Detailed Description
In order to make the technical solutions in one or more embodiments of the present disclosure better understood, the technical solutions in one or more embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in one or more embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of one or more embodiments of the present disclosure, but not all embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments in one or more of the specification without inventive faculty are intended to fall within the scope of one or more of the specification.
One or more embodiments of the present disclosure provide a page access method, an apparatus, and a system based on a code scanning operation, in which a remote server issues a service address and service data to a client, and encrypts and transmits the service data, after receiving the service address and the service data, the client caches the service data in a local cache, and when a service page is generated based on the service address, the client directly obtains corresponding service data from the local cache, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
Fig. 1 is a schematic view of an application scenario of a page access system based on a code scanning operation according to one or more embodiments of the present specification, and as shown in fig. 1, the page access system includes: the system comprises a client and a remote server, wherein the client can be a mobile terminal such as a smart phone and a tablet personal computer, the remote server can be a business server for providing specified business services, and the specific process of generating a business page comprises the following steps:
firstly, after monitoring a graphic code scanning operation, a client sends a data acquisition request to a remote server, specifically, the client can be a smart phone with a code scanning function, and aiming at the process that a user uses the smart phone to scan a graphic code to access a service page, the data acquisition request sent by the smart phone to the remote server carries code scanning information obtained by analyzing the graphic code;
then, after receiving a data acquisition request sent by a client, a far-end server acquires a service address corresponding to the data acquisition request and service data for rendering a user interaction page, encrypts the service data, and returns the service address and the encrypted service data to the client together, wherein the encrypted service data is independent of the service address, and the service address comprises a unique identifier of the service data;
and finally, the client receives the service address and the encrypted service data, caches the service data in a local cache, and when rendering a service page, the service page is rendered based on the service address and the service data corresponding to the unique identifier in the service address, which is acquired from the local cache, wherein the service page is a page for interacting with a user.
Fig. 2 is a first flowchart of a page access method based on code scanning operation according to one or more embodiments of the present specification, where the method in fig. 2 can be executed by the client in fig. 1, as shown in fig. 2, and the method includes at least the following steps:
s201, sending a data acquisition request to a remote server aiming at the monitored graphic code scanning operation, wherein aiming at the code scanning operation, the data acquisition request carries specific code scanning information obtained by scanning the graphic code, the code scanning information obtained by scanning the graphic code is acquired, and the data acquisition request carrying the code scanning information is sent to the remote server, the code scanning information can be a character string used for generating the graphic code, and the graphic code can be a two-dimensional code or a bar code;
s202, receiving a service address and encrypted service data returned by the remote server in response to the data obtaining request, and caching the encrypted service data in a local cache, where the encrypted service data is independent of the service address, the service address includes a unique identifier of the service data, specifically, the service address is a web page link for opening a service page, and the service address may be a URL or a schema, and in order to facilitate the client to perform cache management on the received service data, the unique identifier of the service data may be added to the service address, so that when the client renders the service page, the client directly obtains corresponding service data in the local cache of the client according to the unique identifier in the service address;
s203, generating a service page according to the received service address and service data corresponding to the unique identifier in the service address and obtained from the local cache, where the service page is a page for interacting with the user, for example, the service page may be a transfer page, an information query page, and the like, and for the transfer page, the service data may include: the service data and the service address are returned together by the remote server, and the service data is cached in the local cache, so that the service data can be directly obtained in the local cache, and the service data is loaded into the initial service page and rendered to obtain the final service page.
In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client at the same time for a data acquisition request of the client, and transmits the service data after encryption processing, the client caches the service data in a local cache after receiving the service address and the service data, and directly acquires corresponding service data from the local cache when generating a service page based on the service address, so that not only can security of service data transmission be ensured, but also the number of network requests from the client to the remote server can be reduced.
Further, in order to facilitate the client to perform data management on the service data and quickly and accurately obtain the required service data from the local area when rendering the service page, the service address may include: the method includes the steps that a link part and a unique identifier of service data are connected, wherein the unique identifier has a one-to-one correspondence relationship with the service data, the remote server splices the unique identifier of the service data with the link part and sends the spliced unique identifier of the service data and the link part as a service address to a client, for example, if the link part is https:// alipay.com/detail.htm, then the spliced service address is https:// alipay.com/detail.htm? data _ token $ AAAA, which is the unique identifier of the service data;
correspondingly, as shown in fig. 3, the step S203 of generating a service page according to the received service address and the service data corresponding to the unique identifier in the service address, which is acquired from the local cache, specifically includes:
s2031, opening the received service address and determining the unique identifier in the service address;
s2032, reading the encrypted service data corresponding to the unique identifier in the service address from the local cache, and decrypting the encrypted service data to obtain decrypted service data;
specifically, when the service data is stored in the local cache, a position identifier corresponding relationship between the storage position information for storing the service data in the local cache and the unique identifier may be recorded; when accessing the service address, determining the storage position information of the currently required service data according to the position identification corresponding relation and the unique identification in the service address, and reading the corresponding service data from the local cache according to the storage position information;
the encrypted service data can be directly stored in a local cache, and then when a service page is rendered, the service data read from the local cache needs to be decrypted; the encrypted service data can be decrypted and then stored in the local cache, so that the service data does not need to be decrypted when the service page is rendered;
s2033, based on the service data obtained and decrypted from the local cache, rendering to obtain a service page, specifically, updating the service page code according to the decrypted service data to obtain a target service page code related to the client information, and rendering to obtain a service page for interacting with the user based on the target service page code.
Specifically, after receiving a service address and service data, a code scanning module in the client caches the service data in a local cache, and sends the service address to the service module; the service module accesses and opens a link part in a service address, and when the service module determines that the service address contains a unique identifier, the service module accesses a service obtained by local data provided by a code scanning module according to the unique identifier, obtains service data corresponding to the unique identifier from a cache of the code scanning module, if the service data is encrypted data, the service data needs to be decrypted, and a final service page is obtained through rendering based on the decrypted service data.
In one or more embodiments provided in this specification, when a client renders a service page, required service data is directly acquired from a local cache, so that the rendering efficiency of the service page is improved, and a corresponding service page can still be normally displayed for a user in case of network abnormality.
In a specific embodiment, as shown in fig. 4, a first information interaction diagram of a page access method based on a code scanning operation specifically includes:
s401, after monitoring the code scanning operation, the client sends a code scanning request to a remote server, specifically, the code scanning request can be sent to the remote server by a code scanning module in the client;
s402, after receiving the code scanning request, the remote server determines an original service address corresponding to the received code scanning request, for example, the original service address is https:// alipay.com/detail.htm; and the number of the first and second groups,
s403, the remote server determines service data corresponding to the received code scanning request and determines a unique identifier corresponding to the service data, wherein the unique identifier can be timestamp information;
s404, the remote server adds the unique identifier to the tail end of the original service address to obtain a spliced service address, and encrypts the service data to obtain encrypted service data, wherein the spliced service address comprises: the link part (i.e. the original service address) and the unique identifier of the service data, which may be the current timestamp when the service data is encrypted, e.g. the spliced service address is https:// alipay.com/detail.htm? data _ token $ AAAA, which is the unique identifier of the service data;
s405, the remote server sends the spliced service address and the encrypted service data to the client, specifically, the spliced service address and the encrypted service data can be sent to a code scanning module in the client;
s406, after receiving the spliced service address and the encrypted service data, the client caches the service data in a local cache, specifically, the client may directly cache the encrypted service data in the local cache, or decrypt the service data first and then cache the decrypted service data in the local cache;
s407, the client opens the received service address, determines a unique identifier in the service address, and obtains service data corresponding to the unique identifier from a local cache, specifically, the code scanning module in the client sends the spliced service address to the service module in the client, and then the service module determines the unique identifier in the service address when accessing the service page corresponding to the service address, and obtains the service data corresponding to the unique identifier from the cache of the code scanning module; for example, the service address returned by the remote server is https:// alipay. com/detail. htm? If the data _ token is $ AAAA, when a service module in the client accesses a service page corresponding to the service address, extracting a unique identifier AAAA in the service address, and requesting a code scanning module to acquire service data corresponding to the unique identifier;
s408, the client renders the service page based on the service data obtained from the local cache, specifically, after the service module in the client obtains the service data corresponding to the unique identifier in the service address from the code scanning module, the service module in the client renders the service page and displays the service page on the client, for example, for the service address https:///alipay.com/detail.htm? In the case of data _ token $ AAAA, the service page displayed on the client is a transfer page, so that the user can perform a transfer operation based on the transfer page.
Further, in order to ensure that the local cache space is sufficient, the preset aging threshold is set to limit the survival time of the service data, and the expired service data is automatically destroyed in time, so as to automatically release the storage space of the local cache, and based on this, after caching the received encrypted service data into the local cache, the method further includes:
judging whether the storage time of the service data is greater than a preset aging threshold value or not aiming at each service data in the local cache, wherein the survival time can be determined according to the cache starting time of the service data and the current timestamp, and the preset aging threshold value is cache effective time;
and if so, deleting the service data with the storage time larger than the preset aging threshold, specifically, when the storage time of the service data is larger than the preset aging threshold, indicating that the service data is the overdue data and needing to be removed from the local cache.
Further, in order to improve the difficulty of cracking the service data and further improve the security of the service data, an encryption and decryption rule may be agreed between the client and the remote server, and the encryption algorithm selected by the remote server for encrypting the service data is dynamically changed, so that when the client decrypts the service data, it is necessary to determine a decryption algorithm corresponding to the encryption algorithm of the service data to be decrypted first, and then decrypt the service data using the decryption algorithm, based on which, the S2032 decrypts the encrypted service data to obtain the decrypted service data, which specifically includes:
step one, determining a decryption algorithm corresponding to an encryption algorithm of encrypted service data according to a preset encryption and decryption rule, specifically, storing the preset encryption and decryption rule in both a client and a remote server in advance, where the preset encryption and decryption rule includes: the corresponding relation among the encryption algorithm identification, the encryption algorithm and the decryption algorithm, wherein the service address further comprises: the encryption algorithm identification is used for determining a decryption algorithm corresponding to the encrypted service data by the client according to a preset encryption and decryption rule and the encryption algorithm identification in the service address;
and based on the determined decryption algorithm, carrying out decryption processing on the encrypted service data to obtain the decrypted service data.
Further, the uniqueness identifier and the encryption algorithm identifier can be combined into one, the timestamp information can be used as the uniqueness identifier of the service data, and meanwhile, the timestamp information can also be used as the encryption algorithm identifier, so that the client can obtain corresponding service data according to the timestamp information in the service address and can determine a corresponding decryption algorithm, and correspondingly, the uniqueness identifier comprises: timestamp information;
the step of determining a decryption algorithm corresponding to the encryption algorithm of the encrypted service data according to the preset encryption and decryption rules specifically includes:
determining a target encryption algorithm corresponding to the timestamp information of the encrypted service data according to a preset encryption and decryption rule;
and determining a decryption algorithm of the encrypted service data according to the determined target encryption algorithm.
Specifically, when encrypting the service data, the remote server encrypts the service data by using a target encryption algorithm corresponding to the current timestamp, where the preset encryption and decryption rule includes: for the remote server, according to the preset encryption and decryption rules, determining an encryption algorithm corresponding to a target time period in which the current timestamp is located, determining the encryption algorithm as a target encryption algorithm, and encrypting the service data by using the target encryption algorithm; correspondingly, for the client, the encryption algorithm used by the encrypted service data may be determined based on the preset encryption and decryption rule and the timestamp information in the service address, and then the decryption algorithm used for decrypting the service data may be determined.
In a specific embodiment, for a process of rendering a service page by a client, the following three implementation manners may be adopted, specifically:
as shown in fig. 5, a second information interaction diagram of the page access method based on code scanning operation specifically includes, for a case that a service page is a Native page:
s501, after monitoring a code scanning operation, a code scanning module in the client sends a code scanning request to a remote server;
s502, after receiving the code scanning request, the remote server determines an original service address corresponding to the received code scanning request; and the number of the first and second groups,
s503, the remote server determines the service data corresponding to the received code scanning request and determines the unique identifier corresponding to the service data;
s504, the remote server adds the unique identifier to the tail end of the original service address to obtain a spliced service address, and encrypts the service data to obtain encrypted service data;
s505, the remote server sends the spliced service address and the encrypted service data to a code scanning module in the client;
s506, after the code scanning module in the client receives the spliced service address and the encrypted service data, caching the service data into a local cache;
s507, a code scanning module in the client requests a service module to open a service address;
s508, the business module in the customer end judges whether there is a unique label in the business address;
s509, if the business module in the client is determined to exist, business data corresponding to the unique identifier is obtained from the code scanning module;
s510, the service module in the client renders the service page based on the acquired service data.
As shown in fig. 6, a third information interaction diagram of the page access method based on the code scanning operation is that, for a case that a service page is a dynamic H5 page, a corresponding service module is an H5 container, and specifically includes:
s601, after a code scanning module in the client monitors code scanning operation, sending a code scanning request to a remote server;
s602, after receiving a code scanning request, a remote server determines an original service address corresponding to the received code scanning request; and the number of the first and second groups,
s603, the remote server determines the service data corresponding to the received code scanning request and determines the unique identifier corresponding to the service data;
s604, the remote server adds the unique identifier to the tail end of the original service address to obtain a spliced service address, and encrypts the service data to obtain encrypted service data;
s605, the remote server sends the spliced service address and the encrypted service data to a code scanning module in the client;
s606, after the code scanning module in the client receives the spliced service address and the encrypted service data, caching the service data into a local cache;
s607, the code scanning module in the client requests the H5 container to open the service address;
s608, the H5 container in the client judges whether the service address has a unique identifier;
s609, if the H5 container in the client side is determined to exist, acquiring the service data corresponding to the unique identifier from the code scanning module;
s610, rendering the service page based on the acquired service data by the H5 container in the client.
As shown in fig. 7, a fourth information interaction diagram of the page access method based on the code scanning operation is that, for a case that a service page is a static H5 page, a corresponding service module is an H5 container, and specifically includes:
s701, after a code scanning module in the client monitors code scanning operation, sending a code scanning request to a remote server;
s702, after receiving a code scanning request, the remote server determines an original service address corresponding to the received code scanning request; and the number of the first and second groups,
s703, the remote server determines the service data corresponding to the received code scanning request and determines the unique identifier corresponding to the service data;
s704, the remote server adds the unique identifier to the tail end of the original service address to obtain a spliced service address, and encrypts the service data to obtain encrypted service data;
s705, the remote server sends the spliced service address and the encrypted service data to a code scanning module in the client;
s706, after the code scanning module in the client receives the spliced service address and the encrypted service data, caching the service data into a local cache;
s707, the code scanning module in the client requests the H5 container to open a service address;
s708, the H5 container in the client accesses the service address and initializes the static page;
s709, judging whether the unique identifier exists in the service address or not by the H5 container in the client through the JS code;
s710, if the H5 container in the client side is determined to exist, acquiring the service data corresponding to the unique identifier from the code scanning module;
and S711, rendering the H5 container in the client based on the acquired service data to obtain a service page.
In the page access method based on code scanning operation in one or more embodiments of the present specification, a data acquisition request is sent to a remote server for a monitored graphic code scanning operation; receiving a service address and encrypted service data returned by the remote server in response to the data acquisition request, and caching the encrypted service data into a local cache; and generating a service page according to the service address and the service data which is acquired from the local cache and corresponds to the unique identifier in the service address. In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client at the same time for a data acquisition request of the client, and transmits the service data after encryption processing, the client caches the service data in a local cache after receiving the service address and the service data, and directly acquires corresponding service data from the local cache when generating a service page based on the service address, so that not only can security of service data transmission be ensured, but also the number of network requests from the client to the remote server can be reduced.
Based on the same technical concept, corresponding to the page access method based on the code scanning operation described in fig. 2 to fig. 7, one or more embodiments of the present specification further provide a page access method based on the code scanning operation, fig. 8 is a flowchart of the page access method based on the code scanning operation provided in one or more embodiments of the present specification, and the method in fig. 8 can be executed by the remote server in fig. 1, as shown in fig. 8, the method at least includes the following steps:
s801, receiving a data acquisition request sent by a client, wherein the data acquisition request is generated by the client based on the monitored graphic code scanning operation;
s802, responding to the received data acquisition request, acquiring a service address and encrypted service data;
s803, sending the obtained service address and the encrypted service data to the client, so that the client caches the encrypted service data in the local cache and generates a service page according to the received service address and the service data obtained from the local cache.
In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
Wherein, the step S802, in response to the received data obtaining request, obtains the service address and the encrypted service data, and specifically includes:
step one, determining a link part and service data corresponding to a received data acquisition request; determining a unique identifier corresponding to the service data;
step two, generating a service address according to the determined link part and the unique identifier;
and step three, encrypting the determined service data to obtain the encrypted service data.
In one or more embodiments of the present description, a page access method based on code scanning operation receives a data acquisition request sent by a client, and acquires a service address and encrypted service data in response to the data acquisition request; and sending the acquired service address and the encrypted service data to a client so that the client caches the encrypted service data in a local cache and generates a service page according to the received service address and the service data corresponding to the unique identifier in the service address, which is acquired from the local cache. In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
It should be noted that the embodiment in this specification and the previous embodiment in this specification are based on the same inventive concept, and therefore specific implementation of this embodiment may refer to implementation of the page access method based on the code scanning operation, and repeated details are not described herein.
Corresponding to the above page access method based on code scanning operation described in fig. 2 to fig. 7, based on the same technical concept, one or more embodiments of the present specification further provide a page access apparatus based on code scanning operation, and fig. 9 is a schematic diagram of modules of the page access apparatus based on code scanning operation provided in one or more embodiments of the present specification, the apparatus is disposed at a client side, and the apparatus is configured to execute the page access method based on code scanning operation described in fig. 2 to fig. 7, as shown in fig. 9, the apparatus includes:
a request sending module 901, configured to send a data acquisition request to a remote server according to the monitored graphic code scanning operation;
an information receiving module 902, configured to receive a service address and encrypted service data returned by the remote server in response to the data acquisition request, where the encrypted service data is independent of the service address, and the service address includes a unique identifier of the service data;
a data caching module 903, configured to cache the encrypted service data in a local cache;
a page generating module 904, configured to generate a service page according to the service address and the service data corresponding to the unique identifier, which is obtained from the local cache.
In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
Optionally, the page generating module 904 is specifically configured to:
opening the service address and determining a unique identifier in the service address;
reading the encrypted service data corresponding to the unique identifier from the local cache, and decrypting the encrypted service data to obtain decrypted service data;
and rendering to obtain a service page based on the decrypted service data.
Optionally, the apparatus further comprises: a data deletion module, wherein the data deletion module is configured to:
judging whether the storage time of the service data is greater than a preset time efficiency threshold value or not aiming at each service data in the local cache;
and if so, deleting the service data.
Optionally, the page generating module 904 is further specifically configured to:
determining a decryption algorithm corresponding to the encryption algorithm of the encrypted service data;
and based on the determined decryption algorithm, decrypting the encrypted service data to obtain decrypted service data.
Optionally, the unique identifier comprises: timestamp information;
correspondingly, the page generating module 904 is further specifically configured to:
determining a target encryption algorithm corresponding to the timestamp information of the encrypted service data;
and determining a decryption algorithm of the encrypted service data according to the target encryption algorithm.
Optionally, the request sending module 901 is specifically configured to:
acquiring code scanning information obtained by scanning a graphic code;
and sending a data acquisition request carrying the code scanning information to a remote server.
In one or more embodiments of the present description, a page access device based on a code scanning operation sends a data acquisition request to a remote server for a monitored graphic code scanning operation; receiving a service address and encrypted service data returned by the remote server in response to the data acquisition request, and caching the encrypted service data into a local cache; and generating a service page according to the service address and the service data which is acquired from the local cache and corresponds to the unique identifier in the service address. In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
It should be noted that the embodiment in this specification and the first embodiment in this specification are based on the same inventive concept, and therefore specific implementation of this embodiment may refer to implementation of the page access method based on the code scanning operation, and repeated details are not described herein.
On the basis of the same technical concept, corresponding to the above-mentioned page access method based on code scanning operation described in fig. 8, one or more embodiments of the present specification further provide a page access apparatus based on code scanning operation, and fig. 10 is a schematic diagram of module composition of the page access apparatus based on code scanning operation provided in one or more embodiments of the present specification, the apparatus is disposed at a remote server side, the apparatus is configured to execute the page access method based on code scanning operation described in fig. 8, as shown in fig. 10, the apparatus includes:
a request receiving module 1001, configured to receive a data acquisition request sent by a client, where the data acquisition request is generated by the client based on a monitored graphic code scanning operation;
an information obtaining module 1002, configured to obtain a service address and encrypted service data in response to the data obtaining request;
an information sending module 1003, configured to send the service address and the encrypted service data to the client, so that the client caches the encrypted service data in a local cache and generates a service page according to the service address and the encrypted service data acquired from the local cache.
In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
Optionally, the information obtaining module 1002 is specifically configured to:
determining a link part and service data corresponding to the data acquisition request; determining a unique identifier corresponding to the service data;
generating a service address according to the link part and the unique identifier;
and encrypting the service data to obtain the encrypted service data.
In one or more embodiments of the present specification, a page access apparatus based on code scanning operation receives a data acquisition request sent by a client, and acquires a service address and encrypted service data in response to the data acquisition request; and sending the acquired service address and the encrypted service data to a client so that the client caches the encrypted service data in a local cache and generates a service page according to the received service address and the service data corresponding to the unique identifier in the service address, which is acquired from the local cache. In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
It should be noted that the embodiment in this specification and the first embodiment in this specification are based on the same inventive concept, and therefore specific implementation of this embodiment may refer to implementation of the page access method based on the code scanning operation, and repeated details are not described herein.
Corresponding to the above page access method based on code scanning operation described in fig. 2 to fig. 7, based on the same technical concept, one or more embodiments of the present specification further provide a page access system based on code scanning operation, and fig. 11 is a schematic structural composition diagram of the page access system based on code scanning operation provided by one or more embodiments of the present specification, as shown in fig. 11, the system includes: a client 20 and a remote server 10;
the client 20 is configured to send a data acquisition request to the remote server 10 according to the monitored graphic code scanning operation; receiving the service address and encrypted service data returned by the remote server 10, and caching the encrypted service data into a local cache; generating a service page according to a received service address and encrypted service data acquired from a local cache, wherein the encrypted service data is independent of the service address, and the service address comprises a unique identifier of the service data;
the remote server 10 is configured to receive a data acquisition request sent by a client 20; responding to the data acquisition request, and acquiring a service address and encrypted service data; the acquired service address and the encrypted service data are sent to the client 20.
In the page access system based on code scanning operation in one or more embodiments of the present specification, a data acquisition request is sent to a remote server for a monitored graphic code scanning operation; receiving a service address and encrypted service data returned by the remote server in response to the data acquisition request, and caching the encrypted service data into a local cache; and generating a service page according to the service address and the service data which is acquired from the local cache and corresponds to the unique identifier in the service address. In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
Further, corresponding to the methods shown in fig. 2 to fig. 7, based on the same technical concept, one or more embodiments of the present specification further provide a page access device based on a code scanning operation, where the device is configured to perform the page access method based on the code scanning operation, as shown in fig. 12.
Page access devices based on code scanning operations may vary significantly depending on configuration or performance, and may include one or more processors 1301 and memory 1302, where memory 1302 may have one or more stored applications or data stored therein. Memory 1302 may be, among other things, transient or persistent storage. The application program stored in memory 1302 may include one or more modules (not shown), each of which may include a series of computer-executable instructions for a page access device based on a scan code operation. Still further, the processor 1301 may be configured to communicate with the memory 1302 to execute a series of computer-executable instructions in the memory 1302 on a page access device based on a code scan operation. The code-swipe based page access device may also include one or more power supplies 1303, one or more wired or wireless network interfaces 1304, one or more input-output interfaces 1305, one or more keyboards 1306, and the like.
In a particular embodiment, a page access device based on a scan operation includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the page access device based on the scan operation, and the one or more programs configured to be executed by one or more processors include computer-executable instructions for:
sending a data acquisition request to a remote server aiming at the monitored graphic code scanning operation;
receiving a service address and encrypted service data returned by the remote server in response to the data acquisition request, and caching the encrypted service data into a local cache, wherein the encrypted service data is independent of the service address, and the service address comprises a unique identifier of the service data;
and generating a service page according to the service address and the service data corresponding to the unique identifier, which is acquired from the local cache.
In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
Optionally, when executed, the computer-executable instructions generate a service page according to the service address and the service data corresponding to the unique identifier and acquired from the local cache, where the generating includes:
opening the service address and determining a unique identifier in the service address;
reading the encrypted service data corresponding to the unique identifier from the local cache, and decrypting the encrypted service data to obtain decrypted service data;
and rendering to obtain a service page based on the decrypted service data.
Optionally, the computer executable instructions, when executed, further comprise computer executable instructions for:
after caching the encrypted service data into a local cache, the method further includes:
judging whether the storage time of the service data is greater than a preset time efficiency threshold value or not aiming at each service data in the local cache;
and if so, deleting the service data.
Optionally, when executed, the computer-executable instructions perform decryption processing on the encrypted service data to obtain decrypted service data, and include:
determining a decryption algorithm corresponding to the encryption algorithm of the encrypted service data;
and based on the determined decryption algorithm, decrypting the encrypted service data to obtain decrypted service data.
Optionally, the computer executable instructions, when executed, the unique identifier comprises: timestamp information;
the determining of the decryption algorithm corresponding to the encryption algorithm of the encrypted service data includes:
determining a target encryption algorithm corresponding to the timestamp information of the encrypted service data;
and determining a decryption algorithm of the encrypted service data according to the target encryption algorithm.
Optionally, when executed, the computer executable instructions send a data acquisition request to a remote server for the monitored graphic code scanning operation, including:
acquiring code scanning information obtained by scanning a graphic code;
and sending a data acquisition request carrying the code scanning information to a remote server.
In one or more embodiments of the present description, a page access device based on a code scanning operation sends a data acquisition request to a remote server for a monitored graphic code scanning operation; receiving a service address and encrypted service data returned by the remote server in response to the data acquisition request, and caching the encrypted service data into a local cache; and generating a service page according to the service address and the service data which is acquired from the local cache and corresponds to the unique identifier in the service address. In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
In another particular embodiment, a page access device based on a scan operation includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the page access device based on the scan operation, and the one or more programs configured to be executed by one or more processors include computer-executable instructions for:
receiving a data acquisition request sent by a client, wherein the data acquisition request is generated by the client based on the monitored graphic code scanning operation;
responding to the data acquisition request, and acquiring a service address and encrypted service data;
and sending the service address and the encrypted service data to the client, so that the client generates a service page according to the encrypted service data cached in a local cache and the encrypted service data acquired from the local cache and the service address.
In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
Optionally, when executed, the computer-executable instructions, in response to the data obtaining request, obtain a service address and encrypted service data, including:
determining a link part and service data corresponding to the data acquisition request; determining a unique identifier corresponding to the service data;
generating a service address according to the link part and the unique identifier;
and encrypting the service data to obtain the encrypted service data.
In one or more embodiments of the present specification, a page access device based on code scanning operation receives a data acquisition request sent by a client, and acquires a service address and encrypted service data in response to the data acquisition request; and sending the acquired service address and the encrypted service data to a client so that the client caches the encrypted service data in a local cache and generates a service page according to the received service address and the service data corresponding to the unique identifier in the service address, which is acquired from the local cache. In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
Further, based on the same technical concept, corresponding to the methods shown in fig. 2 to fig. 8, one or more embodiments of the present specification further provide a storage medium for storing computer-executable instructions, where in a specific embodiment, the storage medium may be a usb disk, an optical disk, a hard disk, and the like, and the storage medium stores computer-executable instructions that, when executed by a processor, implement the following processes:
sending a data acquisition request to a remote server aiming at the monitored graphic code scanning operation;
receiving a service address and encrypted service data returned by the remote server in response to the data acquisition request, and caching the encrypted service data into a local cache, wherein the encrypted service data is independent of the service address, and the service address comprises a unique identifier of the service data;
and generating a service page according to the service address and the service data corresponding to the unique identifier, which is acquired from the local cache.
In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
Optionally, when executed by a processor, the generating a service page according to the service address and the service data corresponding to the unique identifier and acquired from the local cache includes:
opening the service address and determining a unique identifier in the service address;
reading the encrypted service data corresponding to the unique identifier from the local cache, and decrypting the encrypted service data to obtain decrypted service data;
and rendering to obtain a service page based on the decrypted service data.
Optionally, the storage medium stores computer executable instructions that, when executed by the processor, further implement the following process:
after caching the encrypted service data into a local cache, the method further includes:
judging whether the storage time of the service data is greater than a preset time efficiency threshold value or not aiming at each service data in the local cache;
and if so, deleting the service data.
Optionally, when executed by a processor, the computer-executable instructions stored in the storage medium perform decryption processing on the encrypted service data to obtain decrypted service data, including:
determining a decryption algorithm corresponding to the encryption algorithm of the encrypted service data;
and based on the determined decryption algorithm, decrypting the encrypted service data to obtain decrypted service data.
Optionally, the storage medium stores computer-executable instructions that, when executed by the processor, the unique identifier comprises: timestamp information;
the determining of the decryption algorithm corresponding to the encryption algorithm of the encrypted service data includes:
determining a target encryption algorithm corresponding to the timestamp information of the encrypted service data;
and determining a decryption algorithm of the encrypted service data according to the target encryption algorithm.
Optionally, when executed by a processor, the computer-executable instructions stored in the storage medium send a data acquisition request to a remote server for the monitored graphic code scanning operation, including:
acquiring code scanning information obtained by scanning a graphic code;
and sending a data acquisition request carrying the code scanning information to a remote server.
The computer-executable instructions stored in the storage medium in one or more embodiments of the present specification, when executed by the processor, send a data acquisition request to a remote server for the monitored graphic code scanning operation; receiving a service address and encrypted service data returned by the remote server in response to the data acquisition request, and caching the encrypted service data into a local cache; and generating a service page according to the service address and the service data which is acquired from the local cache and corresponds to the unique identifier in the service address. In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
In another specific embodiment, the storage medium may be a usb disk, an optical disk, a hard disk, or the like, and the storage medium stores computer executable instructions that, when executed by the processor, implement the following process:
receiving a data acquisition request sent by a client, wherein the data acquisition request is generated by the client based on the monitored graphic code scanning operation;
responding to the data acquisition request, and acquiring a service address and encrypted service data;
and sending the service address and the encrypted service data to the client so that the client caches the encrypted service data in a local cache and generates a service page according to the service address and the encrypted service data acquired from the local cache.
In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
Optionally, the storage medium stores computer-executable instructions that, when executed by the processor, obtain a service address and encrypted service data in response to the data obtaining request, including:
determining a link part and service data corresponding to the data acquisition request; determining a unique identifier corresponding to the service data;
generating a service address according to the link part and the unique identifier;
and encrypting the service data to obtain the encrypted service data.
The storage medium in one or more embodiments of the present specification stores computer-executable instructions that, when executed by the processor, receive a data acquisition request sent by a client, and acquire a service address and encrypted service data in response to the data acquisition request; and sending the acquired service address and the encrypted service data to a client so that the client caches the encrypted service data in a local cache and generates a service page according to the received service address and the service data corresponding to the unique identifier in the service address, which is acquired from the local cache. In one or more embodiments of the present disclosure, a remote server issues a service address and service data to a client according to a data acquisition request of the client, and encrypts and transmits the service data, so that security of service data transmission can be ensured, and the number of network requests from the client to the remote server can be reduced.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Language Description Language), traffic, pl (core unified Programming Language), Cal, jhdware Description Language, langua, mylar, pams, Hardware (Hardware Description Language), langva, Lola, HDL, palmware, Hardware (Hardware Description Language), VHDL (Hardware Description Language), and the like, which are currently used in the most popular languages. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the various elements may be implemented in the same one or more software and/or hardware implementations of one or more of the present descriptions.
As will be appreciated by one skilled in the art, one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, one or more of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied in the medium.
One or more of the present specification has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to one or more embodiments of the specification. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, one or more of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied in the medium.
One or more of the present specification can be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more of the present specification can also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is merely illustrative of one or more embodiments of the present disclosure and is not intended to limit one or more embodiments of the present disclosure. Various modifications and alterations to one or more of the present descriptions will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement or the like made within the spirit and principle of one or more of the present specification should be included in the scope of one or more claims of the present specification.