CN114925406A - Data verification method, device and computer program product - Google Patents

Data verification method, device and computer program product Download PDF

Info

Publication number
CN114925406A
CN114925406A CN202210620634.1A CN202210620634A CN114925406A CN 114925406 A CN114925406 A CN 114925406A CN 202210620634 A CN202210620634 A CN 202210620634A CN 114925406 A CN114925406 A CN 114925406A
Authority
CN
China
Prior art keywords
data
information
verification
request
dimension
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210620634.1A
Other languages
Chinese (zh)
Inventor
汪皓鋆
王正华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202210620634.1A priority Critical patent/CN114925406A/en
Publication of CN114925406A publication Critical patent/CN114925406A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present disclosure provides a data verification method, an apparatus, an electronic device, a storage medium, and a computer program product, which relate to the field of computer technologies, and in particular to an inspection technology, and can be used in a data upload scenario. The specific implementation scheme is as follows: collecting device information, position information and time information of the target device in response to determining that the data uploading request of the target device is received; performing multiple checks of the equipment dimension, the position dimension and the time dimension on the data uploading request according to the equipment information, the position information and the time information; and determining whether to receive target data corresponding to the data uploading request or not according to the verification result. The data verification method and the data verification device improve accuracy of data verification and safety of a data uploading process.

Description

Data verification method, device and computer program product
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a verification technology, and in particular, to a data verification method, apparatus, electronic device, storage medium, and computer program product, which can be used in a data upload scenario.
Background
The data uploading function is used in a plurality of scenes using the mobile application, and for application developers and users, the data uploading process has the danger of being attacked, such as the third party stealing the information of the user to maliciously upload data to damage a server, and the third party maliciously uploading data to a user account space to infringe the rights and interests of the user. The existing security verification technology for data uploading has the problem of low verification security.
Disclosure of Invention
The disclosure provides a data verification method, a data verification device, an electronic device, a storage medium and a computer program product.
According to a first aspect, there is provided a data verification method, comprising: collecting device information, position information and time information of the target device in response to the fact that the data uploading request of the target device is received; performing multiple verification of the equipment dimension, the position dimension and the time dimension on the data uploading request according to the equipment information, the position information and the time information to obtain a verification result; and determining whether to receive target data corresponding to the data uploading request or not according to the verification result.
According to a second aspect, there is provided a data verification apparatus comprising: an acquisition unit configured to acquire device information, location information, and time information of a target device in response to determining that a data upload request of the target device is received; the verification unit is configured to perform multiple verification of the equipment dimension, the position dimension and the time dimension on the data uploading request according to the equipment information, the position information and the time information to obtain a verification result; and the determining unit is configured to determine whether to receive the target data corresponding to the data uploading request according to the verification result.
According to a third aspect, there is provided an electronic device comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method as described in any one of the implementations of the first aspect.
According to a fourth aspect, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing a computer to perform a method as described in any one of the implementations of the first aspect.
According to a fifth aspect, there is provided a computer program product comprising: computer program which, when being executed by a processor, carries out the method as described in any of the implementations of the first aspect.
According to the technology disclosed by the invention, the data verification method is provided, the device information, the position information and the time information of the target device sending the data uploading request are collected, multiple verification of the device dimension, the position dimension and the time dimension is carried out on the data uploading request, whether the target data corresponding to the data uploading request is received or not is determined according to the verification result, and the safety of the data uploading process is improved.
It should be understood that the statements in this section are not intended to identify key or critical features of the embodiments of the present disclosure, nor are they intended to limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
FIG. 1 is an exemplary system architecture diagram in which one embodiment according to the present disclosure may be applied;
FIG. 2 is a flow diagram of one embodiment of a data verification method according to the present disclosure;
fig. 3 is a schematic diagram of an application scenario of the data verification method according to the present embodiment;
FIG. 4 is a flow diagram of yet another embodiment of a data verification method according to the present disclosure;
FIG. 5 is a block diagram of one embodiment of a data verification device according to the present disclosure;
FIG. 6 is a schematic block diagram of a computer system suitable for use in implementing embodiments of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
In the technical scheme of the disclosure, the collection, storage, use, processing, transmission, provision, disclosure and other processing of the personal information of the related user are all in accordance with the regulations of related laws and regulations and do not violate the good customs of the public order.
Fig. 1 illustrates an exemplary architecture 100 to which the data verification methods and apparatus of the present disclosure may be applied.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The communication connections between the terminal devices 101, 102, 103 form a topological network, and the network 104 serves to provide a medium for communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The terminal devices 101, 102, 103 interact with a server 105 via a network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may be hardware devices or software that support network connections for data interaction and data processing. When the terminal devices 101, 102, 103 are hardware, they may be various electronic devices supporting network connection, information acquisition, interaction, display, processing, and the like, including but not limited to smart phones, tablet computers, e-book readers, laptop portable computers, desktop computers, and the like. When the terminal devices 101, 102, 103 are software, they can be installed in the electronic devices listed above. It may be implemented, for example, as multiple software or software modules to provide distributed services, or as a single software or software module. And is not particularly limited herein.
The server 105 may be a server providing various services, for example, a background processing server that receives data upload requests sent by the terminal devices 101, 102, and 103, collects device information, location information, and time information of the terminal devices to perform multiple checks on the data upload requests, and determines whether to receive target data corresponding to the data upload requests according to an obtained check result. As an example, the server 105 may be a cloud server.
The server may be hardware or software. When the server is hardware, it may be implemented as a distributed server cluster formed by multiple servers, or may be implemented as a single server. When the server is software, it may be implemented as multiple pieces of software or software modules (e.g., software or software modules used to provide distributed services), or as a single piece of software or software module. And is not particularly limited herein.
It should be further noted that the data verification method provided by the embodiment of the present disclosure may be executed by a server, or may be executed by a terminal device, or may be executed by the server and the terminal device in cooperation with each other. Accordingly, each part (for example, each unit) included in the data verification apparatus may be entirely disposed in the server, may be entirely disposed in the terminal device, and may be disposed in the server and the terminal device, respectively.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. When the electronic device on which the data verification method operates does not need to perform data transmission with other electronic devices, the system architecture may include only the electronic device (e.g., a server or a terminal device) on which the data verification method operates.
Referring to fig. 2, fig. 2 is a flowchart of a data verification method provided in an embodiment of the present disclosure, where the process 200 includes the following steps:
step 201, in response to determining that the data upload request of the target device is received, acquiring device information, location information and time information of the target device.
In this embodiment, an execution subject (for example, a terminal device or a server in fig. 1) of the data verification method may receive a data upload request of a target device, and collect device information, location information, and time information of the target device in response to determining that the data upload request of the target device is received.
The data upload request may be request information requesting upload of target data, and the target data may be data in any form and carrying any content. By way of example, in the instant messaging field, the target data may be data in various word, excel, and PowerPoint formats; in the short video domain, the target data may be video data.
The device information of the target device may include hardware information and software information of the device, where the hardware information may be, for example, identification information capable of distinguishing the devices, and specifically may be an International Mobile Equipment Identity (IMEI), an International Mobile Equipment identifier (imsi).
The location information is the location information of the location where the target device sends the data upload request. As an example, the location information of the target device may be determined based on GPS (Global Positioning System).
The time information is the time information when the target device sends a data uploading request. As an example, after receiving the data upload request, the execution main body determines a local time, and determines the determined local time as the time information of the target device.
In some optional implementations of this embodiment, the executing main body may execute step 201 in the following manner:
first, in response to determining that a data upload request of a target device is received, front-end verification is performed on target data corresponding to the data upload request.
The front end checks, that is, the front end validity checks, after the front end selects the target data, the target data is temporarily cached at the front end, and the front end can acquire data information such as a file name, a file size, file content and the like. And analyzing the file content through the front end to check the legality, wherein the check content comprises the checks of file extension, file size, file number, empty files and the like.
Taking the file extension as an example, the extension of the uploaded data can be verified through a javascript script for verifying the extension, and the extension has a white list form and a black list form. When a white list form is adopted, the extension name of the target data is in the white list, namely the extension name passes the verification; when the blacklist form is adopted, the extension name of the target data is not in the blacklist, namely the extension name passes the verification.
Then, in response to determining that the data upload request passes the front-end verification, device information, location information, and time information are collected.
In the implementation mode, the front-end verification and the multiple verification based on the equipment information, the position information and the time information are combined, the front-end verification is carried out firstly, and the multiple verification is carried out after the front-end verification is passed, so that the verification accuracy and the comprehensiveness of the target data are further improved.
Step 202, performing multiple checks on the device dimension, the location dimension and the time dimension on the data uploading request according to the device information, the location information and the time information.
In this embodiment, the execution main body may perform multiple checks of the device dimension, the location dimension, and the time dimension on the data upload request according to the device information, the location information, and the time information.
As an example, the execution subject may perform corresponding dimensional check on the data upload request for each of the device information, the location information, and the time information.
For the device information, the execution subject may determine whether the device information set authorized to be logged in by the account that issued the file upload request includes the currently acquired device information, and when the device information set includes the currently acquired device information, it indicates that the device information passes the verification for the device information; otherwise, it indicates that the check for the device information is failed. For each account, the execution main body or the electronic equipment in communication connection with the execution main body is provided with an equipment information set corresponding to the account.
For the location information, the execution subject may determine whether the location information set of the target device that issues the file upload request includes currently acquired location information. The position information set represents the position range where the terminal device is frequently located. When the position information set comprises the currently acquired position information, the verification aiming at the position information is indicated to pass; otherwise, it indicates that the check for the position information is not passed. For each account, the execution main body or the electronic equipment in communication connection with the execution main body is provided with a position information set corresponding to the account.
In some special scenarios, each piece of location information in the location information sequence corresponding to the data upload request sent by the target device multiple times is fixed. The execution main body may determine whether the location information at each time of issuing the data upload request matches the location information in the location information sequence. In response to determining that the location information matches, determining that the verification is passed; otherwise, the check is not passed.
For the time information, the execution subject may determine whether the time information set of the target device that issued the file upload request includes currently acquired time information. The time information set indicates a time range in which the terminal device frequently performs file uploading operation. When the time information set comprises the currently acquired time information, the verification aiming at the time information is passed; otherwise, it indicates that the check for time information has not passed. For each account, the execution main body or the electronic equipment in communication connection with the execution main body is provided with a time information set corresponding to the account.
In some special scenarios, each time information in the time information sequence corresponding to the data upload request sent by the target device multiple times is fixed. The execution body may determine whether the time information at each time of issuing the data upload request matches the time information in the time information sequence. In response to determining that the time information matches, it is determined that the check is passed, otherwise, the check is not passed.
As yet another example, the execution subject may perform multi-verification of multiple dimensions on the data upload request in combination with the device information, the location information, and the time information. For example, for two data upload requests issued consecutively at different locations by the same target device, the execution main body may determine the possibility between the target setting being transferred from the location issuing the data upload request for the first time to the location issuing the data upload request for the second time according to the time interval between the two data upload requests. In response to determining that there is a possibility, determining that the check is passed, otherwise, failing the check.
For another example, in some specific scenarios, the location information and the time information corresponding to each time the target device issues a data upload request are in one-to-one correspondence. The execution main body may determine whether the correspondence between the location information and the time information is correct each time the data upload request is issued. And determining that the verification is passed in response to determining that the corresponding relation between the position information and the time information is correct, otherwise, failing to pass the verification.
It should be noted that, when the data upload request is verified in multiple ways according to the device information, the location information, and the time information, it is determined that the data upload request passes the verification only when each way passes the verification.
In some optional implementations of this embodiment, the executing main body may execute the step 202 by:
and for the user account corresponding to the data uploading request, carrying out multiple verification on the equipment dimension, the position dimension and the time dimension of the data uploading request by combining the equipment information, the position information and the time information corresponding to each time when the user account sends the data uploading request, and obtaining a verification result.
As an example, a position information sequence composed of position information, a time information sequence composed of time information, and a device information sequence in the case where a user account binds a plurality of devices are determined each time a data upload request is issued by the user account within a preset time period. Determining whether the equipment information sequence, the position information sequence and the time information sequence have abnormal information or not according to the corresponding relationship among corresponding information in the preset equipment information sequence, the preset position information sequence and the preset time information sequence, and obtaining a verification result which does not pass the verification in response to the determination; otherwise, obtaining the verification result passing the verification.
In the implementation mode, multiple verification is performed by combining the corresponding equipment information, the position information and the time information when the user account sends the data uploading request every time, and the verification accuracy is further improved.
In some optional implementations of this embodiment, the execution subject may perform multiple checks by: firstly, determining whether a user account has unreasonable preset conditions in equipment dimension, position dimension and time dimension by combining the corresponding equipment information, position information and time information when the user account sends a data uploading request each time for the user account corresponding to the data uploading request; then, in response to determining that there is a data upload request, it is determined that the data upload request fails the multi-check.
The predetermined unreasonable condition is used to characterize a condition that should not occur as determined logically or based on artificially specified relevant decision parameters regarding the device information, the location information and the time information.
As an example, the preset unreasonable cases include: based on a plurality of target devices with more than a preset number threshold, sending a plurality of data uploading requests at the same position at the same time; based on a number of target devices that is greater than a preset number threshold, a number of data upload requests are issued at different times and/or at different locations.
In the implementation mode, a mode of conveniently carrying out multiple verification on the data uploading request based on the preset unreasonable condition is provided, and convenience and accuracy of data verification are further improved.
In some optional implementations of the embodiment, the execution subject determines that the data upload request passes multiple checks in response to determining that no irrational condition exists.
In this implementation, in order to prevent the problem that multiple verification is inaccurate due to incomplete setting of the preset unreasonable condition, the execution main body may further set the preset reasonable condition. As an example, the preset rational cases include:
(1) based on a target device, sending a data uploading request at a position at a time; for example, the account first issues a data upload request based on a target device.
(2) Based on the same target equipment, sending a plurality of data uploading requests at different positions at different times; for example, according to the recorded data corresponding to the account, multiple data upload requests issued by the account all the time pass through the same target device, but time information and position information corresponding to different data upload requests are different.
(3) Based on a plurality of target devices which are not more than a preset number threshold, sending a plurality of data uploading requests at the same position at the same time; for example, the account allows multiple devices to log in simultaneously, but the number of the multiple devices logged in simultaneously is limited by a preset number threshold, where the preset number threshold may be specifically set according to actual situations, and is not limited herein.
(4) Based on a plurality of target devices not more than a preset number threshold, sending out a plurality of data uploading requests at different times and/or different positions; for example, a plurality of data upload requests issued at different times by a plurality of target devices not more than a preset number threshold; or a plurality of data uploading requests sent by a plurality of target devices not more than a preset quantity threshold value at different positions
In this implementation manner, the execution main body may count device information, location information, and time information when each account sends a data upload request, so as to determine whether an account corresponding to a currently received data upload request has one of the above situations.
Then, in response to determining that there is, it is determined that the data upload request passes multiple checks.
In this implementation manner, in response to determining that any one of the above conditions exists in the account corresponding to the data upload request, it is determined that the data upload request passes multiple checks.
In the implementation mode, the specific condition data that the data uploading request passes through the multiple verification is provided, the multiple verification is carried out on the data uploading request based on various listed conditions, and the verification accuracy is further improved.
And step 203, determining whether to receive target data corresponding to the data uploading request according to the checking result.
In this embodiment, the execution main body may receive the target data corresponding to the data upload request in response to determining that the data upload request passes multiple checks.
As an example, when the verification result indicates that the data uploading request passes multiple verification, receiving and storing the target data through the specified storage device; and if not, forbidding to receive the target data corresponding to the data uploading request.
After receiving the target data, the execution subject may also execute the data processing task based on the target data. For example, in the field of instant messaging, target data in word, excel and powerpower formats are updated and modified based on received editing operations; in the short video field, video data is edited and synthesized according to the received editing operation.
In some optional implementations of this embodiment, the executing main body may execute the step 203 by:
firstly, in response to the fact that the data uploading request passes through multiple verification, server verification is conducted on target data corresponding to the data uploading request.
The service end verification includes, for example, file header-type field verification, file header verification, suffix name black list verification, suffix name white list verification, custom regular verification, and WAF (Web Application security system) device verification.
In this implementation manner, the execution main body may perform verification on the target data by using one or more server verification methods according to actual situations.
And then, in response to the fact that the data uploading request passes the server verification, receiving target data corresponding to the data uploading request.
In the implementation mode, the execution main body combines multiple verification based on equipment information, position information and time information and server verification, and server verification is further performed after the multiple verification is passed, so that the verification accuracy and comprehensiveness of the target data are further improved.
With continued reference to fig. 3, fig. 3 is a schematic diagram 300 of an application scenario of the data verification method according to the present embodiment. In the application scenario of fig. 3, a target device 301 sends a data upload request to a server 302. First, in response to determining that a data upload request of a target device 301 is received, a server 302 collects device information 303, location information 304, and time information 305 of the target device; then, performing multiple verification of the device dimension, the position dimension and the time dimension on the data uploading request according to the device information 303, the position information 304 and the time information 305 to obtain a verification result; and finally, determining whether target data corresponding to the data uploading request is received or not according to the verification result.
In this embodiment, a data verification method is provided, which acquires device information, location information, and time information of a target device that sends a data upload request, so as to perform multiple verifications of device dimensions, location dimensions, and time dimensions on the data upload request, and determine whether to receive target data corresponding to the data upload request according to a verification result, thereby improving accuracy of data verification and security of a data upload process.
In some optional implementations of this embodiment, the execution main body may further perform the following operations: and in response to determining that the data uploading request is not verified, forbidding to receive target data corresponding to the data uploading request.
In this implementation manner, when the target data fails any one of the front-end check, the multiple check and the server-side check, it is determined that the data upload request fails the check, and at this time, the execution main body prohibits receiving the target data corresponding to the data upload request.
In this implementation manner, the execution main body may show a specific reason that the data upload request is not verified through the target device.
In the implementation mode, when the target data does not pass any one of the front-end check, the multiple check and the server-side check, the target data corresponding to the file uploading request is forbidden to be received, and the safety of the target data uploading process is improved.
With continued reference to FIG. 4, an exemplary flow 400 of yet another embodiment of a data verification method according to the present disclosure is shown, including the steps of:
step 401, in response to determining that the data upload request of the target device is received, performing front-end verification on target data corresponding to the data upload request.
Step 402, collecting device information, location information and time information in response to determining that the data upload request passes the front-end verification.
Step 403, performing multiple checks on the device dimension, the location dimension, and the time dimension on the data upload request according to the device information, the location information, and the time information.
And step 404, in response to the fact that the data uploading request passes multiple verification, performing server-side verification on target data corresponding to the data uploading request.
Step 405, in response to determining that the data upload request passes the server verification, receiving target data corresponding to the data upload request.
And step 406, in response to determining that the data upload request is not verified, forbidding to receive the target data corresponding to the data upload request.
As can be seen from this embodiment, compared with the embodiment corresponding to fig. 2, the flow 400 of the data verification method in this embodiment specifically illustrates a process of verifying data uploading by combining three verification methods, namely front-end verification, multiple verification, and server-side verification, so that the verification accuracy and the security of the data uploading process are further improved.
With continuing reference to fig. 5, as an implementation of the method shown in the above-mentioned figures, the present disclosure provides an embodiment of a data verification apparatus, which corresponds to the embodiment of the method shown in fig. 2, and which may be applied to various electronic devices.
As shown in fig. 5, the data verification apparatus includes: an acquisition unit 501 configured to acquire device information, location information, and time information of a target device in response to determining that a data upload request of the target device is received; a checking unit 502 configured to perform multiple checks of a device dimension, a location dimension, and a time dimension on the data upload request according to the device information, the location information, and the time information; a determining unit 503 configured to determine whether to receive target data corresponding to the data upload request according to the check result.
In some optional implementations of this embodiment, the verification unit 502 is further configured to: and for the user account corresponding to the data uploading request, carrying out multiple verification on the equipment dimension, the position dimension and the time dimension of the data uploading request by combining the equipment information, the position information and the time information corresponding to each time when the user account sends the data uploading request, and obtaining a verification result.
In some optional implementations of the present embodiment, the checking unit 502 is further configured to: determining whether the user account has preset unreasonable conditions in equipment dimension, position dimension and time dimension by combining the corresponding equipment information, position information and time information when the user account sends the data uploading request each time for the user account corresponding to the data uploading request; in response to determining that there is, determining that the data upload request fails the multiple check.
In some optional implementations of the present embodiment, the checking unit 502 is further configured to: in response to determining that there is no data upload request, determining that the data upload request passes multiple checks.
In some optional implementations of this embodiment, the acquisition unit 501 is further configured to: in response to the fact that the data uploading request of the target equipment is received, front-end verification is conducted on target data corresponding to the data uploading request; and collecting the equipment information, the position information and the time information in response to the fact that the data uploading request passes the front-end verification.
In some optional implementations of this embodiment, the determining unit 503 is further configured to: performing server side verification on target data corresponding to the data uploading request in response to the fact that the data uploading request passes through multiple verifications; and receiving target data corresponding to the data uploading request in response to the fact that the data uploading request passes the server verification.
In some optional implementations of this embodiment, the determining unit 503 is further configured to prohibit receiving target data corresponding to the data upload request in response to determining that the data upload request fails to be verified.
In this embodiment, a data verification apparatus is provided, which collects device information, location information, and time information of a target device that sends a data upload request, so as to perform multiple verification of device dimensions, location dimensions, and time dimensions on the data upload request, and determine whether to receive target data corresponding to the data upload request according to a verification result, thereby improving accuracy of data verification and security of a data upload process.
According to an embodiment of the present disclosure, the present disclosure also provides an electronic device including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being executable by the at least one processor to enable the at least one processor to implement the data verification method described in any of the above embodiments when executed.
According to an embodiment of the present disclosure, there is also provided a readable storage medium storing computer instructions, which are used to enable a computer to implement the data verification method described in any of the above embodiments when executed.
The embodiments of the present disclosure provide a computer program product, which when executed by a processor can implement the data verification method described in any of the above embodiments.
FIG. 6 illustrates a schematic block diagram of an example electronic device 600 that can be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. Electronic devices may also represent various forms of mobile devices, such as personal digital processors, cellular telephones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not intended to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 6, the apparatus 600 includes a computing unit 601, which can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM)602 or a computer program loaded from a storage unit 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data required for the operation of the device 600 can also be stored. The calculation unit 601, the ROM 602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
A number of components in the device 600 are connected to the I/O interface 605, including: an input unit 606 such as a keyboard, a mouse, and the like; an output unit 607 such as various types of displays, speakers, and the like; a storage unit 608, such as a magnetic disk, optical disk, or the like; and a communication unit 609 such as a network card, modem, wireless communication transceiver, etc. The communication unit 609 allows the device 600 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The computing unit 601 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of the computing unit 601 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The calculation unit 601 performs the respective methods and processes described above, such as the data verification method. For example, in some embodiments, the data verification method may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as storage unit 608. In some embodiments, part or all of the computer program may be loaded and/or installed onto the device 600 via the ROM 602 and/or the communication unit 609. When the computer program is loaded into the RAM 603 and executed by the computing unit 601, one or more steps of the data verification method described above may be performed. Alternatively, in other embodiments, the computing unit 601 may be configured to perform the data verification method in any other suitable manner (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user can be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The Server can be a cloud Server, also called a cloud computing Server or a cloud host, and is a host product in a cloud computing service system, so as to solve the defects of large management difficulty and weak service expansibility existing in the traditional physical host and Virtual Private Server (VPS) service; it may also be a server of a distributed system, or a server incorporating a blockchain.
According to the technical scheme of the embodiment of the disclosure, a data verification method is provided, which is used for acquiring the device information, the position information and the time information of a target device sending a data uploading request, performing multiple verification of the device dimension, the position dimension and the time dimension on the data uploading request, determining whether to receive the target data corresponding to the data uploading request according to a verification result, and improving the accuracy of data verification and the safety of a data uploading process.
It should be understood that various forms of the flows shown above, reordering, adding or deleting steps, may be used. For example, the steps described in this disclosure may be performed in parallel, sequentially, or in a different order, as long as the desired results of the technical solutions provided by this disclosure can be achieved, and are not limited herein.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (17)

1. A method of data verification, comprising:
collecting device information, position information and time information of target equipment in response to the fact that a data uploading request of the target equipment is received;
performing multiple verification of the equipment dimension, the position dimension and the time dimension on the data uploading request according to the equipment information, the position information and the time information to obtain a verification result;
and determining whether to receive target data corresponding to the data uploading request or not according to the checking result.
2. The method of claim 1, wherein the performing multiple checks on the data upload request according to the device information, the location information, and the time information to obtain a check result includes:
and for the user account corresponding to the data uploading request, performing multiple checks of the equipment dimension, the position dimension and the time dimension on the data uploading request by combining the corresponding equipment information, the corresponding position information and the corresponding time information when the user account sends the data uploading request every time, and obtaining a checking result.
3. The method according to claim 2, wherein for the user account corresponding to the data upload request, the multiple checks of the device dimension, the location dimension, and the time dimension are performed on the data upload request in combination with the device information, the location information, and the time information corresponding to each time when the user account sends the data upload request, so as to obtain the check result, and the method includes:
for a user account corresponding to the data uploading request, determining whether the user account has unreasonable preset conditions in equipment dimension, position dimension and time dimension by combining corresponding equipment information, position information and time information when the user account sends the data uploading request each time;
in response to determining that there is, determining that the data upload request fails multiple checks.
4. The method according to claim 3, wherein the performing multiple checks on the data upload request for the device dimension, the location dimension, and the time dimension to obtain the check result by combining the device information, the location information, and the time information corresponding to each time when the user account sends the data upload request, further comprises:
in response to determining that there is no data upload request, determining that the data upload request passes multiple checks.
5. The method of claim 1, wherein the collecting device information, location information, and time information of a target device in response to determining that a data upload request of the target device is received comprises:
in response to the fact that the data uploading request of the target equipment is received, performing front-end verification on target data corresponding to the data uploading request;
and collecting the equipment information, the position information and the time information in response to the fact that the data uploading request passes the front-end verification.
6. The method of claim 1, wherein the determining whether to receive target data corresponding to the data upload request according to the check result comprises:
in response to the fact that the data uploading request passes multiple verification, performing server verification on target data corresponding to the data uploading request;
and responding to the fact that the data uploading request passes the server-side verification, and receiving target data corresponding to the data uploading request.
7. The method of claim 6, wherein the determining whether to receive target data corresponding to the data upload request according to the check result further comprises:
and in response to the fact that the data uploading request is determined not to pass the verification, target data corresponding to the data uploading request are forbidden to be received.
8. A data verification apparatus, comprising:
a collection unit configured to collect device information, location information, and time information of a target device in response to determining that a data upload request of the target device is received;
the verification unit is configured to perform multiple verification on the equipment dimension, the position dimension and the time dimension on the data uploading request according to the equipment information, the position information and the time information to obtain a verification result;
and the determining unit is configured to determine whether to receive target data corresponding to the data uploading request according to the checking result.
9. The apparatus of claim 8, wherein the verification unit is further configured to:
and for the user account corresponding to the data uploading request, performing multiple checks of equipment dimension, position dimension and time dimension on the data uploading request by combining corresponding equipment information, position information and time information when the user account sends the data uploading request every time, and obtaining the checking result.
10. The apparatus of claim 9, wherein the verification unit is further configured to:
for a user account corresponding to the data uploading request, determining whether the user account has preset unreasonable conditions in equipment dimension, position dimension and time dimension by combining corresponding equipment information, position information and time information when the user account sends the data uploading request each time; in response to determining that there is, determining that the data upload request fails multiple checks.
11. The apparatus of claim 10, wherein the verification unit is further configured to:
in response to determining that there is no data upload request, determining that the data upload request passes multiple checks.
12. The apparatus of claim 8, wherein the acquisition unit is further configured to:
in response to the fact that the data uploading request of the target equipment is received, performing front-end verification on target data corresponding to the data uploading request; and responding to the data uploading request, and acquiring the equipment information, the position information and the time information.
13. The apparatus of claim 8, wherein the determining unit is further configured to:
in response to the fact that the data uploading request passes multiple verification, performing server verification on target data corresponding to the data uploading request; and receiving target data corresponding to the data uploading request in response to the fact that the data uploading request passes the server verification.
14. The apparatus of claim 13, wherein the determining unit is further configured to:
and in response to determining that the data uploading request is not verified, forbidding to receive target data corresponding to the data uploading request.
15. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-7.
16. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-7.
17. A computer program product, comprising: computer program which, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN202210620634.1A 2022-06-01 2022-06-01 Data verification method, device and computer program product Pending CN114925406A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210620634.1A CN114925406A (en) 2022-06-01 2022-06-01 Data verification method, device and computer program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210620634.1A CN114925406A (en) 2022-06-01 2022-06-01 Data verification method, device and computer program product

Publications (1)

Publication Number Publication Date
CN114925406A true CN114925406A (en) 2022-08-19

Family

ID=82812699

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210620634.1A Pending CN114925406A (en) 2022-06-01 2022-06-01 Data verification method, device and computer program product

Country Status (1)

Country Link
CN (1) CN114925406A (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007124549A (en) * 2005-10-31 2007-05-17 Ntt Data Corp Time stamp information validation support server apparatus and method
KR20090128746A (en) * 2008-06-11 2009-12-16 주식회사 넥슨 Client system, server system, method and data frame for managing screen shot with regard to virtual space
US20130282869A1 (en) * 2012-04-24 2013-10-24 Nokia Corporation Method, apparatus, and computer program product for scheduling file uploads
CN104518876A (en) * 2013-09-29 2015-04-15 腾讯科技(深圳)有限公司 Service login method and device
CN107533709A (en) * 2015-04-23 2018-01-02 迪堡多富公司 The upload of mobile purse data collection
CN108701302A (en) * 2016-02-18 2018-10-23 康文科展有限公司 Investigation system
JP2018189469A (en) * 2017-05-01 2018-11-29 株式会社リコー Verification system, verification device, imaging apparatus, and program
CN109271778A (en) * 2018-09-21 2019-01-25 掌阅科技股份有限公司 Using installation source differentiating method, electronic equipment and computer storage medium
CN110990492A (en) * 2020-03-03 2020-04-10 支付宝(杭州)信息技术有限公司 Information processing method, device and equipment
CN112367612A (en) * 2020-11-06 2021-02-12 歌尔科技有限公司 UWB-based positioning method, UWB device and positioning system
WO2021082401A1 (en) * 2019-10-30 2021-05-06 北京海益同展信息科技有限公司 Data uploading method, system and apparatus, and electronic device
CN113518312A (en) * 2020-03-27 2021-10-19 华为技术有限公司 Communication method, device and system
CN113519147A (en) * 2019-03-08 2021-10-19 联想(新加坡)私人有限公司 Secure mode integrity verification
CN113572763A (en) * 2021-07-22 2021-10-29 中国工商银行股份有限公司 Data processing method and device, electronic equipment and storage medium
CN113993000A (en) * 2021-09-07 2022-01-28 朱磊 Transmission method, operation system and transmission equipment for field monitoring data
CN114048453A (en) * 2021-11-15 2022-02-15 中国工商银行股份有限公司 User feature generation method and device, computer equipment and storage medium
CN114128178A (en) * 2019-07-19 2022-03-01 联想(新加坡)私人有限公司 Transmitting data using relay user equipment
CN114338191A (en) * 2021-12-30 2022-04-12 北京百度网讯科技有限公司 Risk verification method, device, equipment and storage medium

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007124549A (en) * 2005-10-31 2007-05-17 Ntt Data Corp Time stamp information validation support server apparatus and method
KR20090128746A (en) * 2008-06-11 2009-12-16 주식회사 넥슨 Client system, server system, method and data frame for managing screen shot with regard to virtual space
US20130282869A1 (en) * 2012-04-24 2013-10-24 Nokia Corporation Method, apparatus, and computer program product for scheduling file uploads
CN104518876A (en) * 2013-09-29 2015-04-15 腾讯科技(深圳)有限公司 Service login method and device
CN107533709A (en) * 2015-04-23 2018-01-02 迪堡多富公司 The upload of mobile purse data collection
CN108701302A (en) * 2016-02-18 2018-10-23 康文科展有限公司 Investigation system
JP2018189469A (en) * 2017-05-01 2018-11-29 株式会社リコー Verification system, verification device, imaging apparatus, and program
CN109271778A (en) * 2018-09-21 2019-01-25 掌阅科技股份有限公司 Using installation source differentiating method, electronic equipment and computer storage medium
CN113519147A (en) * 2019-03-08 2021-10-19 联想(新加坡)私人有限公司 Secure mode integrity verification
CN114128178A (en) * 2019-07-19 2022-03-01 联想(新加坡)私人有限公司 Transmitting data using relay user equipment
WO2021082401A1 (en) * 2019-10-30 2021-05-06 北京海益同展信息科技有限公司 Data uploading method, system and apparatus, and electronic device
CN110990492A (en) * 2020-03-03 2020-04-10 支付宝(杭州)信息技术有限公司 Information processing method, device and equipment
CN113518312A (en) * 2020-03-27 2021-10-19 华为技术有限公司 Communication method, device and system
CN112367612A (en) * 2020-11-06 2021-02-12 歌尔科技有限公司 UWB-based positioning method, UWB device and positioning system
CN113572763A (en) * 2021-07-22 2021-10-29 中国工商银行股份有限公司 Data processing method and device, electronic equipment and storage medium
CN113993000A (en) * 2021-09-07 2022-01-28 朱磊 Transmission method, operation system and transmission equipment for field monitoring data
CN114048453A (en) * 2021-11-15 2022-02-15 中国工商银行股份有限公司 User feature generation method and device, computer equipment and storage medium
CN114338191A (en) * 2021-12-30 2022-04-12 北京百度网讯科技有限公司 Risk verification method, device, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
徐光伟;杨延彬;林柯;石秀金;: "远程不可信存储的数据完整性巡检算法研究", 小型微型计算机系统, no. 09, 15 September 2016 (2016-09-15), pages 1930 - 1936 *

Similar Documents

Publication Publication Date Title
CN112636957A (en) Early warning method and device based on log, server and storage medium
CN114389969A (en) Client test method and device, electronic equipment and storage medium
CN110599278B (en) Method, apparatus, and computer storage medium for aggregating device identifiers
CN112084114B (en) Method and apparatus for testing interfaces
CN117938515A (en) Access request processing method and device, electronic equipment and storage medium
CN116743619B (en) Network service testing method, device, equipment and storage medium
CN117527400A (en) Login authentication method and device, electronic equipment and storage medium
CN117093627A (en) Information mining method, device, electronic equipment and storage medium
CN115883647B (en) Service log recording method, system, device, terminal, server and medium
CN113590447B (en) Buried point processing method and device
CN114925406A (en) Data verification method, device and computer program product
US20220334744A1 (en) Method, electronic device, and computer program product for processing data
CN112866179B (en) Current limiting method and current limiting device
CN114428815A (en) Data storage method and device, electronic equipment and computer readable medium
CN111131369B (en) APP use condition transmission method and device, electronic equipment and storage medium
CN112994976A (en) Gateway testing method and device, electronic equipment and storage medium
CN112835854A (en) File storage method and device, electronic equipment and storage medium
CN112527802A (en) Soft link method and device based on key value database
CN112732471A (en) Error correction method and error correction device for interface return data
CN114650252B (en) Routing method and device based on enterprise service bus and computer equipment
US9473440B1 (en) Hyperlink validation
CN115190008B (en) Fault processing method, fault processing device, electronic equipment and storage medium
CN118503944B (en) Authentication method, device, equipment and storage medium
CN111833036B (en) Method, apparatus, device and computer readable medium for judging repeat transaction
CN106372178A (en) Transaction file processing method and device as well as server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination