CN109347821A - Method, terminal and the computer readable storage medium of client access server - Google Patents
Method, terminal and the computer readable storage medium of client access server Download PDFInfo
- Publication number
- CN109347821A CN109347821A CN201811200613.4A CN201811200613A CN109347821A CN 109347821 A CN109347821 A CN 109347821A CN 201811200613 A CN201811200613 A CN 201811200613A CN 109347821 A CN109347821 A CN 109347821A
- Authority
- CN
- China
- Prior art keywords
- client
- access request
- server
- access
- serial number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of client access server method, comprising: when detect same client repeatedly to server initiate access request when, the time difference of client time and server time is determined according to access request;According to the access time of time difference and the identical access request of each secondary content, judge whether the identical access request of each secondary content of same client address is in preset time range;When the identical access request of each secondary content of same client address is not in preset time range, access request is terminated;When the identical access request of each secondary content of same client address is in preset time range, sign test verifying is carried out to access request, and according to sign test verifying as a result, determining whether that client continues to access server.The invention also discloses a kind of terminal and storage mediums.Technical solution of the present invention is intended to provide a kind of secure authentication mechanisms, passes through client side attack server to avoid opponent.
Description
Technical field
The present invention relates to the methods and application of technical field of electronic communication more particularly to a kind of client access server should
Client accesses the terminal and computer readable storage medium of the method for server.
Background technique
Currently, request data can in the presence of what is be forged, steal, resetting and damaging during client access server
Energy property, meanwhile, opponent can also initiate a large amount of access requests, attack server in a short time by client.
Summary of the invention
The main purpose of the present invention is to provide a kind of methods of client access server, it is desirable to provide a kind of safety is tested
Card mechanism passes through client side attack server to avoid opponent.
To achieve the above object, the method for client access server provided by the invention, includes the following steps:
When detect same client repeatedly to server initiate access request when, client is determined according to the access request
Hold the time difference of time and server time;
According to the access time of the time difference and the identical access request of each secondary content, the same visitor is judged
Whether the identical access request of each secondary content of family end address is in preset time range;
When the identical access request of each secondary content of the same client address is not in preset time range
When, terminate the access request;
When the identical access request of each secondary content of the same client address is in preset time range,
To the access request carry out sign test verifying, and according to the sign test verifying as a result, determine whether the client after
The continuous access server.
Preferably, described that sign test verifying is carried out to the access request, and according to sign test verifying as a result, determination is
It is no that the client is allowed to continue the step of accessing the server, comprising:
The prestored information of the client in the server is obtained, and the solicited message of the access request is carried out
Decryption;
The solicited message after decryption is compared with the prestored information, with judge the solicited message with it is described
Whether prestored information is consistent;
When the solicited message and the prestored information are inconsistent, the access request is terminated;
When the solicited message is consistent with the prestored information, serial number verifying, and root are carried out to the access request
According to serial number verifying as a result, determining whether that the client continues to access the server.
Preferably, described that serial number verifying is carried out to the access request, and according to serial number verifying as a result, true
It is fixed that the client whether is allowed to continue the step of accessing the server, comprising:
It obtains the server and each of receives the corresponding serial number of the access request, asked according to each access
Corresponding serial number is sought, judges whether same serial number repeats, wherein the corresponding serial number of the access request is described
Client creates when sending access request, and the serial number of the identical access request of content is identical;
When same serial number repeats, the access request is terminated.
Preferably, described to obtain the server and each of receive the corresponding serial number of the access request, according to every
The corresponding serial number of a access request, after judging the step of whether same serial number repeats, further includes:
After reaching setting time, processed serial number in the server is removed.
Preferably, described that serial number verifying is carried out to the access request, and according to serial number verifying as a result, true
Determine after whether allowing the client to continue the step of accessing the server, further includes:
The token value in the access request is obtained, and obtains the uid in token value described in server authentication;
Judge that uid verifies whether to pass through;
When uid is verified, judge whether the account of the client is abnormal;
When uid verify it is obstructed out-of-date, terminate the access request.
Preferably, whether the account for judging the client is after Yi Chang step, further includes:
When the account exception of the client, the result of the account exception is returned.
Preferably, whether the account for judging the client is after Yi Chang step, further includes:
When the account of the client is normal, passes through client validation and the client is allowed to access the service
Device.
Preferably, the method for the client access server, further includes:
When the client is not reached by the number of client validation within the set time sets number, freeze described
Client account.
In addition, to achieve the above object, the present invention also provides a kind of terminal, the terminal include: memory, processor and
It is stored in the computer program that can be run on the memory and on the processor, the computer program is by the processing
The step of device realizes method as described in any one of the above embodiments when executing.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium
Computer program is stored on storage medium, the computer program realizes side described in any of the above embodiments when being executed by processor
The step of method.
In the inventive solutions, the client access server method when detect same client repeatedly to
When server initiates access request, the time difference of client time and server time is determined according to the access request;Root
According to the access time of the time difference and the identical access request of each secondary content, the same client address is judged
Whether the identical access request of each secondary content is in preset time range;When in each time of the same client address
When holding the identical access request and being not in preset time range, the access request is terminated;When the same client
When the identical access request of each secondary content of address is in preset time range, sign test is carried out to the access request and is tested
Card, and according to sign test verifying as a result, determining whether that the client continues to access the server.Therefore, originally
The technical solution of invention is by detecting whether each secondary access request is in preset time range and sign test is verified, to guarantee client
The security mechanism of end access server verifies process layer by layer and is conducive to that opponent is avoided to pass through client side attack server.
Detailed description of the invention
Fig. 1 is the flow diagram for the method first embodiment that client of the present invention accesses server;
Fig. 2 is the flow diagram for the method second embodiment that client of the present invention accesses server;
Fig. 3 is the flow diagram for the method 3rd embodiment that client of the present invention accesses server;
Fig. 4 is the modular structure schematic diagram of terminal first embodiment of the present invention.
The object of the invention is realized, the embodiments will be further described with reference to the accompanying drawings for functional characteristics and advantage.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Referring to Fig. 1, to achieve the above object, the first embodiment of the present invention provides a kind of client access server
Method includes the following steps:
Step S10, when detect same client repeatedly to server initiate access request when, according to the access request
Determine the time difference of client time and server time;
Step S20 judges institute according to the access time of the time difference and the identical access request of each secondary content
Whether the identical access request of each secondary content for stating same client address is in preset time range;
When the identical access request of each secondary content of the same client address is not in preset time range
When, step S30 is executed, the access request is terminated;
When the identical access request of each secondary content of the same client address is in preset time range,
Step S40 is executed, sign test verifying is carried out to the access request, and according to sign test verifying as a result, determining whether
The client continues to access the server.
In the inventive solutions, the client access server method when detect same client repeatedly to
When server initiates access request, the time difference of client time and server time is determined according to the access request;Root
According to the access time of the time difference and the identical access request of each secondary content, the same client address is judged
Whether the identical access request of each secondary content is in preset time range;When in each time of the same client address
When holding the identical access request and being not in preset time range, the access request is terminated;When the same client
When the identical access request of each secondary content of address is in preset time range, sign test is carried out to the access request and is tested
Card, and according to sign test verifying as a result, determining whether that the client continues to access the server.Therefore, originally
The technical solution of invention is by detecting whether each secondary access request is in preset time range and sign test is verified, to guarantee client
The security mechanism of end access server verifies process layer by layer and is conducive to that opponent is avoided to pass through client side attack server.
Due to that can have the case where Time Inconsistency between client and server, when server receives access request,
The time difference of calculation server and client first, and record archive, by the time difference can correct client and
Time difference between server, so that timestamp verification process is more accurate.
The preset time range can according to need setting, and in the present embodiment, the preset time range is
[0min,2min].When user end to server sends access request, server carries out timestamp verifying first, specifically, clothes
Business device first verifies that the same solicited message of same client address whether within certain time, if in preset time model
In enclosing (such as in 2min), then enter downstream, otherwise, returns to error message, Flow ends.
Referring to Fig. 2, the first embodiment of the method based on client of the present invention access server, client of the present invention are visited
In the second embodiment for asking the method for server, the step S40, comprising:
Step S41 obtains the prestored information of the client in the server, and the request to the access request
Information is decrypted;
The solicited message after decryption is compared step S42 with the prestored information, to judge the request letter
It ceases whether consistent with the prestored information;
When the solicited message and the prestored information are inconsistent, step S30 is executed, the access request is terminated;
When the solicited message is consistent with the prestored information, step S50 is executed, flowing water is carried out to the access request
Number verifying, and according to the serial number verifying as a result, determining whether that the client continues to access the server.
The step S40 is sign test verification step.It include client in the access request that client is sent in the present embodiment
Endorse information and encrypted client data, in this process, server can carry out the access request of client
Verifying, is verified into downstream, otherwise, returns to error message, Flow ends;The verifying of solicited message specifically: clothes
Solicited message is decrypted in business device, the client-side information after verifying decryption whether with prestore client-side information in the server
Unanimously.Sign test verifying can play the role of the request data attack server that refusal is forged and steals.
Referring to Fig. 3, the second embodiment of the method based on client of the present invention access server, client of the present invention are visited
In the 3rd embodiment for asking the method for server, the step S50, comprising:
Step S51 obtains the server and each of receives the corresponding serial number of the access request, according to each institute
The corresponding serial number of access request is stated, judges whether same serial number repeats, wherein the corresponding flowing water of the access request
It number is created when the client sends access request, and the serial number of the identical access request of content is identical;
When same serial number repeats, step S30 is executed, the access request is terminated.
In the present embodiment, corresponding serial number is created for the access request that client is sent, the access of same content is asked
Identical serial number can be corresponded to by asking, and a serial number can be only processed by the server once, when same serial number within the set time
When again appearing in verifying process, client returns to error message, Flow ends, so that the access request repeated is refused
Absolutely.
The 3rd embodiment of method based on client of the present invention access server, client access server of the present invention
In the fourth embodiment of method, after the step S51, further includes:
Step S53 removes processed serial number in the server after reaching setting time.
The setting time can according to need setting, for example, using a time-count cycle, when reaching the time-count cycle then
Think to reach setting time, i.e., whenever reaching time-count cycle, the serial number that server process is crossed is removed, to save server
Memory space, and improve data processing rate.In the present embodiment, in daily zero point to serial number processed in server
It is purged processing.
The 3rd embodiment or fourth embodiment of method based on client of the present invention access server, client of the present invention
In the 5th embodiment for accessing the method for server, after the step S50, further includes:
Step S60 obtains the token value in the access request, and obtains in token value described in server authentication
uid;
Step S61 judges that uid verifies whether to pass through;
When uid is verified, step S62 is executed, judges whether the account of the client is abnormal;
When uid verifying is obstructed out-of-date, execution step S30 terminates the access request.
It further include token value in the access request of client, the uid in server authentication token value is verified entrance
Otherwise downstream returns to error message, Flow ends.
5th embodiment of the method based on client of the present invention access server, client access server of the present invention
In the sixth embodiment of method, after the step S62, further includes:
When the account exception of the client, step S63 is executed, the result of the account exception is returned.
The account includes but is not limited to that account is frozen extremely, when the verifying layer by layer that access request passes through above-mentioned process
Afterwards, server judges whether the account of client is abnormal (such as frozen), returns to account exception information if account is abnormal, if
Account is normal, then by verifying, client is allowed to access server.
The sixth embodiment of method based on client of the present invention access server, client access server of the present invention
In 7th embodiment of method, after the step S62, further includes:
Step S70 passes through client validation and allows client access institute when the account of the client is normal
State server.
The method of client access server of the invention includes: timestamp verifying, sign test, serial number is verified, token is tested
It demonstrate,proves and judges whether user account freezes five processes, the present invention by verifying process layer by layer, it is therefore prevented that opponent passes through client
Attack server-side.
7th embodiment of the method based on client of the present invention access server, client access server of the present invention
In 8th embodiment of method, the method for the client access server, further includes:
Step S80, when the client is not reached by the number of client validation within the set time sets number,
Freeze the client account.
The setting time and the setting number can according to need setting, but setting time is unsuitable too long, such as
30min;Setting number should not be excessive, such as 10 times.In the present embodiment, no logical in 10min when same client account
The number for crossing verifying process reaches 5 times, then the client account will be frozen.
In addition, to achieve the above object, the present invention also provides a kind of terminal, the terminal include: memory, processor and
It is stored in the computer program that can be run on the memory and on the processor, the computer program is by the processing
The step of device realizes method as described in any one of the above embodiments when executing.
In some specific embodiments, which may include: processor 1001, such as CPU, network interface
1004, user interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 for realizing these components it
Between connection communication.User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard),
Optional user interface 1003 can also include standard wireline interface and wireless interface, and when specifically used, front end passes through above-mentioned user
Interface 1003 obtains data.Network interface 1004 optionally may include that (such as WI-FI connects standard wireline interface and wireless interface
Mouthful).Memory 1005 can be high speed RAM memory, be also possible to stable memory (non-volatile memory),
Such as magnetic disk storage.Memory 1005 optionally can also be the storage device independently of aforementioned processor 1001.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 4, can wrap
It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
Since the technical solution of the present embodiment terminal 10 includes at least whole technical solutions of above method embodiment,
At least with whole technical effects of above embodiments, no longer repeat one by one herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device enters the present invention respectively
Method described in a embodiment.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium
Computer program is stored on storage medium, the computer program realizes side described in any of the above embodiments when being executed by processor
The step of method.
Since the technical solution of the present embodiment computer readable storage medium includes at least the whole of above method embodiment
Technical solution, therefore at least no longer repeated one by one herein with whole technical effects of above embodiments.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of method of client access server, which comprises the steps of:
When detect same client repeatedly to server initiate access request when, when determining client according to the access request
Between time difference with server time;
According to the access time of the time difference and the identical access request of each secondary content, the same client is judged
Whether the identical access request of each secondary content of address is in preset time range;
When the identical access request of each secondary content of the same client address is not in preset time range, eventually
The only access request;
When the identical access request of each secondary content of the same client address is in preset time range, to institute
It states access request and carries out sign test verifying, and according to sign test verifying as a result, determining whether that the client continues to visit
Ask the server.
2. the method for client access server according to claim 1, which is characterized in that described to the access request
Sign test verifying is carried out, and according to sign test verifying as a result, determining whether that the client continues to access the service
The step of device, comprising:
The prestored information of the client in the server is obtained, and the solicited message of the access request is solved
It is close;
The solicited message after decryption is compared with the prestored information, to judge that the solicited message is prestored with described
Whether information is consistent;
When the solicited message and the prestored information are inconsistent, the access request is terminated;
When the solicited message is consistent with the prestored information, serial number verifying is carried out to the access request, and according to institute
State serial number verifying as a result, determining whether that the client continues to access the server.
3. the method for client access server according to claim 2, which is characterized in that described to the access request
Serial number verifying is carried out, and according to serial number verifying as a result, determining whether that the client continues described in access
The step of server, comprising:
It obtains the server and each of receives the corresponding serial number of the access request, according to each access request pair
The serial number answered, judges whether same serial number repeats, wherein the corresponding serial number of the access request is in the client
End creates when sending access request, and the serial number of the identical access request of content is identical;
When same serial number repeats, the access request is terminated.
4. the method for client access server according to claim 3, which is characterized in that described to obtain the server
The corresponding serial number of the access request each of is received, according to the corresponding serial number of each access request, judgement is same
After the step of whether one serial number repeats, further includes:
After reaching setting time, processed serial number in the server is removed.
5. the method for client access server according to claim 3, which is characterized in that described to the access request
Serial number verifying is carried out, and according to serial number verifying as a result, determining whether that the client continues described in access
After the step of server, further includes:
The token value in the access request is obtained, and obtains the uid in token value described in server authentication;
Judge that uid verifies whether to pass through;
When uid is verified, judge whether the account of the client is abnormal;
When uid verify it is obstructed out-of-date, terminate the access request.
6. the method for client access server according to claim 5, which is characterized in that the judgement client
Account whether after Yi Chang step, further includes:
When the account exception of the client, the result of the account exception is returned.
7. the method for client access server according to claim 6, which is characterized in that the judgement client
Account whether after Yi Chang step, further includes:
When the account of the client is normal, passes through client validation and the client is allowed to access the server.
8. the method for client access server according to claim 7, which is characterized in that the client access service
The method of device, further includes:
When the client is not reached by the number of client validation within the set time sets number, freeze the client
Hold account.
9. a kind of terminal, which is characterized in that the terminal includes: memory, processor and is stored on the memory and can
The computer program run on the processor realizes such as claim when the computer program is executed by the processor
The step of method described in any one of 1-8.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program is realized when the computer program is executed by processor such as the step of method of any of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811200613.4A CN109347821A (en) | 2018-10-16 | 2018-10-16 | Method, terminal and the computer readable storage medium of client access server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811200613.4A CN109347821A (en) | 2018-10-16 | 2018-10-16 | Method, terminal and the computer readable storage medium of client access server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109347821A true CN109347821A (en) | 2019-02-15 |
Family
ID=65310372
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811200613.4A Pending CN109347821A (en) | 2018-10-16 | 2018-10-16 | Method, terminal and the computer readable storage medium of client access server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109347821A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109905408A (en) * | 2019-04-10 | 2019-06-18 | 广州大学 | Network safety protection method, system, readable storage medium storing program for executing and terminal device |
CN111242592A (en) * | 2020-01-13 | 2020-06-05 | 北京三快在线科技有限公司 | Resource transfer detection method, device, server and computer readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104580409A (en) * | 2014-12-24 | 2015-04-29 | 广州酷狗计算机科技有限公司 | Service request processing method, server and terminal |
US20170026395A1 (en) * | 2013-01-16 | 2017-01-26 | Light Cyber Ltd. | Extracting forensic indicators from activity logs |
CN106650454A (en) * | 2017-01-03 | 2017-05-10 | 郑州云海信息技术有限公司 | SQL injection attack detection method and apparatus |
CN108540513A (en) * | 2017-03-03 | 2018-09-14 | 中国移动通信集团福建有限公司 | Ask the determination method and device of Replay Attack |
-
2018
- 2018-10-16 CN CN201811200613.4A patent/CN109347821A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170026395A1 (en) * | 2013-01-16 | 2017-01-26 | Light Cyber Ltd. | Extracting forensic indicators from activity logs |
CN104580409A (en) * | 2014-12-24 | 2015-04-29 | 广州酷狗计算机科技有限公司 | Service request processing method, server and terminal |
CN106650454A (en) * | 2017-01-03 | 2017-05-10 | 郑州云海信息技术有限公司 | SQL injection attack detection method and apparatus |
CN108540513A (en) * | 2017-03-03 | 2018-09-14 | 中国移动通信集团福建有限公司 | Ask the determination method and device of Replay Attack |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109905408A (en) * | 2019-04-10 | 2019-06-18 | 广州大学 | Network safety protection method, system, readable storage medium storing program for executing and terminal device |
CN109905408B (en) * | 2019-04-10 | 2021-07-13 | 广州大学 | Network security protection method, system, readable storage medium and terminal equipment |
CN111242592A (en) * | 2020-01-13 | 2020-06-05 | 北京三快在线科技有限公司 | Resource transfer detection method, device, server and computer readable storage medium |
CN111242592B (en) * | 2020-01-13 | 2022-06-07 | 北京三快在线科技有限公司 | Resource transfer detection method, device, server and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110291757B (en) | Method for providing simplified account registration service, user authentication service, and authentication server using the same | |
EP2783319B1 (en) | Providing verification of user identification information | |
US8424061B2 (en) | Method, system and program product for authenticating a user seeking to perform an electronic service request | |
CN110149328A (en) | Interface method for authenticating, device, equipment and computer readable storage medium | |
CN108369615A (en) | Dynamic update CAPTCHA is addressed inquires to | |
CN108989263A (en) | Short message verification code attack guarding method, server and computer readable storage medium | |
JP7365317B2 (en) | Account verification | |
CN108900561A (en) | The method, apparatus and system of single-sign-on | |
CN108830099A (en) | Call verification method, device, computer equipment and the storage medium of api interface | |
CN106656952A (en) | Authentication method, device and system for registration equipment | |
CN108234509A (en) | FIDO authenticators, Verification System and method based on TEE and PKI certificates | |
CN108462687A (en) | Method, apparatus, terminal device and the storage medium that anti-brush logs in | |
Ye et al. | Formal analysis of a single sign-on protocol implementation for android | |
CN111062023A (en) | Method and device for realizing single sign-on of multiple application systems | |
CN106330828A (en) | Method for network secure access, terminal device and authentication server | |
CN109347821A (en) | Method, terminal and the computer readable storage medium of client access server | |
CN110213293A (en) | VPN login method, device, equipment and computer storage medium | |
AU2022275426A1 (en) | Account verification | |
CN110889106A (en) | Configuration method, device, system and computer readable storage medium | |
CN107819639A (en) | A kind of method of testing and device | |
CN109600342A (en) | Uniform authentication method and device based on one-point technique | |
CN109361639A (en) | Dynamic shares HTTPS request method for authenticating, storage medium and mobile terminal | |
CN105656856A (en) | Resource management method and device | |
CN105141642B (en) | A kind of method and device preventing illegal user's behavior | |
CN110430213A (en) | Service request processing method, apparatus and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20190726 Address after: Room 202, 2nd floor, F1 Building, Yuanjun Shuyuan International Media Industry Park, No. 8 Gaojing Cultural Park Road, Chaoyang District, Beijing Applicant after: Puhua Yunchuang Technology (Beijing) Co.,Ltd. Address before: 100038 No. 141, Gate 1, 3rd Floor, No. 14 Fuxing Road, Haidian District, Beijing Applicant before: Zhai Hongying |
|
TA01 | Transfer of patent application right | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190215 |
|
RJ01 | Rejection of invention patent application after publication |