CN115037515A - Stateless verification code verification method and device in open data network and electronic equipment - Google Patents
Stateless verification code verification method and device in open data network and electronic equipment Download PDFInfo
- Publication number
- CN115037515A CN115037515A CN202210468400.XA CN202210468400A CN115037515A CN 115037515 A CN115037515 A CN 115037515A CN 202210468400 A CN202210468400 A CN 202210468400A CN 115037515 A CN115037515 A CN 115037515A
- Authority
- CN
- China
- Prior art keywords
- verification code
- verification
- character string
- interface program
- picture
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 143
- 238000000034 method Methods 0.000 title claims abstract description 41
- 238000009877 rendering Methods 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 10
- 230000005540 biological transmission Effects 0.000 abstract description 11
- 238000004891 communication Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000010200 validation analysis Methods 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000002427 irreversible effect Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 238000006073 displacement reaction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Abstract
The application provides a stateless verification code verification method, a stateless verification code verification device and electronic equipment in an open data network, wherein the method comprises the steps of obtaining a request instruction input by an interface program; generating a picture verification code according to the request instruction; encrypting the verification code character string in the picture verification code according to a preset encryption algorithm to generate encryption information; sending the picture verification code and the encryption information to the interface program; acquiring a verification code character string and encryption information returned by an interface program; encrypting the verification code character string returned by the interface program according to the preset encryption algorithm, and judging whether the encrypted result is the same as the encrypted information or not; if yes, the verification is passed. The method and the device can improve the security of private data file transmission.
Description
Technical Field
Embodiments of the present application relate to the field of verification of an authentication code, and in particular, to a stateless authentication code verification method and apparatus in an open data network, and an electronic device.
Background
The verification code is generally a way to prevent malicious requests, and is generally expressed in the form of words, numbers, letters, or combinations thereof to generate a picture, so that a user can recognize information in the picture, which is generally randomly generated by the back end of the system. In any form, the background is bound to store correct answers, the user sees the verification codes in the interface and identifies the verification codes, then the verification codes are sent to the background server by the foreground interface program, the server needs to perform verification after receiving the verification codes, and the next operation can be performed only if the verification codes are correct.
The security of private data files of governments or enterprises is a common challenge in international data transmission. The adoption of a special network is too expensive, and although the internet and cloud environment realize high bandwidth and real-time performance, a large number of potential safety hazards exist, so that the further development requirements cannot be met.
Disclosure of Invention
In order to improve the security of private data file transmission, a stateless verification code verification method and device in an open data network and electronic equipment are provided.
In a first aspect of the present application, a stateless captcha verification method in an open data network is provided. The method comprises the following steps: .
Acquiring a request instruction input by an interface program;
generating a picture verification code according to the request instruction;
encrypting the verification code character string in the picture verification code according to a preset encryption algorithm to generate encryption information;
sending the picture verification code and the encryption information to the interface program;
acquiring a verification code character string and encryption information returned by an interface program;
encrypting the verification code character string returned by the interface program according to the preset encryption algorithm, and judging whether the encrypted result is the same as the encrypted information or not;
if yes, the verification is passed.
The technical scheme includes that a request instruction sent by an interface program is obtained, a picture verification code is generated according to the request instruction, a verification code character string in the generated picture verification code is encrypted through a preset encryption algorithm to generate encryption information, the picture verification code and the encryption information are simultaneously sent to the interface program, the interface program receives and displays the picture verification code, a user inputs the verification code character string on the interface program, and returns the verification code character string and the encryption information to the server at the same time, the server encrypts the verification code character string through a preset encryption algorithm after receiving the verification code character string, and judging whether the encrypted result is the same as the encrypted information or not, if so, passing the verification, and after passing the verification, transmitting the privacy data file.
In a possible implementation manner, the method for generating a picture verification code according to the request instruction specifically includes:
after the request instruction is obtained, randomly generating a verification code character string;
and rendering the verification code character string through a preset rendering algorithm to generate the picture verification code.
In a possible implementation manner, before the method for generating encrypted information by encrypting the feature information according to a preset encryption algorithm, the method further includes:
and acquiring a preset encryption algorithm, wherein the encryption algorithm is stored in the cloud.
In a possible implementation manner, the preset encryption algorithm is a hash algorithm.
In one possible implementation, the rendering algorithm is base 64.
In a second aspect of the present application, there is provided an apparatus for stateless authentication code authentication in an open data network, the apparatus comprising:
the first acquisition module is used for acquiring a request instruction input by an interface program;
the verification code generating module is used for generating a picture verification code according to the request instruction;
the encryption module is used for encrypting the verification code character string in the picture verification code according to a preset encryption algorithm to generate encryption information;
the data sending module is used for sending the picture verification code and the encrypted information to the interface program;
the second acquisition module is used for acquiring the verification code character string and the encryption information returned by the interface program;
the verification module is used for encrypting the verification code character string returned by the interface program according to the preset encryption algorithm and judging whether the encrypted result is the same as the encrypted information or not;
and the judging module is used for passing the verification if the verification is successful.
In one possible implementation, the verification code generation module is further configured to:
after the request instruction is obtained, randomly generating a verification code character string;
and rendering the verification code character string through a preset rendering algorithm to generate the picture verification code.
In a third aspect of the present application, an electronic device is provided. The electronic device includes: the system comprises a memory and a processor, wherein the memory is stored with a computer program, and the processor realizes the verification method of the stateless verification code in the open data network when executing the program.
In a fourth aspect of the present application, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a stateless captcha validation method in an open data network.
It should be understood that what is described in this summary section is not intended to limit key or critical features of the embodiments of the application, nor is it intended to limit the scope of the application. Other features of the present application will become apparent from the following description.
Drawings
The above and other features, advantages and aspects of various embodiments of the present application will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. In the drawings, like or similar reference characters designate like or similar elements, and wherein:
FIG. 1 shows a flow diagram of a stateless captcha validation method in an open data network according to an embodiment of the present application;
FIG. 2 illustrates a block diagram of an apparatus for stateless captcha validation in an open data network, according to an embodiment of the present application;
fig. 3 shows a schematic structural diagram of an electronic device according to an embodiment of the application.
Reference numerals
200. A stateless authentication code authentication device in an open data network; 201. a first acquisition module; 202. a verification code generation module; 203. an encryption module; 204. a data transmission module; 205. a second acquisition module; 206. a verification module; 207. a judgment module; 301. a CPU; 302. a ROM; 303. a RAM; 304. an I/O interface; 305. an input section; 306. an output section; 307. a storage section; 308. a communication section; 309. a driver; 310. a removable media.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In addition, the term "and/or" herein is only one kind of association relationship describing the association object, and means that there may be three kinds of relationships, for example, a and/or B, and may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs unless specifically defined otherwise. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
Security of private data files of governments or enterprises is a common challenge in international data transmission. For example: the verification information needs to be transmitted in the whole international link, and needs to pass through a severe network environment even though passing through a backbone high-performance network; the network infrastructure is open to the world, in the area where the network resource is scarce, various resources must be flexibly utilized to ensure the stability of data transmission, and at this time, the security is challenged, so that the security problem faced by engineers in the transmission process is as follows: verifying whether the code is intercepted and tampered in an unsecured network segment; if the security level is not enough, protection can be provided for the verification code state to improve the security level; if a special network is too expensive to solve the problems, although the internet and cloud environment achieve high bandwidth and real-time performance, a large number of potential safety hazards exist, and further development requirements cannot be met. The embodiment of the application discloses a method and a device for verifying a stateless verification code in an open data network and electronic equipment.
Fig. 1 shows a flowchart of a stateless captcha validation method in an open data network according to an embodiment of the present application. Referring to fig. 1, the stateless authentication code authentication method in the open data network includes:
s101: and acquiring a request instruction input by the interface program.
Specifically, in the process of performing private data transmission by verification of the verification code, when the private data transmission is required, a user inputs a request instruction through an interface program, and transmits the request instruction to the server.
S102: and generating a picture verification code according to the request instruction.
Specifically, after receiving the request instruction, the server randomly generates a verification code character string, where the verification code character string may be a number or a letter or a combination of a number and a letter, and after generating the verification code character string, the server renders the verification code character string through a preset rendering algorithm to generate a picture verification code, in this embodiment, the rendering algorithm is base64, and base64 is one of encoding manners for transmitting an 8Bit byte code.
S103: and encrypting the verification code character string in the picture verification code according to a preset encryption algorithm to generate encryption information.
Specifically, after the verification code character string is generated, the verification code character string is subjected to confusion displacement through a preset encryption algorithm to generate encryption information. In one example, the encryption algorithm is a hash algorithm encryption algorithm, and the hash algorithm encryption process is irreversible, so that the security is improved. In another example, obfuscating shifts of the captcha string may also be performed on its own, on a fixed rule.
S104: and sending the picture verification code and the encryption information to an interface program.
Specifically, the verification code picture and the encrypted information formed after encryption are sent to the interface program, and the interface program receives and displays the picture verification code.
S105: and acquiring the verification code character string and the encryption information returned by the interface program.
Specifically, a user views the picture verification code through an interface program, inputs a verification code character string in the picture verification code into the interface program, and transmits the obtained verification code character string and the encryption information corresponding to the verification code character string to the server when the interface program obtains the verification code character string.
S106: and encrypting the verification code character string returned by the interface program according to a preset encryption algorithm, and judging whether the encrypted result is the same as the encrypted information.
Specifically, after the verification code character string returned by the interface program is obtained, the verification code character string returned by the interface program is encrypted through a preset encryption algorithm, the same encryption mode is adopted for encrypting the verification code character string generated by the server and the verification code character string returned by the interface program, the encrypted result is compared with the encrypted information, and whether the encrypted result is the same or not is judged.
S107: if yes, the verification is passed. At this point, private data transmission is allowed.
S108: if not, the verification fails. At this point, private data transmission is not allowed.
By adopting the scheme, in the verification process of the verification code, the correct verification code does not need to be stored in the server, and in the process of encrypting the character string of the verification code, the hash algorithm encryption process is irreversible, so that a user can obtain the encrypted information by using a network packet capturing mode or a developer mode and the like and can not decrypt the encrypted information to obtain the character string of the verification code, and the verification process is safer.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are all alternative embodiments and that the acts and modules referred to are not necessarily required for the application.
The above is a description of method embodiments, and the embodiments of the present application are further described below by way of apparatus embodiments.
Fig. 2 shows a block diagram of a stateless captcha validation apparatus 200 in an open data network according to an embodiment of the present application. Referring to fig. 2, the stateless authenticator verification apparatus 200 in the open data network includes:
a first obtaining module 201, configured to obtain a request instruction input by an interface program;
the verification code generation module 202 is configured to generate a picture verification code according to the request instruction;
the encryption module 203 is configured to encrypt a verification code character string in the picture verification code according to a preset encryption algorithm to generate encryption information;
the data sending module 204 is configured to send the picture verification code and the encrypted information to the interface program;
a second obtaining module 205, configured to obtain the verification code character string and the encryption information returned by the interface program;
the verification module 206 is configured to encrypt the verification code character string returned by the interface program according to a preset encryption algorithm, and determine whether an encrypted result is the same as the encrypted information;
the determining module 207 is configured to pass the verification if the verification is successful.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the described module may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
Fig. 3 shows a schematic structural diagram of an electronic device suitable for implementing embodiments of the present application.
The embodiment of the application discloses an electronic device. Referring to fig. 3, the electronic device includes a Central Processing Unit (CPU)301 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)302 or a program loaded from a storage section 307 into a Random Access Memory (RAM) 303. In the RAM 303, various programs and data necessary for system operation are also stored. The CPU 301, ROM 302, and RAM 303 are connected to each other via a bus. An input/output (I/O) interface 304 is also connected to the bus.
The following components are connected to the I/O interface 304: an input section 305 including a keyboard, a mouse, and the like; an output section 306 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 307 including a hard disk and the like; and a communication section 308 including a network interface card such as a LAN card, a modem, or the like. The communication section 308 performs communication processing via a network such as the internet. Drivers 309 are also connected to the I/O interface 304 as needed. A removable medium 310 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 309 as necessary, so that the computer program read out therefrom is mounted into the storage section 307 as necessary.
In particular, according to embodiments of the present application, the process described above with reference to the flowchart of fig. 1 may be implemented as a computer software program. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a machine-readable medium, the computer program comprising program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 308 and/or installed from the removable medium 310. The above-described functions defined in the apparatus of the present application are executed when the computer program is executed by the Central Processing Unit (CPU) 301.
It should be noted that the computer readable medium shown in the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the application referred to in the present application is not limited to the embodiments with a particular combination of the above-mentioned features, but also encompasses other embodiments with any combination of the above-mentioned features or their equivalents without departing from the spirit of the application. For example, the above features and the technical features (but not limited to) having similar functions in the present application are mutually replaced to form the technical solution.
Claims (9)
1. A stateless verification code verification method in an open data network is characterized by comprising the following steps:
acquiring a request instruction input by an interface program;
generating a picture verification code according to the request instruction;
encrypting the verification code character string in the picture verification code according to a preset encryption algorithm to generate encryption information;
sending the picture verification code and the encryption information to the interface program;
acquiring a verification code character string and encryption information returned by an interface program;
encrypting the verification code character string returned by the interface program according to the preset encryption algorithm, and judging whether the encrypted result is the same as the encrypted information or not;
if yes, the verification is passed.
2. The method for stateless authentication code authentication in an open data network of claim 1, wherein:
the method for generating the picture verification code according to the request instruction specifically comprises the following steps:
after the request instruction is obtained, randomly generating a verification code character string;
and rendering the verification code character string through a preset rendering algorithm to generate the picture verification code.
3. The method for stateless authentication code authentication in an open data network of claim 1, wherein:
the method for generating the encrypted information by encrypting the characteristic information according to the preset encryption algorithm further comprises the following steps:
and acquiring a preset encryption algorithm, wherein the encryption algorithm is stored in the cloud.
4. The method of claim 3, wherein the method comprises:
the preset encryption algorithm is as follows: a hash algorithm.
5. The method for stateless authentication code authentication in an open data network of claim 1, wherein:
the rendering algorithm is base 64.
6. A stateless authentication code authentication device in an open data network, comprising:
the first acquisition module (201) is used for acquiring a request instruction input by the interface program;
the verification code generating module (202) is used for generating a picture verification code according to the request instruction;
the encryption module (203) is used for encrypting the verification code character string in the picture verification code according to a preset encryption algorithm to generate encryption information;
the data sending module (204) is used for sending the picture verification code and the encryption information to the interface program;
a second obtaining module (205) for obtaining the verification code character string and the encryption information returned by the interface program;
the verification module (206) is used for encrypting the verification code character string returned by the interface program according to the preset encryption algorithm and judging whether the encrypted result is the same as the encrypted information or not;
and the judgment module (207) is used for passing the verification if the verification is positive.
7. The stateless authentication code authentication apparatus in an open data network of claim 7, wherein: the verification code generation module (202) is further configured to:
after the request instruction is obtained, randomly generating a verification code character string;
and rendering the verification code character string through a preset rendering algorithm to generate the picture verification code.
8. An electronic device comprising a memory and a processor, the memory having stored thereon a computer program, characterized in that the processor, when executing the program, implements the method according to any of claims 1-5.
9. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the method according to any one of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210468400.XA CN115037515A (en) | 2022-04-29 | 2022-04-29 | Stateless verification code verification method and device in open data network and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210468400.XA CN115037515A (en) | 2022-04-29 | 2022-04-29 | Stateless verification code verification method and device in open data network and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115037515A true CN115037515A (en) | 2022-09-09 |
Family
ID=83119282
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210468400.XA Pending CN115037515A (en) | 2022-04-29 | 2022-04-29 | Stateless verification code verification method and device in open data network and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115037515A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106899411A (en) * | 2016-12-08 | 2017-06-27 | 阿里巴巴集团控股有限公司 | A kind of method of calibration and device based on identifying code |
CN106899610A (en) * | 2017-03-22 | 2017-06-27 | 世纪恒通科技股份有限公司 | A kind of checking code verification method without storage |
CN110798433A (en) * | 2018-08-03 | 2020-02-14 | 广州小鹏汽车科技有限公司 | Verification code verification method and device |
WO2021051941A1 (en) * | 2019-09-18 | 2021-03-25 | 平安科技(深圳)有限公司 | Information processing method and apparatus |
CN114266033A (en) * | 2021-11-26 | 2022-04-01 | 中国联合网络通信集团有限公司 | Verification code generation method and device, verification code login system and electronic equipment |
-
2022
- 2022-04-29 CN CN202210468400.XA patent/CN115037515A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106899411A (en) * | 2016-12-08 | 2017-06-27 | 阿里巴巴集团控股有限公司 | A kind of method of calibration and device based on identifying code |
CN106899610A (en) * | 2017-03-22 | 2017-06-27 | 世纪恒通科技股份有限公司 | A kind of checking code verification method without storage |
CN110798433A (en) * | 2018-08-03 | 2020-02-14 | 广州小鹏汽车科技有限公司 | Verification code verification method and device |
WO2021051941A1 (en) * | 2019-09-18 | 2021-03-25 | 平安科技(深圳)有限公司 | Information processing method and apparatus |
CN114266033A (en) * | 2021-11-26 | 2022-04-01 | 中国联合网络通信集团有限公司 | Verification code generation method and device, verification code login system and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108965230B (en) | Secure communication method, system and terminal equipment | |
CN110336774B (en) | Mixed encryption and decryption method, equipment and system | |
CN108566381A (en) | A kind of security upgrading method, device, server, equipment and medium | |
US9197420B2 (en) | Using information in a digital certificate to authenticate a network of a wireless access point | |
CN105007279A (en) | Authentication method and authentication system | |
CN111371549A (en) | Message data transmission method, device and system | |
CN108880812B (en) | Method and system for data encryption | |
CN109688098B (en) | Method, device and equipment for secure communication of data and computer readable storage medium | |
CN109660534B (en) | Multi-merchant-based security authentication method and device, electronic equipment and storage medium | |
CN113114654B (en) | Terminal equipment access security authentication method, device and system | |
CN112968910B (en) | Replay attack prevention method and device | |
CN114448605A (en) | Encrypted ciphertext verification method, system, equipment and computer readable storage medium | |
CN111249740A (en) | Resource data access method and system | |
CN113630412B (en) | Resource downloading method, resource downloading device, electronic equipment and storage medium | |
CN114785524A (en) | Electronic seal generation method, device, equipment and medium | |
CN115296807B (en) | Key generation method, device and equipment for preventing industrial control network viruses | |
CN116633582A (en) | Secure communication method, apparatus, electronic device and storage medium | |
CN107395350B (en) | Method and system for generating key and key handle and intelligent key safety equipment | |
CN114172923B (en) | Data transmission method, communication system and communication device | |
CN113672955B (en) | Data processing method, system and device | |
CN112565156B (en) | Information registration method, device and system | |
CN115037515A (en) | Stateless verification code verification method and device in open data network and electronic equipment | |
CN111355584B (en) | Method and apparatus for generating blockchain multi-signatures | |
CN115086428A (en) | Network request sending method and device and electronic equipment | |
CN112926076B (en) | Data processing method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220909 |