CN113468508A - Information verification method, device, server and storage medium - Google Patents

Information verification method, device, server and storage medium Download PDF

Info

Publication number
CN113468508A
CN113468508A CN202110603855.3A CN202110603855A CN113468508A CN 113468508 A CN113468508 A CN 113468508A CN 202110603855 A CN202110603855 A CN 202110603855A CN 113468508 A CN113468508 A CN 113468508A
Authority
CN
China
Prior art keywords
code information
verification
verification code
server
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110603855.3A
Other languages
Chinese (zh)
Other versions
CN113468508B (en
Inventor
贾博宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dajia Internet Information Technology Co Ltd
Original Assignee
Beijing Dajia Internet Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dajia Internet Information Technology Co Ltd filed Critical Beijing Dajia Internet Information Technology Co Ltd
Priority to CN202110603855.3A priority Critical patent/CN113468508B/en
Publication of CN113468508A publication Critical patent/CN113468508A/en
Application granted granted Critical
Publication of CN113468508B publication Critical patent/CN113468508B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present disclosure relates to an information verification method, apparatus, server and storage medium, the method comprising: receiving an authentication request sent by a terminal, wherein the authentication request comprises: first identifying code information; searching second verification code information associated with the terminal from the local, and searching third verification code information associated with the terminal from a target server, wherein the third verification code information is generated by the target server or is synchronized to the target server by the verification server; and verifying the first verification code information, the second verification code information and the third verification code information, and comparing the first verification code information with one of the second verification code information and the third verification code information to obtain a verification result when the verification fails.

Description

Information verification method, device, server and storage medium
Technical Field
The present disclosure relates to the field of internet, and in particular, to an information verification method, apparatus, server, and storage medium.
Background
In the related art, the authentication of the authentication code information for any one terminal is performed by a single server. At present, means for verifying the verification code information of any one terminal by using a plurality of servers is lacking.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides an information verification method, apparatus, server, and storage medium to solve at least the problem in the related art that a means for verifying the verification code information of any one terminal by using a plurality of servers is lacking. The technical scheme of the disclosure is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided an information verification method, including:
receiving an authentication request sent by a terminal, wherein the authentication request comprises: first identifying code information;
searching second verification code information associated with the terminal from a local place, and searching third verification code information associated with the terminal from a target server, wherein the third verification code information is generated by the target server or is synchronized to the target server by the verification server;
and verifying the first verification code information, the second verification code information and the third verification code information, and comparing the first verification code information with one of the second verification code information and the third verification code information when verification fails to obtain a verification result.
In some embodiments, comparing the first captcha information with one of the second captcha information and the third captcha information to obtain a verification result comprises:
determining corresponding verification code information with the latest storage time in the second verification code information and the third verification code information;
and obtaining a verification result indicating successful verification under the condition that the first verification code information is the same as the corresponding verification code information with the latest storage time.
In some embodiments, after verifying the first verification code information, the second verification code information, the third verification code information, the method further comprises:
obtaining a verification result indicating successful verification under the condition that a verification success condition is met, wherein the verification success condition is as follows: the first verification code information, the second verification code information and the third verification code information are the same.
In some embodiments, the authentication request further comprises: index information associated with the terminal, the index information comprising: the identification of the terminal and the identification of the service function needing verification of the verification code information are carried out, and the service function is operated on the terminal; locally looking up second captcha information associated with the terminal, the looking up third captcha information associated with the terminal from a target server comprising:
based on the index information, searching the second verification code information from a local cache;
sending a search request including the index information to the target server, and receiving the third verification code information returned by the target server, wherein the target server searches the third verification code information from the cache of the target server based on the index information.
In some embodiments, the third verification code information is written into a preset message queue by the server generating the third verification code information, so as to be read from the preset message queue by other servers and stored in the cache of the other servers, wherein the server generating the third verification code information is one of the following: the verification server and the target server.
In some embodiments, the machine room in which the target server is located is different from the machine room in which the verification server is located, and the transmission amount of the verification code information between the machine room in which the target server is located and the machine room in which the verification server is located is smaller than the transmission amount threshold.
According to a second aspect of the embodiments of the present disclosure, there is provided an information authentication apparatus installed on an authentication server, the apparatus including:
the receiving module is configured to receive an authentication request sent by a terminal, wherein the authentication request comprises: first identifying code information;
the acquisition module is configured to locally search for second verification code information associated with the terminal, search for third verification code information associated with the terminal from a target server, the third verification code information being generated by the target server or synchronized to the target server by the verification server;
the verification module is configured to verify the first verification code information, the second verification code information and the third verification code information, and when the verification fails, compare the first verification code information with one of the second verification code information and the third verification code information to obtain a verification result.
In some embodiments, the verification module is further configured to determine the corresponding one of the second and third verification code information that is stored at the latest time; and obtaining a verification result indicating successful verification under the condition that the first verification code information is the same as the corresponding verification code information with the latest storage time.
In some embodiments, the apparatus further comprises:
a determining module configured to obtain a verification result indicating successful verification if a verification success condition is met after the first verification code information, the second verification code information, and the third verification code information are verified, where the verification success condition is: the first verification code information, the second verification code information and the third verification code information are the same.
In some embodiments, the authentication request further comprises: index information associated with the terminal, the index information comprising: the identification of the terminal and the identification of the service function needing verification of the verification code information are carried out, and the service function is operated on the terminal; the obtaining module is further configured to find out the second verification code information from a local cache based on the index information; sending a search request including the index information to the target server, and receiving the third verification code information returned by the target server, wherein the target server searches the third verification code information from the cache of the target server based on the index information.
In some embodiments, the third verification code information is written into a preset message queue by the server generating the third verification code information, so as to be read from the preset message queue by other servers and stored in the cache of the other servers, wherein the server generating the third verification code information is one of the following: the verification server and the target server.
In some embodiments, the machine room in which the target server is located is different from the machine room in which the verification server is located, and the transmission amount of the verification code information between the machine room in which the target server is located and the machine room in which the verification server is located is smaller than the transmission amount threshold.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
the method comprises the steps that a plurality of servers, namely a verification server and a target server, are used for verifying verification code information of any terminal, and when verification fails, the first verification code information, the second verification code information and the third verification code information can be verified, the first verification code information is compared with one of the second verification code information and the third verification code information to obtain a verification result, so that whether any terminal can be verified through the verification code information or not is comprehensively determined for any terminal.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow diagram illustrating one embodiment of a method for information verification, according to an exemplary embodiment;
fig. 2 is a block diagram showing the structure of an information authentication apparatus according to an exemplary embodiment;
fig. 3 is a block diagram illustrating a server architecture in accordance with an exemplary embodiment.
Detailed Description
In order to make the technical solutions of the present disclosure better understood by those of ordinary skill in the art, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein are capable of operation in sequences other than those illustrated or otherwise described herein. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
FIG. 1 is a flow diagram illustrating one embodiment of an information verification method in accordance with an exemplary embodiment. The method comprises the following steps:
step 101, receiving an authentication request sent by a terminal.
In the present disclosure, the authentication request includes: first verification code information.
In the present disclosure, the step 101-102 is an exemplary step executed in a one-time verification code information verification process for one terminal.
The first authentication code information may be authentication code information input by a user of the terminal. The first authentication code information may correspond to an identity of the terminal.
And 102, searching second verification code information associated with the terminal from the local, and searching third verification code information associated with the terminal from the target server.
In the present disclosure, a server closest to the authentication server among a plurality of servers in which the authentication code information authentication service is deployed may be set as the target server.
In some embodiments, the machine room in which the target server is located is different from the machine room in which the verification server is located, and the transmission amount of the verification code information between the machine room in which the target server is located and the machine room in which the verification server is located is smaller than the transmission amount threshold.
In this disclosure, the verification code information transmission amount between the machine room in which the target server is located and the machine room in which the verification server is located may be a sum of verification code information transmitted between the server in the machine room in which the target server is located and the server in the machine room in which the verification server is located within a preset time period.
In the present disclosure, the authentication code information authentication may be performed for the terminal using a plurality of servers, i.e., the authentication server and the target server, from different computer rooms. Meanwhile, the verification code information transmission quantity between the machine room where the target server is located and the machine room where the verification server is located is smaller than the transmission quantity threshold value, so that the situations that the target server is overloaded and the verification server is overloaded due to the fact that the verification code information is transmitted between the target server and the verification server can be avoided, and the stability of the target server and the verification server is improved.
In the present disclosure, for a terminal, the third authentication code information associated with the terminal is generated by the target server or synchronized to the target server by the authentication server. The third verification code information may be generated by the target server or the verification server, which is the server generating the third verification information, upon receiving a generation request transmitted by the terminal before performing step 101. The server that generates the third authentication code information may return the third authentication information to the terminal. Thus, the third authentication code information can be presented to the user at the terminal. Then, the user can input the first verification code information with reference to the presented third verification code information.
In the present disclosure, for a terminal, if the third validation code information associated with the terminal is generated by the validation server, the generated third validation code information associated with the terminal is sent to the target server by the validation server, in other words, the generated third validation code information associated with the terminal is synchronized to the target server by the validation server.
And if the target server generates the third verification code information associated with the terminal, the target server sends the generated third verification code information associated with the terminal to the verification server.
In some embodiments, the third verification code information associated with the terminal is written into the preset message queue by the server generating the third verification code information, so as to be read from the preset message queue by other servers and stored in the cache of other servers, wherein the server generating the third verification code information is one of the following: a verification server and a target server.
The other servers are servers except the server generating the third identifying code information, and the other servers may be from other machine rooms, where the other machine rooms are machine rooms except the machine room where the server generating the third identifying code information is located in the multiple machine rooms.
Through the preset message queue, any server in any other computer room can quickly acquire the third identifying code information, so that the third identifying code information can be quickly synchronized. Further, in the case where the target server and the authentication server come from different rooms, the third authentication code information can be quickly synchronized to the target server or the authentication server.
In the present disclosure, for any one server that generates a validation code message or receives a validation code message that is synchronized to the server, the server may store the validation code message using the cache of the server. The verification code information corresponds to an identifier of a terminal, if the server stores the verification code information by using a cache of the server, the cache on the server comprises historical verification code information corresponding to the identifier of the terminal, the historical verification code information is deleted, and then the verification code information is stored in the cache of the server. The historical captcha information is generated in a last captcha information verification process of a current captcha information verification process. In other words, the server stores the authentication code information by using the cache of the server, and if the cache on the server includes the historical authentication code information corresponding to the identifier of the terminal when the server stores the authentication code information by using the cache of the server, the authentication code information covers the historical authentication code information, so that the cache on the server can be ensured to store at most one authentication code information related to the terminal at any one time.
In the present disclosure, for a terminal, the authentication code information associated with the terminal stored in the cache of the authentication server when looking up the authentication code information from the local, i.e., the authentication server, may be referred to as second authentication code information associated with the terminal, and the authentication code information associated with the terminal stored in the cache of the target server when looking up the authentication code information associated with the terminal from the target server may be referred to as third authentication code information associated with the terminal.
In the disclosure, in a primary verification process of the verification code information for a terminal, when the verification server searches for the second verification code information associated with the terminal from a local verification server, that is, the verification server, the second verification code information associated with the terminal may be searched from a cache of the verification server, in the cache of the verification server, the second verification code information associated with the terminal may be stored in correspondence with an identifier of the terminal, and the stored verification code information corresponding to the identifier of the terminal may be determined as the second verification code information associated with the terminal according to the identifier of the terminal. When the authentication server searches for the third authentication code information associated with the terminal from the target server, the authentication server may transmit a search request including an identification of the terminal to the target server. After receiving the search request, the target server may search for the third verification code information associated with the terminal from the cache of the target server according to the identifier of the terminal. Then, the authentication server may receive third authentication code information associated with the terminal transmitted by the target server.
In some embodiments, the validation request further comprises: index information associated with a terminal, the index information comprising: the identification of the terminal and the identification of the service function needing verification of the verification code information are operated on the terminal; the second identifying code information associated with the terminal is searched locally, and the third identifying code information associated with the terminal is searched from the target server, wherein the searching comprises the following steps: based on the index information, second identifying code information associated with the terminal is searched from a local cache; and sending a search request comprising the index information to a target server, and receiving third verification code information which is returned by the target server and is associated with the terminal, wherein the target server searches the third verification code information from a cache of the target server based on the index information.
For a service function running on a terminal, if the service function is started and verification code information verification is required, the index information related to the terminal comprises an identifier of the service function.
For a terminal, for any service function which needs to be verified by the verification code information and runs on the terminal, corresponding second verification code information and corresponding third verification code information can be found out through index information, and verification code information verification aiming at any service function which needs to be verified by the verification code information and runs on the terminal is carried out according to the corresponding first verification code information, the corresponding second verification code information and the corresponding third verification code information.
And 103, verifying the first verification code information, the second verification code information and the third verification code information, and comparing the first verification code information with one of the second verification code information and the third verification code information to obtain a verification result when the verification fails.
When the first verification code information, the second verification code information and the third verification code information are verified, if the second verification code information is different from the third verification code information, it can be determined that the verification fails. The first verification code information is compared with one of the second verification code information and the third verification code information to obtain a verification result. For example, one piece of captcha information for comparison with the first captcha information may be randomly selected from the second captcha information and the third captcha information, and the captcha information for comparison with the first captcha information may be compared with the first captcha information. For another example, which of the second verification code information and the third verification code information is set in advance as the verification code information for comparison with the first verification code information.
In the present disclosure, when the first verification code information is identical to the verification code information for comparison with the first verification code information, a verification result indicating that the verification is successful may be obtained. When the first verification code information is different from the verification code information used for comparison with the first verification code information, a verification result indicating a verification failure may be obtained.
In the present disclosure, a plurality of servers, that is, a verification server and a target server, are used to verify the verification code information of any terminal, and when the first verification code information, the second verification code information, and the third verification code information are verified and the verification fails, the first verification code information may be compared with one of the second verification code information and the third verification code information to obtain a verification result, so that it is comprehensively determined whether any terminal can be verified by the verification code information.
In some embodiments, comparing the first captcha information with one of the second captcha information and the third captcha information to obtain the verification result comprises: determining corresponding verification code information with the latest storage time in the second verification code information and the third verification code information; and obtaining a verification result indicating successful verification under the condition that the first verification code information is the same as the corresponding verification code information with the latest storage time.
The corresponding verification code information with the latest storage time is the verification code information which is stored on the corresponding server latest, and the verification code information with the latest storage time in the first verification code information, the second verification code information and the third verification code information is the verification code information which is stored on the corresponding server latest, so that the accuracy of the obtained verification result is ensured.
In some embodiments, after verifying the first verification code information associated with the terminal, the second verification code information associated with the terminal, and the third verification code information associated with the terminal, further comprising: obtaining a verification result indicating successful verification under the condition that a verification success condition is met, wherein the verification success condition is as follows: the first identifying code information, the second identifying code information and the third identifying code information are the same.
After verifying the first verification code information associated with the terminal, the second verification code information associated with the terminal, and the third verification code information associated with the terminal, if the first verification code information, the second verification code information, and the third verification code information are the same, that is, any two of the first verification code information, the second verification code information, and the third verification code information are the same, a verification result that the verification is successful can be obtained.
In the disclosure, after verifying the first verification code information associated with the terminal, the second verification code information associated with the terminal, and the third verification code information associated with the terminal, the verification success is determined only if any two of the first verification code information, the second verification code information, and the third verification code information are the same, and a verification result of the verification success is obtained, thereby ensuring the accuracy of the obtained verification result.
Fig. 2 is a block diagram illustrating a structure of an information authentication apparatus according to an exemplary embodiment. Referring to fig. 2, the information authentication apparatus is installed on an authentication server, and the information authentication apparatus includes: the system comprises a receiving module 201, an obtaining module 202 and a verifying module 203.
The receiving module 201 is configured to receive an authentication request sent by a terminal, where the authentication request includes: first identifying code information;
the obtaining module 202 is configured to locally search for second verification code information associated with the terminal, search for third verification code information associated with the terminal from a target server, the third verification code information being generated by the target server or synchronized to the target server by the verification server;
the verification module 203 is configured to verify the first verification code information, the second verification code information, and the third verification code information, and when the verification fails, compare the first verification code information with one of the second verification code information and the third verification code information to obtain a verification result.
In some embodiments, the verification module 203 is further configured to determine the corresponding one of the second and third verification code information that has the latest time of storage; and obtaining a verification result indicating successful verification under the condition that the first verification code information is the same as the corresponding verification code information with the latest storage time.
In some embodiments, the apparatus further comprises:
a determining module configured to obtain a verification result indicating successful verification if a verification success condition is met after the first verification code information, the second verification code information, and the third verification code information are verified, where the verification success condition is: the first verification code information, the second verification code information and the third verification code information are the same.
In some embodiments, the authentication request further comprises: index information associated with the terminal, the index information comprising: the identification of the terminal and the identification of the service function needing verification of the verification code information are carried out, and the service function is operated on the terminal; the obtaining module 202 is further configured to find out the second verification code information from a local cache based on the index information; sending a search request including the index information to the target server, and receiving the third verification code information returned by the target server, wherein the target server searches the third verification code information from the cache of the target server based on the index information.
In some embodiments, the third verification code information is written into a preset message queue by the server generating the third verification code information, so as to be read from the preset message queue by other servers and stored in the cache of the other servers, wherein the server generating the third verification code information is one of the following: the verification server and the target server.
In some embodiments, the machine room in which the target server is located is different from the machine room in which the verification server is located, and the transmission amount of the verification code information between the machine room in which the target server is located and the machine room in which the verification server is located is smaller than the transmission amount threshold.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 3 is a block diagram illustrating a server architecture in accordance with an exemplary embodiment. Referring to FIG. 3, the server includes a processing component 322 that further includes one or more processors and memory resources, represented by memory 332, for storing instructions, such as application programs, that are executable by the processing component 322. The application programs stored in memory 332 may include one or more modules that each correspond to a set of instructions. Further, the processing component 322 is configured to execute instructions to perform the information verification method described above.
The server may also include a power component 326 configured to perform power management of the server, a wired or wireless network interface 350 configured to connect the server to a network, and an input/output (I/O) interface 358. The server may operate based on an operating system stored in memory 332, such as Windows Server, MacOS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
In an exemplary embodiment, there is also provided a storage medium comprising instructions, such as a memory comprising instructions, executable by a server to perform the above-described information verification method. Alternatively, the computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
In an exemplary embodiment, the present application further provides a computer program product comprising computer readable code which, when run on a server, causes the server to perform an information verification method.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (10)

1. An information verification method applied to a verification server, the method comprising:
receiving an authentication request sent by a terminal, wherein the authentication request comprises: first identifying code information;
searching second verification code information associated with the terminal from a local place, and searching third verification code information associated with the terminal from a target server, wherein the third verification code information is generated by the target server or is synchronized to the target server by the verification server;
and verifying the first verification code information, the second verification code information and the third verification code information, and comparing the first verification code information with one of the second verification code information and the third verification code information when verification fails to obtain a verification result.
2. The method of claim 1, wherein comparing the first captcha information with one of the second captcha information and the third captcha information to obtain a validation result comprises:
determining corresponding verification code information with the latest storage time in the second verification code information and the third verification code information;
and obtaining a verification result indicating successful verification under the condition that the first verification code information is the same as the corresponding verification code information with the latest storage time.
3. The method of claim 1, wherein after verifying the first verification code information, the second verification code information, and the third verification code information, the method further comprises:
obtaining a verification result indicating successful verification under the condition that a verification success condition is met, wherein the verification success condition is as follows: the first verification code information, the second verification code information and the third verification code information are the same.
4. The method of claim 1, wherein the authentication request further comprises: index information associated with the terminal, the index information comprising: the identification of the terminal and the identification of the service function needing verification of the verification code information are carried out, and the service function is operated on the terminal; locally looking up second captcha information associated with the terminal, the looking up third captcha information associated with the terminal from a target server comprising:
based on the index information, searching the second verification code information from a local cache;
sending a search request including the index information to the target server, and receiving the third verification code information returned by the target server, wherein the target server searches the third verification code information from the cache of the target server based on the index information.
5. The method of claim 1, wherein the third validation code information is written into a preset message queue by the server that generated the third validation code information, so as to be read from the preset message queue by other servers and stored in the cache of the other servers, wherein the server that generated the third validation code information is one of: the verification server and the target server.
6. The method according to any one of claims 1 to 5, wherein the machine room in which the target server is located is different from the machine room in which the verification server is located, and the transmission amount of the verification code information between the machine room in which the target server is located and the machine room in which the verification server is located is smaller than a transmission amount threshold.
7. An information authentication apparatus installed on an authentication server, the apparatus comprising:
a receiving module configured to receive an authentication request sent by a terminal, where the authentication request includes: first identifying code information;
an acquisition module configured to locally search for second captcha information associated with the terminal, and search for third captcha information associated with the terminal from a target server, the third captcha information being generated by the target server or synchronized to the target server by the validation server;
a verification module configured to verify the first verification code information, the second verification code information, and the third verification code information, and when verification fails, compare the first verification code information with one of the second verification code information and the third verification code information to obtain a verification result.
8. A server, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the method of any one of claims 1 to 6.
9. A storage medium in which instructions, when executed by a processor of a server, enable the server to perform the method of any one of claims 1 to 6.
10. A computer program product comprising computer readable code which, when run on a server, causes the server to perform the method of any of claims 1 to 6.
CN202110603855.3A 2021-05-31 2021-05-31 Information verification method, device, server and storage medium Active CN113468508B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110603855.3A CN113468508B (en) 2021-05-31 2021-05-31 Information verification method, device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110603855.3A CN113468508B (en) 2021-05-31 2021-05-31 Information verification method, device, server and storage medium

Publications (2)

Publication Number Publication Date
CN113468508A true CN113468508A (en) 2021-10-01
CN113468508B CN113468508B (en) 2024-05-28

Family

ID=77871751

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110603855.3A Active CN113468508B (en) 2021-05-31 2021-05-31 Information verification method, device, server and storage medium

Country Status (1)

Country Link
CN (1) CN113468508B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243159A (en) * 2014-07-01 2014-12-24 小米科技有限责任公司 Verification method, server and terminal for service operation
CN105592005A (en) * 2014-10-22 2016-05-18 腾讯科技(深圳)有限公司 Safety verification method, apparatus, and system
EP3232385A1 (en) * 2016-04-14 2017-10-18 Beijing Xiaomi Mobile Software Co., Ltd. Method, device and system for executing business process
CN109995748A (en) * 2018-10-29 2019-07-09 刘高峰 A kind of identifying code processing method, equipment and system
CN110113346A (en) * 2019-05-14 2019-08-09 重庆商勤科技有限公司 A kind of network verification method, user terminal and server
CN111741469A (en) * 2020-06-11 2020-10-02 上海闻泰电子科技有限公司 Information security verification method, device, equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243159A (en) * 2014-07-01 2014-12-24 小米科技有限责任公司 Verification method, server and terminal for service operation
CN105592005A (en) * 2014-10-22 2016-05-18 腾讯科技(深圳)有限公司 Safety verification method, apparatus, and system
EP3232385A1 (en) * 2016-04-14 2017-10-18 Beijing Xiaomi Mobile Software Co., Ltd. Method, device and system for executing business process
CN109995748A (en) * 2018-10-29 2019-07-09 刘高峰 A kind of identifying code processing method, equipment and system
CN110113346A (en) * 2019-05-14 2019-08-09 重庆商勤科技有限公司 A kind of network verification method, user terminal and server
CN111741469A (en) * 2020-06-11 2020-10-02 上海闻泰电子科技有限公司 Information security verification method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN113468508B (en) 2024-05-28

Similar Documents

Publication Publication Date Title
US10073916B2 (en) Method and system for facilitating terminal identifiers
CN109257427B (en) Service processing method and system based on block chain
US10621651B2 (en) Automatic recharge system and method, and server
CN111275438B (en) Consensus method, device, equipment and storage medium of block chain network
CN110599346A (en) Block chain information acquisition method and related equipment
CN111770355A (en) Media server determination method, device, server and storage medium
KR102168164B1 (en) Matching processing apparatus between user and a/s company based on condition and operating method thereof
CN108769118B (en) Method and device for selecting master nodes in distributed system
CN108449308A (en) Identify the method and device that malice resource accesses
CN114006749B (en) Security verification method, device, equipment and storage medium
CN115017409A (en) Method, device and equipment for generating fault solution guide and storage medium
CN116170331B (en) API asset management method, device, electronic equipment and storage medium
CN113468508B (en) Information verification method, device, server and storage medium
CN111818025A (en) User terminal detection method and device
CN113297583B (en) Vulnerability risk analysis method, device, equipment and storage medium
CN106888195B (en) Verification method and device
CN114489772A (en) Workflow execution method and device, storage medium and equipment
CN114422576A (en) Session cleaning method and device, computer equipment and readable storage medium
CN110460585B (en) Equipment identity identification method and device, computer equipment and storage medium
CN111861613B (en) Electronic lock operation recording method and device
CN112711531A (en) Use case construction method, use case construction device, and readable storage medium
US20170318100A1 (en) Smart location determination
CN114844859B (en) Domain name configuration method, device, electronic equipment and storage medium
CN110287265B (en) Login request processing method and device, server and readable storage medium
CN114489763A (en) Data acquisition method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant