WO2019148717A1 - Dispositif et procédé de vérification de validité de demande et support de mémoire lisible par ordinateur - Google Patents
Dispositif et procédé de vérification de validité de demande et support de mémoire lisible par ordinateur Download PDFInfo
- Publication number
- WO2019148717A1 WO2019148717A1 PCT/CN2018/089183 CN2018089183W WO2019148717A1 WO 2019148717 A1 WO2019148717 A1 WO 2019148717A1 CN 2018089183 W CN2018089183 W CN 2018089183W WO 2019148717 A1 WO2019148717 A1 WO 2019148717A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- registration
- information
- interface
- server
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
Definitions
- the present application relates to the field of data communication technologies, and in particular, to a verification apparatus, method, and computer readable storage medium for requesting legality.
- server group of the business system different servers provide different services for the operation of the business system, and the servers in the group provide services by opening some interfaces, and other servers can implement corresponding functions by calling these interfaces.
- an authentication server is generally set to control the permissions of each server, and the calls of the interfaces of the servers to other servers are pre-configured. Permission, and store permission data, each time the server receives an interface call request sent by another server, the server needs to send the request to the authentication server, and the authentication server verifies the permission of the request according to the stored permission data, and The verification result is returned to the server, and the server responds to the interface call request according to the verification result.
- the verification process in this manner is cumbersome, and each request sent by the server is verified at the third-party authentication server, which not only causes The authentication server needs to maintain a large amount of rights management data, and the response to the interface call request is slow and the processing efficiency is low due to the frequent call of the interface between the servers.
- the present application provides a verification apparatus, method and computer readable storage medium for requesting legality, the main purpose of which is to simplify the verification process of request validity and improve the response speed of the interface call.
- the present application provides a verification apparatus for requesting legality, the apparatus comprising a memory and a processor, wherein the memory stores a legality verification program executable on the processor, the legal
- the verification procedure is implemented by the processor to implement the following steps:
- the host information of the server is consistent with the registered host information and the requested interface information is consistent with the registration interface information, it is determined that the interface call request is legal.
- the present application further provides a verification method for request legality, and the method includes:
- the host information of the server is consistent with the registered host information and the requested interface information is consistent with the registration interface information, it is determined that the interface call request is legal.
- the present application further provides a computer readable storage medium having a legality verification program stored thereon, the legality verification program being configurable by one or more processors The steps of the verification method performed to implement the legality of the request as described above.
- the verification device, the method, and the computer-readable storage medium of the request for validity of the request when the server sends an interface call request to the server where the requested interface is located, the request carries the registration certificate sent by the server where the requested interface is located.
- Information when the server where the requested interface receives the interface call request sent by another server, obtains the host information of the server, the requested interface information, and the registration credential information from the interface call request, and decrypts the registration credential information to obtain the The registration host information and the registration interface information, if the host information and the interface information in the request are consistent with the registered host information and the registration interface information in the registration credential information, determine that the interface call request is legal, and the solution in the present application directly passes the interface.
- FIG. 1 is a schematic diagram of a preferred embodiment of a verification device for requesting legality
- FIG. 2 is a schematic diagram of a program module of a legality verification program in an embodiment of a verification device for requesting legality;
- FIG. 3 is a flow chart of a preferred embodiment of a verification method for requesting legality in the present application.
- the application provides a verification device for requesting legality.
- a schematic diagram of a preferred embodiment of a verification apparatus for requesting legality is provided.
- the verification device requesting the validity may be any one of the server groups.
- the verification device for the validity of the request includes at least a memory 11, a processor 12, a communication bus 13, and a network interface 14.
- the memory 11 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (for example, an SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like.
- the memory 11 may in some embodiments be an internal storage unit of a verification device requesting legitimacy, such as a hard disk of the verification device requesting legality.
- the memory 11 may also be an external storage device that requests a verification device for legality, such as a plug-in hard disk equipped with a verification device for requesting legality, a smart memory card (SMC), Secure Digital (SD) card, Flash Card, etc.
- SMC smart memory card
- SD Secure Digital
- the memory 11 may also include both an internal storage unit of the verification device requesting legality and an external storage device.
- the memory 11 can be used not only for storing application software installed in a verification device requesting legality and various types of data, such as codes of a legality verification program, but also for temporarily storing data that has been output or is to be output.
- the processor 12 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor or other data processing chip for running program code or processing stored in the memory 11. Data, such as performing a legality verification program.
- CPU Central Processing Unit
- controller microcontroller
- microprocessor or other data processing chip for running program code or processing stored in the memory 11.
- Data such as performing a legality verification program.
- Communication bus 13 is used to implement connection communication between these components.
- the network interface 14 can optionally include a standard wired interface, a wireless interface (such as a WI-FI interface), and is typically used to establish a communication connection between the device and other electronic devices.
- a standard wired interface such as a WI-FI interface
- Figure 1 shows only the verification device with the legality verification procedure and the request legitimacy of components 11-14, but it should be understood that not all of the illustrated components are required to be implemented, alternative implementations may be more or more Less components.
- the device may further include a user interface
- the user interface may include a display
- an input unit such as a keyboard
- the optional user interface may further include a standard wired interface and a wireless interface.
- the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch sensor, or the like.
- the display may also be suitably referred to as a display screen or display unit for displaying information processed in a verification device requesting legality and a user interface for displaying visualization.
- a memory check program is stored in the memory 11; when the processor 12 executes the legality check program stored in the memory 11, the following steps are implemented:
- a server configured with an interface for other server calls is called a verification device, and the verification device itself is a server in a server group, and may also be sent to other servers in the server group.
- the interface invokes the request, at which point the requested server acts as a check device.
- the verification device pre-distributes the registration credential information to other servers that have permission to invoke the interface provided by the server.
- the verification device has three interfaces API1, API2, and API3, and there are multiple servers in the server group, assuming a server group.
- the server A has the right to invoke the interface API1, and the registration of the right to invoke the interface API1 of the server A is completed in the verification device, and the corresponding registration voucher information is generated and sent to the server A.
- the registration credential information includes host information of the server A and interface information for identifying the interface API1.
- the host information of the server A and the interface information for identifying the interface API1 are encrypted according to an encryption algorithm to generate registration credential information.
- the registration credential information is generated in one-to-one correspondence and sent to each server for storage; or, in other embodiments, the server initiates a registration request to the verification device before the interface is first called, and the verification device responds to the registration request according to the registration request.
- the server's call permission is registered.
- the registration host information and the registration interface information are obtained from the registration request; and the registration host information and the registration interface information are encrypted according to a preset encryption algorithm to obtain a ciphertext registration certificate. And performing a displacement process on the characters in the ciphertext registration voucher according to the preset first displacement rule, using the result of the displacement process as the registration voucher information; and transmitting the registration voucher information to the server for the server.
- the registration credential information is added to the originating interface call request when the interface call request is initiated.
- the preset encryption algorithm can be implemented in various embodiments, such as AES (Advanced Encryption Standard) algorithm, BASE64 algorithm, and the like.
- the first displacement rule in this embodiment refers to changing the position of some characters in the encrypted character string to prevent other devices from cracking the encryption result and tampering with the registration voucher information.
- the first displacement rule can have various embodiments, for example, exchanging odd-numbered bits of a string with even-numbered bits that are one bit larger, or moving the position of a character at a specific position in the string, and the like. In other embodiments, it is also possible to encrypt using only the encryption algorithm, and the displacement processing is performed without using the displacement rule.
- a plurality of registration credential information may be stored in one server, and the registration credential information is respectively corresponding to each of the callable interfaces.
- the server needs to invoke an interface provided by another server to perform a corresponding operation, the server obtains registration credential information corresponding to the interface to be called and adds it to the interface call request.
- the verification device acquires the host information of the sender server, the requested interface information, and the registration credential information from the request.
- the host information includes information such as a host name and a user name.
- the interface provided by the server may be a restful interface based on a REST (Representational State Transfer) framework, and the REST is an HTTP-based (Hyper Text Transfer Protocol). Protocol)
- REST Real-Representational State Transfer
- HTTP-based Hyper Text Transfer Protocol
- Decrypting the registration credential information and acquiring registration host information and registration interface information included in the registration credential information.
- the host information of the server is consistent with the registered host information and the requested interface information is consistent with the registration interface information, it is determined that the interface call request is legal.
- the verification device decrypts the obtained registration voucher information, obtains the registration host information and the registration interface information included in the registration voucher information, and determines whether the interface information in the interface call request is consistent with the registration interface information, and whether the host information is related to the registration host. The information is consistent. If the information is consistent, the interface call request is considered to be legal. Otherwise, the interface call request is invalid, and the response information that the request is invalid is sent to the server.
- the verification device is required to perform decryption according to a decryption algorithm corresponding to the encryption algorithm used in registration, and the used key is stored in the verification device, and each verification device has The unique key, the requesting server can not decrypt the received registration voucher information, and can not tamper with the registration voucher information, thus ensuring the security of the information, thereby ensuring the accuracy of the legality verification method. .
- the step of decrypting the registration credential information, and acquiring the registration host information and the registration interface information included in the registration credential information includes: following a second displacement rule pair corresponding to the first displacement rule
- the character in the registration voucher information is subjected to a displacement process to obtain a ciphertext registration voucher; the ciphertext registration voucher is decrypted according to a preset decryption algorithm corresponding to the preset encryption algorithm, and the registration host information and registration are obtained. Interface information.
- the registration credential information is decrypted in accordance with the reverse process of the encryption operation to obtain the registered host information and the registration interface information.
- the legality verification program may be further executed by the processor to obtain registration host information and the registration request from the registration request when receiving the registration request sent by the server After the step of registering the interface information, the following steps are also implemented:
- the mapping relationship between the user information and the interface information is pre-configured in the verification device, and when the user information included in the registration request has an association relationship with the requested interface, The registration step will continue, otherwise the login failure message will be returned to the server, prompting the server that the registration request is invalid.
- the verification device rejects the server's call to the interface and sends a prompt message to the server that the call failed.
- the legality verification program may be further executed by the processor to implement the following steps after determining that the interface call request is legal:
- the interface call request sent by the server also carries a service operation that needs to be performed by the method provided by the interface. After determining that the interface call request is legal, the operation operation is performed by the operation method provided by the interface, and the operation result is obtained and sent to the server. .
- the server In the verification device for requesting the validity of the request, when the server sends an interface call request to the server where the requested interface is located, the server carries the registration credential information sent by the server where the requested interface is located, where the requested interface is located.
- the server ie, the verification device
- the host information of the server, the requested interface information, and the registration credential information are obtained from the interface call request, and the registration credential information is decrypted to obtain the included Registering the host information and registering the interface information. If the host information and the interface information in the request are consistent with the registered host information and the registration interface information in the registration credential information, it is determined that the interface call request is legal.
- the interface is directly invoked through the interface.
- the information contained in the request itself is verified, and the registration voucher information is sent by the server where the requested interface is encrypted, and is decrypted by the same server during verification, thereby ensuring that the registration voucher information is not Tampering, and does not need to pass the third
- the legality verification program may also be divided into one or more modules, and one or more modules are stored in the memory 11 and executed by one or more processors (this implementation)
- the processor 12 is executed to complete the application.
- the module referred to in the present application refers to a series of computer program instruction segments capable of performing a specific function, and is used to describe the legality verification program in the verification device for requesting legality. The implementation process.
- FIG. 2 it is a schematic diagram of a program module of a legality verification program in an embodiment of a verification device for requesting validity of the present application.
- the legality verification program may be divided into the acquisition module 10 Decryption module 20 and execution module 30, illustratively:
- the obtaining module 10 is configured to: when receiving an interface call request sent by a server in the server group, obtain host information, requested interface information, and registration credential information of the server from the interface call request, where the registration The voucher information is sent by the verification device;
- the decryption module 20 is configured to: perform decryption processing on the registration credential information, and obtain registration host information and registration interface information included in the registration credential information;
- the execution module 30 is configured to: if the host information of the server is consistent with the registered host information, and the requested interface information is consistent with the registration interface information, determine that the interface call request is legal.
- the present application also provides a verification method for requesting legality.
- FIG. 3 it is a flowchart of a preferred embodiment of the verification method for legality of the request of the present application.
- the method may be performed by a device, which may be implemented by software and/or hardware, and the method of the present embodiment will be described hereinafter with a request legality verification device as an execution body of the method.
- the verification method of the request validity includes:
- Step S10 when receiving an interface call request sent by a server in the server group, obtaining host information, requested interface information, and registration credential information of the server from the interface call request, where the registration credential information is The server where the requested interface is delivered is delivered.
- a server configured with an interface for other server calls is called a verification device
- the verification device itself is a server in a server group, and may also be sent to other servers in the server group.
- the interface invokes the request, at which point the requested server acts as a check device.
- the verification device pre-distributes the registration credential information to other servers that have permission to invoke the interface provided by the server.
- the verification device has three interfaces API1, API2, and API3, and there are multiple servers in the server group, assuming a server group.
- the server A has the right to invoke the interface API1, and the registration of the right to invoke the interface API1 of the server A is completed in the verification device, and the corresponding registration voucher information is generated and sent to the server A.
- the registration credential information includes host information of the server A and interface information for identifying the interface API1.
- the host information of the server A and the interface information for identifying the interface API1 are encrypted according to an encryption algorithm to generate registration credential information.
- the registration credential information is generated in one-to-one correspondence and sent to each server for storage; or, in other embodiments, the server initiates a registration request to the verification device before the interface is first called, and the verification device responds to the registration request according to the registration request. The server's call permission is registered.
- the registration host information and the registration interface information are obtained from the registration request; and the registration host information and the registration interface information are encrypted according to a preset encryption algorithm to obtain a ciphertext registration certificate. And performing a displacement process on the characters in the ciphertext registration voucher according to the preset first displacement rule, using the result of the displacement process as the registration voucher information; and transmitting the registration voucher information to the server for the server.
- the registration credential information is added to the originating interface call request when the interface call request is initiated.
- the preset encryption algorithm can have multiple implementations, AES (Advanced Encryption Standard) algorithm, BASE64 algorithm, and the like.
- the first displacement rule in this embodiment refers to changing the position of some characters in the encrypted character string to prevent other devices from cracking the encryption result and tampering with the registration voucher information.
- the first displacement rule can have various embodiments, for example, exchanging odd-numbered bits of a string with even-numbered bits that are one bit larger, or moving the position of a character at a specific position in the string, and the like. In other embodiments, it is also possible to encrypt using only the encryption algorithm, and the displacement processing is performed without using the displacement rule.
- a plurality of registration credential information may be stored in one server, and the registration credential information is respectively corresponding to each of the callable interfaces.
- the server needs to invoke an interface provided by another server to perform a corresponding operation, the server obtains registration credential information corresponding to the interface to be called and adds it to the interface call request.
- the verification device acquires the host information of the sender server, the requested interface information, and the registration credential information from the request.
- the host information includes information such as a host name and a user name.
- the interface provided by the server may be a restful interface based on a REST (Representational State Transfer) framework, and the REST is an HTTP-based (Hyper Text Transfer Protocol). Protocol)
- REST Real-Representational State Transfer
- HTTP-based Hyper Text Transfer Protocol
- Step S20 Perform decryption processing on the registration credential information, and obtain registration host information and registration interface information included in the registration credential information.
- Step S30 If the host information of the server is consistent with the registered host information and the requested interface information is consistent with the registration interface information, it is determined that the interface call request is legal.
- the verification device decrypts the obtained registration voucher information, obtains the registration host information and the registration interface information included in the registration voucher information, and determines whether the interface information in the interface call request is consistent with the registration interface information, and whether the host information is related to the registration host. The information is consistent. If the information is consistent, the interface call request is considered to be legal. Otherwise, the interface call request is invalid, and the response information that the request is invalid is sent to the server.
- the verification device is required to perform decryption according to a decryption algorithm corresponding to the encryption algorithm used in registration, and the used key is stored in the verification device, and each verification device has The unique key, the requesting server can not decrypt the received registration voucher information, and can not tamper with the registration voucher information, thus ensuring the security of the information, thereby ensuring the accuracy of the legality verification method. .
- the step of decrypting the registration credential information, and acquiring the registration host information and the registration interface information included in the registration credential information includes: following a second displacement rule pair corresponding to the first displacement rule
- the character in the registration voucher information is subjected to a displacement process to obtain a ciphertext registration voucher; the ciphertext registration voucher is decrypted according to a preset decryption algorithm corresponding to the preset encryption algorithm, and the registration host information and registration are obtained. Interface information.
- the registration credential information is decrypted in accordance with the reverse process of the encryption operation to obtain the registered host information and the registration interface information.
- the method further includes the following steps:
- the mapping relationship between the user information and the interface information is pre-configured in the verification device, and when the user information included in the registration request has an association relationship with the requested interface, The registration step will continue, otherwise the login failure message will be returned to the server, prompting the server that the registration request is invalid.
- the verification device rejects the server's call to the interface and sends a prompt message to the server that the call failed.
- the method further includes the following steps:
- the interface call request sent by the server also carries a service operation that needs to be performed by the method provided by the interface. After determining that the interface call request is legal, the operation operation is performed by the operation method provided by the interface, and the operation result is obtained and sent to the server. .
- the server when the server sends an interface call request to the server where the requested interface is located, the server carries the registration credential information sent by the server where the requested interface is located, where the requested interface is located.
- the server ie, the verification device
- the host information of the server, the requested interface information, and the registration credential information are obtained from the interface call request, and the registration credential information is decrypted to obtain the included Registering the host information and registering the interface information. If the host information and the interface information in the request are consistent with the registered host information and the registration interface information in the registration credential information, it is determined that the interface call request is legal.
- the interface is directly invoked through the interface.
- the information contained in the request itself is verified, and the registration voucher information is sent by the server where the requested interface is encrypted, and is decrypted by the same server during verification, thereby ensuring that the registration voucher information is not Tampering, and does not need to pass the third
- the embodiment of the present application further provides a computer readable storage medium, where the legality verification program is stored, and the legality verification program can be executed by one or more processors, Implement the following operations:
- the host information of the server is consistent with the registered host information and the requested interface information is consistent with the registration interface information, it is determined that the interface call request is legal.
- the technical solution of the present application which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM as described above). , a disk, an optical disk, including a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the methods described in the various embodiments of the present application.
- a terminal device which may be a mobile phone, a computer, a server, or a network device, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
- Computer And Data Communications (AREA)
Abstract
La présente invention concerne un dispositif de vérification de validité de demande, comprenant une mémoire et un processeur, la mémoire stockant un programme de vérification de validité exécutable sur le processeur et, lorsque le programme est exécuté par le processeur, les étapes suivantes sont mises en œuvre : lorsqu'une demande d'appel d'interface envoyée par un serveur dans un groupe de serveurs est reçue, l'obtention, dans la demande d'appel d'interface, des informations d'hôte du serveur, des informations d'interface demandées et des informations de justificatif d'enregistrement ; le déchiffrement des informations de justificatif d'enregistrement et l'obtention des informations d'hôte enregistrées et des informations d'interface enregistrées, comprises dans les informations de justificatif d'enregistrement ; si les informations d'hôte du serveur concordent avec les informations d'hôte enregistrées et que les informations d'interface demandées concordent avec les informations d'interface enregistrées, la détermination que la demande d'appel d'interface est valide. La présente invention concerne également un procédé de vérification de validité de demande et un support de mémoire lisible par ordinateur. La présente invention simplifie le processus de vérification de validité de demande, améliorant la réponse à l'appel d'interface.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810109486.0 | 2018-02-05 | ||
| CN201810109486.0A CN108449315B (zh) | 2018-02-05 | 2018-02-05 | 请求合法性的校验装置、方法及计算机可读存储介质 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019148717A1 true WO2019148717A1 (fr) | 2019-08-08 |
Family
ID=63191475
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2018/089183 Ceased WO2019148717A1 (fr) | 2018-02-05 | 2018-05-31 | Dispositif et procédé de vérification de validité de demande et support de mémoire lisible par ordinateur |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN108449315B (fr) |
| WO (1) | WO2019148717A1 (fr) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112596823A (zh) * | 2020-12-23 | 2021-04-02 | 支付宝(杭州)信息技术有限公司 | 安全管控方法、装置及电子设备 |
| CN112612630A (zh) * | 2020-12-29 | 2021-04-06 | 太平金融科技服务(上海)有限公司 | 系统调用处理方法、装置、计算机设备和存储介质 |
| CN113850987A (zh) * | 2020-12-11 | 2021-12-28 | 广东朝歌智慧互联科技有限公司 | 用于检测产品质量的系统 |
| CN117708864A (zh) * | 2024-02-06 | 2024-03-15 | 深圳和润达科技有限公司 | 应用于电芯化成分容设备的中位机智能管理方法及装置 |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109857488B (zh) * | 2019-02-14 | 2022-05-27 | 百度在线网络技术(北京)有限公司 | 应用程序的调用控制方法、装置、终端及可读存储介质 |
| CN110222531B (zh) * | 2019-05-31 | 2023-07-07 | 创新先进技术有限公司 | 一种访问数据库的方法、系统及设备 |
| CN110995756B (zh) * | 2019-12-20 | 2022-07-05 | 广州酷狗计算机科技有限公司 | 调用服务的方法和装置 |
| CN111083541B (zh) * | 2019-12-30 | 2022-10-04 | 深圳Tcl数字技术有限公司 | 接口调用方法、装置、智能电视及可读存储介质 |
| CN114708022A (zh) * | 2022-04-02 | 2022-07-05 | 中国民航信息网络股份有限公司 | 面向通用前端的会员积分管理方法及相关装置 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103490892A (zh) * | 2013-08-28 | 2014-01-01 | 广东数字证书认证中心有限公司 | 数字签名方法和系统、应用服务器和云密码服务器 |
| CN104579657A (zh) * | 2013-10-11 | 2015-04-29 | 北大方正集团有限公司 | 身份认证方法及装置 |
| CN105187449A (zh) * | 2015-09-30 | 2015-12-23 | 北京恒华伟业科技股份有限公司 | 一种接口调用方法及装置 |
Family Cites Families (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7711950B2 (en) * | 2000-03-17 | 2010-05-04 | United States Postal Services | Methods and systems for establishing an electronic account for a customer |
| CN101339595B (zh) * | 2008-05-20 | 2011-08-10 | 北京深思洛克软件技术股份有限公司 | 一种通过使用许可控制软件使用的装置 |
| CN101729514B (zh) * | 2008-10-23 | 2012-11-21 | 华为技术有限公司 | 一种业务调用的实现方法及装置和系统 |
| CN103179089A (zh) * | 2011-12-21 | 2013-06-26 | 富泰华工业(深圳)有限公司 | 在不同软件开发平台之间访问验证身份的系统及方法 |
| CN106529979A (zh) * | 2016-12-05 | 2017-03-22 | 深圳微众税银信息服务有限公司 | 一种企业身份认证方法及系统 |
-
2018
- 2018-02-05 CN CN201810109486.0A patent/CN108449315B/zh active Active
- 2018-05-31 WO PCT/CN2018/089183 patent/WO2019148717A1/fr not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103490892A (zh) * | 2013-08-28 | 2014-01-01 | 广东数字证书认证中心有限公司 | 数字签名方法和系统、应用服务器和云密码服务器 |
| CN104579657A (zh) * | 2013-10-11 | 2015-04-29 | 北大方正集团有限公司 | 身份认证方法及装置 |
| CN105187449A (zh) * | 2015-09-30 | 2015-12-23 | 北京恒华伟业科技股份有限公司 | 一种接口调用方法及装置 |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113850987A (zh) * | 2020-12-11 | 2021-12-28 | 广东朝歌智慧互联科技有限公司 | 用于检测产品质量的系统 |
| CN113850987B (zh) * | 2020-12-11 | 2023-04-28 | 广东朝歌智慧互联科技有限公司 | 用于检测产品质量的系统 |
| CN112596823A (zh) * | 2020-12-23 | 2021-04-02 | 支付宝(杭州)信息技术有限公司 | 安全管控方法、装置及电子设备 |
| CN112596823B (zh) * | 2020-12-23 | 2023-03-21 | 支付宝(杭州)信息技术有限公司 | 安全管控方法、装置及电子设备 |
| CN112612630A (zh) * | 2020-12-29 | 2021-04-06 | 太平金融科技服务(上海)有限公司 | 系统调用处理方法、装置、计算机设备和存储介质 |
| CN117708864A (zh) * | 2024-02-06 | 2024-03-15 | 深圳和润达科技有限公司 | 应用于电芯化成分容设备的中位机智能管理方法及装置 |
| CN117708864B (zh) * | 2024-02-06 | 2024-05-28 | 深圳和润达科技有限公司 | 应用于电芯化成分容设备的中位机智能管理方法及装置 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN108449315B (zh) | 2021-02-19 |
| CN108449315A (zh) | 2018-08-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2019148717A1 (fr) | Dispositif et procédé de vérification de validité de demande et support de mémoire lisible par ordinateur | |
| CN112671720B (zh) | 一种云平台资源访问控制的令牌构造方法、装置及设备 | |
| US9742570B2 (en) | Securing multimedia content via certificate-issuing cloud service | |
| US20210367795A1 (en) | Identity-Linked Authentication Through A User Certificate System | |
| US9906369B2 (en) | System and method of cryptographically signing web applications | |
| US9917829B1 (en) | Method and apparatus for providing a conditional single sign on | |
| TWI475860B (zh) | 可攜式裝置關聯性 | |
| US10462135B2 (en) | Systems and methods for providing confidentiality and privacy of user data for web browsers | |
| US9838205B2 (en) | Network authentication method for secure electronic transactions | |
| US9621524B2 (en) | Cloud-based key management | |
| JP6138791B2 (ja) | ステートレスアプリケーション通知 | |
| US10356079B2 (en) | System and method for a single sign on connection in a zero-knowledge vault architecture | |
| US8745394B1 (en) | Methods and systems for secure electronic communication | |
| US20140096213A1 (en) | Method and system for distributed credential usage for android based and other restricted environment devices | |
| US20160050193A1 (en) | System and methods for secure communication in mobile devices | |
| WO2019095567A1 (fr) | Dispositif, procédé et support de stockage lisible par ordinateur pour vérification de signature unique | |
| JP2004048679A (ja) | セッションキー・セキュリティプロトコル | |
| CN104160652A (zh) | 用于使用一次性密码的分布式离线登录的方法和系统 | |
| US10257171B2 (en) | Server public key pinning by URL | |
| KR102137122B1 (ko) | 보안 체크 방법, 장치, 단말기 및 서버 | |
| JP2023532976A (ja) | ユーザの身元の検証のための方法およびシステム | |
| CN105933315A (zh) | 一种网络服务安全通信方法、装置和系统 | |
| CN114584299A (zh) | 数据处理方法、装置、电子设备和存储介质 | |
| KR102171377B1 (ko) | 로그인 제어 방법 | |
| CN104463584A (zh) | 实现移动端App安全支付的方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18903298 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 03/11/2020) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 18903298 Country of ref document: EP Kind code of ref document: A1 |