CN116485460A - Electronic card issuing method, short link generating method and storage medium - Google Patents

Electronic card issuing method, short link generating method and storage medium Download PDF

Info

Publication number
CN116485460A
CN116485460A CN202310473132.5A CN202310473132A CN116485460A CN 116485460 A CN116485460 A CN 116485460A CN 202310473132 A CN202310473132 A CN 202310473132A CN 116485460 A CN116485460 A CN 116485460A
Authority
CN
China
Prior art keywords
electronic card
preset
identifier
encryption algorithm
management code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310473132.5A
Other languages
Chinese (zh)
Inventor
杨延森
李欢
夏益宇
王志海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Xiaoqi Oufei Technology Co ltd
Original Assignee
Jiangsu Xiaoqi Oufei Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Xiaoqi Oufei Technology Co ltd filed Critical Jiangsu Xiaoqi Oufei Technology Co ltd
Priority to CN202310473132.5A priority Critical patent/CN116485460A/en
Publication of CN116485460A publication Critical patent/CN116485460A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0212Chance discounts or incentives
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0239Online discounts or incentives

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Game Theory and Decision Science (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an electronic card issuing method, a short link generating method and a storage medium. The electronic card issuing method is applied to the verification server side, and comprises the following steps: acquiring an access request which is sent by a user terminal and contains user information and a short link address, and acquiring an encryption algorithm identifier from the short link address; acquiring an electronic card management code and a verification identifier associated with the electronic card management code according to the encryption algorithm identifier; matching the verification identifier with a pre-stored preset verification identifier, or matching the electronic card management code with a pre-stored preset electronic card management code; and after the matching is successful, the access request is sent to a dealer server side, so that the dealer server side issues an electronic card to the user terminal according to the short link address and the user information. The scheme of the invention ensures the safety of the electronic card information while realizing automatic login-free.

Description

Electronic card issuing method, short link generating method and storage medium
Technical Field
The present invention relates to an electronic card issuing method, and more particularly, to an electronic card issuing method, a short link generating method, an authentication server side, a dealer server side, and a storage medium, which are adapted to actively issue an electronic card (a bearer card or a benefit, etc.) to a user via the internet.
Background
With the development of internet technology and the popularization of internet terminal devices (mobile phones, personal digital assistants, tablets, personal computers, etc.), means of marketing to customers by merchants have become increasingly digital, and more merchants have adopted the form of electronic cards for marketing. Electronic coupons are typically issued directly to customers by merchants or by trusted marketing service providers (MarketplaceServiceProvider, MSP) to entice consumers to consume them for a long period of time and continuously. By electronic coupon (electronic coupon) is meant a digital voucher of a corresponding service or token obtained from an electronic coupon issuer, such as a rechargeable card, a stored value card, a coupon, a group purchase card, a voucher, a bus card, a point redemption ticket, and the like.
When a merchant issues an electronic card to a consumer, the consumer often needs to register a service platform account of the merchant or a card dealer, and issue the electronic card after the identity of the seller is verified by logging in the account, and the consumer often gives up to get the card due to the reasons of registering the account, complicated operation and the like in the process of getting the card, so that the marketing and popularization purposes of the merchant cannot be realized.
At present, by adopting a uniform resource locator (UniformResourceLocator, URL), login-free (namely automatic login) can be realized, so that the issuing and exchanging of the electronic card ticket are realized. Furthermore, based on the URL, the short link technology is adopted to enhance the security of information while realizing login-free issuing of the electronic card. The short link is to convert a long URL address into a short address string by means of program calculation or the like.
The URL is adopted to realize login-free issuing of the electronic card, but the method has the information security problems of user Privacy Information (PI) leakage, electronic card information leakage and the like, so that a hacker can use the information to steal the electronic card. Although the security of data is improved to a certain extent by converting the URL into the short link to issue the electronic card, a hacker still steals the electronic card of the merchant through a 'library collision' mode based on the legally acquired short link information, and meanwhile, the load of a merchant server is increased in face of frequent attack of the hacker, so that the service quality of the merchant is reduced, and the operation cost is increased. Thus, in view of the above, there is a need for modifying short link-based electronic coupon handling techniques to enable merchant servers to handle hacker attacks on servers with less burden.
Disclosure of Invention
An object of the present invention is to ensure security of electronic card information while achieving automatic login-free.
It is a further object of the present invention to prevent excessive load pressure on merchant servers due to library-bumping activity.
In particular, the invention provides an electronic card issuing method which is applied to an authentication server side, and comprises the following steps:
Acquiring an access request which is sent by a user terminal and contains user information and a short link address, and acquiring an encryption algorithm identifier from the short link address;
acquiring an electronic card management code and a verification identifier associated with the electronic card management code according to the encryption algorithm identifier;
matching the verification identifier with a pre-stored preset verification identifier, or matching the electronic card management code with a pre-stored preset electronic card management code;
and after the matching is successful, the access request is sent to a dealer server side, so that the dealer server side issues an electronic card to the user terminal according to the short link address and the user information.
Optionally, the preset verification identifier is obtained by calculating according to the following method:
acquiring a preset encryption algorithm identifier and an encryption function subset with a mapping relation with the preset encryption algorithm identifier;
extracting a reversible encryption algorithm from the encryption function subset according to the preset encryption algorithm identifier;
the preset electronic card management code is encrypted and calculated through the reversible encryption algorithm to obtain the preset verification identifier;
optionally, the short link brief code is generated by concatenating the preset verification identifier and a preset encryption algorithm identifier according to a first preset positional relationship.
Optionally, the preset verification identifier is obtained by calculating according to the following method:
acquiring a preset encryption algorithm identifier, an encryption function subset with a mapping relation with the preset encryption algorithm identifier and a salt value subset with a mapping relation with the preset encryption algorithm identifier;
extracting a one-way hash encryption function from the encryption function subset according to the preset encryption algorithm identifier, and extracting a salt value from the salt value subset;
concatenating a preset electronic card management code and a salt value according to a second preset position relation, and obtaining the preset verification mark through encryption calculation of the one-way hash encryption function;
optionally, the short link brief code is generated by concatenating the preset electronic card management code, the preset verification identifier and the preset encryption algorithm identifier according to a second preset position relationship.
Optionally, the preset verification identifier is obtained by calculating according to the following method:
acquiring a preset encryption algorithm identifier, an encryption function subset with a mapping relation with the preset encryption algorithm identifier and a salt value subset with a mapping relation with the preset encryption algorithm identifier;
according to the preset encryption algorithm identification, a reversible encryption algorithm and a one-way hash encryption function are extracted from the encryption function subset, and a salt value is extracted from the salt value subset;
Calculating a preset electronic card management code through the reversible encryption algorithm to obtain an intermediate identifier;
concatenating the intermediate identifier and the salt value according to a third preset position relationship, and calculating to obtain the preset verification identifier through the one-way hash encryption function;
optionally, the short link brief code is generated by concatenating the intermediate identifier, the preset verification identifier and the preset encryption algorithm identifier according to a fourth preset positional relationship.
Optionally, the step of acquiring the electronic card management code and the verification identifier associated with the electronic card management code according to the encryption algorithm identifier comprises the following steps:
acquiring position relation information associated with the encryption algorithm identification according to the encryption algorithm identification and a reversible encryption algorithm;
extracting the verification identifier from the short link address according to the position relation information;
decrypting the verification identifier through the reversible encryption algorithm to obtain the electronic card management code;
optionally, in the step of matching the verification identifier with a pre-stored preset verification identifier or matching the electronic card management code with a pre-stored preset electronic card management code, the electronic card management code is selected to be matched with the pre-stored preset electronic card management code.
Optionally, the step of acquiring the electronic card management code and the verification identifier associated with the electronic card management code according to the encryption algorithm identifier comprises the following steps:
acquiring position relation information, a one-way hash encryption function and a salt value associated with the encryption algorithm identification according to the encryption algorithm identification;
extracting the electronic card management code from the short link address according to the position relation information;
the electronic card management code and the salt value are connected in series according to the position relation information, and then the verification identifier is obtained through the one-way hash encryption function;
optionally, in the step of matching the verification identifier with a pre-stored preset verification identifier or matching the electronic card management code with a pre-stored preset electronic card management code, the verification identifier is selected to be matched with the pre-stored preset verification identifier.
Optionally, the step of acquiring the electronic card management code and the verification identifier associated with the electronic card management code according to the encryption algorithm identifier comprises the following steps:
acquiring position relation information, a reversible encryption algorithm, a one-way hash encryption function and a salt value associated with the encryption algorithm identification according to the encryption algorithm identification;
extracting the intermediate identifier and the verification identifier from the short link address according to the position relation information;
The intermediate identifier and the salt value are connected in series according to the position relation information, and the verification identifier is obtained through calculation of the one-way hash encryption function;
when the verification identifier is consistent with the preset verification identifier, decrypting the intermediate identifier through the reversible encryption algorithm to obtain the electronic card ticket management code;
optionally, in the step of matching the verification identifier with a pre-stored preset verification identifier or matching the electronic card management code with a pre-stored preset electronic card management code, the electronic card management code is selected to be matched with the pre-stored preset electronic card management code.
Optionally, the electronic card issuing method further includes the following steps:
and determining that an abnormal access request occurs when the verification identifier cannot be matched with the preset verification identifier or the electronic card management code cannot be matched with the preset electronic card management code.
Optionally, the electronic card issuing method further includes the following steps:
judging whether the abnormal access request meets an access abnormality judgment condition or not, wherein the abnormal access request comprises characteristic information, and the characteristic information comprises user characteristics and an access abnormality judgment characteristic value;
When the abnormal access request is determined to meet the access abnormality judgment condition, implementing access limitation according to the user information;
and when the abnormal access request is determined not to meet the access abnormality judgment condition, recording and storing the judgment operation, and not implementing access limitation.
Optionally, the access abnormality determination condition is that at least one access abnormality characteristic value reaches a corresponding threshold value;
the access anomaly characteristic value includes: abnormal access judgment times, judgment time intervals, remote access rate, total access times, number of access accounts, account access jump speed, newly-added access equipment rate, number of electronic card types and non-popular electronic card type access rate.
In particular, the invention also provides a short link generation method applied to the dealer server side, which comprises the following steps:
responding to an electronic card generation request sent by a user terminal, and generating a preset encryption algorithm identifier and a preset electronic card management code;
encrypting the preset electronic card management code according to the preset encryption algorithm identifier to generate a preset verification identifier;
and at least concatenating the preset encryption algorithm identifier and the preset verification identifier to generate a short link brief code.
Optionally, the short link generation method further comprises the following steps:
generating a short link address according to the short link brevity code and the domain name;
and returning the short link address to the user terminal so as to display the page at the user terminal.
The invention also provides a verification server, which comprises a first memory and a first processor, wherein the first memory stores a computer program, and the first processor realizes the method for issuing the electronic card when executing the computer program.
In particular, the present invention also provides a storage medium storing a first computer program which, when executed by a processor, implements an electronic card issuing method as described above.
In particular, the invention also provides a dealer server, which comprises a second memory and a second processor, wherein the second memory is stored with a computer program, and the second processor realizes the aforementioned short link generation method when executing the computer program.
In particular, the present invention also provides a storage medium storing a second computer program which, when executed by a processor, implements a short link generation method as described above.
According to the scheme of the invention, the issuing of the electronic card is carried out in a login-free manner based on the short link, so that the operation complexity of picking up and exchanging the electronic card by a consumer can be reduced, and the effect of digital marketing by a merchant through the electronic card is improved. Meanwhile, the short link address is provided with an encryption algorithm identifier, an electronic card management code and a verification identifier can be obtained according to the encryption algorithm identifier, and the verification identifier is matched with a preset verification identifier, or the electronic card management code is matched with a preset electronic card management code, so that an access request is sent to a dealer server after the matching is successful, the dealer server sends an electronic card to a user terminal according to the short link address and user information, therefore, the short link address needs to be verified before the electronic card is sent to the user terminal, the electronic card is sent only after the verification is successful, the safety of the electronic card information can be ensured, and the leakage of the electronic card information and the theft of the electronic card caused by the library collision of a hacker are prevented.
By judging the abnormal access request and limiting the access when the access abnormal judgment condition is met, the data processing pressure on the server caused by the library collision of a hacker can be avoided. Meanwhile, the security of the electronic card information is ensured.
Further, when the user terminal sends the electronic card generation request, the short link brief code generated according to the request is encrypted, so that the short link brief code has certain safety, login-free can be performed based on the short link brief code, safety verification can be performed through the short link brief code, and the information safety of the user in login-free is greatly improved.
The above, as well as additional objectives, advantages, and features of the present invention will become apparent to those skilled in the art from the following detailed description of a specific embodiment of the present invention when read in conjunction with the accompanying drawings.
Drawings
Some specific embodiments of the invention will be described in detail hereinafter by way of example and not by way of limitation with reference to the accompanying drawings. The same reference numbers will be used throughout the drawings to refer to the same or like parts or portions. It will be appreciated by those skilled in the art that the drawings are not necessarily drawn to scale. In the accompanying drawings:
fig. 1 shows a schematic flow chart of an electronic ticket issuing method according to an embodiment of the present invention;
FIG. 2 shows a schematic flow chart of a method of obtaining an electronic card management code and authentication identifier associated therewith according to the encryption algorithm identification according to one embodiment of the invention;
FIG. 3 shows a schematic flow chart of a method of computing a preset verification identity according to one embodiment of the invention;
FIG. 4 shows a schematic flow chart of a method of obtaining an electronic card management code and authentication identifier associated therewith according to the encryption algorithm identification according to another embodiment of the present invention;
FIG. 5 shows a schematic flow chart of a method of computing a preset verification identity according to another embodiment of the invention;
FIG. 6 shows a schematic flow chart diagram of a method of obtaining an electronic card management code and authentication identifier associated therewith according to the encryption algorithm identification in accordance with yet another embodiment of the present invention;
FIG. 7 shows a schematic flow chart of a method of computing a preset verification identity according to yet another embodiment of the invention;
FIG. 8 shows a schematic flow chart diagram of a short link generation method in accordance with one embodiment of the present invention;
FIG. 9 shows a block diagram of a computer device according to one embodiment of the invention;
FIG. 10 shows a block diagram of a computer device according to another embodiment of the invention;
in the figure: 1-computer device, 2-processor, 3-memory, 4-peripheral interface, 5-radio frequency circuit, 6-display screen, 7-camera assembly, 8-audio circuit, 9-positioning assembly, 10-power supply, 11-acceleration sensor, 12-gyroscope sensor, 13-pressure sensor, 14-fingerprint sensor, 15-optical sensor, 16-proximity sensor, 17-central processing unit, 18-random access memory, 19-read only memory, 20-system memory, 21-system bus, 22-basic input/output system, 23-operating system, 24-application program, 25-mass storage device, 26-display, 27-input device, 28-input/output controller, 29-network interface unit, 30-network, 31-other program module.
Detailed Description
Fig. 1 shows a schematic flow chart of an electronic ticket issuing method according to an embodiment of the present invention. As shown in fig. 1, the electronic ticket issuing method includes:
step S100, an access request which is sent by a user terminal and contains user information and a short link address is obtained, and an encryption algorithm identifier is obtained from the short link address;
step S200, acquiring an electronic card management code and a verification identifier associated with the electronic card management code according to the encryption algorithm identifier;
step S300, matching the verification mark with a pre-stored preset verification mark or matching the electronic card management code with a pre-stored preset electronic card management code;
step S400, after the matching is successful, the access request is sent to the dealer server side, so that the dealer server side issues the electronic card to the user terminal according to the short link address and the user information.
According to the scheme of the invention, the issuing of the electronic card is carried out in a login-free manner based on the short link, so that the operation complexity of picking up and exchanging the electronic card by a consumer can be reduced, and the effect of digital marketing by a merchant through the electronic card is improved. Meanwhile, the short link address is provided with an encryption algorithm identifier, an electronic card management code and a verification identifier can be obtained according to the encryption algorithm identifier, and the verification identifier is matched with a preset verification identifier, or the electronic card management code is matched with a preset electronic card management code, so that an access request is sent to a dealer server after the matching is successful, the dealer server sends an electronic card to a user terminal according to the short link address and user information, therefore, the short link address needs to be verified before the electronic card is sent to the user terminal, the electronic card is sent only after the verification is successful, the safety of the electronic card information can be ensured, and the leakage of the electronic card information and the theft of the electronic card caused by the library collision of a hacker are prevented.
In step S100, the user information may include, for example, an account, an identity, location information, an IP address (mobile network and telecommunication network), a MAC address, a client identification, etc.
The user terminal may be a terminal used by a user who uses the terminal normally, or may be a terminal used by a hacker. It can be understood that when the user terminal is a terminal used by a user in normal use, the short link address contained in the access request is a legal address, and the authentication can be passed through subsequent authentication, namely the matching is successful, so that the electronic card can be issued. When the user terminal is a terminal used by a hacker, the short link address contained in the access request is an illegal address, and the short link address may be incorrect, and may not be successfully matched when verification is performed, so that the electronic card cannot be issued normally. Thus, leakage of electronic card information and theft of electronic cards can be avoided.
In one embodiment, the short link address has a fixed number of encryption algorithm identifications at a fixed location. For example, the short link address has n character identifications, wherein y character identifications at the 1 st position, the 3 rd position, the 4 th position, the … … th and the n-x th positions are encryption algorithm identifications. Of course, it is also possible to have p character identifications at consecutive m positions, thereby composing the encryption algorithm identification. Both n, x, y, m and p are natural numbers. Thus, the encryption algorithm identification can be extracted.
The encryption algorithm identification may be a numeric identification and a alphabetical identification. For example, the numerical designation may include 1-10 and the alphabetical designation may be a-Z and A-Z. In one embodiment, the encryption algorithm identification consists of the above numerical identifications 1-10 and the above alphabetic identifications a-Z and a-Z.
Fig. 2 shows a schematic flow chart of a method of obtaining an electronic ticket management code and a validation identifier associated therewith according to the encryption algorithm identification according to one embodiment of the invention. As shown in fig. 2, the method includes:
step S211, acquiring the position relation information and the reversible encryption algorithm associated with the encryption algorithm according to the encryption algorithm identification;
step S212, extracting verification identification from the short link address according to the position relation information;
and S213, decrypting the verification identifier through a reversible encryption algorithm to obtain the electronic card management code.
In step S211, in a legal event, the encryption algorithm identification establishes a mapping relationship with the encryption algorithm information set. The encryption algorithm information set includes a subset of encryption functions, a subset of salt values, and positional relationship information.
The encryption functions include a reversible encryption function and a one-way hash function. The reversible encryption function is a function for performing reversible encryption algorithm, and includes symmetric encryption algorithm such as DES (secret key), 3DES (multiple secret keys multiple encryption), AES series (secret key block encryption), and asymmetric encryption algorithm such as RSA, ECC elliptic curve. The reversible encryption function can be an encryption algorithm based on a bitwise counting method, the algorithm is suitable for the to-be-encrypted digital string to be regarded as 10-system digital (original digital string), and the 10-system digital is converted into the N-system digital (N is larger than 10) to reversibly shorten and encrypt the original digital string; the algorithm comprises a corresponding relation established by the N-bit system number and the alphanumeric identification. For example, regarding a "123456789" string, the string is regarded as a number that is converted into a 32-system number "14SC0PJ" based on a predetermined N-system number correspondence (for example, when N is 32, 0-9 corresponds to 0-9, and a-V corresponds to 10-32), and when the string is decrypted, the "14SC0PJ" is converted into a 10-system "1234567890" based on the above-described number correspondence, thereby obtaining the original string. Further, the corresponding relation of the N-system numbers can be established by arbitrarily selecting N characters from a character group consisting of 1-10, A-Z, a-z and the N-system numbers.
The position relation information is the arrangement sequence of preset encryption algorithm identification, verification identification and electronic card encryption identification. It can be understood that the arrangement sequence can be, for example, the front-to-back sequence of the encryption algorithm identifier, the verification identifier and the electronic card encryption identifier in the short link brief code, or the arrangement sequence of each character in the encryption algorithm identifier, the verification identifier and the electronic card encryption identifier in the short link brief code. Alternatively, the arrangement sequence only specifies the position of any one of the encryption algorithm identification, the verification identification, and the electronic card encryption identification in the short link brief code. The arrangement sequence may also be the arrangement sequence of all characters of any one of the encryption algorithm identification, the verification identification and the electronic card encryption identification in the short link brief code. The encryption algorithm identification, the verification identification and the electronic card encryption identification can be understood as character strings.
In step S212, the location relationship information at least includes the location or the character arrangement order of the verification identifier in the short link brevity code. Preferably, the positional relationship information may further include the number of characters of the verification flag in the short link brevity code and the concatenation order.
In the embodiment shown in fig. 2, the electronic card management code is matched with a pre-stored preset electronic card management code upon subsequent verification of the match. In this embodiment, since a reversible encryption algorithm is used, the electronic card management code can be decrypted by the reversible encryption algorithm, the server does not need to store the verification identifier, and the storage pressure of the server is reduced, because the verification identifier can be directly extracted, and the electronic card management code can be calculated by using the verification identifier.
Fig. 3 shows a schematic flow chart of a method of calculating a preset authentication identity according to one embodiment of the present invention. As shown in fig. 3, in the embodiment shown in fig. 2, the corresponding method for calculating the preset verification identifier in step S300 includes:
step S311, obtaining a preset encryption algorithm identifier and an encryption function subset with a mapping relation with the preset encryption algorithm identifier;
step S312, extracting a reversible encryption algorithm from the encryption function subset according to a preset encryption algorithm identifier;
step S313, the preset electronic card management code is encrypted and calculated through a reversible encryption algorithm to obtain a preset verification identifier.
In step S311, the preset encryption algorithm identification is a preset encryption algorithm identification. The preset encryption algorithm identifier is the same as the foregoing encryption algorithm identifier, and will not be described herein. The preset encryption algorithm identification is generated according to the request of the user terminal. The generated preset encryption algorithm identification has certain randomness. And finally, the obtained preset verification identification is stored in a database of the server. In this embodiment, the short link brief code is generated by concatenating a preset electronic card management code, a preset verification identifier and a preset encryption algorithm identifier according to a second preset positional relationship.
Fig. 4 shows a schematic flow chart of a method of obtaining an electronic ticket management code and a validation identifier associated therewith according to an identification of the encryption algorithm according to another embodiment of the invention. As shown in fig. 4, the method includes:
step S221, acquiring the position relation information, the one-way hash encryption function and the salt value associated with the position relation information according to the encryption algorithm identification;
step S222, extracting the electronic card management code from the short link address according to the position relation information;
step S223, the electronic card management code and the salt value are connected in series according to the position relation information, and then the verification identification is obtained through a one-way hash encryption function.
In step S221, the one-way hash function is a function for performing one-way hash calculation, including Guo Mi, MD4, MD5, SHA-1, SHA-256, SHA-384, SHA-512, etc. The salt value is an identification used when adding salt to the one-way hash calculation. In step S222, the positional relationship information at least includes the positional relationship of the electronic card managing code in the short link brief code, or the position of each character in the electronic card managing code in the short link brief code.
In the embodiment shown in fig. 4, the authentication identifier is matched with a pre-stored preset authentication identifier when the subsequent authentication is matched. In this embodiment, the authentication identifier is required to be stored in the server, and since the one-way hash encryption function is used, the electronic card management code cannot be restored, and authentication using the authentication identifier is required.
Fig. 5 shows a schematic flow chart of a method of calculating a preset authentication identity according to another embodiment of the present invention. As shown in fig. 5, in the embodiment shown in fig. 4, the corresponding method for calculating the preset verification identifier in step S300 includes:
step S321, acquiring a preset encryption algorithm identifier, an encryption function subset with a mapping relation with the preset encryption algorithm identifier and a salt value subset with a mapping relation with the preset encryption algorithm identifier;
step S322, extracting a one-way hash encryption function from the encryption function subset according to a preset encryption algorithm identification, and extracting a salt value from the salt value subset;
step S323, the preset electronic card management code and the salt value are connected in series according to a second preset position relation, and the preset verification mark is obtained through encryption calculation of a one-way hash encryption function. And finally, the obtained preset verification identification is stored in a database of the server. In this embodiment, the short link brevity code is generated by concatenating the intermediate identifier, the preset verification identifier, and the preset encryption algorithm identifier according to a fourth preset positional relationship.
Fig. 6 shows a schematic flow chart of a method of obtaining an electronic card management code and a validation identifier associated therewith according to a further embodiment of the invention. As shown in fig. 6, the method includes:
Step S231, acquiring position relation information, a reversible encryption algorithm, a one-way hash encryption function and a salt value associated with the position relation information according to the encryption algorithm identification;
step S232, extracting an intermediate identifier and a verification identifier from the short link address according to the position relation information;
step S233, connecting the intermediate identifier and the salt value in series according to the position relation information, and obtaining a verification identifier through calculation of a one-way hash encryption function;
and step S234, when the verification identifier is consistent with the preset verification identifier, decrypting the intermediate identifier through a reversible encryption algorithm to obtain the electronic card management code.
In step S232, the positional relationship information at least includes a concatenation manner of the intermediate identifier and the verification identifier, and a positional relationship between the intermediate identifier and the verification identifier in the short link brief code, or a position of each character in the intermediate identifier and the verification identifier in the short link brief code.
In the embodiment shown in fig. 6, the electronic card management code is matched with a pre-stored preset electronic card management code upon subsequent verification of the match. It will be appreciated that the authentication identifier need not be stored in the server, which may reduce the storage pressure of the server.
Fig. 7 shows a schematic flow chart of a method of calculating a preset authentication identity according to still another embodiment of the present invention. As shown in fig. 7, in the embodiment shown in fig. 6, the corresponding method for calculating the preset verification identifier in step S300 includes:
Step S331, obtaining a preset encryption algorithm identifier, an encryption function subset with a mapping relation with the preset encryption algorithm identifier and a salt value subset with a mapping relation with the preset encryption algorithm identifier;
step S332, according to the preset encryption algorithm identification, extracting a reversible encryption algorithm and a one-way hash encryption function from the encryption function subset, and extracting a salt value from the salt value subset;
step S333, calculating a preset electronic card management code through a reversible encryption algorithm to obtain an intermediate identifier;
step S334, the intermediate identifier and the salt value are connected in series according to a third preset position relation, and a preset verification identifier is obtained through calculation of a one-way hash encryption function. And finally, the obtained preset verification identification is stored in a database of the server. In this embodiment, the short link brevity code is generated by concatenating the intermediate identifier, the preset verification identifier, and the preset encryption algorithm identifier according to a fourth preset positional relationship.
In the above embodiments, the short link brevity code may have the encryption algorithm identification set at a fixed location, or each character of the encryption algorithm identification set at a plurality of fixed locations, preferably at the beginning of the short link brevity code. The short link address generation rule comprises a word number limitation rule of the Internet marketing channel for sharing or releasing content to the user. The short link address is sent directly through internet or in the form of readable bar code (two-dimension code, bar code, etc.) with tangible carrier.
In a preferred embodiment, the electronic card issuing method further includes the steps of: and determining that an abnormal access request occurs when the verification identifier cannot be matched with the preset verification identifier or the electronic card management code cannot be matched with the preset electronic card management code.
In one embodiment, the electronic card issuing method further includes the steps of: judging whether the abnormal access request accords with an access abnormality judgment condition, wherein the abnormal access request comprises characteristic information, and the characteristic information comprises user characteristics and an access abnormality judgment characteristic value; when the abnormal access request is determined to meet the access abnormality judgment condition, implementing access restriction according to the user information; when the abnormal access request is determined not to meet the access abnormality judgment condition, the judgment operation is recorded and saved, and access limitation is not implemented.
In one embodiment, the access anomaly determination condition is that at least one access anomaly characteristic value reaches a corresponding threshold value. Accessing the outlier includes: abnormal access judgment times, judgment time intervals, remote access rate, total access times, number of access accounts, account access jump speed, newly-added access equipment rate, number of electronic card types and non-popular electronic card type access rate.
By judging the abnormal access request and limiting the access when the access abnormal judgment condition is met, the data processing pressure on the server caused by the library collision of a hacker can be avoided. Meanwhile, the security of the electronic card information is ensured.
Fig. 8 shows a schematic flow chart of a short link generation method according to an embodiment of the present invention. As shown in fig. 8, the short link generation method is applied to a dealer server, and includes:
step S110, a preset encryption algorithm identification and a preset electronic card management code are generated in response to an electronic card generation request sent by a user terminal;
step S120, encrypting the preset electronic card management code according to the preset encryption algorithm identifier to generate a preset verification identifier;
step S130, at least the preset encryption algorithm identification and the preset verification identification are connected in series to generate a short link brief code.
According to the scheme of the embodiment of the invention, when the user terminal sends the electronic card generation request, the short link brief code generated according to the request is encrypted, so that the short link brief code has certain safety, login-free can be performed based on the short link brief code, safety verification can be performed through the short link brief code, and the information safety of the user for login-free is greatly improved.
In one embodiment, the short link generation method further comprises the steps of: generating a short link address according to the short link brevity code and the domain name; and returning the short link address to the user terminal so as to display the page at the user terminal.
The above embodiment is to distribute the short link of the electronic card directly to the consumer through any internet channel, and in other application scenarios, the method further comprises generating the short link based on the client request to realize the issuing of the electronic card, or displaying the short link of the electronic card in any identifiable manner for the consumer to get and exchange the electronic card (including but not limited to short link address, two-dimensional code and bar code).
The invention also provides a verification server, which comprises a first memory and a first processor, wherein the first memory stores a computer program, and the first processor realizes the method for issuing the electronic card when executing the computer program.
In particular, the present invention also provides a storage medium storing a first computer program which, when executed by a processor, implements an electronic card issuing method as described above.
In particular, the invention also provides a dealer server, which comprises a second memory and a second processor, wherein the second memory is stored with a computer program, and the second processor realizes the aforementioned short link generation method when executing the computer program.
In particular, the present invention also provides a storage medium storing a second computer program which, when executed by a processor, implements a short link generation method as described above.
The invention also provides an electronic card management system which is characterized by comprising a user terminal, a dealer server, an Internet terminal device, a verification server and an abnormal access judgment server.
The user terminal is used for logging in the client side, and sending an electronic card generation request to the dealer server side through the client side, wherein the request comprises user information and electronic card information.
The dealer server side is used for receiving an electronic card generation request of a user from the client side, generating a short link address according to the electronic card generation request, and sending the short link address to the user terminal for page display, wherein the display mode comprises the short link address, the two-dimensional code, the bar code and the like.
The internet terminal device is configured to send a request to the authentication server to access the short link address.
The verification server side is used for receiving the access request of the Internet terminal equipment and analyzing and verifying the short link brief codes. If the short link brief code verification is passed, the short link access request is sent to the dealer server, the dealer server analyzes according to the short link brief code, a recharging and verifying interface (UID, electronic card code number) is displayed, and user information and electronic card information are subjected to recharging or rights and interests exchanging operation. If the short link brief code verification is not passed, the abnormal access request is judged and sent to an abnormal access judgment server.
The abnormal access determination server uses the user information analyzed in the short link brief code as an access abnormal characteristic value to determine the nature of the request of the user. If the request meets the access abnormality judgment condition, an instruction is sent to a verification server, access limitation is implemented according to the characteristic information corresponding to the access abnormality characteristic value, the verification server jumps the access request of the internet terminal equipment to an abnormal access behavior alarm link, and abnormal access behavior alarm information is displayed on the internet terminal equipment page. If the request does not reach the access abnormality judgment condition, recording and storing the judgment operation aiming at the abnormality characteristic value, and skipping the access request of the internet terminal equipment to an access error alarm link by the verification server to display the access error alarm information to the page of the internet terminal equipment.
For example, a risk model is established based on the characteristics of account access skip speed change, verification error times and the like under the same IP address, and abnormal access is determined when the related characteristic value reaches a threshold value. When the positioning information conflicts with the IP address, the abnormal access is judged, and the positioning information is the positioning information of the Internet terminal equipment which is authorized by the user before the user accesses the short link address. According to the type of the electronic card, the form of the electronic card code number, the value degree and the like, the abnormal access judgment conditions are set in a grading manner, so that the verification pressure of the server is relieved.
According to the scheme of the embodiment of the invention, based on the short link verification result, whether the access behavior of the user is abnormal access or not is judged, the access limiting measures are implemented according to the judgment characteristics of the abnormal access, and the distributed server system is adopted to perform distributed processing verification, decryption and abnormal access judgment, so that the information stored in the database of each server is isolated, and the security of the electronic card information is improved.
And the server displays the electronic card equity code number on a browsing interface of the user internet terminal in a mapping mode according to the acquired user information, the electronic card equity code number and the electronic card equity type, so that the electronic card is issued. Or exchanging the electronic card equity through a service interface with the electronic card dealer according to the acquired user information, the electronic card equity code number and the electronic card equity type, wherein the equity is reflected in the user account, and the processing result is displayed in a mapping form on a browsing interface of the user internet terminal.
FIG. 9 shows a block diagram of a computer device according to one embodiment of the invention. The computer device 1 may be an authentication server side or a dealer server side. In general, the computer device 1 comprises: a processor 2 and a memory 3.
Processor 2 may include one or more processing cores, such as a four-core processor, an eight-core processor, and the like. The processor 2 may be implemented in at least one hardware form of DSP (digital signal processing), FPGA (Field-programmable gate array), PLA (Programmable LogicArray ). The processor 2 may also include a main processor and a coprocessor, the main processor being a processor for processing data in an awake state, also called a CPU (central processing unit); a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 2 may integrate a GPU (graphics processing unit) for rendering and drawing the content required to be displayed by the display screen 6. In some embodiments, the processor 2 may further include an AI (artificial intelligence) processor for processing computing operations related to machine learning.
The memory 3 may include one or more computer-readable storage media, which may be non-transitory. The memory 3 may also include high speed random access memory 18, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 3 is used to store at least one instruction for execution by processor 2 to implement the methods provided by the method embodiments herein.
In some embodiments, the computer device 1 may further optionally include: a peripheral interface 4 and at least one peripheral. The processor 2, the memory 3 and the peripheral interface 4 may be connected by a bus or signal lines. The individual peripheral devices may be connected to the peripheral device interface 4 via buses, signal lines or a circuit board. Specifically, the peripheral device includes: at least one of radio frequency circuit 5, display 6, camera assembly 7, audio circuit 8, positioning assembly 9 and power supply 10.
In some embodiments, the computer device 1 further comprises one or more sensors. The one or more sensors include, but are not limited to: acceleration sensor 11, gyro sensor 12, pressure sensor 13, fingerprint sensor 14, optical sensor 15, and proximity sensor 16.
It will be appreciated by those skilled in the art that the structure shown in fig. 9 is not limiting of the computer device 1 and may include more or fewer components than shown, or may combine certain components, or may employ a different arrangement of components.
Fig. 10 shows a block diagram of a computer device according to another embodiment of the invention. The computer device 1 may be implemented as a server in the above-described aspects of the application.
The computer apparatus 1 includes a central processing unit 17 (CentralProcessingUnit, CPU), a system memory 20 including a random access memory (RandomAccessMemory, RAM) 18 and a Read-only memory (ROM) 19, and a system bus 21 connecting the system memory 20 and the central processing unit 17. The computer device 1 further includes a basic Input/Output system (I/O) 22, which facilitates the transfer of information between various devices within the computer, and a mass storage device 25 for storing an operating system 23, application programs 24, and other program modules 31.
The basic input/output system 22 includes a display 26 for displaying information and an input device 27, such as a mouse, keyboard, etc., for user input of information. Wherein both the display 26 and the input device 27 are connected to the central processing unit 17 via an input output controller 28 connected to the system bus 21. The basic input/output system 22 may also include an input/output controller 28 for receiving and processing input from a number of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, the input output controller 28 also provides output to a display screen, a printer, or other type of output device.
The mass storage device 25 is connected to the central processing unit 17 through a mass storage controller (not shown) connected to the system bus 21. The mass storage device 25 and its associated computer-readable media provide non-volatile storage for the computer device 1. That is, the mass storage device 25 may include a computer readable medium (not shown) such as a hard disk or a compact read-only memory (CD-ROM) drive.
The computer readable medium may include computer storage media and communication media without loss of generality. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, erasable programmable read-only register (Erasable ProgrammableReadOnlyMemory, EPROM), electrically Erasable programmable read-only memory (Electrically Erasable programmable read-OnlyMemory, EEPROM) 19 flash memory or other solid state memory technology, CD-ROM, digital versatile disks (DigitalVersatileDisc, DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Of course, those skilled in the art will recognize that the computer storage medium is not limited to the one described above. The system memory 20 and mass storage device 25 described above may be collectively referred to as memory 3.
According to various embodiments of the present disclosure, the computer device 1 may also operate by being connected to a remote computer on a network, such as the Internet. I.e. the computer device 1 may be connected to the network 30 via a network interface unit 29 connected to said system bus 21, or alternatively, the network interface unit 29 may be used for connection to other types of networks or remote computer systems (not shown).
The memory 3 further includes at least one instruction, at least one program, a code set, or an instruction set, where the at least one instruction, the at least one program, the code set, or the instruction set is stored in the memory 3, and the central processor 1201 implements all or part of the steps in the electronic card issuing method shown in the foregoing embodiments by executing the at least one instruction, the at least one program, the code set, or the instruction set.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, comprising instructions, such as a memory 3 comprising at least one instruction, at least one program, code set, or instruction set executable by a processor to perform all or part of the steps of the methods shown in any of the embodiments of fig. 1-8 described above. For example, the non-transitory computer readable storage medium may be ROM, RAM, CD-ROM, magnetic tape, floppy disk, optical data storage device, etc.
In an exemplary embodiment, a computer program product or a computer program is also provided, the computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor 2 of the computer device 1 reads the computer instructions from a computer readable storage medium, the processor 2 executes the computer instructions such that the computer device 1 performs all or part of the steps of the method shown in any of the embodiments of fig. 1 to 8 described above.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the present application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.
By now it should be appreciated by those skilled in the art that while a number of exemplary embodiments of the invention have been shown and described in detail herein, many other variations or modifications of the general principles of the invention may be directly ascertained or inferred from the present disclosure without departing from the spirit and scope of the invention. Accordingly, the scope of the present invention should be understood and deemed to cover all such other variations or modifications.

Claims (16)

1. The electronic card issuing method is characterized by being applied to an authentication server side, and comprises the following steps of:
acquiring an access request which is sent by a user terminal and contains user information and a short link address, and acquiring an encryption algorithm identifier from the short link address;
acquiring an electronic card management code and a verification identifier associated with the electronic card management code according to the encryption algorithm identifier;
matching the verification identifier with a pre-stored preset verification identifier, or matching the electronic card management code with a pre-stored preset electronic card management code;
and after the matching is successful, the access request is sent to a dealer server side, so that the dealer server side issues an electronic card to the user terminal according to the short link address and the user information.
2. The electronic card issuing method according to claim 1, wherein the preset authentication mark is calculated according to the following method:
acquiring a preset encryption algorithm identifier and an encryption function subset with a mapping relation with the preset encryption algorithm identifier;
extracting a reversible encryption algorithm from the encryption function subset according to the preset encryption algorithm identifier;
the preset electronic card management code is encrypted and calculated through the reversible encryption algorithm to obtain the preset verification identifier;
optionally, the short link brief code is generated by concatenating the preset verification identifier and a preset encryption algorithm identifier according to a first preset positional relationship.
3. The electronic card issuing method according to claim 1, wherein the preset authentication mark is calculated according to the following method:
acquiring a preset encryption algorithm identifier, an encryption function subset with a mapping relation with the preset encryption algorithm identifier and a salt value subset with a mapping relation with the preset encryption algorithm identifier;
extracting a one-way hash encryption function from the encryption function subset according to the preset encryption algorithm identifier, and extracting a salt value from the salt value subset;
Concatenating a preset electronic card management code and a salt value according to a second preset position relation, and obtaining the preset verification mark through encryption calculation of the one-way hash encryption function;
optionally, the short link brief code is generated by concatenating the preset electronic card management code, the preset verification identifier and the preset encryption algorithm identifier according to a second preset position relationship.
4. The electronic card issuing method according to claim 1, wherein the preset authentication mark is calculated according to the following method:
acquiring a preset encryption algorithm identifier, an encryption function subset with a mapping relation with the preset encryption algorithm identifier and a salt value subset with a mapping relation with the preset encryption algorithm identifier;
according to the preset encryption algorithm identification, a reversible encryption algorithm and a one-way hash encryption function are extracted from the encryption function subset, and a salt value is extracted from the salt value subset;
calculating a preset electronic card management code through the reversible encryption algorithm to obtain an intermediate identifier;
concatenating the intermediate identifier and the salt value according to a third preset position relationship, and calculating to obtain the preset verification identifier through the one-way hash encryption function;
Optionally, the short link brief code is generated by concatenating the intermediate identifier, the preset verification identifier and the preset encryption algorithm identifier according to a fourth preset positional relationship.
5. The electronic card issuing method according to claim 2, wherein said acquiring the electronic card management code and the authentication identifier associated therewith based on the encryption algorithm identifier includes the steps of:
acquiring position relation information associated with the encryption algorithm identification according to the encryption algorithm identification and a reversible encryption algorithm;
extracting the verification identifier from the short link address according to the position relation information;
decrypting the verification identifier through the reversible encryption algorithm to obtain the electronic card management code;
optionally, in the step of matching the verification identifier with a pre-stored preset verification identifier or matching the electronic card management code with a pre-stored preset electronic card management code, the electronic card management code is selected to be matched with the pre-stored preset electronic card management code.
6. The electronic card issuing method according to claim 3, wherein said acquiring the electronic card management code and the authentication identifier associated therewith based on the encryption algorithm identifier comprises the steps of:
Acquiring position relation information, a one-way hash encryption function and a salt value associated with the encryption algorithm identification according to the encryption algorithm identification;
extracting the electronic card management code from the short link address according to the position relation information;
the electronic card management code and the salt value are connected in series according to the position relation information, and then the verification identifier is obtained through the one-way hash encryption function;
optionally, in the step of matching the verification identifier with a pre-stored preset verification identifier or matching the electronic card management code with a pre-stored preset electronic card management code, the verification identifier is selected to be matched with the pre-stored preset verification identifier.
7. The electronic card issuing method according to claim 4, wherein said acquiring the electronic card management code and the authentication identifier associated therewith based on the encryption algorithm identifier comprises the steps of:
acquiring position relation information, a reversible encryption algorithm, a one-way hash encryption function and a salt value associated with the encryption algorithm identification according to the encryption algorithm identification;
extracting the intermediate identifier and the verification identifier from the short link address according to the position relation information;
The intermediate identifier and the salt value are connected in series according to the position relation information, and the verification identifier is obtained through calculation of the one-way hash encryption function;
when the verification identifier is consistent with the preset verification identifier, decrypting the intermediate identifier through the reversible encryption algorithm to obtain the electronic card ticket management code;
optionally, in the step of matching the verification identifier with a pre-stored preset verification identifier or matching the electronic card management code with a pre-stored preset electronic card management code, the electronic card management code is selected to be matched with the pre-stored preset electronic card management code.
8. The electronic card issuing method according to any one of claims 1 to 7, characterized by further comprising the steps of:
and determining that an abnormal access request occurs when the verification identifier cannot be matched with the preset verification identifier or the electronic card management code cannot be matched with the preset electronic card management code.
9. The electronic card issuing method according to claim 8, characterized by further comprising the step of:
judging whether the abnormal access request meets an access abnormality judgment condition or not, wherein the abnormal access request comprises characteristic information, and the characteristic information comprises user characteristics and an access abnormality judgment characteristic value;
When the abnormal access request is determined to meet the access abnormality judgment condition, implementing access limitation according to the user information;
and when the abnormal access request is determined not to meet the access abnormality judgment condition, recording and storing the judgment operation, and not implementing access limitation.
10. The electronic card issuing method according to claim 9, wherein the access abnormality determination condition is that at least one access abnormality characteristic value reaches a corresponding threshold value;
the access anomaly characteristic value includes: abnormal access judgment times, judgment time intervals, remote access rate, total access times, number of access accounts, account access jump speed, newly-added access equipment rate, number of electronic card types and non-popular electronic card type access rate.
11. The short link generation method is characterized by being applied to a dealer server side, and comprises the following steps:
responding to an electronic card generation request sent by a user terminal, and generating a preset encryption algorithm identifier and a preset electronic card management code;
encrypting the preset electronic card management code according to the preset encryption algorithm identifier to generate a preset verification identifier;
And at least concatenating the preset encryption algorithm identifier and the preset verification identifier to generate a short link brief code.
12. The short link generation method according to claim 11, further comprising the step of:
generating a short link address according to the short link brevity code and the domain name;
and returning the short link address to the user terminal so as to display the page at the user terminal.
13. An authentication server, comprising a first memory and a first processor, wherein the first memory stores a computer program, and the first processor implements the electronic card issuing method according to any one of claims 1 to 10 when executing the computer program.
14. A storage medium storing a first computer program which, when executed by a processor, implements the electronic card issuing method according to any one of claims 1 to 10.
15. A dealer server, comprising a second memory and a second processor, wherein the second memory stores a computer program, and the second processor implements the short link generation method according to any one of claims 11-12 when executing the computer program.
16. A storage medium storing a second computer program which, when executed by a processor, implements the short link generation method of any of claims 11-12.
CN202310473132.5A 2023-04-28 2023-04-28 Electronic card issuing method, short link generating method and storage medium Pending CN116485460A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310473132.5A CN116485460A (en) 2023-04-28 2023-04-28 Electronic card issuing method, short link generating method and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310473132.5A CN116485460A (en) 2023-04-28 2023-04-28 Electronic card issuing method, short link generating method and storage medium

Publications (1)

Publication Number Publication Date
CN116485460A true CN116485460A (en) 2023-07-25

Family

ID=87211613

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310473132.5A Pending CN116485460A (en) 2023-04-28 2023-04-28 Electronic card issuing method, short link generating method and storage medium

Country Status (1)

Country Link
CN (1) CN116485460A (en)

Similar Documents

Publication Publication Date Title
CN110602248B (en) Abnormal behavior information identification method, system, device, equipment and medium
US10715515B2 (en) Generating code for a multimedia item
CN109716707B (en) Server apparatus and method for distributed electronic recording and transaction history
CN108268354A (en) Data safety monitoring method, background server, terminal and system
US9712327B1 (en) System and method for remote storage auditing
CN107169344B (en) Method for blocking unauthorized application and apparatus using the same
US10225249B2 (en) Preventing unauthorized access to an application server
CN111666460A (en) User portrait generation method and device based on privacy protection and storage medium
KR20180036140A (en) Method and apparatus for examining forgery of file by using file hash value
JP2015515218A (en) Method and system for abstracted and randomized one-time use password for transaction authentication
US20210365584A1 (en) Portable reputation brokering using linked blockchains and shared events
CN113169866A (en) Techniques to prevent collusion using simultaneous key distribution
JP2002281019A (en) Portable information storage medium and method for authenticating the same
US20220060466A1 (en) Safe Logon
CN111460525A (en) Data processing method and device based on block chain and storage medium
CN109271445A (en) Utilize the method, apparatus and electronic equipment of block chain storing data
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
CN112347457A (en) Abnormal account detection method and device, computer equipment and storage medium
CN114519360A (en) Data reading and writing method, login method and device of business system and computer equipment
US11874752B1 (en) Methods and systems for facilitating cyber inspection of connected and autonomous electrical vehicles using smart charging stations
US20230421377A1 (en) Systems and Methods for Node Facilitation, Communication, and Maintenance
US20210165907A1 (en) Systems and methods for intelligent and quick masking
CN117034358A (en) Service certificate processing method and device and computer equipment
CN116485460A (en) Electronic card issuing method, short link generating method and storage medium
CN113328864B (en) Data transmission method and system based on function encryption, block chain and machine learning

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination