CN113259319B - Verification processing method and system - Google Patents
Verification processing method and system Download PDFInfo
- Publication number
- CN113259319B CN113259319B CN202110390373.4A CN202110390373A CN113259319B CN 113259319 B CN113259319 B CN 113259319B CN 202110390373 A CN202110390373 A CN 202110390373A CN 113259319 B CN113259319 B CN 113259319B
- Authority
- CN
- China
- Prior art keywords
- client
- verification
- verification processing
- service end
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The application provides a verification processing method and a verification processing system, relates to the technical field of network security, and aims to solve the problem that a service end does not allow a client to be accessed due to downtime of a verification processing end in the related art. The verification processing method comprises the following steps: the client sends a verification request to the verification processing end, the client judges whether to establish effective connection with the verification processing end according to the corresponding verification request, and if yes, the client generates first information; the client acquires an operation result based on the first information, verifies whether the operation result is correct, and if so, generates a security certificate indicating that the user state is normal; the client sends the security credentials to the service, which allows the client access based on the security credentials. Under the condition that the verification processing end is down, the service end can allow the client to be accessed according to the security certificate generated by the client, so that the client can be normally used.
Description
Technical Field
The present disclosure relates to the field of network security, and in particular, to a method and system for authentication processing.
Background
With the rapid development of computer technology, network security issues are also becoming increasingly interesting. The increase of the access amount of the user brings pressure to the protection of information security, and abnormal users can continuously log in and access the website or the platform and simulate the network attack of the normal users on the network or the platform.
In the related art, the verification processing end is configured to determine whether the state of the user of the client is normal, and if yes, notify the service end to allow the client to access. However, under the condition that the verification processing end is down, the service end cannot receive the corresponding notification from the verification processing end, so that the service end cannot allow the client to be accessed, and the client cannot be normally used.
At present, no effective solution is proposed for solving the problem that the service end does not allow the client to be accessed due to downtime of the verification processing end in the related technology.
Disclosure of Invention
The embodiment of the application provides a verification processing method and a verification processing system, wherein under the condition that a verification processing end is down, a service end can allow a client to be accessed according to a security credential generated by the client, so that the client can be normally used.
In a first aspect, an embodiment of the present application provides a method for verifying a process, where the method includes:
the client sends a verification request to a verification processing end;
the client side responds to the verification request to judge whether to establish effective connection with the verification processing side, and if yes, the client side generates first information;
the client acquires an operation result based on the first information, verifies whether the operation result is correct, and if so, generates a security credential indicating that the user state is normal;
the client sends the security credentials to a service, which allows the client access based on the security credentials.
In some embodiments, the client determining whether to establish an active connection with the authentication processing side includes:
and the service end judges whether to establish effective connection with the verification processing end, if so, the client is refused to access, and if not, the client is allowed to access.
In some of these embodiments, the first information includes:
and the service end decrypts the security certificate, judges whether the decrypted security certificate is legal, if so, allows the client to be accessed, and if not, refuses the client to be accessed.
In some of these embodiments, the method further comprises:
the service end obtains the generation time and the receiving time of the security credentials;
and the service end judges whether the duration from the generation time of the security credentials to the receiving time of the security credentials is within a preset value, if so, the client is allowed to be accessed, and if not, the client is refused to be accessed.
In some of these embodiments, the method further comprises:
and the service end judges whether the database has the same data as the security credentials, if so, the access of the client is refused, and if not, the access of the client is allowed and the security credentials are stored in the database.
In some of these embodiments, the method further comprises:
and when the feedback information received by the client is on time and/or correct, the client establishes an effective connection with the verification processing end, wherein the feedback information is generated by responding to the verification request sent by the client through the verification processing end.
In some of these embodiments, the method further comprises:
the first information includes: the first two pictures and the answer, wherein the first two pictures carry any one or more combinations of arithmetic, chinese character groups, english groups and digital groups.
In a second aspect, embodiments of the present application provide a system for authentication processing, the system comprising: client, service end and verification processing end:
the client is used for judging whether effective connection is established with the verification processing end, and if yes, the client generates first information;
the client is used for acquiring an operation result based on the first information, verifying whether the operation result is correct, and if so, generating a security certificate indicating that the user state is normal;
the client is used for sending the security certificate to a service end;
the service end is used for allowing the client to access based on the security credentials.
Compared with the related art, the invention has the beneficial effects that: under the condition that the verification processing end is down, the client side automatically verifies and generates a security certificate, and the service side allows the client side to be accessed according to the security certificate generated by the client side, so that the problem that verification is interrupted due to the fact that the verification processing end is down is solved, and verification service is realized.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
FIG. 1 is a flow chart of a verification processing method shown in accordance with an embodiment of the present application;
fig. 2 is a flowchart of step S105 shown in accordance with an embodiment of the present application;
FIG. 3 is a flow chart of a second implementation of step S105 according to an embodiment of the present application;
FIG. 4 is a flow chart of a third implementation of step S105 according to an embodiment of the present application;
FIG. 5 is a flow chart of a fourth implementation of step S105 according to an embodiment of the present application;
FIG. 6 is a flowchart of a fifth implementation of step S105 according to an embodiment of the present application;
FIG. 7 is a block diagram of a verification processing system shown in accordance with an embodiment of the present application;
reference numerals illustrate: 71. a client; 72. a service end; 73. and verifying the processing end.
DETAILED DESCRIPTION OF EMBODIMENT (S) OF INVENTION
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described and illustrated below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden on the person of ordinary skill in the art based on the embodiments provided herein, are intended to be within the scope of the present application. Moreover, it should be appreciated that while such a development effort might be complex and lengthy, it would nevertheless be a routine undertaking of design, fabrication, or manufacture for those of ordinary skill having the benefit of this disclosure, and thus should not be construed as having the benefit of this disclosure.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is to be expressly and implicitly understood by those of ordinary skill in the art that the embodiments described herein can be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms used herein should be given the ordinary meaning as understood by one of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar terms herein do not denote a limitation of quantity, but rather denote the singular or plural. The terms "comprising," "including," "having," and any variations thereof, are intended to cover a non-exclusive inclusion; for example, a sequence of steps, methods, systems, articles of manufacture, or apparatus, not limited to the list of steps, but may include other steps or elements not listed or inherent to such process, method, article of manufacture, or apparatus. The terms "connected," "coupled," and the like in this application are not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as used herein means greater than or equal to two. "and/or" describes an association relationship of an association object, meaning that there may be three relationships, e.g., "a and/or B" may mean: a exists alone, A and B exist together, and B exists alone. The terms "first," "second," "third," and the like, as used herein, are merely distinguishing between similar objects and not representing a particular ordering of objects.
The embodiment provides a verification processing method, which solves the problem that a service end does not allow a client to be accessed due to downtime of a verification processing end in the related art.
Fig. 1 is a flowchart of a verification processing method according to an embodiment of the present application, and referring to fig. 1, the method may include steps S101 to S105.
Step S101, the client sends a verification request to the verification processing end.
Step S102, the client side corresponding to the verification request judges whether to establish effective connection with the verification processing end, if not, step S103 is executed.
In step S103, the client generates first information.
Step S104, the client acquires the operation result based on the first information and verifies whether the operation result is correct, if so, step S105 is executed.
Step S105, the client generates a security credential indicating that the user state is normal and sends the security credential to the service end, and the service end receives the security credential and allows the client to access based on the security credential.
In summary, in the verification processing method, when the verification processing terminal is down, the verification processing system enters a degradation mode, that is, the client side verifies and generates the security credentials by itself, and the service side allows the client side to access according to the security credentials generated by the client side. Therefore, in the degradation mode, the verification service can be ensured to normally run, so that the client executes the corresponding program based on the service end.
As an optional embodiment, in step S102, in the case that the client determines that an active connection is established with the authentication processing side, the authentication processing system executes step S106, and the authentication processing system enters the standard mode in step S106. In the standard mode, the verification processing end receives a verification request and returns second information for verification to the client in response to the verification request; the client acquires an operation result based on the second information and sends the operation result to the verification processing end; the verification processing end receives and verifies the operation result based on the second information, and then sends the verification result to the service end; the service end can judge whether the client is allowed to be accessed according to the verification result.
It is worth noting here that the authentication processing system can perform authentication services in both the degraded mode and the standard mode. The authentication service in the degraded mode is identical in user operation to the authentication service in the standard mode, but requires more elements to be authenticated than the authentication service in the degraded mode, for example, due to the running pressure of the client side: in the case where the user operates the slider for slide verification, in the degraded mode, the element to be verified may include the final position where the slider stays, and in the standard mode, the element to be verified may include the final position where the slider stays, the moving track of the slider, the time required for verification, and the like. In summary, the security of the verification service in the standard mode is higher than the security of the verification service in the degraded mode, so that the verification processing system enters the standard mode under the condition that the verification processing terminal is not down, so as to reduce the pressure of the client terminal and improve the security of the verification service.
As an alternative embodiment, in step S102, the client establishes an active connection with the authentication processing end in case the feedback information received by the client is on time and/or correct, wherein the feedback information is generated via the authentication processing end in response to the authentication request sent by the client.
Specifically, the client sends a verification request to the verification processing end, the verification processing end generates feedback information to the client according to the verification request, however, when the feedback information received by the client is overtime or not received, the connection between the verification processing end and the client may be abnormal or the program of the verification processing end may be abnormal, and accordingly, the client determines that effective connection is not established with the verification processing end; if the feedback information received by the client is incorrect, the program of the verification processing end may be abnormal, and accordingly, the client also determines that effective connection is not established with the verification processing end. And if the client judges that the client is not in effective connection with the verification processing end, the client judges that the verification processing end is in a downtime state, and accordingly the verification processing system enters a degradation mode.
As an alternative embodiment, in step S103 and step S104, the first information may include a source picture, a slide, and a target position, where in a case where the slide coincides with the source picture, the position of the slide is the target position. Correspondingly, the client displays the sliding vane and the target position in the first information on the user operation interface, wherein the sliding vane is movable, and the target position is fixed, and it is worth to be noted that the client can obtain a corresponding operation result under the condition that the sliding vane is slid to any position. When the sliding vane stays at the target position, the operation result obtained by the client is correct, and the verification processing system executes step S105; when the sliding vane does not stay at the target position, the operation result obtained by the client is wrong, at this time, the client executes step S107, step S107 returns a verification failure to the client for the client, and accordingly, the client does not generate a security credential.
As an optional embodiment, in step S103 and step S104, the first information may further include a first second picture and an answer, where the first second picture carries any one or more combinations of an arithmetic group, a chinese character group, an english group, and a digital group, and the client displays the first second picture on a user operation interface, where the user operation interface further displays a result input box, and the user may fill in content in the result input box according to the first second picture. The client compares the filled content with the answer to judge whether the filled content is correct, if yes, the verification processing system executes step S105; if not, the authentication processing system executes step S107.
In the two embodiments related to the first information, the client may load the local picture and the picture related to the networked download to generate the first information, as long as the first information meets the corresponding requirements of the above embodiments.
In the two embodiments related to the first information, compared with the answer filling mode, the slide verification mode is faster, the client can quickly verify the operation result of the user, and the verification processing efficiency is improved; compared with a sliding vane verification mode, the answer filling mode has strong logic, is more accurate in state identification of a user, and can better enhance the verification safety. In actual operation, the first information is not limited to the above type, and the client may be set according to different requirements.
As an optional implementation manner, for step S105, after the service end allows the access of the client, the client may perform tasks such as login, registration, and jump linking.
In some of these embodiments, fig. 2 is a flowchart of step S105 shown in the embodiments of the present application, and referring to fig. 1 and fig. 2, step S105 may include steps S201 to S205.
In step S201, the client generates a security credential and performs encryption processing. The encryption process may be performed by using the prior art, and is not described in detail herein.
In step S202, the client sends the security credential to the service. The security credentials should also carry the client ID, the type of task, the time of generation of the security credentials, etc.
Step S203, the service end receives the security certificate and decrypts the security certificate. The decryption process may be performed by using the prior art, and is not described herein in detail, as long as it corresponds to the encryption process.
Step S204, the service end judges whether the decrypted security certificate is legal, if so, step S205 is executed.
In step S205, the service end allows the client access to the security credentials. The encryption and decryption operations may refer to the prior art, and are not described in detail herein.
In summary, in the verification processing method provided by the embodiment of the application, under the condition that the verification processing end is down, the client enters a degradation mode, and the security of the verification service can be improved on the basis of ensuring the normal execution of the verification service through the encryption processing of the security credential by the client and the decryption processing of the security credential by the service end.
Further, in step S204, if the service end determines that the decrypted security credential is not legal, step S206 is executed, where step S206 denies the access of the client to the service end and returns a verification failure to the client, so as to quickly notify the user of the verification result.
In some of these embodiments, fig. 3 is a flowchart of a second implementation of step S105 shown in the embodiments of the present application, and specifically, referring to fig. 1 and fig. 3, step S105 may include steps S301 to S305.
In step S301, the client generates a security credential.
In step S302, the client sends the security credential to the service.
In step S303, the service end receives the security credential.
Step S304, the business end judges whether to establish effective connection with the verification processing end, if not, the step S305 is executed. Specifically, the service end sends a confirmation request to the verification processing end, the verification processing end generates feedback information to the service end according to the confirmation request, however, under the condition that the feedback information received by the service end is overtime or not received, the connection between the verification processing end and the service end is possible to be abnormal or the program of the verification processing end is possible to be abnormal, and accordingly, the service end judges that effective connection is not established with the verification processing end; if the service end receives the feedback information incorrectly, the program of the verification processing end may be abnormal, and accordingly, the service end also determines that effective connection is not established with the verification processing end. And judging that the service end is not effectively connected with the verification processing end, and judging that the verification processing end is in a downtime state by the service end, and correspondingly, keeping a degradation mode by the verification processing system.
In step S305, the service end allows the client access to the security credentials.
In this embodiment, the service end confirms that the verification processing end is down. If the service end judges that the verification processing end has a downtime condition, the verification processing system continues to execute corresponding operation in a degradation mode; if the service end judges that the verification processing end does not have the downtime condition, the judgment is that the client end is in an abnormal state, and the verification processing system enters a standard mode. The service end confirms the downtime condition of the verification processing end, so that the verification processing system can be ensured to enter a correct mode, the verification processing system is prevented from entering a degradation mode due to abnormal states of the client, and the safety of verification service can be improved through the technical scheme.
Further, in step S305, it is determined at the service end that an effective connection is established with the authentication processing end, if yes, step S306 is performed, where the authentication processing system switches from the degraded mode to the standard mode.
In some of these embodiments, fig. 4 is a flowchart of a third implementation of step S105 according to the embodiments of the present application, and referring to fig. 1 and fig. 4, step S105 may include steps S401 to S407.
In step S401, the client generates a security credential and performs encryption processing.
In step S402, the client transmits the security credential to the service.
In step S403, the service end receives the security credential.
Step S404, the business end judges whether to establish effective connection with the verification processing end, if not, the step S405 is executed.
In step S405, the service end decrypts the security credential and obtains a decryption result.
Step S406, the service end judges whether the decryption result is legal, if yes, step S407 is executed.
In step S407, the service end allows the client access to the security credentials.
In summary, in the verification processing method provided by the embodiment of the application, the verification processing system judges whether the verification processing terminal is down for the second time and judges the validity of the security certificate, so that the security of the verification service is improved, and the problem of verification interruption caused by the down of the verification processing terminal is solved. It can be appreciated that the downtime confirmation step of the verification processing end is earlier than the decryption step, so that the verification processing system can switch back to the standard mode as soon as possible and avoid the invalid execution of the decryption step.
Further, in step S406, if the service end determines that the decryption result is not legal, step S408 is performed, where the service end returns a verification failure to the client.
Further, in step S404, in the case where the service end determines that an effective connection is established with the authentication processing end, step S409 is performed, where the authentication processing system enters the standard mode.
In some of these embodiments, fig. 5 is a flowchart of a fourth implementation of step S105 according to an embodiment of the present application, and referring to fig. 1 and fig. 5, step S105 may include steps S501 to S503.
In step S501, the service side obtains the security credential generation time and the receiving time. It should be noted that, the receiving time of the security credential is the time when the service end receives the security credential.
In step S502, the service end determines that the duration between the time of generating the security credential and the time of receiving the security credential is within a preset range, and if yes, step S503 is executed.
In step S503, the service end allows the client access to the security credentials.
In summary, in the verification processing method provided by the embodiment of the present application, when the verification processing end is down, the overtime of the security credential may be that when an abnormal user generates the security credential by using illegal program setting, crawling data is generated, and if the service end does not judge the duration between the generation time of the security credential and the receiving time of the security credential, the verification processing system cannot effectively identify the user state. Based on the problems, the embodiment can solve the problem that an abnormal user performs verification by crawling the security credentials by judging the generation time and the receiving time of the security credentials through the service end, and improves the security of a verification processing system.
Further, in step S502, if the service end determines that the duration between the time of generating the security credential and the time of receiving the security credential is not within the preset range, step S504 is executed, where the step is to return the verification failure to the client.
In some of these embodiments, fig. 6 is a flowchart of a fifth implementation of step S105 according to an embodiment of the present application, and referring to fig. 1 and fig. 6, step S105 may include steps S601 to S403.
Step S601, the business end judges whether the security certificate exists in the database, if not, the step S602 is executed. Specifically, the database can provide the functions of storing and inquiring the security credentials for the service end.
In step S602, the service-side security credentials are stored in the database.
In step S603, the service end allows the client access to the security credentials.
In summary, in the verification processing method provided by the embodiment of the application, under the condition that the verification processing end is down, the service end performs duplication removal processing on the security certificate, so that normal operation of the verification service is ensured. If the service end does not perform the deduplication process, the abnormal user can use the repeated security credentials to send to the service end, so that the security of the verification processing system is reduced.
Further, in step S601, in the case that the service side determines that the security credential exists in the database, step S604 is performed, where the verification failure is returned to the client.
The embodiment provides a verification processing system, which solves the problem of verification interruption caused by downtime of a verification processing end 73 in the related art. The system comprises a client 71, a service 72 and an authentication processing 73.
The client 71 is configured to send a verification request to the verification processing 73.
The client 71 is configured to determine whether to establish an effective connection with the authentication processing end 73 according to the authentication request, and if so, the client 71 generates first information.
The client 71 is configured to obtain an operation result based on the first information, and verify whether the operation result is correct, and if so, generate a security credential indicating that the user status is normal.
The client 71 is configured to send the security credentials to the service 72.
The service end 72 is used to allow the client 71 access based on the security credentials.
As an alternative embodiment, the client 71, the service 72 and the verification processing 73 in the verification processing system may cooperate to perform the method of any embodiment or group of embodiments described above.
It should be understood by those skilled in the art that the technical features of the above embodiments may be combined in any manner, and for brevity, all of the possible combinations of the technical features of the above embodiments are not described, however, they should be considered as being within the scope of the description provided herein, as long as there is no contradiction between the combinations of the technical features.
The foregoing examples represent only a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.
Claims (8)
1. A method of authentication processing, the method comprising:
the client sends a verification request to a verification processing end;
the verification processing end generates feedback information according to the verification request, the client judges whether to establish effective connection with the verification processing end according to the receiving condition of the feedback information, and if not, the client generates first information;
the client acquires an operation result based on the first information, judges whether the operation result is correct, and if so, generates a security credential indicating that the user state is normal;
the client sends the security certificate to the service end, the service end receives the security certificate, the service end judges whether to establish effective connection with the verification processing end, if not, the service end judges that the verification processing end is in a downtime state, at the moment, the verification processing system is in a degradation mode, the service end allows the client to be accessed based on the security certificate, when the service end judges that the effective connection is established with the verification processing end, the verification processing system is switched back to a standard mode from the degradation mode, in the standard mode, the verification processing end receives a verification request, and returns second information for verification to the client in response to the verification request; the client acquires an operation result based on the second information and sends the operation result to the verification processing end; the verification processing end receives and verifies the operation result based on the second information, and then sends the verification result to the service end; the service end can judge whether the client is allowed to be accessed according to the verification result.
2. The method according to claim 1, wherein the method further comprises:
and the service end decrypts the security certificate, judges whether the decrypted security certificate is legal, if so, allows the client to be accessed, and if not, refuses the client to be accessed.
3. The method according to claim 1, wherein the method further comprises:
the service end obtains the generation time and the receiving time of the security credentials;
and the service end judges that the duration from the generation time of the security certificate to the receiving time of the security certificate is within a preset range, if yes, the client is allowed to be accessed, and if not, the client is refused to be accessed.
4. The method according to claim 1, wherein the method further comprises:
and the service end judges whether the database has the same data as the security credentials, if so, the access of the client is refused, and if not, the access of the client is allowed and the security credentials are stored in the database.
5. A method according to any one of claims 1 to 4, wherein the client establishes an active connection with the authentication processing end in case the feedback information received by the client is on time and/or correct, wherein the feedback information is generated via the authentication processing end in response to an authentication request sent by the client.
6. The method according to any one of claims 1 to 4, wherein the first information comprises: the sliding piece comprises a first picture, a sliding piece and a target position, wherein the position of the sliding piece is the target position under the condition that the sliding piece is overlapped with the first picture.
7. The method according to any one of claims 1 to 4, wherein the first information comprises: the first two pictures and the answer, wherein the first two pictures carry any one or more combinations of arithmetic, chinese character groups, english groups and digital groups.
8. The verification processing system is characterized by comprising a client, a service end and a verification processing end;
the client is used for sending an authentication request to the authentication processing end;
the verification processing end generates feedback information according to the verification request, the client judges whether to establish effective connection with the verification processing end according to the receiving condition of the feedback information, and if not, the client generates first information;
the client is used for acquiring an operation result based on the first information, verifying whether the operation result is correct, and if so, generating a security certificate indicating that the user state is normal;
the client is used for sending the security credentials to the service end, the service end receives the security credentials, the service end judges whether to establish effective connection with the verification processing end, if not, the service end judges that the verification processing end is in a downtime state, at the moment, the verification processing system is in a degradation mode, the service end is used for allowing the client to be accessed based on the security credentials, when the service end judges that the effective connection is established with the verification processing end, the verification processing system is switched back to a standard mode from the degradation mode, in the standard mode, the verification processing end receives a verification request, and returns second information for verification to the client in response to the verification request; the client acquires an operation result based on the second information and sends the operation result to the verification processing end; the verification processing end receives and verifies the operation result based on the second information, and then sends the verification result to the service end; the service end can judge whether the client is allowed to be accessed according to the verification result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110390373.4A CN113259319B (en) | 2021-04-12 | 2021-04-12 | Verification processing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110390373.4A CN113259319B (en) | 2021-04-12 | 2021-04-12 | Verification processing method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113259319A CN113259319A (en) | 2021-08-13 |
CN113259319B true CN113259319B (en) | 2023-05-12 |
Family
ID=77220747
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110390373.4A Active CN113259319B (en) | 2021-04-12 | 2021-04-12 | Verification processing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113259319B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104661213A (en) * | 2013-11-25 | 2015-05-27 | 上海益尚信息科技有限公司 | Novel unit and user equipment for providing scheduled network resources by WiFi network |
CN109274750A (en) * | 2018-10-07 | 2019-01-25 | 杭州安恒信息技术股份有限公司 | A method of it is normally accessed based on user after the broken string of cloud platform guarantee website online |
CN109815656A (en) * | 2018-12-11 | 2019-05-28 | 平安科技(深圳)有限公司 | Login authentication method, device, equipment and computer readable storage medium |
CN110620750A (en) * | 2018-06-20 | 2019-12-27 | 宁德师范学院 | Network security verification method of distributed system |
CN111241518A (en) * | 2020-01-03 | 2020-06-05 | 北京字节跳动网络技术有限公司 | User authentication method, device, equipment and medium |
US10764294B1 (en) * | 2016-03-10 | 2020-09-01 | Amazon Technologies, Inc. | Data exfiltration control |
CN112422532A (en) * | 2020-11-05 | 2021-02-26 | 腾讯科技(深圳)有限公司 | Business communication method, system, device and electronic equipment |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100556042C (en) * | 2006-03-10 | 2009-10-28 | 腾讯科技(深圳)有限公司 | A kind of accounts security management system and method based on instant messaging |
US20170201799A1 (en) * | 2014-11-06 | 2017-07-13 | Matt McDermott | Verifying and authorizing work |
CN105553674B (en) * | 2016-01-11 | 2019-06-18 | 飞天诚信科技股份有限公司 | A kind of interactive system, intelligent cipher key equipment, server and working method |
CN107979467B (en) * | 2016-10-21 | 2020-07-21 | 中国移动通信有限公司研究院 | Verification method and device |
CN109583187B (en) * | 2018-11-16 | 2022-11-18 | 中共中央办公厅电子科技学院 | Augmented reality verification code method and application |
CN112580012A (en) * | 2020-12-25 | 2021-03-30 | 广州凡科互联网科技股份有限公司 | Man-machine identification method based on sliding jigsaw verification code |
-
2021
- 2021-04-12 CN CN202110390373.4A patent/CN113259319B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104661213A (en) * | 2013-11-25 | 2015-05-27 | 上海益尚信息科技有限公司 | Novel unit and user equipment for providing scheduled network resources by WiFi network |
US10764294B1 (en) * | 2016-03-10 | 2020-09-01 | Amazon Technologies, Inc. | Data exfiltration control |
CN110620750A (en) * | 2018-06-20 | 2019-12-27 | 宁德师范学院 | Network security verification method of distributed system |
CN109274750A (en) * | 2018-10-07 | 2019-01-25 | 杭州安恒信息技术股份有限公司 | A method of it is normally accessed based on user after the broken string of cloud platform guarantee website online |
CN109815656A (en) * | 2018-12-11 | 2019-05-28 | 平安科技(深圳)有限公司 | Login authentication method, device, equipment and computer readable storage medium |
CN111241518A (en) * | 2020-01-03 | 2020-06-05 | 北京字节跳动网络技术有限公司 | User authentication method, device, equipment and medium |
CN112422532A (en) * | 2020-11-05 | 2021-02-26 | 腾讯科技(深圳)有限公司 | Business communication method, system, device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN113259319A (en) | 2021-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108551443B (en) | Application login method and device, terminal equipment and storage medium | |
EP3429243B1 (en) | Remote management method and device | |
CN107196901B (en) | Identity registration and authentication method and device | |
WO2017054292A1 (en) | Virtual sim card service authorization method, terminal, server, and system | |
CN105516135B (en) | Method and device for account login | |
CN106713302B (en) | Operating system updating method and device | |
JP2009087035A (en) | Encryption client device, encryption package distribution system, encryption container distribution system, encryption management server device, solftware module management device and software module management program | |
CN110266642A (en) | Identity identifying method and server, electronic equipment | |
CN113765906B (en) | Method, equipment and system for one-key login of terminal application program | |
CN108959990B (en) | Two-dimensional code verification method and device | |
CN112788593B (en) | Updating method, device and system of security policy | |
AU2014256198A1 (en) | Terminal, network side device, terminal application control method, and system | |
CN113259319B (en) | Verification processing method and system | |
CN111600888B (en) | Method and device for login verification and login verification system | |
CN113709729B (en) | Data processing method, device, network equipment and terminal | |
CN111132149A (en) | Registration method of 5G user terminal, user terminal equipment and medium | |
CN108429732B (en) | Method and system for acquiring resources | |
EP4027677A1 (en) | Mobile network access system and method, and storage medium, and electronic device | |
CN106685931B (en) | Smart card application management method and system, terminal and smart card | |
CN111132156B (en) | Registration method of 5G user terminal, user terminal equipment and medium | |
CN109889345B (en) | Data processing method and device, user terminal, management platform and service equipment | |
CN108200046B (en) | Registration method and device of terminal equipment, terminal equipment and proxy server | |
CN102065026A (en) | Device and method for authenticating object to be loaded | |
CN111163466A (en) | Method for 5G user terminal to access block chain, user terminal equipment and medium | |
CN104717235A (en) | Virtual machine resource detection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 311100 room 1201, block B, Zhengyuan wisdom building, Cangqian street, Yuhang District, Hangzhou City, Zhejiang Province Applicant after: Hangzhou Dingxiang Technology Co.,Ltd. Address before: 311100 room 1201, block B, Zhengyuan wisdom building, Cangqian street, Yuhang District, Hangzhou City, Zhejiang Province Applicant before: Top Elephant Technology Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |