CN108763934A - Data processing method and device, storage medium, server - Google Patents
Data processing method and device, storage medium, server Download PDFInfo
- Publication number
- CN108763934A CN108763934A CN201810541810.6A CN201810541810A CN108763934A CN 108763934 A CN108763934 A CN 108763934A CN 201810541810 A CN201810541810 A CN 201810541810A CN 108763934 A CN108763934 A CN 108763934A
- Authority
- CN
- China
- Prior art keywords
- result information
- server
- data transfer
- data
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Abstract
The application discloses a kind of data processing method and device, storage medium, server, the wherein data processing method include:The processing result information that second server is directed to data transfer request feedback is received, the data transfer request is that the first server is sent to the second server;Corresponding first execution result information of the processing result information is generated based on data transfer interface, and the program code in interface for distorting information is shifted according to the data, first execution result information is distorted as the second execution result information;Transfer interface generates the corresponding verification result of second execution result information based on the data, and determines that the data of the first server shift abnormality detection ability according to the verification result.Using the technical solution of the application, payment safety can be improved.
Description
Technical field
The present invention relates to Internet technical field more particularly to a kind of data processing method and device, storage medium, services
Device.
Background technology
With the development of mobile payment, the safety of payment in payment process increasingly attracts attention, in order to avoid hacker
Information in payment process is distorted, it will usually be arranged in the server abnormal to the various payments occurred in payment process
The flow being detected, if server detects that payment is abnormal, alerted or interrupt payment flow etc..But it is logical
The payment abnormality detection flow being often arranged in the server is also due to a variety of causes breaks down, for example even if payment occurs
It is abnormal, it is also not detected and, this is greatly lowered the safety of payment process.
Invention content
A kind of data processing method of offer of the embodiment of the present invention and device, storage medium, server, can be by holding by first
Row result information is distorted as the second execution result information, realizes the determination to the data exception detectability of first server, from
And improve payment safety.
In a first aspect, an embodiment of the present invention provides a kind of data processing methods, including:
The processing result information that second server is directed to data transfer request feedback is received, the data transfer request is institute
It states first server and is sent to the second server;
Corresponding first execution result information of the processing result information is generated based on data transfer interface, and according to described
Program code in data transfer interface for distorting information, first execution result information is distorted as the second implementing result
Information;
Transfer interface generates the corresponding verification result of second execution result information based on the data, and according to described
Verification result determines the data transfer abnormality detection ability of the first server.
It is described that the processing result information corresponding first is generated based on data transfer interface in a kind of possible design
Execution result information, and the program code in interface for distorting information is shifted according to the data, execute knot by described first
Fruit information is distorted as the second execution result information, including:
The first function in interface is shifted based on data to handle the processing result information, obtains the processing knot
Corresponding first execution result information of fruit information;
The program code in interface for distorting information is shifted based on the data, and first execution result information is usurped
It is changed to the second execution result information, said program code is the code newly injected in the data transfer interface.
In a kind of possible design, the interface of transfer based on the data generates second execution result information pair
The verification result answered, including:
The second function shifted based on the data in interface carries out verification processing to second execution result information, raw
At the corresponding verification result of second execution result information, the verification result is used to indicate second execution result information
Whether it is true execution result information.
It is described to determine that the data transfer of the first server is different according to the verification result in a kind of possible design
Normal detectability, including:
If it is not true execution result information that the verification result, which is used to indicate second execution result information, determine
The data transfer abnormality detection ability of the first server is normal;
If it is true execution result information that the verification result, which is used to indicate second execution result information, institute is determined
The data transfer abnormality detection ability for stating first server is abnormal.
In a kind of possible design, the method further includes:
Obtain said program code for distorting information, and by said program code boil down to code packet;
The incidence relation between the first function in the code packet and data transfer interface is configured, and is passed through
The incidence relation between the code packet and the first function newly injects the said program code in the code packet
The data shift interface.
In a kind of possible design, the code packet is the jar packets of archive file jar formats;The method further includes:
The jar packets are stored in the first server under the corresponding storage catalogue of archive file format;
Incidence relation between the first function configured in the code packet and data transfer interface, packet
It includes:
Configuration file is obtained, the configuration file is used to record the injection for the code packet for newly injecting the data transfer interface
Information;
The injection information of the jar packets under the storage catalogue, the injection information are added in the configuration file
The program code for being used to indicate the jar packets is infused in the first function and second letter in data transfer interface
Between number, the execution priority of the first function is more than the execution priority of said program code, and said program code is held
Row major grade is more than the execution priority of the second function.
In a kind of possible design, the processing result information includes the second server return to actual number
According to the encrypted ciphertext of transfer parameters, first execution result information include obtained after the ciphertext is decrypted described in
Actual data transfer parameters, second execution result information include gained after being distorted to the actual data transfer parameters
To the data transfer parameters of forgery, the data transfer parameters of the forgery are different from the actual data transfer parameters.
Second aspect, the embodiment of the present invention provide a kind of data processing equipment, are applied to first server, including:
Receiving module is directed to the processing result information of data transfer request feedback, the number for receiving second server
It is that the first server is sent to the second server according to transfer request;
Information distorts module, and knot is executed for generating the processing result information corresponding first based on data transfer interface
Fruit information, and the program code in interface for distorting information is shifted according to the data, by first execution result information
It distorts as the second execution result information;
Authentication module generates the corresponding verification knot of second execution result information for transfer interface based on the data
Fruit, and determine that the data of the first server shift abnormality detection ability according to the verification result.
In a kind of possible design, described information distorts module and includes:
Processing unit is handled the processing result information for shifting the first function in interface based on data,
Obtain corresponding first execution result information of the processing result information;
Unit is distorted, for shifting the program code in interface for distorting information based on the data, by described first
Execution result information is distorted as the second execution result information, and said program code is the generation newly injected in the data transfer interface
Code.
In a kind of possible design, the authentication module shifts interface generation described second and executes knot based on the data
The corresponding verification result of fruit information specifically includes:
The second function shifted based on the data in interface carries out verification processing to second execution result information, raw
At the corresponding verification result of second execution result information, the verification result is used to indicate second execution result information
Whether it is true execution result information.
In a kind of possible design, the authentication module determines the number of the first server according to the verification result
It is specifically included according to transfer abnormality detection ability:
If it is not true execution result information that the verification result, which is used to indicate second execution result information, determine
The data transfer abnormality detection ability of the first server is normal;
If it is true execution result information that the verification result, which is used to indicate second execution result information, institute is determined
The data transfer abnormality detection ability for stating first server is abnormal.
In a kind of possible design, described device further includes:
Code packet acquisition module, for obtaining the said program code for distorting information, and by said program code pressure
It is condensed to code packet;
Configuration module, for configuring the pass between the first function in the code packet and data transfer interface
Connection relationship, and by the incidence relation between the code packet and the first function, described in the code packet
Program code newly injects the data transfer interface.
In a kind of possible design, the code packet is the jar packets of archive file jar formats;Described device further includes:
Memory module, for the jar packets to be stored in the corresponding storage of archive file format in the first server
Under catalogue;
The configuration module includes:
Acquiring unit, for obtaining configuration file, the configuration file newly injects the data transfer interface for recording
Code packet injection information;
Adding device, the injection information for adding the jar packets under the storage catalogue in the configuration file,
The program code that the injection information is used to indicate the jar packets is infused in the first function in the data transfer interface
Between the second function, the execution priority of the first function is more than the execution priority of said program code, described
The execution priority of program code is more than the execution priority of the second function.
In a kind of possible design, the processing result information includes the second server return to actual number
According to the encrypted ciphertext of transfer parameters, first execution result information include obtained after the ciphertext is decrypted described in
Actual data transfer parameters, second execution result information include gained after being distorted to the actual data transfer parameters
To the data transfer parameters of forgery, the data transfer parameters of the forgery are different from the actual data transfer parameters.
The third aspect, the embodiment of the present invention provide a kind of first server, including processor and memory;
The processor is connected with memory, wherein for storing program code, the processor is used for the memory
Said program code is called, to execute the method described in first aspect.
Fourth aspect, the embodiment of the present invention provide a kind of computer storage media, which is characterized in that the computer storage
It includes program instruction that media storage, which has computer program, the computer program, and described program instructs when being executed by a processor,
Execute the method described in first aspect.
In the embodiment of the present invention, first server shifts the program code in interface for distorting information according to data, will
First execution result information is distorted as the second execution result information, and analog information distorts process, then based on data transfer interface life
At the corresponding verification result of the second execution result information, to determine that the data transfer of first server is different according to verification result
Normal detectability improves payment safety.
Description of the drawings
In order to illustrate the embodiment of the present invention or technical solution in the prior art, embodiment or the prior art will be retouched below
Attached drawing needed in stating is briefly described.
Fig. 1 is a kind of system architecture diagram provided in an embodiment of the present invention;
Fig. 2 is a kind of flow chart of data processing method provided in an embodiment of the present invention;
Fig. 3 is the flow chart of another data processing method provided in an embodiment of the present invention;
Fig. 4 is a kind of payment interaction figure provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of data processing equipment provided in an embodiment of the present invention;
Fig. 6 is a kind of structural schematic diagram of first server provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention is described.
The first server of the embodiment of the present invention can be bank pre-machine, and second server can be bank server.
Fig. 1 is please referred to, is a kind of system architecture diagram provided in an embodiment of the present invention, as shown, the system architecture includes
Terminal device, first server and second server, terminal device can shift client with installation data, for example pay client
End is used for trigger data transfer request, and receives data and shift result.Terminal device may include PC, notebook
Computer, smart mobile phone, tablet computer, car-mounted terminal and portable wearable device etc..
First server can be bank pre-machine, and bank pre-machine is to realize that bank's traditional business is expanded outward generally to adopt
A kind of intermediate equipment, the major function that it is realized have message authentication, network communication, transaction data format conversion, transaction flow
Water record, transaction pretreatment, transaction monitoring and transaction data statistics etc..
Second server can be bank server, and a large number of users data are stored in bank server, realize that data turn
The core process of shifting.Generally for the safety for ensureing user data, only allow bank pre-machine according to the report of specific format
Text with second server into row data communication, without allowing third party's injecting codes in bank server test etc..
Terminal device can be with first server into row data communication, and first server can be with second server into line number
According to communication.Terminal device can to first server trigger data transfer request, the first server according to data transfer request,
With second server into row data communication, realize data forwarding function, the data forwarding function include but not limited to payment function,
Debit facility etc..Second server returns to processing result information to first server again, for example, the processing result information can be with
The ciphertext after actual payment amount is encrypted, the processing result information that first server returns to second server into
Row processing to obtain the first execution result information, for example is decrypted ciphertext, obtains actual payment amount, the first clothes
Being engaged in device can be to terminal device returned data transfer result information, for example, returned data shifts according to the first execution result information
The data of success or failure shift result information.
In order to determine that the data of first server shift abnormality detection ability in the embodiment of the present invention, in first server
Program code of the new injection for distorting information distorts correct first execution result information for mistake according to the program code
The second execution result information accidentally, i.e. analog information distorts process, further generates this second execution result information is corresponding and test
Card according to verification result as a result, so that determine that the data of first server shift abnormality detection ability.If for example, verification result
It is true execution result information to indicate the second execution result information not, it is determined that the data of first server shift abnormality detection
Ability is normal, if it is true execution result information that verification result, which is used to indicate the second execution result information, it is determined that the first clothes
The data transfer abnormality detection ability of business device is abnormal.It can find the data transfer of first server in time through the above way
Whether abnormality detection ability is normal, improves payment safety.
Below in conjunction with attached drawing 2- attached drawings 4, describe in detail to data processing method provided in an embodiment of the present invention.
Fig. 2 is referred to, for an embodiment of the present invention provides a kind of flow diagrams of data processing method.As shown in Fig. 2,
The data processing method of the embodiment of the present invention may comprise steps of S101- steps S103.
S101, receives the processing result information that second server is directed to data transfer request feedback, and the data transfer is asked
First server described in Seeking Truth is sent to the second server;
In one embodiment, first server receives data transfer request, which can be that payment is asked
It asks, optionally, data transfer request includes data transfer parameters, such as payment amount, collecting account, payment account etc..
First server is transmitted to data transfer request to second server, after second server receives the data transfer request, i.e.,
Data transfer operation can be carried out according to the data transfer request.For example, the data transfer request shifts d for asking from A accounts
For the payment amount of quantity to B accounts, then second server deducts the d amount of money from A accounts, and the d amount of money is added in B accounts.
After second server completes data transfer operation, i.e., processing result information is fed back into first server, it is optional
, in order to ensure the safety of data communication, processing result information can be transmitted by way of encrypted message.Than
If processing result information can be the ciphertext after actual data transfer parameters are encrypted, data transfer parameters can be real
The payment amount on border.
S102 generates corresponding first execution result information of the processing result information, and root based on data transfer interface
The program code in interface for distorting information is shifted according to the data, first execution result information is distorted and is held for second
Row result information;
In one embodiment, based on the data transfer interface in first server, to generate the processing result information corresponding
First execution result information, for example, operation is decrypted to encrypted message (i.e. ciphertext), to obtain in the encrypted message
Including actual data transfer parameters.Optionally, the handleResponse function pairs second in interface are shifted by data
The processing result information that server returns is decrypted, to obtain actual data included in processing result information
Transfer parameters.Wherein, the input parameter of handleResponse functions is encrypted message (i.e. this hair that second server returns
Ciphertext mentioned by bright embodiment), the return field of handleResponse functions is the message after decryption, i.e., encrypted message
In entrained actual data transfer parameters, such as actual payment amount.Optionally, the cipher mode of message can be
Base64 is encrypted, then needs to be decrypted using corresponding Base64 manner of decryption, optionally, the message after decryption can have 2
A field, a field can be the actual data transfer parameters entrained by the encrypted message, such as actual payment gold
Volume, another field can be the signatures of bank.
Data in order to verify first server shift abnormality detection ability, and further basis is newly injected data transfer and connect
Program code in mouthful for distorting information, the first execution result information is distorted as the second execution result information, such as first
Execution result information is actual data transfer parameters, then the actual data transfer parameters are distorted to the data transfer for forgery
Parameter, wherein actual data transfer parameters are different with the data transfer parameters of forgery.
Continue with above-mentioned handleResponse functions as an example, the program code newly injected can be with
HandleResponse functions are as code injection point, i.e., by reality entrained in the return field of handleResponse functions
The payment amount on border distorts the payment amount for forgery, then the payment amount of forgery is shifted back to data in interface and continues to hold
Row, to realize the determination that the data of first server are shifted with abnormality detection ability.
S103 shifts interface and generates the corresponding verification result of second execution result information, and root based on the data
Determine that the data of the first server shift abnormality detection ability according to the verification result.
In one embodiment, the first execution result information is distorted after the second execution result information, to continue based on number
The corresponding verification result of the second execution result information is generated according to transfer interface.To determine first server according to verification result
Data shift abnormality detection ability.Such as before unimplanted program code, handleResponse functions will return to field
In actual payment amount back to data transfer interface in handleRequest functions continue to execute, to pass through
HandleRequest functions generate verification result.Then after injecting program code, the payment amount of the forgery after distorting is returned
The handleRequest functions in interface are shifted to data to continue to execute, to generate verification knot by handleRequest functions
Fruit.If final verification result indicates that the second execution result information is not true execution result information, it is determined that first service
The data transfer abnormality detection ability of device is normal, i.e., first server can be detected the payment of appearance extremely, such as the
The response message that one server returns to result=88412002&res_info=second servers is wrong:The exception of amount differ
Mistake, it is determined that first server can be detected the payment of appearance extremely.If final verification result instruction second is held
Row result information is true execution result information, it is determined that the data transfer abnormality detection ability of first server is abnormal,
I.e. first server can not be detected the payment of appearance extremely, and failure occurs in first server, in this way can be timely
It was found that whether first server data transfer abnormality detection ability is normal, the safety of payment is improved.
In the embodiment of the present invention, first server shifts the program code in interface for distorting information according to data, will
First execution result information is distorted as the second execution result information, and analog information distorts process, then based on data transfer interface life
At the corresponding verification result of the second execution result information, to determine that the data transfer of first server is different according to verification result
Normal detectability improves payment safety.
Fig. 3 is referred to, for an embodiment of the present invention provides the flow diagrams of another data processing method.Such as Fig. 3 institutes
Show, the data processing method of the embodiment of the present invention may comprise steps of S201- steps S206.
S201, obtains said program code for distorting information, and by said program code boil down to code packet;
In one embodiment, determine that the data transfer abnormality detection ability for needing to detect, data shift abnormality detection energy
Whether whether power includes but not limited to be consistent the ability being detected to payment amount, be consistent the energy being detected to Send only Account
Power etc., whether the embodiment of the present invention is to be consistent to payment amount the ability that is detected as an example.Then number is analyzed
According to the code of transfer interface, the data transfer abnormality detection ability detected as needed determines that needing to be infused in data transfer connects
Decanting point in mouthful.For example, it is the payment for detecting second server and returning to need the data detected transfer abnormality detection ability
When payment amount in the data transfer request that the amount of money is sent with first server differs, whether first server will detect that
The exception of data transfer.
The program code of data transfer interface is analyzed, the toBankPay functions under class PayTranHandler can call
HandleRequest functions under RequestCommunicator classes, and handleRequest functions can call
HandleResponse functions.Wherein, the input parameter of handleResponse functions is bank server (i.e. second service
Device) return to the encrypted message of actual payment amount (ciphertext), the return field of handleResponse functions (passes through
Cross handleResponse functions treated the first execution result information) it is actual payment amount after decryption, therefore it is right
For the different data transfer abnormality detection ability of payment amount, handleResponse functions are exactly one most suitable
Code injection point.
The program code for distorting information is write, simulates and is distorted into row information, the embodiment of the present invention is for distorting information
Program code by handleResponse functions return field in actual payment amount distort the payment amount for forgery,
For example, actual payment amount is 1234, it is 4321 to be distorted, and then the payment amount return of the forgery after distorting is returned
It goes, that is, replaces the return value of handleResponse functions.It is specific optional, build development environment first, and built
The above-mentioned program code for distorting information is write under development environment.For example, research staff installs eclipse and aspectj
Plug-in unit ajdt_2.2.3_for_eclipse_4.3.zip carries out writing for program code to build development environment.
Further, by the program code boil down to code packet for distorting information, optionally, the format of the code packet can be with
It is archive file format jar packets, for example, above procedure code is packaged as aspectbank.jar.It is specific optional,
In eclipse, file-export-jar file with aspectj support-aspectbank projects-are selected successively
Finish, to the packing of completion code packet.
The code packet is stored in the first server under the corresponding storage catalogue of archive file format by S202;
In one embodiment, obtained code packet aspectbank.jar will be packaged and be stored in first server and filed
Under the corresponding storage catalogue of file format, for example, code packet aspectbank.jar is put into the lib catalogues of first server,
I.e./data/server/FastpayPre_install_auto/fastpay-boc-zh/sende r/lib.
S203 configures the incidence relation between the first function in the code packet and data transfer interface,
And by the incidence relation between the code packet and the first function, by the said program code in the code packet
Newly inject the data transfer interface.
In one embodiment, the first function in data transfer interface is that code packet needs the decanting point injected, this
In continue with above-mentioned first function be handleResponse functions as an example.Configuration code packet and first function it
Between incidence relation when, can support that the mode of configuration file is configured.It is specific optional, configuration file can be obtained, it should
Configuration file is used to record the injection information for the code packet for newly injecting data transfer interface, further adds in the configuration file
The injection information of aspectbank.jar under lib catalogues, the injection information is added to be used to indicate the program of aspectbank.jar packets
Code injection is shifted in data between first function and second function in interface, that is, after having executed first function, by the first letter
The first several execution result informations be input to newly inject the data transfer interface program code executed, obtain the second execution
Result information, then the second execution result information is continued to execute back to second function, it verifies whether that abnormality processing can be carried out.?
Before the program code of unimplanted aspectbank.jar packets, first function is executed, i.e., has executed knot by the first of first function
Fruit information is continued to execute back to second function, and second function can be handleRequest functions.It is specific optional, it is new to add
Aop.xml is configured, and indicates that new injection data shift the aspectbank.jar packets of interface by aop.xml configurations.Aop.xml matches
Set the position for indicating aspectbank.jar packets injection.
After program code in aspectbank.jar packets is newly injected data transfer interface, you can restart first server
Data transfer interface program, carry out data transferring test.It is specific optional, need the jar packets for downloading aspectj, the jar
Some public classes and parameter defined in packet, load the jar packets of aspectj so that subsequent execution aspectbank.jar
When program code in packet, the class and parameter in the jar packets of the aspectj can be called.Increase-javaagent:$
The Dynamic Weave parameter of ASPECT_LIB/aspectjweaver.jar, and the permission of super keepe sudo is set, to open
The program of the data transfer interface of dynamic first server, carries out data transferring test.
S204, receives the processing result information that second server is directed to data transfer request feedback, and the data transfer is asked
First server described in Seeking Truth is sent to the second server;
S205 generates corresponding first execution result information of the processing result information, and root based on data transfer interface
The program code in interface for distorting information is shifted according to the data, first execution result information is distorted and is held for second
Row result information;
S206 shifts interface and generates the corresponding verification result of second execution result information, and root based on the data
Determine that the data of the first server shift abnormality detection ability according to the verification result.
Step of embodiment of the present invention S204-S206 please refers to the embodiment step S101-S103 of Fig. 1, and details are not described herein.
In the embodiment of the present invention, first server shifts the program code in interface for distorting information according to data, will
First execution result information is distorted as the second execution result information, and analog information distorts process, then based on data transfer interface life
At the corresponding verification result of the second execution result information, to determine that the data transfer of first server is different according to verification result
Normal detectability improves payment safety.
Fig. 4 is please referred to, for a kind of flow interaction figure of payment abnormality detection provided in an embodiment of the present invention, the payment scene
A kind of only citing of data transfer process, does not constitute the restriction to the embodiment of the present invention.As shown, bank pre-machine
Can be above-mentioned first server, bank server can be above-mentioned second server, may include function in bank pre-machine
1, function 2 and function 3.
Terminal device initiates payment request to bank pre-machine, the function 3 of bank pre-machine to the payment request at
Reason, and ask to pay to bank server.
Bank server returns to payment result message to bank pre-machine, which can be encrypted close
Text includes actual payment amount in the ciphertext.
The function 1 of bank pre-machine handles the payment result message, for example decrypts the payment result message, obtains
Actual payment amount.
Since in function 1, newly program code of the injection for distorting information will be obtained by executing the program code after decryption
To actual payment amount distorted, and the payment amount after distorting is executed back to function 2.
Function 2 is verified according to the payment amount of return, for example determines whether the payment amount is true payment gold
Volume, and payment result is returned to function 3, payment result can pay successfully or pay failure.If the payment that function 3 returns
The result is that payment failure, and return to miscue:Payment amount is not inconsistent, then illustrates the data transfer abnormality detection of bank pre-machine
Ability is normal.If the payment result that function 3 returns is to pay the data transfer abnormality detection energy for successfully illustrating bank pre-machine
Power is abnormal.
Function 3 further returns to payment result to terminal device.
Fig. 5 is referred to, for an embodiment of the present invention provides a kind of structural schematic diagrams of data processing equipment.As shown in figure 5,
The data processing equipment of the embodiment of the present invention may include:Code packet acquisition module 11, memory module 12, configuration module
13, receiving module 14, information distort module 15 and authentication module 16;
Code packet acquisition module 11, for obtaining the said program code for distorting information, and by said program code
Boil down to code packet;
In one embodiment, determine that the data transfer abnormality detection ability for needing to detect, data shift abnormality detection energy
Whether whether power includes but not limited to be consistent the ability being detected to payment amount, be consistent the energy being detected to Send only Account
Power etc., whether the embodiment of the present invention is to be consistent to payment amount the ability that is detected as an example.Then number is analyzed
According to the code of transfer interface, the data transfer abnormality detection ability detected as needed determines that needing to be infused in data transfer connects
Decanting point in mouthful.For example, it is the payment for detecting second server and returning to need the data detected transfer abnormality detection ability
When payment amount in the data transfer request that the amount of money is sent with first server differs, whether first server will detect that
The exception of data transfer.
The program code of data transfer interface is analyzed, the toBankPay functions under class PayTranHandler can call
HandleRequest functions under RequestCommunicator classes, and handleRequest functions can call
HandleResponse functions.Wherein, the input parameter of handleResponse functions is bank server (i.e. second service
Device) return to the encrypted message of actual payment amount (ciphertext), the return field of handleResponse functions (passes through
Cross handleResponse functions treated the first execution result information) it is actual payment amount after decryption, therefore it is right
For the different data transfer abnormality detection ability of payment amount, handleResponse functions are exactly one most suitable
Code injection point.
The program code for distorting information is write, simulates and is distorted into row information, the embodiment of the present invention is for distorting information
Program code by handleResponse functions return field in actual payment amount distort the payment amount for forgery,
For example, actual payment amount is 1234, it is 4321 to be distorted, and then the payment amount return of the forgery after distorting is returned
It goes, that is, replaces the return value of handleResponse functions.It is specific optional, build development environment first, and built
The above-mentioned program code for distorting information is write under development environment.For example, research staff installs eclipse and aspectj
Plug-in unit ajdt_2.2.3_for_eclipse_4.3.zip carries out writing for program code to build development environment.
Further, by the program code boil down to code packet for distorting information, optionally, the format of the code packet can be with
It is archive file format jar packets, for example, above procedure code is packaged as aspectbank.jar.It is specific optional,
In eclipse, file-export-jar file with aspectj support-aspectbank projects-are selected successively
Finish, to the packing of completion code packet.
Memory module 12, for the jar packets to be stored in the first server, archive file format is corresponding to deposit
It stores up under catalogue;
In one embodiment, obtained code packet aspectbank.jar will be packaged and be stored in first server and filed
Under the corresponding storage catalogue of file format, for example, code packet aspectbank.jar is put into the lib catalogues of first server,
I.e./data/server/FastpayPre_install_auto/fastpay-boc-zh/sende r/lib.
Configuration module 13, for configure the code packet and the data transfer interface in the first function between
Incidence relation, and by the incidence relation between the code packet and the first function, by the institute in the code packet
It states program code and newly injects the data transfer interface.
Optionally, as shown, configuration module 13 may include acquiring unit 130 and adding device 131;
Acquiring unit 130, for obtaining configuration file, the configuration file newly injects the data transfer and connects for recording
The injection information of the code packet of mouth;
Adding device 131, the injection for adding the jar packets under the storage catalogue in the configuration file are believed
Breath, the program code that the injection information is used to indicate the jar packets are infused in described first in the data transfer interface
Between function and the second function, the execution priority of the first function is more than the execution priority of said program code,
The execution priority of said program code is more than the execution priority of the second function.
In one embodiment, the first function in data transfer interface is that code packet needs the decanting point injected, this
In continue with above-mentioned first function be handleResponse functions as an example.Configuration code packet and first function it
Between incidence relation when, can support that the mode of configuration file is configured.It is specific optional, configuration file can be obtained, it should
Configuration file is used to record the injection information for the code packet for newly injecting data transfer interface, further adds in the configuration file
The injection information of aspectbank.jar under lib catalogues, the injection information is added to be used to indicate the program of aspectbank.jar packets
Code injection is shifted in data between first function and second function in interface, that is, after having executed first function, by the first letter
The first several execution result informations be input to newly inject the data transfer interface program code executed, obtain the second execution
Result information, then the second execution result information is continued to execute back to second function, it verifies whether that abnormality processing can be carried out.?
Before the program code of unimplanted aspectbank.jar packets, first function is executed, i.e., has executed knot by the first of first function
Fruit information is continued to execute back to second function, and second function can be handleRequest functions.It is specific optional, it is new to add
Aop.xml is configured, and indicates that new injection data shift the aspectbank.jar packets of interface by aop.xml configurations.Aop.xml matches
Set the position for indicating aspectbank.jar packets injection.
After program code in aspectbank.jar packets is newly injected data transfer interface, you can restart first server
Data transfer interface program, carry out data transferring test.It is specific optional, need the jar packets for downloading aspectj, the jar
Some public classes and parameter defined in packet, load the jar packets of aspectj so that subsequent execution aspectbank.jar
When program code in packet, the class and parameter in the jar packets of the aspectj can be called.Increase-javaagent:$
The Dynamic Weave parameter of ASPECT_LIB/aspectjweaver.jar, and the permission of super keepe sudo is set, to open
The program of the data transfer interface of dynamic first server, carries out data transferring test.
Receiving module 14 is directed to the processing result information of data transfer request feedback for receiving second server, described
Data transfer request is that the first server is sent to the second server;
In one embodiment, first server receives data transfer request, which can be that payment is asked
It asks, optionally, data transfer request includes data transfer parameters, such as payment amount, collecting account, payment account etc..
First server is transmitted to data transfer request to second server, after second server receives the data transfer request, i.e.,
Data transfer operation can be carried out according to the data transfer request.For example, the data transfer request shifts d for asking from A accounts
For the payment amount of quantity to B accounts, then second server deducts the d amount of money from A accounts, and the d amount of money is added in B accounts.
After second server completes data transfer operation, i.e., processing result information is fed back into first server, it is optional
, in order to ensure the safety of data communication, processing result information can be transmitted by way of encrypted message.Than
If processing result information can be the ciphertext after actual data transfer parameters are encrypted, data transfer parameters can be real
The payment amount on border.
Information distorts module 15, is executed for generating the processing result information corresponding first based on data transfer interface
Result information, and the program code in interface for distorting information is shifted according to the data, first implementing result is believed
Breath is distorted as the second execution result information;
Optionally, as shown, it may include processing unit 150 and distorting unit 151 that information, which distorts module 15,;
Processing unit 150, at based on the first function in data transfer interface to the processing result information
Reason, obtains corresponding first execution result information of the processing result information;
Unit 151 is distorted, for shifting based on the data for distorting the program code of information in interface, by described the
One execution result information is distorted as the second execution result information, and said program code is newly injected in the data transfer interface
Code.
In one embodiment, based on the data transfer interface in first server, to generate the processing result information corresponding
First execution result information, for example, operation is decrypted to encrypted message (i.e. ciphertext), to obtain in the encrypted message
Including actual data transfer parameters.Optionally, the handleResponse function pairs second in interface are shifted by data
The processing result information that server returns is decrypted, to obtain actual data included in processing result information
Transfer parameters.Wherein, the input parameter of handleResponse functions is encrypted message (i.e. this hair that second server returns
Ciphertext mentioned by bright embodiment), the return field of handleResponse functions is the message after decryption, i.e., encrypted message
In entrained actual data transfer parameters, such as actual payment amount.Optionally, the cipher mode of message can be
Base64 is encrypted, then needs to be decrypted using corresponding Base64 manner of decryption, optionally, the message after decryption can have 2
A field, a field can be the actual data transfer parameters entrained by the encrypted message, such as actual payment gold
Volume, another field can be the signatures of bank.
Data in order to verify first server shift abnormality detection ability, and further basis is newly injected data transfer and connect
Program code in mouthful for distorting information, the first execution result information is distorted as the second execution result information, such as first
Execution result information is actual data transfer parameters, then the actual data transfer parameters are distorted to the data transfer for forgery
Parameter, wherein actual data transfer parameters are different with the data transfer parameters of forgery.
Continue with above-mentioned handleResponse functions as an example, the program code newly injected can be with
HandleResponse functions are as code injection point, i.e., by reality entrained in the return field of handleResponse functions
The payment amount on border distorts the payment amount for forgery, then the payment amount of forgery is shifted back to data in interface and continues to hold
Row, to realize the determination that the data of first server are shifted with abnormality detection ability.
Authentication module 16 generates the corresponding verification of second execution result information for transfer interface based on the data
As a result, and determining that the data of the first server shift abnormality detection ability according to the verification result.
In one embodiment, the first execution result information is distorted after the second execution result information, to continue based on number
The corresponding verification result of the second execution result information is generated according to transfer interface.To determine first server according to verification result
Data shift abnormality detection ability.Such as before unimplanted program code, handleResponse functions will return to field
In actual payment amount back to data transfer interface in handleRequest functions continue to execute, to pass through
HandleRequest functions generate verification result.Then after injecting program code, the payment amount of the forgery after distorting is returned
The handleRequest functions in interface are shifted to data to continue to execute, to generate verification knot by handleRequest functions
Fruit.If final verification result indicates that the second execution result information is not true execution result information, it is determined that first service
The data transfer abnormality detection ability of device is normal, i.e., first server can be detected the payment of appearance extremely, such as the
The response message that one server returns to result=88412002&res_info=second servers is wrong:The exception of amount differ
Mistake, it is determined that first server can be detected the payment of appearance extremely.If final verification result instruction second is held
Row result information is true execution result information, it is determined that the data transfer abnormality detection ability of first server is abnormal,
I.e. first server can not be detected the payment of appearance extremely, and failure occurs in first server, in this way can be timely
It was found that whether first server data transfer abnormality detection ability is normal, the safety of payment is improved.
In the embodiment of the present invention, first server shifts the program code in interface for distorting information according to data, will
First execution result information is distorted as the second execution result information, and analog information distorts process, then based on data transfer interface life
At the corresponding verification result of the second execution result information, to determine that the data transfer of first server is different according to verification result
Normal detectability improves payment safety.
The embodiment of the present invention additionally provides a kind of computer storage media, and the computer storage media can be stored with more
Item instructs, and described instruction is suitable for being loaded by processor and being executed the method and step such as above-mentioned Fig. 2-embodiment illustrated in fig. 4, specifically holds
Row process may refer to illustrating for Fig. 2-embodiment illustrated in fig. 4, herein without repeating.
Fig. 6 is please referred to, is a kind of structural schematic diagram of first server provided in an embodiment of the present invention, as shown in fig. 6, institute
Stating first server 1000 may include:At least one processor 1001, such as CPU, at least one communication interface 1003, storage
Device 1004, at least one communication bus 1002.Wherein, communication bus 1002 is for realizing the connection communication between these components.
Communication interface 1003 may include optionally standard wireline interface and wireless interface (such as WI-FI interface).Memory 1004 can be with
It is high-speed RAM memory, can also be non-labile memory (non-volatile memory), for example, at least a magnetic
Disk storage.Memory 1004 optionally can also be at least one storage device for being located remotely from aforementioned processor 1001.Such as
Shown in Fig. 6, as may include in a kind of memory 1004 of computer storage media operating system, network communication module and
Program instruction.
In first server 1000 shown in Fig. 6, what processor 1001 can be used for storing in load store device 1004
Program instruction, and specifically execute following operation:
The processing result information that second server is directed to data transfer request feedback is received, the data transfer request is institute
It states first server and is sent to the second server;
Corresponding first execution result information of the processing result information is generated based on data transfer interface, and according to described
Program code in data transfer interface for distorting information, first execution result information is distorted as the second implementing result
Information;
Transfer interface generates the corresponding verification result of second execution result information based on the data, and according to described
Verification result determines the data transfer abnormality detection ability of the first server.
Optionally, the processor 1001 generates the processing result information corresponding first based on data transfer interface and holds
Row result information, and the program code in interface for distorting information is shifted according to the data, by first implementing result
Information is distorted as the second execution result information, including:
The first function in interface is shifted based on data to handle the processing result information, obtains the processing knot
Corresponding first execution result information of fruit information;
The program code in interface for distorting information is shifted based on the data, and first execution result information is usurped
It is changed to the second execution result information, said program code is the code newly injected in the data transfer interface.
Optionally, the processor 1001 shifts interface and generates the second execution result information correspondence based on the data
Verification result, including:
The second function shifted based on the data in interface carries out verification processing to second execution result information, raw
At the corresponding verification result of second execution result information, the verification result is used to indicate second execution result information
Whether it is true execution result information.
Optionally, the processor 1001 determines that the data of the first server shift exception according to the verification result
Detectability, including:
If it is not true execution result information that the verification result, which is used to indicate second execution result information, determine
The data transfer abnormality detection ability of the first server is normal;
If it is true execution result information that the verification result, which is used to indicate second execution result information, institute is determined
The data transfer abnormality detection ability for stating first server is abnormal.
Optionally, the processor 1001 is additionally operable to:
Obtain said program code for distorting information, and by said program code boil down to code packet;
The incidence relation between the first function in the code packet and data transfer interface is configured, and is passed through
The incidence relation between the code packet and the first function newly injects the said program code in the code packet
The data shift interface.
Optionally, the code packet is the jar packets of archive file jar formats;The processor 1001 is additionally operable to will be described
Jar packets are stored in the first server under the corresponding storage catalogue of archive file format;
The processor 1001 configures between the first function in the code packet and data transfer interface
Incidence relation, including:
Configuration file is obtained, the configuration file is used to record the injection for the code packet for newly injecting the data transfer interface
Information;
The injection information of the jar packets under the storage catalogue, the injection information are added in the configuration file
The program code for being used to indicate the jar packets is infused in the first function and second letter in data transfer interface
Between number, the execution priority of the first function is more than the execution priority of said program code, and said program code is held
Row major grade is more than the execution priority of the second function.
Optionally, the processing result information includes adding to actual data transfer parameters for the second server return
Ciphertext after close, first execution result information include that the actual data obtained after the ciphertext is decrypted turn
Shifting parameter, second execution result information include distorting the rear acquired data forged to the actual data transfer parameters
Transfer parameters, the data transfer parameters of the forgery are different from the actual data transfer parameters.
It should be noted that specific implementation procedure may refer to illustrating for embodiment of the method shown in Fig. 2-Fig. 4, herein
Without repeating.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in computer read/write memory medium
In, which includes the flow of the embodiment such as above-mentioned each method when being executed.Wherein, the storage medium can be magnetic disc,
CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access
Memory, RAM) etc..
Claims (15)
1. a kind of data processing method is applied to first server, which is characterized in that including:
The processing result information that second server is directed to data transfer request feedback is received, the data transfer request is described the
One server is sent to the second server;
Corresponding first execution result information of the processing result information is generated based on data transfer interface, and according to the data
Program code in transfer interface for distorting information, first execution result information is distorted and is believed for the second implementing result
Breath;
Transfer interface generates the corresponding verification result of second execution result information based on the data, and according to the verification
As a result determine that the data of the first server shift abnormality detection ability.
2. the method as described in claim 1, which is characterized in that described to generate the handling result letter based on data transfer interface
Corresponding first execution result information is ceased, and the program code in interface for distorting information is shifted according to the data, by institute
The first execution result information is stated to distort as the second execution result information, including:
The first function in interface is shifted based on data to handle the processing result information, obtains the handling result letter
Cease corresponding first execution result information;
Shift based on the data for distorting the program code of information in interface, by first execution result information distort for
Second execution result information, said program code are the codes newly injected in the data transfer interface.
3. method as claimed in claim 2, which is characterized in that the interface of transfer based on the data generates described second and holds
The corresponding verification result of row result information, including:
The second function shifted based on the data in interface carries out verification processing to second execution result information, generates institute
The corresponding verification result of the second execution result information is stated, whether the verification result is used to indicate second execution result information
For true execution result information.
4. method as claimed in claim 3, which is characterized in that described to determine the first server according to the verification result
Data shift abnormality detection ability, including:
If it is not true execution result information that the verification result, which is used to indicate second execution result information, described in determination
The data transfer abnormality detection ability of first server is normal;
If it is true execution result information that the verification result, which is used to indicate second execution result information, described is determined
The data transfer abnormality detection ability of one server is abnormal.
5. method as described in claim 3 or 4, which is characterized in that the method further includes:
Obtain said program code for distorting information, and by said program code boil down to code packet;
The incidence relation between the first function in the code packet and data transfer interface is configured, and by described
The incidence relation between code packet and the first function, described in the said program code in the code packet newly injection
Data shift interface.
6. method as claimed in claim 5, which is characterized in that the code packet is the jar packets of archive file jar formats;Institute
The method of stating further includes:
The jar packets are stored in the first server under the corresponding storage catalogue of archive file format;
Incidence relation between the first function configured in the code packet and data transfer interface, including:
Configuration file is obtained, the configuration file is used to record the injection letter for the code packet for newly injecting the data transfer interface
Breath;
The injection information of the jar packets under the storage catalogue is added in the configuration file, the injection information is used for
Indicate the first function that the program code of the jar packets is infused in data transfer interface and the second function it
Between, the execution priority of the first function is more than the execution priority of said program code, and the execution of said program code is excellent
First grade is more than the execution priority of the second function.
7. the method as described in claim 1, which is characterized in that the processing result information includes that the second server returns
To the encrypted ciphertext of actual data transfer parameters, first execution result information includes that the ciphertext is decrypted
The actual data transfer parameters obtained afterwards, second execution result information include to the actual data transfer ginseng
Number distorts the rear acquired data transfer parameters forged, and the data transfer parameters of the forgery are joined with the actual data transfer
Number is different.
8. a kind of data processing equipment is applied to first server, which is characterized in that including:
Receiving module, the processing result information of data transfer request feedback is directed to for receiving second server, and the data turn
It is that the first server is sent to the second server to move request;
Information distorts module, for generating the corresponding first implementing result letter of the processing result information based on data transfer interface
Breath, and the program code in interface for distorting information is shifted according to the data, first execution result information is distorted
For the second execution result information;
Authentication module generates the corresponding verification result of second execution result information for transfer interface based on the data,
And determine that the data of the first server shift abnormality detection ability according to the verification result.
9. device as claimed in claim 8, which is characterized in that described information distorts module and includes:
Processing unit handles the processing result information for shifting the first function in interface based on data, obtains
Corresponding first execution result information of the processing result information;
Unit is distorted, for shifting the program code in interface for distorting information based on the data, described first is executed
Result information is distorted as the second execution result information, and said program code is the code newly injected in the data transfer interface.
10. device as claimed in claim 9, which is characterized in that the authentication module shifts interface generation based on the data
The corresponding verification result of second execution result information specifically includes:
The second function shifted based on the data in interface carries out verification processing to second execution result information, generates institute
The corresponding verification result of the second execution result information is stated, whether the verification result is used to indicate second execution result information
For true execution result information.
11. device as claimed in claim 10, which is characterized in that the authentication module is according to described in verification result determination
The data transfer abnormality detection ability of first server specifically includes:
If it is not true execution result information that the verification result, which is used to indicate second execution result information, described in determination
The data transfer abnormality detection ability of first server is normal;
If it is true execution result information that the verification result, which is used to indicate second execution result information, described is determined
The data transfer abnormality detection ability of one server is abnormal.
12. the device as described in claim 10 or 11, which is characterized in that described device further includes:
Code packet acquisition module, for obtaining the said program code for distorting information, and by said program code boil down to
Code packet;
Configuration module, for configuring being associated between the code packet and the first function in data transfer interface
System, and by the incidence relation between the code packet and the first function, by the described program in the code packet
Code newly injects the data transfer interface.
13. device as claimed in claim 12, which is characterized in that the code packet is the jar packets of archive file jar formats;
Described device further includes:
Memory module, for the jar packets to be stored in the corresponding storage catalogue of archive file format in the first server
Under;
The configuration module includes:
Acquiring unit, for obtaining configuration file, the configuration file is used to record the generation for newly injecting the data transfer interface
The injection information of code packet;
Adding device, the injection information for adding the jar packets under the storage catalogue in the configuration file are described
The program code that injection information is used to indicate the jar packets is infused in the data and shifts the first function and institute in interface
Between stating second function, the execution priority of the first function is more than the execution priority of said program code, described program
The execution priority of code is more than the execution priority of the second function.
14. a kind of first server, which is characterized in that including:Processor and memory;
The processor is connected with memory, wherein the memory is for storing program code, and the processor is for calling
Said program code, to execute such as claim 1-7 any one of them methods.
15. a kind of computer storage media, which is characterized in that the computer storage media is stored with computer program, described
Computer program includes program instruction, and described program is instructed when being executed by a processor, executed such as any one of claim 1-7 institutes
The method stated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810541810.6A CN108763934B (en) | 2018-05-30 | 2018-05-30 | Data processing method and device, storage medium and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810541810.6A CN108763934B (en) | 2018-05-30 | 2018-05-30 | Data processing method and device, storage medium and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108763934A true CN108763934A (en) | 2018-11-06 |
CN108763934B CN108763934B (en) | 2020-02-28 |
Family
ID=64004642
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810541810.6A Active CN108763934B (en) | 2018-05-30 | 2018-05-30 | Data processing method and device, storage medium and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108763934B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111445333A (en) * | 2020-03-26 | 2020-07-24 | 腾讯科技(深圳)有限公司 | Block generation method and device, computer equipment and storage medium |
CN112329035A (en) * | 2020-11-02 | 2021-02-05 | 成都中科大旗软件股份有限公司 | Method, system and storage medium for analyzing, encrypting and decrypting based on jar program |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1751324A (en) * | 2003-02-21 | 2006-03-22 | 瑞士电信流动电话公司 | Method and system for detecting possible frauds in payment transactions |
US7757215B1 (en) * | 2006-04-11 | 2010-07-13 | Oracle America, Inc. | Dynamic fault injection during code-testing using a dynamic tracing framework |
CN102833270A (en) * | 2012-09-18 | 2012-12-19 | 山石网科通信技术(北京)有限公司 | Method and device for detecting SQL (structured query language) injection attacks and firewall with device |
CN103823751A (en) * | 2013-12-13 | 2014-05-28 | 国家计算机网络与信息安全管理中心 | Counterfeit application program monitoring method based on characteristic implantation |
CN103942714A (en) * | 2014-05-05 | 2014-07-23 | 携程计算机技术(上海)有限公司 | Payment method and payment device |
CN104574088A (en) * | 2015-02-04 | 2015-04-29 | 华为技术有限公司 | Payment authorization method and device |
CN105260660A (en) * | 2015-09-14 | 2016-01-20 | 百度在线网络技术(北京)有限公司 | Monitoring method, device and system of intelligent terminal payment environment |
CN105471819A (en) * | 2014-08-19 | 2016-04-06 | 腾讯科技(深圳)有限公司 | Account abnormity detection method and account abnormity detection device |
CN105631668A (en) * | 2015-11-27 | 2016-06-01 | 中国银联股份有限公司 | Payment anomaly detection method and system |
CN105843609A (en) * | 2016-03-18 | 2016-08-10 | 浪潮软件集团有限公司 | MVC frame based on Spring and MyBatis |
CN106790292A (en) * | 2017-03-13 | 2017-05-31 | 摩贝(上海)生物科技有限公司 | The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis |
-
2018
- 2018-05-30 CN CN201810541810.6A patent/CN108763934B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1751324A (en) * | 2003-02-21 | 2006-03-22 | 瑞士电信流动电话公司 | Method and system for detecting possible frauds in payment transactions |
US7757215B1 (en) * | 2006-04-11 | 2010-07-13 | Oracle America, Inc. | Dynamic fault injection during code-testing using a dynamic tracing framework |
CN102833270A (en) * | 2012-09-18 | 2012-12-19 | 山石网科通信技术(北京)有限公司 | Method and device for detecting SQL (structured query language) injection attacks and firewall with device |
CN103823751A (en) * | 2013-12-13 | 2014-05-28 | 国家计算机网络与信息安全管理中心 | Counterfeit application program monitoring method based on characteristic implantation |
CN103942714A (en) * | 2014-05-05 | 2014-07-23 | 携程计算机技术(上海)有限公司 | Payment method and payment device |
CN105471819A (en) * | 2014-08-19 | 2016-04-06 | 腾讯科技(深圳)有限公司 | Account abnormity detection method and account abnormity detection device |
CN104574088A (en) * | 2015-02-04 | 2015-04-29 | 华为技术有限公司 | Payment authorization method and device |
CN105260660A (en) * | 2015-09-14 | 2016-01-20 | 百度在线网络技术(北京)有限公司 | Monitoring method, device and system of intelligent terminal payment environment |
CN105631668A (en) * | 2015-11-27 | 2016-06-01 | 中国银联股份有限公司 | Payment anomaly detection method and system |
CN105843609A (en) * | 2016-03-18 | 2016-08-10 | 浪潮软件集团有限公司 | MVC frame based on Spring and MyBatis |
CN106790292A (en) * | 2017-03-13 | 2017-05-31 | 摩贝(上海)生物科技有限公司 | The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis |
Non-Patent Citations (1)
Title |
---|
周虎等: "《基于SOAP 的Web 服务中的异常处理方法》", 《计算机工程与设计》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111445333A (en) * | 2020-03-26 | 2020-07-24 | 腾讯科技(深圳)有限公司 | Block generation method and device, computer equipment and storage medium |
CN111445333B (en) * | 2020-03-26 | 2023-12-08 | 腾讯科技(深圳)有限公司 | Block generation method, device, computer equipment and storage medium |
CN112329035A (en) * | 2020-11-02 | 2021-02-05 | 成都中科大旗软件股份有限公司 | Method, system and storage medium for analyzing, encrypting and decrypting based on jar program |
CN112329035B (en) * | 2020-11-02 | 2022-12-27 | 成都中科大旗软件股份有限公司 | Method, system and storage medium for analyzing, encrypting and decrypting based on jar program |
Also Published As
Publication number | Publication date |
---|---|
CN108763934B (en) | 2020-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7225413B2 (en) | Secure autofill of forms with on-demand application to generate virtual numbers for contactless cards | |
US11392940B2 (en) | Multi-approval system using M of N keys to perform an action at a customer device | |
CN104375836B (en) | A kind of method and device of displaying screen locking window | |
US20150163186A1 (en) | Launching a client application based on a message | |
US10069808B2 (en) | Methods and systems for providing a customized network | |
CN106487511A (en) | Identity identifying method and device | |
CN104598793A (en) | Fingerprint authentication method and fingerprint authentication device | |
US9756031B1 (en) | Portable access to auditing information | |
WO2020081105A1 (en) | Methods and systems for providing a customized network | |
CN108763934A (en) | Data processing method and device, storage medium, server | |
CN107957871A (en) | A kind of front and back end synchronization canonical method of calibration based on JSR303 | |
CN106778193B (en) | Client and UI interaction method | |
CN105592033B (en) | trusted service management system and method | |
CN110210831B (en) | Office examination and approval method and system based on data short message technology | |
CN113987574A (en) | Block chain private transaction method, device, equipment and readable storage medium | |
CN105718314A (en) | Event execution method, device and system | |
CN109801050A (en) | A kind of mobile payment SDK and method of payment for online store | |
CN104348807B (en) | Safety information interaction method based on customizable browser | |
US20230418923A1 (en) | Techniques to perform dynamic call center authentication utilizing a contactless card | |
US20230419295A1 (en) | Mobile web browser authentication and checkout using a contactless card | |
WO2017155874A1 (en) | Methods and systems for providing a customized network | |
Khan et al. | Secure digital wallet by using QR code: mapping of mobile payment in partially connected environment | |
CN116016632A (en) | Resource collection device binding method and device based on social application and storage medium | |
CN106059773B (en) | Digital signature method and system | |
TWM622833U (en) | Invoicing Automation System |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |