WO2020000789A1 - 实现接入验证的方法和装置 - Google Patents

实现接入验证的方法和装置 Download PDF

Info

Publication number
WO2020000789A1
WO2020000789A1 PCT/CN2018/110961 CN2018110961W WO2020000789A1 WO 2020000789 A1 WO2020000789 A1 WO 2020000789A1 CN 2018110961 W CN2018110961 W CN 2018110961W WO 2020000789 A1 WO2020000789 A1 WO 2020000789A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
information
encryption
verification
access information
Prior art date
Application number
PCT/CN2018/110961
Other languages
English (en)
French (fr)
Inventor
李志波
Original Assignee
新加坡矩阵有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 新加坡矩阵有限公司 filed Critical 新加坡矩阵有限公司
Publication of WO2020000789A1 publication Critical patent/WO2020000789A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Definitions

  • the embodiments of the present application relate to the technical field of data processing, for example, to a method and an apparatus for implementing access verification.
  • the system in order to prevent users from logging in to the system in an automated way (such as logging in to a website, etc.), the system usually provides a fully automatic Turing test that distinguishes computers from humans (Completely Automatically Turing Tests to Computers and HumansApart (CAPTCHA))
  • the system sends the generated verification code to the user and stores it in a database.
  • the user logs in, in addition to providing the correct user name and password, the user also needs to provide the verification code received by the input method, and the system compares the verification code from the user with the verification code stored in the database Consistency, allowing users to log in when the consistency between the verification code from the user and the verification code stored in the database is determined by comparison.
  • Embodiments of the present disclosure provide a method and an apparatus for implementing access verification, which implements access verification based on an encryption operation without preserving access information in a database.
  • An embodiment of the present disclosure further provides a network server including the foregoing device for implementing access verification.
  • An embodiment of the present disclosure also provides a computer-readable storage medium storing computer-executable instructions, where the computer-executable instructions are configured to perform the foregoing method for implementing access verification.
  • An embodiment of the present disclosure also provides a computer program product.
  • the computer program product includes a computer program stored on a computer-readable storage medium.
  • the computer program includes program instructions. When the program instructions are executed by a computer, The computer executes the method for implementing access verification described above.
  • An embodiment of the present disclosure further provides an electronic device, including:
  • At least one processor At least one processor
  • a memory connected in communication with the at least one processor; wherein,
  • the memory stores instructions executable by the at least one processor, and when the instructions are executed by the at least one processor, causes the at least one processor to execute the foregoing method for implementing access verification.
  • FIG. 1 is a schematic diagram of a method for implementing access verification according to an embodiment of the present disclosure
  • FIG. 2 is a flowchart of a method for implementing access verification according to an embodiment of the present disclosure
  • FIG. 3 is a schematic diagram of a method for encrypting first access information and second access information according to an embodiment of the present disclosure
  • FIG. 4 is a schematic diagram of a method for encrypting the first access information and the second access information according to another embodiment of the present disclosure
  • FIG. 5 is a schematic diagram of a method for providing a first encryption result according to an embodiment of the present disclosure
  • FIG. 6 is a schematic diagram of a method for providing the first encryption result according to another embodiment of the present disclosure.
  • FIG. 7 is a schematic diagram of a method for providing the first encryption result according to still another embodiment of the present disclosure.
  • FIG. 8 is a schematic diagram of a method for performing access verification according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic diagram of a method for performing access verification according to another embodiment of the present disclosure.
  • FIG. 10 is a schematic diagram of contents included in the first access information and the second access information according to an embodiment of the present disclosure
  • FIG. 11 is a schematic diagram of a determination method based on time information according to an embodiment of the present disclosure.
  • FIG. 12 is a schematic diagram of a method for obtaining access party information according to an embodiment of the present disclosure
  • FIG. 13 is a schematic diagram of a method for generating non-access party information according to an embodiment of the present disclosure
  • FIG. 14 is a schematic diagram of a method for providing non-access party information according to an embodiment of the present disclosure
  • 15 is a schematic diagram of a device for implementing access verification according to an embodiment of the present disclosure.
  • 16 is a structural diagram of an apparatus for implementing access verification according to an embodiment of the present disclosure.
  • 17 is a schematic diagram of an apparatus for encrypting the first access information and the second access information according to an embodiment of the present disclosure
  • FIG. 18 is a schematic diagram of an apparatus for providing the first encryption result according to an embodiment of the present disclosure.
  • 19 is a schematic diagram of an apparatus for performing access verification according to an embodiment of the present disclosure.
  • 20 is a schematic diagram of an apparatus for determining based on the time information according to an embodiment of the present disclosure
  • FIG. 21 is a schematic diagram of an apparatus for obtaining the accessor information according to an embodiment of the present disclosure.
  • 22 is a schematic diagram of an apparatus for providing non-access party information according to an embodiment of the present disclosure.
  • FIG. 23 is a schematic diagram of an apparatus for generating non-access party information according to an embodiment of the present disclosure.
  • FIG. 24 is a schematic layout diagram of a network server according to an embodiment of the present disclosure.
  • FIG. 25 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
  • 10 device for implementing access verification
  • 20 network server
  • 110 encryption module
  • 120 data interface
  • 130 authentication module
  • 140 determination module
  • 150 generation module.
  • an embodiment of the present disclosure provides a method for implementing access authentication, including: implementing access authentication based on an encryption operation without preserving access information in a database.
  • the access may be login.
  • a user logs into a website through a user terminal.
  • the access authentication based on the encryption operation may include the following steps:
  • S10 Encrypt the first access information related to the access to obtain a first encryption result, and provide the first encryption result;
  • S20 Obtain second access information and the first encryption result, and encrypt the second access information to obtain a second encryption result.
  • S30 Perform verification of the access according to the first encryption result and the second encryption result.
  • encrypting the first access information and the second access information may include: using a key to encrypt the first access information and the second access information.
  • the key and the access information to be encrypted are encrypted together, for example, the encryption is implemented in a manner such as Salt.
  • the key may include any content used to implement encryption, for example, a string of strings.
  • the content contained in the key for implementing encryption may be randomly selected / generated, for example, a string of strings randomly selected / generated.
  • the performing encryption may include performing asymmetric encryption.
  • the asymmetric encryption may be Hash encryption or RSA encryption.
  • the key when the first access information and the second access information are encrypted, the key may not be used, but the encryption may be performed directly, for example, the above-mentioned asymmetric encryption is performed.
  • a manner of providing the first encryption result may include: providing the first encryption result through a login form.
  • the login form may be provided to a user side (for example, a user terminal).
  • a manner of providing the first encrypted result through a login form may include: adding a field containing the first encrypted result to the login form.
  • a field containing the first encryption result may be added to the login form in a manner of updating the login form.
  • the field may be a hidden field.
  • the dashed box in FIG. 7 represents that the field is a hidden field.
  • the first encryption result may be provided to the user side.
  • the first encryption result may be sent to the user terminal through a login form, or the user terminal may The user terminal obtains the first encryption result through a login form in a request or the like.
  • performing the verification of the access according to the first encryption result and the second encryption result may include: performing an authentication according to a consistency between the first encryption result and the second encryption result. Describe access verification.
  • verifying the access according to the consistency may include: when there is consistency between the first encryption result and the second encryption result, confirming that the access passes verification.
  • the first access information and the second access information may include at least one of the following:
  • the first access information and the second access information may further include other information besides the authentication information, access party information, and time information, as long as the first access information, the first access information, Second, the access information can be successfully verified.
  • the verification information may be distinguished from a computer and a human, and may be embodied in various forms.
  • the verification information may include a verification code.
  • the verification code may be a character or a character string, and the character or character string may also be embodied in the form of a picture.
  • the access party information may reflect the identity of the access party, and may include a device identifier, a user name, and the like.
  • the time information may ensure the timeliness of the access, and may include a generation time or a provision time of the authentication information.
  • the second access information includes the time information; before the second access information is encrypted, it may also be determined that the time information is within a valid time range.
  • the second access information may be encrypted.
  • the access fails authentication that is, the access fails.
  • the valid time range may be a period from the generation time of the verification information, and the period of time may be reasonably set according to actual conditions For example, within 1 minute, 2 minutes, 5 minutes, etc. from the time when the verification information is generated.
  • the access party information may also be obtained before the first access information is encrypted.
  • the access party information (for example, a user name) may be obtained from a user side.
  • a user enters a user name when accessing it through a user terminal, so the user name can be obtained through the user terminal in an active request or passive reception mode.
  • the non-access party information may also be generated before the first access information is encrypted.
  • the non-access party information is information other than the access party information, for example, it may be the verification information, time information, and the like.
  • the non-access party information (for example, the verification information; or the verification information and time information) may be generated after the access party information (for example, a user name) is obtained or detected. ).
  • the non-access party information when the first access information includes non-access party information, after the first access information is encrypted, the non-access party information may be further provided.
  • the non-access party information may also be provided at the same time or before the first access information is encrypted.
  • the non-access party information may be provided to the user side.
  • the non-access party information may be sent to the user terminal, or the user may The terminal obtains the non-access party information in a manner such as a request.
  • the time information may also be provided through the above-mentioned login form.
  • the user terminal may display the authentication information so that the user can input the authentication information through the user terminal.
  • the second access information used to support access authentication may be obtained from a user side (for example, through the user terminal) in an active request or passive reception manner.
  • the login form may be submitted by the user terminal, so the second access information may be carried in the login form and submitted to obtain the second access information.
  • the second access information may correspond to the first access information, for example, the second access information and the first access information include information of the same type.
  • the first access information and the second access information each include a type of information in the access party information, authentication information, and time information (for example, the first access information and the second access information).
  • the incoming information includes the accessing party information; or, both include the authentication information; or, both include the time information), two kinds of information (for example, the first access information and the second access information are both Including the access party information and authentication information; or both including the authentication information and time information) or three types of information (for example, the first access information and the second access information both include the access party Information, verification information, time information).
  • the first encryption result that has been provided in S10 may be obtained from the user side (for example, through the user terminal) in an active request or passive reception mode.
  • the first encryption result provided in S10 may be carried in the login form and submitted to obtain the first encryption result provided in S10.
  • an embodiment of the present disclosure further provides an apparatus 10 for implementing access authentication, which is used to implement access authentication based on an encryption operation without preserving access information in a database.
  • the access may be login.
  • a user logs into a website through a user terminal.
  • the device 10 may include: an encryption module 110, a data interface 120, and an authentication module 130;
  • the encryption module 110 may be configured to encrypt the first access information involved in the access to obtain a first encryption result
  • the data interface 120 may be configured to provide the first encryption result, and further configured to obtain second access information and the first encryption result.
  • the encryption module 110 may be further configured to encrypt the second access information to obtain a second encryption result
  • the verification module 130 may be configured to verify the access according to the first encryption result and the second encryption result.
  • the encryption module 110 may be configured to: use a key to encrypt the first access information and the second access information.
  • the encryption module 110 may compare the key with the access information to be encrypted (for example, all The first access information and the second access information are encrypted together, for example, the encryption is implemented in a manner such as Salt.
  • the key may include any content used to implement encryption, for example, a string of strings.
  • the content contained in the key for implementing encryption may be randomly selected / generated, for example, a string of strings randomly selected / generated.
  • the encryption module 110 may be configured to perform asymmetric encryption.
  • the asymmetric encryption may be Hash encryption or RSA encryption.
  • the encryption module 110 may also directly encrypt without using the key, for example, performing the above-mentioned asymmetric Sex encryption.
  • the data interface 120 may be configured to provide the first encryption result through a login form.
  • the login form may be provided to a user side (for example, a user terminal).
  • the data interface 120 may be configured to: add a field containing the first encryption result to a login form.
  • the data interface 120 may add a field containing the first encryption result to the login form in a manner of updating the login form.
  • the field may be a hidden field.
  • the data interface 120 may provide the first encryption result to the user side. For example, when a user accesses through a user terminal, the data interface 120 may send the first encryption result through a login form. The first encryption result is given to the user terminal, or obtained by the user terminal through a login form in a request or the like.
  • the verification module 130 may be configured to perform verification of the access according to the consistency between the first encryption result and the second encryption result.
  • the verification module 130 may be configured to: when there is consistency between the first encryption result and the second encryption result, confirm that the access passes verification.
  • the first access information and the second access information may include at least one of the following:
  • the first access information and the second access information may further include other information besides the authentication information, access party information, and time information, as long as the first access information, the first access information, Second, the access information can be successfully verified.
  • the verification information can distinguish between computers and humans, and can be embodied in various forms.
  • the verification information may include a verification code.
  • the verification code may be a character or a character string, and the character or character string may also be embodied in the form of a picture.
  • the access party information may reflect the identity of the access party, and may include a device identifier, a user name, and the like.
  • the time information may ensure the timeliness of the access, and may include a generation time or a provision time of the authentication information and the like.
  • the device 10 may further include a determining module 140, configured to: before the encryption module 110 encrypts the second access information To determine that the time information is within a valid time range.
  • the determining module 140 may determine whether the time information is within a preset valid time range, and when determining that the time information is within the valid time range, may trigger the encryption module 110 to The second access information is encrypted; when it is determined that the time information is not within the valid time range, it can be confirmed that the access fails to pass authentication, that is, the access fails.
  • the valid time range may be a period from the generation time of the verification information, and the period of time may be reasonably set according to actual conditions For example, within 1 minute, 2 minutes, 5 minutes, etc. from the time when the verification information is generated.
  • the data interface 120 may further obtain the access information. Incoming party information.
  • the data interface 120 may obtain the access party information (for example, a user name) from a user side. For example, a user enters a user name when accessing through a user terminal, so the data interface 120 may obtain the user name through the user terminal in an active request or passive reception mode.
  • the access party information for example, a user name
  • the data interface 120 may obtain the user name through the user terminal in an active request or passive reception mode.
  • the data interface 120 may further provide the non-access party Incoming party information.
  • the data interface 120 may also provide the non-access party information.
  • the data interface 120 may provide the non-access party information to the user side. For example, when a user accesses through a user terminal, the data interface 120 may send the non-access party information to The user terminal, or the user terminal obtains the non-access party information in a manner such as a request.
  • the data interface 120 may also provide the time information through the foregoing login form.
  • the user terminal may display the authentication information so that the user can input the authentication information through the user terminal.
  • the data interface 120 may obtain the second access information for supporting access authentication from a user side (for example, through the user terminal) in an active request or passive reception mode.
  • the login form may be submitted by the user terminal, so the user terminal may carry the second access information in the login form and submit it, so that the second interface is obtained by the data interface 120 ⁇ ⁇ Enter information.
  • the second access information may correspond to the first access information, for example, the second access information and the first access information include information of the same type.
  • the first access information and the second access information each include a type of information in the access party information, authentication information, and time information (for example, the first access information and the second access information).
  • the incoming information includes the accessing party information; or, both include the authentication information; or, both include the time information), two kinds of information (for example, the first access information and the second access information are both Including the access party information and authentication information; or both including the authentication information and time information) or three types of information (for example, the first access information and the second access information both include the access party Information, verification information, time information).
  • the data interface 120 may obtain the first encryption result provided in S10 from a user side (for example, through the user terminal) in an active request or passive reception mode.
  • the user terminal may carry the first encryption result provided in S10 in the login form and submit it, so that the data interface 120 obtains the first encryption result provided in S10.
  • the apparatus 10 may further include a generating module 150, configured to: when the first access information includes non-access party information, encrypt the first access information in the encryption module 110 Before, the non-access party information is generated.
  • a generating module 150 configured to: when the first access information includes non-access party information, encrypt the first access information in the encryption module 110 Before, the non-access party information is generated.
  • the non-access party information is information other than the access party information, for example, it may be the verification information, time information, and the like.
  • the generating module 150 After the data interface 120 obtains or detects the accessor information (for example, a user name), the generating module 150 generates the non-accessor information (for example, the verification). Information; or, the verification information and time information).
  • the accessor information for example, a user name
  • the non-accessor information for example, the verification. Information; or, the verification information and time information.
  • an embodiment of the present disclosure further provides a network server 20 including the above-mentioned device 10 for implementing access verification.
  • the number of the network servers 20 may be at least one, for example, one, two or more network servers 20 are deployed.
  • the network server 20 may be a web server.
  • a server cluster may be formed by multiple web servers 20, and all or part of the above-mentioned method for implementing access verification may be performed by one web server 20 in the server cluster.
  • a web server 20 may be selected based on the load balancing principle, or a web server 20 may be randomly selected to perform all or part of the above-mentioned method for implementing access verification, and finally one or more web servers 20 execute the above All of the methods to achieve access authentication.
  • each web server 20 deployed in the server cluster can share a key, so as to achieve the above-mentioned cross-web server access verification.
  • An embodiment of the present disclosure further provides a computer-readable storage medium storing computer-executable instructions, where the computer-executable instructions are configured to execute the method for implementing access verification in the foregoing embodiment.
  • An embodiment of the present disclosure also provides a computer program product.
  • the computer program product includes a computer program stored on a computer-readable storage medium.
  • the computer program includes program instructions. When the program instructions are executed by a computer, The computer executes the method for implementing access verification in the foregoing embodiment.
  • the computer-readable storage medium may be a transitory computer-readable storage medium, or may be a non-transitory computer-readable storage medium.
  • An embodiment of the present disclosure further provides an electronic device, whose structure is shown in FIG. 25.
  • the electronic device 250 includes:
  • At least one processor 251, and one processor 251 is taken as an example in FIG. 25; and the memory 252 may further include a communication interface 253 (such as the data interface 120) and a bus 254. Among them, the processor 251, the communication interface 253, and the memory 252 can complete communication with each other through the bus 254. The communication interface 253 can be used for information transmission.
  • the processor 251 may call a logic instruction in the memory 252 to execute the method for implementing access verification in the foregoing embodiment.
  • logic instructions in the foregoing memory 252 may be implemented in the form of software functional units and sold or used as an independent product, and may be stored in a computer-readable storage medium.
  • the memory 252 is a computer-readable storage medium and can be used to store software programs and computer-executable programs, such as program instructions / modules corresponding to the methods in the embodiments of the present disclosure.
  • the processor 251 executes a functional application and data processing by running software programs, instructions, and modules stored in the memory 252, that is, implementing the method for implementing access verification in the foregoing method embodiment.
  • the memory 252 may include a storage program area and a storage data area, where the storage program area may store an operating system and application programs required for at least one function; the storage data area may store data created according to the use of the terminal device, and the like.
  • the memory 252 may include a high-speed random access memory, and may further include a non-volatile memory.
  • the solution for implementing access verification provided by the embodiment of the present disclosure can implement access verification based on an encryption operation without preserving access information such as a verification code in a database. Since there is no need to resort to a database, the efficiency of access authentication is significantly improved.
  • the technical solution of the embodiment of the present disclosure may be embodied in the form of a software product.
  • the computer software product is stored in a storage medium and includes one or more instructions for making a computer device (which may be a personal computer, a server, or a network). Equipment, etc.) perform all or part of the steps of the method described in the embodiments of the present disclosure.
  • the foregoing storage medium may be a non-transitory storage medium, including: a U disk, a mobile hard disk, a read-only memory (ROM, Read-Only Memory), a random access memory (RAM, Random Access Memory), a magnetic disk or an optical disk, etc.
  • first, second, etc. may be used in this application to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another.
  • the first element can be called the second element, and likewise, the second element can be called the first element, as long as all occurrences of the "first element” are renamed consistently and all occurrences of The “second component” can be renamed consistently.
  • the first element and the second element are both elements, but may not be the same element.
  • the aspects, implementations, implementations or features in the described embodiments can be used individually or in any combination.
  • Various aspects in the described embodiments may be implemented by software, hardware, or a combination of software and hardware.
  • the described embodiments may also be embodied by a computer-readable medium storing computer-readable code, the computer-readable code including instructions executable by at least one computing device.
  • the computer-readable medium can be associated with any data storage device capable of storing data, which can be read by a computer system.
  • Computer-readable media for example may include read-only memory, random-access memory, CD-ROM, HDD, DVD, magnetic tape, and optical data storage devices.
  • the computer-readable medium can also be distributed among computer systems connected through a network, so that the computer-readable code can be stored and executed in a distributed manner.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

本申请实施例提供了一种实现接入验证的方法和装置,可以在不由数据库保存接入信息的前提下,基于加密操作实现接入的验证。本申请还提供了一种电子设备,包括:至少一个处理器;以及与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行时,使所述至少一个处理器执行实现接入验证的所述方法。本申请还提供了一种网络服务器,包含实现接入验证的所述装置。

Description

实现接入验证的方法和装置 技术领域
本申请实施例涉及数据处理技术领域,例如涉及一种实现接入验证的方法和装置。
背景技术
目前,为了避免用户以自动化方式进行系统登录(如登录网站等),系统通常提供全自动区分电脑与人类的图灵测试(Completely Automated Public Turing test to tell Computers and Humans Apart,CAPTCHA)功能。
例如,系统将生成的验证码发给用户并且存储在数据库中。用户在登录时,除了需要提供正确的用户名和密码外,还需要以输入等方式将收到的验证码提供给系统,由系统比对来自用户的验证码与存储在数据库中的验证码之间的一致性,在通过比对确定来自用户的验证码与存储在数据库中的验证码之间具备一致性时允许用户登录。
发明内容
本公开实施例提供了一种实现接入验证的方法和装置,在不由数据库保存接入信息的前提下,基于加密操作实现接入的验证。
本公开实施例还提供了一种网络服务器,包含上述的实现接入验证的装置。
本公开实施例还提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行上述的实现接入验证的方法。
本公开实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述的实现接入验证的方法。
本公开实施例还提供了一种电子设备,包括:
至少一个处理器;以及
与所述至少一个处理器通信连接的存储器;其中,
所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行时,使所述至少一个处理器执行上述的实现接入验证的方法。
附图说明
一个或多个实施例通过与之对应的附图进行示例性说明,这些示例性说明和附图并不构成对实施例的限定,附图中具有相同参考数字标号的元件表示为类似的元件,附图不构成比例限制,并且其中:
图1为本公开实施例的实现接入验证的方法示意图;
图2为本公开实施例的实现接入验证的方法流程图;
图3为本公开实施例的对第一接入信息、第二接入信息进行加密的方法示意图;
图4为本公开另一实施例的对所述第一接入信息、第二接入信息进行加密的方法示意图;
图5为本公开实施例的提供第一加密结果的方法示意图;
图6为本公开另一实施例的提供所述第一加密结果的方法示意图;
图7为本公开再一实施例的提供所述第一加密结果的方法示意图;
图8为本公开实施例的进行接入的验证的方法示意图;
图9为本公开另一实施例的进行所述接入的验证的方法示意图;
图10为本公开实施例的所述第一接入信息、第二接入信息所包含内容的示意图;
图11为本公开实施例的基于时间信息进行确定的方法示意图;
图12为本公开实施例的获得接入方信息的方法示意图;
图13为本公开实施例的生成非接入方信息的方法示意图;
图14为本公开实施例的提供非接入方信息的方法示意图;
图15为本公开实施例的实现接入验证的装置示意图;
图16为本公开实施例的实现接入验证的装置结构图;
图17为本公开实施例的对所述第一接入信息、第二接入信息进行加密的装置示意图;
图18为本公开实施例的提供所述第一加密结果的装置示意图;
图19为本公开实施例的进行接入的验证的装置意图;
图20为本公开实施例的基于所述时间信息进行确定的装置示意图;
图21为本公开实施例的获得所述接入方信息的装置示意图;
图22为本公开实施例的提供非接入方信息的装置示意图;
图23为本公开实施例的生成非接入方信息的装置示意图;
图24为本公开实施例的网络服务器的布局示意图;以及
图25为本公开实施例提供的电子设备的结构示意图。
附图标记:
10:实现接入验证的装置;20:网络服务器;110:加密模块;120:数据接口;130:验证模块;140:确定模块;150:生成模块。
具体实施方式
为了能够更加详尽地了解本公开实施例的特点与技术内容,下面结合附图对本公开实施例的实现进行详细阐述,所附附图仅供参考说明之用,并非用来限定本公开实施例。在以下的技术描述中,为方便解释起见,通过多个细节以提供对所披露实施例的充分理解。然而,在没有这些细节的情况下,一个或多个实施例仍然可以实施。在其它情况下,为简化附图,熟知的结构和装置可以简化展示。
参见图1,本公开实施例提供了一种实现接入验证的方法,包括:在不由数据库保存接入信息的前提下,基于加密操作实现接入的验证。
作为一个实施例,所述接入可以为登录。例如:用户通过用户终端登录网站。
参见图2,所述基于加密操作实现接入的验证,可以包括以下步骤:
S10:对所述接入所涉及的第一接入信息进行加密得到第一加密结果,提供所述第一加密结果;
S20:获得第二接入信息、所述第一加密结果,对所述第二接入信息进行加密得到第二加密结果;
S30:根据所述第一加密结果与所述第二加密结果进行所述接入的验证。
参见图3,对所述第一接入信息、第二接入信息进行加密,可以包括:使用密钥对所述第一接入信息、第二接入信息进行加密。
作为一个实施例,使用所述密钥对所述第一接入信息、第二接入信息进行加密时,可以将所述密钥与待加密的接入信息(比如:所述第一接入信息、第二接入信息)一同加密,例如:以Salt(加盐)等方式实现所述加密。
作为一个实施例,所述密钥可以包含用于实现加密的任何内容,例如:一串字符串。
作为一个实施例,所述密钥包含的用于实现加密的内容可以是随机选取/生成的,例如:随机选取/生成的一串字符串。
参见图4,所述进行加密可以包括:进行非对称性加密。
作为一个实施例,所述非对称性加密可以为Hash(散列)加密或RSA加密。
作为一个实施例,对所述第一接入信息、第二接入信息进行加密时,也可以不使用所述密钥,而是直接进行加密,例如:进行上述的非对称性加密。
参见图5,提供所述第一加密结果的方式可以包括:通过登录表单提供所述第一加密结果。所述登录表单可以被提供给用户侧(例如:用户终端)。
参见图6,通过登录表单提供所述第一加密结果的方式可以包括:在所述登录表单中增加包含所述第一加密结果的字段。
作为一个实施例,通过所述登录表单提供所述第一加密结果时,可以以更新所述登录表单的方式在所述登录表单中增加包含所述第一加密结果的字段。
参见图7,所述字段可以为隐藏字段。
作为一个实施例,图7中的虚线框代表所述字段为隐藏字段。
作为一个实施例,可以将所述第一加密结果提供给用户侧,例如:用户通过用户终端接入时,可以将所述第一加密结果通过登录表单发送给所述用户终端,或由所述用户终端以请求等方式通过登录表单获得所述第一加密结果。
参见图8,根据所述第一加密结果与所述第二加密结果进行所述接入的验证,可以包括:根据所述第一加密结果与所述第二加密结果之间的一致性进行所述接入的验证。
参见图9,根据所述一致性进行所述接入的验证,可以包括:在所述第一加密结果与所述第二加密结果之间具备一致性时,确认所述接入通过验证。
参见图10,所述第一接入信息、第二接入信息可以包括以下至少之一:
验证信息;
接入方信息;
时间信息。
作为一个实施例,所述第一接入信息、第二接入信息还可以包括除上述验证信息、接入方信息、时间信息以外的其它信息,只要能够基于所述第一接入信息、第二接入信息顺利实现接入验证即可。
作为一个实施例,所述验证信息可以区分电脑与人类,体现形式可以多种多样,例如:所述验证信息可以包括验证码等。
作为一个实施例,所述验证码可以是字符或字符串,所述字符或字符串还可以以图片的形式体现。
作为一个实施例,所述接入方信息可以体现接入方的身份,可以包括设备标识或用户名等。
作为一个实施例,所述时间信息可以保证所述接入的时效性,可以包括所述验证信息的生成时间或提供时间等。
参见图11,在所述第二接入信息包括所述时间信息时;在对所述第二接入信息进行加密之前,还可以确定所述时间信息在有效时间范围内。
作为一个实施例,可以判断所述时间信息是否在预设的有效时间范围内,在确定所述时间信息在所述有效时间范围内时,可以对所述第二接入信息进 行加密;在确定所述时间信息不在所述有效时间范围内时,可以确认所述接入未通过验证,即:接入失败。
作为一个实施例,在所述时间信息包括所述验证信息的生成时间时,所述有效时间范围可以是从所述验证信息的生成时间起始的一段时间,该段时间可以根据实际情况合理设置,例如:从所述验证信息的生成时间起始的1分钟、2分钟、5分钟时间内等。
参见图12,在所述第一接入信息包括所述接入方信息时,对所述第一接入信息进行加密之前,还可以获得所述接入方信息。
作为一个实施例,可以从用户侧获得所述接入方信息(例如:用户名)。例如,用户在通过用户终端接入时输入用户名,因此可以通过所述用户终端以主动请求或被动接收等方式获得所述用户名。
参见图13,在所述第一接入信息包括非接入方信息时,对所述第一接入信息进行加密之前,还可以生成所述非接入方信息。
作为一个实施例,所述非接入方信息是除所述接入方信息以外的其它信息,例如:可以是所述验证信息、时间信息等。
作为一个实施例,可以在获得或检测到所述接入方信息(例如:用户名)后,生成所述非接入方信息(例如:所述验证信息;或,所述验证信息和时间信息)。
参见图14,在所述第一接入信息包括非接入方信息时,对所述第一接入信息进行加密之后,还可以提供所述非接入方信息。
根据实际情况,也可以在对所述第一接入信息进行加密的同时或之前,提供所述非接入方信息。
作为一个实施例,可以将所述非接入方信息提供给用户侧,例如:用户通过用户终端接入时,可以将所述非接入方信息发送给所述用户终端,或由所述用户终端以请求等方式获得所述非接入方信息。
作为一个实施例,在所述非接入方信息包括所述验证信息、时间信息时,也可以通过上述的登录表单的方式提供所述时间信息。
在用户侧(例如:用户终端)获得所述验证信息后,所述用户终端可以 显示所述验证信息,以便用户通过所述用户终端输入所述验证信息。
作为一个实施例,可以从用户侧(例如:通过所述用户终端)以主动请求或被动接收等方式获得用于支持接入验证的所述第二接入信息。
例如,所述登录表单可以由所述用户终端提交,因此可以将所述第二接入信息携带于所述登录表单中提交,以获得所述第二接入信息。
作为一个实施例,所述第二接入信息可以与所述第一接入信息相对应,例如:所述第二接入信息与所述第一接入信息包含相同类别的信息。
例如,所述第一接入信息和第二接入信息均包含所述接入方信息、验证信息和时间信息中相同类别的一种信息(例如:所述第一接入信息和第二接入信息均包含所述接入方信息;或,均包含所述验证信息;或,均包含所述时间信息)、两种信息(例如:所述第一接入信息和第二接入信息均包含所述接入方信息、验证信息;或,均包含所述验证信息、时间信息)或三种信息(例如:所述第一接入信息和第二接入信息均包含所述接入方信息、验证信息、时间信息)。
类似地,可以从用户侧(例如:通过所述用户终端)以主动请求或被动接收等方式获得S10中已经提供的所述第一加密结果。
例如,可以将S10中已经提供的所述第一加密结果携带于所述登录表单中提交,以获得S10中已经提供的所述第一加密结果。
参见图15,本公开实施例还提供了一种实现接入验证的装置10,用于:在不由数据库保存接入信息的前提下,基于加密操作实现接入的验证。
作为一个实施例,所述接入可以为登录。例如:用户通过用户终端登录网站。
参见图16,所述装置10可以包括:加密模块110、数据接口120、验证模块130;其中,
所述加密模块110,可以用于对所述接入所涉及的第一接入信息进行加密得到第一加密结果;
所述数据接口120,可以用于提供所述第一加密结果;还用于获得第二接入信息、所述第一加密结果;
所述加密模块110,还可以用于对所述第二接入信息进行加密得到第二加密结果;
所述验证模块130,可以用于根据所述第一加密结果与所述第二加密结果进行所述接入的验证。
参见图17,结合图3、图4,所述加密模块110可以用于:使用密钥对所述第一接入信息、第二接入信息进行加密。
作为一个实施例,使用所述密钥对所述第一接入信息、第二接入信息进行加密时,所述加密模块110可以将所述密钥与待加密的接入信息(比如:所述第一接入信息、第二接入信息)一同加密,例如:以Salt等方式实现所述加密。
作为一个实施例,所述密钥可以包含用于实现加密的任何内容,例如:一串字符串。
作为一个实施例,所述密钥包含的用于实现加密的内容可以是随机选取/生成的,例如:随机选取/生成的一串字符串。
作为一个实施例,所述加密模块110可以用于:进行非对称性加密。
作为一个实施例,所述非对称性加密可以为Hash加密或RSA加密。
作为一个实施例,对所述第一接入信息、第二接入信息进行加密时,所述加密模块110也可以不使用所述密钥,而是直接进行加密,例如:进行上述的非对称性加密。
参见图18,结合图5至图7,所述数据接口120可以用于:通过登录表单提供所述第一加密结果。所述登录表单可以被提供给用户侧(例如:用户终端)。
作为一个实施例,所述数据接口120可以用于:在登录表单中增加包含所述第一加密结果的字段。
作为一个实施例,通过所述登录表单提供所述第一加密结果时,所述数据接口120可以以更新所述登录表单的方式在所述登录表单中增加包含所述第一加密结果的字段。
作为一个实施例,所述字段可以为隐藏字段。
作为一个实施例,所述数据接口120可以将所述第一加密结果提供给用户侧,例如:用户通过用户终端接入时,所述数据接口120可以将所述第一加密结果通过登录表单发送给所述用户终端,或由所述用户终端以请求等方式通过登录表单获得所述第一加密结果。
参见图19,结合图8、图9,所述验证模块130可以用于:根据所述第一加密结果与所述第二加密结果之间的一致性进行所述接入的验证。
作为一个实施例,所述验证模块130可以用于:在所述第一加密结果与所述第二加密结果之间具备一致性时,确认所述接入通过验证。
如前所述,所述第一接入信息、第二接入信息可以包括以下至少之一:
验证信息;
接入方信息;
时间信息。
作为一个实施例,所述第一接入信息、第二接入信息还可以包括除上述验证信息、接入方信息、时间信息以外的其它信息,只要能够基于所述第一接入信息、第二接入信息顺利实现接入验证即可。
如前所述,所述验证信息可以区分电脑与人类,体现形式可以多种多样,例如:所述验证信息可以包括验证码等。
所述验证码可以是字符或字符串,所述字符或字符串还可以以图片的形式体现。
所述接入方信息可以体现接入方的身份,可以包括设备标识或用户名等。
所述时间信息可以保证所述接入的时效性,可以包括所述验证信息的生成时间或提供时间等。
参见图20,在所述第二接入信息包括所述时间信息时,所述装置10还可以包括确定模块140,用于:在所述加密模块110对所述第二接入信息进行加密之前,确定所述时间信息在有效时间范围内。
作为一个实施例,所述确定模块140可以判断所述时间信息是否在预设的有效时间范围内,在确定所述时间信息在所述有效时间范围内时,可以触发所述加密模块110对所述第二接入信息进行加密;在确定所述时间信息不 在所述有效时间范围内时,可以确认所述接入未通过验证,即:接入失败。
作为一个实施例,在所述时间信息包括所述验证信息的生成时间时,所述有效时间范围可以是从所述验证信息的生成时间起始的一段时间,该段时间可以根据实际情况合理设置,例如:从所述验证信息的生成时间起始的1分钟、2分钟、5分钟时间内等。
参见图21,在所述第一接入信息包括所述接入方信息时,在所述加密模块110对所述第一接入信息进行加密之前,所述数据接口120还可以获得所述接入方信息。
作为一个实施例,所述数据接口120可以从用户侧获得所述接入方信息(例如:用户名)。例如,用户在通过用户终端接入时输入用户名,因此所述数据接口120可以通过所述用户终端以主动请求或被动接收等方式获得所述用户名。
参见图22,在所述第一接入信息包括非接入方信息时,在所述加密模块110对所述第一接入信息进行加密之后,所述数据接口120还可以提供所述非接入方信息。
根据实际情况,在所述加密模块110对所述第一接入信息进行加密的同时或之前,所述数据接口120也可以提供所述非接入方信息。
作为一个实施例,所述数据接口120可以将所述非接入方信息提供给用户侧,例如:用户通过用户终端接入时,所述数据接口120可以将所述非接入方信息发送给所述用户终端,或由所述用户终端以请求等方式获得所述非接入方信息。
作为一个实施例,在所述非接入方信息包括所述验证信息、时间信息时,所述数据接口120也可以通过上述的登录表单的方式提供所述时间信息。
在用户侧(例如:用户终端)获得所述验证信息后,所述用户终端可以显示所述验证信息,以便用户通过所述用户终端输入所述验证信息。
作为一个实施例,所述数据接口120可以从用户侧(例如:通过所述用户终端)以主动请求或被动接收等方式获得用于支持接入验证的所述第二接入信息。
例如,所述登录表单可以由所述用户终端提交,因此所述用户终端可以 将所述第二接入信息携带于所述登录表单中提交,以便由所述数据接口120获得所述第二接入信息。
作为一个实施例,所述第二接入信息可以与所述第一接入信息相对应,例如:所述第二接入信息与所述第一接入信息包含相同类别的信息。
例如,所述第一接入信息和第二接入信息均包含所述接入方信息、验证信息和时间信息中相同类别的一种信息(例如:所述第一接入信息和第二接入信息均包含所述接入方信息;或,均包含所述验证信息;或,均包含所述时间信息)、两种信息(例如:所述第一接入信息和第二接入信息均包含所述接入方信息、验证信息;或,均包含所述验证信息、时间信息)或三种信息(例如:所述第一接入信息和第二接入信息均包含所述接入方信息、验证信息、时间信息)。
类似地,所述数据接口120可以从用户侧(例如:通过所述用户终端)以主动请求或被动接收等方式获得S10中已经提供的所述第一加密结果。
例如,所述用户终端可以将S10中已经提供的所述第一加密结果携带于所述登录表单中提交,以便由所述数据接口120获得S10中已经提供的所述第一加密结果。
参见图23,所述装置10还可以包括生成模块150,用于:在所述第一接入信息包括非接入方信息时,在所述加密模块110对所述第一接入信息进行加密之前,生成所述非接入方信息。
作为一个实施例,所述非接入方信息是除所述接入方信息以外的其它信息,例如:可以是所述验证信息、时间信息等。
作为一个实施例,可以在所述数据接口120获得或检测到所述接入方信息(例如:用户名)后,由所述生成模块150生成所述非接入方信息(例如:所述验证信息;或,所述验证信息和时间信息)。
参见图24,本公开实施例还提供了一种网络服务器20,包含上述的实现接入验证的装置10。
作为一个实施例,所述网络服务器20的数量可以为至少一个,例如:部署一个、两个或更多网络服务器20。
所述网络服务器20可以是web server(网站服务器)。
作为一个实施例,可以由多个网络服务器20形成服务器集群,上述的实现接入验证的方法中的全部或部分可以由该服务器集群中的一个网络服务器20执行。例如,可以基于负载均衡原则选择一个网络服务器20,或随机选择一个网络服务器20,以执行上述的实现接入验证的方法中的全部或部分,并最终由一个或一个以上的网络服务器20执行上述的实现接入验证的方法中的全部。
通常,部署在所述服务器集群中的各个网络服务器20均可共享一个密钥,以便实现上述的跨网络服务器的接入校验。
本公开实施例还提供了一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行上述实施例的实现接入验证的方法。
本公开实施例还提供了一种计算机程序产品,所述计算机程序产品包括存储在计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行上述实施例的实现接入验证的方法。
上述的计算机可读存储介质可以是暂态计算机可读存储介质,也可以是非暂态计算机可读存储介质。
本公开实施例还提供了一种电子设备,其结构如图25所示,电子设备250包括:
至少一个处理器(processor)251,图25中以一个处理器251为例;和存储器(memory)252,还可以包括通信接口(Communication Interface)253(例如所述数据接口120)和总线254。其中,处理器251、通信接口253、存储器252可以通过总线254完成相互间的通信。通信接口253可以用于信息传输。处理器251可以调用存储器252中的逻辑指令,以执行上述实施例的实现接入验证的方法。
此外,上述的存储器252中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。
存储器252作为一种计算机可读存储介质,可用于存储软件程序、计算机可执行程序,如本公开实施例中的方法对应的程序指令/模块。处理器251 通过运行存储在存储器252中的软件程序、指令以及模块,从而执行功能应用以及数据处理,即实现上述方法实施例中的实现接入验证的方法。
存储器252可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据终端设备的使用所创建的数据等。此外,存储器252可以包括高速随机存取存储器,还可以包括非易失性存储器。
由以上描述可知,本公开实施例提供的实现接入验证的方案,可以在不由数据库保存验证码等接入信息的前提下,基于加密操作实现接入的验证。由于不需要借助于数据库,因此显著提高了接入验证的效率。
本公开实施例的技术方案可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括一个或多个指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本公开实施例所述方法的全部或部分步骤。而前述的存储介质可以是非暂态存储介质,包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等多种可以存储程序代码的介质,也可以是暂态存储介质。
当用于本申请中时,虽然术语“第一”、“第二”等可能会在本申请中使用以描述各元件,但这些元件不应受到这些术语的限制。这些术语仅用于将一个元件与另一个元件区别开。比如,在不改变描述的含义的情况下,第一元件可以叫做第二元件,并且同样第,第二元件可以叫做第一元件,只要所有出现的“第一元件”一致重命名并且所有出现的“第二元件”一致重命名即可。第一元件和第二元件都是元件,但可以不是相同的元件。
本申请中使用的用词仅用于描述实施例并且不用于限制权利要求。如在实施例以及权利要求的描述中使用的,除非上下文清楚地表明,否则单数形式的“一个”(a)、“一个”(an)和“所述”(the)旨在同样包括复数形式。类似地,如在本申请中所使用的术语“和/或”是指包含一个或一个以上相关联的列出的任何以及所有可能的组合。另外,当用于本申请中时,术语“包括”(comprise)及其变型“包括”(comprises)和/或包括(comprising)等指陈述的特征、整体、步骤、操作、元素,和/或组件的存在,但不排除一个或 一个以上其它特征、整体、步骤、操作、元素、组件和/或这些的分组的存在或添加。
所描述的实施例中的各方面、实施方式、实现或特征能够单独使用或以任意组合的方式使用。所描述的实施例中的各方面可由软件、硬件或软硬件的结合实现。所描述的实施例也可以由存储有计算机可读代码的计算机可读介质体现,该计算机可读代码包括可由至少一个计算装置执行的指令。所述计算机可读介质可与任何能够存储数据的数据存储装置相关联,该数据可由计算机系统读取。用于举例的计算机可读介质可以包括只读存储器、随机存取存储器、CD-ROM、HDD、DVD、磁带以及光数据存储装置等。所述计算机可读介质还可以分布于通过网络联接的计算机系统中,这样计算机可读代码就可以分布式存储并执行。
上述技术描述可参照附图,这些附图形成了本申请的一部分,并且通过描述在附图中示出了依照所描述的实施例的实施方式。虽然这些实施例描述的足够详细以使本领域技术人员能够实现这些实施例,但这些实施例是非限制性的;这样就可以使用其它的实施例,并且在不脱离所描述的实施例的范围的情况下还可以做出变化。比如,流程图中所描述的操作顺序是非限制性的,因此在流程图中阐释并且根据流程图描述的两个或两个以上操作的顺序可以根据若干实施例进行改变。作为另一个例子,在若干实施例中,在流程图中阐释并且根据流程图描述的一个或一个以上操作是可选的,或是可删除的。另外,某些步骤或功能可以添加到所公开的实施例中,或两个以上的步骤顺序被置换。所有这些变化被认为包含在所公开的实施例以及权利要求中。
另外,上述技术描述中使用术语以提供所描述的实施例的透彻理解。然而,并不需要过于详细的细节以实现所描述的实施例。因此,实施例的上述描述是为了阐释和描述而呈现的。上述描述中所呈现的实施例以及根据这些实施例所公开的例子是单独提供的,以添加上下文并有助于理解所描述的实施例。上述说明书不用于做到无遗漏或将所描述的实施例限制到本公开的精确形式。根据上述教导,若干修改、选择适用以及变化是可行的。在某些情况下,没有详细描述为人所熟知的处理步骤以避免不必要地影响所描述的实施例。

Claims (34)

  1. 一种实现接入验证的方法,其特征在于,包括:在不由数据库保存接入信息的前提下,基于加密操作实现接入的验证。
  2. 根据权利要求1所述的方法,其特征在于,所述基于加密操作实现接入的验证包括:
    对所述接入所涉及的第一接入信息进行加密得到第一加密结果,提供所述第一加密结果;
    获得第二接入信息、所述第一加密结果,对所述第二接入信息进行加密得到第二加密结果;
    根据所述第一加密结果与所述第二加密结果进行所述接入的验证。
  3. 根据权利要求2所述的方法,其特征在于,对所述第一接入信息、第二接入信息进行加密包括:使用密钥对所述第一接入信息、第二接入信息进行加密。
  4. 根据权利要求2或3所述的方法,其特征在于,所述进行加密包括:进行非对称性加密。
  5. 根据权利要求4所述的方法,其特征在于,所述非对称性加密为Hash散列加密或RSA加密。
  6. 根据权利要求2所述的方法,其特征在于,提供所述第一加密结果的方式包括:通过登录表单提供所述第一加密结果。
  7. 根据权利要求6所述的方法,其特征在于,通过登录表单提供所述第一加密结果的方式包括:在登录表单中增加包含所述第一加密结果的字段。
  8. 根据权利要求7所述的方法,其特征在于,所述字段为隐藏字段。
  9. 根据权利要求2所述的方法,其特征在于,根据所述第一加密结果与所述第二加密结果进行所述接入的验证,包括:
    根据所述第一加密结果与所述第二加密结果之间的一致性进行所述接入的验证。
  10. 根据权利要9所述的方法,其特征在于,根据所述一致性进行所述接入的验证包括:
    在所述第一加密结果与所述第二加密结果之间具备一致性时,确认所述接入通过验证。
  11. 根据权利要求2至10任一项所述的方法,其特征在于,所述第一接入信息、第二接入信息包括以下至少之一:
    验证信息;
    接入方信息;
    时间信息。
  12. 根据权利要求11所述的方法,其特征在于,
    所述验证信息包括验证码;或,
    所述接入方信息包括用户名;或,
    所述时间信息包括所述验证信息的生成时间。
  13. 根据权利要求11所述的方法,其特征在于,
    所述第二接入信息包括所述时间信息;
    在对所述第二接入信息进行加密之前,还包括:确定所述时间信息在有效时间范围内。
  14. 根据权利要求11所述的方法,其特征在于,还包括以下至少之一:
    在所述第一接入信息包括所述接入方信息时,对所述第一接入信息进行加密之前,获得所述接入方信息;
    在所述第一接入信息包括非接入方信息时,对所述第一接入信息进行加密之前,生成所述非接入方信息;
    在所述第一接入信息包括所述非接入方信息时,对所述第一接入信息进行加密之后,提供所述非接入方信息。
  15. 一种实现接入验证的装置,其特征在于,用于:在不由数据库保存接入信息的前提下,基于加密操作实现接入的验证。
  16. 根据权利要求15所述的装置,其特征在于,包括:加密模块、数据接口、验证模块;其中,
    所述加密模块,用于对所述接入所涉及的第一接入信息进行加密得到第一加密结果;
    所述数据接口,用于提供所述第一加密结果;还用于获得第二接入信息、所述第一加密结果;
    所述加密模块,还用于对所述第二接入信息进行加密得到第二加密结果;
    所述验证模块,用于根据所述第一加密结果与所述第二加密结果进行所述接入的验证。
  17. 根据权利要求16所述的装置,其特征在于,所述加密模块,用于:使用密钥对所述第一接入信息、第二接入信息进行加密。
  18. 根据权利要求16或17所述的装置,其特征在于,所述加密模块,用于:进行非对称性加密。
  19. 根据权利要求18所述的装置,其特征在于,所述非对称性加密为Hash加密或RSA加密。
  20. 根据权利要求16所述的装置,其特征在于,所述数据接口,用于:通过登录表单提供所述第一加密结果。
  21. 根据权利要求20所述的装置,其特征在于,所述数据接口,用于:在登录表单中增加包含所述第一加密结果的字段。
  22. 根据权利要求21所述的装置,其特征在于,所述字段为隐藏字段。
  23. 根据权利要求16所述的装置,其特征在于,所述验证模块,用于:
    根据所述第一加密结果与所述第二加密结果之间的一致性进行所述接入的验证。
  24. 根据权利要23所述的装置,其特征在于,所述验证模块,用于:
    在所述第一加密结果与所述第二加密结果之间具备一致性时,确认所述接入通过验证。
  25. 根据权利要求16至24任一项所述的装置,其特征在于,所述第一接入信息、第二接入信息包括以下至少之一:
    验证信息;
    接入方信息;
    时间信息。
  26. 根据权利要求25所述的装置,其特征在于,
    所述验证信息包括验证码;或,
    所述接入方信息包括用户名;或,
    所述时间信息包括所述验证信息的生成时间。
  27. 根据权利要求25所述的装置,其特征在于,
    所述第二接入信息包括所述时间信息;
    所述装置还包括确定模块,用于:在所述加密模块对所述第二接入信息进行加密之前,确定所述时间信息在有效时间范围内。
  28. 根据权利要求25所述的装置,其特征在于,所述数据接口还用于执行以下至少之一:
    在所述第一接入信息包括所述接入方信息时,在所述加密模块对所述第一接入信息进行加密之前,获得所述接入方信息;
    在所述第一接入信息包括非接入方信息时,在所述加密模块对所述第一接入信息进行加密之后,提供所述非接入方信息。
  29. 根据权利要求25所述的装置,其特征在于,还包括生成模块,用于:在所述第一接入信息包括非接入方信息时,在所述加密模块对所述第一接入信息进行加密之前,生成所述非接入方信息。
  30. 一种电子设备,其特征在于,包括:
    至少一个处理器;以及
    与所述至少一个处理器通信连接的存储器;其中,
    所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行时,使所述至少一个处理器执行权利要求1-14任一项所述的方法。
  31. 一种网络服务器,其特征在于,包含权利要求15-29任一项所述的装置。
  32. 根据权利要求31所述的网络服务器,其特征在于,所述网络服务器的数量为至少一个。
  33. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行权利要求1-14任一项所述的方法。
  34. 一种计算机程序产品,所述计算机程序产品包括存储在计算机可读存储介质上的计算机程序,所述计算机程序包括程序指令,当所述程序指令被计算机执行时,使所述计算机执行权利要求1-14任一项所述的方法。
PCT/CN2018/110961 2018-06-29 2018-10-19 实现接入验证的方法和装置 WO2020000789A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810695787.6A CN108965270A (zh) 2018-06-29 2018-06-29 实现接入验证的方法和装置
CN201810695787.6 2018-06-29

Publications (1)

Publication Number Publication Date
WO2020000789A1 true WO2020000789A1 (zh) 2020-01-02

Family

ID=64487900

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/110961 WO2020000789A1 (zh) 2018-06-29 2018-10-19 实现接入验证的方法和装置

Country Status (2)

Country Link
CN (1) CN108965270A (zh)
WO (1) WO2020000789A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080141352A1 (en) * 2006-12-11 2008-06-12 Motorola, Inc. Secure password distribution to a client device of a network
CN101296086A (zh) * 2008-06-18 2008-10-29 华为技术有限公司 接入认证的方法、系统和设备
CN103049705A (zh) * 2012-06-08 2013-04-17 深圳市朗科科技股份有限公司 一种基于虚拟化的安全存储方法、终端及系统
CN106027574A (zh) * 2016-07-28 2016-10-12 杭州迪普科技有限公司 身份认证方法和装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065653B (zh) * 2014-06-09 2015-08-19 北京石盾科技有限公司 一种交互式身份验证方法、装置、系统和相关设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080141352A1 (en) * 2006-12-11 2008-06-12 Motorola, Inc. Secure password distribution to a client device of a network
CN101296086A (zh) * 2008-06-18 2008-10-29 华为技术有限公司 接入认证的方法、系统和设备
CN103049705A (zh) * 2012-06-08 2013-04-17 深圳市朗科科技股份有限公司 一种基于虚拟化的安全存储方法、终端及系统
CN106027574A (zh) * 2016-07-28 2016-10-12 杭州迪普科技有限公司 身份认证方法和装置

Also Published As

Publication number Publication date
CN108965270A (zh) 2018-12-07

Similar Documents

Publication Publication Date Title
US11881937B2 (en) System, method and computer program product for credential provisioning in a mobile device platform
US10419425B2 (en) Method, device, and system for access control of a cloud hosting service
US10637855B2 (en) Enhanced authentication for secure communications
EP3345087B1 (en) Method, device, and system for access control of a cloud hosting service
US9996679B2 (en) Methods and apparatus for device authentication and secure data exchange between a server application and a device
JP6215934B2 (ja) ログイン検証の方法、クライアント、サーバ、およびシステム
JP6335280B2 (ja) 企業システムにおけるユーザおよびデバイスの認証
US9867043B2 (en) Secure device service enrollment
CN107196951B (zh) 一种hdfs系统防火墙的实现方法和防火墙系统
US9723003B1 (en) Network beacon based credential store
US9747434B1 (en) Authenticating with an external device by providing a message having message fields arranged in a particular message field order
US10127317B2 (en) Private cloud API
US10129299B1 (en) Network beacon management of security policies
TWI521373B (zh) 在保護使用者隱私的同時進行單次登入之方法與系統
US11329817B2 (en) Protecting data using controlled corruption in computer networks
US11146552B1 (en) Decentralized application authentication
US11868476B2 (en) Boot-specific key access in a virtual device platform
WO2019011187A1 (zh) 电子账户的挂失、解挂、业务管理方法、装置及设备
CN104410580B (zh) 可信安全WiFi路由器及其数据处理方法
US20210218734A1 (en) Two factor authentication using a digital one-time pad
JP2022534677A (ja) ブロックチェーンを使用するオンラインアプリケーションおよびウェブページの保護
US11233783B2 (en) Authentication in a computer network system
US10063592B1 (en) Network authentication beacon
TW201430608A (zh) 單點登入系統及方法
WO2014153982A1 (en) Methods and systems for broadcasting pictures

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18923858

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18923858

Country of ref document: EP

Kind code of ref document: A1