CN110445615A - Network request security verification method, device, medium and electronic equipment - Google Patents
Network request security verification method, device, medium and electronic equipment Download PDFInfo
- Publication number
- CN110445615A CN110445615A CN201910630624.4A CN201910630624A CN110445615A CN 110445615 A CN110445615 A CN 110445615A CN 201910630624 A CN201910630624 A CN 201910630624A CN 110445615 A CN110445615 A CN 110445615A
- Authority
- CN
- China
- Prior art keywords
- token
- time
- network request
- transmitting terminal
- trigger action
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The present invention relates to Network Monitoring Technology field, a kind of network request security verification method, device, medium and electronic equipment are disclosed, this method comprises: receiving first network request;The transmitting terminal for generating the first token and the first token being sent to first network request is requested according to first network, wherein the first token includes the out-of-service time;Determine the time for monitoring the transmitting terminal trigger action of first network request;When the trigger action for the transmitting terminal for listening to first network request in the time, the out-of-service time of the first token is adjusted according to trigger action, obtains the out-of-service time after the adjustment of the first token;The second network request for carrying the first token is received before the out-of-service time after the adjustment, the second network request of confirmation is legal.Under the method, by adjusting the out-of-service time of token according to the trigger action of user, realizing the dynamic optimization of token out-of-service time, the safety of token has been taken into account while guaranteeing user experience after generating token for network request.
Description
Technical field
The present invention relates to Network Monitoring Technology field, in particular to a kind of network request security verification method, device, Jie
Matter and electronic equipment.
Background technique
With the arrival of Internet era, the various technologies including network protocol, which provide safety for network communication, to be had
The environment of sequence enables people freely to roam in the ocean of network, and token (token) is exactly the one of the information security epoch
Item important technology.Token has certain timeliness as the token in authentication.Big multi-client or App make at present
It is user login services device or when to server end submission form with process, server can return to one to client or App
Token, when the request that user logs on or client or App are submitted when submission form can carry the token, server end
Judge whether the request of user is legal according to token.
In the realization of the prior art, in order to guarantee the effect of token, all can be set for token certain term of validity,
After token is expired, user submits request that will verify identity again, and client or App may be used in user at this time,
The experience of user is thus destroyed, but if in order to guarantee that user experience, can without exception by the term of validity extension of token
Reduce the safety of token.Therefore the prior art can not combine user experience and the safety of token.
Summary of the invention
Token present in the relevant technologies is expired to destroy user experience in order to solve, and eventually lead to user and use network
The low technical problem of efficiency of service, the present invention provides a kind of network request security verification method, device, medium and electronics
Equipment.
According to the one side of the application, a kind of network request security verification method is provided, which comprises
Receive first network request;
It requests to generate the first token and first token is sent to the first network to ask according to the first network
The transmitting terminal asked, wherein first token includes the out-of-service time of first token;
Determine the time for monitoring the transmitting terminal trigger action of the first network request;
When the trigger action for the transmitting terminal for listening to the first network request in the time, according to the trigger action
The out-of-service time of first token is adjusted, to obtain the out-of-service time after the adjustment of first token;
The second network request for carrying first token is received before the out-of-service time after adjustment, confirms institute
It is legal to state the second network request.
According to the another aspect of the application, a kind of network request security verification device is provided, described device includes:
Receiving module is configured as receiving first network request;
Sending module is configured as being requested to generate the first token according to the first network and sending first token
To the transmitting terminal of first network request, wherein first token includes the out-of-service time of first token;
Determining module is configured to determine that the time for monitoring the transmitting terminal trigger action of the first network request;
Module is adjusted, the triggering behaviour when the transmitting terminal for listening to the first network request in the time is configured as
Make, the out-of-service time of first token is adjusted according to the trigger action, to fail after obtaining the adjustment of first token
Time;
Confirmation module, is configured as receiving before the out-of-service time after adjustment and carries the of first token
Two network requests confirm that second network request is legal.
According to the another aspect of the application, a kind of computer-readable program medium is provided, computer program is stored with
Instruction makes computer execute foregoing method when the computer program instructions are computer-executed.
According to the another aspect of the application, a kind of electronic equipment is provided, the electronic equipment includes:
Processor;
Memory is stored with computer-readable instruction on the memory, and the computer-readable instruction is by the processing
When device executes, foregoing method is realized.
The technical solution that the embodiment of the present invention provides can include the following benefits:
Network request security verification method provided by the present invention includes the following steps: to receive first network request;Root
The transmitting terminal for generating the first token and first token being sent to the first network request is requested according to the first network,
Wherein, first token includes the out-of-service time of first token;Determine the transmitting terminal for monitoring the first network request
The time of trigger action;When the trigger action for the transmitting terminal for listening to the first network request in the time, according to described
Trigger action adjusts the out-of-service time of first token, to obtain the out-of-service time after the adjustment of first token;When institute
The out-of-service time receives the second network request for carrying first token before after stating adjustment, confirms second network request
It is legal.
Under the method, by for network request generate token after, according to the trigger action adjust automatically token of user
Out-of-service time realizes the dynamic optimization of the out-of-service time of token, greatly reduce due to token it is expired caused by destroy user
A possibility that experience, has taken into account the safety of token while guaranteeing user experience.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited
Invention.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and in specification together principle for explaining the present invention.
Fig. 1 is a kind of application scenarios signal of network request security verification method shown according to an exemplary embodiment
Figure;
Fig. 2 is a kind of flow chart of network request security verification method shown according to an exemplary embodiment;
Fig. 3 is the flow chart of the details of the step 220 of the embodiment shown in corresponding embodiment according to fig. 2;
Fig. 4 is the flow chart of the details of the step 230 of the embodiment shown in corresponding embodiment according to fig. 2;
Fig. 5 is the flow chart of the details of the step 240 of the embodiment shown in corresponding embodiment according to fig. 2;
Fig. 6 is the flow chart of the details of the step 240 of another embodiment shown in corresponding embodiment according to fig. 2;
Fig. 7 is a kind of block diagram of network request security verification device shown according to an exemplary embodiment;
Fig. 8 is shown according to an exemplary embodiment a kind of for realizing above-mentioned network request security verification method
Electronic equipment example block diagram;
Fig. 9 is shown according to an exemplary embodiment a kind of for realizing above-mentioned network request security verification method
Computer readable storage medium.
Specific embodiment
Here will the description is performed on the exemplary embodiment in detail, the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended
The example of device and method being described in detail in claims, some aspects of the invention are consistent.
In addition, attached drawing is only the schematic illustrations of the disclosure, it is not necessarily drawn to scale.Some sides shown in the drawings
Block diagram is functional entity, not necessarily must be corresponding with physically or logically independent entity.
The disclosure provides firstly a kind of network request security verification method.Network request can be any by net
Network sends the request established of mode of request message, can be the request based on various agreements, can be with for example, more typical
It is the request based on http protocol.The verifying of network request safety refers to whether confirmation network request meets certain safety post
Quasi- or requirement, compared with invalidated network request, the safety by the network request of security verification is higher, that is, passes through
A possibility that network request for having crossed security verification is non-method network request is lower, so the security verification of network request is
Judge a whether legal important link of network request.The implementation terminal of the disclosure can be it is any have operation, processing with
And the equipment of communication function, it can be portable mobile equipment, such as smart phone, tablet computer, laptop etc., it can also be with
It is various fixed apparatus, for example, computer equipment, on-site terminal, desktop computer, server, work station etc..
Fig. 1 is a kind of application scenarios signal of network request security verification method shown according to an exemplary embodiment
Figure.As shown in Figure 1, including server 110, desktop computer 120 and token 130.In Fig. 1, server 110 and desktop computer
It is attached between 120 by data link, the transmitting of data can be carried out by the communication link each other.Work as desktop
After brain 120 sends request message by webpage or user end to server 110, server 110 can be according to the request message
Token 130 is returned to desktop computer 120.Token 130 has the out-of-service time, and before the out-of-service time of token 130, user can be with
Using desktop computer 120 by webpage or client etc. carried out between server 110 it is various need token 130 interact work
It is dynamic;And it can not just carry out various needing token after the out-of-service time of token 130, between desktop computer 120 and server 110
130 interacting activity, until server 110 has provided relevant token to desktop computer 120 again.Under traditional approach, enable
The out-of-service time of board is fixed, the inventors have recognized that, at least using fixed this scheme of token out-of-service time
There is following defect: the continuous interbehavior of user can be interrupted using the too short or not reasonable token out-of-service time, influences
User experience, and the safety of token can be reduced using the too long token out-of-service time.
Fig. 2 is a kind of flow chart of network request security verification method shown according to an exemplary embodiment.Such as Fig. 2
It is shown, comprising the following steps:
Step 210, first network request is received.
The network that network request can be the various internet protocol-baseds established by way of sending request message is asked
It asks, for example, can be the network request based on http protocol.
In one embodiment, first network request is generated using POST the GET method under http protocol.
In one embodiment, local terminal is the intended recipient end of the first network request, i.e., local terminal is according to described first
The transmitting terminal that network request is requested to the first network returns to corresponding response.
In one embodiment, the target terminal except local terminal is the intended recipient end of first network request, the mesh
Mark terminal is used to that the transmitting terminal requested to the first network to be requested to return to corresponding response according to the first network, and local terminal is used
In generating token and passing through the safety of token authentication network request, the first network request that local terminal receives is the target
Receiving end is forwarded to local terminal after receiving the first network request.
In one embodiment, after receiving first network request, the method also includes: determine the first network
It is legal to request.
In one embodiment, local terminal has sign-on ID library, and first network request is directly to be sent to this by request end
End, each terminal will carry out registering to local terminal and the terminal of registering the request before sending network request to local terminal
Mark is saved into the sign-on ID library, is included request header in the first network request, is included request end in request header
Mark, the determination first network request legal to include: request end in the request header for obtain the first network request
Mark;In the case where the mark is present in sign-on ID library, determine that the first network request is legal.
Step 220, it requests to generate the first token according to the first network and first token is sent to described the
The transmitting terminal of one network request.
Wherein, first token includes the out-of-service time of first token.
Token is the character string for verifying network request legitimacy.
In one embodiment, the format of the out-of-service time of first token is preset time format, such as can be with
It is 2019/2/15/18:00.
In one embodiment, the format of the out-of-service time of first token is timestamp.
In one embodiment, the first network request includes uniform resource locator, system parameter and service parameter,
First token is by using hash algorithm to uniform resource locator (URL, Uniform Resource Locator)
And system parameter and service parameter carry out what Hash operation obtained.Wherein, uniform resource locator is that the first network is asked
The address of requested access to resource is asked, system parameter is the parameter of identification request end identity, for example can be request end
System banner, the address (Media Access Control Address) MAC of request end or the IP address of request end
(Internet Protocol Address, internet protocol address) etc., service parameter are the marks for initiating to request used business
Know, such as can be the title that user initiates the title for requesting called interface or the ingress for service used, hash algorithm
It can be a plurality of types of algorithms, for example can be SHA256, MD5 scheduling algorithm.
In one embodiment, the character string formed is connected to by uniform resource locator, system parameter and service parameter
It carries out Hash operation and obtains the abstract of the character string;By the timestamp of the abstract and the out-of-service time for representing first token
The character string of composition is as the first token.
In one embodiment, respectively to each character string in uniform resource locator, system parameter and service parameter
It carries out Hash operation and obtains the abstract of each character string, by the abstract of each character string and when representing the failure of first token
Between timestamp constitute character string as the first token.
In one embodiment, the first network request includes the register account number of requesting party, described according to described first
It includes: to be carried out using register account number of the hash algorithm to requesting party in first network request that network request, which generates the first token,
Hash operation obtains the abstract of register account number;Using the character string of preset token out-of-service time and the abstract composition as first
Token.
In one embodiment, the first network request includes the register account number of requesting party, and requesting party is sending network
Before request, pass through registering and as requesting party's generation register account number to local terminal submission identity information completion account, wherein generate
Register account number it is corresponding with the identity information of submission be stored in local terminal, it is described to be requested to generate the first token according to the first network
It include: the register account number for obtaining the requesting party for including in the first network request;Obtain body corresponding with the register account number
Part information;Hash operation is carried out to the identity information using hash algorithm and obtains the abstract of the identity information;It will be preset
The character string of token out-of-service time and the abstract composition is as the first token.
In one embodiment, the first network request includes the register account number of requesting party, described according to described first
It includes: to generate random string, and by described first in response to receiving first network request that network request, which generates the first token,
The register account number of requesting party is corresponding with the random string in network request is stored in local;Using hash algorithm to it is described with
Machine character string carries out Hash operation and obtains the abstract of the random string;To represent the out-of-service time of first token when
Between stamp and it is described abstract constitute character string as the first token.Wherein, the form of random string can be multiplicity, such as
The character string that can be random-length is also possible to the character string of regular length;In addition, random string can be only comprising number
The character string of word or letter can also be while including the character string of letter and number.
It is understood that according to the first network request generate the first token concrete mode be it is diversified,
It is not limited to above-described embodiment those of to show, other first tokens can be selected based on factors such as safety in practical applications
Generating mode.
Step 230, the time for monitoring the transmitting terminal trigger action of the first network request is determined.
It determines that the time for monitoring the transmitting terminal trigger action of the first network request refers to determine when described in monitoring
The trigger action of the transmitting terminal of first network request.
It should be pointed out that monitor the time of the transmitting terminal trigger action of first network request, when described here
Between can be a time point, be also possible to a period.
In one embodiment, after determining the time for monitoring the transmitting terminal trigger action of the first network request,
The described method includes:
The trigger action of the transmitting terminal of the first network request is monitored according to the time.
Monitor the trigger action of the transmitting terminal of first network request mode can be by monitor click event or
What the modes such as person's button control carried out, specifically different listening modes can be used according to the difference of practical application.
In one embodiment, the time for monitoring the transmitting terminal trigger action of the first network request is determined, comprising: from
The transmitting terminal that first token is sent to the first network request is started, by what is obtained every preset second time period
Time of the preset first time period as the transmitting terminal trigger action for monitoring the first network request before time point,
In, the first time period is less than second time period.
For example, be 2:00 by the time that first token is sent to the transmitting terminal that the first network is requested, it is preset
First time period and second time period are 3 hours and 5 hours, then 5 hours time of first obtained and the interval 2:00 respectively
Point is 7:00, is according to the time that first that the time point obtains monitors the transmitting terminal trigger action of the first network request
4:00-7:00;Similarly, the time that second for can obtaining monitors the transmitting terminal trigger action of the first network request is 9:
00-12:00。
The advantage of this embodiment is that when first token is sent to the transmitting terminal that the first network is requested by local terminal
Afterwards, the trigger action that the transmitting terminal of first network request is monitored by section at a fixed time ensure that and monitor described the
The fairness of the trigger action of the transmitting terminal of one network request.
In one embodiment, the time for monitoring the transmitting terminal trigger action of the first network request is determined, comprising: obtain
Take the time and the out-of-service time of first token that first token is sent to the transmitting terminal of the first network request
Difference;Determine the ratio of the difference and preset time difference a reference value, the preset time difference a reference value and first
Reference period and the second reference period are corresponding, and first reference period is less than the second reference period;Obtain institute
The product of ratio Yu first reference period is stated, is the first standard time section, obtains the ratio and second benchmark
The product of period is the second standard time section;The transmitting terminal that the first network is requested is sent to from by first token
Start, by the first standard time section before the time point that the second standard time section obtains as the monitoring first network
The time of the transmitting terminal trigger action of request.The advantage of this embodiment is that by being sent to according to from by first token
From the time of the transmitting terminal of first network request until the out-of-service time of first token this period length
The time for the transmitting terminal trigger action for monitoring first network request is adaptively determined, so that described in the monitoring determined
The time of the transmitting terminal trigger action of first network request is more reasonable.
In one embodiment, the time for monitoring the transmitting terminal trigger action of the first network request is determined, comprising:
By first token be sent to time of the transmitting terminal of first network request to first token out-of-service time it
Between period be divided into the first number time interval;When will divide obtained each time interval and be divided into the second number
Between subinterval;For each time interval, the random integers for being less than or equal to the second number are obtained;For each time interval,
The time subinterval of random integers corresponding with the time interval will be ordered as in the time interval, as monitoring first net
The time of the transmitting terminal trigger action of network request.The advantage of this embodiment is that due to all including to monitor in each time interval
The time of the transmitting terminal trigger action of the first network request, it ensure that the transmitting terminal for determining and monitoring the first network request
The fairness of the time of trigger action, meanwhile, as the transmitting terminal touching for monitoring the first network request in each time interval
It is random for sending out the time subinterval of the time of operation, so that determining the transmitting terminal trigger action for monitoring the first network request
Time have certain randomness, safety can be improved.
Step 240, when the trigger action for the transmitting terminal for listening to the first network request in the time, according to described
Trigger action adjusts the out-of-service time of first token, to obtain the out-of-service time after the adjustment of first token.
In one embodiment, described when the triggering for the transmitting terminal for listening to the first network request in the time is grasped
Make, the out-of-service time of first token is adjusted according to the trigger action, to fail after obtaining the adjustment of first token
Time, comprising:
In response to listening to the trigger action of the transmitting terminal of the first network request in the time, described first is enabled
The out-of-service time backward delay preset period of board, as the out-of-service time after the adjustment of first token.
In one embodiment, in the triggering behaviour when the transmitting terminal for listening to the first network request in the time
Make, the out-of-service time of first token is adjusted according to the trigger action, to fail after obtaining the adjustment of first token
After time, the method also includes: the time of the transmitting terminal trigger action of the monitoring first network request is determined again simultaneously
The trigger action that the transmitting terminal of the first network request is monitored in the time, until the first token fails.
In one embodiment, described when the triggering for the transmitting terminal for listening to the first network request in the time is grasped
Make, the out-of-service time of first token is adjusted according to the trigger action, to fail after obtaining the adjustment of first token
Time, comprising:
It obtains and listens to the frequency of the trigger action of the transmitting terminal of the first network request in the time;According to described
The frequency of trigger action adjusts the out-of-service time of first token.
In one embodiment, the out-of-service time of first token is adjusted according to the frequency of the trigger action, comprising:
In the case where the frequency is greater than default frequency threshold value, by the out-of-service time backward delay preset first of first token
Period, as the out-of-service time after the adjustment of first token;In the case where the frequency is not more than default frequency threshold value,
By the preset second time period of out-of-service time backward delay of first token, fail after the adjustment as first token
Time, the preset second time period are less than preset first time period.
In one embodiment, the out-of-service time of first token is adjusted according to the frequency of the trigger action, comprising:
Obtain the ratio of the frequency Yu default frequency threshold value;Determine the sum of the ratio and 1;It will be described and with first token
The product of out-of-service time is as the out-of-service time after the adjustment of first token.
The advantage of this embodiment is that adaptively adjusting first token by the frequency according to the trigger action
Out-of-service time so that the out-of-service time is more able to satisfy user demand after the adjustment of first token.
Step 250, it is received before the out-of-service time after adjustment and carries the second network of first token and ask
It asks, confirms that second network request is legal.
As previously mentioned, token is the character string for verifying network request legitimacy, therefore described the is carried when receive
When the second network request of one token, if receive time of second network request after the adjustment out-of-service time it
Before, i.e., described first token does not fail, and can confirm that second network request carries effective first token, i.e., described
Second network request is legal.
In one embodiment, the of first token is carried receiving before the out-of-service time after adjustment
Two network requests, before confirming that second network request is legal, which comprises
Whether the token for determining second network request is first token;
If so, determine the time for receiving second network request whether after the adjustment before the out-of-service time,
It wherein receives the second network request for carrying first token before the out-of-service time after adjustment, confirms described the
Legal two network requests are to determine the time for receiving second network request after the adjustment before the out-of-service time
In the case of carry out.
In conclusion going out embodiment according to Fig.2, the dynamic optimization of the out-of-service time of token is realized, is substantially reduced
Due to token it is expired caused by destroy user experience a possibility that, taken into account the safety of token while guaranteeing user experience
Property, so as to improve efficiency of user when using needing the network of token to service.
Fig. 3 is the flow chart of the details of the step 220 of the embodiment shown in corresponding embodiment according to fig. 2.Such as Fig. 3 institute
Show, comprising the following steps:
Step 221, the first token undetermined is generated according to first network request.
Wherein, first token undetermined does not include the out-of-service time.
In one embodiment, it is requested in the first network request comprising uniform resource locator and the first network
Transmitting terminal identity, it is described that generate the first token undetermined according to first network request include: to by described first
The character of the identity composition of the uniform resource locator for including in network request and the transmitting terminal of first network request
String carries out Hash operation, obtains the abstract of the character string;It regard the abstract as first token undetermined.
Step 222, the type of the first network request is determined.
In one embodiment, there is type identifier in the first network request, for identifying the first network
The type of request.
Step 223, according to the out-of-service time of the type determination the first token to be generated.
In one embodiment, there is type identifier, type identifier and out-of-service time in the first network request
Correspondence is stored in mapping table, by inquiring the mapping table, the type mark having in acquisition and first network request
Know the out-of-service time for according with the corresponding out-of-service time as the first token to be generated.
Step 224, first token undetermined is added in the out-of-service time, to generate the first token, and by described the
One token is sent to the transmitting terminal of the first network request.
Embodiment illustrated in fig. 3 is advantageous in that, is determined by the difference for the type requested according to first network different
The first token out-of-service time so that for network request generate the first token it is more reasonable.
Fig. 4 is the flow chart of the details of the step 230 of the embodiment shown in corresponding embodiment according to fig. 2.Such as Fig. 4 institute
Show, step 230 the following steps are included:
Step 231, the time that first token is sent to the transmitting terminal of first network request is obtained, as the
One time.
In one embodiment, local terminal is built-in with timer, which has the sending time of each token, passes through
It reads the timer and obtains the time that first token is sent to the transmitting terminal of the first network request.
Step 232, every minor tick x minutes periods since the first time are obtained, as monitoring described first
The time of the transmitting terminal trigger action of network request.
Wherein x is positive integer.
In one embodiment, when every minor tick x minutes periods are regular lengths since the first time
Between section.For example, interval time section can be 5 minutes every time, that is, obtain the first network request in first 5 minutes every time
Whether transmitting terminal has trigger action.
In one embodiment, the length of every minor tick x minutes periods is preset since the first time
Arithmetic sequence.For example preset arithmetic sequence is 20,15,10,5, and and if the first time is 18:00, obtained prison
The time for listening the transmitting terminal trigger action of the first network request can be 18:00-18:20,18:20-18:35,18 respectively:
35-18:45 and 18:45-18:50.
It is to be determined as follows each interval time x minutes since the first time in one embodiment
: according to the out-of-service time of first token, obtain the first parameter value;Using first parameter value, determine from described the
One time started each interval time x minutes.
In one embodiment, the out-of-service time according to first token obtains the first parameter value, comprising:
The first parameter value is obtained by following expression:
Wherein, M is the out-of-service time of first token and the difference of entry-into-force time, and n is using x minutes as described in monitoring
When the time of the transmitting terminal trigger action of first network request, time of the transmitting terminal trigger action of the first network request is monitored
Number sequence, y are the first parameter value;
It is described to utilize first parameter value, it determines each since the first time interval time x minutes, packet
It includes:
Obtain be greater than the first parameter value y smallest positive integral, as minor tick every since the first time when
Between x minutes the number of minutes.
From the above embodiments, it can be seen that since coming into force the first token, monitor the hair of the first network request
The frequency of sending end trigger action is higher and higher, that is, the time interval for monitoring the transmitting terminal trigger action of the first network request is got over
Come it is shorter, so the advantage of this embodiment is that, pass through the time interval of the transmitting terminal trigger action of the certain monitoring of setting, section
The about resources such as computing cost, while by increasing the close of the transmitting terminal trigger action monitored when the first token will be expired
Degree so that user's operation to a greater extent will not be expired by token and interrupt, improve the experience of user.
Fig. 5 is the flow chart of the details of the step 240 of the embodiment shown in corresponding embodiment according to fig. 2.It is shown in Fig. 5
In embodiment out, the time for listening to the trigger action of the transmitting terminal of the first network request was the second time, such as Fig. 5 institute
Show, comprising the following steps:
Step 241, the time that first token is sent to the transmitting terminal of first network request is obtained, as the
One time.
In one embodiment, the transmitting terminal of the first network request has log, which has described first
The time for each token that the transmitting terminal of network request receives is embedded with script, the acquisition in the implementation terminal of the disclosure
First token is sent to the time of the transmitting terminal of first network request, comprising: by script from first net
The time that first token is sent to the transmitting terminal of the first network request is crawled in the log of the transmitting terminal of network request.
Step 242, the difference of the out-of-service time and the first time are determined.
Since the out-of-service time is greater than the first time, so the difference is positive.
Step 243, the sum of the difference and second time are obtained, when failing after the adjustment as first token
Between.
For example be at the first time 15:00, the time for listening to the trigger action of the transmitting terminal of first network request is
15:20, and the out-of-service time of the first token is 15:30, the out-of-service time of the first token and the difference of first time are 30 minutes, then
When listening to the trigger action of transmitting terminal of the first network request in 15:20, the out-of-service time of the first token is adjusted
For 15:20+30 minutes=15:50.
In conclusion embodiment illustrated in fig. 5 is advantageous in that, by by the out-of-service time of first token according to
The mode that the length of the effective time of first token postpones adjusts the out-of-service time of first token, so that the institute obtained
The out-of-service time can guarantee be interrupted since token is expired to a greater extent after stating the adjustment of the first token, improve
The experience of user.
Fig. 6 is the flow chart of the details of the step 240 of another embodiment shown in corresponding embodiment according to fig. 2.Such as Fig. 6 institute
Show, step 240 the following steps are included:
Step 241' obtains institute when the trigger action for the transmitting terminal for listening to the first network request in the time
State the type of trigger action.
In one embodiment, each trigger action is corresponding with a Business Name, and the Business Name of trigger action is made
For the type of the trigger action.
For example, the trigger action pair can all be obtained by listening to each trigger action of the transmitting terminal of the first network request
The Business Name answered, can be using the Business Name as the type of the trigger action.
Step 242' determines the adjustment mode of the out-of-service time of first token according to the type of the trigger action.
In one embodiment, the type of trigger action is the corresponding risk class of each trigger action, described according to institute
The type for stating trigger action determines the adjustment mode of the out-of-service time of first token, comprising:
Using the following formula established based on the corresponding risk class of the trigger action as the failure of first token
The adjustment mode of time:
Wherein, α is the out-of-service time after adjustment, and β is the out-of-service time, when M is the out-of-service time of first token and comes into force
Between difference, γ is risk class.It can be seen that risk class γ is higher, the out-of-service time, α was smaller after adjustment, that is, after adjusting
Out-of-service time is more early.For example, being related to financial client end, transferring accounts, Modify password, change the types trigger actions such as binding cell-phone number
Risk class can be 3 grades, and the risk class for being related to inquiring the trigger actions such as Flow Record, querying individual information is 2 grades, be related to
Browsing new information and the risk class for checking news are 1 grade, then compared with the lower trigger action of risk class, risk class is more
High trigger action is smaller to the corrective action of first token, i.e. the risk class of trigger action is higher, even if described
The out-of-service time of one token have passed through delay, and since its final delay length is shorter, safety can be improved.
The advantage of this embodiment is that using different failures by the difference of the type according to the trigger action listened to
Time adjustment mode enables trigger action that the out-of-service time of the first token is enable to reduce high-risk grade while delay
The length of out-of-service time that is able to extend of trigger action, reducing the token out-of-service time to a certain extent extends bring wind
Danger.
Step 243' adjusts the out-of-service time of first token according to the adjustment mode, is enabled with obtaining described first
Out-of-service time after the adjustment of board.
In conclusion it is shown in Fig. 6 go out embodiment in, used by the difference according to the type of trigger action different
Out-of-service time adjustment mode adjusts out-of-service time of first token, so that lose after the adjustment of first token obtained
Imitate that the time is more reasonable, improve the trigger action of out-of-service time and user after the adjustment of first token suits degree.
The disclosure additionally provides a kind of network request security verification device, is the device of the invention embodiment below.
Fig. 7 is a kind of block diagram of network request security verification device shown according to an exemplary embodiment.Such as Fig. 7 institute
Show, which includes:
Receiving module 710 is configured as receiving first network request.
Sending module 720 is configured as being requested to generate the first token and by first token according to the first network
It is sent to the transmitting terminal of the first network request, wherein first token includes the out-of-service time of first token.
Determining module 730 is configured to determine that the time for monitoring the transmitting terminal trigger action of the first network request.
Module 740 is adjusted, the triggering when the transmitting terminal for listening to the first network request in the time is configured as
Operation, the out-of-service time of first token is adjusted according to the trigger action, to lose after obtaining the adjustment of first token
Imitate time
Confirmation module 750 is configured as receiving carrying first token before the out-of-service time after adjustment
The second network request, confirm that second network request is legal.
According to the third aspect of the disclosure, a kind of electronic equipment that can be realized the above method is additionally provided.
Person of ordinary skill in the field it is understood that various aspects of the invention can be implemented as system, method or
Program product.Therefore, various aspects of the invention can be embodied in the following forms, it may be assumed that complete hardware embodiment, complete
The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here
Referred to as circuit, " module " or " system ".
The electronic equipment 800 of this embodiment according to the present invention is described referring to Fig. 8.The electronics that Fig. 8 is shown
Equipment 800 is only an example, should not function to the embodiment of the present invention and use scope bring any restrictions.
As shown in figure 8, electronic equipment 800 is showed in the form of universal computing device.The component of electronic equipment 800 can wrap
It includes but is not limited to: at least one above-mentioned processing unit 810, at least one above-mentioned storage unit 820, the different system components of connection
The bus 830 of (including storage unit 820 and processing unit 810).
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 810
Row, so that various according to the present invention described in the execution of the processing unit 810 above-mentioned " embodiment method " part of this specification
The step of illustrative embodiments.
Storage unit 820 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit
(RAM) 821 and/or cache memory unit 822, it can further include read-only memory unit (ROM) 823.
Storage unit 820 can also include program/utility 824 with one group of (at least one) program module 825,
Such program module 825 includes but is not limited to: operating system, one or more application program, other program modules and
It may include the realization of network environment in program data, each of these examples or certain combination.
Bus 830 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage
Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures
Local bus.
Electronic equipment 800 can also be with one or more external equipments 1000 (such as keyboard, sensing equipment, bluetooth equipment
Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 800 communicate, and/or with make
Any equipment (such as the router, modulation /demodulation that the electronic equipment 800 can be communicated with one or more of the other calculating equipment
Device etc.) communication.This communication can be carried out by input/output (I/O) interface 850.Also, electronic equipment 800 can be with
By network adapter 860 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network,
Such as internet) communication.As shown, network adapter 860 is communicated by bus 830 with other modules of electronic equipment 800.
It should be understood that although not shown in the drawings, other hardware and/or software module can not used in conjunction with electronic equipment 800, including but not
Be limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and
Data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented
Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure
The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one
Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating
Equipment (can be personal computer, server, terminal installation or network equipment etc.) is executed according to disclosure embodiment
Method.
According to the fourth aspect of the disclosure, a kind of computer readable storage medium is additionally provided, being stored thereon with can be real
The program product of existing this specification above method.In some possible embodiments, various aspects of the invention can also be real
It is now a kind of form of program product comprising program code, when described program product is run on the terminal device, the journey
Sequence code is each according to the present invention described in above-mentioned " illustrative methods " part of this specification for executing the terminal device
The step of kind illustrative embodiments.
Refering to what is shown in Fig. 9, describing the program product for realizing the above method of embodiment according to the present invention
900, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device,
Such as it is run on PC.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing can be with
To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or
It is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter
Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or
System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive
List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only
Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory
(CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
In carry readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal,
Optical signal or above-mentioned any appropriate combination.Readable signal medium can also be any readable Jie other than readable storage medium storing program for executing
Matter, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or and its
The program of combined use.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have
Line, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages
Code, described program design language include object oriented program language-Java, C++ etc., further include conventional
Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user
It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating
Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far
Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network
(WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP
To be connected by internet).
In addition, above-mentioned attached drawing is only the schematic theory of processing included by method according to an exemplary embodiment of the present invention
It is bright, rather than limit purpose.It can be readily appreciated that the time that above-mentioned processing shown in the drawings did not indicated or limited these processing is suitable
Sequence.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and
And various modifications and change can executed without departing from the scope.The scope of the present invention is limited only by the attached claims.
Claims (10)
1. a kind of network request security verification method, which is characterized in that the described method includes:
Receive first network request;
It requests to generate the first token according to the first network and first token is sent to the first network request
Transmitting terminal, wherein first token includes the out-of-service time of first token;
Determine the time for monitoring the transmitting terminal trigger action of the first network request;
When the trigger action for the transmitting terminal for listening to the first network request in the time, adjusted according to the trigger action
The out-of-service time of first token, to obtain the out-of-service time after the adjustment of first token;
It receives the second network request for carrying first token before the out-of-service time after adjustment, confirms described the
Two network requests are legal.
2. the method according to claim 1, wherein described request to generate the first token according to the first network
And first token is sent to the transmitting terminal of the first network request, comprising:
The first token undetermined is generated according to first network request, wherein first token undetermined does not include the out-of-service time;
Determine the type of the first network request;
According to the out-of-service time of the type determination the first token to be generated;
First token undetermined is added in the out-of-service time, to generate the first token, and first token is sent to
The transmitting terminal of the first network request.
3. the method according to claim 1, wherein the determining transmitting terminal for monitoring the first network request
The time of trigger action, comprising:
The time that first token is sent to the transmitting terminal of the first network request is obtained, as at the first time;
Every minor tick x minutes periods since the first time are obtained, as the hair for monitoring the first network request
The time of sending end trigger action, wherein x is positive integer.
4. according to the method described in claim 3, it is characterized in that, each interval time x points since the first time
Clock is determined as follows:
According to the out-of-service time of first token, the first parameter value is obtained;
Using first parameter value, determine each since the first time interval time x minutes.
5. according to the method described in claim 4, it is characterized in that, the out-of-service time according to first token, obtains
First parameter value, comprising:
The first parameter value is obtained by following expression:
Wherein, M is the out-of-service time of first token and the difference of entry-into-force time, and n is using x minutes as monitoring described first
When the time of the transmitting terminal trigger action of network request, the number row of the transmitting terminal trigger action of the first network request is monitored
Sequence, y are the first parameter value;
It is described to utilize first parameter value, it determines each since the first time interval time x minutes, comprising:
The smallest positive integral for being greater than the first parameter value y is obtained, as interval time x each since the first time points
The number of minutes of clock.
6. the method according to claim 1, wherein listening to the triggering of the transmitting terminal of the first network request
The time of operation was the second time, described when the triggering for the transmitting terminal for listening to the first network request in the time is grasped
Make, the out-of-service time of first token is adjusted according to the trigger action, to fail after obtaining the adjustment of first token
Time, comprising:
The time that first token is sent to the transmitting terminal of the first network request is obtained, as at the first time;
Determine the difference of the out-of-service time and the first time;
The sum of the difference and second time are obtained, as the out-of-service time after the adjustment of first token.
7. the method according to claim 1, wherein described ask when listening to the first network in the time
The trigger action for the transmitting terminal asked adjusts the out-of-service time of first token according to the trigger action, to obtain described
Out-of-service time after the adjustment of one token, comprising:
When the trigger action for the transmitting terminal for listening to the first network request in the time, the class of the trigger action is obtained
Type;
According to the type of the trigger action, the adjustment mode of the out-of-service time of first token is determined;
According to the adjustment mode, the out-of-service time of first token is adjusted, to lose after obtaining the adjustment of first token
Imitate the time.
8. a kind of network request security verification device, which is characterized in that described device includes:
Receiving module is configured as receiving first network request;
Sending module is configured as requesting to generate the first token according to the first network and first token is sent to institute
State the transmitting terminal of first network request, wherein first token includes the out-of-service time of first token;
Determining module is configured to determine that the time for monitoring the transmitting terminal trigger action of the first network request;
Module is adjusted, the trigger action when the transmitting terminal for listening to the first network request in the time, root are configured as
The out-of-service time of first token is adjusted, according to the trigger action to obtain the out-of-service time after the adjustment of first token;
Confirmation module is configured as receiving the second net for carrying first token before the out-of-service time after adjustment
Network request confirms that second network request is legal.
9. a kind of computer-readable program medium, which is characterized in that it is stored with computer program instructions, when the computer journey
When sequence instruction is computer-executed, computer is made to execute method according to any one of claim 1 to 7.
10. a kind of electronic equipment, which is characterized in that the electronic equipment includes:
Processor;
Memory is stored with computer-readable instruction on the memory, and the computer-readable instruction is held by the processor
When row, method as described in any one of claim 1 to 7 is realized.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910630624.4A CN110445615B (en) | 2019-07-12 | 2019-07-12 | Network request security verification method, device, medium and electronic equipment |
PCT/CN2019/117695 WO2021008034A1 (en) | 2019-07-12 | 2019-11-12 | Method and apparatus for network request security verification, and computing device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910630624.4A CN110445615B (en) | 2019-07-12 | 2019-07-12 | Network request security verification method, device, medium and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110445615A true CN110445615A (en) | 2019-11-12 |
CN110445615B CN110445615B (en) | 2021-08-31 |
Family
ID=68429656
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910630624.4A Active CN110445615B (en) | 2019-07-12 | 2019-07-12 | Network request security verification method, device, medium and electronic equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110445615B (en) |
WO (1) | WO2021008034A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112003852A (en) * | 2020-08-19 | 2020-11-27 | 中国建设银行股份有限公司 | Resource access control method, device, equipment and storage medium |
CN113656774A (en) * | 2021-08-17 | 2021-11-16 | 维沃移动通信(杭州)有限公司 | Unlocking method and unlocking device of electronic equipment |
WO2022121461A1 (en) * | 2020-12-10 | 2022-06-16 | 苏州浪潮智能科技有限公司 | Method, apparatus and device for constructing token for cloud platform resource access control |
WO2022121221A1 (en) * | 2020-12-10 | 2022-06-16 | 平安科技(深圳)有限公司 | Token-based application access method and apparatus, computer device, and medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113179191A (en) * | 2021-04-01 | 2021-07-27 | 众安信息技术服务有限公司 | Network performance monitoring method and device and electronic equipment |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120290517A1 (en) * | 2011-05-11 | 2012-11-15 | Affectivon Ltd. | Predictor of affective response baseline values |
CN103634316A (en) * | 2013-11-26 | 2014-03-12 | 乐视网信息技术(北京)股份有限公司 | Account login method and electronic equipment |
CN104239772A (en) * | 2014-08-25 | 2014-12-24 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN104901933A (en) * | 2014-08-12 | 2015-09-09 | 腾讯科技(深圳)有限公司 | Traffic permit allocation method and device, user equipment, application server and system |
CN107425977A (en) * | 2017-04-28 | 2017-12-01 | 北京海泰方圆科技股份有限公司 | Dynamic token method for synchronizing time and device |
US20180115544A1 (en) * | 2014-07-28 | 2018-04-26 | International Business Machines Corporation | Protecting Network Communication Security |
CN108900559A (en) * | 2018-09-26 | 2018-11-27 | 平安普惠企业管理有限公司 | Management method, device, computer equipment and the storage medium of logging on authentication |
CN109379193A (en) * | 2018-12-06 | 2019-02-22 | 佛山科学技术学院 | A kind of dynamic anti-replay-attack authentication method and device |
US20190116051A1 (en) * | 2017-10-13 | 2019-04-18 | Intensity Analytics Corporation | System and method for effort-based user authentication |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106411825A (en) * | 2015-08-03 | 2017-02-15 | 天脉聚源(北京)科技有限公司 | WeChat access token acquisition method and system thereof |
US10505946B2 (en) * | 2016-11-15 | 2019-12-10 | Vmware, Inc. | Adaptive token cache management |
CN109802941A (en) * | 2018-12-14 | 2019-05-24 | 平安科技(深圳)有限公司 | A kind of login validation method, device, storage medium and server |
-
2019
- 2019-07-12 CN CN201910630624.4A patent/CN110445615B/en active Active
- 2019-11-12 WO PCT/CN2019/117695 patent/WO2021008034A1/en active Application Filing
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120290517A1 (en) * | 2011-05-11 | 2012-11-15 | Affectivon Ltd. | Predictor of affective response baseline values |
CN103634316A (en) * | 2013-11-26 | 2014-03-12 | 乐视网信息技术(北京)股份有限公司 | Account login method and electronic equipment |
US20180115544A1 (en) * | 2014-07-28 | 2018-04-26 | International Business Machines Corporation | Protecting Network Communication Security |
CN104901933A (en) * | 2014-08-12 | 2015-09-09 | 腾讯科技(深圳)有限公司 | Traffic permit allocation method and device, user equipment, application server and system |
CN104239772A (en) * | 2014-08-25 | 2014-12-24 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN107425977A (en) * | 2017-04-28 | 2017-12-01 | 北京海泰方圆科技股份有限公司 | Dynamic token method for synchronizing time and device |
US20190116051A1 (en) * | 2017-10-13 | 2019-04-18 | Intensity Analytics Corporation | System and method for effort-based user authentication |
CN108900559A (en) * | 2018-09-26 | 2018-11-27 | 平安普惠企业管理有限公司 | Management method, device, computer equipment and the storage medium of logging on authentication |
CN109379193A (en) * | 2018-12-06 | 2019-02-22 | 佛山科学技术学院 | A kind of dynamic anti-replay-attack authentication method and device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112003852A (en) * | 2020-08-19 | 2020-11-27 | 中国建设银行股份有限公司 | Resource access control method, device, equipment and storage medium |
CN112003852B (en) * | 2020-08-19 | 2022-11-25 | 中国建设银行股份有限公司 | Resource access control method, device, equipment and storage medium |
WO2022121461A1 (en) * | 2020-12-10 | 2022-06-16 | 苏州浪潮智能科技有限公司 | Method, apparatus and device for constructing token for cloud platform resource access control |
WO2022121221A1 (en) * | 2020-12-10 | 2022-06-16 | 平安科技(深圳)有限公司 | Token-based application access method and apparatus, computer device, and medium |
CN113656774A (en) * | 2021-08-17 | 2021-11-16 | 维沃移动通信(杭州)有限公司 | Unlocking method and unlocking device of electronic equipment |
CN113656774B (en) * | 2021-08-17 | 2024-06-21 | 维沃移动通信(杭州)有限公司 | Unlocking method and unlocking device of electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110445615B (en) | 2021-08-31 |
WO2021008034A1 (en) | 2021-01-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110445615A (en) | Network request security verification method, device, medium and electronic equipment | |
EP3484125B1 (en) | Method and device for scheduling interface of hybrid cloud | |
EP3044987A1 (en) | Method and system for verifying an account operation | |
CN112491776B (en) | Security authentication method and related equipment | |
CN102238007A (en) | Method, device and system for acquiring session token of user by third-party application | |
WO2014082555A1 (en) | Login method, device and open platform system | |
CN105025041A (en) | File upload method, file upload apparatus and system | |
WO2018018697A1 (en) | Method and system for identifying spam message from false base station | |
CN102404392A (en) | Integration type registering method for web application or website | |
EP2839401A1 (en) | Secure password-based authentication for cloud computing services | |
CN105991518B (en) | Network access verifying method and device | |
JP2011215753A (en) | Authentication system and authentication method | |
CN105871822A (en) | B/C/S blending mode based single sign-on system development model | |
CN111049946A (en) | Portal authentication method, Portal authentication system, electronic equipment and storage medium | |
CN113038396A (en) | Scheduling method, device and equipment of short message channel and storage medium | |
CN107911383A (en) | A kind of cryptographic check method and apparatus | |
CN105429934B (en) | Method and apparatus, readable storage medium storing program for executing, the terminal of HTTPS connectivity verification | |
CN109495458A (en) | A kind of method, system and the associated component of data transmission | |
JP5383923B1 (en) | Information processing apparatus, information processing system, information processing method, and program | |
CN104301285B (en) | Login method for web system | |
CN110022327A (en) | A kind of short message certification test method and device | |
CN112910643B (en) | Method and device for generating random number in block chain | |
CN104734934A (en) | Method, device and system for paying attention to public account | |
CN110248326A (en) | A kind of data processing method and its device | |
CN112333134A (en) | Cryptographically secure dynamic third party resources |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 201, room 518000, building A, No. 1, front Bay Road, Qianhai Shenzhen Guangdong Shenzhen Hong Kong cooperation zone (Qianhai business secretary) Applicant after: Pingan Pu Hui Enterprise Management Co., Ltd. Address before: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A Applicant before: Pingan Pu Hui Enterprise Management Co., Ltd. |
|
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |