CN117729004A - Resource request verification method, device, equipment and storage medium - Google Patents
Resource request verification method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN117729004A CN117729004A CN202311700833.4A CN202311700833A CN117729004A CN 117729004 A CN117729004 A CN 117729004A CN 202311700833 A CN202311700833 A CN 202311700833A CN 117729004 A CN117729004 A CN 117729004A
- Authority
- CN
- China
- Prior art keywords
- url address
- verification
- resource request
- target
- verification code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 197
- 238000000034 method Methods 0.000 title claims abstract description 61
- 230000006870 function Effects 0.000 claims description 32
- 238000012545 processing Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 4
- 230000008569 process Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 9
- 238000004891 communication Methods 0.000 description 6
- 238000011161 development Methods 0.000 description 6
- 230000009471 action Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention provides a resource request verification method, a device, equipment and a storage medium, wherein the method comprises the following steps: when a resource request is received, matching the target URL address of the resource request according to a preset designated URL address; the appointed URL address is used for indicating a URL address to be verified by the verification code; when the target URL address is successfully matched with the appointed URL address, returning a verification page with verification code information to a request end of the resource request; and when the matching of the target URL address and the appointed URL address fails, the resource request does not need to be verified, and the resource request is forwarded to a source station.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a storage medium for verifying a resource request.
Background
With the rapid development of computer technology, more and more threats exist in the network, so that for network security, for some important resource pages, a verification code, login information of a user, login passwords and other login interfaces or other interfaces for inputting verification codes are generally set, so that common non-human resource requests are intercepted through the verification code. Currently, there is a scheme for automatically determining whether a resource request needs verification of a verification code, for example, some WAF servers determine whether a client needing to verify a current resource request is a robot according to their own security logic, when the client is verified to be the robot, a verification page is automatically generated to remind a user to perform man-machine verification, and when the client is verified to be not the robot, the client is directly allowed to access a required resource.
Although the scheme can realize that whether to verify the verification code of the resource request can be judged according to the self security logic without additional adaptation development, the inventor discovers that under the condition that the business logic or the operation scene of a certain resource address is unknown, certain resource requests can be forcedly verified, namely, the resource requests which do not need to be verified are forcedly entered into a verification process, so that the verification code is filled into the resource page area corresponding to the resource requests in an error form or a form which cannot be displayed, and the resource page cannot be normally displayed or even has the business logic disorder.
Disclosure of Invention
In view of the above, the present invention aims to provide a method, a device and a storage medium for verifying a resource request.
In order to achieve the above object, the technical scheme adopted by the embodiment of the invention is as follows:
in a first aspect of an embodiment of the present invention, there is provided a resource request verification method, including:
when a resource request is received, matching the target URL address of the resource request according to a preset designated URL address; the appointed URL address is used for indicating a URL address needing verification code verification;
when the target URL address is successfully matched with the appointed URL address, returning a verification page with verification code information to a request end of the resource request;
and when the matching of the target URL address and the appointed URL address fails, the resource request does not need to be verified, and the resource request is forwarded to a source station.
In a second aspect of the embodiment of the present invention, there is provided a resource request verification apparatus, including:
a processing module configured to: when a resource request is received, matching the target URL address of the resource request according to a preset designated URL address; the appointed URL address is used for indicating a URL address needing verification code verification;
a transmission module configured to: when the target URL address is successfully matched with the appointed URL address, returning a verification page with verification code information to a request end of the resource request; and when the matching of the target URL address and the appointed URL address fails, the resource request does not need to be verified, and the resource request is forwarded to a source station.
A third aspect of an embodiment of the present invention provides an electronic device, including a processor and a memory, where the memory stores machine executable instructions executable by the processor, where the processor can execute the machine executable instructions to implement the resource request verification method provided in the first aspect.
In a fourth aspect of embodiments of the present invention, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the resource request verification method provided in the first aspect above.
According to the resource request verification method, device and equipment and storage medium, the appointed URL addresses which need to be verified in verification code are pre-configured, when the resource request is received, the appointed URL addresses can be matched with the target URL addresses, verification code verification is only carried out on the resource request corresponding to the successfully matched target URL addresses, further, forced verification is not carried out on the resource request which does not need to be verified in the condition that business logic is not needed to be known, normal loading and display of the resource page corresponding to the resource request which does not need to be verified in verification code can be guaranteed, user experience of a request end is improved, and timely feedback of the resource request which does not need to be verified in verification code is also improved.
In order to make the above objects, features and advantages of the present invention more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 shows a block diagram of an electronic device according to an embodiment of the present invention;
FIG. 2 shows a flowchart of a resource request verification method provided by an embodiment of the present invention;
fig. 3 is a functional block diagram of a resource request verification device according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present invention.
It is noted that relational terms such as "first" and "second", and the like, are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In order to solve the technical problems that in the traditional automatic verification scheme of resource requests, verification codes are filled in a resource page area corresponding to the resource requests in an error mode or in a mode that the verification codes cannot be displayed, so that the resource pages cannot be normally displayed and even have disordered business logic, the embodiment of the invention provides a resource request verification method.
The method provided by the embodiment of the invention can be executed by the electronic equipment, and please refer to fig. 1, which is a block diagram of the electronic equipment. The electronic device 100 includes a memory 110, a processor 120, and a communication module 130. The memory 110, the processor 120, and the communication module 130 are electrically connected directly or indirectly to each other to realize data transmission or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines.
Wherein the memory is used for storing programs or data. The Memory may be, but is not limited to, random access Memory (Random Access Memory, RAM), read Only Memory (ROM), programmable Read Only Memory (Programmable Read-Only Memory, PROM), erasable Read Only Memory (Erasable Programmable Read-Only Memory, EPROM), electrically erasable Read Only Memory (Electric Erasable Programmable Read-Only Memory, EEPROM), etc.
The processor is used to read/write data or programs stored in the memory and perform corresponding functions.
The communication module is used for establishing communication connection between the electronic equipment and other communication terminals through a network and is used for receiving and transmitting data through the network.
It should be understood that the structure shown in fig. 1 is merely a schematic structural diagram of an electronic device that may also include more or fewer components than those shown in fig. 1, or have a different configuration than that shown in fig. 1. The components shown in fig. 1 may be implemented in hardware, software, or a combination thereof.
The following describes a resource request verification method provided by the embodiment of the present invention with reference to fig. 2, and fig. 2 is a flowchart of a resource request verification method provided by the embodiment of the present invention, where the resource request verification method may be applied to an electronic device, and the resource request verification method includes:
in step S210, when a resource request is received, matching a target URL address of the resource request according to a preset designated URL address; the appointed URL address is used for indicating a URL address to be verified by the verification code;
in step S221, when the target URL address is successfully matched with the specified URL address, a verification page with verification code information is returned to the request end of the resource request;
in step S222, when the matching of the target URL address with the specified URL address fails, it means that verification of the resource request is not required, and the resource request is forwarded to the source station.
Before executing the resource request verification method provided by the embodiment of the invention, URL (Uniform Resource Locator, uniform resource location system) addresses needing verification of verification codes are configured in the equipment for executing the method, and the URL addresses are the appointed URL addresses above and serve as the basis for verifying whether the verification codes of the subsequently received resource requests are verified. In order to ensure that the resource request verification method provided by the embodiment of the present invention can be timely invoked to determine whether the resource request needs verification code verification when the execution device receives the resource request each time, the resource request verification method provided by the embodiment of the present invention may be configured in a functional module or a hardware module manner in all network traffic in the receiving end device of the resource request, for example, in an application platform where the network request must pass, for example, a WAF (Web Application Firewall ) system platform. Based on the above, after the receiving end device accesses the WAF system platform, all network traffic, such as resource requests, received by the receiving end device will pass through the WAF system platform, so as to invoke the resource request verification method of the embodiment of the invention, thereby realizing the identification or verification of the resource requests.
The specified URL address may be preconfigured by a developer in the development stage according to a known resource path, i.e., URL address, where the verification code function needs to be started. Although the forced verification of the resource request without verification can be avoided, if a user needs to add new business logic, for example, the resource path needing to start the verification code function is added according to the business requirement to ensure the security of resource access, the configuration of the designated URL address needs to be added depending on a developer, or, because of the change of some businesses, the resource path needing to start the verification code function does not need to start the verification code function any more, or the designated URL address needs to be changed depending on the developer. Therefore, the above method of configuring the designated URL address depending on the developer is inconvenient for the user to change timely according to the own needs, thereby causing potential safety hazard to some resources. Therefore, in order to solve the technical problem, in some embodiments, the resource request verification method provided by the embodiment of the present invention further provides a scheme for allowing the user to configure the specified URL address according to the own needs, that is, the specified URL address is configured in a resource sending module; the resource sending module is configured with a configuration function for configuring the URL address; correspondingly, the resource request verification method provided by the embodiment of the invention can further comprise the following steps:
in step S110, when an instruction for instructing to start the configuration function is received, a configuration interface corresponding to the configuration function is displayed;
in step S120, when an instruction for indicating that URL address configuration is completed is received in the configuration interface, the specified URL address is updated according to the configured URL address.
It can be understood that, through steps S110 to S120, whenever the user needs to change the original designated URL address or add the designated URL address, the resource sending module may be started, where the resource sending module may be configured in the WAF system platform, and then the configuration function is triggered by clicking a control (not limited to this) in the interface corresponding to the resource sending module, where the resource sending module may be considered to receive an instruction for indicating to start the configuration function, and then may respond to the instruction to display the configuration interface corresponding to the configuration function. In the configuration interface, the user can be directly presented with the areas of all the designated URL addresses that have been configured and the input areas for adding the designated URL addresses; wherein all specified URL addresses that have been configured may be in an editable state, i.e. allowing the user to modify or delete. If the user needs to increase the resource path for verification of the verification code, the URL address corresponding to the resource path can be directly input into the input area. After the user modifies the designated URL address or newly adds the designated URL address, an instruction for indicating that the URL address is configured is sent out by clicking a completion control configured in the configuration interface, and when the resource sending module receives the instruction for indicating that the URL address is configured, the designated URL address is updated according to the configured URL address, for example, if the user modifies a certain URL address, the modified URL address is used as the designated URL address and the corresponding original URL address is replaced; for another example, if a user newly increases a certain URL address, the newly increased URL address may be stored in a storage space where the specified URL address is located, where the number of specified URL addresses is correspondingly increased, where the specified URL address is one or more, and may be stored in a table or other manner, so long as the specified URL address can be called; as another example, if a user deletes a certain URL address, the corresponding designated URL address may be deleted directly.
The last embodiment can greatly facilitate the deleting, modifying and adding operation of the user on the appointed URL address, can completely add the verification code verification process for the resource path according to the self requirement without depending on a developer, does not need to understand the realization logic of the verification code verification process, namely does not need professional knowledge skills, and greatly reduces the difficulty of the user on opening the verification code function of certain resources. On the other hand, the Web integrated verification code function is well simplified, the integrated verification code function or the verification code closing function can be realized without any development, the method is flexible and quick, and development cost is saved.
Based on the above embodiment, in an embodiment, in order to meet the requirement that a user selects verification codes with different difficulties according to various scene requirements, for example, different selections of domestic and foreign verification codes can be made based on regions, such as different countries or different regions select verification codes with different difficulties, so as to meet more verification requirements and improve verification security, and meanwhile, the development cost is reduced, and the resource sending module can be further configured with a verification code configuration function and a verification code database; the verification code database stores verification codes of various types, such as digital verification codes, image verification codes, text verification codes, picture verification codes and the like, but not limited thereto. Correspondingly, the resource request verification method provided by the embodiment of the invention can further comprise the following steps:
in step S130, when an instruction for instructing to start the verification code configuration function is received, displaying the specified URL address and the verification code in the verification code database;
in step S140, upon receiving an instruction for instructing to configure a target verification code for a target specified URL, the target specified URL is associated with the target verification code.
Through steps S130 to S140, after configuring the specified URL address, the user may invoke the verification code configuration function by clicking the verification code configuration control on the configuration page of the specified URL, but is not limited to this form, so that the verification code and the specified URL address in the verification code database are simultaneously displayed. Then, the user can select the target designated URL needing to be configured with the verification code and the verification code needing to be configured without sequencing, after selection, the mapping between the target designated URL and the target verification code can be determined through the determination control on the configuration page, and the determination instruction generation is triggered, at the moment, the resource sending module responds to the determination instruction and associates the target designated URL with the target verification code, so that in the follow-up verification, the target verification code corresponding to the target designated URL can be injected into the verification code information, and the verification page with the target verification code is displayed by the request terminal.
Because the user may not have the relevant knowledge skills, the user also includes some resource paths requested by the API (Application Programming Interface ) into the designated URL, which results in an error in the verification process, and thus affects the smooth progress of the relevant business logic. Because the resources requested by the API are typically purely numerical or purely alphabetical or alphanumeric data that cannot be directly rendered, but are typically used to populate certain areas of the page, for example, for an order details page, the resources requested by the API typically include the amount of merchandise, price of merchandise, date of purchase, etc. in the order details page to populate these contents to the corresponding areas of the order details page, enabling a complete presentation of the order details. If the API request is forced to enter the verification process of the verification code, the verification code cannot be rendered at all based on the resource data corresponding to the API request, for example, after entering the verification process, a picture or a chart is fed back to the request end, and the picture and the chart are obviously not matched with the content required to be filled in the order detail page, so that the blank display or the display error of the area required to be filled with the data of the order detail page is caused, and the page is in error. Thus, to address this technical issue, in some embodiments, the resource sending module may also be configured with URL address rules associated with API requests; based on this, in the step S120, the step of updating the specified URL address according to the configured URL address may be adaptively adjusted, that is, the step of updating the specified URL address according to the configured URL address may include:
in step S121, the configured URL address is processed according to the URL address rule, so as to obtain a target URL address that does not satisfy the URL address rule;
in step S122, the specified URL address is updated according to the target URL address.
It will be appreciated that, before updating the designated URL address according to the configured URL address, the URL address corresponding to the API request in the configured URL address may be excluded based on the URL address rule, so that the target URL addresses that do not belong to the URL address corresponding to the API request may be obtained, and then the target URL addresses may be stored in the location where the designated URL address is located. The problems of page loading errors, unnecessary verification flow and the like caused by that the user misoperation brings the URL address of the API request into the appointed URL address can be avoided to a certain extent.
Thus, the specified URL address may be configured by any of the embodiments described above.
Based on the configured URL address, each time a resource request sent by a request end is received, a target URL address carried by the resource request can be obtained from the resource request, and then the target URL address is matched with a designated URL address to determine whether the target URL address is recorded in the designated URL address. The matching process, that is, the step of matching the target URL address of the resource request according to the preset designated URL address, may include:
in step S211, the target URL address is searched from the specified URL addresses;
in step S212, when the target URL address is not found, determining that the matching of the target URL address and the specified URL address fails;
in step S213, when the target URL address is found, it is determined that the target URL address is successfully matched with the specified URL address.
Therefore, when the target URL address is not found in the designated URL address, the target URL address and the designated URL address are failed to be matched, the resource request can be forwarded to the source station without starting a verification code verification process for the current resource request, and the source station is allowed to feed back corresponding resource information to the request end based on the resource request. Otherwise, when the URL address is found in the appointed URL address, the target URL address is successfully matched with the appointed URL address, a process of verifying the verification code of the current resource request is required to be started, and a verification page with the verification code information is returned to a request end of the resource request.
After the verification page with the verification code information is returned to the request end of the resource request, if the verification information input by the request end based on the verification page is received, a verification result is determined according to the verification information. The implementation principle of determining the verification result according to the verification information can refer to related technologies, and will not be described herein.
After obtaining the verification result, the resource request verification method provided by the embodiment of the invention can further include: when the verification result indicates that verification code verification is passed, forwarding the resource request to a source station; and intercepting the resource request when the verification result indicates that the verification code verification fails. Thereby ensuring the safety of the resources to a certain extent.
It should be noted that the above embodiments of the method of the present invention may be combined with each other, so long as there is no contradiction between the combinations.
Corresponding to the above method embodiment, in order to perform the corresponding steps in the above embodiment and each possible manner, an implementation manner of the resource request verification apparatus is given below, and optionally, the resource request verification apparatus may use the device structure of the electronic device shown in fig. 1. Further, referring to fig. 3, fig. 3 is a functional block diagram of a resource request verification device according to an embodiment of the present invention. It should be noted that, the basic principle and the technical effects of the resource request verification device provided in this embodiment are the same as those of the foregoing embodiment, and for brevity, reference may be made to the corresponding content in the foregoing embodiment. The resource request verification apparatus 300 includes:
a processing module 310 configured to: when a resource request is received, matching the target URL address of the resource request according to a preset designated URL address; the appointed URL address is used for indicating a URL address needing verification code verification;
a transmitting module 320 configured to: when the target URL address is successfully matched with the appointed URL address, returning a verification page with verification code information to a request end of the resource request; and when the matching of the target URL address and the appointed URL address fails, the resource request does not need to be verified, and the resource request is forwarded to a source station.
In some embodiments, the processing module 310 may include:
a search unit configured to: searching the target URL address from the appointed URL address;
a matching unit configured to: when the target URL address is not found, determining that the target URL address fails to be matched with the appointed URL address; and when the target URL address is found, determining that the target URL address is successfully matched with the appointed URL address.
In some embodiments, the resource request verification apparatus 300 may further include:
and the resource request sending module is configured with the designated URL address and a configuration function for configuring the URL address. The resource request sending module includes:
an address configuration unit configured to: when receiving an instruction for indicating to start the configuration function, displaying a configuration interface corresponding to the configuration function;
an updating unit configured to: and when an instruction for indicating that the URL address configuration is completed is received in the configuration interface, updating the appointed URL address according to the configured URL address.
In some embodiments, the resource sending module is further configured with URL address rules associated with API requests; accordingly, the updating unit is further configured to: processing the configured URL address according to the URL address rule to obtain a target URL address which does not meet the URL address rule; and updating the appointed URL address according to the target URL address.
In some embodiments, the resource sending module is further configured with a verification code configuration function and a verification code database; and the verification code database stores verification codes of various categories. Based on this, the resource transmission module further includes:
a verification code configuration unit configured to: when receiving an instruction for indicating to start the verification code configuration function, displaying the appointed URL address and the verification code in the verification code database;
an association unit configured to: and when receiving an instruction for indicating to configure a target verification code for a target specified URL, associating the target specified URL with the target verification code.
In some embodiments, the resource request verification apparatus 300 may further include:
an authentication module configured to: and when receiving the verification information input by the request terminal based on the verification page, determining a verification result according to the verification information.
In some embodiments, the resource request verification apparatus 300 may further include:
a forwarding module configured to: when the verification result indicates that verification code verification is passed, forwarding the resource request to a source station;
an interception module configured to: and intercepting the resource request when the verification result indicates that the verification code verification fails.
Alternatively, the above modules may be stored in the memory shown in fig. 1 in the form of software or Firmware (Firmware) or solidified in an Operating System (OS) of the electronic device, and may be executed by the processor in fig. 1. Meanwhile, data, codes of programs, and the like required to execute the above-described modules may be stored in the memory.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other manners as well. The apparatus embodiments described above are merely illustrative, for example, of the flowcharts and block diagrams in the figures that illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present invention may be integrated together to form a single part, or each module may exist alone, or two or more modules may be integrated to form a single part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The above description is only of the preferred embodiments of the present invention and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. A method for verifying a resource request, comprising:
when a resource request is received, matching the target URL address of the resource request according to a preset designated URL address; the appointed URL address is used for indicating a URL address to be verified by the verification code;
when the target URL address is successfully matched with the appointed URL address, returning a verification page with verification code information to a request end of the resource request;
and when the matching of the target URL address and the appointed URL address fails, the resource request does not need to be verified, and the resource request is forwarded to a source station.
2. The method of claim 1, wherein the matching the target URL address of the resource request according to the pre-configured specified URL address comprises:
searching the target URL address from the appointed URL address;
when the target URL address is not found, determining that the target URL address fails to be matched with the appointed URL address;
and when the target URL address is found, determining that the target URL address is successfully matched with the appointed URL address.
3. The method according to claim 1 or 2, wherein the specified URL address is configured in a resource delivery module; the resource sending module is configured with a configuration function for configuring the URL address; the method further comprises the steps of:
when receiving an instruction for indicating to start the configuration function, displaying a configuration interface corresponding to the configuration function;
and when an instruction for indicating that the URL address configuration is completed is received in the configuration interface, updating the appointed URL address according to the configured URL address.
4. The method of claim 3, wherein the resource sending module is further configured with URL address rules associated with API requests;
the updating the appointed URL address according to the configured URL address comprises the following steps:
processing the configured URL address according to the URL address rule to obtain a target URL address which does not meet the URL address rule;
and updating the appointed URL address according to the target URL address.
5. A method according to claim 3, wherein the resource transmission module is further configured with a verification code configuration function and a verification code database; the verification code database stores verification codes of various categories, and the method further comprises the steps of:
when receiving an instruction for indicating to start the verification code configuration function, displaying the appointed URL address and the verification code in the verification code database;
and when receiving an instruction for indicating to configure a target verification code for a target specified URL, associating the target specified URL with the target verification code.
6. The method of claim 1, wherein after returning the authentication page with the authentication code information to the requesting end of the resource request, the method further comprises:
and when receiving the verification information input by the request terminal based on the verification page, determining a verification result according to the verification information.
7. The method of claim 6, wherein after determining a verification result from the verification information, the method further comprises:
when the verification result indicates that verification code verification is passed, forwarding the resource request to a source station;
and intercepting the resource request when the verification result indicates that the verification code verification fails.
8. A resource request verification apparatus, comprising:
a processing module configured to: when a resource request is received, matching the target URL address of the resource request according to a preset designated URL address; the appointed URL address is used for indicating a URL address needing verification code verification;
a transmission module configured to: when the target URL address is successfully matched with the appointed URL address, returning a verification page with verification code information to a request end of the resource request; and when the matching of the target URL address and the appointed URL address fails, the resource request does not need to be verified, and the resource request is forwarded to a source station.
9. An electronic device comprising a processor and a memory, the memory storing machine-executable instructions executable by the processor to implement the method of any one of claims 1-7.
10. A computer readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, implements the method according to any of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311700833.4A CN117729004A (en) | 2023-12-11 | 2023-12-11 | Resource request verification method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311700833.4A CN117729004A (en) | 2023-12-11 | 2023-12-11 | Resource request verification method, device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117729004A true CN117729004A (en) | 2024-03-19 |
Family
ID=90209956
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311700833.4A Pending CN117729004A (en) | 2023-12-11 | 2023-12-11 | Resource request verification method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117729004A (en) |
-
2023
- 2023-12-11 CN CN202311700833.4A patent/CN117729004A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110221872B (en) | Page jump method and device, electronic equipment and storage medium | |
US10764139B2 (en) | Information processing system and report creation method | |
US11294661B2 (en) | Updating a code file | |
US11960879B2 (en) | Code conflict resolution system and method, apparatus, device, and medium | |
CN107402696B (en) | Editing data across users and devices using an action registry | |
CN112445579B (en) | Zero terminal data processing system and file copying method and device thereof | |
CN111226197A (en) | Cognitive learning workflow execution | |
CN108135026B (en) | Wi-Fi connection method, computer device and storage medium | |
US11526340B2 (en) | Providing context-based application suggestions | |
US10778664B1 (en) | Software asset management of computer systems and virtual instances for reporting and optimization | |
CN111539775A (en) | Application program management method and device | |
US20140365430A1 (en) | Information processing apparatus, system, and control method | |
CN112242930A (en) | Conversation processing method, device, server and storage medium | |
CN117729004A (en) | Resource request verification method, device, equipment and storage medium | |
CN110427745B (en) | Verification code obtaining method and device, electronic equipment and computer readable medium | |
US20180253319A1 (en) | Adaptively linking data between independent systems based on a uniform resource locator | |
US20210075923A1 (en) | Data transmission apparatus, and control method thereof | |
CN114860302A (en) | Page configuration method and device, electronic equipment and storage medium | |
CN112667951A (en) | Model calling method and device for target detection and electronic equipment | |
CN112579589A (en) | Information importing method and device | |
CN118396631B (en) | Online protocol text interaction method, system, electronic equipment and storage medium | |
US10785379B2 (en) | Server system, non-transitory computer-readable medium storing computer-readable instructions for server system, and method performed by server system | |
KR102725912B1 (en) | Method and apparatus for providing counseling service | |
US20240256765A1 (en) | Custom formulas in office cloud platform add-in | |
US20240070211A1 (en) | Information processing system, method, and non-transitory computer readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |