CN111291393A - Request checking method and device - Google Patents

Request checking method and device Download PDF

Info

Publication number
CN111291393A
CN111291393A CN202010074752.8A CN202010074752A CN111291393A CN 111291393 A CN111291393 A CN 111291393A CN 202010074752 A CN202010074752 A CN 202010074752A CN 111291393 A CN111291393 A CN 111291393A
Authority
CN
China
Prior art keywords
original request
check value
request parameter
encrypting
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010074752.8A
Other languages
Chinese (zh)
Inventor
程蒙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yueyi Network Information Technology Co Ltd
Original Assignee
Shanghai Yueyi Network Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yueyi Network Information Technology Co Ltd filed Critical Shanghai Yueyi Network Information Technology Co Ltd
Priority to CN202010074752.8A priority Critical patent/CN111291393A/en
Publication of CN111291393A publication Critical patent/CN111291393A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The invention aims to provide a request checking method and equipment, wherein a client sends an original request parameter and a first check value to a server, the server encrypts the received original request parameter by using a keyword to obtain a second check value, then compares the second check value with the received first check value, and if the two check values are consistent, confirms that the original request parameter is legal and can further respond to the original request parameter; if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters can be refused, so that the server automatically filters illegal original request parameters in advance, frequent access of the service by illegal clients is prevented, and the server is prevented from being attacked illegally.

Description

Request checking method and device
Technical Field
The invention relates to the field of computers, in particular to a request verification method and device.
Background
When the client sends a request to the server, some requests are illegal, and the server is attacked.
Disclosure of Invention
The invention aims to provide a request verification method and device.
According to one aspect of the present invention, a client request based verification method is provided, which includes:
agreeing with a server for encrypted keywords;
encrypting the original request parameter by using the keyword to obtain a first check value;
and sending the original request parameter and the first check value to the server.
Further, in the above method, encrypting the original request parameter with the keyword to obtain the first check value includes:
and encrypting the original request parameter by the key through an MD5 encryption algorithm to obtain a first check value.
Further, in the above method, before encrypting the original request parameter with the keyword to obtain the first check value, the method includes:
appointing a sequencing mode of the original request parameters with a server;
encrypting the original request parameter by using the keyword to obtain a first check value, wherein the first check value comprises the following steps:
and sequencing the original request parameters based on the sequencing mode, and encrypting the sequenced original request parameters by using the keywords to obtain a first check value.
According to another aspect of the present invention, there is also provided a request verification method based on a server, including:
agreeing with a client for encrypted keywords;
receiving an original request parameter and the first check value from a client, wherein the first check value is obtained by encrypting the keyword by the client;
encrypting the original request parameter by the keyword to obtain a second check value, comparing the second check value with the received first check value,
if the two are consistent, the original request parameter is confirmed to be legal, and further response processing is carried out on the original request parameter;
if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters is refused.
Further, in the above method, encrypting the original request parameter with the keyword to obtain a second check value includes:
the original request parameter is encrypted with the key by the MD5 encryption algorithm to obtain a second check value.
Further, in the foregoing method, before encrypting the original request parameter with the keyword to obtain the second check value, the method includes:
appointing a sequencing mode of the original request parameters with the client;
encrypting the original request parameter by using the keyword to obtain a second check value, wherein the second check value comprises the following steps:
and sequencing the received original request parameters based on the sequencing mode, and encrypting the sequenced original request parameters by using the keywords to obtain a second check value.
According to another aspect of the present invention, there is also provided a client, including:
the first device is used for agreeing with the server for the encrypted keywords;
the first and second devices are used for encrypting the original request parameter by the keyword to obtain a first check value;
and the first third device is used for sending the original request parameter and the first check value to the server.
According to another aspect of the present invention, there is also provided a server, wherein the server includes:
a second means for agreeing with the client on a keyword for encryption;
a second device, configured to receive an original request parameter and the first check value from a client, where the first check value is obtained by encrypting, by the client, the keyword;
second third means for encrypting the original request parameter with the key to obtain a second check value, comparing the second check value with the received first check value,
if the two are consistent, the original request parameter is confirmed to be legal, and further response processing is carried out on the original request parameter;
if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters is refused.
According to another aspect of the present invention, there is also provided a computing-based device, comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
agreeing with a server for encrypted keywords;
encrypting the original request parameter by using the keyword to obtain a first check value;
and sending the original request parameter and the first check value to the server.
According to another aspect of the present invention, there is also provided a computer-readable storage medium having stored thereon computer-executable instructions, wherein the computer-executable instructions, when executed by a processor, cause the processor to:
agreeing with a server for encrypted keywords;
encrypting the original request parameter by using the keyword to obtain a first check value;
and sending the original request parameter and the first check value to the server.
According to another aspect of the present invention, there is also provided a computing-based device, comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
agreeing with a client for encrypted keywords;
receiving an original request parameter and the first check value from a client, wherein the first check value is obtained by encrypting the keyword by the client;
encrypting the original request parameter by the keyword to obtain a second check value, comparing the second check value with the received first check value,
if the two are consistent, the original request parameter is confirmed to be legal, and further response processing is carried out on the original request parameter;
if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters is refused.
According to another aspect of the present invention, there is also provided a computer-readable storage medium having stored thereon computer-executable instructions, wherein the computer-executable instructions, when executed by a processor, cause the processor to:
agreeing with a client for encrypted keywords;
receiving an original request parameter and the first check value from a client, wherein the first check value is obtained by encrypting the keyword by the client;
encrypting the original request parameter by the keyword to obtain a second check value, comparing the second check value with the received first check value,
if the two are consistent, the original request parameter is confirmed to be legal, and further response processing is carried out on the original request parameter;
if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters is refused.
Compared with the prior art, the method has the advantages that the original request parameter and the first check value are sent to the server through the client, the server encrypts the received original request parameter by using the keyword to obtain a second check value, then the second check value is compared with the received first check value, if the two check values are consistent, the original request parameter is confirmed to be legal, and further response processing can be carried out on the original request parameter; if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters can be refused, so that the server automatically filters illegal original request parameters in advance, frequent access of the service by illegal clients is prevented, and the server is prevented from being attacked illegally.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
fig. 1 shows a flow chart of an embodiment of the invention to a client-based request verification method.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present invention is described in further detail below with reference to the attached drawing figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
As shown in fig. 1, the present invention provides a request verification method based on a client, where the method includes:
step S11, the key words used for encryption are agreed with the server;
here, the client and the server may agree in advance to use the keyword for the encryption side, so as to encrypt and verify the request parameter subsequently by using the keyword;
step S12, encrypting the original request parameter by the keyword to obtain a first check value;
step S13, sending the original request parameter and the first check value to the server.
The server side encrypts the received original request parameter by using the keyword to obtain a second check value, then compares the second check value with the received first check value, and if the second check value is consistent with the first check value, confirms that the original request parameter is legal and can further respond to the original request parameter; if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters can be refused, so that the server automatically filters illegal original request parameters in advance, frequent access of the service by illegal clients is prevented, and the server is prevented from being attacked illegally.
In an embodiment of the client-based request verification method of the present invention, in step S2, encrypting the original request parameter with the keyword to obtain a first verification value includes:
the original request parameter is encrypted by the key through an MD5 encryption Algorithm (Message-Digest Algorithm) to obtain a first check value.
Here, the MD5 encryption algorithm has the advantage of being difficult to break, and can ensure that the obtained first check value is difficult to break illegally.
In an embodiment of the client-based request verification method of the present invention, step S22, before encrypting the original request parameter with the keyword to obtain the first verification value, includes:
appointing a sequencing mode of the original request parameters with a server;
here, the sorting manner may be an ascending or descending order of initials of the original request parameters;
step S22, encrypting the original request parameter with the keyword to obtain a first check value, including:
and sequencing the original request parameters based on the sequencing mode, and encrypting the sequenced original request parameters by using the keywords to obtain a first check value.
Here, by means of the ordering mode that the client and the server agree on the original request parameters, it can be ensured that after the legal original request parameters are encrypted by the keyword, the first check value generated by the client and the second check value generated by the server are kept consistent, so that the check of the original request parameters is successfully passed.
The invention provides a request verification method based on a server, which comprises the following steps:
step S21, appointing the key word for encryption with the client;
here, the client and the server may agree in advance to use the keyword for the encryption side, so as to encrypt and verify the request parameter subsequently by using the keyword;
step S22, receiving an original request parameter and the first check value from a client, where the first check value is obtained by encrypting the keyword by the client;
step S23, encrypting the original request parameter with the keyword to obtain a second check value, comparing the second check value with the received first check value,
if the two are consistent, the original request parameter is confirmed to be legal, and further response processing is carried out on the original request parameter;
if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters is refused.
The server side encrypts the received original request parameter by using the keyword to obtain a second check value, then compares the second check value with the received first check value, and if the second check value is consistent with the first check value, confirms that the original request parameter is legal and can further respond to the original request parameter; if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters can be refused, so that the server automatically filters illegal original request parameters in advance, frequent access of the service by illegal clients is prevented, and the server is prevented from being attacked illegally.
In an embodiment of the client-based request verification method of the present invention, in step S23, encrypting the original request parameter with the keyword to obtain a second verification value includes:
the original request parameter is encrypted by the key through an MD5 encryption Algorithm (Message-Digest Algorithm) to obtain a second check value.
Here, the MD5 encryption algorithm has the advantage of being difficult to break, and can ensure that the obtained first check value is difficult to break illegally.
In an embodiment of the client-based request verification method of the present invention, before encrypting the original request parameter with the keyword to obtain the second verification value in step S23, the method includes:
appointing a sequencing mode of the original request parameters with the client;
here, the sorting manner may be an ascending or descending order of initials of the original request parameters;
step S23, encrypting the original request parameter with the keyword to obtain a second check value, including:
and sequencing the received original request parameters based on the sequencing mode, and encrypting the sequenced original request parameters by using the keywords to obtain a second check value.
Here, by means of the ordering mode that the client and the server agree on the original request parameters, it can be ensured that after the legal original request parameters are encrypted by the keyword, the first check value generated by the client and the second check value generated by the server are kept consistent, so that the check of the original request parameters is successfully passed.
According to another aspect of the present invention, there is also provided a client, including:
the first device is used for agreeing with the server for the encrypted keywords;
the first and second devices are used for encrypting the original request parameter by the keyword to obtain a first check value;
and the first third device is used for sending the original request parameter and the first check value to the server.
According to another aspect of the present invention, there is also provided a server, wherein the server includes:
a second means for agreeing with the client on a keyword for encryption;
a second device, configured to receive an original request parameter and the first check value from a client, where the first check value is obtained by encrypting, by the client, the keyword;
second third means for encrypting the original request parameter with the key to obtain a second check value, comparing the second check value with the received first check value,
if the two are consistent, the original request parameter is confirmed to be legal, and further response processing is carried out on the original request parameter;
if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters is refused.
According to another aspect of the present invention, there is also provided a computing-based device, comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
agreeing with a server for encrypted keywords;
encrypting the original request parameter by using the keyword to obtain a first check value;
and sending the original request parameter and the first check value to the server.
According to another aspect of the present invention, there is also provided a computer-readable storage medium having stored thereon computer-executable instructions, wherein the computer-executable instructions, when executed by a processor, cause the processor to:
agreeing with a server for encrypted keywords;
encrypting the original request parameter by using the keyword to obtain a first check value;
and sending the original request parameter and the first check value to the server.
According to another aspect of the present invention, there is also provided a computing-based device, comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
agreeing with a client for encrypted keywords;
receiving an original request parameter and the first check value from a client, wherein the first check value is obtained by encrypting the keyword by the client;
encrypting the original request parameter by the keyword to obtain a second check value, comparing the second check value with the received first check value,
if the two are consistent, the original request parameter is confirmed to be legal, and further response processing is carried out on the original request parameter;
if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters is refused.
According to another aspect of the present invention, there is also provided a computer-readable storage medium having stored thereon computer-executable instructions, wherein the computer-executable instructions, when executed by a processor, cause the processor to:
agreeing with a client for encrypted keywords;
receiving an original request parameter and the first check value from a client, wherein the first check value is obtained by encrypting the keyword by the client;
encrypting the original request parameter by the keyword to obtain a second check value, comparing the second check value with the received first check value,
if the two are consistent, the original request parameter is confirmed to be legal, and further response processing is carried out on the original request parameter;
if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters is refused.
For details of embodiments of each device and storage medium of the present invention, reference may be made to corresponding parts of each method embodiment, and details are not described herein again
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
It should be noted that the present invention may be implemented in software and/or in a combination of software and hardware, for example, as an Application Specific Integrated Circuit (ASIC), a general purpose computer or any other similar hardware device. In one embodiment, the software program of the present invention may be executed by a processor to implement the steps or functions described above. Also, the software programs (including associated data structures) of the present invention can be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Further, some of the steps or functions of the present invention may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present invention can be applied as a computer program product, such as computer program instructions, which when executed by a computer, can invoke or provide the method and/or technical solution according to the present invention through the operation of the computer. Program instructions which invoke the methods of the present invention may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the invention herein comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or solution according to embodiments of the invention as described above.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (12)

1. A request checking method based on a client side is disclosed, wherein the method comprises the following steps:
agreeing with a server for encrypted keywords;
encrypting the original request parameter by using the keyword to obtain a first check value;
and sending the original request parameter and the first check value to the server.
2. The method of claim 1, wherein encrypting the original request parameter with the key to obtain the first check value comprises:
and encrypting the original request parameter by the key through an MD5 encryption algorithm to obtain a first check value.
3. The method of claim 1, wherein prior to encrypting the original request parameter with the key to obtain the first check value, comprising:
appointing a sequencing mode of the original request parameters with a server;
encrypting the original request parameter by using the keyword to obtain a first check value, wherein the first check value comprises the following steps:
and sequencing the original request parameters based on the sequencing mode, and encrypting the sequenced original request parameters by using the keywords to obtain a first check value.
4. A request checking method based on a server side comprises the following steps:
agreeing with a client for encrypted keywords;
receiving an original request parameter and the first check value from a client, wherein the first check value is obtained by encrypting the keyword by the client;
encrypting the original request parameter by the keyword to obtain a second check value, comparing the second check value with the received first check value,
if the two are consistent, the original request parameter is confirmed to be legal, and further response processing is carried out on the original request parameter;
if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters is refused.
5. The method of claim 4, wherein encrypting the original request parameter with the key to obtain a second check value comprises:
the original request parameter is encrypted with the key by the MD5 encryption algorithm to obtain a second check value.
6. The method of claim 4, wherein encrypting the original request parameter with the key to obtain the second check value comprises:
appointing a sequencing mode of the original request parameters with the client;
encrypting the original request parameter by using the keyword to obtain a second check value, wherein the second check value comprises the following steps:
and sequencing the received original request parameters based on the sequencing mode, and encrypting the sequenced original request parameters by using the keywords to obtain a second check value.
7. A client, wherein the client comprises:
the first device is used for agreeing with the server for the encrypted keywords;
the first and second devices are used for encrypting the original request parameter by the keyword to obtain a first check value;
and the first third device is used for sending the original request parameter and the first check value to the server.
8. A server, wherein the server comprises:
a second means for agreeing with the client on a keyword for encryption;
a second device, configured to receive an original request parameter and the first check value from a client, where the first check value is obtained by encrypting, by the client, the keyword;
second third means for encrypting the original request parameter with the key to obtain a second check value, comparing the second check value with the received first check value,
if the two are consistent, the original request parameter is confirmed to be legal, and further response processing is carried out on the original request parameter;
if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters is refused.
9. A computing-based device, comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
agreeing with a server for encrypted keywords;
encrypting the original request parameter by using the keyword to obtain a first check value;
and sending the original request parameter and the first check value to the server.
10. A computer-readable storage medium having computer-executable instructions stored thereon, wherein the computer-executable instructions, when executed by a processor, cause the processor to:
agreeing with a server for encrypted keywords;
encrypting the original request parameter by using the keyword to obtain a first check value;
and sending the original request parameter and the first check value to the server.
11. A computing-based device, comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
agreeing with a client for encrypted keywords;
receiving an original request parameter and the first check value from a client, wherein the first check value is obtained by encrypting the keyword by the client;
encrypting the original request parameter by the keyword to obtain a second check value, comparing the second check value with the received first check value,
if the two are consistent, the original request parameter is confirmed to be legal, and further response processing is carried out on the original request parameter;
if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters is refused.
12. A computer-readable storage medium having computer-executable instructions stored thereon, wherein the computer-executable instructions, when executed by a processor, cause the processor to:
agreeing with a client for encrypted keywords;
receiving an original request parameter and the first check value from a client, wherein the first check value is obtained by encrypting the keyword by the client;
encrypting the original request parameter by the keyword to obtain a second check value, comparing the second check value with the received first check value,
if the two are consistent, the original request parameter is confirmed to be legal, and further response processing is carried out on the original request parameter;
if the two are not consistent, the original request parameters are determined to be illegal, and further response processing on the original request parameters is refused.
CN202010074752.8A 2020-01-21 2020-01-21 Request checking method and device Pending CN111291393A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010074752.8A CN111291393A (en) 2020-01-21 2020-01-21 Request checking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010074752.8A CN111291393A (en) 2020-01-21 2020-01-21 Request checking method and device

Publications (1)

Publication Number Publication Date
CN111291393A true CN111291393A (en) 2020-06-16

Family

ID=71024399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010074752.8A Pending CN111291393A (en) 2020-01-21 2020-01-21 Request checking method and device

Country Status (1)

Country Link
CN (1) CN111291393A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115314259A (en) * 2022-07-15 2022-11-08 江苏徐工工程机械研究院有限公司 Safety control method, client, server and system of mine transportation system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105554098A (en) * 2015-12-14 2016-05-04 瑞斯康达科技发展股份有限公司 Device configuration method, server and system
CN105765941A (en) * 2015-10-23 2016-07-13 深圳还是威健康科技有限公司 Illegal access server prevention method and device
CN107807792A (en) * 2017-10-27 2018-03-16 郑州云海信息技术有限公司 A kind of data processing method and relevant apparatus based on copy storage system
CN108092775A (en) * 2016-11-23 2018-05-29 阿里巴巴集团控股有限公司 A kind of method of calibration and device, electronic equipment
CN108400979A (en) * 2018-02-06 2018-08-14 武汉斗鱼网络科技有限公司 Communication means and electronic equipment applied to client and server
CN108924161A (en) * 2018-08-13 2018-11-30 南京敞视信息科技有限公司 A kind of encrypted transaction data communication means and system
CN109788002A (en) * 2019-03-12 2019-05-21 北京首汽智行科技有限公司 A kind of Http request encryption and decryption method and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105765941A (en) * 2015-10-23 2016-07-13 深圳还是威健康科技有限公司 Illegal access server prevention method and device
CN105554098A (en) * 2015-12-14 2016-05-04 瑞斯康达科技发展股份有限公司 Device configuration method, server and system
CN108092775A (en) * 2016-11-23 2018-05-29 阿里巴巴集团控股有限公司 A kind of method of calibration and device, electronic equipment
CN107807792A (en) * 2017-10-27 2018-03-16 郑州云海信息技术有限公司 A kind of data processing method and relevant apparatus based on copy storage system
CN108400979A (en) * 2018-02-06 2018-08-14 武汉斗鱼网络科技有限公司 Communication means and electronic equipment applied to client and server
CN108924161A (en) * 2018-08-13 2018-11-30 南京敞视信息科技有限公司 A kind of encrypted transaction data communication means and system
CN109788002A (en) * 2019-03-12 2019-05-21 北京首汽智行科技有限公司 A kind of Http request encryption and decryption method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115314259A (en) * 2022-07-15 2022-11-08 江苏徐工工程机械研究院有限公司 Safety control method, client, server and system of mine transportation system
CN115314259B (en) * 2022-07-15 2023-06-02 江苏徐工工程机械研究院有限公司 Safety control method, client, server and system of mine transportation system

Similar Documents

Publication Publication Date Title
AU2016243115B2 (en) Key export techniques
WO2021036170A1 (en) Blockchain transaction processing method and apparatus
WO2021036171A1 (en) Blockchain transaction processing method and apparatus
CN110268406B (en) Password security
CN110555293A (en) Method, apparatus, electronic device and computer readable medium for protecting data
EP3813001B1 (en) Data reading method based on a plurality of block chain networks and system
US10783277B2 (en) Blockchain-type data storage
US10911251B2 (en) Blockchain ledger authentication
CN113132363B (en) Front-end and back-end security verification method and equipment
CN110347745B (en) Time service authentication method, device and equipment for block chain type account book
CN111245897B (en) Data processing method, device, system, storage medium and processor
CN109934584B (en) Block chain account transaction method and equipment
CN114598749A (en) Service access method and device
CN113704211B (en) Data query method and device, electronic equipment and storage medium
CN109818965B (en) Personal identity verification device and method
CN104426657A (en) Service authentication method and system, server
CN114117482A (en) Database encryption method and device, electronic equipment and storage medium
CN113792307A (en) Seal management method and device and electronic equipment
CN110851851B (en) Authority management method, device and equipment in block chain type account book
CN111291393A (en) Request checking method and device
CN111292082B (en) Public key management method, device and equipment in block chain type account book
CN113642046A (en) Method and equipment for issuing operation and maintenance lists in batches
CN112395591A (en) Encryption method and system
CN113342763B (en) Distributed data synchronization method, equipment and medium based on IPFS
CN114500109B (en) Processing method and system for product registration platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 1101-1103, No. 433, Songhu Road, Yangpu District, Shanghai

Applicant after: Shanghai wanwansheng Environmental Protection Technology Group Co.,Ltd.

Address before: Room 1101-1103, No. 433, Songhu Road, Yangpu District, Shanghai

Applicant before: SHANGHAI YUEYI NETWORK INFORMATION TECHNOLOGY Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200616