CN110290146A - Share generation method, device, server and the storage medium of password - Google Patents
Share generation method, device, server and the storage medium of password Download PDFInfo
- Publication number
- CN110290146A CN110290146A CN201910594496.2A CN201910594496A CN110290146A CN 110290146 A CN110290146 A CN 110290146A CN 201910594496 A CN201910594496 A CN 201910594496A CN 110290146 A CN110290146 A CN 110290146A
- Authority
- CN
- China
- Prior art keywords
- password
- rule
- strings
- sharing
- service identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/51—Discovery or management thereof, e.g. service location protocol [SLP] or web services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Abstract
The disclosure is directed to a kind of generation method, device, server and storage mediums for sharing password, are related to Internet technical field.Method includes: to receive the password generated instruction of first terminal, and password generated instruction carries the first business information of password to be generated;It is instructed according to password generated, obtains first service identification of first business information in designated memory space;According to the first password create-rule, the first service identification is encoded, obtains the first sharing password;First, which is sent, to first terminal shares password.Due to distributing the first service identification for the first business information, it is encoded so as to the service identification to first, same set of password generated rule can be used in business different in this way, namely a set of password generated rule can support the sharing of multiple business information, so as to quickly support new business business information sharing, improve scalability and share efficiency.
Description
Technical field
This disclosure relates to Internet technical field more particularly to it is a kind of share the generation method of password, device, server and
Storage medium.
Background technique
In order to improve sharing efficiency, the method for carrying out business information sharing by sharing password has been risen.Sharing business
When information, generally by server generate share password, and terminal can by replicating the corresponding sharing password of the business information,
The corresponding APP of the business information (Application, application program) in opening a terminal is sent the sharing password by APP
To server, server parses the sharing password, obtains the corresponding business information of sharing password, and the business information is returned
It is shown to terminal, realizes the purpose for sharing business information by sharing password.
In the related technology, for each business, developer needs in advance for a set of password generated rule of the operation code.
When server generates the sharing password, according to the corresponding password generated rule of the business, the business information of the business is carried out
Coding generates and shares password.
Above-mentioned a set of password generated rule only realizes a kind of business in the related technology, when the business information for sharing new business
When, developer needs to recompile the corresponding password generated rule of the new business, so as to cause the generation of above-mentioned sharing password
Method can not quickly support the sharing of the business information of new business, cause scalability poor.
Summary of the invention
The disclosure provides a kind of generation method, device, server and storage medium for sharing password, can overcome sharing mouth
The generation method of order can not quickly support the sharing of the business information of new business, lead to the problem that scalability is poor.
According to the first aspect of the embodiments of the present disclosure, a kind of generation method for sharing password is provided, which comprises
The password generated instruction of first terminal is received, the password generated instruction carries the first business letter of password to be generated
Breath;
It is instructed according to the password generated, obtains first business mark of first business information in designated memory space
Know;
According to the first password create-rule, first service identification is encoded, obtains the first sharing password;
Described first, which is sent, to the first terminal shares password.
In one possible implementation, described according to the first password create-rule, to first service identification into
Row coding, obtains the first sharing password, comprising:
According to the first password create-rule, first service identification is encoded, the first password strings are obtained;
Obtain the corresponding first version mark of the first password create-rule;
First version mark is shared into password with first password strings composition described first.
It is described according to the first password create-rule in alternatively possible implementation, to first service identification
It is encoded, obtains the first sharing password, comprising:
Determine the first check information of first business information;
First check information is encoded according to the first password create-rule, obtains the second password strings;With
And according to the first password create-rule, first service identification is encoded, the first password strings are obtained;
According to first password strings and second password strings, generates described first and share password.
It is described according to first password strings and second password strings in alternatively possible implementation, it generates
Described first shares password, comprising:
By first password strings and second password strings, third password strings are formed;
According to the first password create-rule, the third password strings are encoded, the 4th password strings are obtained;
By first password strings, second password strings and the 4th password strings, forms described first and share password.
It is described according to the first password create-rule in alternatively possible implementation, to the third password
String is encoded, and the 4th password strings are obtained, comprising:
Determine the signing messages of the third password strings;
According to the first password create-rule, the signing messages is encoded, obtains the 5th password strings;
The 4th password strings are selected from the 5th password strings.
It is described according to the first password create-rule in alternatively possible implementation, to first business
Mark is encoded, and the first password strings are obtained, comprising:
First service identification is encrypted, the second service identification is obtained;
According to the first password create-rule, second service identification is encoded, obtains first password
String.
It is described according to the first password create-rule in alternatively possible implementation, to first service identification
It is encoded, before obtaining the first sharing password, the method also includes:
According to the second password generated rule used in front of current time, the of the second password generated rule is determined
Two version identifiers;
It is identified according to the second edition, determines that first version identifies;
Coding rule is selected from coding rule library, by first version mark and coding rule composition described the
One password create-rule.
In alternatively possible implementation, after the first sharing password to first terminal transmission,
The method also includes:
The solution code instruction of second terminal is received, the solution code instruction carries second and shares password;
The second sharing password is decoded, described second is obtained and shares the corresponding third service identification of password;
According to the third service identification, determine that described second shares password corresponding the from the designated memory space
Two business information;
Second business information is sent to the second terminal.
In alternatively possible implementation, described second, which shares password, includes the 6th password strings and first version mark
Know;
It is described that the second sharing password is decoded, it obtains described second and shares the corresponding third business mark of password
Know, comprising:
It is identified according to the first version, obtains decoding rule corresponding with first version mark;
According to the decoding rule, the 6th password strings are decoded, it is corresponding to obtain the second sharing password
Third service identification.
It is described according to the decoding rule in alternatively possible implementation, the 6th password strings are solved
Code obtains described second and shares the corresponding third service identification of password, comprising:
According to the decoding rule, the 6th password strings are decoded, the 4th service identification is obtained;
4th service identification is decrypted, the third service identification is obtained.
In alternatively possible implementation, the second sharing password includes that third service identification is 6th mouthful corresponding
Enable string the 7th password strings corresponding with the second check information;
It is described that the second sharing password is decoded, it obtains described second and shares the corresponding third business mark of password
Know, comprising:
7th password strings are decoded, second check information is obtained;
According to second check information, the second sharing password is verified;
When verification passes through, the 6th password strings are decoded, obtain the third service identification.
According to the second aspect of an embodiment of the present disclosure, a kind of generating means for sharing password are provided, described device includes:
First receiving module is configured as receiving the password generated instruction of first terminal, and the password generated instruction carries
First business information of password to be generated;
Memory module is configured as being instructed according to the password generated, obtains first business information in specified storage
The first service identification in space;
Coding module is configured as encoding first service identification according to the first password create-rule, obtaining
First shares password;
First sending module is configured as sending the first sharing password to the first terminal.
In one possible implementation, the coding module is additionally configured to be advised according to first password generated
Then, first service identification is encoded, obtains the first password strings;Obtain the first password create-rule corresponding
One version identifier;First version mark is shared into password with first password strings composition described first.
In alternatively possible implementation, the coding module is additionally configured to determine first business information
The first check information;First check information is encoded according to the first password create-rule, obtains second mouthful
Enable string;And according to the first password create-rule, first service identification is encoded, the first password strings are obtained;
According to first password strings and second password strings, generates described first and share password.
In alternatively possible implementation, the coding module is also configured first password strings and described
Second password strings form third password strings;According to the first password create-rule, the third password strings are encoded,
Obtain the 4th password strings;By first password strings, second password strings and the 4th password strings, described first point is formed
Enjoy password.
In alternatively possible implementation, the coding module is also configured to determine the label of the third password strings
Name information;According to the first password create-rule, the signing messages is encoded, obtains the 5th password strings;From described
The 4th password strings are selected in 5th password strings.
In alternatively possible implementation, the coding module is also configured to carry out first service identification
Encryption, obtains the second service identification;According to the first password create-rule, second service identification is encoded, is obtained
To first password strings.
In alternatively possible implementation, described device further include:
First determining module is configured as determining institute according to the second password generated rule used before current time
State the second edition mark of the second password generated rule;
Second determining module is configured as being identified according to the second edition, determines that first version identifies;
Selecting module is configured as selecting coding rule from coding rule library, by the first version mark and it is described
Coding rule forms the first password create-rule.
In alternatively possible implementation, described device further include:
Second receiving module is configured as receiving the solution code instruction of second terminal, and the solution code instruction carries second and shares
Password;
Decoder module is configured as being decoded the second sharing password, it is corresponding to obtain the second sharing password
Third service identification;
Third determining module is configured as determining institute from the designated memory space according to the third service identification
State corresponding second business information of the second sharing password;
Second sending module is configured as sending second business information to the second terminal.
In alternatively possible implementation, described second, which shares password, includes the 6th password strings and first version mark
Know;
Decoder module is additionally configured to be identified according to the first version, obtain corresponding with first version mark
Decoding rule;According to the decoding rule, the 6th password strings are decoded, it is corresponding to obtain the second sharing password
Third service identification.
In alternatively possible implementation, the decoder module is additionally configured to according to the decoding rule, to institute
It states the 6th password strings to be decoded, obtains the 4th service identification;4th service identification is decrypted, the third is obtained
Service identification.
In alternatively possible implementation, the second sharing password includes that third service identification is 6th mouthful corresponding
Enable string the 7th password strings corresponding with the second check information;
Decoder module is additionally configured to be decoded the 7th password strings, obtains second check information;According to institute
The second check information is stated, the second sharing password is verified;When verification passes through, the 6th password strings are solved
Code, obtains the third service identification.
According to the third aspect of an embodiment of the present disclosure, a kind of server is provided, comprising:
One or more processors;
For storing one or more memories of one or more of processor-executable instructions;
Wherein, one or more of processors are configured as executing sharing described in the first aspect of the embodiment of the present disclosure
The generation method of password.
According to a fourth aspect of embodiments of the present disclosure, a kind of non-transitorycomputer readable storage medium is provided, when described
When instruction in storage medium is executed by the processor of terminal, the first aspect for executing the embodiment of the present disclosure is enabled the server to
The generation method of the sharing password.
According to a fifth aspect of the embodiments of the present disclosure, a kind of application program is provided, when the instruction in the application program by
When the processor of server executes, enable the server to execute sharing password described in the first aspect of the embodiment of the present disclosure
Generation method.
The technical scheme provided by this disclosed embodiment can include the following benefits: in the embodiments of the present disclosure, connect
The password generated instruction for receiving first terminal obtains the first business information in password generated instruction in designated memory space
First service identification encodes first service identification, obtains the first sharing password, and first that coding is obtained shares mouth
Order returns to first terminal.Due to distributing the first service identification for the first business information, so as to first service identification
It is encoded, business different in this way can be used same set of password generated rule namely a set of password generated rule and can prop up
Hold the sharing of multiple business information, so as to quickly support new business business information sharing, improve scalability with
And share efficiency.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure
Example, and together with specification for explaining the principles of this disclosure.
Fig. 1 is a kind of implementation environment schematic diagram of generation method for sharing password shown according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment.
Fig. 3 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment.
Fig. 4 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment.
Fig. 5 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment.
Fig. 6 is a kind of block diagram of generating means for sharing password shown according to an exemplary embodiment.
Fig. 7 is a kind of block diagram of terminal shown according to an exemplary embodiment.
Fig. 8 is a kind of block diagram of server shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended
The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
Fig. 1 is a kind of implementation environment schematic diagram of the generation method of the sharing password provided according to the embodiment of the present disclosure.Such as
Shown in Fig. 1, which may include: first terminal 101, second terminal 102 and server 103.First terminal 101 is to ask
The equipment for sharing password is sought survival into, server 103 makes a living into the equipment for sharing password.Server 103 is given birth to for first terminal 101
After sharing password, which can be shared with second terminal 102 by first terminal 101;Correspondingly, second terminal 102
For by the equipment of sharing password.
Wherein, the first APP (Application, application program) is installed on first terminal 101, when first terminal 101 is shared
When the first business information in the first APP, first terminal 101 sends password generated instruction to server 103, which refers to
It enables and carries first business information.Server 103 generates first and shares password, first is shared according to first business information
Password returns to first terminal 101.2nd APP is also installed, first terminal 101 can be incited somebody to action by the 2nd APP on first terminal 101
First sharing password is shared with second terminal 102, thus second terminal 102 can based on the sharing password quick obtaining to this
One business information.
First APP can be shopping APP, short-sighted frequency APP, live streaming APP, video playing APP etc..The business can be first
Any business in terminal 101, the business can be shopping, live streaming, works displaying or tag along sort etc., first business information
It may include the information such as type of service and the business tine of the business.Correspondingly, server 103 is the corresponding backstage the first APP
Server 103.2nd APP can be social application APP.The first terminal 101 and second terminal 102 can be mechanical, electrical for hand
Brain or wearable device etc..First terminal 101 and second terminal 102 can be carried out by network connection and server 103
Data interaction.
For example, when the first APP is live streaming APP, when first terminal 101 detects that user needs to share live streaming APP
In live broadcast service when, first terminal 101 sends password generated to the corresponding server 103 of live streaming APP by live streaming APP
Instruction, correspondingly, after the password generated that the corresponding server 103 of live streaming APP receives the transmission of first terminal 101 instructs, root
Instruct to generate according to the password generated and share password, the live information of the live broadcast service is carried in the sharing password, be such as broadcast live address,
User etc. is broadcast live.The sharing password is sent to first terminal 101 by server 103.First terminal 101 receives server 103
After the sharing password of transmission, the sharing password can be replicated in live streaming APP, sharing by the 2nd APP in the terminal should
Corresponding sharing password is broadcast live.First terminal 101 can also replicate the sharing password by live streaming APP, open first terminal
Payment APP in 101 carries out the operation such as pay to the direct broadcast band of payment.
When the first APP is short-sighted frequency APP, when first terminal 101 detects that user needs to share in the short-sighted frequency APP
Short video work when, first terminal 101 sends password to the corresponding server 103 of the short-sighted frequency APP by the short-sighted frequency APP
Instruction is generated, correspondingly, the corresponding server 103 of the short-sighted frequency APP receives the password generated instruction of the transmission of first terminal 101
Afterwards, it is instructed to generate according to the password generated and shares password, the works information of the short video work is carried in the sharing password, is such as regarded
Frequency author, video name etc..The sharing password is sent to first terminal 101 by server 103.First terminal 101 receives clothes
It is engaged in after the sharing password that device 103 is sent, the sharing password can be replicated on the short-sighted frequency APP, pass through the 2nd APP in terminal
Share the corresponding sharing password of the short video work.First terminal 101 can also replicate the sharing mouth by the short-sighted frequency APP
It enables, opens other video playings APP in first terminal 101, which is played by other video playings APP.
In the embodiments of the present disclosure, the first password create-rule is stored in server 103, is advised by first password generated
Then, it instructs corresponding first service identification to encode the password generated received, obtains the first sharing password.Due to this
One service identification be server 103 receive password generated instruction after, for first business information distribution the first service identification,
Therefore, first service identification can be encoded by the first unified password create-rule, without being first terminal 101
Each of business all generate the first password create-rule so that same set of password generated rule can be used in multiple business.
Therefore, when there is the business information of new business to need to share, developer does not need the password generated rule for developing new business again
Then, directly can quickly generate sharing password namely this method by this method can quickly support the sharing of new business.
Fig. 2 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment, such as Fig. 1 institute
Show, the generation method of the sharing password includes the following steps.
In the step s 21, the password generated instruction of first terminal is received, password generated instruction carries password to be generated
First business information;
It in step S22, is instructed according to the password generated, obtains the of first business information in designated memory space
One service identification;
In step S23, according to the first password create-rule, which is encoded, obtains first point
Enjoy password;
In step s 24, the first sharing password is sent to the first terminal.
In one possible implementation, this compiles first service identification according to the first password create-rule
Code, obtains the first sharing password, comprising:
According to the first password create-rule, which is encoded, the first password strings are obtained;
Obtain the corresponding first version mark of the first password create-rule;
The first version is identified and forms this with first password strings and first shares password.
In alternatively possible implementation, this carries out first service identification according to the first password create-rule
Coding, obtains the first sharing password, comprising:
Determine the first check information of first business information;
First check information is encoded according to the first password create-rule, obtains the second password strings;And root
According to the first password create-rule, which is encoded, the first password strings are obtained;
According to first password strings and second password strings, the first sharing password is generated.
In alternatively possible implementation, this according to first password strings and second password strings, generate this first
Share password, comprising:
By first password strings and second password strings, third password strings are formed;
According to the first password create-rule, which is encoded, the 4th password strings are obtained;
By first password strings, second password strings and the 4th password strings, the first sharing password is formed.
In alternatively possible implementation, this carries out the third password strings according to the first password create-rule
Coding, obtains the 4th password strings, comprising:
Determine the signing messages of the third password strings;
According to the first password create-rule, which is encoded, the 5th password strings are obtained;
The 4th password strings are selected from the 5th password strings.
In alternatively possible implementation, this according to the first password create-rule, to first service identification into
Row coding, obtains the first password strings, comprising:
First service identification is encrypted, the second service identification is obtained;
According to the first password create-rule, which is encoded, obtains first password strings.
In alternatively possible implementation, this carries out first service identification according to the first password create-rule
Coding, before obtaining the first sharing password, this method further include:
According to the second password generated rule used before current time, the second of second password generated rule is determined
Version identifier;
It is identified according to the second edition, determines that first version identifies;
Coding rule is selected from coding rule library, which is identified and the coding rule forms first password
Create-rule.
In alternatively possible implementation, after this sends the first sharing password to the first terminal, this method
Further include:
The solution code instruction of second terminal is received, which carries second and share password;
The second sharing password is decoded, the corresponding third service identification of the second sharing password is obtained;
According to the third service identification, corresponding second business of the second sharing password is determined from the designated memory space
Information;
Second business information is sent to the second terminal.
In alternatively possible implementation, which includes that the 6th password strings and first version identify;
This is decoded the second sharing password, obtains the corresponding third service identification of the second sharing password, comprising:
It is identified according to the first version, obtains decoding rule corresponding with first version mark;
According to decoding rule, the 6th password strings are decoded, obtain the corresponding third industry of the second sharing password
Business mark.
In alternatively possible implementation, this is decoded the 6th password strings, obtains according to decoding rule
The corresponding third service identification of second sharing password, comprising:
According to decoding rule, the 6th password strings are decoded, the 4th service identification is obtained;
4th service identification is decrypted, the third service identification is obtained.
In alternatively possible implementation, which includes corresponding 6th password of third service identification
String the 7th password strings corresponding with the second check information;
This is decoded the second sharing password, obtains the corresponding third service identification of the second sharing password, comprising:
7th password strings are decoded, second check information is obtained;
According to second check information, which is verified;
When verification passes through, the 6th password strings are decoded, obtain the third service identification.
In the embodiments of the present disclosure, the password generated instruction for receiving first terminal, obtains the in password generated instruction
First service identification of one business information in designated memory space, encodes first service identification, obtains first point
Password is enjoyed, the first sharing password that coding is obtained returns to first terminal.Due to distributing the first business for the first business information
Mark, encodes so as to the service identification to first, and same set of password generated rule can be used in business different in this way
Then namely a set of password generated rule can support the sharings of multiple business information, so as to quickly support the industry of new business
The sharing for information of being engaged in improves scalability and shares efficiency.
Fig. 3 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment, such as Fig. 3 institute
Show, the generation method of the sharing password includes the following steps.
In step S31, server receives the password generated instruction of first terminal, and password generated instruction carries to be generated
First business information of password.
Multiple applications can be installed on the first terminal, include different business in multiple application, user can answer
Business information is checked in.When user wants to share the business information checked, user triggers sharing request to terminal, and terminal connects
When receiving the sharing request, the first business information to be shared is obtained, sends password generated instruction, the password generated to server
Instruction carries the first business information.Wherein, show to include sharing button in the interface of the business information;When terminal detects this point
When enjoying button and being triggered, the sharing request for receiving user's triggering is determined.
First business information can be the business information of any application;For example, first business information is live broadcast service
Information;Then user is broadcast live by first terminal, is arrived when needing that the live broadcast service information is shared with to other users or is shared
When task under other application, user can click the sharing button in first terminal, when first terminal detect the sharing by
When button is triggered, first terminal, which can determine, generates sharing instruction, sends password generated instruction, the password generated to server
Instruction carries live broadcast service information.
In step s 32, server is instructed according to the password generated, obtains first business information in designated memory space
In the first service identification.
When server receives password generated instruction, is instructed from the password generated, get the first business information.Service
After device gets password generated instruction, which can be stored in the designated memory space;And for this
One business information distributes the first service identification, correspondingly, in this step, it is specified at this that server obtains first business information
Corresponding first service identification in memory space.Wherein, it is first business information which, which can be server,
The first service identification being randomly assigned, first service identification can also be server according to first business information, to this
The first service identification that business tine in one business information is encoded.In the embodiments of the present disclosure, to first industry
The acquisition modes of business mark are not especially limited.
When the acquisition modes of first business are by being encoded to obtain to the business tine in first business information
The first service identification when, the step of server obtains the first service identification of first business information in the designated memory space
It can be with are as follows: server obtains the business tine in first business information according to first business information, by the business tine root
It is encoded according to the storage format of the designated memory space of the server, obtains the first service identification of unified format.
Wherein, which, which can according to need, is configured and changes, in the embodiments of the present disclosure, to the coding staff
Formula is not especially limited.For example, can be compiled using URI (Uniform Resource Identifier, uniform resource identifier)
The mode of code is to the storage format in the designated memory space.
After server gets first business information corresponding first service identification, by first business information and
One service identification associated storage is in the designated memory space of the server.Wherein, designated memory space can be tables of data.Phase
It answers, server can only add a varchar field to store the first service identification of URI coded format in tables of data
, also, library can also be parsed by unified URI to parse.
For example, server carries out URI coding to live broadcast service information when the first business information is live broadcast service information, obtain
It can be scheme to corresponding first service identification of live broadcast service information: //livestream/ { livestream_id }.Again
Such as, when the first business information is video service information, server carries out URI coding to video service information, obtains video industry
Can corresponding first service identification of information of being engaged in be scheme: //photo/ { photo_id }? author_id=XXXX.For another example,
When the first business information is tagged traffic information, server carries out URI coding to tagged traffic information, obtains tagged traffic letter
Ceasing corresponding first service identification can be scheme: //tag/ { tag_name } etc..
In the embodiments of the present disclosure, server is encoded by carrying out unified URI to the first business information, obtains the first industry
Business mark, in this way in the first business information of associated storage and the first service identification, it is only necessary to add one in data list structure
A field, so that it may store multiple first service identifications, simplify the structure of tables of data.
In step S33, server encodes first service identification, obtains according to the first password create-rule
To the first password strings.
After server gets the first service identification, can determine the first current password create-rule, according to this first
Password generated rule encodes first service identification, obtains the first password strings.The first password create-rule can root
It needs to be configured and change according to user, in the embodiments of the present disclosure, which is not especially limited.Example
Such as, which can be 62 system said shank rules.
In a kind of possible implementation, the first password create-rule can be the pre-determined password generated rule of user
Then, when server gets the first service identification of the first business information, all with the first password create-rule to this first
Service identification is encoded, and the first password strings are obtained.In alternatively possible implementation, which can
To carry out version updating as needed.Correspondingly, the first password create-rule can be the new mouth that server is currently generated
Enable create-rule.When the first password create-rule is the new password generated rule that server is currently generated, the server
Determine that the process of the first password create-rule can be realized by following steps (A1)-(A3), comprising:
(A1) server determines second password generated according to the second password generated rule used before current time
The second edition mark of rule.
In one possible implementation, the second password generated rule that history uses is stored in server, and is associated with
Store the second password generated rule and second edition mark;Correspondingly, server according to the second password generated rule, obtains and should
The second edition of second password generated rule association identifies.In alternatively possible implementation, the second password generated rule
In specific field in storage the second edition mark.Server is directly obtained from the specific field in the second password generated rule
Second edition mark.Wherein, the second password generated rule can be for from most recently used password generated rule before current time.
Second edition mark can be the second edition number of the second password generated rule.
(A2) server is identified according to the second edition, determines that first version identifies.
In one possible implementation, first version mark and second edition mark are respectively the first password generated
The version number of rule and the second password generated rule.Correspondingly, in this step, server gets second edition mark
Afterwards, which can be identified into corresponding version number and adds default value, obtain first version mark.Wherein, this is default
Numerical value can be any value of non-zero, for example, the default value can be -1,1 or 2 etc..
In alternatively possible implementation, multiple version identifiers are stored in the server, server gets
After two version identifiers, second edition mark is deleted from stored multiple version identifiers, from remaining multiple version identifiers
Middle selection first version mark.
In alternatively possible implementation, server is identified according to the second edition, random to generate and second edition mark
Know different first version marks.It should be noted is that server identifies different first from the second edition according to generation
When version identifier, first version mark is different from old version mark.
(A3) server selects coding rule from coding rule library, which is identified and the coding rule forms
The first password create-rule.
In one possible implementation, multiple coding rules are stored in the server, correspondingly, terminal is directly from this
A coding rule is selected in multiple coding rules, by the coding rule of selection and first version mark the first password generated of composition
Rule.Wherein, server first service identification can be arranged after the coding rule, obtain the first password generated rule
Then, first service identification can also be arranged before the coding rule for server, obtain the first password create-rule;Service
First service identification can also be inserted into the specific field of the coding rule by device, obtain the first password create-rule.In this public affairs
It opens in embodiment, the concrete mode of coding rule and first version mark the first password create-rule of composition is not limited specifically
It is fixed.
In alternatively possible implementation, coding rule can not also be stored in server, directly storage password is raw
It include version identifier at rule, and in password generated rule.Correspondingly, step (A3) could alternatively be: server is according to this
First version mark determines that the password generated rule including first version mark is first from multiple password generated rules
Password generated rule.
It should be noted is that server can periodically update the first password create-rule, so that it is guaranteed that safety.And
And in the embodiments of the present disclosure, the opportunity of server update the first password rule is not especially limited.A kind of possible
In implementation, server can periodically generate the first password create-rule, correspondingly, server is updated every preset duration
Second password generated rule, obtains the first password create-rule, which can be configured and more according to user demand
Change, in the embodiments of the present disclosure, which is not especially limited.For example, the preset duration can for 1min, 5min or
10min etc..
In alternatively possible implementation, server can also be in the more new command for receiving first terminal transmission
When, which is updated, the first password create-rule is obtained.Correspondingly, can be in the more new command
New coding rule is carried, server generates the first password create-rule according to the new coding rule.
In alternatively possible implementation, server can also detect current second password generated rule whether by
Leakage, when the second password generated rule is leaked, server automatically updates current second password generated rule, obtains the
One password create-rule.Wherein, server detect the mode that is leaked of the second password generated rule can be with are as follows: when server receives
When to invalid sharing password, determine that current second generation password is leaked.
In alternatively possible implementation, server detects the sharing generated according to current second password generated rule
The quantity of password, when the quantity is equal to preset quantity, server, which determines, to need to carry out the second current password generated rule
It updates.Wherein, which, which can according to need, is configured and changes, in the embodiments of the present disclosure, to the preset quantity
It is not especially limited.For example, the preset quantity can be 10,15 or 25 etc..
In alternatively possible implementation, after server receives the first business information, to first business information
It is detected, when first business information is the task of new type, updates second password generated rule, obtain the first password
Create-rule.
In this implementation, it is added to version identifier in sharing password, so that server can root in decoding process
The create-rule of the sharing password is determined according to the version identifier, so that it is determined that going out the decoding rule of the sharing password, to compile solution
It, can quick change password create-rule after code mode is leaked, it is therefore prevented that encoding and decoding rule leaks bring risk.
In addition, in one possible implementation, server is according to the first password create-rule directly to first industry
Business mark is encoded, and the first password strings are obtained.In alternatively possible implementation, server is first to the first business mark
Knowledge is encrypted, and encrypted first service identification is obtained, and is carried out according to the first password create-rule to second service identification
Coding, obtains the second password strings.When the server encodes encrypted first service identification, this step can pass through
Following steps (B1)-(B2) is realized, comprising:
(B1) server encrypts first service identification, obtains the second service identification.
In this step, after server gets the first service identification, which is encrypted, obtains
Two service identifications, second service identification are encrypted first service identification.
Server can encrypt the first service identification using symmetric cryptography mode, and it is non-right that server can also use
Cipher mode is claimed to encrypt first service identification.In the embodiments of the present disclosure, to the cipher mode of the first service identification
It is not especially limited.For example, server can by the way of asymmetric encryption encrypt the first service identification, the encryption
Need to use two keys: public-key cryptography (publickey: abbreviation public key) and private cipher key (privatekey: referred to as in the process
Private key).When server encrypts the first service identification, a pair of of public key and private key are generated, server is by public key to first
Service identification carries out encryption and the first service identification is decrypted by private key.
In this implementation, by being encrypted to the second service identification before password is shared in generation first, according to
Encrypted second service identification obtains sharing password, improves the safety for sharing password.
(B2) server encodes second service identification according to the first password create-rule, obtain this first
Password strings.
After server obtains encrypted second service identification, according to the first password create-rule, to second business
Mark is encoded, and the first password strings are obtained.
It should be noted is that directly can be concatenated into according to first password after server has executed this step
One shares password, and the first sharing password is sent to first terminal namely after server executed this step, can not be held
Row step S34-S35, directly execution step S36;Server can also execute step S34 after generating the first password strings, determine
The corresponding first version mark of the password strings, generates first in conjunction with first version mark and shares password.
In step S34, server obtains the corresponding first version mark of the first password create-rule.
In this step, according to the first current password create-rule, the first password create-rule corresponding is determined
One version identifier.In one possible implementation, server according to the first password create-rule from password generated rule and
In the corresponding relationship of version identifier, the corresponding first version mark of the first password create-rule is determined.In alternatively possible reality
In existing mode, the designated character of the first password create-rule is for storing first version mark, and server is from first password
First version mark is obtained in the designated character of create-rule.
In step s 35, server, which identifies the first version, forms this with first password strings and first shares password.
Server determines the first password create-rule pair according to the corresponding first password create-rule of first password strings
After the first version mark answered, first version mark is shared into password with the first password strings composition first.
It should be noted is that server, which identifies the first version, shares password with the first password strings composition first
When, directly first version mark and the first password strings can be combined, first the first version can also be identified and carried out
First version mark after coding is combined by coding with the first password strings.Server compiles first version mark
The coding rule of code is identical as the first password create-rule.It needs to illustrate on the other hand, first version mark and first
Enabling the combination of string can according to need and is configured and changes, first version mark can before the first password strings,
First version mark can also be after the first password strings, in the embodiments of the present disclosure, to first version mark and first
The combination of string is enabled to be not especially limited.For example, the first version is identified as " X ", which is
" 2HVuPD31koB ", then the first sharing password can be " X2HVuPD31koB ".In addition, first version mark and second
It between password strings, can be directly connected to, can also be connected by designated symbols, in the embodiments of the present disclosure, to the designated symbols
It is not especially limited.For example, the character can be "-" "+" " * " etc..
In step S36, server sends the first sharing password to the first terminal.
First sharing password of generation is sent to first terminal by server.It should be noted is that first terminal connects
After receiving the sharing password, directly the first sharing password can be identified by the first terminal.First terminal receives
To after the sharing password, it can also be sent to second terminal by the 2nd APP in first terminal, wherein the 2nd APP is social activity
Using APP, correspondingly, needing after second terminal receives the first sharing password that server is sent to the first sharing password
It is identified, the first sharing password is decoded by server when identification, server is received according to solution code instruction docking
Sharing password be decoded, obtain the corresponding business information of sharing password, then the business information is sent to second terminal.
In the embodiments of the present disclosure, the password generated instruction for receiving first terminal, obtains the in password generated instruction
First service identification of one business information in designated memory space, encodes first service identification, obtains first point
Password is enjoyed, the first sharing password that coding is obtained returns to first terminal.Due to distributing the first business for the first business information
Mark, encodes so as to the service identification to first, and same set of password generated rule can be used in business different in this way
Then namely a set of password generated rule can support the sharings of multiple business information, so as to quickly support the industry of new business
The sharing for information of being engaged in improves scalability and shares efficiency.
Fig. 4 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment, such as Fig. 4 institute
Show, the generation method of the sharing password includes the following steps.
In step S41, server receives the password generated instruction of first terminal, and password generated instruction carries to be generated
First business information of password.
This step is identical as step S31, and details are not described herein.
In step S42, server is instructed according to the password generated, obtains first business information in designated memory space
In the first service identification.
This step is identical as step S32, and details are not described herein.
In step S43, server determines the first check information of first business information.
First check information can be deserve previous existence at first share password timestamp, can also be what user inputted
Information is in the embodiments of the present disclosure not especially limited first check information.When first check information is to be currently generated
When the timestamp of the first sharing password, server obtains the timestamp for being currently generated the first sharing password, which is made
It is stored for the first check information.When first check information is the information of user's input, the information of user input can
Think character string etc., server receives the information of user's input, and the information which is inputted is as the first check information.
In step S44, server encodes first check information according to the first password create-rule, obtains
Second password strings.
In this step, after server gets the first checking information, according to the first password create-rule to this first
Check information is encoded, and is obtained, and the second password strings, this step is similar to step S33, and details are not described herein.
In step S45, server encodes first service identification, obtains according to the first password create-rule
To the first password strings.
This step is identical as step S33, and details are not described herein.
It, can also be with it should be noted is that server can first encode the first business to obtain the first password strings
First the first check information is encoded, obtains the second password strings, first service identification and first can also be verified simultaneously
Information is encoded, and the first password strings and the second password strings are obtained.That is, server can first carry out step S44 executes step again
Rapid S45, server can also first carry out step S45 and execute step S44 again, and server may also be performed simultaneously step S44 and step
Rapid S45 is in the embodiments of the present disclosure not especially limited the sequence for executing step S44 and step S45.
In step S46, server generates the first sharing password according to first password strings and second password strings.
After server determines the first password strings and the second password strings, can according to first password strings and the second password strings,
First password strings and the second password strings are combined, the first sharing password is obtained.In one possible implementation, it takes
First password strings and the second password strings can be directly attached by business device, obtain the first sharing password.Alternatively possible
Implementation in, between first password strings and the second password strings by designated symbols connect, which can be "-"
"+" " * " etc. is in the embodiments of the present disclosure not especially limited the designated symbols.Also, first password strings can be
It, can also be before the second password strings, in the embodiments of the present disclosure, to first password strings and the second password after two password strings
The positional relationship of string is not especially limited.
In addition, first password strings directly can be combined into first with the second password strings group by server shares password, service
Device can also be combined into third password strings according to the first password strings and the second password strings group, and the first is arranged according to third password strings
The third password strings are combined into first with signing messages group and share password by the information of order.When the server is according to first password
String and the second password strings group are combined into third password strings, the information of first password are arranged according to third password strings, by the third mouth
It enables string be combined into the first process for sharing password with signing messages group, can be realized by following steps (1)-(3), comprising:
(1) first password strings and second password strings are formed third password strings by server.
In this step, the sequence of first password strings and the second password strings is also not especially limited.Also, this first
It can directly combine, can also be connected by symbol, in the embodiments of the present disclosure, to this between password strings and the second password strings
It is not especially limited.For example, first password strings are " 2HVuPD31koB ", which is " -4DcGKnVStM ", should
Can be by " _ " connection between first password strings and the second password strings, then the third password strings are " 2HVuPD31koB_-
4DcGKnVStM”。
(2) server encodes the third password strings, obtains the 4th password according to the first password create-rule
String.
In this step, the character string that server can directly obtain the coding is as the 4th password strings, and server is also
Can from coding obtained character string selected section character string as the 4th password strings, correspondingly, this step can by with
Lower step (2-1)-(2-3) is realized, comprising:
(2-1) server determines the signing messages of the third password strings.
The signing messages can be the character string information of third password strings or the partial character string letter in the third password strings
Breath, the signing messages can according to the third password strings determine cryptographic Hash (hashcode), in the embodiments of the present disclosure,
This is not especially limited.For example, the signing messages can be the corresponding all information of third password label, the signing messages
Can be " 2HVuPD31koB_-4DcGKnVStM ".
(2-2) server encodes the signing messages, obtains the 5th password according to the first password create-rule
String.
This step is similar to step S33, and details are not described herein.
(2-3) server selects the 4th password strings from the 5th password strings.
In this step, server can all regard the 5th password strings of generation as the 4th password strings, and server can also
To select the part password strings in the 5th password strings as the 4th password strings, in the embodiments of the present disclosure, this is not made specific
It limits.It should be noted is that when server selects the part password strings in the 5th password strings as four password strings,
The preceding several password strings that can choose the 5th password strings also can choose rear several password strings of the 5th password strings, can be with root
According to pre-determined selection rule, the 5th password strings are chosen, in the embodiments of the present disclosure, the selection to the 4th password strings are chosen
Rule is not especially limited.
For example, the third password strings be the first password strings and the second password strings cryptographic Hash, server to the cryptographic Hash into
Row coding, obtains the 5th password strings, selects the 4th password strings for " CNko " from the 5th password strings.
(3) first password strings, second password strings and the 4th password strings are formed the first sharing mouth by server
It enables.
In this step, the first password strings, the second password strings are shared password with the 4th password strings composition first by server.
It should be noted is that in the embodiments of the present disclosure, not making to the position of the first password strings, second mouthful of string and the 4th password strings
It is specific to limit, also, can be connected between first password strings, the second password strings and the 4th password strings with elder sister, it can also pass through
Symbol connection, in the embodiments of the present disclosure, to the connection type between first password strings, the second password strings and the 4th password strings
It is not especially limited.For example, first password strings are " 2HVuPD31koB ", which is " -4DcGKnVStM ", should
It can be " CNko " by " _ " connection, the 4th password strings between first password strings and the second password strings, the 4th password strings exist
After second password strings, then the first sharing password can be " 2HVuPD31koB_-4DcGKnVStMCNko "
In this implementation, by adding check information in sharing password, legal test is carried out to the first sharing password
Card and timeliness verifying, avoid by arbitrarily constructing sharing password and obtain content information, improve the safety for sharing password.
In step S47, server sends the first sharing password to the second terminal.
This step is identical as step S36, and details are not described herein.
In the embodiments of the present disclosure, the password generated instruction for receiving first terminal, obtains the in password generated instruction
First service identification of one business information in designated memory space, encodes first service identification, obtains first point
Password is enjoyed, the first sharing password that coding is obtained returns to first terminal.Due to distributing the first business for the first business information
Mark, encodes so as to the service identification to first, and same set of password generated rule can be used in business different in this way
Then namely a set of password generated rule can support the sharings of multiple business information, so as to quickly support the industry of new business
The sharing for information of being engaged in improves scalability and shares efficiency.
In the embodiments of the present disclosure, second terminal receives the first sharing password that first terminal is sent, in second terminal,
Show that this first shares password, when user need to obtain this first share password corresponding business information when, second terminal can be with
To server send this first share password, for the ease of distinguish, the sharing password that second terminal is sent to server as
Second shares password, and the first sharing password and the second sharing password can be the same or different, when the first sharing password
When being not tampered with, the first sharing password and second shares password for identical sharing password, when the second sharing password is
When the sharing password being tampered, first, which shares password and second, shares password for different sharing passwords.
Fig. 5 is a kind of flow chart of generation method for sharing password shown according to an exemplary embodiment, such as Fig. 5 institute
Show, the generation method of the sharing password includes the following steps.
In step s 51, server receives the solution code instruction of second terminal, which carries second and share password.
Second terminal connects needs and is decoded to the second sharing password.Wherein, this second share password can be for the
One shares the identical sharing password of password, or the sharing password different from the first sharing password, in the embodiment of the present disclosure
In, this is not especially limited.Also, the second terminal can with first terminal be identical terminal, can also with this first
Terminal is that different terminals is in the embodiments of the present disclosure not especially limited this.When the second terminal receives server hair
After second sent shares password, when user needs to check the second sharing password, the second sharing password can be replicated, is opened
Relevant APP replicates the second sharing password to shear plate when second terminal detects in one possible implementation
When, second terminal sends solution code instruction to server.In alternatively possible implementation, the second terminal receive this
When two sharing passwords, solution code instruction just is sent to server.
In step S52, server is decoded the second sharing password, obtains this and second shares password corresponding the
Three service identifications.
After server receives the solution code instruction of second terminal transmission, second parsed in the solution code instruction shares password,
After obtaining the second sharing password, second server is decoded the second sharing password, obtains in the second sharing password
Third service identification.Wherein, which is opposite process with the cataloged procedure of the terminal, for example, the cataloged procedure
62 scale codings are carried out for the third service identification to 10 system, obtain the third service identification of 62 systems, then the decoding
Journey is to be decoded to the third service identification of 62 system, obtains the third service identification of 10 systems.
In one possible implementation, after server gets the second sharing password, directly current password generated
Rule, determining decoding rule corresponding with password generated rule solve the second sharing password according to decoding rule
Code.
In alternatively possible implementation, which includes that the 6th password strings and first version identify.
Correspondingly, this step can be realized by following procedure (1)-(2), comprising:
(1) server is identified according to the first version, obtains decoding rule corresponding with first version mark.
Server is identified according to the first version, determines the first password create-rule corresponding with first version mark,
According to the first password create-rule, decoding rule corresponding with the first password create-rule is determined.
(2) server is decoded the 6th password strings according to decoding rule, and it is corresponding to obtain the second sharing password
Third service identification.
In one possible implementation, the third service identification in the second sharing password does not have in an encoding process
It is encrypted, then in this step, server can directly be decrypted the second sharing password, obtain third service identification.
In alternatively possible implementation, this second share password in third service identification in an encoding process be encrypted,
Then in this step, server decoding first obtains the 4th service identification, and server needs that the 4th service identification is decrypted, obtains
To third service identification.Correspondingly, the process can be realized by following steps (2-A1)-(2-A2), comprising:
(2-A1) server is decoded the 6th password strings, obtains the 4th service identification according to decoding rule.
Server is decoded the second sharing password according to decoding rule, obtains the 4th service identification, the 4th business
It is identified as the 4th encrypted service identification.
The 4th service identification is decrypted in (2-A2) server, obtains the third service identification.
Server determines the cipher mode of the 4th business, determines manner of decryption according to the cipher mode, passes through the decryption
The 4th service identification is decrypted in mode, obtains third service identification.For example, when the 4th business is to be added by asymmetric
When the service identification that close mode obtains, the secret keys of the 4th service identification are determined, according to the decruption key to the 4th industry
Business mark is decrypted, and obtains third service identification.
In addition, check information can also be carried in the second sharing password, correspondingly, the second sharing password includes third
Corresponding 6th password strings of service identification and corresponding 7th password strings of the second check information.In this step, server may be used also
To verify to the second sharing password, the process which verifies the second sharing password can be by following
Step (2-B1)-(2-B3) is realized, comprising:
(2-B1) server is decoded the 7th password strings, obtains second check information.
In this step, server is decoded the 7th password strings, obtains the second verification of the second sharing password
Information.Second check information may include timestamp information and second cryptographic Hash for sharing password of the second sharing password
At least one of.
(2-B2) server verifies the second sharing password according to second check information.
When second check information is the timestamp information of the second sharing password, the server is to the second sharing mouth
Enable the process that is verified can be with are as follows: server obtains current timestamp, and according to second timestamp for sharing password
The effective time of acquisition of information the second sharing password and the second generation timestamp for sharing password;According to the second sharing mouth
The generation timestamp and current time stamp of order, determine the current time stamp whether this second share password effective time in,
When the current time stamp is in the effective time of the second sharing password, determine that the second sharing password verification passes through;When this
When current time stamp is not in the effective time of the second sharing password, determine that the second sharing password verification does not pass through.
When second check information is the cryptographic Hash of the second sharing password, according to the Hash of the second sharing password
Value determines that the second sharing password verification passes through when the cryptographic Hash of the second sharing password is identical as second check information;
When the cryptographic Hash and the second check information difference of the second sharing password, determine that the second sharing password verification does not pass through.
It should be noted is that second check information can be the partial character string after cryptographic Hash coding, correspondingly, in this step
In rapid, when being verified to second check information, it can also first determine the cryptographic Hash of the second sharing password, be advised according to choosing
Then, a part in second cryptographic Hash for sharing password, compares with decoded second check information.
(2-B3) server is decoded the 6th password strings when verification passes through, and obtains the third service identification.
In step S53, server determines second sharing according to the third service identification from the designated memory space
Corresponding second business information of password.
Second server determines the third business mark according to the third service identification from the designated memory space of server
Know corresponding second business information.The corresponding relationship of storage service mark and business information in server, when server is got
After the third service identification, according to the third service identification, from service identification and the corresponding relationship of business information, determine this
Corresponding second business information of three service identifications.
In step S54, server sends second business information to the second terminal.
Server sends second business information to the second terminal according to the terminal iidentification of second terminal.Correspondingly, should
It can also include the terminal iidentification of the second terminal in the solution code instruction that second terminal is sent.
In the embodiments of the present disclosure, the password generated instruction for receiving first terminal, obtains the in password generated instruction
First service identification of one business information in designated memory space, encodes first service identification, obtains first point
Password is enjoyed, the first sharing password that coding is obtained returns to first terminal.Due to distributing the first business for the first business information
Mark, encodes so as to the service identification to first, and same set of password generated rule can be used in business different in this way
Then namely a set of password generated rule can support the sharings of multiple business information, so as to quickly support the industry of new business
The sharing for information of being engaged in improves scalability and shares efficiency.
Fig. 6 is a kind of generating means block diagram for sharing password shown according to an exemplary embodiment.Referring to Fig. 6, the dress
It sets including the first receiving module 601, memory module 602, coding module 603 and the first sending module 604.
First receiving module 601 is configured as receiving the password generated instruction of first terminal, and password generated instruction carries
First business information of password to be generated;
Memory module 602 is configured as being instructed according to the password generated, and it is empty in specified storage to obtain first business information
Between in the first service identification;
Coding module 603 is configured as encoding first service identification according to the first password create-rule, obtaining
Share password to first;
First sending module 604 is configured as sending the first sharing password to the first terminal.
In one possible implementation, the coding module 603 is additionally configured to be advised according to first password generated
Then, which is encoded, obtains the first password strings;Obtain the corresponding first edition of the first password create-rule
This mark;The first version is identified and forms this with first password strings and first shares password.
In alternatively possible implementation, which is additionally configured to determine first business information
First check information;First check information is encoded according to the first password create-rule, obtains the second password strings;With
And according to the first password create-rule, which is encoded, the first password strings are obtained;According to this first
Password strings and second password strings generate the first sharing password.
In alternatively possible implementation, the coding module 603, be also configured by first password strings and this second
Password strings form third password strings;According to the first password create-rule, which is encoded, obtains the 4th
Password strings;By first password strings, second password strings and the 4th password strings, the first sharing password is formed.
In alternatively possible implementation, which is also configured to determine the signature of the third password strings
Information;According to the first password create-rule, which is encoded, the 5th password strings are obtained;From the 5th password
The 4th password strings are selected in string.
In alternatively possible implementation, which is also configured to add first service identification
It is close, obtain the second service identification;According to the first password create-rule, which is encoded, obtain this
One password strings.
In alternatively possible implementation, the device further include:
First determining module is configured as according to the second password generated rule used before current time, and determining should
The second edition of second password generated rule identifies;
Second determining module is configured as being identified according to the second edition, determines that first version identifies;
Selecting module is configured as selecting coding rule from coding rule library, which is identified and the coding
Rule forms the first password create-rule.
In alternatively possible implementation, the device further include:
Second receiving module is configured as receiving the solution code instruction of second terminal, which carries second and share mouth
It enables;
Decoder module is configured as being decoded the second sharing password, obtains this and second shares password corresponding the
Three service identifications;
Third determining module is configured as according to the third service identification, determined from the designated memory space this second
Share corresponding second business information of password;
Second sending module is configured as sending second business information to the second terminal.
In alternatively possible implementation, which includes that the 6th password strings and first version identify;
Decoder module is additionally configured to be identified according to the first version, obtains decoding corresponding with first version mark
Rule;According to decoding rule, the 6th password strings are decoded, obtain the corresponding third business mark of the second sharing password
Know.
In alternatively possible implementation, which is additionally configured to according to decoding rule, to the 6th
Password strings are decoded, and obtain the 4th service identification;4th service identification is decrypted, the third service identification is obtained.
In alternatively possible implementation, which includes corresponding 6th password of third service identification
String the 7th password strings corresponding with the second check information;
Decoder module is additionally configured to be decoded the 7th password strings, obtains second check information;According to this second
Check information verifies the second sharing password;When verification passes through, the 6th password strings are decoded, are somebody's turn to do
Third service identification.
In the embodiments of the present disclosure, the password generated instruction for receiving first terminal, obtains the in password generated instruction
First service identification of one business information in designated memory space, encodes first service identification, obtains first point
Password is enjoyed, the first sharing password that coding is obtained returns to first terminal.Due to distributing the first business for the first business information
Mark, encodes so as to the service identification to first, and same set of password generated rule can be used in business different in this way
Then namely a set of password generated rule can support the sharings of multiple business information, so as to quickly support the industry of new business
The sharing for information of being engaged in improves scalability and shares efficiency.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 7 shows the structural block diagram of the terminal 700 of one exemplary embodiment of disclosure offer.The terminal 700 can be with
It is first terminal or second terminal, which can be with are as follows: smart phone, tablet computer, MP3 player (Moving Picture
Experts Group Audio Layer III, dynamic image expert's compression standard audio level 3), MP4 (Moving
Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio level 4) player, pen
Remember this computer or desktop computer.Terminal 700 is also possible to referred to as user equipment, portable terminal, laptop terminal, terminal console
Deng other titles.
In general, terminal 700 includes: processor 701 and memory 702.
Processor 701 may include one or more processing cores, such as 4 core processors, 8 core processors etc..Place
Reason device 701 can use DSP (Digital Signal Processing, Digital Signal Processing), FPGA (Field-
Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array, may be programmed
Logic array) at least one of example, in hardware realize.Processor 701 also may include primary processor and coprocessor, master
Processor is the processor for being handled data in the awake state, also referred to as CPU (Central Processing
Unit, central processing unit);Coprocessor is the low power processor for being handled data in the standby state.?
In some embodiments, processor 701 can be integrated with GPU (Graphics Processing Unit, image processor),
GPU is used to be responsible for the rendering and drafting of content to be shown needed for display screen.In some embodiments, processor 701 can also be wrapped
AI (Artificial Intelligence, artificial intelligence) processor is included, the AI processor is for handling related machine learning
Calculating operation.
Memory 702 may include one or more computer readable storage mediums, which can
To be non-transient.Memory 702 may also include high-speed random access memory and nonvolatile memory, such as one
Or multiple disk storage equipments, flash memory device.In some embodiments, the non-transient computer in memory 702 can
Storage medium is read for storing at least one instruction, at least one instruction for performed by processor 701 to realize this public affairs
Open the sharing password generated method that middle embodiment of the method provides.
In some embodiments, terminal 700 is also optional includes: peripheral device interface 703 and at least one peripheral equipment.
It can be connected by bus or signal wire between processor 701, memory 702 and peripheral device interface 703.Each peripheral equipment
It can be connected by bus, signal wire or circuit board with peripheral device interface 703.Specifically, peripheral equipment includes: radio circuit
704, at least one of display screen 705, camera 706, voicefrequency circuit 707, positioning component 708 and power supply 709.
Peripheral device interface 703 can be used for I/O (Input/Output, input/output) is relevant outside at least one
Peripheral equipment is connected to processor 701 and memory 702.In some embodiments, processor 701, memory 702 and peripheral equipment
Interface 703 is integrated on same chip or circuit board;In some other embodiments, processor 701, memory 702 and outer
Any one or two in peripheral equipment interface 703 can realize on individual chip or circuit board, the present embodiment to this not
It is limited.
Radio circuit 704 is for receiving and emitting RF (Radio Frequency, radio frequency) signal, also referred to as electromagnetic signal.It penetrates
Frequency circuit 704 is communicated by electromagnetic signal with communication network and other communication equipments.Radio circuit 704 turns electric signal
It is changed to electromagnetic signal to be sent, alternatively, the electromagnetic signal received is converted to electric signal.Optionally, radio circuit 704 wraps
It includes: antenna system, RF transceiver, one or more amplifiers, tuner, oscillator, digital signal processor, codec chip
Group, user identity module card etc..Radio circuit 704 can be carried out by least one wireless communication protocol with other terminals
Communication.The wireless communication protocol includes but is not limited to: Metropolitan Area Network (MAN), each third generation mobile communication network (2G, 3G, 4G and 5G), wireless office
Domain net and/or WiFi (Wireless Fidelity, Wireless Fidelity) network.In some embodiments, radio circuit 704 may be used also
To include the related circuit of NFC (Near Field Communication, wireless near field communication), the disclosure is not subject to this
It limits.
Display screen 705 is for showing UI (User Interface, user interface).The UI may include figure, text, figure
Mark, video and its their any combination.When display screen 705 is touch display screen, display screen 705 also there is acquisition to show
The ability of the touch signal on the surface or surface of screen 705.The touch signal can be used as control signal and be input to processor
701 are handled.At this point, display screen 705 can be also used for providing virtual push button and/or dummy keyboard, also referred to as soft button and/or
Soft keyboard.In some embodiments, display screen 705 can be one, and the front panel of terminal 700 is arranged;In other embodiments
In, display screen 705 can be at least two, be separately positioned on the different surfaces of terminal 700 or in foldover design;In still other reality
It applies in example, display screen 705 can be flexible display screen, be arranged on the curved surface of terminal 700 or on fold plane.Even, it shows
Display screen 705 can also be arranged to non-rectangle irregular figure, namely abnormity screen.Display screen 705 can use LCD (Liquid
Crystal Display, liquid crystal display), OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode)
Etc. materials preparation.
CCD camera assembly 706 is for acquiring image or video.Optionally, CCD camera assembly 706 include front camera and
Rear camera.In general, the front panel of terminal is arranged in front camera, the back side of terminal is arranged in rear camera.One
In a little embodiments, rear camera at least two is main camera, depth of field camera, wide-angle camera, focal length camera shooting respectively
Any one in head, to realize that main camera and the fusion of depth of field camera realize background blurring function, main camera and wide-angle
Camera fusion realizes that pan-shot and VR (Virtual Reality, virtual reality) shooting function or other fusions are clapped
Camera shooting function.In some embodiments, CCD camera assembly 706 can also include flash lamp.Flash lamp can be monochromatic warm flash lamp,
It is also possible to double-colored temperature flash lamp.Double-colored temperature flash lamp refers to the combination of warm light flash lamp and cold light flash lamp, can be used for not
With the light compensation under colour temperature.
Voicefrequency circuit 707 may include microphone and loudspeaker.Microphone is used to acquire the sound wave of user and environment, and will
Sound wave, which is converted to electric signal and is input to processor 701, to be handled, or is input to radio circuit 704 to realize voice communication.
For stereo acquisition or the purpose of noise reduction, microphone can be separately positioned on the different parts of terminal 700 to be multiple.Mike
Wind can also be array microphone or omnidirectional's acquisition type microphone.Loudspeaker is then used to that processor 701 or radio circuit will to be come from
704 electric signal is converted to sound wave.Loudspeaker can be traditional wafer speaker, be also possible to piezoelectric ceramic loudspeaker.When
When loudspeaker is piezoelectric ceramic loudspeaker, the audible sound wave of the mankind can be not only converted electrical signals to, it can also be by telecommunications
Number the sound wave that the mankind do not hear is converted to carry out the purposes such as ranging.In some embodiments, voicefrequency circuit 707 can also include
Earphone jack.
Positioning component 708 is used for the current geographic position of positioning terminal 700, to realize navigation or LBS (Location
Based Service, location based service).Positioning component 708 can be the GPS (Global based on the U.S.
Positioning System, global positioning system), the dipper system of China, Russia Gray receive this system or European Union
The positioning component of Galileo system.
Power supply 709 is used to be powered for the various components in terminal 700.Power supply 709 can be alternating current, direct current,
Disposable battery or rechargeable battery.When power supply 709 includes rechargeable battery, which can support wired charging
Or wireless charging.The rechargeable battery can be also used for supporting fast charge technology.
In some embodiments, terminal 700 further includes having one or more sensors 710.The one or more sensors
710 include but is not limited to: acceleration transducer 711, gyro sensor 712, pressure sensor 713, fingerprint sensor 714,
Optical sensor 715 and proximity sensor 716.
The acceleration that acceleration transducer 711 can detecte in three reference axis of the coordinate system established with terminal 700 is big
It is small.For example, acceleration transducer 711 can be used for detecting component of the acceleration of gravity in three reference axis.Processor 701 can
With the acceleration of gravity signal acquired according to acceleration transducer 711, control display screen 705 with transverse views or longitudinal view into
The display of row user interface.Acceleration transducer 711 can be also used for the acquisition of game or the exercise data of user.
Gyro sensor 712 can detecte body direction and the rotational angle of terminal 700, and gyro sensor 712 can
To cooperate with acquisition user to act the 3D of terminal 700 with acceleration transducer 711.Processor 701 is according to gyro sensor 712
Following function may be implemented in the data of acquisition: when action induction (for example changing UI according to the tilt operation of user), shooting
Image stabilization, game control and inertial navigation.
The lower layer of side frame and/or display screen 705 in terminal 700 can be set in pressure sensor 713.Work as pressure sensing
When the side frame of terminal 700 is arranged in device 713, user can detecte to the gripping signal of terminal 700, by 701 basis of processor
The gripping signal that pressure sensor 713 acquires carries out right-hand man's identification or prompt operation.When the setting of pressure sensor 713 is being shown
When the lower layer of screen 705, the pressure operation of display screen 705 is realized to operating on the interface UI according to user by processor 701
Property control is controlled.Operability control include button control, scroll bar control, icon control, in menu control at least
It is a kind of.
Fingerprint sensor 714 is used to acquire the fingerprint of user, collected according to fingerprint sensor 714 by processor 701
The identity of fingerprint recognition user, alternatively, by fingerprint sensor 714 according to the identity of collected fingerprint recognition user.It is identifying
When the identity of user is trusted identity out, the user is authorized to execute relevant sensitive operation, the sensitive operation packet by processor 701
Include solution lock screen, check encryption information, downloading software, payment and change setting etc..Terminal can be set in fingerprint sensor 714
700 front, the back side or side.When being provided with physical button or manufacturer Logo in terminal 700, fingerprint sensor 714 can be with
It is integrated with physical button or manufacturer Logo.
Optical sensor 715 is for acquiring ambient light intensity.In one embodiment, processor 701 can be according to optics
The ambient light intensity that sensor 715 acquires controls the display brightness of display screen 705.Specifically, when ambient light intensity is higher,
The display brightness of display screen 705 is turned up;When ambient light intensity is lower, the display brightness of display screen 705 is turned down.In another reality
It applies in example, the ambient light intensity that processor 701 can also be acquired according to optical sensor 715, dynamic adjusts CCD camera assembly 706
Acquisition parameters.
Proximity sensor 716, also referred to as range sensor are generally arranged at the front panel of terminal 700.Proximity sensor 716
For acquiring the distance between the front of user Yu terminal 700.In one embodiment, when proximity sensor 716 detects use
When family and the distance between the front of terminal 700 gradually become smaller, display screen 705 is controlled by processor 701 and is switched from bright screen state
To cease screen state;When proximity sensor 716 detects user and the distance between the front of terminal 700 becomes larger, by
Reason device 701 controls display screen 705 and is switched to bright screen state from breath screen state.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal 700 of structure shown in Fig. 7, can wrap
It includes than illustrating more or fewer components, perhaps combine certain components or is arranged using different components.
Fig. 8 is a kind of structural schematic diagram for server that the embodiment of the present disclosure provides, which can be because of configuration or property
Energy is different and generates bigger difference, may include one or more processors (central processing
Units, CPU) 801 and one or more memory 802, wherein at least one finger is stored in the memory 802
It enables, the method which is loaded by the processor 801 and executed to realize above-mentioned each embodiment of the method offer.When
So, which can also have the components such as wired or wireless network interface, keyboard and input/output interface, so as into
Row input and output, the server can also include other for realizing the component of functions of the equipments, and this will not be repeated here.
In the exemplary embodiment, a kind of computer readable storage medium is additionally provided, the memory for example including instruction,
Above-metioned instruction can be executed by the processor in terminal to complete to share in above-described embodiment the generation method of password.For example, the meter
Calculation machine readable storage medium storing program for executing can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage and set
It is standby etc..
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure
Its embodiment.The disclosure is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or
Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following
Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.
Claims (10)
1. a kind of generation method for sharing password, which is characterized in that the described method includes:
The password generated instruction of first terminal is received, the password generated instruction carries the first business information of password to be generated;
It is instructed according to the password generated, obtains first service identification of first business information in designated memory space;
According to the first password create-rule, first service identification is encoded, obtains the first sharing password;
Described first, which is sent, to the first terminal shares password.
2. the method according to claim 1, wherein described according to the first password create-rule, to described first
Service identification is encoded, and the first sharing password is obtained, comprising:
According to the first password create-rule, first service identification is encoded, the first password strings are obtained;
Obtain the corresponding first version mark of the first password create-rule;
First version mark is shared into password with first password strings composition described first.
3. the method according to claim 1, wherein described according to the first password create-rule, to described first
Service identification is encoded, and the first sharing password is obtained, comprising:
Determine the first check information of first business information;
First check information is encoded according to the first password create-rule, obtains the second password strings;And root
According to the first password create-rule, first service identification is encoded, the first password strings are obtained;
According to first password strings and second password strings, generates described first and share password.
4. according to the method described in claim 3, it is characterized in that, described according to first password strings and second password
String generates described first and shares password, comprising:
By first password strings and second password strings, third password strings are formed;
According to the first password create-rule, the third password strings are encoded, the 4th password strings are obtained;
By first password strings, second password strings and the 4th password strings, forms described first and share password.
5. according to the method described in claim 4, it is characterized in that, described according to the first password create-rule, to described
Third password strings are encoded, and the 4th password strings are obtained, comprising:
Determine the signing messages of the third password strings;
According to the first password create-rule, the signing messages is encoded, obtains the 5th password strings;
The 4th password strings are selected from the 5th password strings.
6. the method according to claim 1, wherein described according to the first password create-rule, to described first
Service identification is encoded, before obtaining the first sharing password, the method also includes:
According to the second password generated rule used before current time, the second edition of the second password generated rule is determined
This mark;
It is identified according to the second edition, determines that first version identifies;
Coding rule is selected from coding rule library, first version mark and the coding rule are formed into the first
Enable create-rule.
7. method described in any one of -6 claims according to claim 1, which is characterized in that described to be sent out to the first terminal
After sending the first sharing password, the method also includes:
The solution code instruction of second terminal is received, the solution code instruction carries second and shares password;
The second sharing password is decoded, described second is obtained and shares the corresponding third service identification of password;
According to the third service identification, determine that described second shares corresponding second industry of password from the designated memory space
Business information;
Second business information is sent to the second terminal.
8. a kind of generating means for sharing password, which is characterized in that described device includes:
First receiving module is configured as receiving the password generated instruction of first terminal, and the password generated instruction carries to be generated
At the first business information of password;
Memory module is configured as being instructed according to the password generated, obtains first business information in designated memory space
In the first service identification;
Coding module is configured as encoding first service identification according to the first password create-rule, obtaining first
Share password;
First sending module is configured as sending the first sharing password to the first terminal.
9. a kind of server characterized by comprising
One or more processors;
For storing one or more memories of one or more of processor-executable instructions;
Wherein, one or more of processors are configured as perform claim and require the described in any item lifes for sharing password of 1-7
At method.
10. a kind of non-transitorycomputer readable storage medium, which is characterized in that when the instruction in the storage medium is by terminal
Processor execute when, enable the server to perform claim require 1-7 it is described in any item share passwords generation methods.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910594496.2A CN110290146B (en) | 2019-07-03 | 2019-07-03 | Method and device for generating shared password, server and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910594496.2A CN110290146B (en) | 2019-07-03 | 2019-07-03 | Method and device for generating shared password, server and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110290146A true CN110290146A (en) | 2019-09-27 |
CN110290146B CN110290146B (en) | 2021-10-08 |
Family
ID=68020851
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910594496.2A Active CN110290146B (en) | 2019-07-03 | 2019-07-03 | Method and device for generating shared password, server and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110290146B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111368232A (en) * | 2020-02-28 | 2020-07-03 | 北京达佳互联信息技术有限公司 | Password sharing reflux method and device, electronic equipment and storage medium |
CN111414495A (en) * | 2020-03-19 | 2020-07-14 | 北京奇艺世纪科技有限公司 | Multimedia data acquisition method, device and computer readable storage medium |
CN111638978A (en) * | 2020-05-20 | 2020-09-08 | 北京达佳互联信息技术有限公司 | Content sharing method and device |
WO2021169776A1 (en) * | 2020-02-28 | 2021-09-02 | 北京达佳互联信息技术有限公司 | Sharing password analysis method and device |
CN113783835A (en) * | 2021-07-30 | 2021-12-10 | 北京沃东天骏信息技术有限公司 | Password sharing method, device, equipment and storage medium |
CN114363094A (en) * | 2022-03-17 | 2022-04-15 | 北京百度网讯科技有限公司 | Data sharing method, device, equipment and storage medium |
CN114448928A (en) * | 2022-01-26 | 2022-05-06 | 北京达佳互联信息技术有限公司 | Command display method, device, computer equipment and medium |
CN114640666A (en) * | 2022-03-04 | 2022-06-17 | 微位(深圳)网络科技有限公司 | File sharing and downloading method, electronic equipment and readable storage medium |
WO2022166690A1 (en) * | 2021-02-08 | 2022-08-11 | 支付宝(杭州)信息技术有限公司 | Information processing method, apparatus and device, and medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1743994A (en) * | 2004-08-27 | 2006-03-08 | 捷讯研究有限公司 | User-defined passwords having associated unique version data to assist user recall of the password |
CN102426592A (en) * | 2011-10-31 | 2012-04-25 | 北京人大金仓信息技术股份有限公司 | Method for initializing database based on dynamic password |
CN103502992A (en) * | 2011-01-14 | 2014-01-08 | 苹果公司 | System and method for tamper-resistant booting |
CN107294704A (en) * | 2016-03-31 | 2017-10-24 | 阿里巴巴集团控股有限公司 | The generation method of password, the execution method of password and terminal |
CN108123721A (en) * | 2016-11-29 | 2018-06-05 | 展讯通信(上海)有限公司 | Coding method and device |
CN109190012A (en) * | 2017-06-19 | 2019-01-11 | 阿里巴巴集团控股有限公司 | A kind of information processing method, device and equipment |
CN109587110A (en) * | 2018-10-09 | 2019-04-05 | 阿里巴巴集团控股有限公司 | A kind of weak passwurd detection method, device, computer equipment and service server |
KR20190054624A (en) * | 2017-11-14 | 2019-05-22 | 박영경 | Seed code transmission method and system for location-based password service using evolved multimedia broadcast multicast services system in a cellular iot network |
-
2019
- 2019-07-03 CN CN201910594496.2A patent/CN110290146B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1743994A (en) * | 2004-08-27 | 2006-03-08 | 捷讯研究有限公司 | User-defined passwords having associated unique version data to assist user recall of the password |
CN103502992A (en) * | 2011-01-14 | 2014-01-08 | 苹果公司 | System and method for tamper-resistant booting |
CN102426592A (en) * | 2011-10-31 | 2012-04-25 | 北京人大金仓信息技术股份有限公司 | Method for initializing database based on dynamic password |
CN107294704A (en) * | 2016-03-31 | 2017-10-24 | 阿里巴巴集团控股有限公司 | The generation method of password, the execution method of password and terminal |
CN108123721A (en) * | 2016-11-29 | 2018-06-05 | 展讯通信(上海)有限公司 | Coding method and device |
CN109190012A (en) * | 2017-06-19 | 2019-01-11 | 阿里巴巴集团控股有限公司 | A kind of information processing method, device and equipment |
KR20190054624A (en) * | 2017-11-14 | 2019-05-22 | 박영경 | Seed code transmission method and system for location-based password service using evolved multimedia broadcast multicast services system in a cellular iot network |
CN109587110A (en) * | 2018-10-09 | 2019-04-05 | 阿里巴巴集团控股有限公司 | A kind of weak passwurd detection method, device, computer equipment and service server |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111368232A (en) * | 2020-02-28 | 2020-07-03 | 北京达佳互联信息技术有限公司 | Password sharing reflux method and device, electronic equipment and storage medium |
WO2021169776A1 (en) * | 2020-02-28 | 2021-09-02 | 北京达佳互联信息技术有限公司 | Sharing password analysis method and device |
CN111414495A (en) * | 2020-03-19 | 2020-07-14 | 北京奇艺世纪科技有限公司 | Multimedia data acquisition method, device and computer readable storage medium |
CN111414495B (en) * | 2020-03-19 | 2024-04-16 | 北京奇艺世纪科技有限公司 | Multimedia data acquisition method, device and computer readable storage medium |
CN111638978A (en) * | 2020-05-20 | 2020-09-08 | 北京达佳互联信息技术有限公司 | Content sharing method and device |
CN111638978B (en) * | 2020-05-20 | 2023-11-14 | 北京达佳互联信息技术有限公司 | Content sharing method and device |
WO2022166690A1 (en) * | 2021-02-08 | 2022-08-11 | 支付宝(杭州)信息技术有限公司 | Information processing method, apparatus and device, and medium |
CN113783835A (en) * | 2021-07-30 | 2021-12-10 | 北京沃东天骏信息技术有限公司 | Password sharing method, device, equipment and storage medium |
CN114448928A (en) * | 2022-01-26 | 2022-05-06 | 北京达佳互联信息技术有限公司 | Command display method, device, computer equipment and medium |
CN114448928B (en) * | 2022-01-26 | 2023-12-19 | 北京达佳互联信息技术有限公司 | Command display method, device, computer equipment and medium |
CN114640666A (en) * | 2022-03-04 | 2022-06-17 | 微位(深圳)网络科技有限公司 | File sharing and downloading method, electronic equipment and readable storage medium |
CN114640666B (en) * | 2022-03-04 | 2023-07-25 | 微位(深圳)网络科技有限公司 | File sharing downloading method, electronic equipment and readable storage medium |
CN114363094B (en) * | 2022-03-17 | 2022-06-24 | 北京百度网讯科技有限公司 | Data sharing method, device, equipment and storage medium |
CN114363094A (en) * | 2022-03-17 | 2022-04-15 | 北京百度网讯科技有限公司 | Data sharing method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110290146B (en) | 2021-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110290146A (en) | Share generation method, device, server and the storage medium of password | |
CN110602089B (en) | Block chain-based medical data storage method, device, equipment and storage medium | |
CN110245144B (en) | Protocol data management method, device, storage medium and system | |
CN112711774B (en) | Data processing method, device, equipment and storage medium | |
CN108595970A (en) | Configuration method, device, terminal and the storage medium of processing component | |
CN109688147A (en) | Using login method, device, terminal, server, system and storage medium | |
CN110826103B (en) | Method, device, equipment and storage medium for processing document authority based on blockchain | |
CN108964903A (en) | password storage method and device | |
CN111506884A (en) | User invitation method, device, computer equipment and computer readable storage medium | |
CN110597924B (en) | Block chain-based user identification processing method, device, equipment and storage medium | |
CN111404991A (en) | Method, device, electronic equipment and medium for acquiring cloud service | |
CN110401648A (en) | Obtain method, apparatus, electronic equipment and the medium of cloud service | |
CN109522146A (en) | The method, apparatus and storage medium of abnormality test are carried out to client | |
CN110365501B (en) | Method and device for group joining processing based on graphic code | |
CN109254775A (en) | Image processing method, terminal and storage medium based on face | |
CN110278273A (en) | Multimedia file method for uploading, device, terminal, server and storage medium | |
CN111935166A (en) | Communication authentication method, system, electronic device, server, and storage medium | |
CN111970298A (en) | Application access method and device, storage medium and computer equipment | |
CN110602689A (en) | Method and device for safely operating equipment | |
CN112989370B (en) | Key filling method, system, device, equipment and storage medium | |
CN109547444A (en) | Virtual objects acquisition methods, device and electronic equipment | |
CN109033473A (en) | Picture sharing method, device and computer readable storage medium | |
CN110968549B (en) | File storage method, device, electronic equipment and medium | |
CN110362330A (en) | Application program update method, apparatus, terminal and storage medium | |
CN110380956A (en) | A kind of method, apparatus and system for transmitting instant communication message |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |