CN114237678A - Component updating method and device, storage medium and computer equipment - Google Patents

Component updating method and device, storage medium and computer equipment Download PDF

Info

Publication number
CN114237678A
CN114237678A CN202111582738.XA CN202111582738A CN114237678A CN 114237678 A CN114237678 A CN 114237678A CN 202111582738 A CN202111582738 A CN 202111582738A CN 114237678 A CN114237678 A CN 114237678A
Authority
CN
China
Prior art keywords
component
verification code
update
parameter
updating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111582738.XA
Other languages
Chinese (zh)
Inventor
姚伟强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Pinwei Software Co Ltd
Original Assignee
Guangzhou Pinwei Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Pinwei Software Co Ltd filed Critical Guangzhou Pinwei Software Co Ltd
Priority to CN202111582738.XA priority Critical patent/CN114237678A/en
Publication of CN114237678A publication Critical patent/CN114237678A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • G06F8/656Updates while running
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The component updating method, the device, the storage medium and the computer equipment provided by the invention utilize each parameter in the component updating version to carry out hot updating on the corresponding parameter in the verification code component, and generate the corresponding verification code based on the verification code component after the hot updating; in the application, because the hot update can bypass the auditing process in the version updating process, the problem that appears in the application is repaired flexibly and quickly, therefore, the verification code component is updated by using the hot update mode, the access party is not required to input human cost, the real-time update can be carried out, and when the latest component updating version is utilized to update the verification code component, the client-side pre-configures the set running space for the verification code component, so that more functions can be updated simultaneously when the component is updated, such as verification code patterns, embedded point parameters, check bit logic and the like, and the diversified attack of hackers can be effectively defended by updating the verification code component in real time.

Description

Component updating method and device, storage medium and computer equipment
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a component update method, device, storage medium, and computer apparatus.
Background
At present, in order to ensure the security of information, authentication mechanisms such as an authentication code and the like are introduced into most of various application programs, wherein the authentication code is widely applied to various application programs as a public full-automatic program for distinguishing between a human machine and a human machine.
In the prior art, when the verification code is used for safety verification, the corresponding verification code is mainly generated according to the type of the verification code, the template pattern and the like issued by the server, when the pattern of the verification code or other parameters needs to be updated, the service front-end domain which needs to be accessed to the verification code service is accessed again, the input manpower in the process is large, the real-time performance is low, and the diversified attack of a hacker cannot be resisted.
Disclosure of Invention
The present invention is directed to solve at least one of the above technical drawbacks, and in particular, to solve the technical drawback that, in the prior art, when updating the pattern or other parameters of the verification code, the service front-end domain that needs to access the verification code service is re-accessed, the process is labor intensive, and has low real-time performance, and cannot resist diversified attacks by hackers.
The invention provides a component updating method, which comprises the following steps:
acquiring a latest component update version, wherein the component update version comprises a plurality of parameters;
utilizing each parameter in the component update version to perform hot update on the corresponding parameter in the verification code component, wherein the verification code component is configured with a set running space in advance;
and generating a corresponding verification code based on the verification code component after the hot updating.
Optionally, the parameters in the updated version of the component include a verification code of the latest style;
utilizing each parameter in the component update version to perform hot update on the corresponding parameter in the verification code component, comprising:
and carrying out hot updating on the verification code pattern in the verification code component by utilizing the verification code with the latest pattern.
Optionally, the parameters in the updated version of the component include latest embedded point parameters automatically acquired by the verification code component;
utilizing each parameter in the component update version to perform hot update on the corresponding parameter in the verification code component, comprising:
and carrying out hot updating on the embedded point parameters in the verification code component by utilizing the latest embedded point parameters automatically acquired by the verification code component.
Optionally, the parameters in the updated version of the component include latest parity bit logic;
utilizing each parameter in the component update version to perform hot update on the corresponding parameter in the verification code component, comprising:
and utilizing the latest check bit logic to perform hot updating on the check bit logic in the verification code component.
Optionally, the method further comprises:
comparing the update data corresponding to each parameter in the update version of the component with the original data corresponding to each parameter in the verification code component;
screening out data to be updated corresponding to each parameter in the verification code component according to a comparison result;
and carrying out hot updating on the data to be updated.
Optionally, the generating the corresponding verification code based on the verification code component after the thermal update includes:
receiving verification code generation parameters returned by the server;
and rendering the hot updated verification code component by using the verification code generation parameters to form a corresponding verification code.
Optionally, before the step of receiving the verification code generation parameter returned by the server, the method further includes:
and sending a verification code acquisition request and access data corresponding to the verification code acquisition request to a server.
The present invention also provides a component update apparatus, comprising:
the version acquisition module is used for acquiring a latest component update version, and the component update version comprises a plurality of parameters;
the component updating module is used for carrying out hot updating on corresponding parameters in the verification code component by utilizing each parameter in the component updating version, and the verification code component is configured with a set running space in advance;
and the verification code generating module is used for generating a corresponding verification code based on the verification code component after the hot update.
The present invention also provides a storage medium having stored therein computer readable instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of the component update method as described in any one of the above embodiments.
The present invention also provides a computer device comprising: one or more processors, and a memory;
the memory has stored therein computer readable instructions which, when executed by the one or more processors, perform the steps of the component update method as in any one of the above embodiments.
According to the technical scheme, the embodiment of the invention has the following advantages:
the component updating method, the device, the storage medium and the computer equipment provided by the invention firstly obtain the latest component updating version, then can utilize each parameter in the component updating version to carry out hot updating on the corresponding parameter in the verification code component, and generate the corresponding verification code based on the verification code component after the hot updating; in the application, because the hot update can bypass the auditing process in the version updating process, the problem that appears in the application is repaired flexibly and quickly, therefore, the verification code component is updated by using the hot update mode, the access party is not required to input human cost, the real-time update can be carried out, and when the latest component updating version is utilized to update the verification code component, the client-side pre-configures the set running space for the verification code component, so that more functions can be updated simultaneously when the component is updated, such as verification code patterns, embedded point parameters, check bit logic and the like, and the diversified attack of hackers can be effectively defended by updating the verification code component in real time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
FIG. 1 is a schematic flow chart of a component update method according to an embodiment of the present invention;
FIG. 2 is a page display diagram of a picture verification code according to an embodiment of the present invention;
FIG. 3 is a page display diagram of a problem verification code according to an embodiment of the present invention;
FIG. 4 is a page display diagram of a click verification code according to an embodiment of the present invention;
FIG. 5 is a page display diagram of direct interception provided by an embodiment of the present invention;
FIG. 6 is a schematic structural diagram of a component update apparatus according to an embodiment of the present invention;
fig. 7 is a schematic internal structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the prior art, when the verification code is used for safety verification, the corresponding verification code is mainly generated according to the type of the verification code, the template pattern and the like issued by the server, when the pattern of the verification code or other parameters needs to be updated, the service front-end domain which needs to be accessed to the verification code service is accessed again, the input manpower in the process is large, the real-time performance is low, and the diversified attack of a hacker cannot be resisted.
Based on this, the present invention provides a component upgrading method, see in particular below:
in one embodiment, as shown in fig. 1, fig. 1 is a schematic flow chart of a component updating method provided by an embodiment of the present invention; the invention provides a component updating method, which can comprise the following steps:
s110: and obtaining the latest updated version of the component.
In this step, the front-end page of the client is created through front-end development, and the front-end development mainly realizes the user interface interaction process of the internet product through HTML, CSS and JavaScript and various derived technologies, frames and solutions.
The client refers to an application program corresponding to the server and providing local services for the client. More common clients include web browsers used on the world wide web, e-mail clients for receiving and sending e-mails, clients for providing consumption services, and client software for instant messaging, for example. For different types of clients, corresponding services, such as database services, email services, consumption services, etc., may be provided through corresponding servers and service programs in the network. In addition, the client in the application can be installed in a desktop terminal or a mobile terminal, and the mobile terminal can be at least one of a mobile phone, a tablet computer, a notebook computer and the like.
When a developer performs hot update on a script module with a problem in a client, the updated script module can be pushed to the client after the test is passed. After receiving the updated script module, the client can compile the script module in real time, then use the reload to reload the corresponding module, after reloading, the program calls the new module when running, and generates a new object through the new module.
Due to the fact that the verification mechanism is introduced into the application program corresponding to the client side, when a user logs in or registers or retrieves a password and other related operations on a front-end page, the client side can request the server for verification code generation parameters according to the related operations triggered by the user, and generates corresponding verification codes according to the verification code generation parameters. Based on the method, the verification code component is configured in the client in advance, and the corresponding verification code can be obtained after the verification code component is rendered through the verification code generation parameter.
When various parameters in the verification code component need to be updated, the client can obtain the latest component update version and update the verification code component through the component update version.
Further, when the client acquires the component update version corresponding to the captcha component, in order to ensure that the current component update version is the latest version, the client may compare the acquired component update version with the version corresponding to the existing captcha component, determine whether the currently acquired component update version is the latest version, and update the current component update version with the version if the currently acquired component update version is the latest version.
Furthermore, the updated version of the component in the present application includes several parameters, such as the verification code pattern, the embedded point parameter, and the check bit logic. When any verification code type needs to be added/deleted/modified, or any new addition/deletion/modification to the embedded point range and the acquisition time of the front end is needed, the parameters can be updated only by updating the verification code component.
In addition, due to the implantation of front-end js, for example, a static domain can release a latest tracker. js version, a front-end basic component bootstrap. js can automatically acquire a latest component update version, the latest version can be executed only at a webpage end, and a specific verification code access scene does not need to be distinguished; moreover, the issuing of the component update version in the application can be controlled by a configuration center control, for example, to control the risk of a newly issued js component, a gray control strategy is used, and the latest component update version is gradually performed in full.
Note that, the static domain herein refers to captcha.
S120: the corresponding parameters in the verification code component are hot updated with each parameter in the component update version.
In this step, after the latest component update version is obtained through S110, the client may perform hot update on the corresponding parameter in the verification code component by using each parameter in the component update version.
It is understood that hot-update is a method by which developers quickly fix problems with applications; when problems occur in the running process of an application program, if the problems cannot be repaired in time, immeasurable loss is brought to users and developers, most application stores need to be audited when the developers provide new versions of the application program, and the auditing period is at least 2-3 days, which means that the developers may not repair sudden technical problems in time through version updating, and the user experience may be greatly influenced. The hot updating method can bypass the auditing process in the version updating process, flexibly and quickly repair the problems in the application, ensure the use experience of users, and guide developers to formally repair and update the problems in the application program in the updated conventional version.
And the execution code during hot update belongs to script code and is used for guiding the client to perform hot update. In the application, a developer can locate a captcha component with a problem in a client in advance, then independently take out a function or a variable with the problem in the captcha component, and put the function or the variable into a hot update execution code for correction. When the client receives the modified hot update execution code, the content of the function or variable which is in question in the verification code component can be updated according to the hot update execution code.
Specifically, after the client obtains the latest component update version, the execution code in the component update version may be compared with the content in the verification code component, and the parameter corresponding to each execution code in the verification code component is determined, that is, each parameter in the component update version is used to perform a hot update on the corresponding parameter in the verification code component.
Furthermore, because the operating space of the hot updated captcha assembly can be increased or decreased to a certain extent, a sufficient amount of operating space can be configured for the captcha assembly in advance during front-end development, and thus, when the captcha assembly is subsequently hot updated, the situation that the updated captcha assembly cannot operate does not need to be worried about.
S130: and generating a corresponding verification code based on the verification code component after the hot updating.
In this step, after each parameter in the component update version is utilized in S120 to perform thermal update on the corresponding parameter in the captcha component, the application may generate a corresponding captcha based on the captcha component after the thermal update.
For example, in the application, the client may request the server to acquire the verification code according to the verification code acquisition request of the user, the server may issue the corresponding verification code generation parameter according to the verification code acquisition request, and after receiving the verification code generation parameter returned by the server, the client may render the verification code component after the hot update according to the verification code generation parameter, thereby obtaining the corresponding verification code.
In the above embodiment, first, the latest component update version is obtained, then, each parameter in the component update version may be utilized to perform hot update on the corresponding parameter in the verification code component, and a corresponding verification code is generated based on the verification code component after the hot update; in the application, because the hot update can bypass the auditing process in the version updating process, the problem that appears in the application is repaired flexibly and quickly, therefore, the verification code component is updated by using the hot update mode, the access party is not required to input human cost, the real-time update can be carried out, and when the latest component updating version is utilized to update the verification code component, the client-side pre-configures the set running space for the verification code component, so that more functions can be updated simultaneously when the component is updated, such as verification code patterns, embedded point parameters, check bit logic and the like, and the diversified attack of hackers can be effectively defended by updating the verification code component in real time.
In one embodiment, the parameters in the updated version of the component may include a verification code of the latest style.
In S120, the step of performing a hot update on the corresponding parameter in the verification code component by using each parameter in the component update version may include: and carrying out hot updating on the verification code pattern in the verification code component by utilizing the verification code with the latest pattern.
In this embodiment, the updated version of the component acquired by the client includes the latest-style verification code, where the latest-style verification code refers to deleting or modifying a verification code style corresponding to any existing verification code type, adding a new verification code type, and a verification code style corresponding to the verification code type. The client may hot-update the captcha pattern in the captcha component according to the most recent pattern of captchas.
It can be understood that the identifying code component in the application includes a plurality of identifying code types, such as picture identifying code, question identifying code, click identifying code, direct interception and the like; wherein each type of captcha has a corresponding captcha pattern. Schematically, as shown in fig. 2, 3, 4, and 5, fig. 2 is a page display diagram of a picture verification code according to an embodiment of the present invention, fig. 3 is a page display diagram of a question verification code according to an embodiment of the present invention, fig. 4 is a page display diagram of a click verification code according to an embodiment of the present invention, and fig. 5 is a page display diagram of direct interception according to an embodiment of the present invention.
In fig. 2, the picture verification code may be subdivided into a pure alphabet type, a number + alphabet type, and a chinese type verification code according to the verification code content, and may be specifically set according to an actual scene, where the verification code style of the picture verification code is that the right display frame displays corresponding verification code content, the left input frame is a verification code input result input by the user, and when the user inputs the verification code input result and clicks "ok", the client may upload the verification code input result to the server, so that the server checks the verification code input result.
The question verification code in fig. 3 mainly refers to a verification code in which an inverted character is selected, or a character of a certain color is selected, or a number or a letter is selected; the verification code style of the question verification code is that specific indication content is displayed on the upper side, specific characters are displayed on the right side of the middle input box, and a 'cancel' or 'confirm' button is displayed on the lower side.
The step of clicking the verification code in fig. 4 refers to selecting the verification code of the corresponding text, picture, etc. according to the prompt content in the verification code, for example, selecting some texts in the text displayed in the picture, etc.; the verification code style of the click verification code is that corresponding characters or pictures are displayed in the middle part, prompt contents are displayed below the click verification code, a user can select the characters or pictures corresponding to the middle part according to the prompt contents, the client can obtain the characters or pictures selected by the user according to the click-burying component, and the obtained contents are used as a verification code input result and uploaded to the server, so that the server can verify the verification code input result.
The direct interception in fig. 5 refers to an interception page displayed on the client when the server determines that the user is at high risk with respect to the operation of the current client, for example, the validation code pattern may be a word such as "frequently operate, please try again later" displayed in the interception page, so that the user can view the word.
In one embodiment, the parameters in the updated version of the component may include the latest buried point parameters automatically collected by the captcha component.
S120, using each parameter in the component update version, performing a hot update on a corresponding parameter in the verification code component, which may include: and carrying out hot updating on the embedded point parameters in the verification code component by utilizing the latest embedded point parameters automatically acquired by the verification code component.
In this embodiment, the component update version acquired by the client includes the latest embedded point parameter automatically acquired by the verification code component, and the embedded point parameter may be used to automatically acquire embedded point data in a front-end page in the client, such as a behavior track of a user, user information, and device information of a login client.
When the updated version of the component contains the latest embedded point parameter, the client can perform hot update on the embedded point parameter in the verification code component according to the latest embedded point parameter, so that the embedded point parameter after the hot update is used for acquisition in the subsequent acquisition of the embedded point data.
In one embodiment, the parameters in the updated version of the component may include the latest parity bit logic.
In S120, performing a hot update on the corresponding parameter in the verification code component by using each parameter in the component update version may include: and utilizing the latest check bit logic to perform hot updating on the check bit logic in the verification code component.
In this embodiment, the updated version of the component acquired by the client includes the latest check bit logic, which refers to a specific conversion logic used when converting the input result of the verification code into the check bit. Generally, when the input result of the verification code is converted, two modes of implicit conversion or display conversion are mainly adopted, and when the implicit conversion or the display conversion is adopted, the specific conversion logic of the conversion is obtained according to the predetermined check bit logic.
Therefore, when the updated version of the component contains the latest check bit logic, the latest check bit logic can be utilized to perform hot update on the check bit logic in the verification code component, and the latest check bit logic is called to perform check bit conversion when the check code logic is subsequently used.
In one embodiment, the method may further comprise:
s141: and comparing the updating data corresponding to each parameter in the updating version of the component with the original data corresponding to each parameter in the verification code component.
S142: and screening the data to be updated corresponding to each parameter in the verification code component according to the comparison result.
S143: and carrying out hot updating on the data to be updated.
In this embodiment, when each parameter in the captcha assembly is updated, the update data corresponding to each parameter in the obtained assembly update version may be compared with the original data corresponding to each parameter in the captcha assembly, so as to screen out the data to be updated in the captcha assembly, and update the data to be updated.
It can be understood that, since the updated version of the component carries the updated data corresponding to each parameter, such as the verification code of the latest pattern in the updated version of the component, the updated data corresponding to the verification code of the latest pattern includes the length and width data of the input box, and after comparing the updated data with the original data corresponding to the verification code pattern in the verification code component, it is found that the length in the updated data is the same as the length in the original data, and only the width is modified, therefore, the width data of the input box in the verification code pattern can be screened out to be used as the data to be updated, so that the data to be updated can be accurately positioned, and the updating accuracy is improved.
In one embodiment, the generating the corresponding verification code based on the verification code component after the thermal update in S130 may include:
s131: and receiving the verification code generation parameter returned by the server.
S132: and rendering the hot updated verification code component by using the verification code generation parameters to form a corresponding verification code.
In this embodiment, the verification code generation parameter issued by the server 110 may include a verification code type and a template identifier, and after the client 120 acquires the verification code generation parameter, the verification code component after thermal update may be rendered according to the verification code type and the template identifier in the verification code generation parameter, so as to obtain a corresponding verification code.
It is understood that the type of the captcha in the present application includes, but is not limited to, a picture captcha, a question captcha, a click captcha, and the like, and the template identifier in the present application is used to inform the front-end component of the front-end style interaction corresponding to the current captcha type.
In a specific implementation manner, when a user triggers a verification code acquisition request at a front end, a verification code service can be requested through a middle layer/service rear end, and meanwhile, required access data (such as device information, mobile phone number information and the like) is transmitted to Captcha (a bottom layer domain), the Captcha (the bottom layer domain) judges whether a verification code needs to be issued and what type of verification code is issued according to wind control rules (such as whether a mobile phone number and an IP are in a blacklist and whether the request frequency is too high), and the verification code is transmitted and returned to the front end through the middle layer; after the front end obtains the verification code type and the corresponding template id, the verification code component can be rendered according to the verification code type and the corresponding template id, and the corresponding verification code pattern is automatically generated.
In an embodiment, before receiving the verification code generation parameter returned by the server in S131, the method may further include: and sending a verification code acquisition request and access data corresponding to the verification code acquisition request to a server.
In this embodiment, the server may obtain the access data transmitted by the client according to a verification code obtaining request sent by the client, and match the access data with a preset verification code generation rule, if the matching is successful, it indicates that the current client needs to use the verification code for verification, at this time, the server may generate a corresponding verification code generation parameter according to the verification code generation rule, and return the verification code generation parameter to the client, the client stores all front-end styles of the verification codes, and after receiving the verification code generation parameter, the client may determine the corresponding front-end style according to the verification code generation parameter, thereby generating the corresponding verification code, and upload a verification code input result to the server.
It can be understood that the input parameters in the present application include embedded point information related to user information, user behavior, device state, and the like when the user inputs the verification code; the verification code generation rule in the application refers to a generation condition and a generation strategy when the verification code is generated, wherein the generation condition can be used for judging whether a user logging in a client is a blacklist user, whether the frequency of accessing an interface by the user is high, whether equipment logging in the client is normal, whether a behavior track of the user in a front-end page of the client is normal and the like; the generation policy may include whether a passcode is needed, what type of passcode is needed, and the like.
The verification code generation parameters in the present application refer to verification code related parameter information, such as a verification code type, a template identifier, and the like, generated according to a generation policy in the verification code generation rule, so that the client can generate the verification code.
Therefore, after the server acquires the entry parameter data, the entry parameter data can be matched with the generation conditions in the preset verification code generation rule, whether the entry parameter data meets the generation conditions in the preset verification code generation rule is determined, if yes, the corresponding verification code generation parameters can be determined based on the generation strategy in the verification code generation rule, and the verification code generation parameters are issued to the corresponding client side, so that the client side can generate the corresponding verification code.
The component updating apparatus provided in the embodiments of the present application is described below, and the component updating apparatus described below and the component updating method described above may be referred to correspondingly.
In one embodiment, as shown in fig. 6, fig. 6 is a schematic structural diagram of a component updating apparatus provided in an embodiment of the present invention; the invention also provides a component updating apparatus, which comprises a version obtaining module 210, a component updating module 220, and a verification code generating module 230, and specifically comprises the following components:
the version obtaining module 210 is configured to obtain a latest component update version, where the component update version includes a number of parameters.
The component update module 220 is configured to perform a hot update on a corresponding parameter in the verification code component by using each parameter in the component update version, where the verification code component is configured with a preset running space in advance.
And a verification code generating module 230 configured to generate a corresponding verification code based on the verification code component after the thermal update.
In the above embodiment, first, the latest component update version is obtained, then, each parameter in the component update version may be utilized to perform hot update on the corresponding parameter in the verification code component, and a corresponding verification code is generated based on the verification code component after the hot update; in the application, because the hot update can bypass the auditing process in the version updating process, the problem that appears in the application is repaired flexibly and quickly, therefore, the verification code component is updated by using the hot update mode, the access party is not required to input human cost, the real-time update can be carried out, and when the latest component updating version is utilized to update the verification code component, the client-side pre-configures the set running space for the verification code component, so that more functions can be updated simultaneously when the component is updated, such as verification code patterns, embedded point parameters, check bit logic and the like, and the diversified attack of hackers can be effectively defended by updating the verification code component in real time.
In one embodiment, the parameters in the updated version of the component may include a verification code of the latest style.
The component update module 220 may include:
and the first hot updating module is used for carrying out hot updating on the verification code pattern in the verification code component by utilizing the verification code of the latest pattern.
In one embodiment, the parameters in the updated version of the component may include the latest buried point parameters automatically collected by the captcha component.
The component update module 220 may include:
and the second hot updating module is used for carrying out hot updating on the embedded point parameters in the verification code component by utilizing the latest embedded point parameters automatically acquired by the verification code component.
In one embodiment, the parameters in the updated version of the component may include the latest parity bit logic.
The component update module 220 may include:
and the third hot updating module is used for carrying out hot updating on the check bit logic in the verification code component by utilizing the latest check bit logic.
In one embodiment, the apparatus may further include:
and the data comparison module is used for comparing the update data corresponding to each parameter in the component update version with the original data corresponding to each parameter in the verification code component.
And the screening module is used for screening the data to be updated corresponding to each parameter in the verification code component according to the comparison result.
And the data updating module is used for carrying out hot updating on the data to be updated.
In one embodiment, the verification code generation module 230 may include:
and the parameter receiving module is used for receiving the verification code generation parameters returned by the server.
And the rendering module is used for rendering the hot updated verification code component by using the verification code generation parameters to form a corresponding verification code.
In one embodiment, the apparatus may further include:
and the verification code acquisition module is used for sending a verification code acquisition request and the access data corresponding to the verification code acquisition request to the server.
In one embodiment, the present invention also provides a storage medium having stored therein computer-readable instructions, which, when executed by one or more processors, cause the one or more processors to perform the steps of the component update method as described in any one of the above embodiments.
In one embodiment, the present invention also provides a computer device comprising: one or more processors, and a memory.
The memory has stored therein computer readable instructions which, when executed by the one or more processors, perform the steps of the component update method as in any one of the above embodiments.
Fig. 7 is a schematic diagram illustrating an internal structure of a computer device according to an embodiment of the present invention, and the computer device 300 may be provided as a server, as shown in fig. 7. Referring to fig. 7, computer device 300 includes a processing component 302 that further includes one or more processors and memory resources, represented by memory 301, for storing instructions, such as application programs, that are executable by processing component 302. The application programs stored in memory 301 may include one or more modules that each correspond to a set of instructions. Further, the processing component 302 is configured to execute instructions to perform the component update method of any of the embodiments described above.
The computer device 300 may also include a power component 303 configured to perform power management of the computer device 300, a wired or wireless network interface 304 configured to connect the computer device 300 to a network, and an input output (I/O) interface 305. The computer device 300 may operate based on an operating system stored in memory 301, such as Windows Server, Mac OS XTM, Unix, Linux, Free BSDTM, or the like.
Those skilled in the art will appreciate that the architecture shown in fig. 7 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, the embodiments may be combined as needed, and the same and similar parts may be referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A component upgrade method, the method comprising:
acquiring a latest component update version, wherein the component update version comprises a plurality of parameters;
utilizing each parameter in the component update version to perform hot update on the corresponding parameter in the verification code component, wherein the verification code component is configured with a set running space in advance;
the captcha is generated based on the thermally updated captcha component.
2. The component updating method according to claim 1, wherein the parameter in the component update version includes a verification code of a latest style;
utilizing each parameter in the component update version to perform hot update on the corresponding parameter in the verification code component, comprising:
and carrying out hot updating on the verification code pattern in the verification code component by utilizing the verification code with the latest pattern.
3. The component updating method according to claim 1, wherein the parameters in the component update version comprise latest embedded point parameters automatically collected by a verification code component;
utilizing each parameter in the component update version to perform hot update on the corresponding parameter in the verification code component, comprising:
and carrying out hot updating on the embedded point parameters in the verification code component by utilizing the latest embedded point parameters automatically acquired by the verification code component.
4. The component updating method according to claim 1, wherein the parameter in the updated version of the component comprises a latest parity logic;
utilizing each parameter in the component update version to perform hot update on the corresponding parameter in the verification code component, comprising:
and utilizing the latest check bit logic to perform hot updating on the check bit logic in the verification code component.
5. The component updating method according to claim 1, further comprising:
comparing the update data corresponding to each parameter in the update version of the component with the original data corresponding to each parameter in the verification code component;
screening out data to be updated corresponding to each parameter in the verification code component according to a comparison result;
and carrying out hot updating on the data to be updated.
6. The component updating method according to claim 1, wherein the generating of the corresponding verification code based on the verification code component after the hot update comprises:
receiving verification code generation parameters returned by the server;
and rendering the hot updated verification code component by using the verification code generation parameters to form a corresponding verification code.
7. The component updating method according to claim 6, wherein before receiving the verification code generation parameter returned by the server, the method further comprises:
and sending a verification code acquisition request and access data corresponding to the verification code acquisition request to a server.
8. A component upgrade apparatus, comprising:
the version acquisition module is used for acquiring a latest component update version, and the component update version comprises a plurality of parameters;
the component updating module is used for carrying out hot updating on corresponding parameters in the verification code component by utilizing each parameter in the component updating version, and the verification code component is configured with a set running space in advance;
and the verification code generating module is used for generating a corresponding verification code based on the verification code component after the hot update.
9. A storage medium, characterized by: the storage medium has stored therein computer-readable instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of the component update method of any one of claims 1 to 7.
10. A computer device, comprising: one or more processors, and a memory;
the memory has stored therein computer-readable instructions that, when executed by the one or more processors, perform the steps of the component update method of any of claims 1 to 7.
CN202111582738.XA 2021-12-22 2021-12-22 Component updating method and device, storage medium and computer equipment Pending CN114237678A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111582738.XA CN114237678A (en) 2021-12-22 2021-12-22 Component updating method and device, storage medium and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111582738.XA CN114237678A (en) 2021-12-22 2021-12-22 Component updating method and device, storage medium and computer equipment

Publications (1)

Publication Number Publication Date
CN114237678A true CN114237678A (en) 2022-03-25

Family

ID=80761538

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111582738.XA Pending CN114237678A (en) 2021-12-22 2021-12-22 Component updating method and device, storage medium and computer equipment

Country Status (1)

Country Link
CN (1) CN114237678A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117539883A (en) * 2024-01-04 2024-02-09 腾讯科技(深圳)有限公司 Application template updating method, device, storage medium and equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117539883A (en) * 2024-01-04 2024-02-09 腾讯科技(深圳)有限公司 Application template updating method, device, storage medium and equipment
CN117539883B (en) * 2024-01-04 2024-04-12 腾讯科技(深圳)有限公司 Application template updating method, device, storage medium and equipment

Similar Documents

Publication Publication Date Title
CN110602052B (en) Micro-service processing method and server
US8800042B2 (en) Secure web application development and execution environment
CN107528858B (en) Login method, device and equipment based on webpage and storage medium
US11170105B2 (en) Verifying updates based on update behavior-based profiles
RU2237275C2 (en) Server and method (variants) for determining software surroundings of client node in a network having client/server architecture
CN101268468A (en) Method and apparatus to authenticate source of a scripted code
CN109522500B (en) Webpage display method, device, terminal and storage medium
CN110727575B (en) Information processing method, system, device and storage medium
CN107682361A (en) Website vulnerability scan method, device, computer equipment and storage medium
CN112965955B (en) Data migration method, device, computer equipment and storage medium
US20150324598A1 (en) Method and System for Managing Uniquely Identifiable Bookmarklets
CN112118238A (en) Method, device, system, equipment and storage medium for authentication login
CN113569166A (en) Data processing method and device, electronic equipment and storage medium
CN114237678A (en) Component updating method and device, storage medium and computer equipment
US20190012454A1 (en) Validating sign-out implementation for identity federation
CN108197166B (en) Cross-browser office examination and approval mark-remaining method and system
KR101745919B1 (en) User authentication method and system using software-based HSM without password exposure
CN102148831B (en) Method and system for safely controlling terminal application
CN114257451B (en) Verification interface replacement method and device, storage medium and computer equipment
CN112528286B (en) Terminal equipment safety detection method, associated equipment and computer program product
Cisco Upgrading Cisco CallManager Release 3.0(5)
JP2009223638A (en) Biometric authentication system and method for web application
KR20050100278A (en) Vulnerability analysis apparatus and method of web application
CN112464225A (en) Request processing method, request processing device and computer readable storage medium
CN114024688B (en) Network request method, network authentication method, terminal equipment and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination