CN110445615A - Network request security verification method, device, medium and electronic equipment - Google Patents

Network request security verification method, device, medium and electronic equipment Download PDF

Info

Publication number
CN110445615A
CN110445615A CN201910630624.4A CN201910630624A CN110445615A CN 110445615 A CN110445615 A CN 110445615A CN 201910630624 A CN201910630624 A CN 201910630624A CN 110445615 A CN110445615 A CN 110445615A
Authority
CN
China
Prior art keywords
token
time
network request
transmitting terminal
trigger action
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910630624.4A
Other languages
Chinese (zh)
Other versions
CN110445615B (en
Inventor
颜媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201910630624.4A priority Critical patent/CN110445615B/en
Priority to PCT/CN2019/117695 priority patent/WO2021008034A1/en
Publication of CN110445615A publication Critical patent/CN110445615A/en
Application granted granted Critical
Publication of CN110445615B publication Critical patent/CN110445615B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to Network Monitoring Technology field, a kind of network request security verification method, device, medium and electronic equipment are disclosed, this method comprises: receiving first network request;The transmitting terminal for generating the first token and the first token being sent to first network request is requested according to first network, wherein the first token includes the out-of-service time;Determine the time for monitoring the transmitting terminal trigger action of first network request;When the trigger action for the transmitting terminal for listening to first network request in the time, the out-of-service time of the first token is adjusted according to trigger action, obtains the out-of-service time after the adjustment of the first token;The second network request for carrying the first token is received before the out-of-service time after the adjustment, the second network request of confirmation is legal.Under the method, by adjusting the out-of-service time of token according to the trigger action of user, realizing the dynamic optimization of token out-of-service time, the safety of token has been taken into account while guaranteeing user experience after generating token for network request.

Description

Network request security verification method, device, medium and electronic equipment
Technical field
The present invention relates to Network Monitoring Technology field, in particular to a kind of network request security verification method, device, Jie Matter and electronic equipment.
Background technique
With the arrival of Internet era, the various technologies including network protocol, which provide safety for network communication, to be had The environment of sequence enables people freely to roam in the ocean of network, and token (token) is exactly the one of the information security epoch Item important technology.Token has certain timeliness as the token in authentication.Big multi-client or App make at present It is user login services device or when to server end submission form with process, server can return to one to client or App Token, when the request that user logs on or client or App are submitted when submission form can carry the token, server end Judge whether the request of user is legal according to token.
In the realization of the prior art, in order to guarantee the effect of token, all can be set for token certain term of validity, After token is expired, user submits request that will verify identity again, and client or App may be used in user at this time, The experience of user is thus destroyed, but if in order to guarantee that user experience, can without exception by the term of validity extension of token Reduce the safety of token.Therefore the prior art can not combine user experience and the safety of token.
Summary of the invention
Token present in the relevant technologies is expired to destroy user experience in order to solve, and eventually lead to user and use network The low technical problem of efficiency of service, the present invention provides a kind of network request security verification method, device, medium and electronics Equipment.
According to the one side of the application, a kind of network request security verification method is provided, which comprises
Receive first network request;
It requests to generate the first token and first token is sent to the first network to ask according to the first network The transmitting terminal asked, wherein first token includes the out-of-service time of first token;
Determine the time for monitoring the transmitting terminal trigger action of the first network request;
When the trigger action for the transmitting terminal for listening to the first network request in the time, according to the trigger action The out-of-service time of first token is adjusted, to obtain the out-of-service time after the adjustment of first token;
The second network request for carrying first token is received before the out-of-service time after adjustment, confirms institute It is legal to state the second network request.
According to the another aspect of the application, a kind of network request security verification device is provided, described device includes:
Receiving module is configured as receiving first network request;
Sending module is configured as being requested to generate the first token according to the first network and sending first token To the transmitting terminal of first network request, wherein first token includes the out-of-service time of first token;
Determining module is configured to determine that the time for monitoring the transmitting terminal trigger action of the first network request;
Module is adjusted, the triggering behaviour when the transmitting terminal for listening to the first network request in the time is configured as Make, the out-of-service time of first token is adjusted according to the trigger action, to fail after obtaining the adjustment of first token Time;
Confirmation module, is configured as receiving before the out-of-service time after adjustment and carries the of first token Two network requests confirm that second network request is legal.
According to the another aspect of the application, a kind of computer-readable program medium is provided, computer program is stored with Instruction makes computer execute foregoing method when the computer program instructions are computer-executed.
According to the another aspect of the application, a kind of electronic equipment is provided, the electronic equipment includes:
Processor;
Memory is stored with computer-readable instruction on the memory, and the computer-readable instruction is by the processing When device executes, foregoing method is realized.
The technical solution that the embodiment of the present invention provides can include the following benefits:
Network request security verification method provided by the present invention includes the following steps: to receive first network request;Root The transmitting terminal for generating the first token and first token being sent to the first network request is requested according to the first network, Wherein, first token includes the out-of-service time of first token;Determine the transmitting terminal for monitoring the first network request The time of trigger action;When the trigger action for the transmitting terminal for listening to the first network request in the time, according to described Trigger action adjusts the out-of-service time of first token, to obtain the out-of-service time after the adjustment of first token;When institute The out-of-service time receives the second network request for carrying first token before after stating adjustment, confirms second network request It is legal.
Under the method, by for network request generate token after, according to the trigger action adjust automatically token of user Out-of-service time realizes the dynamic optimization of the out-of-service time of token, greatly reduce due to token it is expired caused by destroy user A possibility that experience, has taken into account the safety of token while guaranteeing user experience.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited Invention.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and in specification together principle for explaining the present invention.
Fig. 1 is a kind of application scenarios signal of network request security verification method shown according to an exemplary embodiment Figure;
Fig. 2 is a kind of flow chart of network request security verification method shown according to an exemplary embodiment;
Fig. 3 is the flow chart of the details of the step 220 of the embodiment shown in corresponding embodiment according to fig. 2;
Fig. 4 is the flow chart of the details of the step 230 of the embodiment shown in corresponding embodiment according to fig. 2;
Fig. 5 is the flow chart of the details of the step 240 of the embodiment shown in corresponding embodiment according to fig. 2;
Fig. 6 is the flow chart of the details of the step 240 of another embodiment shown in corresponding embodiment according to fig. 2;
Fig. 7 is a kind of block diagram of network request security verification device shown according to an exemplary embodiment;
Fig. 8 is shown according to an exemplary embodiment a kind of for realizing above-mentioned network request security verification method Electronic equipment example block diagram;
Fig. 9 is shown according to an exemplary embodiment a kind of for realizing above-mentioned network request security verification method Computer readable storage medium.
Specific embodiment
Here will the description is performed on the exemplary embodiment in detail, the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
In addition, attached drawing is only the schematic illustrations of the disclosure, it is not necessarily drawn to scale.Some sides shown in the drawings Block diagram is functional entity, not necessarily must be corresponding with physically or logically independent entity.
The disclosure provides firstly a kind of network request security verification method.Network request can be any by net Network sends the request established of mode of request message, can be the request based on various agreements, can be with for example, more typical It is the request based on http protocol.The verifying of network request safety refers to whether confirmation network request meets certain safety post Quasi- or requirement, compared with invalidated network request, the safety by the network request of security verification is higher, that is, passes through A possibility that network request for having crossed security verification is non-method network request is lower, so the security verification of network request is Judge a whether legal important link of network request.The implementation terminal of the disclosure can be it is any have operation, processing with And the equipment of communication function, it can be portable mobile equipment, such as smart phone, tablet computer, laptop etc., it can also be with It is various fixed apparatus, for example, computer equipment, on-site terminal, desktop computer, server, work station etc..
Fig. 1 is a kind of application scenarios signal of network request security verification method shown according to an exemplary embodiment Figure.As shown in Figure 1, including server 110, desktop computer 120 and token 130.In Fig. 1, server 110 and desktop computer It is attached between 120 by data link, the transmitting of data can be carried out by the communication link each other.Work as desktop After brain 120 sends request message by webpage or user end to server 110, server 110 can be according to the request message Token 130 is returned to desktop computer 120.Token 130 has the out-of-service time, and before the out-of-service time of token 130, user can be with Using desktop computer 120 by webpage or client etc. carried out between server 110 it is various need token 130 interact work It is dynamic;And it can not just carry out various needing token after the out-of-service time of token 130, between desktop computer 120 and server 110 130 interacting activity, until server 110 has provided relevant token to desktop computer 120 again.Under traditional approach, enable The out-of-service time of board is fixed, the inventors have recognized that, at least using fixed this scheme of token out-of-service time There is following defect: the continuous interbehavior of user can be interrupted using the too short or not reasonable token out-of-service time, influences User experience, and the safety of token can be reduced using the too long token out-of-service time.
Fig. 2 is a kind of flow chart of network request security verification method shown according to an exemplary embodiment.Such as Fig. 2 It is shown, comprising the following steps:
Step 210, first network request is received.
The network that network request can be the various internet protocol-baseds established by way of sending request message is asked It asks, for example, can be the network request based on http protocol.
In one embodiment, first network request is generated using POST the GET method under http protocol.
In one embodiment, local terminal is the intended recipient end of the first network request, i.e., local terminal is according to described first The transmitting terminal that network request is requested to the first network returns to corresponding response.
In one embodiment, the target terminal except local terminal is the intended recipient end of first network request, the mesh Mark terminal is used to that the transmitting terminal requested to the first network to be requested to return to corresponding response according to the first network, and local terminal is used In generating token and passing through the safety of token authentication network request, the first network request that local terminal receives is the target Receiving end is forwarded to local terminal after receiving the first network request.
In one embodiment, after receiving first network request, the method also includes: determine the first network It is legal to request.
In one embodiment, local terminal has sign-on ID library, and first network request is directly to be sent to this by request end End, each terminal will carry out registering to local terminal and the terminal of registering the request before sending network request to local terminal Mark is saved into the sign-on ID library, is included request header in the first network request, is included request end in request header Mark, the determination first network request legal to include: request end in the request header for obtain the first network request Mark;In the case where the mark is present in sign-on ID library, determine that the first network request is legal.
Step 220, it requests to generate the first token according to the first network and first token is sent to described the The transmitting terminal of one network request.
Wherein, first token includes the out-of-service time of first token.
Token is the character string for verifying network request legitimacy.
In one embodiment, the format of the out-of-service time of first token is preset time format, such as can be with It is 2019/2/15/18:00.
In one embodiment, the format of the out-of-service time of first token is timestamp.
In one embodiment, the first network request includes uniform resource locator, system parameter and service parameter, First token is by using hash algorithm to uniform resource locator (URL, Uniform Resource Locator) And system parameter and service parameter carry out what Hash operation obtained.Wherein, uniform resource locator is that the first network is asked The address of requested access to resource is asked, system parameter is the parameter of identification request end identity, for example can be request end System banner, the address (Media Access Control Address) MAC of request end or the IP address of request end (Internet Protocol Address, internet protocol address) etc., service parameter are the marks for initiating to request used business Know, such as can be the title that user initiates the title for requesting called interface or the ingress for service used, hash algorithm It can be a plurality of types of algorithms, for example can be SHA256, MD5 scheduling algorithm.
In one embodiment, the character string formed is connected to by uniform resource locator, system parameter and service parameter It carries out Hash operation and obtains the abstract of the character string;By the timestamp of the abstract and the out-of-service time for representing first token The character string of composition is as the first token.
In one embodiment, respectively to each character string in uniform resource locator, system parameter and service parameter It carries out Hash operation and obtains the abstract of each character string, by the abstract of each character string and when representing the failure of first token Between timestamp constitute character string as the first token.
In one embodiment, the first network request includes the register account number of requesting party, described according to described first It includes: to be carried out using register account number of the hash algorithm to requesting party in first network request that network request, which generates the first token, Hash operation obtains the abstract of register account number;Using the character string of preset token out-of-service time and the abstract composition as first Token.
In one embodiment, the first network request includes the register account number of requesting party, and requesting party is sending network Before request, pass through registering and as requesting party's generation register account number to local terminal submission identity information completion account, wherein generate Register account number it is corresponding with the identity information of submission be stored in local terminal, it is described to be requested to generate the first token according to the first network It include: the register account number for obtaining the requesting party for including in the first network request;Obtain body corresponding with the register account number Part information;Hash operation is carried out to the identity information using hash algorithm and obtains the abstract of the identity information;It will be preset The character string of token out-of-service time and the abstract composition is as the first token.
In one embodiment, the first network request includes the register account number of requesting party, described according to described first It includes: to generate random string, and by described first in response to receiving first network request that network request, which generates the first token, The register account number of requesting party is corresponding with the random string in network request is stored in local;Using hash algorithm to it is described with Machine character string carries out Hash operation and obtains the abstract of the random string;To represent the out-of-service time of first token when Between stamp and it is described abstract constitute character string as the first token.Wherein, the form of random string can be multiplicity, such as The character string that can be random-length is also possible to the character string of regular length;In addition, random string can be only comprising number The character string of word or letter can also be while including the character string of letter and number.
It is understood that according to the first network request generate the first token concrete mode be it is diversified, It is not limited to above-described embodiment those of to show, other first tokens can be selected based on factors such as safety in practical applications Generating mode.
Step 230, the time for monitoring the transmitting terminal trigger action of the first network request is determined.
It determines that the time for monitoring the transmitting terminal trigger action of the first network request refers to determine when described in monitoring The trigger action of the transmitting terminal of first network request.
It should be pointed out that monitor the time of the transmitting terminal trigger action of first network request, when described here Between can be a time point, be also possible to a period.
In one embodiment, after determining the time for monitoring the transmitting terminal trigger action of the first network request, The described method includes:
The trigger action of the transmitting terminal of the first network request is monitored according to the time.
Monitor the trigger action of the transmitting terminal of first network request mode can be by monitor click event or What the modes such as person's button control carried out, specifically different listening modes can be used according to the difference of practical application.
In one embodiment, the time for monitoring the transmitting terminal trigger action of the first network request is determined, comprising: from The transmitting terminal that first token is sent to the first network request is started, by what is obtained every preset second time period Time of the preset first time period as the transmitting terminal trigger action for monitoring the first network request before time point, In, the first time period is less than second time period.
For example, be 2:00 by the time that first token is sent to the transmitting terminal that the first network is requested, it is preset First time period and second time period are 3 hours and 5 hours, then 5 hours time of first obtained and the interval 2:00 respectively Point is 7:00, is according to the time that first that the time point obtains monitors the transmitting terminal trigger action of the first network request 4:00-7:00;Similarly, the time that second for can obtaining monitors the transmitting terminal trigger action of the first network request is 9: 00-12:00。
The advantage of this embodiment is that when first token is sent to the transmitting terminal that the first network is requested by local terminal Afterwards, the trigger action that the transmitting terminal of first network request is monitored by section at a fixed time ensure that and monitor described the The fairness of the trigger action of the transmitting terminal of one network request.
In one embodiment, the time for monitoring the transmitting terminal trigger action of the first network request is determined, comprising: obtain Take the time and the out-of-service time of first token that first token is sent to the transmitting terminal of the first network request Difference;Determine the ratio of the difference and preset time difference a reference value, the preset time difference a reference value and first Reference period and the second reference period are corresponding, and first reference period is less than the second reference period;Obtain institute The product of ratio Yu first reference period is stated, is the first standard time section, obtains the ratio and second benchmark The product of period is the second standard time section;The transmitting terminal that the first network is requested is sent to from by first token Start, by the first standard time section before the time point that the second standard time section obtains as the monitoring first network The time of the transmitting terminal trigger action of request.The advantage of this embodiment is that by being sent to according to from by first token From the time of the transmitting terminal of first network request until the out-of-service time of first token this period length The time for the transmitting terminal trigger action for monitoring first network request is adaptively determined, so that described in the monitoring determined The time of the transmitting terminal trigger action of first network request is more reasonable.
In one embodiment, the time for monitoring the transmitting terminal trigger action of the first network request is determined, comprising: By first token be sent to time of the transmitting terminal of first network request to first token out-of-service time it Between period be divided into the first number time interval;When will divide obtained each time interval and be divided into the second number Between subinterval;For each time interval, the random integers for being less than or equal to the second number are obtained;For each time interval, The time subinterval of random integers corresponding with the time interval will be ordered as in the time interval, as monitoring first net The time of the transmitting terminal trigger action of network request.The advantage of this embodiment is that due to all including to monitor in each time interval The time of the transmitting terminal trigger action of the first network request, it ensure that the transmitting terminal for determining and monitoring the first network request The fairness of the time of trigger action, meanwhile, as the transmitting terminal touching for monitoring the first network request in each time interval It is random for sending out the time subinterval of the time of operation, so that determining the transmitting terminal trigger action for monitoring the first network request Time have certain randomness, safety can be improved.
Step 240, when the trigger action for the transmitting terminal for listening to the first network request in the time, according to described Trigger action adjusts the out-of-service time of first token, to obtain the out-of-service time after the adjustment of first token.
In one embodiment, described when the triggering for the transmitting terminal for listening to the first network request in the time is grasped Make, the out-of-service time of first token is adjusted according to the trigger action, to fail after obtaining the adjustment of first token Time, comprising:
In response to listening to the trigger action of the transmitting terminal of the first network request in the time, described first is enabled The out-of-service time backward delay preset period of board, as the out-of-service time after the adjustment of first token.
In one embodiment, in the triggering behaviour when the transmitting terminal for listening to the first network request in the time Make, the out-of-service time of first token is adjusted according to the trigger action, to fail after obtaining the adjustment of first token After time, the method also includes: the time of the transmitting terminal trigger action of the monitoring first network request is determined again simultaneously The trigger action that the transmitting terminal of the first network request is monitored in the time, until the first token fails.
In one embodiment, described when the triggering for the transmitting terminal for listening to the first network request in the time is grasped Make, the out-of-service time of first token is adjusted according to the trigger action, to fail after obtaining the adjustment of first token Time, comprising:
It obtains and listens to the frequency of the trigger action of the transmitting terminal of the first network request in the time;According to described The frequency of trigger action adjusts the out-of-service time of first token.
In one embodiment, the out-of-service time of first token is adjusted according to the frequency of the trigger action, comprising: In the case where the frequency is greater than default frequency threshold value, by the out-of-service time backward delay preset first of first token Period, as the out-of-service time after the adjustment of first token;In the case where the frequency is not more than default frequency threshold value, By the preset second time period of out-of-service time backward delay of first token, fail after the adjustment as first token Time, the preset second time period are less than preset first time period.
In one embodiment, the out-of-service time of first token is adjusted according to the frequency of the trigger action, comprising: Obtain the ratio of the frequency Yu default frequency threshold value;Determine the sum of the ratio and 1;It will be described and with first token The product of out-of-service time is as the out-of-service time after the adjustment of first token.
The advantage of this embodiment is that adaptively adjusting first token by the frequency according to the trigger action Out-of-service time so that the out-of-service time is more able to satisfy user demand after the adjustment of first token.
Step 250, it is received before the out-of-service time after adjustment and carries the second network of first token and ask It asks, confirms that second network request is legal.
As previously mentioned, token is the character string for verifying network request legitimacy, therefore described the is carried when receive When the second network request of one token, if receive time of second network request after the adjustment out-of-service time it Before, i.e., described first token does not fail, and can confirm that second network request carries effective first token, i.e., described Second network request is legal.
In one embodiment, the of first token is carried receiving before the out-of-service time after adjustment Two network requests, before confirming that second network request is legal, which comprises
Whether the token for determining second network request is first token;
If so, determine the time for receiving second network request whether after the adjustment before the out-of-service time, It wherein receives the second network request for carrying first token before the out-of-service time after adjustment, confirms described the Legal two network requests are to determine the time for receiving second network request after the adjustment before the out-of-service time In the case of carry out.
In conclusion going out embodiment according to Fig.2, the dynamic optimization of the out-of-service time of token is realized, is substantially reduced Due to token it is expired caused by destroy user experience a possibility that, taken into account the safety of token while guaranteeing user experience Property, so as to improve efficiency of user when using needing the network of token to service.
Fig. 3 is the flow chart of the details of the step 220 of the embodiment shown in corresponding embodiment according to fig. 2.Such as Fig. 3 institute Show, comprising the following steps:
Step 221, the first token undetermined is generated according to first network request.
Wherein, first token undetermined does not include the out-of-service time.
In one embodiment, it is requested in the first network request comprising uniform resource locator and the first network Transmitting terminal identity, it is described that generate the first token undetermined according to first network request include: to by described first The character of the identity composition of the uniform resource locator for including in network request and the transmitting terminal of first network request String carries out Hash operation, obtains the abstract of the character string;It regard the abstract as first token undetermined.
Step 222, the type of the first network request is determined.
In one embodiment, there is type identifier in the first network request, for identifying the first network The type of request.
Step 223, according to the out-of-service time of the type determination the first token to be generated.
In one embodiment, there is type identifier, type identifier and out-of-service time in the first network request Correspondence is stored in mapping table, by inquiring the mapping table, the type mark having in acquisition and first network request Know the out-of-service time for according with the corresponding out-of-service time as the first token to be generated.
Step 224, first token undetermined is added in the out-of-service time, to generate the first token, and by described the One token is sent to the transmitting terminal of the first network request.
Embodiment illustrated in fig. 3 is advantageous in that, is determined by the difference for the type requested according to first network different The first token out-of-service time so that for network request generate the first token it is more reasonable.
Fig. 4 is the flow chart of the details of the step 230 of the embodiment shown in corresponding embodiment according to fig. 2.Such as Fig. 4 institute Show, step 230 the following steps are included:
Step 231, the time that first token is sent to the transmitting terminal of first network request is obtained, as the One time.
In one embodiment, local terminal is built-in with timer, which has the sending time of each token, passes through It reads the timer and obtains the time that first token is sent to the transmitting terminal of the first network request.
Step 232, every minor tick x minutes periods since the first time are obtained, as monitoring described first The time of the transmitting terminal trigger action of network request.
Wherein x is positive integer.
In one embodiment, when every minor tick x minutes periods are regular lengths since the first time Between section.For example, interval time section can be 5 minutes every time, that is, obtain the first network request in first 5 minutes every time Whether transmitting terminal has trigger action.
In one embodiment, the length of every minor tick x minutes periods is preset since the first time Arithmetic sequence.For example preset arithmetic sequence is 20,15,10,5, and and if the first time is 18:00, obtained prison The time for listening the transmitting terminal trigger action of the first network request can be 18:00-18:20,18:20-18:35,18 respectively: 35-18:45 and 18:45-18:50.
It is to be determined as follows each interval time x minutes since the first time in one embodiment : according to the out-of-service time of first token, obtain the first parameter value;Using first parameter value, determine from described the One time started each interval time x minutes.
In one embodiment, the out-of-service time according to first token obtains the first parameter value, comprising:
The first parameter value is obtained by following expression:
Wherein, M is the out-of-service time of first token and the difference of entry-into-force time, and n is using x minutes as described in monitoring When the time of the transmitting terminal trigger action of first network request, time of the transmitting terminal trigger action of the first network request is monitored Number sequence, y are the first parameter value;
It is described to utilize first parameter value, it determines each since the first time interval time x minutes, packet It includes:
Obtain be greater than the first parameter value y smallest positive integral, as minor tick every since the first time when Between x minutes the number of minutes.
From the above embodiments, it can be seen that since coming into force the first token, monitor the hair of the first network request The frequency of sending end trigger action is higher and higher, that is, the time interval for monitoring the transmitting terminal trigger action of the first network request is got over Come it is shorter, so the advantage of this embodiment is that, pass through the time interval of the transmitting terminal trigger action of the certain monitoring of setting, section The about resources such as computing cost, while by increasing the close of the transmitting terminal trigger action monitored when the first token will be expired Degree so that user's operation to a greater extent will not be expired by token and interrupt, improve the experience of user.
Fig. 5 is the flow chart of the details of the step 240 of the embodiment shown in corresponding embodiment according to fig. 2.It is shown in Fig. 5 In embodiment out, the time for listening to the trigger action of the transmitting terminal of the first network request was the second time, such as Fig. 5 institute Show, comprising the following steps:
Step 241, the time that first token is sent to the transmitting terminal of first network request is obtained, as the One time.
In one embodiment, the transmitting terminal of the first network request has log, which has described first The time for each token that the transmitting terminal of network request receives is embedded with script, the acquisition in the implementation terminal of the disclosure First token is sent to the time of the transmitting terminal of first network request, comprising: by script from first net The time that first token is sent to the transmitting terminal of the first network request is crawled in the log of the transmitting terminal of network request.
Step 242, the difference of the out-of-service time and the first time are determined.
Since the out-of-service time is greater than the first time, so the difference is positive.
Step 243, the sum of the difference and second time are obtained, when failing after the adjustment as first token Between.
For example be at the first time 15:00, the time for listening to the trigger action of the transmitting terminal of first network request is 15:20, and the out-of-service time of the first token is 15:30, the out-of-service time of the first token and the difference of first time are 30 minutes, then When listening to the trigger action of transmitting terminal of the first network request in 15:20, the out-of-service time of the first token is adjusted For 15:20+30 minutes=15:50.
In conclusion embodiment illustrated in fig. 5 is advantageous in that, by by the out-of-service time of first token according to The mode that the length of the effective time of first token postpones adjusts the out-of-service time of first token, so that the institute obtained The out-of-service time can guarantee be interrupted since token is expired to a greater extent after stating the adjustment of the first token, improve The experience of user.
Fig. 6 is the flow chart of the details of the step 240 of another embodiment shown in corresponding embodiment according to fig. 2.Such as Fig. 6 institute Show, step 240 the following steps are included:
Step 241' obtains institute when the trigger action for the transmitting terminal for listening to the first network request in the time State the type of trigger action.
In one embodiment, each trigger action is corresponding with a Business Name, and the Business Name of trigger action is made For the type of the trigger action.
For example, the trigger action pair can all be obtained by listening to each trigger action of the transmitting terminal of the first network request The Business Name answered, can be using the Business Name as the type of the trigger action.
Step 242' determines the adjustment mode of the out-of-service time of first token according to the type of the trigger action.
In one embodiment, the type of trigger action is the corresponding risk class of each trigger action, described according to institute The type for stating trigger action determines the adjustment mode of the out-of-service time of first token, comprising:
Using the following formula established based on the corresponding risk class of the trigger action as the failure of first token The adjustment mode of time:
Wherein, α is the out-of-service time after adjustment, and β is the out-of-service time, when M is the out-of-service time of first token and comes into force Between difference, γ is risk class.It can be seen that risk class γ is higher, the out-of-service time, α was smaller after adjustment, that is, after adjusting Out-of-service time is more early.For example, being related to financial client end, transferring accounts, Modify password, change the types trigger actions such as binding cell-phone number Risk class can be 3 grades, and the risk class for being related to inquiring the trigger actions such as Flow Record, querying individual information is 2 grades, be related to Browsing new information and the risk class for checking news are 1 grade, then compared with the lower trigger action of risk class, risk class is more High trigger action is smaller to the corrective action of first token, i.e. the risk class of trigger action is higher, even if described The out-of-service time of one token have passed through delay, and since its final delay length is shorter, safety can be improved.
The advantage of this embodiment is that using different failures by the difference of the type according to the trigger action listened to Time adjustment mode enables trigger action that the out-of-service time of the first token is enable to reduce high-risk grade while delay The length of out-of-service time that is able to extend of trigger action, reducing the token out-of-service time to a certain extent extends bring wind Danger.
Step 243' adjusts the out-of-service time of first token according to the adjustment mode, is enabled with obtaining described first Out-of-service time after the adjustment of board.
In conclusion it is shown in Fig. 6 go out embodiment in, used by the difference according to the type of trigger action different Out-of-service time adjustment mode adjusts out-of-service time of first token, so that lose after the adjustment of first token obtained Imitate that the time is more reasonable, improve the trigger action of out-of-service time and user after the adjustment of first token suits degree.
The disclosure additionally provides a kind of network request security verification device, is the device of the invention embodiment below.
Fig. 7 is a kind of block diagram of network request security verification device shown according to an exemplary embodiment.Such as Fig. 7 institute Show, which includes:
Receiving module 710 is configured as receiving first network request.
Sending module 720 is configured as being requested to generate the first token and by first token according to the first network It is sent to the transmitting terminal of the first network request, wherein first token includes the out-of-service time of first token.
Determining module 730 is configured to determine that the time for monitoring the transmitting terminal trigger action of the first network request.
Module 740 is adjusted, the triggering when the transmitting terminal for listening to the first network request in the time is configured as Operation, the out-of-service time of first token is adjusted according to the trigger action, to lose after obtaining the adjustment of first token Imitate time
Confirmation module 750 is configured as receiving carrying first token before the out-of-service time after adjustment The second network request, confirm that second network request is legal.
According to the third aspect of the disclosure, a kind of electronic equipment that can be realized the above method is additionally provided.
Person of ordinary skill in the field it is understood that various aspects of the invention can be implemented as system, method or Program product.Therefore, various aspects of the invention can be embodied in the following forms, it may be assumed that complete hardware embodiment, complete The embodiment combined in terms of full Software Implementation (including firmware, microcode etc.) or hardware and software, can unite here Referred to as circuit, " module " or " system ".
The electronic equipment 800 of this embodiment according to the present invention is described referring to Fig. 8.The electronics that Fig. 8 is shown Equipment 800 is only an example, should not function to the embodiment of the present invention and use scope bring any restrictions.
As shown in figure 8, electronic equipment 800 is showed in the form of universal computing device.The component of electronic equipment 800 can wrap It includes but is not limited to: at least one above-mentioned processing unit 810, at least one above-mentioned storage unit 820, the different system components of connection The bus 830 of (including storage unit 820 and processing unit 810).
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 810 Row, so that various according to the present invention described in the execution of the processing unit 810 above-mentioned " embodiment method " part of this specification The step of illustrative embodiments.
Storage unit 820 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit (RAM) 821 and/or cache memory unit 822, it can further include read-only memory unit (ROM) 823.
Storage unit 820 can also include program/utility 824 with one group of (at least one) program module 825, Such program module 825 includes but is not limited to: operating system, one or more application program, other program modules and It may include the realization of network environment in program data, each of these examples or certain combination.
Bus 830 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
Electronic equipment 800 can also be with one or more external equipments 1000 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 800 communicate, and/or with make Any equipment (such as the router, modulation /demodulation that the electronic equipment 800 can be communicated with one or more of the other calculating equipment Device etc.) communication.This communication can be carried out by input/output (I/O) interface 850.Also, electronic equipment 800 can be with By network adapter 860 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, Such as internet) communication.As shown, network adapter 860 is communicated by bus 830 with other modules of electronic equipment 800. It should be understood that although not shown in the drawings, other hardware and/or software module can not used in conjunction with electronic equipment 800, including but not Be limited to: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and Data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server, terminal installation or network equipment etc.) is executed according to disclosure embodiment Method.
According to the fourth aspect of the disclosure, a kind of computer readable storage medium is additionally provided, being stored thereon with can be real The program product of existing this specification above method.In some possible embodiments, various aspects of the invention can also be real It is now a kind of form of program product comprising program code, when described program product is run on the terminal device, the journey Sequence code is each according to the present invention described in above-mentioned " illustrative methods " part of this specification for executing the terminal device The step of kind illustrative embodiments.
Refering to what is shown in Fig. 9, describing the program product for realizing the above method of embodiment according to the present invention 900, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device, Such as it is run on PC.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing can be with To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or It is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, In carry readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal, Optical signal or above-mentioned any appropriate combination.Readable signal medium can also be any readable Jie other than readable storage medium storing program for executing Matter, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or and its The program of combined use.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have Line, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
In addition, above-mentioned attached drawing is only the schematic theory of processing included by method according to an exemplary embodiment of the present invention It is bright, rather than limit purpose.It can be readily appreciated that the time that above-mentioned processing shown in the drawings did not indicated or limited these processing is suitable Sequence.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and And various modifications and change can executed without departing from the scope.The scope of the present invention is limited only by the attached claims.

Claims (10)

1. a kind of network request security verification method, which is characterized in that the described method includes:
Receive first network request;
It requests to generate the first token according to the first network and first token is sent to the first network request Transmitting terminal, wherein first token includes the out-of-service time of first token;
Determine the time for monitoring the transmitting terminal trigger action of the first network request;
When the trigger action for the transmitting terminal for listening to the first network request in the time, adjusted according to the trigger action The out-of-service time of first token, to obtain the out-of-service time after the adjustment of first token;
It receives the second network request for carrying first token before the out-of-service time after adjustment, confirms described the Two network requests are legal.
2. the method according to claim 1, wherein described request to generate the first token according to the first network And first token is sent to the transmitting terminal of the first network request, comprising:
The first token undetermined is generated according to first network request, wherein first token undetermined does not include the out-of-service time;
Determine the type of the first network request;
According to the out-of-service time of the type determination the first token to be generated;
First token undetermined is added in the out-of-service time, to generate the first token, and first token is sent to The transmitting terminal of the first network request.
3. the method according to claim 1, wherein the determining transmitting terminal for monitoring the first network request The time of trigger action, comprising:
The time that first token is sent to the transmitting terminal of the first network request is obtained, as at the first time;
Every minor tick x minutes periods since the first time are obtained, as the hair for monitoring the first network request The time of sending end trigger action, wherein x is positive integer.
4. according to the method described in claim 3, it is characterized in that, each interval time x points since the first time Clock is determined as follows:
According to the out-of-service time of first token, the first parameter value is obtained;
Using first parameter value, determine each since the first time interval time x minutes.
5. according to the method described in claim 4, it is characterized in that, the out-of-service time according to first token, obtains First parameter value, comprising:
The first parameter value is obtained by following expression:
Wherein, M is the out-of-service time of first token and the difference of entry-into-force time, and n is using x minutes as monitoring described first When the time of the transmitting terminal trigger action of network request, the number row of the transmitting terminal trigger action of the first network request is monitored Sequence, y are the first parameter value;
It is described to utilize first parameter value, it determines each since the first time interval time x minutes, comprising:
The smallest positive integral for being greater than the first parameter value y is obtained, as interval time x each since the first time points The number of minutes of clock.
6. the method according to claim 1, wherein listening to the triggering of the transmitting terminal of the first network request The time of operation was the second time, described when the triggering for the transmitting terminal for listening to the first network request in the time is grasped Make, the out-of-service time of first token is adjusted according to the trigger action, to fail after obtaining the adjustment of first token Time, comprising:
The time that first token is sent to the transmitting terminal of the first network request is obtained, as at the first time;
Determine the difference of the out-of-service time and the first time;
The sum of the difference and second time are obtained, as the out-of-service time after the adjustment of first token.
7. the method according to claim 1, wherein described ask when listening to the first network in the time The trigger action for the transmitting terminal asked adjusts the out-of-service time of first token according to the trigger action, to obtain described Out-of-service time after the adjustment of one token, comprising:
When the trigger action for the transmitting terminal for listening to the first network request in the time, the class of the trigger action is obtained Type;
According to the type of the trigger action, the adjustment mode of the out-of-service time of first token is determined;
According to the adjustment mode, the out-of-service time of first token is adjusted, to lose after obtaining the adjustment of first token Imitate the time.
8. a kind of network request security verification device, which is characterized in that described device includes:
Receiving module is configured as receiving first network request;
Sending module is configured as requesting to generate the first token according to the first network and first token is sent to institute State the transmitting terminal of first network request, wherein first token includes the out-of-service time of first token;
Determining module is configured to determine that the time for monitoring the transmitting terminal trigger action of the first network request;
Module is adjusted, the trigger action when the transmitting terminal for listening to the first network request in the time, root are configured as The out-of-service time of first token is adjusted, according to the trigger action to obtain the out-of-service time after the adjustment of first token;
Confirmation module is configured as receiving the second net for carrying first token before the out-of-service time after adjustment Network request confirms that second network request is legal.
9. a kind of computer-readable program medium, which is characterized in that it is stored with computer program instructions, when the computer journey When sequence instruction is computer-executed, computer is made to execute method according to any one of claim 1 to 7.
10. a kind of electronic equipment, which is characterized in that the electronic equipment includes:
Processor;
Memory is stored with computer-readable instruction on the memory, and the computer-readable instruction is held by the processor When row, method as described in any one of claim 1 to 7 is realized.
CN201910630624.4A 2019-07-12 2019-07-12 Network request security verification method, device, medium and electronic equipment Active CN110445615B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910630624.4A CN110445615B (en) 2019-07-12 2019-07-12 Network request security verification method, device, medium and electronic equipment
PCT/CN2019/117695 WO2021008034A1 (en) 2019-07-12 2019-11-12 Method and apparatus for network request security verification, and computing device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910630624.4A CN110445615B (en) 2019-07-12 2019-07-12 Network request security verification method, device, medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN110445615A true CN110445615A (en) 2019-11-12
CN110445615B CN110445615B (en) 2021-08-31

Family

ID=68429656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910630624.4A Active CN110445615B (en) 2019-07-12 2019-07-12 Network request security verification method, device, medium and electronic equipment

Country Status (2)

Country Link
CN (1) CN110445615B (en)
WO (1) WO2021008034A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112003852A (en) * 2020-08-19 2020-11-27 中国建设银行股份有限公司 Resource access control method, device, equipment and storage medium
CN113656774A (en) * 2021-08-17 2021-11-16 维沃移动通信(杭州)有限公司 Unlocking method and unlocking device of electronic equipment
WO2022121461A1 (en) * 2020-12-10 2022-06-16 苏州浪潮智能科技有限公司 Method, apparatus and device for constructing token for cloud platform resource access control
WO2022121221A1 (en) * 2020-12-10 2022-06-16 平安科技(深圳)有限公司 Token-based application access method and apparatus, computer device, and medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113179191A (en) * 2021-04-01 2021-07-27 众安信息技术服务有限公司 Network performance monitoring method and device and electronic equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120290517A1 (en) * 2011-05-11 2012-11-15 Affectivon Ltd. Predictor of affective response baseline values
CN103634316A (en) * 2013-11-26 2014-03-12 乐视网信息技术(北京)股份有限公司 Account login method and electronic equipment
CN104239772A (en) * 2014-08-25 2014-12-24 联想(北京)有限公司 Information processing method and electronic equipment
CN104901933A (en) * 2014-08-12 2015-09-09 腾讯科技(深圳)有限公司 Traffic permit allocation method and device, user equipment, application server and system
CN107425977A (en) * 2017-04-28 2017-12-01 北京海泰方圆科技股份有限公司 Dynamic token method for synchronizing time and device
US20180115544A1 (en) * 2014-07-28 2018-04-26 International Business Machines Corporation Protecting Network Communication Security
CN108900559A (en) * 2018-09-26 2018-11-27 平安普惠企业管理有限公司 Management method, device, computer equipment and the storage medium of logging on authentication
CN109379193A (en) * 2018-12-06 2019-02-22 佛山科学技术学院 A kind of dynamic anti-replay-attack authentication method and device
US20190116051A1 (en) * 2017-10-13 2019-04-18 Intensity Analytics Corporation System and method for effort-based user authentication

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411825A (en) * 2015-08-03 2017-02-15 天脉聚源(北京)科技有限公司 WeChat access token acquisition method and system thereof
US10505946B2 (en) * 2016-11-15 2019-12-10 Vmware, Inc. Adaptive token cache management
CN109802941A (en) * 2018-12-14 2019-05-24 平安科技(深圳)有限公司 A kind of login validation method, device, storage medium and server

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120290517A1 (en) * 2011-05-11 2012-11-15 Affectivon Ltd. Predictor of affective response baseline values
CN103634316A (en) * 2013-11-26 2014-03-12 乐视网信息技术(北京)股份有限公司 Account login method and electronic equipment
US20180115544A1 (en) * 2014-07-28 2018-04-26 International Business Machines Corporation Protecting Network Communication Security
CN104901933A (en) * 2014-08-12 2015-09-09 腾讯科技(深圳)有限公司 Traffic permit allocation method and device, user equipment, application server and system
CN104239772A (en) * 2014-08-25 2014-12-24 联想(北京)有限公司 Information processing method and electronic equipment
CN107425977A (en) * 2017-04-28 2017-12-01 北京海泰方圆科技股份有限公司 Dynamic token method for synchronizing time and device
US20190116051A1 (en) * 2017-10-13 2019-04-18 Intensity Analytics Corporation System and method for effort-based user authentication
CN108900559A (en) * 2018-09-26 2018-11-27 平安普惠企业管理有限公司 Management method, device, computer equipment and the storage medium of logging on authentication
CN109379193A (en) * 2018-12-06 2019-02-22 佛山科学技术学院 A kind of dynamic anti-replay-attack authentication method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112003852A (en) * 2020-08-19 2020-11-27 中国建设银行股份有限公司 Resource access control method, device, equipment and storage medium
CN112003852B (en) * 2020-08-19 2022-11-25 中国建设银行股份有限公司 Resource access control method, device, equipment and storage medium
WO2022121461A1 (en) * 2020-12-10 2022-06-16 苏州浪潮智能科技有限公司 Method, apparatus and device for constructing token for cloud platform resource access control
WO2022121221A1 (en) * 2020-12-10 2022-06-16 平安科技(深圳)有限公司 Token-based application access method and apparatus, computer device, and medium
CN113656774A (en) * 2021-08-17 2021-11-16 维沃移动通信(杭州)有限公司 Unlocking method and unlocking device of electronic equipment
CN113656774B (en) * 2021-08-17 2024-06-21 维沃移动通信(杭州)有限公司 Unlocking method and unlocking device of electronic equipment

Also Published As

Publication number Publication date
CN110445615B (en) 2021-08-31
WO2021008034A1 (en) 2021-01-21

Similar Documents

Publication Publication Date Title
CN110445615A (en) Network request security verification method, device, medium and electronic equipment
EP3484125B1 (en) Method and device for scheduling interface of hybrid cloud
EP3044987A1 (en) Method and system for verifying an account operation
CN112491776B (en) Security authentication method and related equipment
CN102238007A (en) Method, device and system for acquiring session token of user by third-party application
WO2014082555A1 (en) Login method, device and open platform system
CN105025041A (en) File upload method, file upload apparatus and system
WO2018018697A1 (en) Method and system for identifying spam message from false base station
CN102404392A (en) Integration type registering method for web application or website
EP2839401A1 (en) Secure password-based authentication for cloud computing services
CN105991518B (en) Network access verifying method and device
JP2011215753A (en) Authentication system and authentication method
CN105871822A (en) B/C/S blending mode based single sign-on system development model
CN111049946A (en) Portal authentication method, Portal authentication system, electronic equipment and storage medium
CN113038396A (en) Scheduling method, device and equipment of short message channel and storage medium
CN107911383A (en) A kind of cryptographic check method and apparatus
CN105429934B (en) Method and apparatus, readable storage medium storing program for executing, the terminal of HTTPS connectivity verification
CN109495458A (en) A kind of method, system and the associated component of data transmission
JP5383923B1 (en) Information processing apparatus, information processing system, information processing method, and program
CN104301285B (en) Login method for web system
CN110022327A (en) A kind of short message certification test method and device
CN112910643B (en) Method and device for generating random number in block chain
CN104734934A (en) Method, device and system for paying attention to public account
CN110248326A (en) A kind of data processing method and its device
CN112333134A (en) Cryptographically secure dynamic third party resources

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 201, room 518000, building A, No. 1, front Bay Road, Qianhai Shenzhen Guangdong Shenzhen Hong Kong cooperation zone (Qianhai business secretary)

Applicant after: Pingan Pu Hui Enterprise Management Co., Ltd.

Address before: 518000 Guangdong city of Shenzhen province Qianhai Shenzhen Hong Kong cooperation zone before Bay Road No. 1 building 201 room A

Applicant before: Pingan Pu Hui Enterprise Management Co., Ltd.

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant