CN115037515A - Stateless verification code verification method and device in open data network and electronic equipment - Google Patents

Stateless verification code verification method and device in open data network and electronic equipment Download PDF

Info

Publication number
CN115037515A
CN115037515A CN202210468400.XA CN202210468400A CN115037515A CN 115037515 A CN115037515 A CN 115037515A CN 202210468400 A CN202210468400 A CN 202210468400A CN 115037515 A CN115037515 A CN 115037515A
Authority
CN
China
Prior art keywords
verification code
verification
character string
interface program
picture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210468400.XA
Other languages
Chinese (zh)
Inventor
郑伟海
陈昊纬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Longtel Inc
Original Assignee
Longtel Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Longtel Inc filed Critical Longtel Inc
Priority to CN202210468400.XA priority Critical patent/CN115037515A/en
Publication of CN115037515A publication Critical patent/CN115037515A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Abstract

The application provides a stateless verification code verification method, a stateless verification code verification device and electronic equipment in an open data network, wherein the method comprises the steps of obtaining a request instruction input by an interface program; generating a picture verification code according to the request instruction; encrypting the verification code character string in the picture verification code according to a preset encryption algorithm to generate encryption information; sending the picture verification code and the encryption information to the interface program; acquiring a verification code character string and encryption information returned by an interface program; encrypting the verification code character string returned by the interface program according to the preset encryption algorithm, and judging whether the encrypted result is the same as the encrypted information or not; if yes, the verification is passed. The method and the device can improve the security of private data file transmission.

Description

Stateless verification code verification method and device in open data network and electronic equipment
Technical Field
Embodiments of the present application relate to the field of verification of an authentication code, and in particular, to a stateless authentication code verification method and apparatus in an open data network, and an electronic device.
Background
The verification code is generally a way to prevent malicious requests, and is generally expressed in the form of words, numbers, letters, or combinations thereof to generate a picture, so that a user can recognize information in the picture, which is generally randomly generated by the back end of the system. In any form, the background is bound to store correct answers, the user sees the verification codes in the interface and identifies the verification codes, then the verification codes are sent to the background server by the foreground interface program, the server needs to perform verification after receiving the verification codes, and the next operation can be performed only if the verification codes are correct.
The security of private data files of governments or enterprises is a common challenge in international data transmission. The adoption of a special network is too expensive, and although the internet and cloud environment realize high bandwidth and real-time performance, a large number of potential safety hazards exist, so that the further development requirements cannot be met.
Disclosure of Invention
In order to improve the security of private data file transmission, a stateless verification code verification method and device in an open data network and electronic equipment are provided.
In a first aspect of the present application, a stateless captcha verification method in an open data network is provided. The method comprises the following steps: .
Acquiring a request instruction input by an interface program;
generating a picture verification code according to the request instruction;
encrypting the verification code character string in the picture verification code according to a preset encryption algorithm to generate encryption information;
sending the picture verification code and the encryption information to the interface program;
acquiring a verification code character string and encryption information returned by an interface program;
encrypting the verification code character string returned by the interface program according to the preset encryption algorithm, and judging whether the encrypted result is the same as the encrypted information or not;
if yes, the verification is passed.
The technical scheme includes that a request instruction sent by an interface program is obtained, a picture verification code is generated according to the request instruction, a verification code character string in the generated picture verification code is encrypted through a preset encryption algorithm to generate encryption information, the picture verification code and the encryption information are simultaneously sent to the interface program, the interface program receives and displays the picture verification code, a user inputs the verification code character string on the interface program, and returns the verification code character string and the encryption information to the server at the same time, the server encrypts the verification code character string through a preset encryption algorithm after receiving the verification code character string, and judging whether the encrypted result is the same as the encrypted information or not, if so, passing the verification, and after passing the verification, transmitting the privacy data file.
In a possible implementation manner, the method for generating a picture verification code according to the request instruction specifically includes:
after the request instruction is obtained, randomly generating a verification code character string;
and rendering the verification code character string through a preset rendering algorithm to generate the picture verification code.
In a possible implementation manner, before the method for generating encrypted information by encrypting the feature information according to a preset encryption algorithm, the method further includes:
and acquiring a preset encryption algorithm, wherein the encryption algorithm is stored in the cloud.
In a possible implementation manner, the preset encryption algorithm is a hash algorithm.
In one possible implementation, the rendering algorithm is base 64.
In a second aspect of the present application, there is provided an apparatus for stateless authentication code authentication in an open data network, the apparatus comprising:
the first acquisition module is used for acquiring a request instruction input by an interface program;
the verification code generating module is used for generating a picture verification code according to the request instruction;
the encryption module is used for encrypting the verification code character string in the picture verification code according to a preset encryption algorithm to generate encryption information;
the data sending module is used for sending the picture verification code and the encrypted information to the interface program;
the second acquisition module is used for acquiring the verification code character string and the encryption information returned by the interface program;
the verification module is used for encrypting the verification code character string returned by the interface program according to the preset encryption algorithm and judging whether the encrypted result is the same as the encrypted information or not;
and the judging module is used for passing the verification if the verification is successful.
In one possible implementation, the verification code generation module is further configured to:
after the request instruction is obtained, randomly generating a verification code character string;
and rendering the verification code character string through a preset rendering algorithm to generate the picture verification code.
In a third aspect of the present application, an electronic device is provided. The electronic device includes: the system comprises a memory and a processor, wherein the memory is stored with a computer program, and the processor realizes the verification method of the stateless verification code in the open data network when executing the program.
In a fourth aspect of the present application, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a stateless captcha validation method in an open data network.
It should be understood that what is described in this summary section is not intended to limit key or critical features of the embodiments of the application, nor is it intended to limit the scope of the application. Other features of the present application will become apparent from the following description.
Drawings
The above and other features, advantages and aspects of various embodiments of the present application will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. In the drawings, like or similar reference characters designate like or similar elements, and wherein:
FIG. 1 shows a flow diagram of a stateless captcha validation method in an open data network according to an embodiment of the present application;
FIG. 2 illustrates a block diagram of an apparatus for stateless captcha validation in an open data network, according to an embodiment of the present application;
fig. 3 shows a schematic structural diagram of an electronic device according to an embodiment of the application.
Reference numerals
200. A stateless authentication code authentication device in an open data network; 201. a first acquisition module; 202. a verification code generation module; 203. an encryption module; 204. a data transmission module; 205. a second acquisition module; 206. a verification module; 207. a judgment module; 301. a CPU; 302. a ROM; 303. a RAM; 304. an I/O interface; 305. an input section; 306. an output section; 307. a storage section; 308. a communication section; 309. a driver; 310. a removable media.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In addition, the term "and/or" herein is only one kind of association relationship describing the association object, and means that there may be three kinds of relationships, for example, a and/or B, and may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs unless specifically defined otherwise. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
Security of private data files of governments or enterprises is a common challenge in international data transmission. For example: the verification information needs to be transmitted in the whole international link, and needs to pass through a severe network environment even though passing through a backbone high-performance network; the network infrastructure is open to the world, in the area where the network resource is scarce, various resources must be flexibly utilized to ensure the stability of data transmission, and at this time, the security is challenged, so that the security problem faced by engineers in the transmission process is as follows: verifying whether the code is intercepted and tampered in an unsecured network segment; if the security level is not enough, protection can be provided for the verification code state to improve the security level; if a special network is too expensive to solve the problems, although the internet and cloud environment achieve high bandwidth and real-time performance, a large number of potential safety hazards exist, and further development requirements cannot be met. The embodiment of the application discloses a method and a device for verifying a stateless verification code in an open data network and electronic equipment.
Fig. 1 shows a flowchart of a stateless captcha validation method in an open data network according to an embodiment of the present application. Referring to fig. 1, the stateless authentication code authentication method in the open data network includes:
s101: and acquiring a request instruction input by the interface program.
Specifically, in the process of performing private data transmission by verification of the verification code, when the private data transmission is required, a user inputs a request instruction through an interface program, and transmits the request instruction to the server.
S102: and generating a picture verification code according to the request instruction.
Specifically, after receiving the request instruction, the server randomly generates a verification code character string, where the verification code character string may be a number or a letter or a combination of a number and a letter, and after generating the verification code character string, the server renders the verification code character string through a preset rendering algorithm to generate a picture verification code, in this embodiment, the rendering algorithm is base64, and base64 is one of encoding manners for transmitting an 8Bit byte code.
S103: and encrypting the verification code character string in the picture verification code according to a preset encryption algorithm to generate encryption information.
Specifically, after the verification code character string is generated, the verification code character string is subjected to confusion displacement through a preset encryption algorithm to generate encryption information. In one example, the encryption algorithm is a hash algorithm encryption algorithm, and the hash algorithm encryption process is irreversible, so that the security is improved. In another example, obfuscating shifts of the captcha string may also be performed on its own, on a fixed rule.
S104: and sending the picture verification code and the encryption information to an interface program.
Specifically, the verification code picture and the encrypted information formed after encryption are sent to the interface program, and the interface program receives and displays the picture verification code.
S105: and acquiring the verification code character string and the encryption information returned by the interface program.
Specifically, a user views the picture verification code through an interface program, inputs a verification code character string in the picture verification code into the interface program, and transmits the obtained verification code character string and the encryption information corresponding to the verification code character string to the server when the interface program obtains the verification code character string.
S106: and encrypting the verification code character string returned by the interface program according to a preset encryption algorithm, and judging whether the encrypted result is the same as the encrypted information.
Specifically, after the verification code character string returned by the interface program is obtained, the verification code character string returned by the interface program is encrypted through a preset encryption algorithm, the same encryption mode is adopted for encrypting the verification code character string generated by the server and the verification code character string returned by the interface program, the encrypted result is compared with the encrypted information, and whether the encrypted result is the same or not is judged.
S107: if yes, the verification is passed. At this point, private data transmission is allowed.
S108: if not, the verification fails. At this point, private data transmission is not allowed.
By adopting the scheme, in the verification process of the verification code, the correct verification code does not need to be stored in the server, and in the process of encrypting the character string of the verification code, the hash algorithm encryption process is irreversible, so that a user can obtain the encrypted information by using a network packet capturing mode or a developer mode and the like and can not decrypt the encrypted information to obtain the character string of the verification code, and the verification process is safer.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are all alternative embodiments and that the acts and modules referred to are not necessarily required for the application.
The above is a description of method embodiments, and the embodiments of the present application are further described below by way of apparatus embodiments.
Fig. 2 shows a block diagram of a stateless captcha validation apparatus 200 in an open data network according to an embodiment of the present application. Referring to fig. 2, the stateless authenticator verification apparatus 200 in the open data network includes:
a first obtaining module 201, configured to obtain a request instruction input by an interface program;
the verification code generation module 202 is configured to generate a picture verification code according to the request instruction;
the encryption module 203 is configured to encrypt a verification code character string in the picture verification code according to a preset encryption algorithm to generate encryption information;
the data sending module 204 is configured to send the picture verification code and the encrypted information to the interface program;
a second obtaining module 205, configured to obtain the verification code character string and the encryption information returned by the interface program;
the verification module 206 is configured to encrypt the verification code character string returned by the interface program according to a preset encryption algorithm, and determine whether an encrypted result is the same as the encrypted information;
the determining module 207 is configured to pass the verification if the verification is successful.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the described module may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
Fig. 3 shows a schematic structural diagram of an electronic device suitable for implementing embodiments of the present application.
The embodiment of the application discloses an electronic device. Referring to fig. 3, the electronic device includes a Central Processing Unit (CPU)301 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)302 or a program loaded from a storage section 307 into a Random Access Memory (RAM) 303. In the RAM 303, various programs and data necessary for system operation are also stored. The CPU 301, ROM 302, and RAM 303 are connected to each other via a bus. An input/output (I/O) interface 304 is also connected to the bus.
The following components are connected to the I/O interface 304: an input section 305 including a keyboard, a mouse, and the like; an output section 306 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 307 including a hard disk and the like; and a communication section 308 including a network interface card such as a LAN card, a modem, or the like. The communication section 308 performs communication processing via a network such as the internet. Drivers 309 are also connected to the I/O interface 304 as needed. A removable medium 310 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 309 as necessary, so that the computer program read out therefrom is mounted into the storage section 307 as necessary.
In particular, according to embodiments of the present application, the process described above with reference to the flowchart of fig. 1 may be implemented as a computer software program. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a machine-readable medium, the computer program comprising program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 308 and/or installed from the removable medium 310. The above-described functions defined in the apparatus of the present application are executed when the computer program is executed by the Central Processing Unit (CPU) 301.
It should be noted that the computer readable medium shown in the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the application referred to in the present application is not limited to the embodiments with a particular combination of the above-mentioned features, but also encompasses other embodiments with any combination of the above-mentioned features or their equivalents without departing from the spirit of the application. For example, the above features and the technical features (but not limited to) having similar functions in the present application are mutually replaced to form the technical solution.

Claims (9)

1. A stateless verification code verification method in an open data network is characterized by comprising the following steps:
acquiring a request instruction input by an interface program;
generating a picture verification code according to the request instruction;
encrypting the verification code character string in the picture verification code according to a preset encryption algorithm to generate encryption information;
sending the picture verification code and the encryption information to the interface program;
acquiring a verification code character string and encryption information returned by an interface program;
encrypting the verification code character string returned by the interface program according to the preset encryption algorithm, and judging whether the encrypted result is the same as the encrypted information or not;
if yes, the verification is passed.
2. The method for stateless authentication code authentication in an open data network of claim 1, wherein:
the method for generating the picture verification code according to the request instruction specifically comprises the following steps:
after the request instruction is obtained, randomly generating a verification code character string;
and rendering the verification code character string through a preset rendering algorithm to generate the picture verification code.
3. The method for stateless authentication code authentication in an open data network of claim 1, wherein:
the method for generating the encrypted information by encrypting the characteristic information according to the preset encryption algorithm further comprises the following steps:
and acquiring a preset encryption algorithm, wherein the encryption algorithm is stored in the cloud.
4. The method of claim 3, wherein the method comprises:
the preset encryption algorithm is as follows: a hash algorithm.
5. The method for stateless authentication code authentication in an open data network of claim 1, wherein:
the rendering algorithm is base 64.
6. A stateless authentication code authentication device in an open data network, comprising:
the first acquisition module (201) is used for acquiring a request instruction input by the interface program;
the verification code generating module (202) is used for generating a picture verification code according to the request instruction;
the encryption module (203) is used for encrypting the verification code character string in the picture verification code according to a preset encryption algorithm to generate encryption information;
the data sending module (204) is used for sending the picture verification code and the encryption information to the interface program;
a second obtaining module (205) for obtaining the verification code character string and the encryption information returned by the interface program;
the verification module (206) is used for encrypting the verification code character string returned by the interface program according to the preset encryption algorithm and judging whether the encrypted result is the same as the encrypted information or not;
and the judgment module (207) is used for passing the verification if the verification is positive.
7. The stateless authentication code authentication apparatus in an open data network of claim 7, wherein: the verification code generation module (202) is further configured to:
after the request instruction is obtained, randomly generating a verification code character string;
and rendering the verification code character string through a preset rendering algorithm to generate the picture verification code.
8. An electronic device comprising a memory and a processor, the memory having stored thereon a computer program, characterized in that the processor, when executing the program, implements the method according to any of claims 1-5.
9. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the method according to any one of claims 1-5.
CN202210468400.XA 2022-04-29 2022-04-29 Stateless verification code verification method and device in open data network and electronic equipment Pending CN115037515A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210468400.XA CN115037515A (en) 2022-04-29 2022-04-29 Stateless verification code verification method and device in open data network and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210468400.XA CN115037515A (en) 2022-04-29 2022-04-29 Stateless verification code verification method and device in open data network and electronic equipment

Publications (1)

Publication Number Publication Date
CN115037515A true CN115037515A (en) 2022-09-09

Family

ID=83119282

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210468400.XA Pending CN115037515A (en) 2022-04-29 2022-04-29 Stateless verification code verification method and device in open data network and electronic equipment

Country Status (1)

Country Link
CN (1) CN115037515A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899411A (en) * 2016-12-08 2017-06-27 阿里巴巴集团控股有限公司 A kind of method of calibration and device based on identifying code
CN106899610A (en) * 2017-03-22 2017-06-27 世纪恒通科技股份有限公司 A kind of checking code verification method without storage
CN110798433A (en) * 2018-08-03 2020-02-14 广州小鹏汽车科技有限公司 Verification code verification method and device
WO2021051941A1 (en) * 2019-09-18 2021-03-25 平安科技(深圳)有限公司 Information processing method and apparatus
CN114266033A (en) * 2021-11-26 2022-04-01 中国联合网络通信集团有限公司 Verification code generation method and device, verification code login system and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899411A (en) * 2016-12-08 2017-06-27 阿里巴巴集团控股有限公司 A kind of method of calibration and device based on identifying code
CN106899610A (en) * 2017-03-22 2017-06-27 世纪恒通科技股份有限公司 A kind of checking code verification method without storage
CN110798433A (en) * 2018-08-03 2020-02-14 广州小鹏汽车科技有限公司 Verification code verification method and device
WO2021051941A1 (en) * 2019-09-18 2021-03-25 平安科技(深圳)有限公司 Information processing method and apparatus
CN114266033A (en) * 2021-11-26 2022-04-01 中国联合网络通信集团有限公司 Verification code generation method and device, verification code login system and electronic equipment

Similar Documents

Publication Publication Date Title
CN108965230B (en) Secure communication method, system and terminal equipment
CN110336774B (en) Mixed encryption and decryption method, equipment and system
CN108566381A (en) A kind of security upgrading method, device, server, equipment and medium
US9197420B2 (en) Using information in a digital certificate to authenticate a network of a wireless access point
CN105007279A (en) Authentication method and authentication system
CN111371549A (en) Message data transmission method, device and system
CN108880812B (en) Method and system for data encryption
CN109688098B (en) Method, device and equipment for secure communication of data and computer readable storage medium
CN109660534B (en) Multi-merchant-based security authentication method and device, electronic equipment and storage medium
CN113114654B (en) Terminal equipment access security authentication method, device and system
CN112968910B (en) Replay attack prevention method and device
CN114448605A (en) Encrypted ciphertext verification method, system, equipment and computer readable storage medium
CN111249740A (en) Resource data access method and system
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN114785524A (en) Electronic seal generation method, device, equipment and medium
CN115296807B (en) Key generation method, device and equipment for preventing industrial control network viruses
CN116633582A (en) Secure communication method, apparatus, electronic device and storage medium
CN107395350B (en) Method and system for generating key and key handle and intelligent key safety equipment
CN114172923B (en) Data transmission method, communication system and communication device
CN113672955B (en) Data processing method, system and device
CN112565156B (en) Information registration method, device and system
CN115037515A (en) Stateless verification code verification method and device in open data network and electronic equipment
CN111355584B (en) Method and apparatus for generating blockchain multi-signatures
CN115086428A (en) Network request sending method and device and electronic equipment
CN112926076B (en) Data processing method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220909