CN114978646A - Access authority determination method, device, equipment and storage medium - Google Patents

Access authority determination method, device, equipment and storage medium Download PDF

Info

Publication number
CN114978646A
CN114978646A CN202210523364.2A CN202210523364A CN114978646A CN 114978646 A CN114978646 A CN 114978646A CN 202210523364 A CN202210523364 A CN 202210523364A CN 114978646 A CN114978646 A CN 114978646A
Authority
CN
China
Prior art keywords
encryption information
current
accessible
group
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210523364.2A
Other languages
Chinese (zh)
Inventor
郑锐
赵莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jingdong Technology Holding Co Ltd
Original Assignee
Jingdong Technology Holding Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jingdong Technology Holding Co Ltd filed Critical Jingdong Technology Holding Co Ltd
Priority to CN202210523364.2A priority Critical patent/CN114978646A/en
Publication of CN114978646A publication Critical patent/CN114978646A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a method, a device, equipment and a storage medium for determining access authority, wherein the method comprises the following steps: acquiring a current network address to be accessed; encrypting the current network address, and determining current address encryption information corresponding to the current network address, wherein the current address encryption information comprises a current digital ciphertext; detecting whether a target encryption information group matched with the current digital ciphertext exists or not based on a group identifier corresponding to the stored encryption information group; and if the target encryption information group exists, determining the access authority corresponding to the current network address according to the encryption information of each target accessible address in the target encryption information group and the current address encryption information. Through the technical scheme of the embodiment of the invention, the determining efficiency of the access authority can be improved, and the safety of data is ensured.

Description

Access authority determination method, device, equipment and storage medium
Technical Field
The embodiment of the invention relates to the internet technology, in particular to a method, a device, equipment and a storage medium for determining access authority.
Background
With the rapid development of internet technology, it is necessary to manage access rights to network addresses in order to ensure the security of network communication.
Currently, it is common to store legitimate accessible network addresses in a database. When a certain network address is accessed, whether the network address is an accessible network address or not can be determined by matching each accessible network address in the database with the network address, namely whether the network address has access right or not.
However, in the process of implementing the present invention, the inventor finds that at least the following problems exist in the prior art:
the stored data volume of the accessible network address is huge, so that the determining efficiency of the access right is low through a one-by-one matching mode, the waiting time of a user is long, the user experience is reduced, the accessible network address is directly stored, the risk of data embezzlement exists, and the safety of the data cannot be guaranteed.
Disclosure of Invention
The embodiment of the invention provides an access right determining method, device, equipment and storage medium, which are used for improving the determining efficiency of access rights and ensuring the security of data.
In a first aspect, an embodiment of the present invention provides an access right determining method, including:
acquiring a current network address to be accessed;
encrypting the current network address, and determining current address encryption information corresponding to the current network address, wherein the current address encryption information comprises a current digital ciphertext;
detecting whether a target encryption information group matched with the current digital ciphertext exists or not based on a group identifier corresponding to a stored encryption information group, wherein the encryption information group is obtained by grouping the accessible address encryption information based on the accessible digital ciphertext in the accessible address encryption information corresponding to the accessible network address, and the group identifier is determined based on the accessible digital ciphertext in the encryption information group;
and if the target encryption information group exists, determining the access authority corresponding to the current network address according to the encryption information of each target accessible address in the target encryption information group and the current address encryption information.
In a second aspect, an embodiment of the present invention further provides an apparatus for determining access rights, including:
the current network address acquisition module is used for acquiring a current network address to be accessed;
the encryption processing module is used for encrypting the current network address and determining current address encryption information corresponding to the current network address, wherein the current address encryption information comprises a current digital ciphertext;
the detection module is used for detecting whether a target encryption information group matched with the current digital ciphertext exists or not based on a group identifier corresponding to a stored encryption information group, wherein the encryption information group is obtained by grouping the accessible address encryption information based on the accessible digital ciphertext in the accessible address encryption information corresponding to the accessible network address, and the group identifier is determined based on the accessible digital ciphertext in the encryption information group;
and the access authority determining module is used for determining the access authority corresponding to the current network address according to the target encryption information group and the current address encryption information if the target encryption information group exists.
In a third aspect, an embodiment of the present invention further provides an electronic device, where the electronic device includes:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement an access rights determination method as provided by any of the embodiments of the invention.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the access right determining method according to any embodiment of the present invention.
The embodiment of the invention has the following advantages or beneficial effects:
by encrypting the accessible network address in advance, grouping the accessible address encrypted information to obtain each encrypted information group based on the accessible digital ciphertext in the accessible address encrypted information corresponding to the accessible network address, and determining the corresponding group identifier based on the accessible digital ciphertext in the encrypted information group, the security of the stored data can be ensured by an encryption mode, and the determination efficiency of the access right can be improved by a grouping mode. After the current network address to be accessed is obtained, the current network address can be encrypted, the current address encryption information corresponding to the current network address is determined, and detecting whether a target encryption information set matching the current digital cipher text in the current address encryption information exists based on the set identification corresponding to the stored encryption information set, thus based on the current digital cipher text, the encryption information can be matched with the group identification corresponding to each encryption information group without being matched with each accessible address encryption information, and when the matched target encryption information group exists, the access authority corresponding to the current network address is further determined according to the encryption information of each target accessible address in the target encryption information group and the current address encryption information, so that the determination efficiency of the access authority can be improved, and the safety of data is ensured.
Drawings
Fig. 1 is a flowchart of an access right determining method according to an embodiment of the present invention;
fig. 2 is a preset example of an encrypted file according to an embodiment of the present invention;
fig. 3 is a flowchart of an access right determining method according to a second embodiment of the present invention;
fig. 4 is a schematic structural diagram of an access right determining apparatus according to a third embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device according to a fourth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of an access right determining method according to an embodiment of the present invention, where this embodiment is applicable to a case where, when there are a large number of accessible network addresses, it is determined whether a current network address to be accessed has an access right, and especially, it is applicable to a scenario where, when a user accesses a network address through a client, it is determined whether the network address has an access right. The method may be performed by an access rights determining means, which may be implemented in software and/or hardware, integrated in an electronic device. As shown in fig. 1, the method specifically includes the following steps:
and S110, acquiring the current network address to be accessed.
The current network address may refer to a network address corresponding to an information resource to be accessed currently. For example, an information resource may refer to an HTML page. The network address may refer to a URL (Uniform Resource locator). Each information resource has a uniform and network-unique URL address, so that the corresponding information resource can be accessed by accessing the URL address.
Specifically, when a user accesses a corresponding information resource by triggering a network address on a client, the current network address to be accessed currently can be intercepted and acquired.
And S120, encrypting the current network address, and determining current address encryption information corresponding to the current network address, wherein the current address encryption information comprises a current digital ciphertext.
The current digital ciphertext may be a pure digital ciphertext that may be sorted and corresponds to the current network address. The current address encryption information in this embodiment may include only the current digital cipher text.
Specifically, the current protocol information, the current domain name information, and the resource storage path information in the current network address may be extracted as data to be encrypted, and the data to be encrypted is encrypted based on a preset digital encryption mode to determine a current digital ciphertext corresponding to the current network address. By only encrypting the current protocol information, the current domain name information and the resource storage path information in the current network address, invalid data in the current network address can be prevented from being encrypted, and the validity of the encrypted information is ensured. The preset digital encryption mode may be a preset mode for generating a pure digital ciphertext. The preset digital encryption method may be, but is not limited to, a pure digital encryption method in the MD5(Message Digest Algorithm) Message Digest. For example, if the current network address is: if https:// list.jd.com/list.htmlcat ═ 737,794,798, then the data to be encrypted is extracted as: html, the data to be encrypted can be generated into the longest 16-bit current digital cipher text, such as 2513289846331975, in an MD5 pure digital encryption mode.
S130, detecting whether a target encryption information group matched with the current digital ciphertext exists or not based on a group identifier corresponding to the stored encryption information group, wherein the encryption information group is obtained by grouping the accessible address encryption information based on the accessible digital ciphertext in the accessible address encryption information corresponding to the accessible network address, and the group identifier is determined based on the accessible digital ciphertext in the encryption information group.
Illustratively, grouping the respective accessible address encryption information based on the accessible digital ciphertext in the accessible address encryption information corresponding to the accessible network address to obtain respective encryption information groups may include: encrypting each accessible network address, and determining accessible address encryption information corresponding to each accessible network address; and grouping the accessible address encryption information based on a preset grouping mode and the accessible digital ciphertext in the accessible address encryption information to obtain each encryption information group.
The accessible network address may be a preset legal network address with access right. The accessible address encryption information in this embodiment may also include only an accessible digital ciphertext. Specifically, each accessible network address may be subjected to encryption processing based on the same procedure as current network address encryption processing. For example, for each accessible network address, accessible protocol information, accessible domain name information, and resource storage path information in the accessible network address may be extracted as data to be encrypted, and based on a preset digital encryption manner, encryption processing may be performed on the data to be encrypted, and an accessible digital ciphertext corresponding to the accessible network address may be determined. In this embodiment, each piece of accessible address encryption information may be grouped according to a preset grouping manner based on an accessible digital ciphertext corresponding to an accessible network address, that is, each piece of accessible digital ciphertext is grouped to obtain each encryption information group, where each obtained encryption information group includes at least one divided accessible digital ciphertext.
Illustratively, the grouping of the respective accessible address encryption information may be implemented by two grouping manners, to obtain the respective encryption information groups:
as a first grouping method, "grouping each piece of accessible address encryption information based on a preset grouping method and an accessible digital ciphertext in the accessible address encryption information to obtain each encryption information group," may include: and sequencing the accessible address encryption information based on the accessible digital ciphertext in the accessible address encryption information, and taking the accessible address encryption information of each preset number as a group according to the sequenced sequence to obtain each encryption information group.
The preset number may refer to the number of the accessible address encryption information included in each encryption information group, and may be set based on the service requirement and the number of the accessible network addresses currently existing.
Specifically, for the case that the accessible address encryption information only includes the accessible digital ciphertext, the accessible digital ciphertexts may be arranged in a descending order or an ascending order, the accessible digital ciphertexts with the numbers sequentially decreasing or sequentially increasing after the ordering are obtained, and each preset number of the accessible digital ciphertexts is divided into one group according to the arrangement order, that is, each encryption information group is obtained, and at this time, each encryption information group may include the same number of the accessible digital ciphertexts. For example, if there are 10 ten thousand accessible network addresses, 10 ten thousand accessible digital ciphertexts may be sorted, and each 1000 accessible digital ciphertexts are divided into one group according to the sorted order, so as to obtain 100 encrypted information groups.
As a second grouping method, "grouping each piece of accessible address encryption information based on a preset grouping method and an accessible digital ciphertext in the accessible address encryption information to obtain each encryption information group," may include: and based on the accessible digital ciphertext in the accessible address encryption information, using the accessible address encryption information in each preset digital ciphertext range with preset ciphertext intervals as a group to obtain each encryption information group.
The preset digital ciphertext range may be a preset digital ciphertext range with a fixed preset ciphertext interval. For example, if the preset cipher text interval is 1000, the preset digital cipher text range may be: 21000-21999, 22000-22999, etc.
Specifically, for the case that the accessible address encryption information only includes the accessible digital ciphertext, the preset digital ciphertext range in which each accessible digital ciphertext is located may be detected, and each accessible digital ciphertext located in the same preset digital ciphertext range may be divided into a group, that is, each encryption information group is obtained.
For example, determining a group identifier corresponding to the encrypted information group based on the accessible digital ciphertext in the encrypted information group may include: and determining the group identifier corresponding to each encrypted information group based on a preset group identifier determination mode matched with the preset grouping mode and based on each accessible digital ciphertext in each encrypted information group.
For example, the first group identification determination method matching the first grouping method may be: and determining the group identifier corresponding to the encrypted information group based on the minimum accessible digital ciphertext in the encrypted information group, or determining the group identifier corresponding to the encrypted information group based on the maximum accessible digital ciphertext in the encrypted information group. Specifically, for each encrypted information group, if the accessible digital ciphertexts are sorted in an ascending order, the smallest accessible digital cipher text (i.e., the first accessible digital cipher text) or the largest accessible digital cipher text (i.e., the last accessible digital cipher text) in the encrypted information group may be directly used as the group identifier corresponding to the encrypted information group. Or, if the encrypted information group is stored in the form of a file, a corresponding file name may be generated from the minimum accessible digital ciphertext or the maximum accessible digital ciphertext in the encrypted information group and the file identifier, and the file name may be used as the group identifier. For example, if the smallest accessible digital ciphertext in a certain encrypted information group is 21344, the generated file name may be: txt as group identification.
The second group id determination method matched with the second grouping method may be: and determining a group identifier corresponding to the encrypted information group based on a left end point in a preset digital ciphertext range corresponding to the encrypted information group, or determining a group identifier corresponding to the encrypted information group based on a right end point in a preset digital ciphertext range corresponding to the encrypted information group. Specifically, for each encrypted information group, a lower limit value or an upper limit value of a preset digital ciphertext range in which the encrypted information group is located may be directly determined as a group identifier corresponding to the encrypted information group. Or, if the encrypted information group is stored in the form of a file, a corresponding file name may be generated from the lower limit value or the upper limit value of the preset digital ciphertext range in which the encrypted information group is located and the file identifier, and the file name may be used as the group identifier. For example, if the preset digital ciphertext range of a certain encrypted information group is 21000-21999, the lower limit value of 21000 or 21999 may be directly used as the group identifier corresponding to the encrypted information group. Or the generated file name 21000jrapp.txt or 21999jrapp.txt is used as the group identifier.
Illustratively, S130 may include: acquiring a group identifier corresponding to each stored encryption information group; determining a target group identifier corresponding to the current digital ciphertext; and matching the target group identification with the group identification corresponding to each encrypted information group, and determining whether the target encrypted information group corresponding to the target group identification exists.
Specifically, the target group identifier corresponding to the current digital ciphertext may be determined based on a manner that matches the group identifier manner corresponding to the determined encrypted information group. For example, if the group identifier corresponding to the encrypted information group is determined based on the first group identifier determining manner, the current digital ciphertext may be matched with the digital ciphertext in each stored group identifier, and the group identifier corresponding to the matched data ciphertext may be determined as the target group identifier. For example, when the minimum accessible digital ciphertext in the encrypted information group is used as the group identifier corresponding to the encrypted information group, the group identifiers may be sorted from small to large, and whether the current digital ciphertext is located in two adjacent group identifiers is detected, if so, the group identifier with a small value may be used as the target group identifier. For example, if the group identifier corresponding to the encrypted information group is determined based on the second group identifier determining manner, a quotient result obtained by dividing the current digital ciphertext by the preset ciphertext interval may be multiplied by the preset ciphertext interval, and an obtained numerical value is used as the target group identifier. For example, if the current digital ciphertext is: 21024, if the ciphertext interval is set to 1000, it may be determined that the target group id is 21000. And matching the target group identification with each stored group identification, and detecting whether the target group identification exists in each stored group identification, so that whether a target encryption information group corresponding to the target group identification exists can be determined.
S140, if the target encryption information group exists, determining the access authority corresponding to the current network address according to the encryption information of each target accessible address in the target encryption information group and the current address encryption information.
Specifically, when the target encryption information group exists, it indicates that the current network address may be a legal accessible network address, and at this time, the current address encryption information may be matched with each target accessible address encryption information in the target encryption information group, and it is determined whether target accessible address encryption information identical to the current address encryption information exists, so as to determine whether the current network address has an access right. For example, for the case where only accessible digital ciphertext is included in the accessible address encryption information, the current digital ciphertext may be matched with each accessible digital ciphertext in the target encryption information set to determine whether a target accessible digital ciphertext that is the same as the current digital ciphertext exists, thereby determining whether the current network address has access rights. If the current network address has the access right, and the webpage corresponding to the current network address can be loaded at the moment, so that the user is allowed to access the information resource corresponding to the current network address. If the address does not exist, the current network address does not have the access right, the corresponding page is prohibited to be loaded at the moment, and the address non-compliance information can be displayed to prompt the reason of the access failure of the user.
Illustratively, if it is detected that there is no target encryption information set matching the current digital ciphertext, it is determined that the current network address does not have access rights. Specifically, when it is detected that no target encryption information group exists, no further permission verification is needed, and at this time, it can be directly determined that the current network address does not have the access permission, so that based on the current digital ciphertext, matching can be performed only with the group identifier corresponding to each encryption information group, matching with each accessible address encryption information is not needed, the determination efficiency of the access permission is greatly improved, and the security of data is ensured.
According to the technical scheme of the embodiment, the accessible network address is encrypted in advance, the accessible address encrypted information is grouped to obtain each encrypted information group based on the accessible digital ciphertext in the accessible address encrypted information corresponding to the accessible network address, and the corresponding group identifier is determined based on the accessible digital ciphertext in the encrypted information group, so that the security of stored data can be ensured through an encryption mode, and the determination efficiency of the access right can be improved through a grouping mode. After the current network address to be accessed is obtained, the current network address can be encrypted, the current address encryption information corresponding to the current network address is determined, and detecting whether a target encryption information group matched with the current digital cipher text in the current address encryption information exists or not based on the group identification corresponding to the stored encryption information group, thus based on the current digital cipher text, the encryption information can be matched with the group identification corresponding to each encryption information group without being matched with each accessible address encryption information, and when the matched target encryption information group exists, the access authority corresponding to the current network address is further determined according to the encryption information of each target accessible address in the target encryption information group and the current address encryption information, so that the determination efficiency of the access authority can be improved, and the safety of data is ensured.
On the basis of the foregoing technical solution, the determining the access right corresponding to the current network address according to the target accessible address encryption information and the current address encryption information in the target encryption information group in S140 may include: based on a binary search mode, whether the current digital ciphertext exists in each target accessible digital ciphertext in the target encryption information group is inquired; and determining the access right corresponding to the current network address based on the query result.
Specifically, for the case that the accessible address encryption information only includes accessible digital ciphertext, each target accessible digital ciphertext in the target encryption information group may be sorted and converted into an ordered array, and through a binary search manner, whether a current digital ciphertext exists in each target accessible digital ciphertext in the target encryption information group may be quickly determined, if so, it is determined that the current network address has an access right, otherwise, it is determined that the current network address does not have the access right, so that determination efficiency of the access right may be further improved without comparing one by one. For example, if the number of target accessible digital ciphertexts in the target encryption information group is 1000, the query result can be determined by binary search which requires log2(1000) <10 times at most, thereby realizing more efficient and secure verification of the access right.
On the basis of the above technical solutions, after determining the group identifier corresponding to the encrypted information group, the method may further include: storing each encrypted information group into a corresponding encrypted file, and determining a file name corresponding to the encrypted file based on the group identifier; and presetting each encrypted file into an application program package, and storing each encrypted file to an access terminal in a mode of installing the application program package.
Specifically, each encrypted information group may be stored in the form of a file, that is, one encrypted file stores one encrypted information group, and the corresponding file name is determined based on the group identifier. For example, if a digital cipher text is used as the group identifier, the corresponding file name may be determined based on the group identifier and the file identifier. Fig. 2 shows an example of presetting of an encrypted file. As shown in fig. 2, by presetting all generated encrypted files in an apk (android application package) application package, each encrypted file may be stored in a readable and writable directory of an access terminal by installing the application package, and the encrypted file may be updated by upgrading the application of the access terminal, for example, adding a new encrypted file. When the group identifier corresponding to each stored encrypted information group is obtained, each encrypted file in the readable and writable directory of the access terminal can be read into the memory of the access terminal, so that the group identifier corresponding to the file name of each encrypted file and each target accessible address encrypted information in the target encrypted information group are obtained, and the authority verification of the network address is realized.
Example two
Fig. 3 is a flowchart of an access right determining method according to a second embodiment of the present invention, where in this embodiment, on the basis of the above embodiment, the current address encryption information may include a current character string ciphertext in addition to a current numeric ciphertext, and on this basis, an access right determining process is described in detail. Wherein explanations of the same or corresponding terms as those of the above embodiments are omitted.
Referring to fig. 3, the method for determining access rights provided by this embodiment specifically includes the following steps:
s310, acquiring the current network address to be accessed.
S320, encrypting the current network address, and determining current address encryption information corresponding to the current network address, wherein the current address encryption information comprises a current digital ciphertext and a current character string ciphertext.
The current character string ciphertext may refer to a character string ciphertext having a number and an alphabet corresponding to the current network address. The current address encryption information in this embodiment may include, in addition to the current numeric ciphertext that may be sorted, a current string ciphertext with a higher encryption degree, so as to further ensure data security.
Exemplarily, S320 may include: extracting current protocol information, current domain name information and resource storage path information in a current network address; based on a preset digital encryption mode, carrying out encryption processing on current protocol information, current domain name information and resource storage path information, and determining a current digital ciphertext corresponding to a current network address; and based on a preset character string encryption mode, encrypting the current protocol information, the current domain name information and the resource storage path information, and determining a current character string ciphertext corresponding to the current network address.
The preset digital encryption mode may be a preset mode for generating a pure digital ciphertext. The preset character string encryption mode may be a preset mode for generating a ciphertext in a character string format. The preset digital encryption method may be, but is not limited to, a pure digital encryption method in the MD5(Message Digest Algorithm) Message Digest. The preset string encryption method may be, but is not limited to, the string encryption method in the MD5 message digest
Specifically, the current protocol information, the current domain name information, and the resource storage path information in the current network address may be extracted as data to be encrypted, and the data to be encrypted is encrypted based on a preset digital encryption mode to determine a current digital ciphertext corresponding to the current network address. And encrypting the data to be encrypted by a preset character string encryption mode, and determining a current character string ciphertext corresponding to the current network address. By only encrypting the current protocol information, the current domain name information and the resource storage path information in the current network address, invalid data in the current network address can be prevented from being encrypted, and the validity of the encrypted information is ensured. For example, if the current network address is: https:// list.jd.com/list.html? And cat is 737,794,798, extracting the data to be encrypted as: https:// list.jd.com/list.html, the longest 16-bit current digital cipher text, such as 2513289846331975, can be generated from the data to be encrypted by MD5 pure digital encryption, and the 32-bit current string cipher text, such as c45bb5352d8d9a89e16dda3f1e9c7df6, can be generated from the data to be encrypted by MD5 string encryption. In this embodiment, the current digital ciphertext and the current character string ciphertext may be spliced to obtain current address encryption information generated by splicing, for example: the current address encryption information is: 2513289846331975-c45bb5352d8d9a89e16dda3f1e9c7df 6.
S330, detecting whether a target encryption information group matched with the current digital ciphertext exists or not based on a group identifier corresponding to the stored encryption information group, wherein the encryption information group is obtained by grouping the accessible address encryption information based on the accessible digital ciphertext in the accessible address encryption information corresponding to the accessible network address, and the group identifier is determined based on the accessible digital ciphertext in the encryption information group.
Illustratively, grouping the respective accessible address encryption information based on the accessible digital ciphertext in the accessible address encryption information corresponding to the accessible network address to obtain respective encryption information groups may include: encrypting each accessible network address, and determining accessible address encryption information corresponding to each accessible network address; and grouping the accessible address encryption information based on a preset grouping mode and the accessible digital ciphertext in the accessible address encryption information to obtain each encryption information group.
Specifically, in the same process as the current network address encryption processing, each accessible network address is encrypted, and the obtained accessible address encryption information also includes two portions of ciphertexts, that is, an accessible digital cipher text and an accessible character string cipher text. The two grouping modes given in the above embodiment, the first grouping mode: and sequencing the accessible address encryption information based on the accessible digital ciphertext in the accessible address encryption information, and taking the accessible address encryption information of each preset number as a group according to the sequenced sequence to obtain each encryption information group. The second grouping method: and based on the accessible digital ciphertext in the accessible address encryption information, taking the accessible address encryption information in each preset digital ciphertext range with preset ciphertext interval as a group to obtain each encryption information group. For the case that the accessible address encryption information includes an accessible digital ciphertext and an accessible character string ciphertext, each encryption information group grouped in each grouping mode may only include a corresponding accessible character string ciphertext (at this time, the accessible digital ciphertext is only used for encryption information sorting and group identification determination), or may include complete accessible address encryption information composed of the accessible digital ciphertext and the accessible character string ciphertext, so that a binary search mode may be subsequently utilized to perform fast query, and the authority determination efficiency is further improved. For example, the information stored in the encrypted information group is as follows:
7adfc819fc7e96f55955a2a342b37050
7fc9e1d76260c965f8a66cd646d4014b
3921e77a985fc0f2fb025370091946c2
……
f1ee90f0feb64e67d2d2ad843b414ba1
or,
9748402862000022-7adfc819fc7e96f55955a2a342b37050
9751480745123414-7fc9e1d76260c965f8a66cd646d4014b
9774615100228041-3921e77a985fc0f2fb025370091946c2
……
9998163985652090-f1ee90f0feb64e67d2d2ad843b414ba1
or,
21000-ef27bcf3fdc7228db0d0df08621a77db
21001-10909800a65dce39c3f54c57974e7a33
21002-a0dd066961968f903172e1a2f37d889d
……
21999-edeb7fc67e3b3326623edee195606a06
the determination method of the group identifier corresponding to the encrypted group information in this embodiment and the process of detecting whether the target encrypted information group matching the current digital ciphertext exists based on the group identifier corresponding to the stored encrypted information group may refer to the above embodiments, and details are not repeated here.
S340, if the target encryption information group exists, determining the access authority corresponding to the current network address according to the encryption information of each target accessible address in the target encryption information group and the current address encryption information.
Exemplarily, S340 may include: and matching each target accessible character string ciphertext in the target encryption information group with the current character string ciphertext, and determining the access right corresponding to the current network address based on the matching result.
Specifically, for the case that the target encryption information group may include only the corresponding target accessible character string ciphertext, each target accessible character string ciphertext in the target encryption information group may be matched with the current character string ciphertext, it may be determined whether a target accessible character string ciphertext that is the same as the current character string ciphertext exists, if so, it is determined that the current network address has the access right, otherwise, it is determined that the current network address does not have the access right. By utilizing the character string ciphertext with higher digit number for matching, the accuracy of determining the access authority can be further improved, and the data security is further ensured.
Exemplarily, S340 may further include: and if the current digital ciphertext exists in the target encryption information group is detected based on a binary search mode, matching the target accessible character string ciphertext corresponding to the current digital ciphertext in the target encryption information group with the current character string ciphertext, and determining the access authority corresponding to the current network address based on the matching result.
Specifically, for the case that the target encryption information group may include complete accessible address encryption information composed of an accessible digital ciphertext and an accessible character string ciphertext, each target accessible digital ciphertext in the target encryption information group may be sorted and converted into an ordered array, and whether a current digital ciphertext exists in each target accessible digital ciphertext in the target encryption information group may be quickly detected in a binary search manner without comparing one by one, so that the determination efficiency of the access right may be further improved. If the current digital ciphertext exists, whether a target accessible character string ciphertext corresponding to the current digital ciphertext in the target encryption information group is the same as the current character string ciphertext or not can be further determined, if so, the current network address has the access right, otherwise, the current network address does not have the access right, so that the accuracy of determining the access right can be further improved by utilizing the current character string ciphertext, and the data security is further ensured.
According to the technical scheme of the embodiment, the current address encryption information comprising the current digital ciphertext and the current character string ciphertext is determined by encrypting the current network address, and the current network address is verified based on the current digital ciphertext and the current character string ciphertext, so that the accuracy of determining the access right can be further improved, and the data security is further ensured.
The following is an embodiment of an access right determining apparatus provided in an embodiment of the present invention, which belongs to the same inventive concept as the access right determining methods in the above embodiments, and details that are not described in detail in the embodiment of the access right determining apparatus may refer to the embodiment of the access right determining method described above.
EXAMPLE III
Fig. 4 is a schematic structural diagram of an access right determining apparatus according to a third embodiment of the present invention, which is applicable to a case where it is determined whether a current network address to be accessed has an access right or not under the condition that there are a large number of accessible network addresses in the present embodiment. Referring to fig. 4, the apparatus specifically includes: a current network address acquisition module 410, an encryption processing module 420, a detection module 430 and an access right determination module 440.
The current network address obtaining module 410 is configured to obtain a current network address to be accessed; an encryption processing module 420, configured to perform encryption processing on a current network address, and determine current address encryption information corresponding to the current network address, where the current address encryption information includes a current digital ciphertext; the detection module 430 is configured to detect whether a target encrypted information group matching the current digital ciphertext exists based on a group identifier corresponding to the stored encrypted information group, where the encrypted information group is obtained by grouping accessible address encrypted information based on an accessible digital ciphertext in the accessible address encrypted information corresponding to an accessible network address, and the group identifier is determined based on the accessible digital ciphertext in the encrypted information group; and an access right determining module 440, configured to determine, if the target encryption information group exists, an access right corresponding to the current network address according to the target encryption information group and the current address encryption information.
Optionally, the apparatus further comprises: an encrypted information grouping module;
an encrypted information packet module comprising:
the encryption processing unit is used for carrying out encryption processing on each accessible network address and determining accessible address encryption information corresponding to each accessible network address;
and the encryption information grouping unit is used for grouping the accessible address encryption information based on a preset grouping mode and the accessible digital ciphertext in the accessible address encryption information to obtain each encryption information group.
Optionally, the encryption information grouping unit is specifically configured to:
sequencing the accessible address encryption information based on accessible digital ciphertext in the accessible address encryption information, and taking the accessible address encryption information of each preset number as a group according to the sequenced sequence to obtain each encryption information group; or,
and based on the accessible digital ciphertext in the accessible address encryption information, using the accessible address encryption information in each preset digital ciphertext range with a preset ciphertext interval as a group to obtain each encryption information group, wherein each preset digital ciphertext range is used as a group.
Optionally, the apparatus further comprises: a group identifier determining module, specifically configured to:
determining a group identifier corresponding to the encrypted information group based on the smallest accessible digital ciphertext in the encrypted information group, or determining a group identifier corresponding to the encrypted information group based on the largest accessible digital ciphertext in the encrypted information group; or,
and determining a group identifier corresponding to the encrypted information group based on the lower limit value of the preset digital ciphertext range corresponding to the encrypted information group, or determining the group identifier corresponding to the encrypted information group based on the upper limit value of the preset digital ciphertext range corresponding to the encrypted information group.
Optionally, the detecting module 430 is specifically configured to: acquiring a group identifier corresponding to each stored encryption information group; determining a target group identifier corresponding to the current digital ciphertext; and matching the target group identification with the group identification corresponding to each encrypted information group, and determining whether the target encrypted information group corresponding to the target group identification exists.
Optionally, the access right determining module 440 is specifically configured to: based on a binary search mode, whether the current digital ciphertext exists in each target accessible digital ciphertext in the target encryption information group is inquired; and determining the access right corresponding to the current network address based on the query result.
Optionally, the current address encryption information further includes: a current string ciphertext;
the encryption processing module 420 is specifically configured to: extracting current protocol information, current domain name information and resource storage path information in a current network address; based on a preset digital encryption mode, carrying out encryption processing on current protocol information, current domain name information and resource storage path information, and determining a current digital ciphertext corresponding to a current network address; and based on a preset character string encryption mode, encrypting the current protocol information, the current domain name information and the resource storage path information, and determining a current character string ciphertext corresponding to the current network address.
Optionally, the access right determining module 440 is specifically configured to:
matching each target accessible character string ciphertext in the target encryption information group with the current character string ciphertext, and determining the access authority corresponding to the current network address based on the matching result; or,
and if the current digital ciphertext exists in the target encryption information group is detected based on a binary search mode, matching the target accessible character string ciphertext corresponding to the current digital ciphertext in the target encryption information group with the current character string ciphertext, and determining the access authority corresponding to the current network address based on the matching result.
Optionally, the apparatus further comprises:
the encrypted information group storage module is used for storing each encrypted information group into a corresponding encrypted file after the group identification corresponding to the encrypted information group is determined, and determining the file name corresponding to the encrypted file based on the group identification; and presetting each encrypted file into an application program package, and storing each encrypted file to an access terminal in a mode of installing the application program package.
Optionally, the access right determining module 440 is further configured to: and if the target encryption information group matched with the current digital ciphertext does not exist, determining that the current network address does not have the access right.
The access right determining device provided by the embodiment of the invention can execute the access right determining method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of executing the access right determining method.
It should be noted that, in the embodiment of the access right determining apparatus, the included units and modules are only divided according to functional logic, but are not limited to the above division as long as the corresponding functions can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention.
Example four
Fig. 5 is a schematic structural diagram of an electronic device according to a fourth embodiment of the present invention. FIG. 5 illustrates a block diagram of an exemplary electronic device 12 suitable for use in implementing embodiments of the present invention. The electronic device 12 shown in fig. 5 is only an example and should not bring any limitation to the function and the scope of use of the embodiment of the present invention.
As shown in FIG. 5, electronic device 12 is embodied in the form of a general purpose computing device. The components of electronic device 12 may include, but are not limited to: one or more processors or processing units 16, a system memory 28, and a bus 18 that couples various system components including the system memory 28 and the processing unit 16.
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Electronic device 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by electronic device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 28 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)30 and/or cache memory 32. The electronic device 12 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 34 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, and commonly referred to as a "hard drive"). Although not shown in FIG. 5, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 18 by one or more data media interfaces. System memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in system memory 28, such program modules 42 including but not limited to an operating system, one or more application programs, other program modules, and program data, each of which or some combination of which may comprise an implementation of a network environment. Program modules 42 generally carry out the functions and/or methodologies of the described embodiments of the invention.
Electronic device 12 may also communicate with one or more external devices 14 (e.g., keyboard, pointing device, display 24, etc.), with one or more devices that enable a user to interact with electronic device 12, and/or with any devices (e.g., network card, modem, etc.) that enable electronic device 12 to communicate with one or more other computing devices. Such communication may be through an input/output (I/O) interface 22. Also, the electronic device 12 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet) via the network adapter 20. As shown, the network adapter 20 communicates with other modules of the electronic device 12 via the bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with electronic device 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 16 executes various functional applications and data processing by running a program stored in the system memory 28, for example, to implement the steps of an access right determining method provided by the embodiment of the present invention, the method including:
acquiring a current network address to be accessed;
encrypting the current network address, and determining current address encryption information corresponding to the current network address, wherein the current address encryption information comprises a current digital ciphertext;
detecting whether a target encryption information group matched with the current digital ciphertext exists or not based on a group identifier corresponding to the stored encryption information group, wherein the encryption information group is obtained by grouping all the accessible address encryption information based on the accessible digital ciphertext in the accessible address encryption information corresponding to the accessible network address, and the group identifier is determined based on the accessible digital ciphertext in the encryption information group;
and if the target encryption information group exists, determining the access authority corresponding to the current network address according to the encryption information of each target accessible address in the target encryption information group and the current address encryption information.
Of course, those skilled in the art can understand that the processor can also implement the technical solution of the access right determination method provided by any embodiment of the present invention.
EXAMPLE five
The present embodiment provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps of an access right determination method as provided by any of the embodiments of the present invention, the method comprising:
acquiring a current network address to be accessed;
encrypting the current network address, and determining current address encryption information corresponding to the current network address, wherein the current address encryption information comprises a current digital ciphertext;
detecting whether a target encryption information group matched with the current digital ciphertext exists or not based on a group identifier corresponding to the stored encryption information group, wherein the encryption information group is obtained by grouping the accessible address encryption information based on the accessible digital ciphertext in the accessible address encryption information corresponding to the accessible network address, and the group identifier is determined based on the accessible digital ciphertext in the encryption information group;
and if the target encryption information group exists, determining the access authority corresponding to the current network address according to the encryption information of each target accessible address in the target encryption information group and the current address encryption information.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The computer-readable storage medium may be, for example but not limited to: an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It will be understood by those skilled in the art that the modules or steps of the invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of computing devices, and optionally they may be implemented by program code executable by a computing device, such that it may be stored in a memory device and executed by a computing device, or it may be separately fabricated into various integrated circuit modules, or it may be fabricated by fabricating a plurality of modules or steps thereof into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in some detail by the above embodiments, the invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the invention, and the scope of the invention is determined by the scope of the appended claims.

Claims (13)

1. An access right determination method, comprising:
acquiring a current network address to be accessed;
encrypting the current network address, and determining current address encryption information corresponding to the current network address, wherein the current address encryption information comprises a current digital ciphertext;
detecting whether a target encryption information group matched with the current digital ciphertext exists or not based on a group identifier corresponding to a stored encryption information group, wherein the encryption information group is obtained by grouping all the accessible address encryption information based on accessible digital ciphertexts in accessible address encryption information corresponding to accessible network addresses, and the group identifier is determined based on the accessible digital ciphertexts in the encryption information group;
and if the target encryption information group exists, determining the access authority corresponding to the current network address according to the encryption information of each target accessible address in the target encryption information group and the current address encryption information.
2. The method of claim 1, wherein the grouping each accessible address encryption information based on an accessible digital ciphertext in an accessible address encryption information corresponding to an accessible network address to obtain each encryption information group comprises:
encrypting each accessible network address, and determining accessible address encryption information corresponding to each accessible network address;
and grouping the accessible address encryption information based on a preset grouping mode and an accessible digital ciphertext in the accessible address encryption information to obtain each encryption information group.
3. The method according to claim 2, wherein the grouping the accessible address encryption information based on a preset grouping manner to obtain each encryption information group comprises:
sequencing the accessible address encryption information based on accessible digital ciphertext in the accessible address encryption information, and taking the accessible address encryption information of each preset number as a group according to the sequenced sequence to obtain each encryption information group; or,
and based on the accessible digital ciphertext in the accessible address encryption information, using the accessible address encryption information in each preset digital ciphertext range with preset ciphertext intervals as a group to obtain each encryption information group, wherein each preset digital ciphertext range is used.
4. The method of claim 3, wherein determining the group identity corresponding to the encrypted set of information based on the accessible digital ciphertext of the encrypted set of information comprises:
determining a group identifier corresponding to the encrypted information group based on the smallest accessible digital ciphertext in the encrypted information group, or determining a group identifier corresponding to the encrypted information group based on the largest accessible digital ciphertext in the encrypted information group; or,
and determining a group identifier corresponding to the encrypted information group based on the lower limit value of the preset digital ciphertext range corresponding to the encrypted information group, or determining a group identifier corresponding to the encrypted information group based on the upper limit value of the preset digital ciphertext range corresponding to the encrypted information group.
5. The method of claim 1, wherein detecting whether a target set of encrypted information matching the current digital ciphertext exists based on a set identifier corresponding to the stored set of encrypted information comprises:
acquiring a group identifier corresponding to each stored encryption information group;
determining a target group identifier corresponding to the current digital ciphertext;
and matching the target group identification with the group identification corresponding to each encrypted information group, and determining whether the target encrypted information group corresponding to the target group identification exists.
6. The method of claim 1, wherein determining the access right corresponding to the current network address according to the target accessible address encryption information and the current address encryption information in the target encryption information group comprises:
based on a binary search mode, inquiring whether the current digital ciphertext exists in each target accessible digital ciphertext in the target encryption information group;
and determining the access right corresponding to the current network address based on the query result.
7. The method of claim 1, wherein the current address encryption information further comprises: a current string ciphertext;
the encrypting the current network address and determining current address encryption information corresponding to the current network address includes:
extracting current protocol information, current domain name information and resource storage path information in the current network address;
based on a preset digital encryption mode, carrying out encryption processing on the current protocol information, the current domain name information and the resource storage path information, and determining a current digital ciphertext corresponding to the current network address;
and based on a preset character string encryption mode, encrypting the current protocol information, the current domain name information and the resource storage path information, and determining a current character string ciphertext corresponding to the current network address.
8. The method of claim 7, wherein determining the access right corresponding to the current network address according to the target accessible address encryption information and the current address encryption information in the target encryption information group comprises:
matching each target accessible character string ciphertext in the target encryption information group with the current character string ciphertext, and determining an access right corresponding to the current network address based on a matching result; or,
and if the current digital ciphertext exists in the target encryption information group based on a binary search mode, matching a target accessible character string ciphertext corresponding to the current digital ciphertext in the target encryption information group with the current character string ciphertext, and determining the access right corresponding to the current network address based on a matching result.
9. The method of claim 1, after determining the group identifier corresponding to the encrypted information group, further comprising:
storing each encrypted information group into a corresponding encrypted file, and determining a file name corresponding to the encrypted file based on the group identifier;
and presetting each encrypted file into an application program package, and storing each encrypted file to an access terminal in a mode of installing the application program package.
10. The method according to any one of claims 1-9, further comprising:
and if the target encryption information group matched with the current digital ciphertext does not exist, determining that the current network address does not have the access right.
11. An access right determining apparatus, comprising:
the current network address acquisition module is used for acquiring a current network address to be accessed;
the encryption processing module is used for encrypting the current network address and determining current address encryption information corresponding to the current network address, wherein the current address encryption information comprises a current digital ciphertext;
the detection module is used for detecting whether a target encryption information group matched with the current digital ciphertext exists or not based on a group identifier corresponding to a stored encryption information group, wherein the encryption information group is obtained by grouping the accessible address encryption information based on the accessible digital ciphertext in the accessible address encryption information corresponding to the accessible network address, and the group identifier is determined based on the accessible digital ciphertext in the encryption information group;
and the access authority determining module is used for determining the access authority corresponding to the current network address according to the target encryption information group and the current address encryption information if the target encryption information group exists.
12. An electronic device, characterized in that the electronic device comprises:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the access rights determination method of any of claims 1-10.
13. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method for determining access rights according to any one of claims 1 to 10.
CN202210523364.2A 2022-05-13 2022-05-13 Access authority determination method, device, equipment and storage medium Pending CN114978646A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210523364.2A CN114978646A (en) 2022-05-13 2022-05-13 Access authority determination method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210523364.2A CN114978646A (en) 2022-05-13 2022-05-13 Access authority determination method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114978646A true CN114978646A (en) 2022-08-30

Family

ID=82983432

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210523364.2A Pending CN114978646A (en) 2022-05-13 2022-05-13 Access authority determination method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114978646A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116132166A (en) * 2023-02-03 2023-05-16 网易(杭州)网络有限公司 Communication method, device, equipment and storage medium based on block chain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040181679A1 (en) * 2003-03-13 2004-09-16 International Business Machines Corporation Secure database access through partial encryption
CN101655858A (en) * 2009-08-26 2010-02-24 华中科技大学 Cryptograph index structure based on blocking organization and management method thereof
US20100192210A1 (en) * 2009-01-26 2010-07-29 Apple Inc. Method and system for verifying entitlement to access content by url validation
CN102129473A (en) * 2011-04-19 2011-07-20 北京神州数码思特奇信息技术股份有限公司 Method for searching static data
CN105827582A (en) * 2015-09-14 2016-08-03 维沃移动通信有限公司 Communication encryption method, device and system
CN110222074A (en) * 2019-06-14 2019-09-10 北京金山云网络技术有限公司 It indexes lookup method, search device, electronic equipment and storage medium
CN113360500A (en) * 2021-06-03 2021-09-07 北京沃东天骏信息技术有限公司 Data processing method and device, storage medium and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040181679A1 (en) * 2003-03-13 2004-09-16 International Business Machines Corporation Secure database access through partial encryption
US20100192210A1 (en) * 2009-01-26 2010-07-29 Apple Inc. Method and system for verifying entitlement to access content by url validation
CN101655858A (en) * 2009-08-26 2010-02-24 华中科技大学 Cryptograph index structure based on blocking organization and management method thereof
CN102129473A (en) * 2011-04-19 2011-07-20 北京神州数码思特奇信息技术股份有限公司 Method for searching static data
CN105827582A (en) * 2015-09-14 2016-08-03 维沃移动通信有限公司 Communication encryption method, device and system
CN110222074A (en) * 2019-06-14 2019-09-10 北京金山云网络技术有限公司 It indexes lookup method, search device, electronic equipment and storage medium
CN113360500A (en) * 2021-06-03 2021-09-07 北京沃东天骏信息技术有限公司 Data processing method and device, storage medium and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116132166A (en) * 2023-02-03 2023-05-16 网易(杭州)网络有限公司 Communication method, device, equipment and storage medium based on block chain

Similar Documents

Publication Publication Date Title
CN108810006B (en) Resource access method, device, equipment and storage medium
CN108961052B (en) Verification method, storage method, device, equipment and medium of block chain data
CN109981297B (en) Block chain processing method, device, equipment and storage medium
CN110457628B (en) Webpage version checking method, device, equipment and storage medium
CN112528262A (en) Application program access method, device, medium and electronic equipment based on token
CN109213901B (en) Data synchronization method, device, equipment and medium of block chain
CN111416811A (en) Unauthorized vulnerability detection method, system, equipment and storage medium
CN109376534B (en) Method and apparatus for detecting applications
CN110888838A (en) Object storage based request processing method, device, equipment and storage medium
CN108353083A (en) The system and method for algorithm (DGA) Malware is generated for detecting domains
CN109255232B (en) Software loading method and software loading device
CN111935078B (en) Handle-based open authentication method, device and system
US8910281B1 (en) Identifying malware sources using phishing kit templates
Fu et al. Data correlation‐based analysis methods for automatic memory forensic
CN114978646A (en) Access authority determination method, device, equipment and storage medium
EP3647979A1 (en) Device attestation techniques
CN110837635A (en) Method, device, equipment and storage medium for equipment verification
CN109088872B (en) Using method and device of cloud platform with service life, electronic equipment and medium
CN110443039A (en) Detection method, device and the electronic equipment of plug-in security
CN105718599A (en) Method and device for analyzing database access data packet
CN110750388B (en) Backup analysis method, device, equipment and medium
US20140283080A1 (en) Identifying stored vulnerabilities in a web service
CN112711696A (en) Request access method, device, electronic equipment and storage medium
CN116028917A (en) Authority detection method and device, storage medium and electronic equipment
CN116055067A (en) Weak password detection method, device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination