CN110602139B - Recharge login access method and system based on Tencent cloud - Google Patents

Recharge login access method and system based on Tencent cloud Download PDF

Info

Publication number
CN110602139B
CN110602139B CN201910921163.6A CN201910921163A CN110602139B CN 110602139 B CN110602139 B CN 110602139B CN 201910921163 A CN201910921163 A CN 201910921163A CN 110602139 B CN110602139 B CN 110602139B
Authority
CN
China
Prior art keywords
login
client
verification
login information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910921163.6A
Other languages
Chinese (zh)
Other versions
CN110602139A (en
Inventor
赵元博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Jiuqu Interactive Technology Co ltd
Original Assignee
Chengdu Jiuqu Interactive Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Jiuqu Interactive Technology Co ltd filed Critical Chengdu Jiuqu Interactive Technology Co ltd
Priority to CN201910921163.6A priority Critical patent/CN110602139B/en
Publication of CN110602139A publication Critical patent/CN110602139A/en
Application granted granted Critical
Publication of CN110602139B publication Critical patent/CN110602139B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M17/00Prepayment of wireline communication systems, wireless communication systems or telephone systems
    • H04M17/20Prepayment of wireline communication systems, wireless communication systems or telephone systems with provision for recharging the prepaid account or card, or for credit establishment
    • H04M17/204Prepayment of wireline communication systems, wireless communication systems or telephone systems with provision for recharging the prepaid account or card, or for credit establishment on-line recharging, e.g. cashless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M17/00Prepayment of wireline communication systems, wireless communication systems or telephone systems
    • H04M2017/26Prepayment of wireline communication systems, wireless communication systems or telephone systems with real-time recharging of account/card, e.g. if limit is reached during connection user is asked if he wants to recharge or not

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a recharge login access method based on Tencent cloud, which comprises the following steps: initiating a request by using a client to be accessed to obtain the login information of a channel; receiving a request initiated by a client to be accessed, and feeding login information back to the client; the client logs in by using the login information, encrypts the login information by adopting an MD5 algorithm, and adds a timestamp corresponding to the encryption; judging whether the login information fed back by the client is consistent with the login information used for login of the client, and if so, feeding back a login list to the client; otherwise, the verification fails; creating and synchronously storing a second verification string, and feeding back the second verification string to the client; and the client performs login access by using the second verification string and the login list, and compares the second verification string with the synchronously stored second verification string to realize recharging login access. The invention also provides a recharge login access system based on the Tencent cloud.

Description

Recharge login access method and system based on Tencent cloud
Technical Field
The invention relates to the technical field of data terminal access, in particular to a recharge login access method and a recharge login access system based on Tencent cloud.
Background
Technically, the cloud platform-based data terminal access technology belongs to the cloud service category, and is an integrated display environment of cloud computing at a final client. Cloud Computing (Cloud Computing) is developed by Distributed Computing (Distributed Computing), Parallel processing (Parallel Computing) and Grid Computing (Grid Computing), and is an emerging business Computing model.
Tencent cloud is a deep infrastructure, has many years of experience on massive Internet services, and has many years of mature products for providing product services in social, gaming or other fields. Tencent completes important deployment at the cloud end, and provides an integral one-stop service scheme of cloud service, cloud data, cloud operation and the like for developers and enterprises. The method specifically comprises basic cloud services such as a cloud server, cloud storage, a cloud database, an elastic web engine and the like; tencent cloud analysis (MTA), Tencent cloud pushing (homing pigeon) and other Tencent overall big data capacities; and cloud-linked social systems such as QQ interconnection, QQ space, micro cloud and micro community. These are just the differentiated advantages that Tencent cloud can provide to this industry, creating a high-quality Tencent cloud technology platform that can support various internet usage scenarios. At present, a safe and reliable recharging login access method applying Tencent cloud is not available in the market.
Disclosure of Invention
In view of the above problems, the present invention aims to provide a recharge login access method and system based on Tencent cloud, and the technical scheme adopted by the present invention is as follows:
a recharging login access method based on Tencent cloud comprises the following steps:
a request phase: initiating a request by using a client to be accessed to obtain the login information of a channel;
and login information feedback stage: receiving a request initiated by a client to be accessed, and feeding login information back to the client;
and a login information encryption stage: the client logs in by using the login information, encrypts the login information by adopting an MD5 algorithm, and adds a timestamp corresponding to the encryption;
and login information verification stage: judging whether the login information fed back by the client is consistent with the login information used for login of the client, and if so, feeding back a login list to the client; otherwise, the verification fails;
second verification string synchronization stage: creating and synchronously storing a second verification string, and feeding back the second verification string to the client;
a client login stage: and the client performs login access by using the second verification string and the login list, and compares the second verification string with the synchronously stored second verification string to realize recharging login access.
Preferably, the login information includes an account address and a first verification string.
Further, in the login information verification stage, whether account addresses with the same history exist is judged, and if no account addresses with the same history exist, an account address is created; otherwise, using the account address which is in history.
Furthermore, the recharging login access method based on the Tencent cloud further comprises the step of feeding back the account address in the login information verification stage to the client.
Preferably, in the login information verification stage, verification is performed by means of adding a timestamp to login information.
Preferably, in the login information verification phase, the login list is fed back to the client, and the login list includes an account address and a port number in the login information verification phase.
Furthermore, the recharging login access method based on the Tencent cloud further comprises the steps that after the client logs in, the client requests and obtains recharging parameters; calling the recharging interface to initiate recharging and storing recharging information.
A recharge login access system based on Tencent cloud comprises:
a client;
the channel server is connected with the client and used for receiving a request initiated by the client and calling a login interface to generate login information; the login information comprises an account address and a first verification string;
the webpage gateway server receives the login information generated by the channel server and feeds the login information back to the client; receiving the login information encrypted by the MD5 algorithm, and verifying by adopting a mode of adding a timestamp to the login information;
the account login server receives login of the client by adopting login information and submits login verification; after receiving the information of successful verification, judging whether account addresses with the same history exist, and if not, creating a new account address; feeding back the account address and the port number to the client; generating a second verification string, and feeding back the second verification string to the client;
the login proxy server receives login verification submitted by the account login server, encrypts login information by adopting an MD5 algorithm, and adds a timestamp corresponding to the encryption; feeding back verification success information to the account login server, and
and the logic server receives the second verification string generated by the account login server, compares the second verification string with the second verification string initiated by the client for login, and allows the client to log in and access if the second verification string is consistent with the second verification string initiated by the client.
Furthermore, the recharging login access system based on the Tencent cloud also comprises a function open server which is used for receiving the recharging interface to initiate recharging and informing the client side of recharging; and prompting a successful result after recharging.
Compared with the prior art, the invention has the following beneficial effects:
(1) the invention skillfully adopts the channel server to obtain the request initiated by the client and call the login interface to generate the login information, and has the advantages that: the login information is transparent and simple for the client, the client does not need to care about complex parameters generated by the channel server, only needs to care about returned information and error codes, and all login related functions are completed by the channel server and forwarded to the webpage gateway server.
(2) The invention adopts MD5 algorithm to encrypt the login information, and adopts the mode of adding time stamp to the login information for verification, and the invention has the advantages that: along with the change of the time stamp, the verification MD5 string of each generated login is different, so that the security of each login can be realized, and login information is prevented from being hijacked and cracked.
(3) The invention adopts the account to log in the server to generate the second verification string and synchronously sends the second verification string to the client and the logic server, and has the advantages that: the client does not need to care about the information of the channel server, and the account server generates a local account and generates a second verification string of the local account, so that the account security of the login system is improved. The two-step verification can prevent login information from being hijacked to the maximum extent.
(4) The account gateway login server is used for physically isolating a network layer from a service layer, the account gateway server is specially responsible for communication with the client, and the service layer is responsible for the account login server. It brings the advantages that: the account server only needs to process normal service logic without concerning a complex network socket interface, and thus, even if the gateway server crashes, the normal operation of the login server is not influenced.
(5) The login proxy server adopted by the invention is specially responsible for the verification function of login information sent by the client, and the login proxy server and the account login server realize functional isolation, and the invention has the advantages that: the functions of account verification and local account creation processing are isolated, and all the functions of account verification and local account creation processing are processed by a login proxy server at a business level, so that hierarchical layered processing is realized at a business level, and an account server only needs to process normal account creation and server list information transmission without concerning a complex verification process.
(6) The transmission of the recharging information adopted by the invention ensures the reliability of recharging and delivery by depending on the reliability of the database information. The channel server informs the webpage gateway server after processing the recharging requirement, the webpage gateway server writes the recharging information into the database and informs the function open server, and the function open server informs the logic server to carry out recharging processing after receiving the information. The logic server queries the database for a recharge. The advantages are that: the states of the key recharging information are stored, inquired and changed by writing the key recharging information into the database, and as long as the database is stable, cases that the recharging cannot be paid out and the delivery is unsuccessful can not occur.
In conclusion, the method has the advantages of distribution, stability and data safety, and has high practical value and popularization value in the field of data terminal access.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention, and therefore should not be considered as limiting the scope of protection, and it is obvious for those skilled in the art that other related drawings can be obtained according to these drawings without inventive efforts.
FIG. 1 is a structural construction diagram of the present invention.
Fig. 2 is a sequence diagram of login access in accordance with the present invention.
Fig. 3 is a top-up timing diagram of the present invention.
Detailed Description
To further clarify the objects, technical solutions and advantages of the present application, the present invention will be further described with reference to the accompanying drawings and examples, and embodiments of the present invention include, but are not limited to, the following examples. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Examples
As shown in fig. 1 to fig. 3, the present embodiment provides a recharge login access method based on Tencent cloud and a system thereof, wherein the system includes:
a client;
the channel server is connected with the client and used for receiving a request initiated by the client and calling a login interface to generate login information; the login information comprises an account address and a first verification string;
the webpage gateway server receives the login information generated by the channel server and feeds the login information back to the client; receiving the login information encrypted by the MD5 algorithm, and verifying by adopting a mode of adding a timestamp to the login information;
the account login server receives login of the client by adopting login information and submits login verification; after receiving the information of successful verification, judging whether account addresses with the same history exist, and if not, creating a new account address; feeding back the account address and the port number to the client; generating a second verification string, and feeding back the second verification string to the client; in this embodiment, the account registration server is mainly responsible for such things as the creation of game channel accounts, the maintenance of server lists and recent registration lists.
The login proxy server receives login verification submitted by the account login server, encrypts login information by adopting an MD5 algorithm, and adds a timestamp corresponding to the encryption; feeding back verification success information to the account login server;
the logic server receives a second verification string generated by the account login server, compares the second verification string with a second verification string initiated by the client for login, and allows the client to log in and access if the second verification string is consistent with the second verification string initiated by the client;
the function open server is used for receiving the recharging interface to initiate recharging and informing the client to recharge; prompting a successful result after recharging; the function opening server receives the GM command sent by the web gateway server, executes some GM commands, and charges to the account notification operation.
The account gateway access server is a gateway server of the account login server and is responsible for interaction between client link and the account login server;
and the message routing server is responsible for interaction between the logic server and other servers. The message routing server is a message distribution server, and a plurality of message routing servers can be configured according to load balancing.
The logic database server is responsible for storing and reading the DB messages;
the logical gateway access server, responsible for linking with the client, also known as the gateway suit, and
and the log server is responsible for writing logs.
In the embodiment, a physical service cluster is formed by the logical database server, the logical gateway access server and the logical server, and the physical service cluster processes most logics of the game. In addition, the account login server cluster consists of an account login server, an account gateway access server and a login proxy server, wherein the account login server is responsible for managing and maintaining a logic server list so as to log in and establish communication between the account and the logic server; the login proxy server is an account number authentication server, and the login proxy server is communicated with the webpage gateway server to authenticate whether the login is an effective channel login.
The following briefly describes the recharging login access method of the system, which comprises the following steps:
a request phase: initiating a request by using a client to be accessed to obtain the login information of a channel;
(1) a client sends a request to a channel server to request login information of a channel;
(2) the channel server calls an H5 address and feeds back an account address of a channel, and the channel server calls a login interface of a developer and returns login information; the login information comprises an account address and a first verification string;
and login information feedback stage: receiving a request initiated by a client to be accessed, and feeding login information back to the client;
(1) the webpage gateway server takes the login information of the channel server and sends the login information to the client
(2) And after the client side obtains the account address and the first verification string, the client side sends the account address and the first verification string to an account server to perform account login.
And a login information encryption stage: the client logs in by using the login information, encrypts the login information by adopting an MD5 algorithm, and adds a timestamp corresponding to the encryption;
(1) the account server checks whether a historical account exists or not and sends login information to the account login server for login verification;
(2) the account login server uses the MD5 encryption to send to the web gateway server to verify whether the login information is valid or not in a login information + timestamp mode.
And login information verification stage: judging whether the login information fed back by the client is consistent with the login information used for login of the client, and if so, feeding back a login list to the client; otherwise, the verification fails;
(1) after the verification is successful, the webpage gateway server compares the login information which is taken from the channel server before with the login information sent by the login verification server to carry out MD5 comparison, and if the login information is consistent with the login information sent by the login verification server, the verification is successful;
(2) the account verification server sends information of successful verification to the account server;
(3) and when the account server receives the verification success information. If there are no historical accounts, a new account is created. If the historical account exists, selecting to use the historical account;
(4) the account server sends server list information to the client, wherein the list information comprises a login address and a port number.
Second verification string synchronization stage: creating and synchronously storing a second verification string, and feeding back the second verification string to the client; namely: and the account server creates a second verification string and respectively provides the client and the logic server.
A client login stage: the client performs login access by using the second verification string and the login list, and compares the second verification string with the synchronously stored second verification string to realize recharging login access;
(1) the client side takes the returned second verification string and logs in the logic server through the second verification string;
(2) the logic server compares the second verification string provided by the client with the second verification string provided by the account server; if the two are consistent, the login is successful, and the recharging process is carried out; otherwise, the login fails.
A recharging stage:
(1) request channel parameters: the client requests parameters required by the recharging to the webpage gateway server;
(2) returning channel parameters: the webpage gateway server feeds back channel parameters to the client;
(3) calling a channel recharging interface: the client calls a channel recharging interface to initiate recharging;
(4) informing the client that the recharging is successful: the channel server informs the webpage gateway server of successful recharging information after receiving the recharging information;
(5) writing the recharge into DB: the webpage gateway server receives the recharging success information which comprises a player account number, recharging content, recharging amount and time, records the information and stores the information in a database;
(6) notify client (player) to recharge: the webpage gateway server informs the client of recharging;
(7) and after informing the player of the recharging to account function open server to know the recharging information of the client, informing the logic server of recharging to account.
(8) Inquiring DB for recharging: after receiving the player recharging account information, the logic server inquires whether the recharging is successful or not in the database, and if the recharging is successful, the logic server carries out delivery processing.
(9) Informing the client that the recharging is successful: and after the logic server carries out the delivery flow, the logic server informs the client that the recharging is successful.
The above-mentioned embodiments are only preferred embodiments of the present invention, and do not limit the scope of the present invention, but all the modifications made by the principles of the present invention and the non-inventive efforts based on the above-mentioned embodiments shall fall within the scope of the present invention.

Claims (9)

1. A recharge login access method based on Tencent cloud is characterized by comprising the following steps:
a request phase: initiating a request by using a client to be accessed to obtain the login information of a channel;
and login information feedback stage: receiving a request initiated by a client to be accessed, and feeding login information back to the client;
and a login information encryption stage: the client logs in by using the login information, encrypts the login information by adopting an MD5 algorithm, and adds a timestamp corresponding to the encryption;
and login information verification stage: judging whether the login information fed back by the client is consistent with the login information used for login of the client, and if so, feeding back a login list to the client; otherwise, the verification fails;
second verification string synchronization stage: creating and synchronously storing a second verification string, and feeding back the second verification string to the client;
a client login stage: and the client performs login access by using the second verification string and the login list, and compares the second verification string with the synchronously stored second verification string to realize recharging login access.
2. A Tencent cloud based recharge login access method according to claim 1, wherein the login information comprises an account address and a first validation string.
3. A tenuous cloud-based recharge login access method according to claim 2, wherein in the login information verification phase, whether an account address with the same history exists is judged, and if no account address with the same history exists, an account address is created; otherwise, using the account address which is in history.
4. A tenuous cloud based recharge login access method according to claim 3, further comprising feeding back an account address in the login information verification phase to the client.
5. A tenuous cloud-based recharge login access method according to claim 1, wherein in the login information verification stage, verification is performed by means of login information and time stamping.
6. A tenuous cloud-based recharge login access method according to claim 3, wherein in the login information verification phase, the login list is fed back to the client, and the login list comprises an account address and a port number in the login information verification phase.
7. The tenuous cloud-based recharge login access method according to claim 1, further comprising the steps of after the client logs in, the client requesting and acquiring recharge parameters; calling the recharging interface to initiate recharging and storing recharging information.
8. A recharge login access system based on Tencent cloud is characterized by comprising:
a client;
the channel server is connected with the client and used for receiving a request initiated by the client and calling a login interface to generate login information; the login information comprises an account address and a first verification string;
the webpage gateway server receives the login information generated by the channel server and feeds the login information back to the client; receiving the login information encrypted by the MD5 algorithm, and verifying by adopting a mode of adding a timestamp to the login information;
the account login server receives login of the client by adopting login information and submits login verification; after receiving the information of successful verification, judging whether account addresses with the same history exist, and if not, creating a new account address; feeding back the account address and the port number to the client; generating a second verification string, and feeding back the second verification string to the client;
the login proxy server receives login verification submitted by the account login server, encrypts login information by adopting an MD5 algorithm, and adds a timestamp corresponding to the encryption; feeding back verification success information to the account login server, and
and the logic server receives the second verification string generated by the account login server, compares the second verification string with the second verification string initiated by the client for login, and allows the client to log in and access if the second verification string is consistent with the second verification string initiated by the client.
9. A charging login access system based on Tencent cloud according to claim 8, further comprising a function opening server for receiving a charging interface to initiate charging and notifying a client to charge; and prompting a successful result after recharging.
CN201910921163.6A 2019-09-27 2019-09-27 Recharge login access method and system based on Tencent cloud Active CN110602139B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910921163.6A CN110602139B (en) 2019-09-27 2019-09-27 Recharge login access method and system based on Tencent cloud

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910921163.6A CN110602139B (en) 2019-09-27 2019-09-27 Recharge login access method and system based on Tencent cloud

Publications (2)

Publication Number Publication Date
CN110602139A CN110602139A (en) 2019-12-20
CN110602139B true CN110602139B (en) 2021-08-13

Family

ID=68863860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910921163.6A Active CN110602139B (en) 2019-09-27 2019-09-27 Recharge login access method and system based on Tencent cloud

Country Status (1)

Country Link
CN (1) CN110602139B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115545995A (en) * 2022-11-03 2022-12-30 宁波市轨道交通集团有限公司 Rail transit comprehensive service management system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259663A (en) * 2013-05-07 2013-08-21 南京邮电大学 User unified authentication method in cloud computing environment
CN103647746A (en) * 2013-11-01 2014-03-19 北京奇虎科技有限公司 User login method, device and system
CN105187431B (en) * 2015-09-17 2019-02-12 网易(杭州)网络有限公司 Login method, server, client and the communication system of third-party application
CN108494740B (en) * 2018-03-01 2021-08-24 捷开通讯(深圳)有限公司 Token generation and verification method, intelligent terminal and server

Also Published As

Publication number Publication date
CN110602139A (en) 2019-12-20

Similar Documents

Publication Publication Date Title
US10992649B2 (en) Systems and methods for privacy in distributed ledger transactions
CN108777625B (en) Signature verification method, device and system, storage medium and electronic device
CN103037312B (en) Information push method and device
CN111191283B (en) Beidou positioning information security encryption method and device based on alliance block chain
KR102121140B1 (en) Method and device for comparing data versions between time zone crossing stations
CN101582763B (en) Method and system for identity authentication based on dynamic password
CN104754009A (en) Service acquisition and invocation method, device, client-side and server
CN107438054B (en) Method and system for realizing menu information control based on public platform
CN101442558A (en) Method and system for providing index service for P2SP network
CN102217280A (en) Method, system, and server for user service authentication
EP2640045A1 (en) Method and System for Transferring Mobile Device Contact Information
CN108366176A (en) A kind of charging method of terminal applies, apparatus and system
CN112866421A (en) Intelligent contract operation method and device based on distributed cache and NSQ
CN110602139B (en) Recharge login access method and system based on Tencent cloud
CN113676452B (en) Replay attack resisting method and system based on one-time key
CN110290176A (en) Point-to-point information transmission method based on MQTT
CN117407437A (en) Block chain-based data processing method, equipment and readable storage medium
CN1649299B (en) Comlex management system and complex conversation management server for applicating programme
CN107659574A (en) A kind of data access control system
CN102109986B (en) Method, system and device for providing connection serial numbers and connecting plugins
CN115098528B (en) Service processing method, device, electronic equipment and computer readable storage medium
CN104753774B (en) A kind of distributed enterprise comprehensive access gate
KR20230118380A (en) Group signaure based federated learning mehod and system, and recording medium for performing the same
CN117061538A (en) Consensus processing method and related device based on block chain network
CN114338762A (en) Same city data open system, method, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant