CN108763934A - Data processing method and device, storage medium, server - Google Patents

Data processing method and device, storage medium, server Download PDF

Info

Publication number
CN108763934A
CN108763934A CN201810541810.6A CN201810541810A CN108763934A CN 108763934 A CN108763934 A CN 108763934A CN 201810541810 A CN201810541810 A CN 201810541810A CN 108763934 A CN108763934 A CN 108763934A
Authority
CN
China
Prior art keywords
result information
server
data transfer
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810541810.6A
Other languages
Chinese (zh)
Other versions
CN108763934B (en
Inventor
孙江凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201810541810.6A priority Critical patent/CN108763934B/en
Publication of CN108763934A publication Critical patent/CN108763934A/en
Application granted granted Critical
Publication of CN108763934B publication Critical patent/CN108763934B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Abstract

The application discloses a kind of data processing method and device, storage medium, server, the wherein data processing method include:The processing result information that second server is directed to data transfer request feedback is received, the data transfer request is that the first server is sent to the second server;Corresponding first execution result information of the processing result information is generated based on data transfer interface, and the program code in interface for distorting information is shifted according to the data, first execution result information is distorted as the second execution result information;Transfer interface generates the corresponding verification result of second execution result information based on the data, and determines that the data of the first server shift abnormality detection ability according to the verification result.Using the technical solution of the application, payment safety can be improved.

Description

Data processing method and device, storage medium, server
Technical field
The present invention relates to Internet technical field more particularly to a kind of data processing method and device, storage medium, services Device.
Background technology
With the development of mobile payment, the safety of payment in payment process increasingly attracts attention, in order to avoid hacker Information in payment process is distorted, it will usually be arranged in the server abnormal to the various payments occurred in payment process The flow being detected, if server detects that payment is abnormal, alerted or interrupt payment flow etc..But it is logical The payment abnormality detection flow being often arranged in the server is also due to a variety of causes breaks down, for example even if payment occurs It is abnormal, it is also not detected and, this is greatly lowered the safety of payment process.
Invention content
A kind of data processing method of offer of the embodiment of the present invention and device, storage medium, server, can be by holding by first Row result information is distorted as the second execution result information, realizes the determination to the data exception detectability of first server, from And improve payment safety.
In a first aspect, an embodiment of the present invention provides a kind of data processing methods, including:
The processing result information that second server is directed to data transfer request feedback is received, the data transfer request is institute It states first server and is sent to the second server;
Corresponding first execution result information of the processing result information is generated based on data transfer interface, and according to described Program code in data transfer interface for distorting information, first execution result information is distorted as the second implementing result Information;
Transfer interface generates the corresponding verification result of second execution result information based on the data, and according to described Verification result determines the data transfer abnormality detection ability of the first server.
It is described that the processing result information corresponding first is generated based on data transfer interface in a kind of possible design Execution result information, and the program code in interface for distorting information is shifted according to the data, execute knot by described first Fruit information is distorted as the second execution result information, including:
The first function in interface is shifted based on data to handle the processing result information, obtains the processing knot Corresponding first execution result information of fruit information;
The program code in interface for distorting information is shifted based on the data, and first execution result information is usurped It is changed to the second execution result information, said program code is the code newly injected in the data transfer interface.
In a kind of possible design, the interface of transfer based on the data generates second execution result information pair The verification result answered, including:
The second function shifted based on the data in interface carries out verification processing to second execution result information, raw At the corresponding verification result of second execution result information, the verification result is used to indicate second execution result information Whether it is true execution result information.
It is described to determine that the data transfer of the first server is different according to the verification result in a kind of possible design Normal detectability, including:
If it is not true execution result information that the verification result, which is used to indicate second execution result information, determine The data transfer abnormality detection ability of the first server is normal;
If it is true execution result information that the verification result, which is used to indicate second execution result information, institute is determined The data transfer abnormality detection ability for stating first server is abnormal.
In a kind of possible design, the method further includes:
Obtain said program code for distorting information, and by said program code boil down to code packet;
The incidence relation between the first function in the code packet and data transfer interface is configured, and is passed through The incidence relation between the code packet and the first function newly injects the said program code in the code packet The data shift interface.
In a kind of possible design, the code packet is the jar packets of archive file jar formats;The method further includes:
The jar packets are stored in the first server under the corresponding storage catalogue of archive file format;
Incidence relation between the first function configured in the code packet and data transfer interface, packet It includes:
Configuration file is obtained, the configuration file is used to record the injection for the code packet for newly injecting the data transfer interface Information;
The injection information of the jar packets under the storage catalogue, the injection information are added in the configuration file The program code for being used to indicate the jar packets is infused in the first function and second letter in data transfer interface Between number, the execution priority of the first function is more than the execution priority of said program code, and said program code is held Row major grade is more than the execution priority of the second function.
In a kind of possible design, the processing result information includes the second server return to actual number According to the encrypted ciphertext of transfer parameters, first execution result information include obtained after the ciphertext is decrypted described in Actual data transfer parameters, second execution result information include gained after being distorted to the actual data transfer parameters To the data transfer parameters of forgery, the data transfer parameters of the forgery are different from the actual data transfer parameters.
Second aspect, the embodiment of the present invention provide a kind of data processing equipment, are applied to first server, including:
Receiving module is directed to the processing result information of data transfer request feedback, the number for receiving second server It is that the first server is sent to the second server according to transfer request;
Information distorts module, and knot is executed for generating the processing result information corresponding first based on data transfer interface Fruit information, and the program code in interface for distorting information is shifted according to the data, by first execution result information It distorts as the second execution result information;
Authentication module generates the corresponding verification knot of second execution result information for transfer interface based on the data Fruit, and determine that the data of the first server shift abnormality detection ability according to the verification result.
In a kind of possible design, described information distorts module and includes:
Processing unit is handled the processing result information for shifting the first function in interface based on data, Obtain corresponding first execution result information of the processing result information;
Unit is distorted, for shifting the program code in interface for distorting information based on the data, by described first Execution result information is distorted as the second execution result information, and said program code is the generation newly injected in the data transfer interface Code.
In a kind of possible design, the authentication module shifts interface generation described second and executes knot based on the data The corresponding verification result of fruit information specifically includes:
The second function shifted based on the data in interface carries out verification processing to second execution result information, raw At the corresponding verification result of second execution result information, the verification result is used to indicate second execution result information Whether it is true execution result information.
In a kind of possible design, the authentication module determines the number of the first server according to the verification result It is specifically included according to transfer abnormality detection ability:
If it is not true execution result information that the verification result, which is used to indicate second execution result information, determine The data transfer abnormality detection ability of the first server is normal;
If it is true execution result information that the verification result, which is used to indicate second execution result information, institute is determined The data transfer abnormality detection ability for stating first server is abnormal.
In a kind of possible design, described device further includes:
Code packet acquisition module, for obtaining the said program code for distorting information, and by said program code pressure It is condensed to code packet;
Configuration module, for configuring the pass between the first function in the code packet and data transfer interface Connection relationship, and by the incidence relation between the code packet and the first function, described in the code packet Program code newly injects the data transfer interface.
In a kind of possible design, the code packet is the jar packets of archive file jar formats;Described device further includes:
Memory module, for the jar packets to be stored in the corresponding storage of archive file format in the first server Under catalogue;
The configuration module includes:
Acquiring unit, for obtaining configuration file, the configuration file newly injects the data transfer interface for recording Code packet injection information;
Adding device, the injection information for adding the jar packets under the storage catalogue in the configuration file, The program code that the injection information is used to indicate the jar packets is infused in the first function in the data transfer interface Between the second function, the execution priority of the first function is more than the execution priority of said program code, described The execution priority of program code is more than the execution priority of the second function.
In a kind of possible design, the processing result information includes the second server return to actual number According to the encrypted ciphertext of transfer parameters, first execution result information include obtained after the ciphertext is decrypted described in Actual data transfer parameters, second execution result information include gained after being distorted to the actual data transfer parameters To the data transfer parameters of forgery, the data transfer parameters of the forgery are different from the actual data transfer parameters.
The third aspect, the embodiment of the present invention provide a kind of first server, including processor and memory;
The processor is connected with memory, wherein for storing program code, the processor is used for the memory Said program code is called, to execute the method described in first aspect.
Fourth aspect, the embodiment of the present invention provide a kind of computer storage media, which is characterized in that the computer storage It includes program instruction that media storage, which has computer program, the computer program, and described program instructs when being executed by a processor, Execute the method described in first aspect.
In the embodiment of the present invention, first server shifts the program code in interface for distorting information according to data, will First execution result information is distorted as the second execution result information, and analog information distorts process, then based on data transfer interface life At the corresponding verification result of the second execution result information, to determine that the data transfer of first server is different according to verification result Normal detectability improves payment safety.
Description of the drawings
In order to illustrate the embodiment of the present invention or technical solution in the prior art, embodiment or the prior art will be retouched below Attached drawing needed in stating is briefly described.
Fig. 1 is a kind of system architecture diagram provided in an embodiment of the present invention;
Fig. 2 is a kind of flow chart of data processing method provided in an embodiment of the present invention;
Fig. 3 is the flow chart of another data processing method provided in an embodiment of the present invention;
Fig. 4 is a kind of payment interaction figure provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of data processing equipment provided in an embodiment of the present invention;
Fig. 6 is a kind of structural schematic diagram of first server provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention is described.
The first server of the embodiment of the present invention can be bank pre-machine, and second server can be bank server.
Fig. 1 is please referred to, is a kind of system architecture diagram provided in an embodiment of the present invention, as shown, the system architecture includes Terminal device, first server and second server, terminal device can shift client with installation data, for example pay client End is used for trigger data transfer request, and receives data and shift result.Terminal device may include PC, notebook Computer, smart mobile phone, tablet computer, car-mounted terminal and portable wearable device etc..
First server can be bank pre-machine, and bank pre-machine is to realize that bank's traditional business is expanded outward generally to adopt A kind of intermediate equipment, the major function that it is realized have message authentication, network communication, transaction data format conversion, transaction flow Water record, transaction pretreatment, transaction monitoring and transaction data statistics etc..
Second server can be bank server, and a large number of users data are stored in bank server, realize that data turn The core process of shifting.Generally for the safety for ensureing user data, only allow bank pre-machine according to the report of specific format Text with second server into row data communication, without allowing third party's injecting codes in bank server test etc..
Terminal device can be with first server into row data communication, and first server can be with second server into line number According to communication.Terminal device can to first server trigger data transfer request, the first server according to data transfer request, With second server into row data communication, realize data forwarding function, the data forwarding function include but not limited to payment function, Debit facility etc..Second server returns to processing result information to first server again, for example, the processing result information can be with The ciphertext after actual payment amount is encrypted, the processing result information that first server returns to second server into Row processing to obtain the first execution result information, for example is decrypted ciphertext, obtains actual payment amount, the first clothes Being engaged in device can be to terminal device returned data transfer result information, for example, returned data shifts according to the first execution result information The data of success or failure shift result information.
In order to determine that the data of first server shift abnormality detection ability in the embodiment of the present invention, in first server Program code of the new injection for distorting information distorts correct first execution result information for mistake according to the program code The second execution result information accidentally, i.e. analog information distorts process, further generates this second execution result information is corresponding and test Card according to verification result as a result, so that determine that the data of first server shift abnormality detection ability.If for example, verification result It is true execution result information to indicate the second execution result information not, it is determined that the data of first server shift abnormality detection Ability is normal, if it is true execution result information that verification result, which is used to indicate the second execution result information, it is determined that the first clothes The data transfer abnormality detection ability of business device is abnormal.It can find the data transfer of first server in time through the above way Whether abnormality detection ability is normal, improves payment safety.
Below in conjunction with attached drawing 2- attached drawings 4, describe in detail to data processing method provided in an embodiment of the present invention.
Fig. 2 is referred to, for an embodiment of the present invention provides a kind of flow diagrams of data processing method.As shown in Fig. 2, The data processing method of the embodiment of the present invention may comprise steps of S101- steps S103.
S101, receives the processing result information that second server is directed to data transfer request feedback, and the data transfer is asked First server described in Seeking Truth is sent to the second server;
In one embodiment, first server receives data transfer request, which can be that payment is asked It asks, optionally, data transfer request includes data transfer parameters, such as payment amount, collecting account, payment account etc.. First server is transmitted to data transfer request to second server, after second server receives the data transfer request, i.e., Data transfer operation can be carried out according to the data transfer request.For example, the data transfer request shifts d for asking from A accounts For the payment amount of quantity to B accounts, then second server deducts the d amount of money from A accounts, and the d amount of money is added in B accounts.
After second server completes data transfer operation, i.e., processing result information is fed back into first server, it is optional , in order to ensure the safety of data communication, processing result information can be transmitted by way of encrypted message.Than If processing result information can be the ciphertext after actual data transfer parameters are encrypted, data transfer parameters can be real The payment amount on border.
S102 generates corresponding first execution result information of the processing result information, and root based on data transfer interface The program code in interface for distorting information is shifted according to the data, first execution result information is distorted and is held for second Row result information;
In one embodiment, based on the data transfer interface in first server, to generate the processing result information corresponding First execution result information, for example, operation is decrypted to encrypted message (i.e. ciphertext), to obtain in the encrypted message Including actual data transfer parameters.Optionally, the handleResponse function pairs second in interface are shifted by data The processing result information that server returns is decrypted, to obtain actual data included in processing result information Transfer parameters.Wherein, the input parameter of handleResponse functions is encrypted message (i.e. this hair that second server returns Ciphertext mentioned by bright embodiment), the return field of handleResponse functions is the message after decryption, i.e., encrypted message In entrained actual data transfer parameters, such as actual payment amount.Optionally, the cipher mode of message can be Base64 is encrypted, then needs to be decrypted using corresponding Base64 manner of decryption, optionally, the message after decryption can have 2 A field, a field can be the actual data transfer parameters entrained by the encrypted message, such as actual payment gold Volume, another field can be the signatures of bank.
Data in order to verify first server shift abnormality detection ability, and further basis is newly injected data transfer and connect Program code in mouthful for distorting information, the first execution result information is distorted as the second execution result information, such as first Execution result information is actual data transfer parameters, then the actual data transfer parameters are distorted to the data transfer for forgery Parameter, wherein actual data transfer parameters are different with the data transfer parameters of forgery.
Continue with above-mentioned handleResponse functions as an example, the program code newly injected can be with HandleResponse functions are as code injection point, i.e., by reality entrained in the return field of handleResponse functions The payment amount on border distorts the payment amount for forgery, then the payment amount of forgery is shifted back to data in interface and continues to hold Row, to realize the determination that the data of first server are shifted with abnormality detection ability.
S103 shifts interface and generates the corresponding verification result of second execution result information, and root based on the data Determine that the data of the first server shift abnormality detection ability according to the verification result.
In one embodiment, the first execution result information is distorted after the second execution result information, to continue based on number The corresponding verification result of the second execution result information is generated according to transfer interface.To determine first server according to verification result Data shift abnormality detection ability.Such as before unimplanted program code, handleResponse functions will return to field In actual payment amount back to data transfer interface in handleRequest functions continue to execute, to pass through HandleRequest functions generate verification result.Then after injecting program code, the payment amount of the forgery after distorting is returned The handleRequest functions in interface are shifted to data to continue to execute, to generate verification knot by handleRequest functions Fruit.If final verification result indicates that the second execution result information is not true execution result information, it is determined that first service The data transfer abnormality detection ability of device is normal, i.e., first server can be detected the payment of appearance extremely, such as the The response message that one server returns to result=88412002&res_info=second servers is wrong:The exception of amount differ Mistake, it is determined that first server can be detected the payment of appearance extremely.If final verification result instruction second is held Row result information is true execution result information, it is determined that the data transfer abnormality detection ability of first server is abnormal, I.e. first server can not be detected the payment of appearance extremely, and failure occurs in first server, in this way can be timely It was found that whether first server data transfer abnormality detection ability is normal, the safety of payment is improved.
In the embodiment of the present invention, first server shifts the program code in interface for distorting information according to data, will First execution result information is distorted as the second execution result information, and analog information distorts process, then based on data transfer interface life At the corresponding verification result of the second execution result information, to determine that the data transfer of first server is different according to verification result Normal detectability improves payment safety.
Fig. 3 is referred to, for an embodiment of the present invention provides the flow diagrams of another data processing method.Such as Fig. 3 institutes Show, the data processing method of the embodiment of the present invention may comprise steps of S201- steps S206.
S201, obtains said program code for distorting information, and by said program code boil down to code packet;
In one embodiment, determine that the data transfer abnormality detection ability for needing to detect, data shift abnormality detection energy Whether whether power includes but not limited to be consistent the ability being detected to payment amount, be consistent the energy being detected to Send only Account Power etc., whether the embodiment of the present invention is to be consistent to payment amount the ability that is detected as an example.Then number is analyzed According to the code of transfer interface, the data transfer abnormality detection ability detected as needed determines that needing to be infused in data transfer connects Decanting point in mouthful.For example, it is the payment for detecting second server and returning to need the data detected transfer abnormality detection ability When payment amount in the data transfer request that the amount of money is sent with first server differs, whether first server will detect that The exception of data transfer.
The program code of data transfer interface is analyzed, the toBankPay functions under class PayTranHandler can call HandleRequest functions under RequestCommunicator classes, and handleRequest functions can call HandleResponse functions.Wherein, the input parameter of handleResponse functions is bank server (i.e. second service Device) return to the encrypted message of actual payment amount (ciphertext), the return field of handleResponse functions (passes through Cross handleResponse functions treated the first execution result information) it is actual payment amount after decryption, therefore it is right For the different data transfer abnormality detection ability of payment amount, handleResponse functions are exactly one most suitable Code injection point.
The program code for distorting information is write, simulates and is distorted into row information, the embodiment of the present invention is for distorting information Program code by handleResponse functions return field in actual payment amount distort the payment amount for forgery, For example, actual payment amount is 1234, it is 4321 to be distorted, and then the payment amount return of the forgery after distorting is returned It goes, that is, replaces the return value of handleResponse functions.It is specific optional, build development environment first, and built The above-mentioned program code for distorting information is write under development environment.For example, research staff installs eclipse and aspectj Plug-in unit ajdt_2.2.3_for_eclipse_4.3.zip carries out writing for program code to build development environment.
Further, by the program code boil down to code packet for distorting information, optionally, the format of the code packet can be with It is archive file format jar packets, for example, above procedure code is packaged as aspectbank.jar.It is specific optional, In eclipse, file-export-jar file with aspectj support-aspectbank projects-are selected successively Finish, to the packing of completion code packet.
The code packet is stored in the first server under the corresponding storage catalogue of archive file format by S202;
In one embodiment, obtained code packet aspectbank.jar will be packaged and be stored in first server and filed Under the corresponding storage catalogue of file format, for example, code packet aspectbank.jar is put into the lib catalogues of first server, I.e./data/server/FastpayPre_install_auto/fastpay-boc-zh/sende r/lib.
S203 configures the incidence relation between the first function in the code packet and data transfer interface, And by the incidence relation between the code packet and the first function, by the said program code in the code packet Newly inject the data transfer interface.
In one embodiment, the first function in data transfer interface is that code packet needs the decanting point injected, this In continue with above-mentioned first function be handleResponse functions as an example.Configuration code packet and first function it Between incidence relation when, can support that the mode of configuration file is configured.It is specific optional, configuration file can be obtained, it should Configuration file is used to record the injection information for the code packet for newly injecting data transfer interface, further adds in the configuration file The injection information of aspectbank.jar under lib catalogues, the injection information is added to be used to indicate the program of aspectbank.jar packets Code injection is shifted in data between first function and second function in interface, that is, after having executed first function, by the first letter The first several execution result informations be input to newly inject the data transfer interface program code executed, obtain the second execution Result information, then the second execution result information is continued to execute back to second function, it verifies whether that abnormality processing can be carried out.? Before the program code of unimplanted aspectbank.jar packets, first function is executed, i.e., has executed knot by the first of first function Fruit information is continued to execute back to second function, and second function can be handleRequest functions.It is specific optional, it is new to add Aop.xml is configured, and indicates that new injection data shift the aspectbank.jar packets of interface by aop.xml configurations.Aop.xml matches Set the position for indicating aspectbank.jar packets injection.
After program code in aspectbank.jar packets is newly injected data transfer interface, you can restart first server Data transfer interface program, carry out data transferring test.It is specific optional, need the jar packets for downloading aspectj, the jar Some public classes and parameter defined in packet, load the jar packets of aspectj so that subsequent execution aspectbank.jar When program code in packet, the class and parameter in the jar packets of the aspectj can be called.Increase-javaagent:$ The Dynamic Weave parameter of ASPECT_LIB/aspectjweaver.jar, and the permission of super keepe sudo is set, to open The program of the data transfer interface of dynamic first server, carries out data transferring test.
S204, receives the processing result information that second server is directed to data transfer request feedback, and the data transfer is asked First server described in Seeking Truth is sent to the second server;
S205 generates corresponding first execution result information of the processing result information, and root based on data transfer interface The program code in interface for distorting information is shifted according to the data, first execution result information is distorted and is held for second Row result information;
S206 shifts interface and generates the corresponding verification result of second execution result information, and root based on the data Determine that the data of the first server shift abnormality detection ability according to the verification result.
Step of embodiment of the present invention S204-S206 please refers to the embodiment step S101-S103 of Fig. 1, and details are not described herein.
In the embodiment of the present invention, first server shifts the program code in interface for distorting information according to data, will First execution result information is distorted as the second execution result information, and analog information distorts process, then based on data transfer interface life At the corresponding verification result of the second execution result information, to determine that the data transfer of first server is different according to verification result Normal detectability improves payment safety.
Fig. 4 is please referred to, for a kind of flow interaction figure of payment abnormality detection provided in an embodiment of the present invention, the payment scene A kind of only citing of data transfer process, does not constitute the restriction to the embodiment of the present invention.As shown, bank pre-machine Can be above-mentioned first server, bank server can be above-mentioned second server, may include function in bank pre-machine 1, function 2 and function 3.
Terminal device initiates payment request to bank pre-machine, the function 3 of bank pre-machine to the payment request at Reason, and ask to pay to bank server.
Bank server returns to payment result message to bank pre-machine, which can be encrypted close Text includes actual payment amount in the ciphertext.
The function 1 of bank pre-machine handles the payment result message, for example decrypts the payment result message, obtains Actual payment amount.
Since in function 1, newly program code of the injection for distorting information will be obtained by executing the program code after decryption To actual payment amount distorted, and the payment amount after distorting is executed back to function 2.
Function 2 is verified according to the payment amount of return, for example determines whether the payment amount is true payment gold Volume, and payment result is returned to function 3, payment result can pay successfully or pay failure.If the payment that function 3 returns The result is that payment failure, and return to miscue:Payment amount is not inconsistent, then illustrates the data transfer abnormality detection of bank pre-machine Ability is normal.If the payment result that function 3 returns is to pay the data transfer abnormality detection energy for successfully illustrating bank pre-machine Power is abnormal.
Function 3 further returns to payment result to terminal device.
Fig. 5 is referred to, for an embodiment of the present invention provides a kind of structural schematic diagrams of data processing equipment.As shown in figure 5, The data processing equipment of the embodiment of the present invention may include:Code packet acquisition module 11, memory module 12, configuration module 13, receiving module 14, information distort module 15 and authentication module 16;
Code packet acquisition module 11, for obtaining the said program code for distorting information, and by said program code Boil down to code packet;
In one embodiment, determine that the data transfer abnormality detection ability for needing to detect, data shift abnormality detection energy Whether whether power includes but not limited to be consistent the ability being detected to payment amount, be consistent the energy being detected to Send only Account Power etc., whether the embodiment of the present invention is to be consistent to payment amount the ability that is detected as an example.Then number is analyzed According to the code of transfer interface, the data transfer abnormality detection ability detected as needed determines that needing to be infused in data transfer connects Decanting point in mouthful.For example, it is the payment for detecting second server and returning to need the data detected transfer abnormality detection ability When payment amount in the data transfer request that the amount of money is sent with first server differs, whether first server will detect that The exception of data transfer.
The program code of data transfer interface is analyzed, the toBankPay functions under class PayTranHandler can call HandleRequest functions under RequestCommunicator classes, and handleRequest functions can call HandleResponse functions.Wherein, the input parameter of handleResponse functions is bank server (i.e. second service Device) return to the encrypted message of actual payment amount (ciphertext), the return field of handleResponse functions (passes through Cross handleResponse functions treated the first execution result information) it is actual payment amount after decryption, therefore it is right For the different data transfer abnormality detection ability of payment amount, handleResponse functions are exactly one most suitable Code injection point.
The program code for distorting information is write, simulates and is distorted into row information, the embodiment of the present invention is for distorting information Program code by handleResponse functions return field in actual payment amount distort the payment amount for forgery, For example, actual payment amount is 1234, it is 4321 to be distorted, and then the payment amount return of the forgery after distorting is returned It goes, that is, replaces the return value of handleResponse functions.It is specific optional, build development environment first, and built The above-mentioned program code for distorting information is write under development environment.For example, research staff installs eclipse and aspectj Plug-in unit ajdt_2.2.3_for_eclipse_4.3.zip carries out writing for program code to build development environment.
Further, by the program code boil down to code packet for distorting information, optionally, the format of the code packet can be with It is archive file format jar packets, for example, above procedure code is packaged as aspectbank.jar.It is specific optional, In eclipse, file-export-jar file with aspectj support-aspectbank projects-are selected successively Finish, to the packing of completion code packet.
Memory module 12, for the jar packets to be stored in the first server, archive file format is corresponding to deposit It stores up under catalogue;
In one embodiment, obtained code packet aspectbank.jar will be packaged and be stored in first server and filed Under the corresponding storage catalogue of file format, for example, code packet aspectbank.jar is put into the lib catalogues of first server, I.e./data/server/FastpayPre_install_auto/fastpay-boc-zh/sende r/lib.
Configuration module 13, for configure the code packet and the data transfer interface in the first function between Incidence relation, and by the incidence relation between the code packet and the first function, by the institute in the code packet It states program code and newly injects the data transfer interface.
Optionally, as shown, configuration module 13 may include acquiring unit 130 and adding device 131;
Acquiring unit 130, for obtaining configuration file, the configuration file newly injects the data transfer and connects for recording The injection information of the code packet of mouth;
Adding device 131, the injection for adding the jar packets under the storage catalogue in the configuration file are believed Breath, the program code that the injection information is used to indicate the jar packets are infused in described first in the data transfer interface Between function and the second function, the execution priority of the first function is more than the execution priority of said program code, The execution priority of said program code is more than the execution priority of the second function.
In one embodiment, the first function in data transfer interface is that code packet needs the decanting point injected, this In continue with above-mentioned first function be handleResponse functions as an example.Configuration code packet and first function it Between incidence relation when, can support that the mode of configuration file is configured.It is specific optional, configuration file can be obtained, it should Configuration file is used to record the injection information for the code packet for newly injecting data transfer interface, further adds in the configuration file The injection information of aspectbank.jar under lib catalogues, the injection information is added to be used to indicate the program of aspectbank.jar packets Code injection is shifted in data between first function and second function in interface, that is, after having executed first function, by the first letter The first several execution result informations be input to newly inject the data transfer interface program code executed, obtain the second execution Result information, then the second execution result information is continued to execute back to second function, it verifies whether that abnormality processing can be carried out.? Before the program code of unimplanted aspectbank.jar packets, first function is executed, i.e., has executed knot by the first of first function Fruit information is continued to execute back to second function, and second function can be handleRequest functions.It is specific optional, it is new to add Aop.xml is configured, and indicates that new injection data shift the aspectbank.jar packets of interface by aop.xml configurations.Aop.xml matches Set the position for indicating aspectbank.jar packets injection.
After program code in aspectbank.jar packets is newly injected data transfer interface, you can restart first server Data transfer interface program, carry out data transferring test.It is specific optional, need the jar packets for downloading aspectj, the jar Some public classes and parameter defined in packet, load the jar packets of aspectj so that subsequent execution aspectbank.jar When program code in packet, the class and parameter in the jar packets of the aspectj can be called.Increase-javaagent:$ The Dynamic Weave parameter of ASPECT_LIB/aspectjweaver.jar, and the permission of super keepe sudo is set, to open The program of the data transfer interface of dynamic first server, carries out data transferring test.
Receiving module 14 is directed to the processing result information of data transfer request feedback for receiving second server, described Data transfer request is that the first server is sent to the second server;
In one embodiment, first server receives data transfer request, which can be that payment is asked It asks, optionally, data transfer request includes data transfer parameters, such as payment amount, collecting account, payment account etc.. First server is transmitted to data transfer request to second server, after second server receives the data transfer request, i.e., Data transfer operation can be carried out according to the data transfer request.For example, the data transfer request shifts d for asking from A accounts For the payment amount of quantity to B accounts, then second server deducts the d amount of money from A accounts, and the d amount of money is added in B accounts.
After second server completes data transfer operation, i.e., processing result information is fed back into first server, it is optional , in order to ensure the safety of data communication, processing result information can be transmitted by way of encrypted message.Than If processing result information can be the ciphertext after actual data transfer parameters are encrypted, data transfer parameters can be real The payment amount on border.
Information distorts module 15, is executed for generating the processing result information corresponding first based on data transfer interface Result information, and the program code in interface for distorting information is shifted according to the data, first implementing result is believed Breath is distorted as the second execution result information;
Optionally, as shown, it may include processing unit 150 and distorting unit 151 that information, which distorts module 15,;
Processing unit 150, at based on the first function in data transfer interface to the processing result information Reason, obtains corresponding first execution result information of the processing result information;
Unit 151 is distorted, for shifting based on the data for distorting the program code of information in interface, by described the One execution result information is distorted as the second execution result information, and said program code is newly injected in the data transfer interface Code.
In one embodiment, based on the data transfer interface in first server, to generate the processing result information corresponding First execution result information, for example, operation is decrypted to encrypted message (i.e. ciphertext), to obtain in the encrypted message Including actual data transfer parameters.Optionally, the handleResponse function pairs second in interface are shifted by data The processing result information that server returns is decrypted, to obtain actual data included in processing result information Transfer parameters.Wherein, the input parameter of handleResponse functions is encrypted message (i.e. this hair that second server returns Ciphertext mentioned by bright embodiment), the return field of handleResponse functions is the message after decryption, i.e., encrypted message In entrained actual data transfer parameters, such as actual payment amount.Optionally, the cipher mode of message can be Base64 is encrypted, then needs to be decrypted using corresponding Base64 manner of decryption, optionally, the message after decryption can have 2 A field, a field can be the actual data transfer parameters entrained by the encrypted message, such as actual payment gold Volume, another field can be the signatures of bank.
Data in order to verify first server shift abnormality detection ability, and further basis is newly injected data transfer and connect Program code in mouthful for distorting information, the first execution result information is distorted as the second execution result information, such as first Execution result information is actual data transfer parameters, then the actual data transfer parameters are distorted to the data transfer for forgery Parameter, wherein actual data transfer parameters are different with the data transfer parameters of forgery.
Continue with above-mentioned handleResponse functions as an example, the program code newly injected can be with HandleResponse functions are as code injection point, i.e., by reality entrained in the return field of handleResponse functions The payment amount on border distorts the payment amount for forgery, then the payment amount of forgery is shifted back to data in interface and continues to hold Row, to realize the determination that the data of first server are shifted with abnormality detection ability.
Authentication module 16 generates the corresponding verification of second execution result information for transfer interface based on the data As a result, and determining that the data of the first server shift abnormality detection ability according to the verification result.
In one embodiment, the first execution result information is distorted after the second execution result information, to continue based on number The corresponding verification result of the second execution result information is generated according to transfer interface.To determine first server according to verification result Data shift abnormality detection ability.Such as before unimplanted program code, handleResponse functions will return to field In actual payment amount back to data transfer interface in handleRequest functions continue to execute, to pass through HandleRequest functions generate verification result.Then after injecting program code, the payment amount of the forgery after distorting is returned The handleRequest functions in interface are shifted to data to continue to execute, to generate verification knot by handleRequest functions Fruit.If final verification result indicates that the second execution result information is not true execution result information, it is determined that first service The data transfer abnormality detection ability of device is normal, i.e., first server can be detected the payment of appearance extremely, such as the The response message that one server returns to result=88412002&res_info=second servers is wrong:The exception of amount differ Mistake, it is determined that first server can be detected the payment of appearance extremely.If final verification result instruction second is held Row result information is true execution result information, it is determined that the data transfer abnormality detection ability of first server is abnormal, I.e. first server can not be detected the payment of appearance extremely, and failure occurs in first server, in this way can be timely It was found that whether first server data transfer abnormality detection ability is normal, the safety of payment is improved.
In the embodiment of the present invention, first server shifts the program code in interface for distorting information according to data, will First execution result information is distorted as the second execution result information, and analog information distorts process, then based on data transfer interface life At the corresponding verification result of the second execution result information, to determine that the data transfer of first server is different according to verification result Normal detectability improves payment safety.
The embodiment of the present invention additionally provides a kind of computer storage media, and the computer storage media can be stored with more Item instructs, and described instruction is suitable for being loaded by processor and being executed the method and step such as above-mentioned Fig. 2-embodiment illustrated in fig. 4, specifically holds Row process may refer to illustrating for Fig. 2-embodiment illustrated in fig. 4, herein without repeating.
Fig. 6 is please referred to, is a kind of structural schematic diagram of first server provided in an embodiment of the present invention, as shown in fig. 6, institute Stating first server 1000 may include:At least one processor 1001, such as CPU, at least one communication interface 1003, storage Device 1004, at least one communication bus 1002.Wherein, communication bus 1002 is for realizing the connection communication between these components. Communication interface 1003 may include optionally standard wireline interface and wireless interface (such as WI-FI interface).Memory 1004 can be with It is high-speed RAM memory, can also be non-labile memory (non-volatile memory), for example, at least a magnetic Disk storage.Memory 1004 optionally can also be at least one storage device for being located remotely from aforementioned processor 1001.Such as Shown in Fig. 6, as may include in a kind of memory 1004 of computer storage media operating system, network communication module and Program instruction.
In first server 1000 shown in Fig. 6, what processor 1001 can be used for storing in load store device 1004 Program instruction, and specifically execute following operation:
The processing result information that second server is directed to data transfer request feedback is received, the data transfer request is institute It states first server and is sent to the second server;
Corresponding first execution result information of the processing result information is generated based on data transfer interface, and according to described Program code in data transfer interface for distorting information, first execution result information is distorted as the second implementing result Information;
Transfer interface generates the corresponding verification result of second execution result information based on the data, and according to described Verification result determines the data transfer abnormality detection ability of the first server.
Optionally, the processor 1001 generates the processing result information corresponding first based on data transfer interface and holds Row result information, and the program code in interface for distorting information is shifted according to the data, by first implementing result Information is distorted as the second execution result information, including:
The first function in interface is shifted based on data to handle the processing result information, obtains the processing knot Corresponding first execution result information of fruit information;
The program code in interface for distorting information is shifted based on the data, and first execution result information is usurped It is changed to the second execution result information, said program code is the code newly injected in the data transfer interface.
Optionally, the processor 1001 shifts interface and generates the second execution result information correspondence based on the data Verification result, including:
The second function shifted based on the data in interface carries out verification processing to second execution result information, raw At the corresponding verification result of second execution result information, the verification result is used to indicate second execution result information Whether it is true execution result information.
Optionally, the processor 1001 determines that the data of the first server shift exception according to the verification result Detectability, including:
If it is not true execution result information that the verification result, which is used to indicate second execution result information, determine The data transfer abnormality detection ability of the first server is normal;
If it is true execution result information that the verification result, which is used to indicate second execution result information, institute is determined The data transfer abnormality detection ability for stating first server is abnormal.
Optionally, the processor 1001 is additionally operable to:
Obtain said program code for distorting information, and by said program code boil down to code packet;
The incidence relation between the first function in the code packet and data transfer interface is configured, and is passed through The incidence relation between the code packet and the first function newly injects the said program code in the code packet The data shift interface.
Optionally, the code packet is the jar packets of archive file jar formats;The processor 1001 is additionally operable to will be described Jar packets are stored in the first server under the corresponding storage catalogue of archive file format;
The processor 1001 configures between the first function in the code packet and data transfer interface Incidence relation, including:
Configuration file is obtained, the configuration file is used to record the injection for the code packet for newly injecting the data transfer interface Information;
The injection information of the jar packets under the storage catalogue, the injection information are added in the configuration file The program code for being used to indicate the jar packets is infused in the first function and second letter in data transfer interface Between number, the execution priority of the first function is more than the execution priority of said program code, and said program code is held Row major grade is more than the execution priority of the second function.
Optionally, the processing result information includes adding to actual data transfer parameters for the second server return Ciphertext after close, first execution result information include that the actual data obtained after the ciphertext is decrypted turn Shifting parameter, second execution result information include distorting the rear acquired data forged to the actual data transfer parameters Transfer parameters, the data transfer parameters of the forgery are different from the actual data transfer parameters.
It should be noted that specific implementation procedure may refer to illustrating for embodiment of the method shown in Fig. 2-Fig. 4, herein Without repeating.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in computer read/write memory medium In, which includes the flow of the embodiment such as above-mentioned each method when being executed.Wherein, the storage medium can be magnetic disc, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..

Claims (15)

1. a kind of data processing method is applied to first server, which is characterized in that including:
The processing result information that second server is directed to data transfer request feedback is received, the data transfer request is described the One server is sent to the second server;
Corresponding first execution result information of the processing result information is generated based on data transfer interface, and according to the data Program code in transfer interface for distorting information, first execution result information is distorted and is believed for the second implementing result Breath;
Transfer interface generates the corresponding verification result of second execution result information based on the data, and according to the verification As a result determine that the data of the first server shift abnormality detection ability.
2. the method as described in claim 1, which is characterized in that described to generate the handling result letter based on data transfer interface Corresponding first execution result information is ceased, and the program code in interface for distorting information is shifted according to the data, by institute The first execution result information is stated to distort as the second execution result information, including:
The first function in interface is shifted based on data to handle the processing result information, obtains the handling result letter Cease corresponding first execution result information;
Shift based on the data for distorting the program code of information in interface, by first execution result information distort for Second execution result information, said program code are the codes newly injected in the data transfer interface.
3. method as claimed in claim 2, which is characterized in that the interface of transfer based on the data generates described second and holds The corresponding verification result of row result information, including:
The second function shifted based on the data in interface carries out verification processing to second execution result information, generates institute The corresponding verification result of the second execution result information is stated, whether the verification result is used to indicate second execution result information For true execution result information.
4. method as claimed in claim 3, which is characterized in that described to determine the first server according to the verification result Data shift abnormality detection ability, including:
If it is not true execution result information that the verification result, which is used to indicate second execution result information, described in determination The data transfer abnormality detection ability of first server is normal;
If it is true execution result information that the verification result, which is used to indicate second execution result information, described is determined The data transfer abnormality detection ability of one server is abnormal.
5. method as described in claim 3 or 4, which is characterized in that the method further includes:
Obtain said program code for distorting information, and by said program code boil down to code packet;
The incidence relation between the first function in the code packet and data transfer interface is configured, and by described The incidence relation between code packet and the first function, described in the said program code in the code packet newly injection Data shift interface.
6. method as claimed in claim 5, which is characterized in that the code packet is the jar packets of archive file jar formats;Institute The method of stating further includes:
The jar packets are stored in the first server under the corresponding storage catalogue of archive file format;
Incidence relation between the first function configured in the code packet and data transfer interface, including:
Configuration file is obtained, the configuration file is used to record the injection letter for the code packet for newly injecting the data transfer interface Breath;
The injection information of the jar packets under the storage catalogue is added in the configuration file, the injection information is used for Indicate the first function that the program code of the jar packets is infused in data transfer interface and the second function it Between, the execution priority of the first function is more than the execution priority of said program code, and the execution of said program code is excellent First grade is more than the execution priority of the second function.
7. the method as described in claim 1, which is characterized in that the processing result information includes that the second server returns To the encrypted ciphertext of actual data transfer parameters, first execution result information includes that the ciphertext is decrypted The actual data transfer parameters obtained afterwards, second execution result information include to the actual data transfer ginseng Number distorts the rear acquired data transfer parameters forged, and the data transfer parameters of the forgery are joined with the actual data transfer Number is different.
8. a kind of data processing equipment is applied to first server, which is characterized in that including:
Receiving module, the processing result information of data transfer request feedback is directed to for receiving second server, and the data turn It is that the first server is sent to the second server to move request;
Information distorts module, for generating the corresponding first implementing result letter of the processing result information based on data transfer interface Breath, and the program code in interface for distorting information is shifted according to the data, first execution result information is distorted For the second execution result information;
Authentication module generates the corresponding verification result of second execution result information for transfer interface based on the data, And determine that the data of the first server shift abnormality detection ability according to the verification result.
9. device as claimed in claim 8, which is characterized in that described information distorts module and includes:
Processing unit handles the processing result information for shifting the first function in interface based on data, obtains Corresponding first execution result information of the processing result information;
Unit is distorted, for shifting the program code in interface for distorting information based on the data, described first is executed Result information is distorted as the second execution result information, and said program code is the code newly injected in the data transfer interface.
10. device as claimed in claim 9, which is characterized in that the authentication module shifts interface generation based on the data The corresponding verification result of second execution result information specifically includes:
The second function shifted based on the data in interface carries out verification processing to second execution result information, generates institute The corresponding verification result of the second execution result information is stated, whether the verification result is used to indicate second execution result information For true execution result information.
11. device as claimed in claim 10, which is characterized in that the authentication module is according to described in verification result determination The data transfer abnormality detection ability of first server specifically includes:
If it is not true execution result information that the verification result, which is used to indicate second execution result information, described in determination The data transfer abnormality detection ability of first server is normal;
If it is true execution result information that the verification result, which is used to indicate second execution result information, described is determined The data transfer abnormality detection ability of one server is abnormal.
12. the device as described in claim 10 or 11, which is characterized in that described device further includes:
Code packet acquisition module, for obtaining the said program code for distorting information, and by said program code boil down to Code packet;
Configuration module, for configuring being associated between the code packet and the first function in data transfer interface System, and by the incidence relation between the code packet and the first function, by the described program in the code packet Code newly injects the data transfer interface.
13. device as claimed in claim 12, which is characterized in that the code packet is the jar packets of archive file jar formats; Described device further includes:
Memory module, for the jar packets to be stored in the corresponding storage catalogue of archive file format in the first server Under;
The configuration module includes:
Acquiring unit, for obtaining configuration file, the configuration file is used to record the generation for newly injecting the data transfer interface The injection information of code packet;
Adding device, the injection information for adding the jar packets under the storage catalogue in the configuration file are described The program code that injection information is used to indicate the jar packets is infused in the data and shifts the first function and institute in interface Between stating second function, the execution priority of the first function is more than the execution priority of said program code, described program The execution priority of code is more than the execution priority of the second function.
14. a kind of first server, which is characterized in that including:Processor and memory;
The processor is connected with memory, wherein the memory is for storing program code, and the processor is for calling Said program code, to execute such as claim 1-7 any one of them methods.
15. a kind of computer storage media, which is characterized in that the computer storage media is stored with computer program, described Computer program includes program instruction, and described program is instructed when being executed by a processor, executed such as any one of claim 1-7 institutes The method stated.
CN201810541810.6A 2018-05-30 2018-05-30 Data processing method and device, storage medium and server Active CN108763934B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810541810.6A CN108763934B (en) 2018-05-30 2018-05-30 Data processing method and device, storage medium and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810541810.6A CN108763934B (en) 2018-05-30 2018-05-30 Data processing method and device, storage medium and server

Publications (2)

Publication Number Publication Date
CN108763934A true CN108763934A (en) 2018-11-06
CN108763934B CN108763934B (en) 2020-02-28

Family

ID=64004642

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810541810.6A Active CN108763934B (en) 2018-05-30 2018-05-30 Data processing method and device, storage medium and server

Country Status (1)

Country Link
CN (1) CN108763934B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111445333A (en) * 2020-03-26 2020-07-24 腾讯科技(深圳)有限公司 Block generation method and device, computer equipment and storage medium
CN112329035A (en) * 2020-11-02 2021-02-05 成都中科大旗软件股份有限公司 Method, system and storage medium for analyzing, encrypting and decrypting based on jar program

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1751324A (en) * 2003-02-21 2006-03-22 瑞士电信流动电话公司 Method and system for detecting possible frauds in payment transactions
US7757215B1 (en) * 2006-04-11 2010-07-13 Oracle America, Inc. Dynamic fault injection during code-testing using a dynamic tracing framework
CN102833270A (en) * 2012-09-18 2012-12-19 山石网科通信技术(北京)有限公司 Method and device for detecting SQL (structured query language) injection attacks and firewall with device
CN103823751A (en) * 2013-12-13 2014-05-28 国家计算机网络与信息安全管理中心 Counterfeit application program monitoring method based on characteristic implantation
CN103942714A (en) * 2014-05-05 2014-07-23 携程计算机技术(上海)有限公司 Payment method and payment device
CN104574088A (en) * 2015-02-04 2015-04-29 华为技术有限公司 Payment authorization method and device
CN105260660A (en) * 2015-09-14 2016-01-20 百度在线网络技术(北京)有限公司 Monitoring method, device and system of intelligent terminal payment environment
CN105471819A (en) * 2014-08-19 2016-04-06 腾讯科技(深圳)有限公司 Account abnormity detection method and account abnormity detection device
CN105631668A (en) * 2015-11-27 2016-06-01 中国银联股份有限公司 Payment anomaly detection method and system
CN105843609A (en) * 2016-03-18 2016-08-10 浪潮软件集团有限公司 MVC frame based on Spring and MyBatis
CN106790292A (en) * 2017-03-13 2017-05-31 摩贝(上海)生物科技有限公司 The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1751324A (en) * 2003-02-21 2006-03-22 瑞士电信流动电话公司 Method and system for detecting possible frauds in payment transactions
US7757215B1 (en) * 2006-04-11 2010-07-13 Oracle America, Inc. Dynamic fault injection during code-testing using a dynamic tracing framework
CN102833270A (en) * 2012-09-18 2012-12-19 山石网科通信技术(北京)有限公司 Method and device for detecting SQL (structured query language) injection attacks and firewall with device
CN103823751A (en) * 2013-12-13 2014-05-28 国家计算机网络与信息安全管理中心 Counterfeit application program monitoring method based on characteristic implantation
CN103942714A (en) * 2014-05-05 2014-07-23 携程计算机技术(上海)有限公司 Payment method and payment device
CN105471819A (en) * 2014-08-19 2016-04-06 腾讯科技(深圳)有限公司 Account abnormity detection method and account abnormity detection device
CN104574088A (en) * 2015-02-04 2015-04-29 华为技术有限公司 Payment authorization method and device
CN105260660A (en) * 2015-09-14 2016-01-20 百度在线网络技术(北京)有限公司 Monitoring method, device and system of intelligent terminal payment environment
CN105631668A (en) * 2015-11-27 2016-06-01 中国银联股份有限公司 Payment anomaly detection method and system
CN105843609A (en) * 2016-03-18 2016-08-10 浪潮软件集团有限公司 MVC frame based on Spring and MyBatis
CN106790292A (en) * 2017-03-13 2017-05-31 摩贝(上海)生物科技有限公司 The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周虎等: "《基于SOAP 的Web 服务中的异常处理方法》", 《计算机工程与设计》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111445333A (en) * 2020-03-26 2020-07-24 腾讯科技(深圳)有限公司 Block generation method and device, computer equipment and storage medium
CN111445333B (en) * 2020-03-26 2023-12-08 腾讯科技(深圳)有限公司 Block generation method, device, computer equipment and storage medium
CN112329035A (en) * 2020-11-02 2021-02-05 成都中科大旗软件股份有限公司 Method, system and storage medium for analyzing, encrypting and decrypting based on jar program
CN112329035B (en) * 2020-11-02 2022-12-27 成都中科大旗软件股份有限公司 Method, system and storage medium for analyzing, encrypting and decrypting based on jar program

Also Published As

Publication number Publication date
CN108763934B (en) 2020-02-28

Similar Documents

Publication Publication Date Title
JP7225413B2 (en) Secure autofill of forms with on-demand application to generate virtual numbers for contactless cards
US11392940B2 (en) Multi-approval system using M of N keys to perform an action at a customer device
CN104375836B (en) A kind of method and device of displaying screen locking window
US20150163186A1 (en) Launching a client application based on a message
US10069808B2 (en) Methods and systems for providing a customized network
CN106487511A (en) Identity identifying method and device
CN104598793A (en) Fingerprint authentication method and fingerprint authentication device
US9756031B1 (en) Portable access to auditing information
WO2020081105A1 (en) Methods and systems for providing a customized network
CN108763934A (en) Data processing method and device, storage medium, server
CN107957871A (en) A kind of front and back end synchronization canonical method of calibration based on JSR303
CN106778193B (en) Client and UI interaction method
CN105592033B (en) trusted service management system and method
CN110210831B (en) Office examination and approval method and system based on data short message technology
CN113987574A (en) Block chain private transaction method, device, equipment and readable storage medium
CN105718314A (en) Event execution method, device and system
CN109801050A (en) A kind of mobile payment SDK and method of payment for online store
CN104348807B (en) Safety information interaction method based on customizable browser
US20230418923A1 (en) Techniques to perform dynamic call center authentication utilizing a contactless card
US20230419295A1 (en) Mobile web browser authentication and checkout using a contactless card
WO2017155874A1 (en) Methods and systems for providing a customized network
Khan et al. Secure digital wallet by using QR code: mapping of mobile payment in partially connected environment
CN116016632A (en) Resource collection device binding method and device based on social application and storage medium
CN106059773B (en) Digital signature method and system
TWM622833U (en) Invoicing Automation System

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant