referred to as a false DOI. The server may rate the credit rating of the issuer based on the number of false DOIs issued by the issuer.
Specifically, when an issuer that is to issue a DOI generates the DOI, the corresponding DOI issuer information may be stored in the server. The DOI issuer information may include, but is not limited to, the name or name of the issuer. In addition, through statistics, the proportion of the number of false DOIs issued by an issuer to the number of all DOIs issued by the issuer can be calculated. According to the proportion, the issuers with the proportion larger than the preset threshold value can be marked with credit rating labels. The issuing authority of the issuer can be restricted by the credit level label. When the client receives the verification result returned by the server, even if the verification result is legal, the client can not execute the operation corresponding to the operation information carried in the DOI temporarily, but can continue to wait for receiving the credit level label of the DOI issuer sent by the server. After receiving the credit rating label of the DOI issuer, the client displays the credit rating label to the user, and the user automatically selects whether to execute the operation corresponding to the operation information contained in the DOI according to the credit rating label, so that the risk brought to the user by the fact that the client executes the corresponding operation according to the DOI carrying illegal contents is further reduced.
For example, the issuer a issues 10 two-dimensional codes in total, wherein 5 two-dimensional codes are determined as false two-dimensional codes by the server, and the issuer B issues 20 two-dimensional codes in total, wherein 15 two-dimensional codes are determined as false two-dimensional codes, then the ratio of the number of false two-dimensional codes issued by the issuer a to the number of all two-dimensional codes issued by the issuer a is 50%, and the ratio of the number of false two-dimensional codes issued by the issuer B to the number of all two-dimensional codes issued by the issuer B is 75%. Assuming that the preset threshold is 30%, the issuer a and the issuer B are labeled with credit rating labels. Specifically, it is assumed that the credit rating given to the issuer is "medium" when the ratio is 30% to 50%, and the credit rating given to the issuer is "poor" when the ratio is 51% to 100%. In this example, the credit rating given to the issuer a is "medium" and the credit rating given to the issuer B is "poor". When the user C wants to execute corresponding operations according to the two-dimensional code D, the issuer of the two-dimensional code D is assumed to be the issuer A. After the server verifies that the client of the user C receives the verification result that the verification result is legal, the client also receives that the credit rating of the issuer A of the two-dimensional code D sent by the server is 'middle', and prompts the user C to select whether to continue to execute the corresponding operation of the two-dimensional code D. And when the selection of the user C is 'not executed', the client refuses to execute the corresponding operation of the two-dimensional code D. Therefore, the risk brought to the user by the fact that the client executes corresponding operation according to the two-dimension code carrying illegal content can be further reduced.
The above describes the process of the server rating the credit level of the issuer according to the number of false DOIs issued by the issuer, and when the client has sufficient storage space and computing power, the client can also rate the credit level of the issuer according to the number of false DOIs issued by the issuer.
Based on the same idea, the DOI verification method provided by the embodiment of the present application further provides a DOI verification system and a corresponding DOI verification device, as shown in fig. 3 to 5.
Fig. 3 is a schematic structural diagram of a DOI verification system according to an embodiment of the present application, which specifically includes:
the server 301 is configured to receive a to-be-verified content analyzed from the DOI sent by the client 302, verify whether the DOI is legal according to a pre-stored content and the to-be-verified content, and return a verification result to the client 302;
the client 302 is configured to send the content to be verified analyzed from the DOI to the server 301, receive a verification result returned by the server 301, execute an operation corresponding to the operation information included in the content to be verified when the received verification result is legal, and refuse to execute the operation corresponding to the operation information included in the content to be verified when the received verification result is illegal.
According to an embodiment of the present application, the content pre-stored by the server 301 includes: pre-stored legal content; the client 302 is further configured to: sending operation information to be verified and a DOI identifier to be verified, which are analyzed from the DOI, to the server 301; the server 301 is further configured to: receiving operation information to be verified and a DOI identifier to be verified which are analyzed from the DOI and sent by a client 302, judging whether the DOI identifier to be verified exists in the DOI identifiers in the prestored legal content, when the DOI identifier to be verified does not exist in the DOI identifiers in the prestored legal content, determining that the verification result of the DOI is illegal, when the DOI identifier to be verified exists in the DOI identifiers in the prestored legal content, judging whether the operation information in the legal content of the DOI identifier to be verified is the same as the operation information to be verified, if so, determining that the verification result of the DOI is legal, and if not, determining that the verification result of the DOI is illegal.
According to an embodiment of the present application, the client 302 is further configured to: sending a user identification to the server 301; the server 301 is further configured to receive a user identifier sent by the client 302 before determining that the DOI verification result is legal, search, in the pre-stored valid times, valid times corresponding to the user identifier and allowing verification of the content to be verified, and determine that the found valid times are greater than zero.
Fig. 4 is a block diagram of a device for verifying DOI according to one embodiment of the present application.
As shown in fig. 4, a DOI authentication apparatus includes: an obtaining module 401, configured to obtain content to be verified that is analyzed from a DOI; a verification module 402, configured to verify whether the DOI is legal according to pre-stored content and the content to be verified; the executing module 403 is configured to execute an operation corresponding to the operation information included in the content to be verified when the verification result is legal, and refuse to execute the operation corresponding to the operation information included in the content to be verified when the verification result is illegal.
According to one embodiment of the present application, the pre-stored content includes: pre-stored legal content; the verification module 402 is further configured to: verifying whether the content to be verified exists in prestored legal content or not; if so, determining that the DOI verification result is legal; otherwise, determining that the verification result of the DOI is illegal.
According to one embodiment of the present application, the pre-stored content includes: pre-stored illegal content; the verification module 402 is further configured to: judging whether the content to be verified exists in prestored illegal contents or not; if so, determining that the DOI verification result is illegal; otherwise, determining that the verification result of the DOI is legal.
According to one embodiment of the present application, the pre-stored content includes: pre-stored legal content and illegal content; the verification module 402 is further configured to: verifying whether the content to be verified exists in prestored legal content and illegal content; when the content to be verified exists in prestored legal content, determining that the verification result of the DOI is legal; when the content to be verified exists in prestored illegal content, determining that the verification result of the DOI is illegal; when the content to be verified does not exist in the prestored legal content and the illegal content, determining the verification result of the DOI as pending; the apparatus is further configured to: when the verification result is to be determined, providing a message for the user whether to execute the operation corresponding to the operation information contained in the content to be verified, when the user selects to execute, executing the operation corresponding to the operation information contained in the content to be verified, and when the user selects to reject to execute, rejecting to execute the operation corresponding to the operation information contained in the content to be verified.
According to an embodiment of the application, the obtaining module 401 is further configured to: acquiring operation information to be verified and a DOI identifier to be verified which are analyzed from the DOI; the verification module 402 is further configured to: judging whether the DOI identifier to be verified exists in the DOI identifiers in the prestored legal content, when the DOI identifier to be verified does not exist in the DOI identifiers in the prestored legal content, determining that the verification result of the DOI is illegal, when the DOI identifier to be verified exists in the DOI identifiers in the prestored legal content, judging whether the operation information in the legal content of the DOI identifier to be verified is the same as the operation information to be verified, if so, determining that the verification result of the DOI is legal, and if not, determining that the verification result of the DOI is illegal.
According to an embodiment of the application, the verification module 402 is further configured to: and before the verification result of the DOI is determined to be legal, receiving the user identification sent by the client, searching the valid times which are allowed to verify the content to be verified and correspond to the user identification in the prestored valid times, and determining that the searched valid times are greater than zero.
According to an embodiment of the application, the verification module 402 is further configured to: and before the verification result of the DOI is determined to be legal, determining a preset valid time range corresponding to the content to be verified, and determining that the current time does not exceed all valid time ranges.
Fig. 5 is a block diagram of an authentication device of a DOI of a client according to one embodiment of the present application.
As shown in fig. 5, a DOI authentication apparatus includes: a sending module 501, configured to send content to be verified, which is analyzed from the DOI, to a server; a receiving module 502, configured to receive a verification result returned by the server; the executing module 503 is configured to execute an operation corresponding to the operation information included in the content to be verified when the received verification result is legal, and refuse to execute the operation corresponding to the operation information included in the content to be verified when the received verification result is illegal.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory, Random Access Memory (RAM), and/or non-volatile memory in a computer-readable medium, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information containment by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer-containing media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical containing, magnetic cassette tape, magnetic disk containing or other magnetic containing devices, or any other non-transmission medium that can be used to contain information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable containing media (including, but not limited to, disk containers, CD-ROMs, optical containers, and the like) having computer-usable program code embodied therein.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (24)

1. A method for verifying a unique identifier DOI of a digital object, comprising:
acquiring content to be verified analyzed from the DOI; the content to be verified comprises a DOI identifier to be verified;
verifying whether the DOI corresponding to the DOI identification to be verified is legal or not according to the prestored content and the content to be verified;
and processing the content to be verified according to a verification result.
2. The method according to claim 1, wherein the content to be verified further includes operation information to be verified,
the processing the content to be verified according to the verification result comprises the following steps:
when the verification result is legal, executing the operation corresponding to the operation information to be verified contained in the content to be verified;
and when the verification result is illegal, refusing to execute the operation corresponding to the operation information to be verified contained in the content to be verified.
3. The method of claim 2, wherein the pre-stored content comprises: pre-stored legal content;
according to the pre-stored content and the content to be verified, verifying whether the DOI corresponding to the DOI identifier to be verified is legal, further comprising:
judging whether the pre-stored legal content has the content to be verified or not;
if so, determining that the DOI verification result is legal;
otherwise, determining that the verification result of the DOI is illegal.
4. The method of claim 2, wherein the pre-stored content comprises: pre-stored illegal content;
according to the pre-stored content and the content to be verified, verifying whether the DOI corresponding to the DOI identifier to be verified is legal, further comprising:
judging whether the content to be verified exists in prestored illegal contents or not;
if so, determining that the DOI verification result is illegal;
otherwise, determining that the verification result of the DOI is legal.
5. The method of claim 2, wherein the pre-stored content comprises: pre-stored legal content and illegal content;
according to the pre-stored content and the content to be verified, verifying whether the DOI corresponding to the DOI identifier to be verified is legal, further comprising:
when the content to be verified exists in prestored legal content, determining that the verification result of the DOI is legal;
when the content to be verified exists in prestored illegal content, determining that the verification result of the DOI is illegal;
when the content to be verified does not exist in the prestored legal content and the illegal content, determining the verification result of the DOI as pending;
the method further comprises the following steps:
when the verification result is to be determined, providing a message for the user whether to execute the operation corresponding to the operation information contained in the content to be verified, when the user selects to execute, executing the operation corresponding to the operation information contained in the content to be verified, and when the user selects to reject to execute, rejecting to execute the operation corresponding to the operation information contained in the content to be verified.
6. The method of claim 3, wherein determining whether the content to be verified exists in pre-stored legal content further comprises:
when the DOI mark to be verified does not exist in the prestored DOI marks in the legal content, determining that the verification result of the DOI is illegal;
when the DOI identifier to be verified exists in the prestored DOI identifiers in the legal content, judging whether the operation information in the legal content with the DOI identifier to be verified is the same as the operation information to be verified;
if the DOI is the same as the DOI, determining that the verification result of the DOI is legal;
and if the DOI is different from the DOI, determining that the verification result of the DOI is illegal.
7. The method of claim 2, wherein prior to determining that the validation result of the DOI is legitimate, further comprising:
acquiring a user identifier;
searching the valid times which are allowed to verify the content to be verified and correspond to the user identification in the pre-stored valid times;
and determining that the found effective times are more than zero.
8. The method of claim 2, wherein prior to determining that the validation result of the DOI is legitimate, further comprising:
determining a preset valid time range corresponding to the content to be verified;
and determining that the current time does not exceed the valid time range.
9. A method for verifying a unique identifier DOI of a digital object, comprising:
sending the content to be verified analyzed from the DOI to a server; the content to be verified comprises a DOI identifier to be verified;
receiving a verification result returned by the server;
and processing the content to be verified according to a verification result.
10. The method according to claim 9, wherein the processing the content to be verified according to the verification result comprises:
when the received verification result is legal, executing the operation corresponding to the operation information to be verified contained in the content to be verified;
and when the received verification result is illegal, refusing to execute the operation corresponding to the operation information to be verified contained in the content to be verified.
11. A system for verifying a unique identifier, DOI, of a digital object, comprising:
the server is used for receiving the contents to be verified which are analyzed from the DOI and sent by the client, verifying whether the DOI is legal or not according to the prestored contents and the contents to be verified, and returning a verification result to the client; the content to be verified comprises a DOI identifier to be verified;
and the client is used for sending the contents to be verified analyzed from the DOI to the server, receiving a verification result returned by the server and processing the contents to be verified according to the verification result.
12. The system according to claim 11, wherein the content to be verified further includes operation information to be verified, and the client is further configured to execute an operation corresponding to the operation information to be verified included in the content to be verified when the received verification result is legal, and refuse to execute the operation corresponding to the operation information to be verified included in the content to be verified when the received verification result is illegal.
13. The system of claim 12, wherein the server pre-stored content comprises: pre-stored legal content;
the server is further configured to: receiving operation information to be verified and a DOI identifier to be verified sent by a client, judging whether the DOI identifier to be verified exists in the DOI identifiers in the prestored legal content, when the DOI identifier in the prestored legal content does not exist in the DOI identifier to be verified, determining that the verification result of the DOI is illegal, when the DOI identifier in the prestored legal content exists in the DOI identifier to be verified, judging whether the operation information in the legal content of the DOI identifier to be verified is the same as the operation information to be verified, if so, determining that the verification result of the DOI is legal, and if not, determining that the verification result of the DOI is illegal.
14. The system of claim 12, wherein the client is further configured to: sending a user identification to the server;
the server is further configured to receive the user identifier sent by the client before determining that the DOI verification result is legal, search, in the pre-stored valid times, for valid times corresponding to the user identifier that allow verification of the content to be verified, and determine that the found valid times are greater than zero.
15. An apparatus for authenticating a digital object unique identifier (DOI), comprising:
the acquisition module is used for acquiring the content to be verified analyzed from the DOI; the content to be verified comprises a DOI identifier to be verified;
the verification module is used for verifying whether the DOI corresponding to the DOI identification to be verified is legal or not according to the prestored content and the content to be verified;
and the execution module is used for processing the content to be verified according to the verification result.
16. The apparatus according to claim 15, wherein the content to be verified further includes operation information to be verified, and the execution module is configured to execute, when the verification result is legal, an operation corresponding to the operation information to be verified included in the content to be verified, and reject, when the verification result is illegal, the operation corresponding to the operation information to be verified included in the content to be verified.
17. The apparatus of claim 16, wherein the pre-stored content comprises: pre-stored legal content;
the verification module is further to: verifying whether the content to be verified exists in prestored legal content or not; if so, determining that the DOI verification result is legal; otherwise, determining that the verification result of the DOI is illegal.
18. The apparatus of claim 16, wherein the pre-stored content comprises: pre-stored illegal content;
the verification module is further to: judging whether the content to be verified exists in prestored illegal contents or not; if so, determining that the DOI verification result is illegal; otherwise, determining that the verification result of the DOI is legal.
19. The apparatus of claim 16, wherein the pre-stored content comprises: pre-stored legal content and illegal content;
the verification module is further to: verifying whether the content to be verified exists in prestored legal content and illegal content; when the content to be verified exists in prestored legal content, determining that the verification result of the DOI is legal; when the content to be verified exists in prestored illegal content, determining that the verification result of the DOI is illegal; when the content to be verified does not exist in the prestored legal content and the illegal content, determining the verification result of the DOI as pending;
the apparatus is further configured to: when the verification result is to be determined, providing a message for the user whether to execute the operation corresponding to the operation information contained in the content to be verified, when the user selects to execute, executing the operation corresponding to the operation information contained in the content to be verified, and when the user selects to reject to execute, rejecting to execute the operation corresponding to the operation information contained in the content to be verified.
20. The apparatus of claim 17, wherein the verification module is further configured to: judging whether the DOI identifier to be verified exists in the DOI identifiers in the prestored legal content, when the DOI identifier to be verified does not exist in the DOI identifiers in the prestored legal content, determining that the verification result of the DOI is illegal, when the DOI identifier to be verified exists in the DOI identifiers in the prestored legal content, judging whether the operation information in the legal content of the DOI identifier to be verified is the same as the operation information to be verified, if so, determining that the verification result of the DOI is legal, and if not, determining that the verification result of the DOI is illegal.
21. The apparatus of claim 16, wherein the verification module is further configured to: and before the verification result of the DOI is determined to be legal, acquiring a user identifier, searching the valid times which are allowed to verify the content to be verified and correspond to the user identifier in the prestored valid times, and determining that the searched valid times are greater than zero.
22. The apparatus of claim 16, wherein the verification module is further configured to: and before the verification result of the DOI is determined to be legal, determining a preset valid time range corresponding to the content to be verified, and determining that the current time does not exceed all valid time ranges.
23. An apparatus for authenticating a digital object unique identifier (DOI), comprising:
the sending module is used for sending the content to be verified analyzed from the DOI to the server; the content to be verified comprises a DOI identifier to be verified;
the receiving module is used for receiving the verification result returned by the server;
and the execution module is used for processing the content to be verified according to the verification result.
24. The apparatus according to claim 23, wherein the executing module is configured to execute the operation corresponding to the operation information to be verified included in the content to be verified when the received verification result is legal, and refuse to execute the operation corresponding to the operation information to be verified included in the content to be verified when the received verification result is illegal.
CN201810291833.6A 2014-05-26 2014-05-26 DOI verification method, device and system Active CN108629216B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810291833.6A CN108629216B (en) 2014-05-26 2014-05-26 DOI verification method, device and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810291833.6A CN108629216B (en) 2014-05-26 2014-05-26 DOI verification method, device and system
CN201410225414.4A CN105260692B (en) 2014-05-26 2014-05-26 A kind of DOI verification method, device and system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201410225414.4A Division CN105260692B (en) 2014-05-26 2014-05-26 A kind of DOI verification method, device and system

Publications (2)

Publication Number Publication Date
CN108629216A CN108629216A (en) 2018-10-09
CN108629216B true CN108629216B (en) 2021-02-05

Family

ID=55100374

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201810291833.6A Active CN108629216B (en) 2014-05-26 2014-05-26 DOI verification method, device and system
CN201410225414.4A Active CN105260692B (en) 2014-05-26 2014-05-26 A kind of DOI verification method, device and system

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201410225414.4A Active CN105260692B (en) 2014-05-26 2014-05-26 A kind of DOI verification method, device and system

Country Status (2)

Country Link
CN (2) CN108629216B (en)
HK (1) HK1215744A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022095B (en) * 2016-01-21 2019-06-28 李明 A kind of safety device, method of controlling security and identity card card-reading terminal
CN108282452A (en) * 2017-01-20 2018-07-13 广州市动景计算机科技有限公司 Data processing method, device, server and user terminal
CN108696338A (en) * 2018-04-11 2018-10-23 宇龙计算机通信科技(深圳)有限公司 A kind of 2 D code information sends and receives method, apparatus

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1784063A (en) * 2004-12-01 2006-06-07 华为技术有限公司 Movable terminal verifying method
CN101656711A (en) * 2008-08-22 2010-02-24 中国科学院计算机网络信息中心 System and method for verifying website information
CN102202051A (en) * 2011-04-07 2011-09-28 华南农业大学 Credible two-dimensional code system and application method thereof
CN102664987A (en) * 2012-03-23 2012-09-12 叶明� Mobile-phone two-dimensional-code based method for warning before using mobile-phone two-dimensional-code to scan and link website
CN103065244A (en) * 2011-10-18 2013-04-24 杨筑平 Two-dimensional barcode anti-counterfeiting, checking and service method
CN103226688A (en) * 2013-02-28 2013-07-31 中国地质大学(武汉) Authentication method for preventing two-dimension code from being tampered and faked

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102215228A (en) * 2011-05-31 2011-10-12 北京亿赞普网络技术有限公司 Web service unique user identification method based on carrier-class network platform
CN103023638B (en) * 2011-09-22 2016-03-30 阿里巴巴集团控股有限公司 A kind of auth method based on mobile terminal and device
CN102571803B (en) * 2012-01-19 2016-04-27 北京远鉴科技有限公司 A kind of graphic based Quick Response Code protection account, prevent order from distorting and the method and system of phishing attack
CN102841997A (en) * 2012-07-10 2012-12-26 郭小卫 Method and device for achieving authentication on intelligent device by mobile terminal
CN102831373B (en) * 2012-07-25 2015-09-09 罗晨 The data output method of multi-cascade coding
CN103729770B (en) * 2013-12-26 2017-07-07 重庆文理学院 A kind of anti-fake traceability system and its method
CN103810767A (en) * 2014-02-17 2014-05-21 百度在线网络技术(北京)有限公司 Off-line activity signing-in method and off-line activity signing-in system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1784063A (en) * 2004-12-01 2006-06-07 华为技术有限公司 Movable terminal verifying method
CN101656711A (en) * 2008-08-22 2010-02-24 中国科学院计算机网络信息中心 System and method for verifying website information
CN102202051A (en) * 2011-04-07 2011-09-28 华南农业大学 Credible two-dimensional code system and application method thereof
CN103065244A (en) * 2011-10-18 2013-04-24 杨筑平 Two-dimensional barcode anti-counterfeiting, checking and service method
CN102664987A (en) * 2012-03-23 2012-09-12 叶明� Mobile-phone two-dimensional-code based method for warning before using mobile-phone two-dimensional-code to scan and link website
CN103226688A (en) * 2013-02-28 2013-07-31 中国地质大学(武汉) Authentication method for preventing two-dimension code from being tampered and faked

Also Published As

Publication number Publication date
CN105260692A (en) 2016-01-20
HK1215744A1 (en) 2016-09-09
CN108629216A (en) 2018-10-09
CN105260692B (en) 2018-04-03

Similar Documents

Publication Publication Date Title
CN108234505B (en) Account login method and system
US10257187B2 (en) Prompting login account
JP6503357B2 (en) Approve payment by reading QR code generated by separate user or device
CN102891826B (en) The control method of web page access, equipment and system
CN105592011B (en) Account login method and device
CN105391674B (en) Information processing method and system, server and client
CN105635126A (en) Malicious URL access protection method, client side, security server and system
EP3198521B1 (en) Method and apparatus of processing a doi (digital object unique identifier) in interaction information
CN102917049A (en) Method for showing information of visited website, browser and system
CN102882886A (en) Network terminal and method for presenting visited website associated information
CN104240095A (en) Two-dimensional code anti-fake method and system based on domain name
CN103685312A (en) Method and system for detecting phishing pages, client side and server
CN108629216B (en) DOI verification method, device and system
CN112948521B (en) Object handling method and device
CN107454041B (en) Method and device for preventing server from being attacked
JP2017534964A (en) Password protection question setting method and apparatus
CN105187399A (en) Resource processing method and device
CN111274307A (en) Product information display method, device and system and related equipment
CN107038540B (en) Method and device for object type distribution based on intelligent bar code
JP2018500670A (en) Handling unstructured messages
CN111385272A (en) Weak password detection method and device
CN105337946A (en) Webpage forgery prevention verification method and device
CN107026816B (en) Identity authentication method and device
CN112749352A (en) Webpage skipping method and device, electronic equipment and readable storage medium
CN110704498A (en) Data extraction method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant