CN110290146A - Share generation method, device, server and the storage medium of password - Google Patents

Share generation method, device, server and the storage medium of password Download PDF

Info

Publication number
CN110290146A
CN110290146A CN201910594496.2A CN201910594496A CN110290146A CN 110290146 A CN110290146 A CN 110290146A CN 201910594496 A CN201910594496 A CN 201910594496A CN 110290146 A CN110290146 A CN 110290146A
Authority
CN
China
Prior art keywords
password
rule
strings
sharing
service identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910594496.2A
Other languages
Chinese (zh)
Other versions
CN110290146B (en
Inventor
章碧云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dajia Internet Information Technology Co Ltd
Original Assignee
Beijing Dajia Internet Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dajia Internet Information Technology Co Ltd filed Critical Beijing Dajia Internet Information Technology Co Ltd
Priority to CN201910594496.2A priority Critical patent/CN110290146B/en
Publication of CN110290146A publication Critical patent/CN110290146A/en
Application granted granted Critical
Publication of CN110290146B publication Critical patent/CN110290146B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Abstract

The disclosure is directed to a kind of generation method, device, server and storage mediums for sharing password, are related to Internet technical field.Method includes: to receive the password generated instruction of first terminal, and password generated instruction carries the first business information of password to be generated;It is instructed according to password generated, obtains first service identification of first business information in designated memory space;According to the first password create-rule, the first service identification is encoded, obtains the first sharing password;First, which is sent, to first terminal shares password.Due to distributing the first service identification for the first business information, it is encoded so as to the service identification to first, same set of password generated rule can be used in business different in this way, namely a set of password generated rule can support the sharing of multiple business information, so as to quickly support new business business information sharing, improve scalability and share efficiency.

Description

Share generation method, device, server and the storage medium of password
Technical field
This disclosure relates to Internet technical field more particularly to it is a kind of share the generation method of password, device, server and Storage medium.
Background technique
In order to improve sharing efficiency, the method for carrying out business information sharing by sharing password has been risen.Sharing business When information, generally by server generate share password, and terminal can by replicating the corresponding sharing password of the business information, The corresponding APP of the business information (Application, application program) in opening a terminal is sent the sharing password by APP To server, server parses the sharing password, obtains the corresponding business information of sharing password, and the business information is returned It is shown to terminal, realizes the purpose for sharing business information by sharing password.
In the related technology, for each business, developer needs in advance for a set of password generated rule of the operation code. When server generates the sharing password, according to the corresponding password generated rule of the business, the business information of the business is carried out Coding generates and shares password.
Above-mentioned a set of password generated rule only realizes a kind of business in the related technology, when the business information for sharing new business When, developer needs to recompile the corresponding password generated rule of the new business, so as to cause the generation of above-mentioned sharing password Method can not quickly support the sharing of the business information of new business, cause scalability poor.
Summary of the invention
The disclosure provides a kind of generation method, device, server and storage medium for sharing password, can overcome sharing mouth The generation method of order can not quickly support the sharing of the business information of new business, lead to the problem that scalability is poor.
According to the first aspect of the embodiments of the present disclosure, a kind of generation method for sharing password is provided, which comprises
The password generated instruction of first terminal is received, the password generated instruction carries the first business letter of password to be generated Breath;
It is instructed according to the password generated, obtains first business mark of first business information in designated memory space Know;
According to the first password create-rule, first service identification is encoded, obtains the first sharing password;
Described first, which is sent, to the first terminal shares password.
In one possible implementation, described according to the first password create-rule, to first service identification into Row coding, obtains the first sharing password, comprising:
According to the first password create-rule, first service identification is encoded, the first password strings are obtained;
Obtain the corresponding first version mark of the first password create-rule;
First version mark is shared into password with first password strings composition described first.
It is described according to the first password create-rule in alternatively possible implementation, to first service identification It is encoded, obtains the first sharing password, comprising:
Determine the first check information of first business information;
First check information is encoded according to the first password create-rule, obtains the second password strings;With And according to the first password create-rule, first service identification is encoded, the first password strings are obtained;
According to first password strings and second password strings, generates described first and share password.
It is described according to first password strings and second password strings in alternatively possible implementation, it generates Described first shares password, comprising:
By first password strings and second password strings, third password strings are formed;
According to the first password create-rule, the third password strings are encoded, the 4th password strings are obtained;
By first password strings, second password strings and the 4th password strings, forms described first and share password.
It is described according to the first password create-rule in alternatively possible implementation, to the third password String is encoded, and the 4th password strings are obtained, comprising:
Determine the signing messages of the third password strings;
According to the first password create-rule, the signing messages is encoded, obtains the 5th password strings;
The 4th password strings are selected from the 5th password strings.
It is described according to the first password create-rule in alternatively possible implementation, to first business Mark is encoded, and the first password strings are obtained, comprising:
First service identification is encrypted, the second service identification is obtained;
According to the first password create-rule, second service identification is encoded, obtains first password String.
It is described according to the first password create-rule in alternatively possible implementation, to first service identification It is encoded, before obtaining the first sharing password, the method also includes:
According to the second password generated rule used in front of current time, the of the second password generated rule is determined Two version identifiers;
It is identified according to the second edition, determines that first version identifies;
Coding rule is selected from coding rule library, by first version mark and coding rule composition described the One password create-rule.
In alternatively possible implementation, after the first sharing password to first terminal transmission, The method also includes:
The solution code instruction of second terminal is received, the solution code instruction carries second and shares password;
The second sharing password is decoded, described second is obtained and shares the corresponding third service identification of password;
According to the third service identification, determine that described second shares password corresponding the from the designated memory space Two business information;
Second business information is sent to the second terminal.
In alternatively possible implementation, described second, which shares password, includes the 6th password strings and first version mark Know;
It is described that the second sharing password is decoded, it obtains described second and shares the corresponding third business mark of password Know, comprising:
It is identified according to the first version, obtains decoding rule corresponding with first version mark;
According to the decoding rule, the 6th password strings are decoded, it is corresponding to obtain the second sharing password Third service identification.
It is described according to the decoding rule in alternatively possible implementation, the 6th password strings are solved Code obtains described second and shares the corresponding third service identification of password, comprising:
According to the decoding rule, the 6th password strings are decoded, the 4th service identification is obtained;
4th service identification is decrypted, the third service identification is obtained.
In alternatively possible implementation, the second sharing password includes that third service identification is 6th mouthful corresponding Enable string the 7th password strings corresponding with the second check information;
It is described that the second sharing password is decoded, it obtains described second and shares the corresponding third business mark of password Know, comprising:
7th password strings are decoded, second check information is obtained;
According to second check information, the second sharing password is verified;
When verification passes through, the 6th password strings are decoded, obtain the third service identification.
According to the second aspect of an embodiment of the present disclosure, a kind of generating means for sharing password are provided, described device includes:
First receiving module is configured as receiving the password generated instruction of first terminal, and the password generated instruction carries First business information of password to be generated;
Memory module is configured as being instructed according to the password generated, obtains first business information in specified storage The first service identification in space;
Coding module is configured as encoding first service identification according to the first password create-rule, obtaining First shares password;
First sending module is configured as sending the first sharing password to the first terminal.
In one possible implementation, the coding module is additionally configured to be advised according to first password generated Then, first service identification is encoded, obtains the first password strings;Obtain the first password create-rule corresponding One version identifier;First version mark is shared into password with first password strings composition described first.
In alternatively possible implementation, the coding module is additionally configured to determine first business information The first check information;First check information is encoded according to the first password create-rule, obtains second mouthful Enable string;And according to the first password create-rule, first service identification is encoded, the first password strings are obtained; According to first password strings and second password strings, generates described first and share password.
In alternatively possible implementation, the coding module is also configured first password strings and described Second password strings form third password strings;According to the first password create-rule, the third password strings are encoded, Obtain the 4th password strings;By first password strings, second password strings and the 4th password strings, described first point is formed Enjoy password.
In alternatively possible implementation, the coding module is also configured to determine the label of the third password strings Name information;According to the first password create-rule, the signing messages is encoded, obtains the 5th password strings;From described The 4th password strings are selected in 5th password strings.
In alternatively possible implementation, the coding module is also configured to carry out first service identification Encryption, obtains the second service identification;According to the first password create-rule, second service identification is encoded, is obtained To first password strings.
In alternatively possible implementation, described device further include:
First determining module is configured as determining institute according to the second password generated rule used before current time State the second edition mark of the second password generated rule;
Second determining module is configured as being identified according to the second edition, determines that first version identifies;
Selecting module is configured as selecting coding rule from coding rule library, by the first version mark and it is described Coding rule forms the first password create-rule.
In alternatively possible implementation, described device further include:
Second receiving module is configured as receiving the solution code instruction of second terminal, and the solution code instruction carries second and shares Password;
Decoder module is configured as being decoded the second sharing password, it is corresponding to obtain the second sharing password Third service identification;
Third determining module is configured as determining institute from the designated memory space according to the third service identification State corresponding second business information of the second sharing password;
Second sending module is configured as sending second business information to the second terminal.
In alternatively possible implementation, described second, which shares password, includes the 6th password strings and first version mark Know;
Decoder module is additionally configured to be identified according to the first version, obtain corresponding with first version mark Decoding rule;According to the decoding rule, the 6th password strings are decoded, it is corresponding to obtain the second sharing password Third service identification.
In alternatively possible implementation, the decoder module is additionally configured to according to the decoding rule, to institute It states the 6th password strings to be decoded, obtains the 4th service identification;4th service identification is decrypted, the third is obtained Service identification.
In alternatively possible implementation, the second sharing password includes that third service identification is 6th mouthful corresponding Enable string the 7th password strings corresponding with the second check information;
Decoder module is additionally configured to be decoded the 7th password strings, obtains second check information;According to institute The second check information is stated, the second sharing password is verified;When verification passes through, the 6th password strings are solved Code, obtains the third service identification.
According to the third aspect of an embodiment of the present disclosure, a kind of server is provided, comprising:
One or more processors;
For storing one or more memories of one or more of processor-executable instructions;
Wherein, one or more of processors are configured as executing sharing described in the first aspect of the embodiment of the present disclosure The generation method of password.
According to a fourth aspect of embodiments of the present disclosure, a kind of non-transitorycomputer readable storage medium is provided, when described When instruction in storage medium is executed by the processor of terminal, the first aspect for executing the embodiment of the present disclosure is enabled the server to The generation method of the sharing password.
According to a fifth aspect of the embodiments of the present disclosure, a kind of application program is provided, when the instruction in the application program by When the processor of server executes, enable the server to execute sharing password described in the first aspect of the embodiment of the present disclosure Generation method.
The technical scheme provided by this disclosed embodiment can include the following benefits: in the embodiments of the present disclosure, connect The password generated instruction for receiving first terminal obtains the first business information in password generated instruction in designated memory space First service identification encodes first service identification, obtains the first sharing password, and first that coding is obtained shares mouth Order returns to first terminal.Due to distributing the first service identification for the first business information, so as to first service identification It is encoded, business different in this way can be used same set of password generated rule namely a set of password generated rule and can prop up Hold the sharing of multiple business information, so as to quickly support new business business information sharing, improve scalability with And share efficiency.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of implementation environment schematic diagram of generation method for sharing password shown according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment.
Fig. 3 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment.
Fig. 4 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment.
Fig. 5 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment.
Fig. 6 is a kind of block diagram of generating means for sharing password shown according to an exemplary embodiment.
Fig. 7 is a kind of block diagram of terminal shown according to an exemplary embodiment.
Fig. 8 is a kind of block diagram of server shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of implementation environment schematic diagram of the generation method of the sharing password provided according to the embodiment of the present disclosure.Such as Shown in Fig. 1, which may include: first terminal 101, second terminal 102 and server 103.First terminal 101 is to ask The equipment for sharing password is sought survival into, server 103 makes a living into the equipment for sharing password.Server 103 is given birth to for first terminal 101 After sharing password, which can be shared with second terminal 102 by first terminal 101;Correspondingly, second terminal 102 For by the equipment of sharing password.
Wherein, the first APP (Application, application program) is installed on first terminal 101, when first terminal 101 is shared When the first business information in the first APP, first terminal 101 sends password generated instruction to server 103, which refers to It enables and carries first business information.Server 103 generates first and shares password, first is shared according to first business information Password returns to first terminal 101.2nd APP is also installed, first terminal 101 can be incited somebody to action by the 2nd APP on first terminal 101 First sharing password is shared with second terminal 102, thus second terminal 102 can based on the sharing password quick obtaining to this One business information.
First APP can be shopping APP, short-sighted frequency APP, live streaming APP, video playing APP etc..The business can be first Any business in terminal 101, the business can be shopping, live streaming, works displaying or tag along sort etc., first business information It may include the information such as type of service and the business tine of the business.Correspondingly, server 103 is the corresponding backstage the first APP Server 103.2nd APP can be social application APP.The first terminal 101 and second terminal 102 can be mechanical, electrical for hand Brain or wearable device etc..First terminal 101 and second terminal 102 can be carried out by network connection and server 103 Data interaction.
For example, when the first APP is live streaming APP, when first terminal 101 detects that user needs to share live streaming APP In live broadcast service when, first terminal 101 sends password generated to the corresponding server 103 of live streaming APP by live streaming APP Instruction, correspondingly, after the password generated that the corresponding server 103 of live streaming APP receives the transmission of first terminal 101 instructs, root Instruct to generate according to the password generated and share password, the live information of the live broadcast service is carried in the sharing password, be such as broadcast live address, User etc. is broadcast live.The sharing password is sent to first terminal 101 by server 103.First terminal 101 receives server 103 After the sharing password of transmission, the sharing password can be replicated in live streaming APP, sharing by the 2nd APP in the terminal should Corresponding sharing password is broadcast live.First terminal 101 can also replicate the sharing password by live streaming APP, open first terminal Payment APP in 101 carries out the operation such as pay to the direct broadcast band of payment.
When the first APP is short-sighted frequency APP, when first terminal 101 detects that user needs to share in the short-sighted frequency APP Short video work when, first terminal 101 sends password to the corresponding server 103 of the short-sighted frequency APP by the short-sighted frequency APP Instruction is generated, correspondingly, the corresponding server 103 of the short-sighted frequency APP receives the password generated instruction of the transmission of first terminal 101 Afterwards, it is instructed to generate according to the password generated and shares password, the works information of the short video work is carried in the sharing password, is such as regarded Frequency author, video name etc..The sharing password is sent to first terminal 101 by server 103.First terminal 101 receives clothes It is engaged in after the sharing password that device 103 is sent, the sharing password can be replicated on the short-sighted frequency APP, pass through the 2nd APP in terminal Share the corresponding sharing password of the short video work.First terminal 101 can also replicate the sharing mouth by the short-sighted frequency APP It enables, opens other video playings APP in first terminal 101, which is played by other video playings APP.
In the embodiments of the present disclosure, the first password create-rule is stored in server 103, is advised by first password generated Then, it instructs corresponding first service identification to encode the password generated received, obtains the first sharing password.Due to this One service identification be server 103 receive password generated instruction after, for first business information distribution the first service identification, Therefore, first service identification can be encoded by the first unified password create-rule, without being first terminal 101 Each of business all generate the first password create-rule so that same set of password generated rule can be used in multiple business. Therefore, when there is the business information of new business to need to share, developer does not need the password generated rule for developing new business again Then, directly can quickly generate sharing password namely this method by this method can quickly support the sharing of new business.
Fig. 2 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment, such as Fig. 1 institute Show, the generation method of the sharing password includes the following steps.
In the step s 21, the password generated instruction of first terminal is received, password generated instruction carries password to be generated First business information;
It in step S22, is instructed according to the password generated, obtains the of first business information in designated memory space One service identification;
In step S23, according to the first password create-rule, which is encoded, obtains first point Enjoy password;
In step s 24, the first sharing password is sent to the first terminal.
In one possible implementation, this compiles first service identification according to the first password create-rule Code, obtains the first sharing password, comprising:
According to the first password create-rule, which is encoded, the first password strings are obtained;
Obtain the corresponding first version mark of the first password create-rule;
The first version is identified and forms this with first password strings and first shares password.
In alternatively possible implementation, this carries out first service identification according to the first password create-rule Coding, obtains the first sharing password, comprising:
Determine the first check information of first business information;
First check information is encoded according to the first password create-rule, obtains the second password strings;And root According to the first password create-rule, which is encoded, the first password strings are obtained;
According to first password strings and second password strings, the first sharing password is generated.
In alternatively possible implementation, this according to first password strings and second password strings, generate this first Share password, comprising:
By first password strings and second password strings, third password strings are formed;
According to the first password create-rule, which is encoded, the 4th password strings are obtained;
By first password strings, second password strings and the 4th password strings, the first sharing password is formed.
In alternatively possible implementation, this carries out the third password strings according to the first password create-rule Coding, obtains the 4th password strings, comprising:
Determine the signing messages of the third password strings;
According to the first password create-rule, which is encoded, the 5th password strings are obtained;
The 4th password strings are selected from the 5th password strings.
In alternatively possible implementation, this according to the first password create-rule, to first service identification into Row coding, obtains the first password strings, comprising:
First service identification is encrypted, the second service identification is obtained;
According to the first password create-rule, which is encoded, obtains first password strings.
In alternatively possible implementation, this carries out first service identification according to the first password create-rule Coding, before obtaining the first sharing password, this method further include:
According to the second password generated rule used before current time, the second of second password generated rule is determined Version identifier;
It is identified according to the second edition, determines that first version identifies;
Coding rule is selected from coding rule library, which is identified and the coding rule forms first password Create-rule.
In alternatively possible implementation, after this sends the first sharing password to the first terminal, this method Further include:
The solution code instruction of second terminal is received, which carries second and share password;
The second sharing password is decoded, the corresponding third service identification of the second sharing password is obtained;
According to the third service identification, corresponding second business of the second sharing password is determined from the designated memory space Information;
Second business information is sent to the second terminal.
In alternatively possible implementation, which includes that the 6th password strings and first version identify;
This is decoded the second sharing password, obtains the corresponding third service identification of the second sharing password, comprising:
It is identified according to the first version, obtains decoding rule corresponding with first version mark;
According to decoding rule, the 6th password strings are decoded, obtain the corresponding third industry of the second sharing password Business mark.
In alternatively possible implementation, this is decoded the 6th password strings, obtains according to decoding rule The corresponding third service identification of second sharing password, comprising:
According to decoding rule, the 6th password strings are decoded, the 4th service identification is obtained;
4th service identification is decrypted, the third service identification is obtained.
In alternatively possible implementation, which includes corresponding 6th password of third service identification String the 7th password strings corresponding with the second check information;
This is decoded the second sharing password, obtains the corresponding third service identification of the second sharing password, comprising:
7th password strings are decoded, second check information is obtained;
According to second check information, which is verified;
When verification passes through, the 6th password strings are decoded, obtain the third service identification.
In the embodiments of the present disclosure, the password generated instruction for receiving first terminal, obtains the in password generated instruction First service identification of one business information in designated memory space, encodes first service identification, obtains first point Password is enjoyed, the first sharing password that coding is obtained returns to first terminal.Due to distributing the first business for the first business information Mark, encodes so as to the service identification to first, and same set of password generated rule can be used in business different in this way Then namely a set of password generated rule can support the sharings of multiple business information, so as to quickly support the industry of new business The sharing for information of being engaged in improves scalability and shares efficiency.
Fig. 3 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment, such as Fig. 3 institute Show, the generation method of the sharing password includes the following steps.
In step S31, server receives the password generated instruction of first terminal, and password generated instruction carries to be generated First business information of password.
Multiple applications can be installed on the first terminal, include different business in multiple application, user can answer Business information is checked in.When user wants to share the business information checked, user triggers sharing request to terminal, and terminal connects When receiving the sharing request, the first business information to be shared is obtained, sends password generated instruction, the password generated to server Instruction carries the first business information.Wherein, show to include sharing button in the interface of the business information;When terminal detects this point When enjoying button and being triggered, the sharing request for receiving user's triggering is determined.
First business information can be the business information of any application;For example, first business information is live broadcast service Information;Then user is broadcast live by first terminal, is arrived when needing that the live broadcast service information is shared with to other users or is shared When task under other application, user can click the sharing button in first terminal, when first terminal detect the sharing by When button is triggered, first terminal, which can determine, generates sharing instruction, sends password generated instruction, the password generated to server Instruction carries live broadcast service information.
In step s 32, server is instructed according to the password generated, obtains first business information in designated memory space In the first service identification.
When server receives password generated instruction, is instructed from the password generated, get the first business information.Service After device gets password generated instruction, which can be stored in the designated memory space;And for this One business information distributes the first service identification, correspondingly, in this step, it is specified at this that server obtains first business information Corresponding first service identification in memory space.Wherein, it is first business information which, which can be server, The first service identification being randomly assigned, first service identification can also be server according to first business information, to this The first service identification that business tine in one business information is encoded.In the embodiments of the present disclosure, to first industry The acquisition modes of business mark are not especially limited.
When the acquisition modes of first business are by being encoded to obtain to the business tine in first business information The first service identification when, the step of server obtains the first service identification of first business information in the designated memory space It can be with are as follows: server obtains the business tine in first business information according to first business information, by the business tine root It is encoded according to the storage format of the designated memory space of the server, obtains the first service identification of unified format.
Wherein, which, which can according to need, is configured and changes, in the embodiments of the present disclosure, to the coding staff Formula is not especially limited.For example, can be compiled using URI (Uniform Resource Identifier, uniform resource identifier) The mode of code is to the storage format in the designated memory space.
After server gets first business information corresponding first service identification, by first business information and One service identification associated storage is in the designated memory space of the server.Wherein, designated memory space can be tables of data.Phase It answers, server can only add a varchar field to store the first service identification of URI coded format in tables of data , also, library can also be parsed by unified URI to parse.
For example, server carries out URI coding to live broadcast service information when the first business information is live broadcast service information, obtain It can be scheme to corresponding first service identification of live broadcast service information: //livestream/ { livestream_id }.Again Such as, when the first business information is video service information, server carries out URI coding to video service information, obtains video industry Can corresponding first service identification of information of being engaged in be scheme: //photo/ { photo_id }? author_id=XXXX.For another example, When the first business information is tagged traffic information, server carries out URI coding to tagged traffic information, obtains tagged traffic letter Ceasing corresponding first service identification can be scheme: //tag/ { tag_name } etc..
In the embodiments of the present disclosure, server is encoded by carrying out unified URI to the first business information, obtains the first industry Business mark, in this way in the first business information of associated storage and the first service identification, it is only necessary to add one in data list structure A field, so that it may store multiple first service identifications, simplify the structure of tables of data.
In step S33, server encodes first service identification, obtains according to the first password create-rule To the first password strings.
After server gets the first service identification, can determine the first current password create-rule, according to this first Password generated rule encodes first service identification, obtains the first password strings.The first password create-rule can root It needs to be configured and change according to user, in the embodiments of the present disclosure, which is not especially limited.Example Such as, which can be 62 system said shank rules.
In a kind of possible implementation, the first password create-rule can be the pre-determined password generated rule of user Then, when server gets the first service identification of the first business information, all with the first password create-rule to this first Service identification is encoded, and the first password strings are obtained.In alternatively possible implementation, which can To carry out version updating as needed.Correspondingly, the first password create-rule can be the new mouth that server is currently generated Enable create-rule.When the first password create-rule is the new password generated rule that server is currently generated, the server Determine that the process of the first password create-rule can be realized by following steps (A1)-(A3), comprising:
(A1) server determines second password generated according to the second password generated rule used before current time The second edition mark of rule.
In one possible implementation, the second password generated rule that history uses is stored in server, and is associated with Store the second password generated rule and second edition mark;Correspondingly, server according to the second password generated rule, obtains and should The second edition of second password generated rule association identifies.In alternatively possible implementation, the second password generated rule In specific field in storage the second edition mark.Server is directly obtained from the specific field in the second password generated rule Second edition mark.Wherein, the second password generated rule can be for from most recently used password generated rule before current time. Second edition mark can be the second edition number of the second password generated rule.
(A2) server is identified according to the second edition, determines that first version identifies.
In one possible implementation, first version mark and second edition mark are respectively the first password generated The version number of rule and the second password generated rule.Correspondingly, in this step, server gets second edition mark Afterwards, which can be identified into corresponding version number and adds default value, obtain first version mark.Wherein, this is default Numerical value can be any value of non-zero, for example, the default value can be -1,1 or 2 etc..
In alternatively possible implementation, multiple version identifiers are stored in the server, server gets After two version identifiers, second edition mark is deleted from stored multiple version identifiers, from remaining multiple version identifiers Middle selection first version mark.
In alternatively possible implementation, server is identified according to the second edition, random to generate and second edition mark Know different first version marks.It should be noted is that server identifies different first from the second edition according to generation When version identifier, first version mark is different from old version mark.
(A3) server selects coding rule from coding rule library, which is identified and the coding rule forms The first password create-rule.
In one possible implementation, multiple coding rules are stored in the server, correspondingly, terminal is directly from this A coding rule is selected in multiple coding rules, by the coding rule of selection and first version mark the first password generated of composition Rule.Wherein, server first service identification can be arranged after the coding rule, obtain the first password generated rule Then, first service identification can also be arranged before the coding rule for server, obtain the first password create-rule;Service First service identification can also be inserted into the specific field of the coding rule by device, obtain the first password create-rule.In this public affairs It opens in embodiment, the concrete mode of coding rule and first version mark the first password create-rule of composition is not limited specifically It is fixed.
In alternatively possible implementation, coding rule can not also be stored in server, directly storage password is raw It include version identifier at rule, and in password generated rule.Correspondingly, step (A3) could alternatively be: server is according to this First version mark determines that the password generated rule including first version mark is first from multiple password generated rules Password generated rule.
It should be noted is that server can periodically update the first password create-rule, so that it is guaranteed that safety.And And in the embodiments of the present disclosure, the opportunity of server update the first password rule is not especially limited.A kind of possible In implementation, server can periodically generate the first password create-rule, correspondingly, server is updated every preset duration Second password generated rule, obtains the first password create-rule, which can be configured and more according to user demand Change, in the embodiments of the present disclosure, which is not especially limited.For example, the preset duration can for 1min, 5min or 10min etc..
In alternatively possible implementation, server can also be in the more new command for receiving first terminal transmission When, which is updated, the first password create-rule is obtained.Correspondingly, can be in the more new command New coding rule is carried, server generates the first password create-rule according to the new coding rule.
In alternatively possible implementation, server can also detect current second password generated rule whether by Leakage, when the second password generated rule is leaked, server automatically updates current second password generated rule, obtains the One password create-rule.Wherein, server detect the mode that is leaked of the second password generated rule can be with are as follows: when server receives When to invalid sharing password, determine that current second generation password is leaked.
In alternatively possible implementation, server detects the sharing generated according to current second password generated rule The quantity of password, when the quantity is equal to preset quantity, server, which determines, to need to carry out the second current password generated rule It updates.Wherein, which, which can according to need, is configured and changes, in the embodiments of the present disclosure, to the preset quantity It is not especially limited.For example, the preset quantity can be 10,15 or 25 etc..
In alternatively possible implementation, after server receives the first business information, to first business information It is detected, when first business information is the task of new type, updates second password generated rule, obtain the first password Create-rule.
In this implementation, it is added to version identifier in sharing password, so that server can root in decoding process The create-rule of the sharing password is determined according to the version identifier, so that it is determined that going out the decoding rule of the sharing password, to compile solution It, can quick change password create-rule after code mode is leaked, it is therefore prevented that encoding and decoding rule leaks bring risk.
In addition, in one possible implementation, server is according to the first password create-rule directly to first industry Business mark is encoded, and the first password strings are obtained.In alternatively possible implementation, server is first to the first business mark Knowledge is encrypted, and encrypted first service identification is obtained, and is carried out according to the first password create-rule to second service identification Coding, obtains the second password strings.When the server encodes encrypted first service identification, this step can pass through Following steps (B1)-(B2) is realized, comprising:
(B1) server encrypts first service identification, obtains the second service identification.
In this step, after server gets the first service identification, which is encrypted, obtains Two service identifications, second service identification are encrypted first service identification.
Server can encrypt the first service identification using symmetric cryptography mode, and it is non-right that server can also use Cipher mode is claimed to encrypt first service identification.In the embodiments of the present disclosure, to the cipher mode of the first service identification It is not especially limited.For example, server can by the way of asymmetric encryption encrypt the first service identification, the encryption Need to use two keys: public-key cryptography (publickey: abbreviation public key) and private cipher key (privatekey: referred to as in the process Private key).When server encrypts the first service identification, a pair of of public key and private key are generated, server is by public key to first Service identification carries out encryption and the first service identification is decrypted by private key.
In this implementation, by being encrypted to the second service identification before password is shared in generation first, according to Encrypted second service identification obtains sharing password, improves the safety for sharing password.
(B2) server encodes second service identification according to the first password create-rule, obtain this first Password strings.
After server obtains encrypted second service identification, according to the first password create-rule, to second business Mark is encoded, and the first password strings are obtained.
It should be noted is that directly can be concatenated into according to first password after server has executed this step One shares password, and the first sharing password is sent to first terminal namely after server executed this step, can not be held Row step S34-S35, directly execution step S36;Server can also execute step S34 after generating the first password strings, determine The corresponding first version mark of the password strings, generates first in conjunction with first version mark and shares password.
In step S34, server obtains the corresponding first version mark of the first password create-rule.
In this step, according to the first current password create-rule, the first password create-rule corresponding is determined One version identifier.In one possible implementation, server according to the first password create-rule from password generated rule and In the corresponding relationship of version identifier, the corresponding first version mark of the first password create-rule is determined.In alternatively possible reality In existing mode, the designated character of the first password create-rule is for storing first version mark, and server is from first password First version mark is obtained in the designated character of create-rule.
In step s 35, server, which identifies the first version, forms this with first password strings and first shares password.
Server determines the first password create-rule pair according to the corresponding first password create-rule of first password strings After the first version mark answered, first version mark is shared into password with the first password strings composition first.
It should be noted is that server, which identifies the first version, shares password with the first password strings composition first When, directly first version mark and the first password strings can be combined, first the first version can also be identified and carried out First version mark after coding is combined by coding with the first password strings.Server compiles first version mark The coding rule of code is identical as the first password create-rule.It needs to illustrate on the other hand, first version mark and first Enabling the combination of string can according to need and is configured and changes, first version mark can before the first password strings, First version mark can also be after the first password strings, in the embodiments of the present disclosure, to first version mark and first The combination of string is enabled to be not especially limited.For example, the first version is identified as " X ", which is " 2HVuPD31koB ", then the first sharing password can be " X2HVuPD31koB ".In addition, first version mark and second It between password strings, can be directly connected to, can also be connected by designated symbols, in the embodiments of the present disclosure, to the designated symbols It is not especially limited.For example, the character can be "-" "+" " * " etc..
In step S36, server sends the first sharing password to the first terminal.
First sharing password of generation is sent to first terminal by server.It should be noted is that first terminal connects After receiving the sharing password, directly the first sharing password can be identified by the first terminal.First terminal receives To after the sharing password, it can also be sent to second terminal by the 2nd APP in first terminal, wherein the 2nd APP is social activity Using APP, correspondingly, needing after second terminal receives the first sharing password that server is sent to the first sharing password It is identified, the first sharing password is decoded by server when identification, server is received according to solution code instruction docking Sharing password be decoded, obtain the corresponding business information of sharing password, then the business information is sent to second terminal.
In the embodiments of the present disclosure, the password generated instruction for receiving first terminal, obtains the in password generated instruction First service identification of one business information in designated memory space, encodes first service identification, obtains first point Password is enjoyed, the first sharing password that coding is obtained returns to first terminal.Due to distributing the first business for the first business information Mark, encodes so as to the service identification to first, and same set of password generated rule can be used in business different in this way Then namely a set of password generated rule can support the sharings of multiple business information, so as to quickly support the industry of new business The sharing for information of being engaged in improves scalability and shares efficiency.
Fig. 4 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment, such as Fig. 4 institute Show, the generation method of the sharing password includes the following steps.
In step S41, server receives the password generated instruction of first terminal, and password generated instruction carries to be generated First business information of password.
This step is identical as step S31, and details are not described herein.
In step S42, server is instructed according to the password generated, obtains first business information in designated memory space In the first service identification.
This step is identical as step S32, and details are not described herein.
In step S43, server determines the first check information of first business information.
First check information can be deserve previous existence at first share password timestamp, can also be what user inputted Information is in the embodiments of the present disclosure not especially limited first check information.When first check information is to be currently generated When the timestamp of the first sharing password, server obtains the timestamp for being currently generated the first sharing password, which is made It is stored for the first check information.When first check information is the information of user's input, the information of user input can Think character string etc., server receives the information of user's input, and the information which is inputted is as the first check information.
In step S44, server encodes first check information according to the first password create-rule, obtains Second password strings.
In this step, after server gets the first checking information, according to the first password create-rule to this first Check information is encoded, and is obtained, and the second password strings, this step is similar to step S33, and details are not described herein.
In step S45, server encodes first service identification, obtains according to the first password create-rule To the first password strings.
This step is identical as step S33, and details are not described herein.
It, can also be with it should be noted is that server can first encode the first business to obtain the first password strings First the first check information is encoded, obtains the second password strings, first service identification and first can also be verified simultaneously Information is encoded, and the first password strings and the second password strings are obtained.That is, server can first carry out step S44 executes step again Rapid S45, server can also first carry out step S45 and execute step S44 again, and server may also be performed simultaneously step S44 and step Rapid S45 is in the embodiments of the present disclosure not especially limited the sequence for executing step S44 and step S45.
In step S46, server generates the first sharing password according to first password strings and second password strings.
After server determines the first password strings and the second password strings, can according to first password strings and the second password strings, First password strings and the second password strings are combined, the first sharing password is obtained.In one possible implementation, it takes First password strings and the second password strings can be directly attached by business device, obtain the first sharing password.Alternatively possible Implementation in, between first password strings and the second password strings by designated symbols connect, which can be "-" "+" " * " etc. is in the embodiments of the present disclosure not especially limited the designated symbols.Also, first password strings can be It, can also be before the second password strings, in the embodiments of the present disclosure, to first password strings and the second password after two password strings The positional relationship of string is not especially limited.
In addition, first password strings directly can be combined into first with the second password strings group by server shares password, service Device can also be combined into third password strings according to the first password strings and the second password strings group, and the first is arranged according to third password strings The third password strings are combined into first with signing messages group and share password by the information of order.When the server is according to first password String and the second password strings group are combined into third password strings, the information of first password are arranged according to third password strings, by the third mouth It enables string be combined into the first process for sharing password with signing messages group, can be realized by following steps (1)-(3), comprising:
(1) first password strings and second password strings are formed third password strings by server.
In this step, the sequence of first password strings and the second password strings is also not especially limited.Also, this first It can directly combine, can also be connected by symbol, in the embodiments of the present disclosure, to this between password strings and the second password strings It is not especially limited.For example, first password strings are " 2HVuPD31koB ", which is " -4DcGKnVStM ", should Can be by " _ " connection between first password strings and the second password strings, then the third password strings are " 2HVuPD31koB_- 4DcGKnVStM”。
(2) server encodes the third password strings, obtains the 4th password according to the first password create-rule String.
In this step, the character string that server can directly obtain the coding is as the 4th password strings, and server is also Can from coding obtained character string selected section character string as the 4th password strings, correspondingly, this step can by with Lower step (2-1)-(2-3) is realized, comprising:
(2-1) server determines the signing messages of the third password strings.
The signing messages can be the character string information of third password strings or the partial character string letter in the third password strings Breath, the signing messages can according to the third password strings determine cryptographic Hash (hashcode), in the embodiments of the present disclosure, This is not especially limited.For example, the signing messages can be the corresponding all information of third password label, the signing messages Can be " 2HVuPD31koB_-4DcGKnVStM ".
(2-2) server encodes the signing messages, obtains the 5th password according to the first password create-rule String.
This step is similar to step S33, and details are not described herein.
(2-3) server selects the 4th password strings from the 5th password strings.
In this step, server can all regard the 5th password strings of generation as the 4th password strings, and server can also To select the part password strings in the 5th password strings as the 4th password strings, in the embodiments of the present disclosure, this is not made specific It limits.It should be noted is that when server selects the part password strings in the 5th password strings as four password strings, The preceding several password strings that can choose the 5th password strings also can choose rear several password strings of the 5th password strings, can be with root According to pre-determined selection rule, the 5th password strings are chosen, in the embodiments of the present disclosure, the selection to the 4th password strings are chosen Rule is not especially limited.
For example, the third password strings be the first password strings and the second password strings cryptographic Hash, server to the cryptographic Hash into Row coding, obtains the 5th password strings, selects the 4th password strings for " CNko " from the 5th password strings.
(3) first password strings, second password strings and the 4th password strings are formed the first sharing mouth by server It enables.
In this step, the first password strings, the second password strings are shared password with the 4th password strings composition first by server. It should be noted is that in the embodiments of the present disclosure, not making to the position of the first password strings, second mouthful of string and the 4th password strings It is specific to limit, also, can be connected between first password strings, the second password strings and the 4th password strings with elder sister, it can also pass through Symbol connection, in the embodiments of the present disclosure, to the connection type between first password strings, the second password strings and the 4th password strings It is not especially limited.For example, first password strings are " 2HVuPD31koB ", which is " -4DcGKnVStM ", should It can be " CNko " by " _ " connection, the 4th password strings between first password strings and the second password strings, the 4th password strings exist After second password strings, then the first sharing password can be " 2HVuPD31koB_-4DcGKnVStMCNko "
In this implementation, by adding check information in sharing password, legal test is carried out to the first sharing password Card and timeliness verifying, avoid by arbitrarily constructing sharing password and obtain content information, improve the safety for sharing password.
In step S47, server sends the first sharing password to the second terminal.
This step is identical as step S36, and details are not described herein.
In the embodiments of the present disclosure, the password generated instruction for receiving first terminal, obtains the in password generated instruction First service identification of one business information in designated memory space, encodes first service identification, obtains first point Password is enjoyed, the first sharing password that coding is obtained returns to first terminal.Due to distributing the first business for the first business information Mark, encodes so as to the service identification to first, and same set of password generated rule can be used in business different in this way Then namely a set of password generated rule can support the sharings of multiple business information, so as to quickly support the industry of new business The sharing for information of being engaged in improves scalability and shares efficiency.
In the embodiments of the present disclosure, second terminal receives the first sharing password that first terminal is sent, in second terminal, Show that this first shares password, when user need to obtain this first share password corresponding business information when, second terminal can be with To server send this first share password, for the ease of distinguish, the sharing password that second terminal is sent to server as Second shares password, and the first sharing password and the second sharing password can be the same or different, when the first sharing password When being not tampered with, the first sharing password and second shares password for identical sharing password, when the second sharing password is When the sharing password being tampered, first, which shares password and second, shares password for different sharing passwords.
Fig. 5 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment, such as Fig. 5 institute Show, the generation method of the sharing password includes the following steps.
In step s 51, server receives the solution code instruction of second terminal, which carries second and share password.
Second terminal connects needs and is decoded to the second sharing password.Wherein, this second share password can be for the One shares the identical sharing password of password, or the sharing password different from the first sharing password, in the embodiment of the present disclosure In, this is not especially limited.Also, the second terminal can with first terminal be identical terminal, can also with this first Terminal is that different terminals is in the embodiments of the present disclosure not especially limited this.When the second terminal receives server hair After second sent shares password, when user needs to check the second sharing password, the second sharing password can be replicated, is opened Relevant APP replicates the second sharing password to shear plate when second terminal detects in one possible implementation When, second terminal sends solution code instruction to server.In alternatively possible implementation, the second terminal receive this When two sharing passwords, solution code instruction just is sent to server.
In step S52, server is decoded the second sharing password, obtains this and second shares password corresponding the Three service identifications.
After server receives the solution code instruction of second terminal transmission, second parsed in the solution code instruction shares password, After obtaining the second sharing password, second server is decoded the second sharing password, obtains in the second sharing password Third service identification.Wherein, which is opposite process with the cataloged procedure of the terminal, for example, the cataloged procedure 62 scale codings are carried out for the third service identification to 10 system, obtain the third service identification of 62 systems, then the decoding Journey is to be decoded to the third service identification of 62 system, obtains the third service identification of 10 systems.
In one possible implementation, after server gets the second sharing password, directly current password generated Rule, determining decoding rule corresponding with password generated rule solve the second sharing password according to decoding rule Code.
In alternatively possible implementation, which includes that the 6th password strings and first version identify. Correspondingly, this step can be realized by following procedure (1)-(2), comprising:
(1) server is identified according to the first version, obtains decoding rule corresponding with first version mark.
Server is identified according to the first version, determines the first password create-rule corresponding with first version mark, According to the first password create-rule, decoding rule corresponding with the first password create-rule is determined.
(2) server is decoded the 6th password strings according to decoding rule, and it is corresponding to obtain the second sharing password Third service identification.
In one possible implementation, the third service identification in the second sharing password does not have in an encoding process It is encrypted, then in this step, server can directly be decrypted the second sharing password, obtain third service identification. In alternatively possible implementation, this second share password in third service identification in an encoding process be encrypted, Then in this step, server decoding first obtains the 4th service identification, and server needs that the 4th service identification is decrypted, obtains To third service identification.Correspondingly, the process can be realized by following steps (2-A1)-(2-A2), comprising:
(2-A1) server is decoded the 6th password strings, obtains the 4th service identification according to decoding rule.
Server is decoded the second sharing password according to decoding rule, obtains the 4th service identification, the 4th business It is identified as the 4th encrypted service identification.
The 4th service identification is decrypted in (2-A2) server, obtains the third service identification.
Server determines the cipher mode of the 4th business, determines manner of decryption according to the cipher mode, passes through the decryption The 4th service identification is decrypted in mode, obtains third service identification.For example, when the 4th business is to be added by asymmetric When the service identification that close mode obtains, the secret keys of the 4th service identification are determined, according to the decruption key to the 4th industry Business mark is decrypted, and obtains third service identification.
In addition, check information can also be carried in the second sharing password, correspondingly, the second sharing password includes third Corresponding 6th password strings of service identification and corresponding 7th password strings of the second check information.In this step, server may be used also To verify to the second sharing password, the process which verifies the second sharing password can be by following Step (2-B1)-(2-B3) is realized, comprising:
(2-B1) server is decoded the 7th password strings, obtains second check information.
In this step, server is decoded the 7th password strings, obtains the second verification of the second sharing password Information.Second check information may include timestamp information and second cryptographic Hash for sharing password of the second sharing password At least one of.
(2-B2) server verifies the second sharing password according to second check information.
When second check information is the timestamp information of the second sharing password, the server is to the second sharing mouth Enable the process that is verified can be with are as follows: server obtains current timestamp, and according to second timestamp for sharing password The effective time of acquisition of information the second sharing password and the second generation timestamp for sharing password;According to the second sharing mouth The generation timestamp and current time stamp of order, determine the current time stamp whether this second share password effective time in, When the current time stamp is in the effective time of the second sharing password, determine that the second sharing password verification passes through;When this When current time stamp is not in the effective time of the second sharing password, determine that the second sharing password verification does not pass through.
When second check information is the cryptographic Hash of the second sharing password, according to the Hash of the second sharing password Value determines that the second sharing password verification passes through when the cryptographic Hash of the second sharing password is identical as second check information; When the cryptographic Hash and the second check information difference of the second sharing password, determine that the second sharing password verification does not pass through. It should be noted is that second check information can be the partial character string after cryptographic Hash coding, correspondingly, in this step In rapid, when being verified to second check information, it can also first determine the cryptographic Hash of the second sharing password, be advised according to choosing Then, a part in second cryptographic Hash for sharing password, compares with decoded second check information.
(2-B3) server is decoded the 6th password strings when verification passes through, and obtains the third service identification.
In step S53, server determines second sharing according to the third service identification from the designated memory space Corresponding second business information of password.
Second server determines the third business mark according to the third service identification from the designated memory space of server Know corresponding second business information.The corresponding relationship of storage service mark and business information in server, when server is got After the third service identification, according to the third service identification, from service identification and the corresponding relationship of business information, determine this Corresponding second business information of three service identifications.
In step S54, server sends second business information to the second terminal.
Server sends second business information to the second terminal according to the terminal iidentification of second terminal.Correspondingly, should It can also include the terminal iidentification of the second terminal in the solution code instruction that second terminal is sent.
In the embodiments of the present disclosure, the password generated instruction for receiving first terminal, obtains the in password generated instruction First service identification of one business information in designated memory space, encodes first service identification, obtains first point Password is enjoyed, the first sharing password that coding is obtained returns to first terminal.Due to distributing the first business for the first business information Mark, encodes so as to the service identification to first, and same set of password generated rule can be used in business different in this way Then namely a set of password generated rule can support the sharings of multiple business information, so as to quickly support the industry of new business The sharing for information of being engaged in improves scalability and shares efficiency.
Fig. 6 is a kind of generating means block diagram for sharing password shown according to an exemplary embodiment.Referring to Fig. 6, the dress It sets including the first receiving module 601, memory module 602, coding module 603 and the first sending module 604.
First receiving module 601 is configured as receiving the password generated instruction of first terminal, and password generated instruction carries First business information of password to be generated;
Memory module 602 is configured as being instructed according to the password generated, and it is empty in specified storage to obtain first business information Between in the first service identification;
Coding module 603 is configured as encoding first service identification according to the first password create-rule, obtaining Share password to first;
First sending module 604 is configured as sending the first sharing password to the first terminal.
In one possible implementation, the coding module 603 is additionally configured to be advised according to first password generated Then, which is encoded, obtains the first password strings;Obtain the corresponding first edition of the first password create-rule This mark;The first version is identified and forms this with first password strings and first shares password.
In alternatively possible implementation, which is additionally configured to determine first business information First check information;First check information is encoded according to the first password create-rule, obtains the second password strings;With And according to the first password create-rule, which is encoded, the first password strings are obtained;According to this first Password strings and second password strings generate the first sharing password.
In alternatively possible implementation, the coding module 603, be also configured by first password strings and this second Password strings form third password strings;According to the first password create-rule, which is encoded, obtains the 4th Password strings;By first password strings, second password strings and the 4th password strings, the first sharing password is formed.
In alternatively possible implementation, which is also configured to determine the signature of the third password strings Information;According to the first password create-rule, which is encoded, the 5th password strings are obtained;From the 5th password The 4th password strings are selected in string.
In alternatively possible implementation, which is also configured to add first service identification It is close, obtain the second service identification;According to the first password create-rule, which is encoded, obtain this One password strings.
In alternatively possible implementation, the device further include:
First determining module is configured as according to the second password generated rule used before current time, and determining should The second edition of second password generated rule identifies;
Second determining module is configured as being identified according to the second edition, determines that first version identifies;
Selecting module is configured as selecting coding rule from coding rule library, which is identified and the coding Rule forms the first password create-rule.
In alternatively possible implementation, the device further include:
Second receiving module is configured as receiving the solution code instruction of second terminal, which carries second and share mouth It enables;
Decoder module is configured as being decoded the second sharing password, obtains this and second shares password corresponding the Three service identifications;
Third determining module is configured as according to the third service identification, determined from the designated memory space this second Share corresponding second business information of password;
Second sending module is configured as sending second business information to the second terminal.
In alternatively possible implementation, which includes that the 6th password strings and first version identify;
Decoder module is additionally configured to be identified according to the first version, obtains decoding corresponding with first version mark Rule;According to decoding rule, the 6th password strings are decoded, obtain the corresponding third business mark of the second sharing password Know.
In alternatively possible implementation, which is additionally configured to according to decoding rule, to the 6th Password strings are decoded, and obtain the 4th service identification;4th service identification is decrypted, the third service identification is obtained.
In alternatively possible implementation, which includes corresponding 6th password of third service identification String the 7th password strings corresponding with the second check information;
Decoder module is additionally configured to be decoded the 7th password strings, obtains second check information;According to this second Check information verifies the second sharing password;When verification passes through, the 6th password strings are decoded, are somebody's turn to do Third service identification.
In the embodiments of the present disclosure, the password generated instruction for receiving first terminal, obtains the in password generated instruction First service identification of one business information in designated memory space, encodes first service identification, obtains first point Password is enjoyed, the first sharing password that coding is obtained returns to first terminal.Due to distributing the first business for the first business information Mark, encodes so as to the service identification to first, and same set of password generated rule can be used in business different in this way Then namely a set of password generated rule can support the sharings of multiple business information, so as to quickly support the industry of new business The sharing for information of being engaged in improves scalability and shares efficiency.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 7 shows the structural block diagram of the terminal 700 of one exemplary embodiment of disclosure offer.The terminal 700 can be with It is first terminal or second terminal, which can be with are as follows: smart phone, tablet computer, MP3 player (Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio level 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio level 4) player, pen Remember this computer or desktop computer.Terminal 700 is also possible to referred to as user equipment, portable terminal, laptop terminal, terminal console Deng other titles.
In general, terminal 700 includes: processor 701 and memory 702.
Processor 701 may include one or more processing cores, such as 4 core processors, 8 core processors etc..Place Reason device 701 can use DSP (Digital Signal Processing, Digital Signal Processing), FPGA (Field- Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array, may be programmed Logic array) at least one of example, in hardware realize.Processor 701 also may include primary processor and coprocessor, master Processor is the processor for being handled data in the awake state, also referred to as CPU (Central Processing Unit, central processing unit);Coprocessor is the low power processor for being handled data in the standby state.? In some embodiments, processor 701 can be integrated with GPU (Graphics Processing Unit, image processor), GPU is used to be responsible for the rendering and drafting of content to be shown needed for display screen.In some embodiments, processor 701 can also be wrapped AI (Artificial Intelligence, artificial intelligence) processor is included, the AI processor is for handling related machine learning Calculating operation.
Memory 702 may include one or more computer readable storage mediums, which can To be non-transient.Memory 702 may also include high-speed random access memory and nonvolatile memory, such as one Or multiple disk storage equipments, flash memory device.In some embodiments, the non-transient computer in memory 702 can Storage medium is read for storing at least one instruction, at least one instruction for performed by processor 701 to realize this public affairs Open the sharing password generated method that middle embodiment of the method provides.
In some embodiments, terminal 700 is also optional includes: peripheral device interface 703 and at least one peripheral equipment. It can be connected by bus or signal wire between processor 701, memory 702 and peripheral device interface 703.Each peripheral equipment It can be connected by bus, signal wire or circuit board with peripheral device interface 703.Specifically, peripheral equipment includes: radio circuit 704, at least one of display screen 705, camera 706, voicefrequency circuit 707, positioning component 708 and power supply 709.
Peripheral device interface 703 can be used for I/O (Input/Output, input/output) is relevant outside at least one Peripheral equipment is connected to processor 701 and memory 702.In some embodiments, processor 701, memory 702 and peripheral equipment Interface 703 is integrated on same chip or circuit board;In some other embodiments, processor 701, memory 702 and outer Any one or two in peripheral equipment interface 703 can realize on individual chip or circuit board, the present embodiment to this not It is limited.
Radio circuit 704 is for receiving and emitting RF (Radio Frequency, radio frequency) signal, also referred to as electromagnetic signal.It penetrates Frequency circuit 704 is communicated by electromagnetic signal with communication network and other communication equipments.Radio circuit 704 turns electric signal It is changed to electromagnetic signal to be sent, alternatively, the electromagnetic signal received is converted to electric signal.Optionally, radio circuit 704 wraps It includes: antenna system, RF transceiver, one or more amplifiers, tuner, oscillator, digital signal processor, codec chip Group, user identity module card etc..Radio circuit 704 can be carried out by least one wireless communication protocol with other terminals Communication.The wireless communication protocol includes but is not limited to: Metropolitan Area Network (MAN), each third generation mobile communication network (2G, 3G, 4G and 5G), wireless office Domain net and/or WiFi (Wireless Fidelity, Wireless Fidelity) network.In some embodiments, radio circuit 704 may be used also To include the related circuit of NFC (Near Field Communication, wireless near field communication), the disclosure is not subject to this It limits.
Display screen 705 is for showing UI (User Interface, user interface).The UI may include figure, text, figure Mark, video and its their any combination.When display screen 705 is touch display screen, display screen 705 also there is acquisition to show The ability of the touch signal on the surface or surface of screen 705.The touch signal can be used as control signal and be input to processor 701 are handled.At this point, display screen 705 can be also used for providing virtual push button and/or dummy keyboard, also referred to as soft button and/or Soft keyboard.In some embodiments, display screen 705 can be one, and the front panel of terminal 700 is arranged;In other embodiments In, display screen 705 can be at least two, be separately positioned on the different surfaces of terminal 700 or in foldover design;In still other reality It applies in example, display screen 705 can be flexible display screen, be arranged on the curved surface of terminal 700 or on fold plane.Even, it shows Display screen 705 can also be arranged to non-rectangle irregular figure, namely abnormity screen.Display screen 705 can use LCD (Liquid Crystal Display, liquid crystal display), OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) Etc. materials preparation.
CCD camera assembly 706 is for acquiring image or video.Optionally, CCD camera assembly 706 include front camera and Rear camera.In general, the front panel of terminal is arranged in front camera, the back side of terminal is arranged in rear camera.One In a little embodiments, rear camera at least two is main camera, depth of field camera, wide-angle camera, focal length camera shooting respectively Any one in head, to realize that main camera and the fusion of depth of field camera realize background blurring function, main camera and wide-angle Camera fusion realizes that pan-shot and VR (Virtual Reality, virtual reality) shooting function or other fusions are clapped Camera shooting function.In some embodiments, CCD camera assembly 706 can also include flash lamp.Flash lamp can be monochromatic warm flash lamp, It is also possible to double-colored temperature flash lamp.Double-colored temperature flash lamp refers to the combination of warm light flash lamp and cold light flash lamp, can be used for not With the light compensation under colour temperature.
Voicefrequency circuit 707 may include microphone and loudspeaker.Microphone is used to acquire the sound wave of user and environment, and will Sound wave, which is converted to electric signal and is input to processor 701, to be handled, or is input to radio circuit 704 to realize voice communication. For stereo acquisition or the purpose of noise reduction, microphone can be separately positioned on the different parts of terminal 700 to be multiple.Mike Wind can also be array microphone or omnidirectional's acquisition type microphone.Loudspeaker is then used to that processor 701 or radio circuit will to be come from 704 electric signal is converted to sound wave.Loudspeaker can be traditional wafer speaker, be also possible to piezoelectric ceramic loudspeaker.When When loudspeaker is piezoelectric ceramic loudspeaker, the audible sound wave of the mankind can be not only converted electrical signals to, it can also be by telecommunications Number the sound wave that the mankind do not hear is converted to carry out the purposes such as ranging.In some embodiments, voicefrequency circuit 707 can also include Earphone jack.
Positioning component 708 is used for the current geographic position of positioning terminal 700, to realize navigation or LBS (Location Based Service, location based service).Positioning component 708 can be the GPS (Global based on the U.S. Positioning System, global positioning system), the dipper system of China, Russia Gray receive this system or European Union The positioning component of Galileo system.
Power supply 709 is used to be powered for the various components in terminal 700.Power supply 709 can be alternating current, direct current, Disposable battery or rechargeable battery.When power supply 709 includes rechargeable battery, which can support wired charging Or wireless charging.The rechargeable battery can be also used for supporting fast charge technology.
In some embodiments, terminal 700 further includes having one or more sensors 710.The one or more sensors 710 include but is not limited to: acceleration transducer 711, gyro sensor 712, pressure sensor 713, fingerprint sensor 714, Optical sensor 715 and proximity sensor 716.
The acceleration that acceleration transducer 711 can detecte in three reference axis of the coordinate system established with terminal 700 is big It is small.For example, acceleration transducer 711 can be used for detecting component of the acceleration of gravity in three reference axis.Processor 701 can With the acceleration of gravity signal acquired according to acceleration transducer 711, control display screen 705 with transverse views or longitudinal view into The display of row user interface.Acceleration transducer 711 can be also used for the acquisition of game or the exercise data of user.
Gyro sensor 712 can detecte body direction and the rotational angle of terminal 700, and gyro sensor 712 can To cooperate with acquisition user to act the 3D of terminal 700 with acceleration transducer 711.Processor 701 is according to gyro sensor 712 Following function may be implemented in the data of acquisition: when action induction (for example changing UI according to the tilt operation of user), shooting Image stabilization, game control and inertial navigation.
The lower layer of side frame and/or display screen 705 in terminal 700 can be set in pressure sensor 713.Work as pressure sensing When the side frame of terminal 700 is arranged in device 713, user can detecte to the gripping signal of terminal 700, by 701 basis of processor The gripping signal that pressure sensor 713 acquires carries out right-hand man's identification or prompt operation.When the setting of pressure sensor 713 is being shown When the lower layer of screen 705, the pressure operation of display screen 705 is realized to operating on the interface UI according to user by processor 701 Property control is controlled.Operability control include button control, scroll bar control, icon control, in menu control at least It is a kind of.
Fingerprint sensor 714 is used to acquire the fingerprint of user, collected according to fingerprint sensor 714 by processor 701 The identity of fingerprint recognition user, alternatively, by fingerprint sensor 714 according to the identity of collected fingerprint recognition user.It is identifying When the identity of user is trusted identity out, the user is authorized to execute relevant sensitive operation, the sensitive operation packet by processor 701 Include solution lock screen, check encryption information, downloading software, payment and change setting etc..Terminal can be set in fingerprint sensor 714 700 front, the back side or side.When being provided with physical button or manufacturer Logo in terminal 700, fingerprint sensor 714 can be with It is integrated with physical button or manufacturer Logo.
Optical sensor 715 is for acquiring ambient light intensity.In one embodiment, processor 701 can be according to optics The ambient light intensity that sensor 715 acquires controls the display brightness of display screen 705.Specifically, when ambient light intensity is higher, The display brightness of display screen 705 is turned up;When ambient light intensity is lower, the display brightness of display screen 705 is turned down.In another reality It applies in example, the ambient light intensity that processor 701 can also be acquired according to optical sensor 715, dynamic adjusts CCD camera assembly 706 Acquisition parameters.
Proximity sensor 716, also referred to as range sensor are generally arranged at the front panel of terminal 700.Proximity sensor 716 For acquiring the distance between the front of user Yu terminal 700.In one embodiment, when proximity sensor 716 detects use When family and the distance between the front of terminal 700 gradually become smaller, display screen 705 is controlled by processor 701 and is switched from bright screen state To cease screen state;When proximity sensor 716 detects user and the distance between the front of terminal 700 becomes larger, by Reason device 701 controls display screen 705 and is switched to bright screen state from breath screen state.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal 700 of structure shown in Fig. 7, can wrap It includes than illustrating more or fewer components, perhaps combine certain components or is arranged using different components.
Fig. 8 is a kind of structural schematic diagram for server that the embodiment of the present disclosure provides, which can be because of configuration or property Energy is different and generates bigger difference, may include one or more processors (central processing Units, CPU) 801 and one or more memory 802, wherein at least one finger is stored in the memory 802 It enables, the method which is loaded by the processor 801 and executed to realize above-mentioned each embodiment of the method offer.When So, which can also have the components such as wired or wireless network interface, keyboard and input/output interface, so as into Row input and output, the server can also include other for realizing the component of functions of the equipments, and this will not be repeated here.
In the exemplary embodiment, a kind of computer readable storage medium is additionally provided, the memory for example including instruction, Above-metioned instruction can be executed by the processor in terminal to complete to share in above-described embodiment the generation method of password.For example, the meter Calculation machine readable storage medium storing program for executing can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage and set It is standby etc..
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.The disclosure is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (10)

1. a kind of generation method for sharing password, which is characterized in that the described method includes:
The password generated instruction of first terminal is received, the password generated instruction carries the first business information of password to be generated;
It is instructed according to the password generated, obtains first service identification of first business information in designated memory space;
According to the first password create-rule, first service identification is encoded, obtains the first sharing password;
Described first, which is sent, to the first terminal shares password.
2. the method according to claim 1, wherein described according to the first password create-rule, to described first Service identification is encoded, and the first sharing password is obtained, comprising:
According to the first password create-rule, first service identification is encoded, the first password strings are obtained;
Obtain the corresponding first version mark of the first password create-rule;
First version mark is shared into password with first password strings composition described first.
3. the method according to claim 1, wherein described according to the first password create-rule, to described first Service identification is encoded, and the first sharing password is obtained, comprising:
Determine the first check information of first business information;
First check information is encoded according to the first password create-rule, obtains the second password strings;And root According to the first password create-rule, first service identification is encoded, the first password strings are obtained;
According to first password strings and second password strings, generates described first and share password.
4. according to the method described in claim 3, it is characterized in that, described according to first password strings and second password String generates described first and shares password, comprising:
By first password strings and second password strings, third password strings are formed;
According to the first password create-rule, the third password strings are encoded, the 4th password strings are obtained;
By first password strings, second password strings and the 4th password strings, forms described first and share password.
5. according to the method described in claim 4, it is characterized in that, described according to the first password create-rule, to described Third password strings are encoded, and the 4th password strings are obtained, comprising:
Determine the signing messages of the third password strings;
According to the first password create-rule, the signing messages is encoded, obtains the 5th password strings;
The 4th password strings are selected from the 5th password strings.
6. the method according to claim 1, wherein described according to the first password create-rule, to described first Service identification is encoded, before obtaining the first sharing password, the method also includes:
According to the second password generated rule used before current time, the second edition of the second password generated rule is determined This mark;
It is identified according to the second edition, determines that first version identifies;
Coding rule is selected from coding rule library, first version mark and the coding rule are formed into the first Enable create-rule.
7. method described in any one of -6 claims according to claim 1, which is characterized in that described to be sent out to the first terminal After sending the first sharing password, the method also includes:
The solution code instruction of second terminal is received, the solution code instruction carries second and shares password;
The second sharing password is decoded, described second is obtained and shares the corresponding third service identification of password;
According to the third service identification, determine that described second shares corresponding second industry of password from the designated memory space Business information;
Second business information is sent to the second terminal.
8. a kind of generating means for sharing password, which is characterized in that described device includes:
First receiving module is configured as receiving the password generated instruction of first terminal, and the password generated instruction carries to be generated At the first business information of password;
Memory module is configured as being instructed according to the password generated, obtains first business information in designated memory space In the first service identification;
Coding module is configured as encoding first service identification according to the first password create-rule, obtaining first Share password;
First sending module is configured as sending the first sharing password to the first terminal.
9. a kind of server characterized by comprising
One or more processors;
For storing one or more memories of one or more of processor-executable instructions;
Wherein, one or more of processors are configured as perform claim and require the described in any item lifes for sharing password of 1-7 At method.
10. a kind of non-transitorycomputer readable storage medium, which is characterized in that when the instruction in the storage medium is by terminal Processor execute when, enable the server to perform claim require 1-7 it is described in any item share passwords generation methods.
CN201910594496.2A 2019-07-03 2019-07-03 Method and device for generating shared password, server and storage medium Active CN110290146B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910594496.2A CN110290146B (en) 2019-07-03 2019-07-03 Method and device for generating shared password, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910594496.2A CN110290146B (en) 2019-07-03 2019-07-03 Method and device for generating shared password, server and storage medium

Publications (2)

Publication Number Publication Date
CN110290146A true CN110290146A (en) 2019-09-27
CN110290146B CN110290146B (en) 2021-10-08

Family

ID=68020851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910594496.2A Active CN110290146B (en) 2019-07-03 2019-07-03 Method and device for generating shared password, server and storage medium

Country Status (1)

Country Link
CN (1) CN110290146B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368232A (en) * 2020-02-28 2020-07-03 北京达佳互联信息技术有限公司 Password sharing reflux method and device, electronic equipment and storage medium
CN111414495A (en) * 2020-03-19 2020-07-14 北京奇艺世纪科技有限公司 Multimedia data acquisition method, device and computer readable storage medium
CN111638978A (en) * 2020-05-20 2020-09-08 北京达佳互联信息技术有限公司 Content sharing method and device
WO2021169776A1 (en) * 2020-02-28 2021-09-02 北京达佳互联信息技术有限公司 Sharing password analysis method and device
CN113783835A (en) * 2021-07-30 2021-12-10 北京沃东天骏信息技术有限公司 Password sharing method, device, equipment and storage medium
CN114363094A (en) * 2022-03-17 2022-04-15 北京百度网讯科技有限公司 Data sharing method, device, equipment and storage medium
CN114448928A (en) * 2022-01-26 2022-05-06 北京达佳互联信息技术有限公司 Command display method, device, computer equipment and medium
CN114640666A (en) * 2022-03-04 2022-06-17 微位(深圳)网络科技有限公司 File sharing and downloading method, electronic equipment and readable storage medium
WO2022166690A1 (en) * 2021-02-08 2022-08-11 支付宝(杭州)信息技术有限公司 Information processing method, apparatus and device, and medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1743994A (en) * 2004-08-27 2006-03-08 捷讯研究有限公司 User-defined passwords having associated unique version data to assist user recall of the password
CN102426592A (en) * 2011-10-31 2012-04-25 北京人大金仓信息技术股份有限公司 Method for initializing database based on dynamic password
CN103502992A (en) * 2011-01-14 2014-01-08 苹果公司 System and method for tamper-resistant booting
CN107294704A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 The generation method of password, the execution method of password and terminal
CN108123721A (en) * 2016-11-29 2018-06-05 展讯通信(上海)有限公司 Coding method and device
CN109190012A (en) * 2017-06-19 2019-01-11 阿里巴巴集团控股有限公司 A kind of information processing method, device and equipment
CN109587110A (en) * 2018-10-09 2019-04-05 阿里巴巴集团控股有限公司 A kind of weak passwurd detection method, device, computer equipment and service server
KR20190054624A (en) * 2017-11-14 2019-05-22 박영경 Seed code transmission method and system for location-based password service using evolved multimedia broadcast multicast services system in a cellular iot network

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1743994A (en) * 2004-08-27 2006-03-08 捷讯研究有限公司 User-defined passwords having associated unique version data to assist user recall of the password
CN103502992A (en) * 2011-01-14 2014-01-08 苹果公司 System and method for tamper-resistant booting
CN102426592A (en) * 2011-10-31 2012-04-25 北京人大金仓信息技术股份有限公司 Method for initializing database based on dynamic password
CN107294704A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 The generation method of password, the execution method of password and terminal
CN108123721A (en) * 2016-11-29 2018-06-05 展讯通信(上海)有限公司 Coding method and device
CN109190012A (en) * 2017-06-19 2019-01-11 阿里巴巴集团控股有限公司 A kind of information processing method, device and equipment
KR20190054624A (en) * 2017-11-14 2019-05-22 박영경 Seed code transmission method and system for location-based password service using evolved multimedia broadcast multicast services system in a cellular iot network
CN109587110A (en) * 2018-10-09 2019-04-05 阿里巴巴集团控股有限公司 A kind of weak passwurd detection method, device, computer equipment and service server

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368232A (en) * 2020-02-28 2020-07-03 北京达佳互联信息技术有限公司 Password sharing reflux method and device, electronic equipment and storage medium
WO2021169776A1 (en) * 2020-02-28 2021-09-02 北京达佳互联信息技术有限公司 Sharing password analysis method and device
CN111414495A (en) * 2020-03-19 2020-07-14 北京奇艺世纪科技有限公司 Multimedia data acquisition method, device and computer readable storage medium
CN111414495B (en) * 2020-03-19 2024-04-16 北京奇艺世纪科技有限公司 Multimedia data acquisition method, device and computer readable storage medium
CN111638978A (en) * 2020-05-20 2020-09-08 北京达佳互联信息技术有限公司 Content sharing method and device
CN111638978B (en) * 2020-05-20 2023-11-14 北京达佳互联信息技术有限公司 Content sharing method and device
WO2022166690A1 (en) * 2021-02-08 2022-08-11 支付宝(杭州)信息技术有限公司 Information processing method, apparatus and device, and medium
CN113783835A (en) * 2021-07-30 2021-12-10 北京沃东天骏信息技术有限公司 Password sharing method, device, equipment and storage medium
CN114448928A (en) * 2022-01-26 2022-05-06 北京达佳互联信息技术有限公司 Command display method, device, computer equipment and medium
CN114448928B (en) * 2022-01-26 2023-12-19 北京达佳互联信息技术有限公司 Command display method, device, computer equipment and medium
CN114640666A (en) * 2022-03-04 2022-06-17 微位(深圳)网络科技有限公司 File sharing and downloading method, electronic equipment and readable storage medium
CN114640666B (en) * 2022-03-04 2023-07-25 微位(深圳)网络科技有限公司 File sharing downloading method, electronic equipment and readable storage medium
CN114363094B (en) * 2022-03-17 2022-06-24 北京百度网讯科技有限公司 Data sharing method, device, equipment and storage medium
CN114363094A (en) * 2022-03-17 2022-04-15 北京百度网讯科技有限公司 Data sharing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN110290146B (en) 2021-10-08

Similar Documents

Publication Publication Date Title
CN110290146A (en) Share generation method, device, server and the storage medium of password
CN110602089B (en) Block chain-based medical data storage method, device, equipment and storage medium
CN110245144B (en) Protocol data management method, device, storage medium and system
CN112711774B (en) Data processing method, device, equipment and storage medium
CN108595970A (en) Configuration method, device, terminal and the storage medium of processing component
CN109688147A (en) Using login method, device, terminal, server, system and storage medium
CN110826103B (en) Method, device, equipment and storage medium for processing document authority based on blockchain
CN108964903A (en) password storage method and device
CN111506884A (en) User invitation method, device, computer equipment and computer readable storage medium
CN110597924B (en) Block chain-based user identification processing method, device, equipment and storage medium
CN111404991A (en) Method, device, electronic equipment and medium for acquiring cloud service
CN110401648A (en) Obtain method, apparatus, electronic equipment and the medium of cloud service
CN109522146A (en) The method, apparatus and storage medium of abnormality test are carried out to client
CN110365501B (en) Method and device for group joining processing based on graphic code
CN109254775A (en) Image processing method, terminal and storage medium based on face
CN110278273A (en) Multimedia file method for uploading, device, terminal, server and storage medium
CN111935166A (en) Communication authentication method, system, electronic device, server, and storage medium
CN111970298A (en) Application access method and device, storage medium and computer equipment
CN110602689A (en) Method and device for safely operating equipment
CN112989370B (en) Key filling method, system, device, equipment and storage medium
CN109547444A (en) Virtual objects acquisition methods, device and electronic equipment
CN109033473A (en) Picture sharing method, device and computer readable storage medium
CN110968549B (en) File storage method, device, electronic equipment and medium
CN110362330A (en) Application program update method, apparatus, terminal and storage medium
CN110380956A (en) A kind of method, apparatus and system for transmitting instant communication message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant