CN111464540A - User behavior and data authenticity verification method and device for e-commerce platform page - Google Patents
User behavior and data authenticity verification method and device for e-commerce platform page Download PDFInfo
- Publication number
- CN111464540A CN111464540A CN202010247349.0A CN202010247349A CN111464540A CN 111464540 A CN111464540 A CN 111464540A CN 202010247349 A CN202010247349 A CN 202010247349A CN 111464540 A CN111464540 A CN 111464540A
- Authority
- CN
- China
- Prior art keywords
- type
- response request
- response
- code
- check code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 18
- 238000012795 verification Methods 0.000 title description 3
- 230000004044 response Effects 0.000 claims abstract description 197
- 238000001514 detection method Methods 0.000 claims abstract description 32
- 238000001914 filtration Methods 0.000 claims description 17
- 230000006399 behavior Effects 0.000 description 13
- 230000005540 biological transmission Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0641—Shopping interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention provides a method and a device for verifying user behavior and data authenticity of an e-commerce platform page, which comprise the following steps: after receiving the operation instruction, the interface terminal generates a check code according to the operation instruction; the interface end sends a check code to an interface server; the interface server generates a response code according to the check code, and the response code is sent back to the interface end; the interface terminal generates a first type of response request according to the response code, the first type of response request is sent to the IP gateway, the IP gateway receives the first type of response request, then identifies and filters the first type of response request, generates a second type of response request, and sends the second type of response request to the background server; the background server judges the legality of the second type of response request; through the addition of the check code and the response code, the detection of the user behavior and the data authenticity can be accurately carried out through the addition of the check code and the response code, and the stability of the page request is well guaranteed.
Description
Technical Field
The invention relates to the technical field of networks, in particular to a method and a device for verifying user behaviors and data authenticity of an e-commerce platform page.
Background
Today, network e-commerce is an indispensable part, a plurality of links often appear in the existing network e-commerce, and after a traditional page link request is captured by a hacker or a baddie, the same link is requested repeatedly in a large quantity, so that a server of an e-commerce platform is blocked, impact is caused on a database, and a plurality of abnormal data are generated;
the prior art has the following technical problems: the request of the page cannot be guaranteed to be stable, so that the robot or malicious programs are easy to explode and brush through the page interface, the benefits of companies are damaged, and the normal and safe experience of users is influenced.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a method and a device for verifying the user behavior and the data authenticity of an e-commerce platform page, and solves the problem that the request stability of the page cannot be guaranteed in the prior art.
The technical scheme of the invention is realized as follows: a user behavior and data authenticity checking method for an e-commerce platform page comprises the following steps:
after receiving the operation instruction, the interface terminal generates a check code according to the operation instruction;
the interface end sends a check code to an interface server;
the interface server generates a response code according to the check code, and the response code is sent back to the interface end;
the interface terminal generates a first type of response request according to the response code, the first type of response request is sent to the IP gateway, the IP gateway receives the first type of response request, then identifies and filters the first type of response request, generates a second type of response request, and sends the second type of response request to the background server;
and the background server judges the legality of the second type of response request.
Preferably, the interface server encrypts the check code according to an encryption algorithm, and generates the response code according to the encrypted check code.
Preferably, the first type response request and the second type response request include: an answer code, a timestamp, and an interface parameter.
Preferably, after receiving the first type response request, the IP gateway identifies and filters the IP address, the response code, the timestamp, and the interface parameter of the first type response request, and after the first type response request is identified and filtered, the IP gateway generates a second type response request according to the first type response request.
Preferably, the background server judges the validity of the second type of response request, and the validity judgment includes the following steps:
s00: judging whether the second type response request contains a response code;
s10: decrypting the response code to restore the check code;
s20: judging whether the check code is overdue;
s30: and judging whether the check code exists in the comparison server or not.
A device for verifying user behavior and data authenticity of an e-commerce platform page comprises an interface end, an interface server, an IP gateway and a background server;
the interface end is used for receiving an operation instruction and sending a first type of response request;
the interface server is used for receiving the check code and the return response code;
the IP gateway is used for identifying and filtering the first type of response request, and generating and sending a second type of response request;
the background server is used for judging the legality of the second type response request;
after receiving the operation instruction, the interface end sends a check code to an interface server; after receiving the check code, the interface server sends a response code to the interface end; after receiving the response code, the interface terminal sends a first type response request to the IP gateway; and after receiving the first type response request, the IP gateway sends a second type response request to the background server.
Preferably, the IP gateway includes: the IP gateway receives the first type response request, the identification unit identifies the first type response request and sends the first type response request to the filtering unit, the filtering unit filters the first type response request, and the filtered first type request generates a second type response request.
Preferably, the background server comprises: the device comprises a response code detection unit, a decryption unit, a check code detection unit, a comparison detection unit and an execution unit.
Preferably, after the background server receives the second type of response request, the response code detection unit judges whether the second type of response request contains the response code, and sends the second type of response request containing the response code to the decryption unit; after receiving the second type response request, the decryption unit decrypts the response code in the second type response request to obtain the check code, and then sends the second type response request decrypted with the check code to the check code detection unit; after receiving the second type response request, the check code detection unit judges whether the check code in the second type response request is overdue or not, and sends the second type response request with the check code being unexpired to the comparison detection unit; after receiving the second type response request, the comparison detection unit judges whether the check code of the second type response request exists in the comparison database or not, and sends the second type response request with the check code of the comparison database to the execution unit; and the execution unit executes after receiving the second type response request.
Compared with the prior art, the invention has the following advantages: by adding the check code and the response code, the encrypted transmission of data can be ensured from the time when the user clicks the interface end to the time when the background server responds, meanwhile, the measures of filtering invalid requests and judging whether the requests are legal or not are also provided, the detection of user behaviors and data authenticity can be accurately carried out, and the stability of page requests is well guaranteed.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is a main flow chart of a method for verifying user behavior and data authenticity of an e-commerce platform page according to the present invention;
FIG. 2 is a sub-flowchart of a method for verifying user behavior and data authenticity of an e-commerce platform page according to the present invention;
fig. 3 is a block diagram of a structure of a device for verifying user behavior and data authenticity of an e-commerce platform page in an embodiment of the present invention.
1. An interface server; 2. an interface terminal; a 3IP gateway; 31 an identification unit; 32 a filtration unit; 4, background server; 41 response code detection unit; 42 a decryption unit; 43 check code detection unit; 44 comparing the detection unit; 45 execution units.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Referring to fig. 1, a method and apparatus for verifying user behavior and data authenticity of an e-commerce platform page, and a storage medium, includes the following steps:
step 1: the user opens the interface end 2 and clicks the interface end 2, the interface end 2 receives an operation instruction after the user clicks, and meanwhile the interface end 2 generates a check code according to the operation instruction and sends the check code to the interface server 1;
step 2: the server generates a response code according to the check code and sends the response code back to the interface end 2;
and step 3: the interface end 2 generates a first type of response request according to the response code, sends the first type of response request to the IP gateway 3, the IP gateway 3 identifies and filters the first type of response request after receiving the first type of response request, generates a second type of response request, and sends the second type of response request to the background server 4;
and 4, the background server 4 judges the legality of the second type response request.
Furthermore, by adding the check code and the response code, the encrypted transmission of data can be ensured in the whole process from the time when the user clicks the interface end 2 to the time when the background server 4 responds, and meanwhile, the means of filtering invalid requests and judging whether legal requests exist is provided, so that the stability of page requests can be well ensured.
Further, in step 2, the interface server 1 encrypts the check code according to an encryption algorithm, and generates a response code according to the encrypted check code; the encryption of the check code is advantageous to prevent illegal means from capturing the link.
Further, in step 3, the first type of response request and the second type of response request sent by the interface terminal 2 to the backend include: response codes, timestamps, and interface parameters; the response code, the timestamp and the interface parameter are all key data used for subsequently judging whether the request is valid, and the stability of the key data can be better enhanced.
Further, in step 3, after receiving the first type of response request, the IP gateway 3 identifies and filters the IP address, the response code, the timestamp, and the interface parameter of the first response request, and after the first response request is identified and filtered, the IP gateway 3 generates a second type of response request according to the first response request; the IP gateway 3 carries out unique identification filtering according to the parameters after receiving the first type response request, and filters repeated requests, wherein the repeated requests are filtered, so that repeated requests are effectively prevented from repeatedly requesting the same link by illegal means.
Referring to fig. 2, in step 4, the background server 4 determines the validity of the second type of response request, where the validity determination includes the following steps:
s40: whether the second type response request contains a response code;
s41: decrypting the response code to restore the check code;
s42: judging whether the check code is overdue;
s43: and judging whether the check code exists in the comparison server or not.
The process firstly judges whether the request contains a response code, and decrypts the check code according to a specific decryption algorithm for a second type of response request containing the response code; judging whether the check code is expired or not, wherein the check code has time validity, and the check code is regarded as time valid within a preset time (such as 10 seconds); then, for the request that the check code is not overdue, judging whether the check code exists in a comparison server, if so, destroying the check code and judging that the request is a legal second-class response request to respond; the step can screen out response requests which do not contain response codes, have expired check codes and do not exist in the comparison server, can screen out most illegal requests, and realizes the verification of user behaviors and data authenticity and the user behaviors and data authenticity of the platform page.
Example two
Referring to fig. 3, an apparatus for verifying user behavior and data authenticity of an e-commerce platform page includes an interface terminal 2, an interface server 1, an IP gateway 3, and a background server 4; further, the interface end 2 and the interface server 1 may perform bidirectional data transmission, the interface end 2 may transmit data to the IP gateway 3 in a unidirectional manner, and the IP gateway 3 may transmit data to the background server 4 in a unidirectional manner.
The interface end 2 is used for receiving an operation instruction and sending a first type of response request;
the interface server 1 is used for receiving the check code and the return response code;
the IP gateway 3 is used for identifying and filtering the first type response request, generating and sending a second type response request;
the background server 4 is used for judging the legality of the second type response request;
after receiving the operation instruction, the interface end 2 sends a check code to the interface server 1; after receiving the check code, the interface server 1 sends a response code to the interface terminal 2; after receiving the response code, the interface terminal 2 sends a first type response request to the IP gateway 3; after receiving the first type response request, the IP gateway 3 sends a second type response request to the background server 4.
Further, the IP gateway 3 includes: the identification unit 31 and the filtering unit 32, after receiving the first type response request, the IP gateway 3 identifies by the identification unit 31 and sends to the filtering unit 32, and the filtering unit 32 filters the first type response request and generates a second type response request from the filtered first type request.
Further, the background server 4 includes: a response code detection unit 41, a decryption unit 42, a check code detection unit 43, a comparison detection unit 44, and an execution unit 45; the data transmission of the response code detection unit 41, the decryption unit 42, the check code detection unit 43, the comparison detection unit 44 and the execution unit 45 is hierarchical transmission, and the data is sequentially transmitted from the response code detection unit 41 to the decryption unit 42, the check code detection unit 43, the comparison detection unit 44 and the execution unit 45.
Further, after the background server 4 receives the second type response request, the response code detecting unit 41 determines whether the second type response request contains a response code, and sends the second type response request containing the response code to the decrypting unit 42; after receiving the second type response request, the decryption unit 42 decrypts the response code in the second type response request to obtain the check code, and then sends the second type response request decrypted with the check code to the check code detection unit 43; after receiving the second type response request, the check code detecting unit 43 determines whether the check code in the second type response request is expired, and sends the second type response request with the check code that is not expired to the comparison detecting unit 44; after receiving the second-class response request, the comparison detection unit 44 determines whether the check code of the second-class response request exists in the comparison database, and sends the second-class response request with the check code of the comparison database to the execution unit 45; the execution unit 45 receives the second type response request and then executes the second type response request.
Further, the filtering unit 32 performs unique identification filtering according to parameters included in the request after obtaining the request, and filters repeated requests.
Further, the step of judging whether the check code is legal by the processing module includes: whether a response code is contained; checking whether the code is overdue; and whether the check code exists in the comparison storage module or not is judged step by step. The process firstly judges whether the request contains a response code, and decrypts the check code for the request containing the response code according to a specific decryption algorithm; then, judging whether the check code is overdue or not; then, for the request that the check code is not overdue, judging whether the check code exists in a comparison module, if so, destroying the check code and judging that the request is a legal request to respond; .
Compared with the prior art, the invention has the following advantages: by adding the check code and the response code, the encrypted transmission of data can be ensured in the whole process from the moment that the user clicks the interface end 2 to the moment that the background server 4 responds, and meanwhile, the means of filtering invalid requests and judging whether legal requests exist are provided, so that the stability of page requests can be well guaranteed.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.
Claims (9)
1. A user behavior and data authenticity checking method for an e-commerce platform page is characterized by comprising the following steps:
after receiving the operation instruction, the interface terminal generates a check code according to the operation instruction;
the interface end sends the check code to an interface server;
the interface server generates a response code according to the check code, and the response code is sent back to the interface end;
the interface terminal generates a first type of response request according to the response code, the first type of response request is sent to an IP gateway, the IP gateway receives the first type of response request, then identifies and filters the first type of response request, generates a second type of response request, and sends the second type of response request to a background server;
and the background server judges the legality of the second type of response request.
2. The method for verifying the user behavior and the data authenticity of the e-commerce platform page as claimed in claim 1, wherein the interface server encrypts the check code according to an encryption algorithm and generates a response code according to the encrypted check code.
3. The method for verifying user behavior and data authenticity of an e-commerce platform page as claimed in claim 1, wherein the first type of response request and the second type of response request comprise: an answer code, a timestamp, and an interface parameter.
4. The method for verifying user behavior and data authenticity of an e-commerce platform page according to claim 3, wherein after the IP gateway receives a first type response request, the IP gateway identifies and filters an IP address, a response code, a timestamp and interface parameters of the first type response request, and after the first type response request is identified and filtered, the IP gateway generates a second type response request according to the first type response request.
5. The method for verifying the user behavior and the data authenticity of the e-commerce platform page as claimed in claim 1, wherein the background server judges the validity of the second type of response request, and the validity judgment comprises the following steps:
s00: judging whether the second type response request contains the response code;
s10: decrypting the response code to restore the check code;
s20: judging whether the check code is overdue or not;
s30: and judging whether the check code exists in the comparison server or not.
6. A device for verifying user behavior and data authenticity of an e-commerce platform page is characterized in that: the system comprises an interface end, an interface server, an IP gateway and a background server;
the interface end is used for receiving an operation instruction and sending the first type of response request;
the interface server is used for receiving the check code and the return response code;
the IP gateway is used for identifying and filtering the first type response request, and generating and sending the second type response request;
the background server is used for judging the validity of the second type response request;
after receiving the operation instruction, the interface terminal sends the check code to an interface server; after receiving the check code, the interface server sends the response code to the interface end; after receiving the response code, the interface end sends the first type response request to the IP gateway; and after receiving the first type response request, the IP gateway sends the second type response request to the background server.
7. The apparatus for verifying user behavior and data authenticity of an e-commerce platform page according to claim 6, wherein the IP gateway comprises: the IP gateway receives the first type response request, the identification unit identifies the first type response request and sends the first type response request to the filtering unit, the filtering unit filters the first type response request, and the filtered first type request is generated into a second type response request.
8. The apparatus for verifying user behavior and data authenticity of an e-commerce platform page as claimed in claim 6, wherein said backend server comprises: the device comprises a response code detection unit, a decryption unit, a check code detection unit, a comparison detection unit and an execution unit.
9. The device for checking the user behavior and the data authenticity of the e-commerce platform page according to claim 8, wherein after the background server receives the second type of response request, the response code detection unit judges whether the second type of response request contains the response code, and sends the second type of response request containing the response code to the decryption unit; after receiving the second type response request, the decryption unit decrypts a check code from a response code in the second type response request, and then sends the second type response request decrypted with the check code to the check code detection unit; after receiving the second type response request, the check code detection unit judges whether a check code in the second type response request is overdue or not, and sends the second type response request of which the check code is not overdue to a comparison detection unit; after receiving the second-class response request, the comparison detection unit judges whether the check code of the second-class response request exists in a comparison database or not, and sends the second-class response request with the check code of the comparison database to an execution unit; and the execution unit executes after receiving the second type response request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010247349.0A CN111464540A (en) | 2020-03-31 | 2020-03-31 | User behavior and data authenticity verification method and device for e-commerce platform page |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010247349.0A CN111464540A (en) | 2020-03-31 | 2020-03-31 | User behavior and data authenticity verification method and device for e-commerce platform page |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111464540A true CN111464540A (en) | 2020-07-28 |
Family
ID=71681343
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010247349.0A Pending CN111464540A (en) | 2020-03-31 | 2020-03-31 | User behavior and data authenticity verification method and device for e-commerce platform page |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111464540A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101808049A (en) * | 2010-03-25 | 2010-08-18 | 盈世信息科技(北京)有限公司 | Mail transmission method and system |
US20180069963A1 (en) * | 2015-08-31 | 2018-03-08 | Tencent Technology (Shenzhen) Company Limited | Voice communication processing method and system, electronic device, and storage medium |
CN109254734A (en) * | 2018-09-06 | 2019-01-22 | 郑州云海信息技术有限公司 | A kind of date storage method, device, equipment and computer readable storage medium |
CN110417719A (en) * | 2019-02-26 | 2019-11-05 | 腾讯科技(深圳)有限公司 | It logs in state and renews method, login method, device, server and terminal |
CN110611611A (en) * | 2019-09-26 | 2019-12-24 | 四川天邑康和通信股份有限公司 | Web security access method for home gateway |
-
2020
- 2020-03-31 CN CN202010247349.0A patent/CN111464540A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101808049A (en) * | 2010-03-25 | 2010-08-18 | 盈世信息科技(北京)有限公司 | Mail transmission method and system |
US20180069963A1 (en) * | 2015-08-31 | 2018-03-08 | Tencent Technology (Shenzhen) Company Limited | Voice communication processing method and system, electronic device, and storage medium |
CN109254734A (en) * | 2018-09-06 | 2019-01-22 | 郑州云海信息技术有限公司 | A kind of date storage method, device, equipment and computer readable storage medium |
CN110417719A (en) * | 2019-02-26 | 2019-11-05 | 腾讯科技(深圳)有限公司 | It logs in state and renews method, login method, device, server and terminal |
CN110611611A (en) * | 2019-09-26 | 2019-12-24 | 四川天邑康和通信股份有限公司 | Web security access method for home gateway |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110162936B (en) | Software content use authorization method | |
CN109243045B (en) | Voting method, voting device, computer equipment and computer readable storage medium | |
WO2021063068A1 (en) | Operation and maintenance control and operation and maintenance analysis method and apparatus, system, and storage medium | |
CN106534175B (en) | Open platform authorization identifying system and method based on OAuth agreement | |
CN106302328B (en) | Sensitive user data processing system and method | |
CN108737110B (en) | Data encryption transmission method and device for preventing replay attack | |
JP2018501567A (en) | Device verification method and equipment | |
CN108243176B (en) | Data transmission method and device | |
CN112380501B (en) | Equipment operation method, device, equipment and storage medium | |
CN110740140A (en) | network information security supervision system based on cloud platform | |
CN110035035B (en) | Secondary authentication method and system for single sign-on | |
CN117155716B (en) | Access verification method and device, storage medium and electronic equipment | |
CN113918977A (en) | User information transmission device based on Internet of things and big data analysis | |
CN111600864B (en) | Method and device for verifying access service interface based on token authentication multidimensional | |
CN112383577A (en) | Authorization method, device, system, equipment and storage medium | |
CN112688963A (en) | Method, device and storage medium for gateway authorized access and external open service | |
CN109587134B (en) | Method, apparatus, device and medium for secure authentication of interface bus | |
CN114938313B (en) | Man-machine identification method and device based on dynamic token | |
CN116112234A (en) | Electronic signing security verification method, system, medium and equipment | |
CN105100030B (en) | Access control method, system and device | |
CN107566410B (en) | Data security message request processing method and device | |
CN113992353B (en) | Login certificate processing method and device, electronic equipment and storage medium | |
CN112448920A (en) | Website access monitoring method, device, server and computer readable storage medium | |
CN112910883B (en) | Data transmission method and device and electronic equipment | |
CN111464540A (en) | User behavior and data authenticity verification method and device for e-commerce platform page |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200728 |
|
RJ01 | Rejection of invention patent application after publication |