CN109992976A - Access credentials verification method, device, computer equipment and storage medium - Google Patents

Access credentials verification method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109992976A
CN109992976A CN201910145579.3A CN201910145579A CN109992976A CN 109992976 A CN109992976 A CN 109992976A CN 201910145579 A CN201910145579 A CN 201910145579A CN 109992976 A CN109992976 A CN 109992976A
Authority
CN
China
Prior art keywords
access
client
credentials
code
characteristic information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910145579.3A
Other languages
Chinese (zh)
Inventor
邹陈波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910145579.3A priority Critical patent/CN109992976A/en
Priority to PCT/CN2019/091903 priority patent/WO2020173019A1/en
Publication of CN109992976A publication Critical patent/CN109992976A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

This application involves field of identity authentication, and according to the corresponding access code of client requested document and the characteristic information of client generates and authentication-access voucher, prevent the access credentials by stealing, distorting or forge from accessing file.A kind of access credentials verification method, device, computer equipment and storage medium are specifically disclosed, this method comprises: obtaining the access request that client is sent, access request includes access purpose;Obtain the corresponding access code of access purpose;Access credentials are generated according to access code and the characteristic information of client;Access credentials are sent to client;The access instruction that client is sent is obtained, access instruction includes the characteristic information and access credentials for accessing purpose, client;Validating documents are generated according to the characteristic information of the corresponding access code of access purpose and client;If validating documents are consistent with the access credentials in access instruction, access instruction passes through verifying.

Description

Access credentials verification method, device, computer equipment and storage medium
Technical field
This application involves identity identifying technology fields more particularly to a kind of access credentials verification method, device, computer to set Standby and storage medium.
Background technique
Store the data file of a certain seed type on Cloud Server, the owner of data file can be shared with specified Third party.
The mode of currently used data sharing lacks generally by the way of based on user name cryptographic acess there are following It falls into: if user name password is too simple, being easy to be cracked by the third party of malice;If data File owner, pass through distribution The mode of user name password has given data sharing to A, but can not ensure that A will not reveal user name password and give other people B, this is File owners are undesirable;If user A is linked by the access that normal channel has obtained some data file, but It is that the link is accidentally leaked, it will cause the privacy leakages of data file.
Summary of the invention
The embodiment of the present application provides a kind of access credentials verification method, device, computer equipment and storage medium, prevents from leading to The access credentials access file stolen, distort or forged is crossed, preferably ensure that the privacy of data.
In a first aspect, this application provides a kind of access credentials verification methods, which comprises
The access request that client is sent is obtained, the access request includes access purpose;
Obtain the corresponding access code of the access purpose;
Access credentials are generated according to the access code and the characteristic information of the client;
The access credentials of generation are sent to the client;
The access instruction that client is sent is obtained, the access instruction includes the spy of the access purpose, the client Reference breath and the access credentials;
Validating documents are generated according to the access corresponding access code of purpose and the characteristic information of the client;
If the validating documents are consistent with the access credentials in the access instruction, the access instruction passes through verifying.
Second aspect, this application provides a kind of access credentials to verify device, and described device includes:
First obtains module, and for obtaining the access request of client transmission, the access request includes access purpose;
Second obtains module, for obtaining the corresponding access code of the access purpose;
First generation module, for generating access credentials according to the access code and the characteristic information of the client;
Sending module, for the access credentials of generation to be sent to the client;
Third obtains module, and for obtaining the access instruction of client transmission, the access instruction includes the access mesh , the characteristic information of the client and the access credentials;
Second generation module, for the characteristic information according to the access corresponding access code of purpose and the client Generate validating documents;
Authentication module, if consistent with the access credentials in the access instruction for the validating documents, the access Instruction passes through verifying.
The third aspect, this application provides a kind of computer equipment, the computer equipment includes memory and processor; The memory is for storing computer program;The processor, by executing the computer program and based on execution is described Above-mentioned access credentials verification method is realized when calculation machine program.
Fourth aspect, this application provides a kind of computer readable storage medium, the computer readable storage medium is deposited Computer program is contained, if the computer program is executed by processor, realizes above-mentioned access credentials verification method.
This application discloses a kind of access credentials verification method, device, equipment and storage mediums, by according to client institute The corresponding access code of demand file and the generation of the characteristic information of client and authentication-access voucher, prevent by stealing, distorting Or the access credentials forged access this document;Such as it will be calculated according to the public key and/or expired time of access code and client Access credentials of the cryptographic Hash as client, after can preventing the access credentials of a certain client from being stolen by other clients still So access credentials can be avoided to be revealed intentionally or unintentionally, preferably ensure that the privacy of data by verifying.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to required use in embodiment description Attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is some embodiments of the present application, for this field For those of ordinary skill, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of the access credentials verification method of one embodiment of the application;
Fig. 2 is the application scenarios schematic diagram of the access credentials verification method of the application;
Fig. 3 is the flow diagram of the access credentials verification method of another embodiment of the application;
Fig. 4 is the flow diagram of the access credentials verification method of the application another embodiment;
Fig. 5 is the flow diagram of the access credentials verification method of the another embodiment of the application;
Fig. 6 is the flow diagram of the access credentials verification method of the another embodiment of the application;
Fig. 7 is the flow diagram of the access credentials verification method of the another embodiment of the application;
Fig. 8 is the flow diagram of the access credentials verification method of the another embodiment of the application;
Fig. 9 is that the access credentials of one embodiment of the application verify the structural schematic diagram of device;
Figure 10 is that the access credentials of another embodiment of the application verify the structural schematic diagram of device;
Figure 11 is that the access credentials of the application another embodiment verify the structural schematic diagram of device;
Figure 12 is a kind of structural schematic diagram for computer equipment that one embodiment of the application provides.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on this Shen Please in embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall in the protection scope of this application.
Flow chart shown in the drawings only illustrates, it is not necessary to including all content and operation/step, also not It is that must be executed by described sequence.For example, some operation/steps can also decompose, combine or partially merge, therefore practical The sequence of execution is possible to change according to the actual situation.In addition, though the division of functional module has been carried out in schematic device, But in some cases, it can be divided with the module being different from schematic device.
Embodiments herein provides a kind of access credentials verification method, device, equipment and storage medium.Wherein, should Access credentials verification method can be applied in server, to verify whether client has corresponding permission.
For example, access credentials verification method is used for download server, naturally it is also possible to be looked into for website visiting control, data The scenes such as inquiry.But in order to make it easy to understand, following embodiment by with certain file of user end to server request server management this One scene describes in detail.
In the present embodiment, server be stored in advance documentary storage address, file identification corresponding with file and Corresponding with file unique and fixed access code.
For example, the information that server stores a certain file, is indicated with following JSON format:
Wherein " server ": indicating the storage address of storage this document, for example, address of the server of storage this document.
" uid ": indicating the file identification of this document, is the unique mark corresponding with this document of this document on the server Know.
" access_code ": the unique and fixed access code of this document is indicated, illustratively, access code is not to client It is open.
In some embodiments, server to the information that each file stores can individually be placed on one for client into Row verifying is provided in the server of voucher, and file is placed on other and is exclusively used in the server of storing data, the storage of file Address of the address, that is, this document in the server for being exclusively used in storing data.In further embodiments, file and file storage Information be located in the same server.
With reference to the accompanying drawing, it elaborates to some embodiments of the application.In the absence of conflict, following Feature in embodiment and embodiment can be combined with each other.
Referring to Fig. 1, Fig. 1 is a kind of flow diagram for access credentials verification method that embodiments herein provides, Access credentials verification method is used for server.
As shown in Fig. 2, certain file of user end to server request server management.
As shown in Figure 1, access credentials verification method the following steps are included:
Step S110, server obtains the access request that client is sent, and the access request includes access purpose.
Client can send corresponding access request to server, such as a certain text can be requested access to server Part.
In some embodiments, the access purpose includes the network address of client request access and/or described The file identification of the requested access to file of client.
Illustratively, client accesses the storage address of a certain file, as client directly accesses http: // Download.pinganyun.com/image/, server can detect the access request of client transmission.
In further embodiments, user end to server requests access to the storage address of a certain file, as client will Access request including storage address http://download.pinganyun.com/image/ is sent to server.
In some other embodiment, user end to server send include certain file identification access request, such as comprising File identification, that is, uid is that the access request of ca0aeab7360a9dc6a29a-2aae6c35c94 ... 08b9ce91ee846ed is given Server.
Step S120, server obtains the corresponding access code of the access purpose.
The access purpose in access request that server is sent according to client, as file storage address and/or with text The corresponding file identification of part, so that it may be inquired according to the information that server stores this document and the storage address of this document And/or the corresponding access code of corresponding with this document file identification, such as access code access_code are as follows: d6b0d82cea42 69b51572b8fab43adcee9fc3cf9a。
Step S130, server generates access credentials according to the access code and the characteristic information of the client.
In some embodiments, the characteristic information of the client includes the public key of the client.
Illustratively, when user end to server requests a certain file, the public key certificate of client is also sent to service Device, thus the public key of the available client of server.For example, server obtains the access that client is sent in step S110 Request further includes the public key of the client.
Illustratively, when user end to server requests a certain file, also by the account pair of login user on the client The public key certificate answered is sent to server, thus the public key of the available client of server.The public key of client can be Server is the public key of relative client granting, or server is the public key of a certain account granting, and the account logs in certain After one unspecific client, public key of the public key as the client.
Illustratively, when user end to server requests a certain file, also by the account etc. of login user on the client Information is sent to server, and server inquires corresponding public key certificate according to information such as the accounts of user.
In some possible embodiments, as shown in figure 3, step S130 server is according to the access code and the visitor The characteristic information at family end generates access credentials, specifically includes the following steps:
Step S131, server generates access credentials according to the access code and the public key of the client.
Illustratively, server calculates one according to the public key of the corresponding access code of this document and the client together Cryptographic Hash accesses the access credentials of this document using calculated cryptographic Hash as the client.
Specifically, the access credentials access_key=SHA1 (access_code+certificate) that server generates, Wherein access_code indicates that the access code of this document, certificate indicate the public key of the client.What server generated Access credentials are the access code access_code with the requested specific file of client, and the public key of specific client Certificate is relevant, can prevent the client forged access file.
Due to the uniqueness, that is, different client or different accounts of the client perhaps public key certificate of different accounts Corresponding public key certificate is different;Therefore the storage address of different client or different account access same files, or When person requests access to same file, server is all different according to the calculated access credentials of public key of client.
Step S140, the access credentials of generation are sent to the client by server.
In some possible embodiments, if same client repeatedly requests same file to server, each time all User end to server is needed to send access request to obtain the access credentials of server generation, i.e. server is carried out every time State step S110-S140, it is believed that the access credentials are disposable;In other feasible embodiments, same client Hold when requesting same file to server, the access that the server that obtains when can reuse previous Request this document generates with Card, so that server does not need to be carried out above-mentioned steps S110-S140 every time.
Step S150, server obtain client send access instruction, the access instruction include the access purpose, The characteristic information of the client and the access credentials.
After client obtains the access credentials access_key_1 of server generation, so that it may go the server access access The corresponding file of voucher access_key_1.
When client needs to request a certain file to server, the corresponding access credentials obtained from server are transferred to visit Ask this document.In general, the access credentials in access instruction are the access credentials itself obtained from server.But it if will be from The access credentials that server obtains distort after as the access credentials in access instruction, or access in forgery access instruction with Card, then the access credentials in access instruction and the access credentials obtained from server are inconsistent.
In some embodiments, the purpose of access in access instruction includes the network address of the client request access And/or the file identification of the requested access to file of client.
Illustratively, client accesses the storage address of a certain file, as client directly accesses http: // Download.pinganyun.com/image/, server can detect the access instruction of client transmission.
In further embodiments, user end to server requests access to the storage address of a certain file, as client will Access instruction including storage address http://download.pinganyun.com/image/ is sent to server.
In some other embodiment, user end to server send include certain file identification access instruction, such as comprising File identification, that is, uid is that the access instruction of ca0aeab7360a9dc6a29a-2aae6c35c94 ... 08b9ce91ee846ed is given Server.
Step S160, server is raw according to the access corresponding access code of purpose and the characteristic information of the client At validating documents.
The access purpose in access instruction that server is sent according to client, as file storage address and/or with text The corresponding file identification of part inquires and the storage address of this document and/or the corresponding access of file identification corresponding with this document Code, such as d6b0d82cea4269b51572b8fab43adcee9fc3cf9a.
In some embodiments, the characteristic information of client includes described in the access instruction that step S150 server obtains The public key of client.As shown in figure 3, step S160 server is according to the corresponding access code of access purpose and the client The characteristic information at end generates validating documents, specifically includes the following steps:
Step S161, server client according to the corresponding access code of the access purpose and access instruction Public key generates validating documents.
Illustratively, server accesses the public key of the corresponding access code of mesh and the client together according in access instruction A cryptographic Hash is calculated, using this calculated cryptographic Hash as being used to verify the whether accessible this document of the client Validating documents.
If step S170, the described validating documents are consistent with the access credentials in the access instruction, the access instruction Pass through verifying.
If the validating documents that server generates are consistent with the access credentials in access instruction, then it represents that in the access instruction Access credentials really belong to the client or corresponding account, then by verifying, which can visit the access instruction It asks this document, such as can read, modify, move, delete this document;If validating documents and access instruction that server generates In access credentials it is inconsistent, then access credentials be tampered either forge, this access instruction is unverified, server Refuse the client and accesses this document.
Because of the characteristic information of different clients, as public key certificate is different, therefore same file is for different visitors The access credentials at family end are different, and the access credentials after Hash calculation are inevitable also different.Even if having taken other people visit Voucher is asked, when using the access credentials request data, it is also difficult to provide characteristic information corresponding with the access credentials, such as public key Certificate, then the verifying of access credentials can not pass through.For example, third party is attached to certainly after the access credentials for getting other clients Oneself public key certificate initiates access instruction, then, the validating documents that server is reruned centainly will not in client access instruction Access credentials matching;Because public key used in Hash calculation is different.
Access credentials verification method provided by the above embodiment, by according to the corresponding access of client requested document Code and the generation of the characteristic information of client and authentication-access voucher prevent the access credentials by stealing, distorting or forge from visiting Ask this document;Such as using according to the calculated cryptographic Hash of the public key of access code and client as the access credentials of client, can Still access credentials can be avoided to be had by verifying after preventing the access credentials of a certain client from being stolen by other clients It anticipates or unintentionally reveals, preferably ensure that the privacy of data.
In some embodiments, it further includes the client that server, which obtains the access request that client is sent, in step S110 Public key.As shown in figure 4, such as being taken in step S120 after the access request that step S110 server obtains that client is sent It is further comprising the steps of before the corresponding access code of the device acquisition access purpose of being engaged in:
Step S101, whether client described in the public key verifications of server client according to the access request closes Method.
Illustratively, server authentication public key sign and issue mechanism whether trusted.If step S101 verifies the client It is legal, then follow the steps S120.If it is illegal, then without executing subsequent step.
In some embodiments, in step S150 server from the access instruction that client obtains further include the client Private key signature.Illustratively, client signs to access instruction with the private key certificate of oneself.
For example, access instruction may is that
POST/v1/image/data HTTP/1.1
Accept:application/json
Content-Length:676
Content-Type:application/json
Signature:3ff7af79177cae……121825582eb8a4a11d
{
"image_uid":"ca0aeab7360a9dc6a29a-2aae6c35c94…08b9ce91ee846ed",
"access_key":"d6b0d82cea4269b51572b8fab43adcee9fc3cf9a",
" certificate ": tLS1CRUdJTiBDakNDQVVHZ0F3SUJBZ ...=="
}
Wherein, image_uid is the file identification of this document of file, and access_key, which is that client is unique, to be somebody's turn to do The reading voucher of file, i.e. access credentials, certificate are the public key of the client;On the head of the access instruction, there is one A field Signature indicates that client to the request body BODY of entire HTTP request, that is, is accessed and referred to the private key certificate of oneself Order is signed.
Illustratively, server distributes public spoon and private spoon for client, and public spoon represents client identity and corresponds to unique Private spoon.
In some embodiments, as shown in figure 5, step S150 server obtain client send access instruction it Afterwards, it is tested such as step S160 server according to the access corresponding access code of purpose and the generation of the characteristic information of the client It is further comprising the steps of before demonstrate,proving voucher:
Step S102, whether private key signature described in the public key verifications of server client according to the access instruction Correctly.
The access instruction is not tampered with if correct, subsequent step can be carried out, such as step S160;It is refused if incorrect Access absolutely, does not execute subsequent step.
If third party is in the legal access credentials and client corresponding with the access credentials for stealing certain client Public key initiate access instruction, and signed with the private key of oneself;Due to the private key signature and the public affairs in entire access instruction Key be it is unmatched, even if can rerun out matched validating documents can not be by the verifying of private key signature.Because anyone Private key be will not be disclosed, third-party public and private key mismatches.
In other feasible embodiments, the characteristic information of the client includes the expired time of the client.
Specifically, client or the corresponding expired time of account are pre-saved in the server or are provided by server. For example, file owners and/or server side have decided through consultation client storage or the expired time using this document, server in advance Save these information;Either server is according to the service conditions of file owners or client user, such as pay-per-view, Monthly payment, packet year etc. have formulated the expired time of client.
Illustratively, file owners have subscribed monthly payment service and one file are deposited in server, for oneself or other People's access, then the expired time of client is the time ordered when expiring the latter moon.In another example client user pays in due order Take, then the expired time of client is the secondary business overdue time.
In some possible embodiments, as shown in fig. 6, step S130 server is according to the access code and the visitor The characteristic information at family end generates access credentials, specifically includes the following steps:
Step S132, server generates access credentials according to the expired time of the access code and the client.
Illustratively, server calculates together according to the expired time of the corresponding access code of this document and the client One cryptographic Hash, the access credentials of this document are accessed using calculated cryptographic Hash as the client.
Specifically, the access credentials access_key=SHA1 (access_code+expire_time) that server generates, Wherein access_code indicates that the access code of this document, expire_time indicate the expired time of the client.Server is raw At access credentials be expired with the access code access_code of the requested specific file of client and client when Between expire_time it is relevant, can prevent client from accessing file using the expired time that is tampered or forges.
In some embodiments, access credentials verification method is further comprising the steps of: will be corresponding with the access credentials Expired time is sent to the client.
Illustratively, which can be showed user in clear text manner by client, to prompt user to pay close attention to The time of accessible this document such as prompts user to continue to pay dues in time.
In the present embodiment, the characteristic information of client includes client in the access instruction that step S150 server obtains The expired time expire_time of transmission.
For example, access instruction may is that
{
"image_uid":"ca0aeab7360a9dc6a29a-2aae6c35c94…08b9ce91ee846ed",
"access_key":"d6b0d82cea4269b51572b8fab43adcee9fc3cf9a",
"expire_time":"1538097133"
}
Wherein, image_uid is the file identification of this document of file, and access_key is access credentials, expire_ Time is the expired time of client.
In the present embodiment, as shown in fig. 6, step S160 server according to the corresponding access code of the access purpose and The characteristic information of the client generates validating documents, specifically includes the following steps:
Step S162, server client according to the corresponding access code of the access purpose and access instruction Expired time generates validating documents.
Illustratively, server calculates a cryptographic Hash according to access code and the expired time together, will calculate This cryptographic Hash as the validating documents for accessing this document for verifying the client.If the validating documents in step S170 It is consistent with the access credentials in access instruction, then it represents that the access credentials in the access instruction really belong to the client or phase The account answered, then the access instruction is by verifying, the accessible this document of the client, such as can read, modify, moving, Delete this document;If generate validating documents and access instruction in access credentials it is inconsistent, access credentials be tampered or Person is to forge, and expired time may be tampered, this access instruction is unverified, and server refuses client access should File.
Access credentials verification method provided by the above embodiment, by according to the corresponding access of client requested document Code and the generation of this characteristic information of the expired time of client and authentication-access voucher, prevent by stealing, distorting or forge Access credentials access this document;For example, client attempts are logical if the expired time access_key in access credentials is expired Modification expired time is crossed to continue to use access credentials, it, can not basis since client does not know the access code of this document Modified expired time regenerates legal access credentials, then cannot pass through verifying.
In some embodiments, as shown in fig. 7, step S150 server obtain client send access instruction it Afterwards, it is tested such as step S160 server according to the access corresponding access code of purpose and the generation of the characteristic information of the client It is further comprising the steps of before demonstrate,proving voucher:
Step S103, the expired time of server client according to the access instruction judges the access credentials It is whether expired.
If not out of date, step S160 is executed;If out of date, refuse the client and access this document, tested without generation Demonstrate,prove voucher.
In other feasible embodiments, the characteristic information of client had both included the public key of the client, also included The expired time of client.
It is visited as shown in figure 8, step S130 server is generated according to the access code and the characteristic information of the client Ask voucher, specifically includes the following steps:
Step S133, server according to the access code and the public key and expired time of the client generate access with Card.
Illustratively, server is according to the public key certificate and mistake of access code access_code and client Time phase expire_time calculates a cryptographic Hash together, and calculated cryptographic Hash is sent to the client as client The access credentials at end;Both the client forged access file can be prevented, client utilization is also possible to prevent and is tampered or forges Expired time access file.
Specifically, access_key=SHA1 (access_code+certificate+expire_time).
As shown in figure 8, step S160 server is according to the access purpose corresponding access code and the client Characteristic information generates validating documents, specifically includes the following steps:
Step S163, server client according to the corresponding access code of the access purpose and access instruction Public key and expired time generate validating documents.
Access credentials verification method provided by the above embodiment, by according to the corresponding access of client requested document Code and the generation of the two characteristic informations of the public key and expired time of client and authentication-access voucher, prevent by stealing, usurping The access credentials for changing or forging access this document, and safety is higher.
Referring to Fig. 9, Fig. 9 is a kind of structural schematic diagram for access credentials verifying device that one embodiment of the application provides, Access credentials verifying device can be configured in server, for executing access credentials verification method above-mentioned.
As shown in figure 9, access credentials verifying device includes:
First obtains module 110, and for obtaining the access request of client transmission, the access request includes access mesh 's.
Specifically, the access purpose includes network address and/or the client institute of the client request access Request access to the file identification of file.
Second obtains module 120, for obtaining the corresponding access code of the access purpose.
First generation module 130, for according to the access code and the characteristic information of the client generate access with Card.
Specifically, the characteristic information of the client include the client public key and/or the client it is expired Time.
Specifically, public key and/or the client of first generation module 130 according to the access code and the client The expired time at end generates access credentials.
Sending module 140, for the access credentials of generation to be sent to the client.
Third obtains module 150, and for obtaining the access instruction of client transmission, the access instruction includes the access Purpose, the characteristic information of the client and the access credentials.
Second generation module 160, for the feature according to the access corresponding access code of purpose and the client Information generates validating documents.
Specifically, the characteristic information of the client include the client public key and/or the client it is expired Time.
Specifically, the second generation module 160 is according to the corresponding access code of the access purpose and access instruction The expired time of client described in the public key and/or access instruction of client generates validating documents.
Authentication module 170, if consistent with the access credentials in the access instruction for the validating documents, the visit Ask that instruction passes through verifying.
In some possible embodiments, the access request of the client transmission of the first acquisition acquisition of module 110 further includes The public key of the client.As shown in Figure 10, access credentials verify device further include:
Client described in first authentication unit 101, the public key verifications for the client according to the access request It is whether legal.
If legal, the second acquisition module 120 obtains the corresponding access code of the access purpose.
In some possible embodiments, the access instruction of the client transmission of third acquisition module 150 acquisition further includes The private key signature of the client.As shown in Figure 10, access credentials verify device further include:
Private key label described in second authentication unit 102, the public key verifications for the client according to the access instruction Whether name is correct.
If correct, the second generation module 160 is according to the access corresponding access code of purpose and the spy of the client Reference breath generates validating documents.
In some possible embodiments, as shown in figure 11, access credentials verify device further include:
Third authentication unit 103 judges the visit for the expired time of the client according to the access instruction Ask whether voucher is expired.
If not out of date, the second generation module 160 is according to the access purpose corresponding access code and the client Characteristic information generates validating documents.
It should be noted that it is apparent to those skilled in the art that, for convenience of description and succinctly, The device of foregoing description and each module, the specific work process of unit, can refer to corresponding processes in the foregoing method embodiment, Details are not described herein.
The present processes, device can be used in numerous general or special purpose computing system environments or configuration.Such as: it is personal Computer, server computer, handheld device or portable device, multicomputer system, are based on microprocessor at laptop device System, set-top box, programmable consumer-elcetronics devices, network PC, minicomputer, mainframe computer including any of the above Distributed computing environment of system or equipment etc..
Illustratively, above-mentioned method, apparatus can be implemented as a kind of form of computer program, which can To be run in computer equipment as shown in figure 12.
Figure 12 is please referred to, Figure 12 is a kind of structural schematic diagram of computer equipment provided by the embodiments of the present application.The calculating Machine equipment can be server.
Refering to fig. 12, which includes processor, memory and the network interface connected by system bus, In, memory may include non-volatile memory medium and built-in storage.
Non-volatile memory medium can storage program area and computer program.The computer program includes program instruction, The program instruction is performed, and processor may make to execute any one access credentials verification method.
Processor supports the operation of entire computer equipment for providing calculating and control ability.
Built-in storage provides environment for the operation of the computer program in non-volatile memory medium, the computer program quilt When processor executes, processor may make to execute any one access credentials verification method.
The network interface such as sends the task dispatching of distribution for carrying out network communication.It will be understood by those skilled in the art that Structure shown in Figure 12, only the block diagram of part-structure relevant to application scheme, is not constituted to application scheme The restriction for the computer equipment being applied thereon, specific computer equipment may include more more or fewer than as shown in the figure Component perhaps combines certain components or with different component layouts.
It should be understood that processor can be central processing unit (Central Processing Unit, CPU), it should Processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specially With integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor are patrolled Collect device, discrete hardware components etc..Wherein, general processor can be microprocessor or the processor be also possible to it is any often The processor etc. of rule.
Wherein, in one embodiment, the processor is for running computer program stored in memory, with reality Existing following steps:
The access request that client is sent is obtained, the access request includes access purpose;Obtain the access purpose pair The access code answered;Access credentials are generated according to the access code and the characteristic information of the client;By the access of generation with Card is sent to the client;The access instruction that client is sent is obtained, the access instruction includes the access purpose, described The characteristic information of client and the access credentials;According to the access purpose corresponding access code and the client Characteristic information generates validating documents;If the validating documents are consistent with the access credentials in the access credentials access instruction, The access instruction passes through verifying.
In some embodiments, the access purpose includes the network address of client request access and/or described The file identification of the requested access to file of client.
In some embodiments, the characteristic information of the client includes the public key of the client;
The processor realize access credentials are generated according to the access code and the characteristic information of the client when, For realizing:
Access credentials are generated according to the access code and the public key of the client;
The processor is realizing the characteristic information according to the access corresponding access code of purpose and the client When generating validating documents, for realizing:
According to the public key of client described in the corresponding access code of the access purpose and access instruction generate verifying with Card.
In some embodiments, the access request further includes the public key of the client;The processor is obtained in realization Before taking the corresponding access code of the access purpose, it is also used to realize:
It is whether legal according to client described in the public key verifications of client described in the access request;
If legal, the processor obtains the corresponding access code of the access purpose.
In some embodiments, the access instruction further includes the private key signature of the client;The processor is in reality Before now generating validating documents according to the access corresponding access code of purpose and the characteristic information of the client, it is also used to It realizes:
It is whether correct according to private key signature described in the public key verifications of client described in the access instruction;
If correct, the processor is according to the access corresponding access code of purpose and the characteristic information of the client Generate validating documents.
In some embodiments, the characteristic information of the client includes the expired time of the client;The processing Device realize access credentials are generated according to the access code and the characteristic information of the client when, for realizing:
Access credentials are generated according to the expired time of the access code and the client;
The processor is realizing the characteristic information according to the access corresponding access code of purpose and the client When generating validating documents, for realizing:
It is tested according to the expired time generation of client described in the corresponding access code of the access purpose and access instruction Demonstrate,prove voucher.
In some embodiments, the processor is being realized according to the corresponding access code of access purpose and the visitor Before the characteristic information at family end generates validating documents, it is also used to realize:
Judge whether the access credentials are expired according to the expired time of client described in the access instruction;
If not out of date, the processor is believed according to the feature of the access corresponding access code of purpose and the client Breath generates validating documents.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can It realizes by means of software and necessary general hardware platform.Based on this understanding, the technical solution essence of the application On in other words the part that contributes to existing technology can be embodied in the form of software products, the computer software product It can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes the certain of each embodiment of the application or embodiment Method described in part, such as:
A kind of computer readable storage medium, the computer-readable recording medium storage have computer program, the meter It include program instruction in calculation machine program, the processor executes described program instruction, realizes provided by the embodiments of the present application any Item access credentials verification method.
Wherein, the computer readable storage medium can be the storage inside of computer equipment described in previous embodiment Unit, such as the hard disk or memory of the computer equipment.The computer readable storage medium is also possible to the computer The plug-in type hard disk being equipped on the External memory equipment of equipment, such as the computer equipment, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any Those familiar with the art within the technical scope of the present application, can readily occur in various equivalent modifications or replace It changes, these modifications or substitutions should all cover within the scope of protection of this application.Therefore, the protection scope of the application should be with right It is required that protection scope subject to.

Claims (10)

1. a kind of access credentials verification method characterized by comprising
The access request that client is sent is obtained, the access request includes access purpose;
Obtain the corresponding access code of the access purpose;
Access credentials are generated according to the access code and the characteristic information of the client;
The access credentials of generation are sent to the client;
The access instruction that client is sent is obtained, the access instruction includes the access purpose, the feature of client letter Breath and the access credentials;
Validating documents are generated according to the access corresponding access code of purpose and the characteristic information of the client;
If the validating documents are consistent with the access credentials in the access instruction, the access instruction passes through verifying.
2. access credentials verification method as described in claim 1, it is characterised in that: the access purpose includes the client The file identification of the network address and/or the requested access to file of the client that request access to.
3. access credentials verification method as described in claim 1, it is characterised in that: the characteristic information of the client includes institute State the public key of client;
It is described that access credentials are generated according to the access code and the characteristic information of the client, it specifically includes:
Access credentials are generated according to the access code and the public key of the client;
It is described that validating documents are generated according to the access corresponding access code of purpose and the characteristic information of the client, specifically Include:
Validating documents are generated according to the public key of client described in the corresponding access code of the access purpose and access instruction.
4. access credentials verification method as claimed in claim 3, it is characterised in that: the access request further includes the client The public key at end;
It is described obtain the corresponding access code of the access purpose before, further includes:
It is whether legal according to client described in the public key verifications of client described in the access request;
If legal, the corresponding access code of the access purpose is obtained.
5. access credentials verification method as claimed in claim 3, it is characterised in that: the access instruction further includes the client The private key signature at end;
It is described according to it is described access the corresponding access code of purpose and the client characteristic information generate validating documents before, Further include:
It is whether correct according to private key signature described in the public key verifications of client described in the access instruction;
If correct, validating documents are generated according to the access corresponding access code of purpose and the characteristic information of the client.
6. access credentials verification method according to any one of claims 1 to 5, it is characterised in that: the feature of the client Information includes the expired time of the client;
It is described that access credentials are generated according to the access code and the characteristic information of the client, it specifically includes:
Access credentials are generated according to the expired time of the access code and the client;
It is described that validating documents are generated according to the access corresponding access code of purpose and the characteristic information of the client, specifically Include:
According to the expired time of client described in the corresponding access code of the access purpose and access instruction generate verifying with Card.
7. access credentials verification method as claimed in claim 6, which is characterized in that described corresponding according to the access purpose Access code and the characteristic information of the client generate before validating documents, further includes:
Judge whether the access credentials are expired according to the expired time of client described in the access instruction;
If not out of date, according to it is described access the corresponding access code of purpose and the client characteristic information generate verifying with Card.
8. a kind of access credentials verify device characterized by comprising
First obtains module, and for obtaining the access request of client transmission, the access request includes access purpose;
Second obtains module, for obtaining the corresponding access code of the access purpose;
First generation module, for generating access credentials according to the access code and the characteristic information of the client;
Sending module, for the access credentials of generation to be sent to the client;
Third obtains module, and for obtaining the access instruction of client transmission, the access instruction includes the access purpose, institute State client characteristic information and the access credentials;
Second generation module, for being generated according to the characteristic information of the access corresponding access code of purpose and the client Validating documents;
Authentication module, if consistent with the access credentials in the access instruction for the validating documents, the access instruction Pass through verifying.
9. a kind of computer equipment, which is characterized in that the computer equipment includes memory and processor;
The memory is for storing computer program;
The processor, for executing the computer program and realization such as claim 1- when executing the computer program Access credentials verification method described in any one of 7.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In: if the computer program is executed by processor, realize such as access credentials authentication of any of claims 1-7 Method.
CN201910145579.3A 2019-02-27 2019-02-27 Access credentials verification method, device, computer equipment and storage medium Pending CN109992976A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910145579.3A CN109992976A (en) 2019-02-27 2019-02-27 Access credentials verification method, device, computer equipment and storage medium
PCT/CN2019/091903 WO2020173019A1 (en) 2019-02-27 2019-06-19 Access certificate verification method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910145579.3A CN109992976A (en) 2019-02-27 2019-02-27 Access credentials verification method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109992976A true CN109992976A (en) 2019-07-09

Family

ID=67130210

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910145579.3A Pending CN109992976A (en) 2019-02-27 2019-02-27 Access credentials verification method, device, computer equipment and storage medium

Country Status (2)

Country Link
CN (1) CN109992976A (en)
WO (1) WO2020173019A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443070A (en) * 2019-08-12 2019-11-12 南京芯驰半导体科技有限公司 More host shared memory systems and data completeness protection method
CN112910900A (en) * 2021-02-03 2021-06-04 叮当快药科技集团有限公司 File access control method, device, equipment and storage medium
CN113992420A (en) * 2021-10-29 2022-01-28 蜂巢能源科技(无锡)有限公司 Authority management method, system and electronic equipment
CN115061826A (en) * 2022-02-28 2022-09-16 华为技术有限公司 Component communication method and computing device
CN115277168A (en) * 2022-07-25 2022-11-01 绿盟科技集团股份有限公司 Method, device and system for accessing server

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103428235A (en) * 2012-05-15 2013-12-04 上海博路信息技术有限公司 Data exchange system
CN106295401A (en) * 2016-08-13 2017-01-04 深圳市樊溪电子有限公司 A kind of read-only secure file storage system and method for block chain
CN106844111A (en) * 2016-12-26 2017-06-13 创新科存储技术(深圳)有限公司 The access method of cloud storage NFS
CN106899570A (en) * 2016-12-14 2017-06-27 阿里巴巴集团控股有限公司 The processing method of Quick Response Code, apparatus and system
CN107306246A (en) * 2016-04-18 2017-10-31 北京市神州百戏文化产业有限公司 Based on the data capture method for accessing key
CN108289100A (en) * 2018-01-25 2018-07-17 北京深思数盾科技股份有限公司 A kind of safety access method, terminal device and system
CN109039990A (en) * 2017-06-08 2018-12-18 腾讯科技(深圳)有限公司 The method and device of behavior verifying is carried out based on identifying code
CN109150910A (en) * 2018-10-11 2019-01-04 平安科技(深圳)有限公司 Log in token generation and verification method, device and storage medium
CN109194673A (en) * 2018-09-20 2019-01-11 江苏满运软件科技有限公司 Authentication method, system, equipment and storage medium based on authorized user message
CN109344647A (en) * 2018-09-12 2019-02-15 上海点融信息科技有限责任公司 For the access credentials generation method of block chain network, data access method, storage medium, calculate equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103973736B (en) * 2013-01-30 2017-12-29 华为终端(东莞)有限公司 A kind of method and device of data sharing
CN109347637B (en) * 2018-08-01 2021-01-15 华为技术有限公司 Authentication method, Content Delivery Network (CDN) and content server
CN109150528A (en) * 2018-11-07 2019-01-04 杭州海兴电力科技股份有限公司 A kind of ammeter data access method, device, equipment and readable storage medium storing program for executing

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103428235A (en) * 2012-05-15 2013-12-04 上海博路信息技术有限公司 Data exchange system
CN107306246A (en) * 2016-04-18 2017-10-31 北京市神州百戏文化产业有限公司 Based on the data capture method for accessing key
CN106295401A (en) * 2016-08-13 2017-01-04 深圳市樊溪电子有限公司 A kind of read-only secure file storage system and method for block chain
CN106899570A (en) * 2016-12-14 2017-06-27 阿里巴巴集团控股有限公司 The processing method of Quick Response Code, apparatus and system
CN106844111A (en) * 2016-12-26 2017-06-13 创新科存储技术(深圳)有限公司 The access method of cloud storage NFS
CN109039990A (en) * 2017-06-08 2018-12-18 腾讯科技(深圳)有限公司 The method and device of behavior verifying is carried out based on identifying code
CN108289100A (en) * 2018-01-25 2018-07-17 北京深思数盾科技股份有限公司 A kind of safety access method, terminal device and system
CN109344647A (en) * 2018-09-12 2019-02-15 上海点融信息科技有限责任公司 For the access credentials generation method of block chain network, data access method, storage medium, calculate equipment
CN109194673A (en) * 2018-09-20 2019-01-11 江苏满运软件科技有限公司 Authentication method, system, equipment and storage medium based on authorized user message
CN109150910A (en) * 2018-10-11 2019-01-04 平安科技(深圳)有限公司 Log in token generation and verification method, device and storage medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443070A (en) * 2019-08-12 2019-11-12 南京芯驰半导体科技有限公司 More host shared memory systems and data completeness protection method
CN112910900A (en) * 2021-02-03 2021-06-04 叮当快药科技集团有限公司 File access control method, device, equipment and storage medium
CN113992420A (en) * 2021-10-29 2022-01-28 蜂巢能源科技(无锡)有限公司 Authority management method, system and electronic equipment
CN113992420B (en) * 2021-10-29 2023-12-01 蜂巢能源科技(无锡)有限公司 Authority management method, system, electronic equipment and storage medium
CN115061826A (en) * 2022-02-28 2022-09-16 华为技术有限公司 Component communication method and computing device
CN115061826B (en) * 2022-02-28 2024-02-13 华为技术有限公司 Component communication method and computing device
CN115277168A (en) * 2022-07-25 2022-11-01 绿盟科技集团股份有限公司 Method, device and system for accessing server
CN115277168B (en) * 2022-07-25 2023-05-26 绿盟科技集团股份有限公司 Method, device and system for accessing server

Also Published As

Publication number Publication date
WO2020173019A1 (en) 2020-09-03

Similar Documents

Publication Publication Date Title
US11818253B2 (en) Trustworthy data exchange using distributed databases
US11456876B2 (en) Virtual credentials and licenses
CN101589361B (en) Controlling distribution and use of digital identity representations
CN109992976A (en) Access credentials verification method, device, computer equipment and storage medium
US20180336554A1 (en) Secure electronic transaction authentication
US8539233B2 (en) Binding content licenses to portable storage devices
US20180197263A1 (en) Virtual credentials and licenses
US20130340093A1 (en) System for Managing Computer Data Security Through Portable Data Access Security Tokens
US10721077B2 (en) Using multiple digital identification documents to control information disclosure
WO2009070430A2 (en) Apparatus and methods for providing scalable, dynamic, individualized credential services using mobile telephones
KR20100126291A (en) Method for reading attributes from an id token
KR101543607B1 (en) Medical certificate issuing system and method
CN109274650A (en) A kind of management system and method that electron image is had access to
EP3883204B1 (en) System and method for secure generation, exchange and management of a user identity data using a blockchain
KR101936941B1 (en) Electronic approval system, method, and program using biometric authentication
EP3142064A1 (en) Virtual credentials and licenses
US20240070662A1 (en) Non-fungible token document platform
KR20080048321A (en) Method for issuing certificate including legal guardian's agreements and apparatus thereof
US20230224309A1 (en) Method and system for digital identity and transaction verification
WO2024021785A1 (en) Digital entity processing method and apparatus, device, medium, and program product
WO2021124568A1 (en) Access control device, control method, and program
KR20060110954A (en) Method for issuing contents-certified documents in dvcs
US20130167198A1 (en) Protocol for sequential rights transactions
CN102438014A (en) Back-end constrained delegation model
CN114697114A (en) Data processing method, device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination