CN109040070A - Document sending method, equipment and computer readable storage medium - Google Patents
Document sending method, equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN109040070A CN109040070A CN201810883806.8A CN201810883806A CN109040070A CN 109040070 A CN109040070 A CN 109040070A CN 201810883806 A CN201810883806 A CN 201810883806A CN 109040070 A CN109040070 A CN 109040070A
- Authority
- CN
- China
- Prior art keywords
- file
- receiving end
- sent
- extraction code
- account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/108—Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a kind of document sending method, equipment and computer readable storage mediums, the method comprising the steps of: after exchange files platform, which detects transmitting terminal, uploads file upload request to be sent, the transmission information of file to be sent and file to be sent that transmitting terminal uploads is obtained according to file upload request, and audits transmission information;If sending information by audit, the file extraction code and log-on message of generation are sent to receiving end, after the log file switching plane of receiving end, logging request is initiated according to log-on message, and send file extraction code after logining successfully;After receiving end logins successfully, code check receiving end is extracted with the presence or absence of the download permission for downloading file to be sent according to the file that receiving end is sent;If there are download permissions for receiving end, file to be sent is sent to by receiving end according to downloading request, so that file to be sent is downloaded in receiving end.The present invention improves the safety of the file transmitted between transmitting terminal and receiving end.
Description
Technical field
The present invention relates to technical field of data transmission more particularly to a kind of document sending methods, equipment and computer-readable
Storage medium.
Background technique
The file transmission of existing terminal room is come by FTP (File Transfer Protocol, File Transfer Protocol)
It realizes.If the file of required transmission can be transmitted directly to receiving end by FTP by transmitting terminal, but file is being sent to reception
It does not need to be audited before end, receiving end can also directly receive the file of transmitting terminal transmission, not need to receive power accordingly
It limits to receive the file of transmitting terminal transmission, it is low so as to cause the file security transmitted between transmitting terminal and receiving end.
Summary of the invention
The main purpose of the present invention is to provide a kind of document sending method, equipment and computer readable storage medium, purports
Solving the low technical problem of existing file transmission security between transmitting terminal and receiving end.
To achieve the above object, the present invention provides a kind of document sending method, the document sending method comprising steps of
After exchange files platform, which detects transmitting terminal, uploads file upload request to be sent, asked according to file upload
The transmission information for obtaining file to be sent and the file to be sent that the transmitting terminal uploads is sought, and audits the transmission letter
Breath;
If the transmission information generates file extraction code and log-on message by audit;
The file extraction code and the log-on message are sent to receiving end, for receiving end log file exchange
After platform, logging request is initiated according to the log-on message, and the file extraction code is sent after logining successfully;
After determining that the receiving end logins successfully, the file sent according to the receiving end is extracted and is received described in code check
End is with the presence or absence of the download permission for downloading the file to be sent;
If there are the download permissions for the receiving end, request for the file to be sent to be sent to according to downloading described
Receiving end, so that the file to be sent is downloaded in the receiving end.
Preferably, if the step of transmission information is by auditing, generating file extraction code and log-on message packet
It includes:
If the transmission information encrypts the file to be sent, obtains the encrypted text to be sent by audit
Part, and generate file extraction code and log-on message.
Preferably, the file extraction code that is described after determining that the receiving end logins successfully, being sent according to the receiving end
The receiving end, which is verified, with the presence or absence of the step of download permission for downloading the file to be sent includes:
After determining that the receiving end logins successfully, the file extraction code that the receiving end is sent is denoted as Objective extraction
Code;
Detect whether the Objective extraction code is in validity period;
If the Objective extraction code was in validity period, whether deposited according to receiving end described in the Objective extraction code check
In the download permission for downloading the file to be sent.
Preferably, if the Objective extraction code was in validity period, according to the Objective extraction code check
Receiving end includes: with the presence or absence of the step of download permission for downloading the file to be sent
If the Objective extraction code was in validity period, by the Objective extraction code and file extraction code generated into
Row comparison;
If the Objective extraction code is consistent with file extraction code generated, it is determined that the receiving end exists described in downloading
The download permission of file to be sent;
If the Objective extraction code and file extraction code generated are inconsistent, it is determined that there is no downloadings for the receiving end
The download permission of the file to be sent.
Preferably, the file extraction code that is described after determining that the receiving end logins successfully, being sent according to the receiving end
The receiving end, which is verified, with the presence or absence of the step of download permission for downloading the file to be sent includes:
After receiving the logging request that the receiving end is sent, whether just login password in the logging request is detected
Really;
If the login password mistake in the logging request, continues to logging request;
Until the login password in received logging request is correct, and the continuous errors number of login password be less than it is described pre-
If number, it is determined that the receiving end logins successfully, and the file sent according to the receiving end extracts receiving end described in code check
With the presence or absence of the download permission for downloading the file to be sent.
Preferably, if the login password mistake, after the step of continuing to logging request, further includes:
If the continuous errors number of login password reaches the preset times in logging request, it is determined that the receiving end is stepped on
Record failure locks the receiving end for logging in the logon account of the exchange files platform.
Preferably, if the step of transmission information is by auditing, generating file extraction code and log-on message packet
It includes:
If the transmission information obtains current time, device identification, file serial number and the transmission information by audit
In receiving end account;
The current time, the device identification and the file serial number are encrypted, the file extraction code is obtained;
According to the logon account of receiving end account creation receiving end, and generate at random corresponding with the logon account
Login password, to obtain the log-on message.
Preferably, the step of audit transmission information includes:
The examination & approval odd numbers and receiving end account in the transmission information are obtained, examination and approval document is obtained according to the examination & approval odd numbers,
Extract the approval information in the examination and approval document;
The file information of the approval information and the file to be sent is compared, by the receiving end account and hair
The reception account of sending end user input matches;
If the approval information is consistent with the file information, and the receiving end account is matched into the reception account
Function, it is determined that the transmission information passes through examination & approval;
If the approval information and the file information be inconsistent and/or the receiving end account and the reception account
It fails to match, it is determined that the transmission information does not pass through examination & approval.
In addition, to achieve the above object, the present invention also provides a kind of file sending device, the file sending device includes
The file that memory, processor and being stored in can be run on the memory and on the processor sends program, the text
Part sends the step of realizing document sending method as described above when program is executed by the processor.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium
It is stored with file on storage medium and sends program, the file sends when program is executed by processor and realizes file as described above
The step of sending method.
The present invention is by the way that during file to be sent is sent to receiving end by transmitting terminal, transmitting terminal is first by file to be sent
It is uploaded to exchange files platform, exchange files platform transmission information corresponding to file to be sent is audited later, works as transmission
After information is by audit, generates file extraction code and log-on message is sent to receiving end, so that receiving end is according to file extraction code
File to be sent is downloaded in exchange files platform with log-on message, is avoided transmitting terminal for malicious file and is sent to receiving end,
It also avoids receiving end malice and obtains the file for not being destined to it, and avoid file transmitted by transmitting terminal by illegal person
Interception uses, and improves the safety of the file transmitted between transmitting terminal and receiving end.
Detailed description of the invention
Fig. 1 is the structural schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of document sending method preferred embodiment of the present invention;
Fig. 3 is a kind of flow diagram of step S40 in the embodiment of the present invention;
Fig. 4 is another flow diagram of step S40 in the embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
As shown in Figure 1, Fig. 1 is the structural schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
It should be noted that Fig. 1 can be the structural schematic diagram of the hardware running environment of file sending device.The present invention is real
Applying example text part sending device can be PC, the terminal devices such as portable computer.
As shown in Figure 1, this document sending device may include: processor 1001, such as CPU, network interface 1004, user
Interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is for realizing the connection between these components
Communication.User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user
Interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 optionally may include having for standard
Line interface, wireless interface (such as WI-FI interface).Memory 1005 can be high speed RAM memory, be also possible to stable storage
Device (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processing
The storage device of device 1001.
File is sent it will be understood by those skilled in the art that file sending device structure shown in Fig. 1 is not constituted
The restriction of equipment may include perhaps combining certain components or different component cloth than illustrating more or fewer components
It sets.
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage medium
Believe that module, Subscriber Interface Module SIM and file send program.Wherein, operating system is to manage and control file sending device hardware
With the program of software resource, file is supported to send the operation of program and other softwares or program.
In file sending device shown in Fig. 1, user interface 1003 is mainly used for connecting transmitting terminal and receiving end, with hair
Sending end and receiving end carry out data communication;Network interface 1004 is mainly used for connecting background server, carries out with background server
Data communication;And processor 1001 can be used for that the file stored in memory 1005 is called to send program, and execute following behaviour
Make:
After exchange files platform, which detects transmitting terminal, uploads file upload request to be sent, asked according to file upload
The transmission information for obtaining file to be sent and the file to be sent that the transmitting terminal uploads is sought, and audits the transmission letter
Breath;
If the transmission information generates file extraction code and log-on message by audit;
The file extraction code and the log-on message are sent to receiving end, for receiving end log file exchange
After platform, logging request is initiated according to the log-on message, and the file extraction code is sent after logining successfully;
After determining that the receiving end logins successfully, the file sent according to the receiving end is extracted and is received described in code check
End is with the presence or absence of the download permission for downloading the file to be sent;
If there are the download permissions for the receiving end, request for the file to be sent to be sent to according to downloading described
Receiving end, so that the file to be sent is downloaded in the receiving end.
Further, if the step of transmission information is by auditing, generating file extraction code and log-on message
Include:
If the transmission information encrypts the file to be sent, obtains the encrypted text to be sent by audit
Part, and generate file extraction code and log-on message.
Further, described after determining that the receiving end logins successfully, it is extracted according to the file that the receiving end is sent
Receiving end described in code check includes: with the presence or absence of the step of download permission for downloading the file to be sent
After determining that the receiving end logins successfully, the file extraction code that the receiving end is sent is denoted as Objective extraction
Code;
Detect whether the Objective extraction code is in validity period;
If the Objective extraction code was in validity period, whether deposited according to receiving end described in the Objective extraction code check
In the download permission for downloading the file to be sent.
Further, if the Objective extraction code was in validity period, according to the Objective extraction code check institute
Receiving end, which is stated, with the presence or absence of the step of download permission for downloading the file to be sent includes:
If the Objective extraction code was in validity period, by the Objective extraction code and file extraction code generated into
Row comparison;
If the Objective extraction code is consistent with file extraction code generated, it is determined that the receiving end exists described in downloading
The download permission of file to be sent;
If the Objective extraction code and file extraction code generated are inconsistent, it is determined that the receiving end does not have downloading
The download permission of the file to be sent.
Further, described after determining that the receiving end logins successfully, it is extracted according to the file that the receiving end is sent
Receiving end described in code check includes: with the presence or absence of the step of download permission for downloading the file to be sent
After receiving the logging request that the receiving end is sent, whether just login password in the logging request is detected
Really;
If the login password mistake in the logging request, continues to logging request;
Until the login password in received logging request is correct, and the continuous errors number of login password be less than it is described pre-
If number, it is determined that the receiving end logins successfully, and the file sent according to the receiving end extracts receiving end described in code check
With the presence or absence of the download permission for downloading the file to be sent.
Further, if the login password mistake, after the step of continuing to logging request, processor
1001 can be also used for that the file stored in memory 1005 is called to send program, and execute following steps:
If the continuous errors number of login password reaches the preset times in logging request, it is determined that the receiving end is stepped on
Record failure locks the receiving end for logging in the logon account of the exchange files platform.
Further, if the step of transmission information is by auditing, generating file extraction code and log-on message
Include:
If the transmission information obtains current time, device identification, file serial number and the transmission information by audit
In receiving end account;
The current time, the device identification and the file serial number are encrypted, the file extraction code is obtained;
According to the logon account of receiving end account creation receiving end, and generate at random corresponding with the logon account
Login password, to obtain the log-on message.
Further, the step of audit transmission information includes:
The examination & approval odd numbers and receiving end account in the transmission information are obtained, examination and approval document is obtained according to the examination & approval odd numbers,
Extract the approval information in the examination and approval document;
The file information of the approval information and the file to be sent is compared, by the receiving end account and hair
The reception account of sending end user input matches;
If the approval information is consistent with the file information, and the receiving end account is matched into the reception account
Function, it is determined that the transmission information passes through examination & approval;
If the approval information and the file information be inconsistent and/or the receiving end account and the reception account
It fails to match, it is determined that the transmission information does not pass through examination & approval.
Based on above-mentioned structure, each embodiment of document sending method is proposed.
It is the flow diagram of document sending method preferred embodiment of the present invention referring to Fig. 2, Fig. 2.
The embodiment of the invention provides the embodiments of document sending method, it should be noted that although showing in flow charts
Go out logical order, but in some cases, it can be with the steps shown or described are performed in an order that is different from the one herein.
Document sending method is applied to exchange files platform, and the exchange files Platform deployment is set in above-mentioned file transmission
In standby, document sending method includes:
Step S10, after exchange files platform, which detects transmitting terminal, uploads file upload request to be sent, according to the text
Part upload request obtains the transmission information of the file to be sent that the transmitting terminal uploads and the file to be sent, and described in audit
Send information.
In the present embodiment, file is first uploaded to exchange files platform by transmitting terminal, to be carried out by exchange files platform
The audit of file, and it is being sent to receiving end after the approval, to realize the transmission of file.Specifically: when exchange files are flat
After platform detects the upload request that transmitting terminal uploads file to be sent, exchange files platform is obtained according to the upload request detected
The transmission information of file to be sent and file to be sent that transmitting terminal uploads, and audit acquired transmission information.Wherein, on this
Request is passed by corresponding transmission end subscriber corresponding uploading system of log file switching plane in transmitting terminal, and in the upload system
The transmission information that file to be sent and file to be sent are uploaded in the desktop of system is triggered.Sending information includes but is not limited to examine
Odd numbers, receiving end account, notice side's account and receiving end IP (Internet Protocol, the agreement interconnected between network)
Location.Receiving end account can be mailbox, the cell-phone number etc. of reception end subscriber, and notice side's account can be the mailbox etc. of notice side user.
It should be noted that transmitting terminal is in uploading file processes to be sent, it can be according to the selection instruction for sending end subscriber
The file to be sent uploaded needed for selection is uploaded to exchange files platform, so that exchange files platform gets file to be sent.
Each file to be sent corresponds to only one examination & approval odd numbers, and an examination & approval odd numbers corresponds to an examination and approval document.Therefore, lead to
The available corresponding examination and approval document of examination & approval odd numbers is crossed, in examination and approval document, there are approval informations and receiving end account.It needs to illustrate
It is to send information to send end subscriber when uploading file to be sent to exchange files platform and corresponding to institute in desktop in uploading system
Input.
Further, the step of audit transmission information includes:
Step a obtains the examination & approval odd numbers and receiving end account sent in information, is obtained and examined according to the examination & approval odd numbers
List is criticized, the approval information in the examination and approval document is extracted;
Step b compares the file information of the approval information and the file to be sent, by the receiving end account
Family and the reception account for sending end subscriber input are matched.
After exchange files platform, which is got, sends information, the examination & approval odd numbers and receiving end account sent in information is obtained,
Corresponding examination and approval document is obtained according to examination & approval odd numbers.After getting examination and approval document, exchange files platform extracts the examination & approval in examination and approval document
Information, and obtain the file information of file to be sent.Wherein, the text that the file to be sent of part is further comprised in information is sent
Part information.There are the comparative run for pre-setting and needing to compare, such as name, contact method and ID card No. letter in approval information
Breath, the file information be needed in file to be sent with the information that is compared in approval information, as in file to be sent name,
Contact method and ID card No. etc..After exchange files platform gets approval information and the file information, by approval information with
The file information compares, and receiving end account is matched with transmission end subscriber in the reception account that uploading system inputs.
It further, can also be by the real ip address of receiving end IP address and current receiving end in order to improve the safety that file is sent
It is matched.It should be noted that being that will examine during exchange files platform compares approval information and the file information
The comparative run comparative run corresponding with the file information criticized in information compares, such as by the name and the file information in approval information
In name compare, the contact method in the contact method and the file information in approval information is compared.It is examining
During wholesale breath of delivering letters, exchange files platform can export prompt information, send user with prompt and input reception in uploading system
Account.It is understood that mailbox class should also be inputted in uploading system by sending end subscriber when receiving end account is mailbox
Receive account.
Step c, if the approval information is consistent with the file information, and the receiving end account and the reception account
Successful match, it is determined that the transmission information passes through examination & approval.
Step d, if the approval information and the file information are inconsistent and/or the receiving end account connects with described
It fails to match at receipt on account family, it is determined that the transmission information does not pass through examination & approval.
If exchange files detection of platform is consistent with the file information to approval information, and receiving end account is matched with account is received
Success, exchange files platform then determine that sending information passes through examination & approval;If exchange files detection of platform is believed to approval information and file
Ceasing inconsistent and/or receiving end account, it fails to match with account is received, and it is careful that exchange files platform then determines that transmission information does not pass through
Batch.It is understood that exchange files platform is then when consistent in comparative run information and the file information all in approval information
Determine that approval information is consistent with the file information, otherwise, it is determined that approval information is inconsistent with the file information.When receiving end account with
When reception account is identical, exchange files platform determines receiving end account and receives account successful match;When receiving end account with connect
When the difference of receipt on account family, exchange files platform determines receiving end account and reception account, and it fails to match.
Further, if in advance matching the real ip address of receiving end IP address and current receiving end, then,
When receiving end IP address is consistent with the real ip address of current receiving end, receiving end IP address successful match is determined, otherwise, matching
Failure.In this case, only when approval information is consistent with the file information, receiving end account is matched into the reception account
Function and receiving end IP address successful match just can determine that the transmission information by examination & approval, if there is any one unsuccessful, is all recognized
Do not pass through to send signal auditing.
Step S20, if the transmission information generates file extraction code and log-on message by audit.
Information is sent by examination & approval when exchange files platform determines, exchange files platform then generates file extraction code and login
Information.
Further, step S20 includes:
Step e, if the transmission information obtains current time, device identification, file serial number and the hair by audit
The receiving end account delivered letters in breath.
If it is determined that sending information by audit, exchange files platform obtains current time, device identification, file serial number and hair
The receiving end account delivered letters in breath.Wherein, device identification is the mark for the audit equipment that audit sends information, and file serial number waits for
Send serial number of the file in audit equipment.When exchange files platform audits the transmission information, device identification is exchange files
The mark of platform;Exchange files platform can be connected to one or more audit equipment.
The current time, the device identification and the file serial number are encrypted, obtain the file by step f
Extraction code.
When getting current time, device identification and file serial number, exchange files platform will using predetermined encryption algorithm
Current time, device identification and file serial number are encrypted, and file extraction code is obtained.Wherein, predetermined encryption algorithm includes but not
It is limited to RSA, DES (Data Encryption Standard, data encryption standards), 3DES (Triple DES) and IDEA
Any of (International Data Encryption Algorithm, international data encryption algorithm) or combination.
Step g is generated and the logon account according to the logon account of receiving end account creation receiving end, and at random
Corresponding login password, to obtain the log-on message.
After exchange files platform gets receiving end account, according to the logon account of receiving end account creation receiving end,
I.e. using receiving end account as the logon account of log file switching plane, and it is close to generate login corresponding with logon account at random
Code, to obtain log-on message according to logon account and login password.During generating login password at random, exchange files platform
System can be randomly provided 6 the perhaps password of 8 bit digitals or the passwords etc. that generation data are combined with letter immediately.
In the present embodiment, after optional file switching plane generates file extraction code and log-on message, by file extraction code
It is sent to receiving end with log-on message, so that the network address of simultaneously input file switching plane is voluntarily searched at receipt of subsequent end, to enter
It is logged in into exchange files platform, and according to file extraction code and log-on message to complete subsequent file download.
Further, in order to improve file transmission efficiency and convenience, the step S20 further include:
If the transmission information generates link, file extraction code and log-on message, wherein this is linked as by audit
URL (Uniform Resource Locator, uniform resource locator).
It should be appreciated that three kinds of information are sent out after exchange files platform generates link, file extraction code and log-on message
It send to receiving end, then receiving end can be directly linked to exchange files platform according to by URL, no longer needs to voluntarily input file friendship
The network address for changing platform can be logged in after entering exchange files platform according to file extraction code and log-on message with after the completion
Continuous file download improves the efficiency and convenience of file download.
The file extraction code and the log-on message are sent to receiving end by step S30, for the receiving end according to
After the link log file switching plane, logging request is initiated according to the log-on message, and institute is sent after logining successfully
State file extraction code.
After exchange files platform obtains file extraction code and log-on message, exchange files platform is by file extraction code and steps on
Record information is sent to receiving end.After receiving end receives the file extraction code and log-on message of exchange files platform transmission, connect
Receiving end, which detects whether to detect, receives the logging request that end subscriber triggers log file switching plane according to log-on message.Work as reception
After end detects logging request, prompt information is exported according to logging request log file switching plane, and in its display interface,
To prompt user-in file extraction code according to the prompt information, file extraction code is sent to exchange files platform.
Such as after file extraction code and log-on message are sent to the mailbox for receiving end subscriber by exchange files platform, receiving end
User can log in its mailbox and obtain file extraction code and log-on message, voluntarily input network address and log on exchange files platform or logical
After crossing URL link to exchange files platform, then pass through the logon account and login password log file switching plane of log-on message,
Trigger logging request.It should be noted that carrying logon account and login password in logging request.
Step S40 extracts code check according to the file that the receiving end is sent after determining that the receiving end logins successfully
The receiving end is with the presence or absence of the download permission for downloading the file to be sent.
After exchange files platform receives the file extraction code and logging request of receiving end transmission, exchange files platform root
Whether successfully logged according to logging request verification receiving end.If the logon account and login password in logging request are all correct, file
Switching plane then determines that receiving end logins successfully.It is understood that when the logon account in logging request is put down with exchange files
The logon account that platform is created is consistent, and the login password that the login password in logging request and exchange files platform generate at random
When consistent, exchange files platform determines that logon account in logging request and login password are correct, determines that receiving end logins successfully,
No person, it is determined that receiving end login failure.After exchange files platform determines that receiving end logins successfully, exchange files platform according to
The file that receiving end is sent extracts code check receiving end with the presence or absence of the download permission for downloading file to be sent.
Further, if exchange files platform determines receiving end login failure, it is determined that receiving end is pending there is no downloading
The download permission of file is sent, rejection end obtains file to be sent, i.e., do not allow receiving end to download in exchange files platform
File to be sent.
Step S50 sends out the file to be sent according to downloading request if there are the download permissions for the receiving end
The receiving end is given, so that the file to be sent is downloaded in the receiving end.
If exchange files platform determines receiving end there are download permission, exchange files platform can be sent out receiving receiving end
File to be sent is sent to receiving end when the file download request sent, so that receiving end gets file to be sent, i.e., so that
Successfully download file to be sent in receiving end.After file to be sent is successfully downloaded in receiving end, receiving end can be used this to be sent
File.
Further, exchange files platform is after the file to be sent for receiving transmitting terminal upload, by file pair to be sent
The status information answered is sent to notice side's account, with the state for notifying corresponding notice side file to be sent current, the side of notice
Formula includes mail or cell-phone number, to reduce cost, it is preferred to use lettergram mode is sent.Wherein, status information includes text to be sent
Part upload successfully, send information by examination & approval, send information and do not pass through examination & approval, file download to be sent successfully etc..
The present embodiment is by the way that during file to be sent is sent to receiving end by transmitting terminal, transmitting terminal is first by text to be sent
Part is uploaded to exchange files platform, and transmission information corresponding to file to be sent is audited later, when transmission information is by examining
After core, generates file extraction code and log-on message is sent to receiving end, so that receiving end is according to file extraction code and log-on message
File to be sent is downloaded in exchange files platform, transmitting terminal is avoided by malicious file and is sent to receiving end, also avoids connecing
Receiving end malice obtains the file for not being destined to it, and avoids file transmitted by transmitting terminal and intercept use by illegal person,
Improve the safety of the file transmitted between transmitting terminal and receiving end.
Further, document sending method second embodiment of the present invention is proposed.
The difference of the document sending method second embodiment and the document sending method first embodiment is, step
S20 includes:
Step h, if the transmission information encrypts the file to be sent by audit, obtain it is encrypted it is described to
File is sent, and generates file extraction code and log-on message.
After exchange files platform determines the transmission information of file to be sent by audit, the encryption of exchange files platform is pending
File is sent, obtains encrypted file to be sent, and generate file extraction code and log-on message.In the present embodiment, and it is unlimited
System encrypts the Encryption Algorithm of file to be sent.The Encryption Algorithm that RSA and 3DES mixing such as can be used encrypts file to be sent, or
File to be sent etc. is individually encrypted using RSA Algorithm.It is encrypted in file processes to be sent using RSA Algorithm, receiving end will connect
The RSA public key of receiving end is sent to exchange files platform, by exchange files platform according to the RSA public key encryption file to be sent.It connects
Receiving end stores corresponding with RSA public key RSA private key, in order to after receiving the file to be sent for using RSA public key encryption,
Encrypted file to be sent is decrypted using corresponding RSA private key.
It is understood that being got encrypted to be sent when encrypted file to be sent is successfully downloaded in receiving end
After file, encrypted file to be sent is decrypted using decipherment algorithm corresponding with exchange files platform in receiving end, needed for obtaining
File to be sent.Wherein, receiving end and exchange files platform can consult corresponding Encryption Algorithm and decipherment algorithm in advance, or
Person informs Encryption Algorithm used by receiving end after exchange files platform encrypts file to be sent.
The present embodiment is encrypted by the file transmitted to transmitting terminal and receiving end, is prevented in document transmission process,
It is intercepted by malicious peer, file to be sent is encrypted by receiving end public key, even if in addition to the terminal after receiving end obtains
The file to be sent is got, can not be also decrypted, the safety of the transmitted file of transmitting terminal and receiving end is further improved.
Further, document sending method 3rd embodiment of the present invention is proposed.
The difference of the document sending method 3rd embodiment and the document sending method first or second embodiments exists
In reference Fig. 3, step S40 include:
The file extraction code that the receiving end is sent is denoted as mesh after determining that the receiving end logins successfully by step S41
Mark extraction code.
Step S42, detects whether the Objective extraction code is in validity period.
It is and true according to logging request when exchange files platform receives the file extraction code and logging request of receiving end transmission
Determine after receiving end logins successfully, the file extraction code that receiving end is sent is denoted as Objective extraction code by exchange files platform, and is detected
Whether Objective extraction code is in validity period.It should be noted that exchange files platform is during generating file extraction code
File extraction code is provided with a validity period, which carried in file extraction code.The validity period can be according to specific need
It wants and is arranged, such as can will be set as validity period 10 days, 15 days or 30 days.When exchange files platform gets Objective extraction code
Afterwards, validity period can be extracted from Objective extraction code.
Whether exchange files detection of platform Objective extraction code is in the detailed process in validity period are as follows: in Objective extraction code
The generation time of Objective extraction code is obtained, and obtains current time, calculates the time difference for generating time and current time, judgement
Whether the time difference is less than or equal to validity period corresponding duration.If calculating the resulting time difference less than or equal to validity period pair
The duration answered, it is determined that Objective extraction code was in validity period;If calculating the resulting time difference is greater than validity period corresponding duration,
Then determine that Objective extraction code was not in validity period.Wherein, since Objective extraction code is by current time, device identification and file
Serial number composition, therefore, exchange files platform can be mentioned from using decipherment algorithm decryption target corresponding with encryption Objective extraction code
Code fetch obtains the current time in Objective extraction code.It is understood that the current time in Objective extraction code is that target mentions
The generation time of code fetch.Such as when exchange files platform obtains file extraction code using IDEA algorithm, exchange files platform also root
Objective extraction code is decrypted according to IDEA algorithm, obtains the current time in Objective extraction code.
Step S43 is received according to the Objective extraction code check if the Objective extraction code was in validity period
End is with the presence or absence of the download permission for downloading the file to be sent.
If exchange files platform determines that Objective extraction code was in validity period, exchange files platform is according to Objective extraction code
Receiving end is verified with the presence or absence of the download permission for downloading file to be sent.Further, if exchange files platform determines that target mentions
Code fetch was not in validity period, and exchange files platform then determines that there is no the download permissions for downloading file to be sent for receiving end, prohibit
Only file to be sent is downloaded in receiving end.
Further, step S43 includes:
Step i mentions the Objective extraction code with file generated if the Objective extraction code was in validity period
Code fetch compares.
Step j, if the Objective extraction code is consistent with file extraction code generated, it is determined that in the presence of the receiving end
Carry the download permission of the file to be sent.
Step k, if the Objective extraction code and file extraction code generated are inconsistent, it is determined that do not deposit the receiving end
In the download permission for downloading the file to be sent.
If exchange files platform determines that Objective extraction code was in validity period, exchange files platform by Objective extraction code with
File extraction code generated compares the exchange files platform in advance.If Objective extraction code and file generated extract
Code is consistent, and exchange files platform then determines that receiving end has the download permission for downloading file to be sent;If Objective extraction code and institute
The file extraction code of generation is inconsistent, and exchange files platform then determines that receiving end does not have the downloading power for downloading file to be sent
Limit.
The present embodiment is connect only when file extraction code was in validity period by the validity period of setting file extraction code
Receiving end just has an opportunity to download file to be sent, when file extraction code was not in validity period, i.e., file extraction code it is no longer valid after,
Exchange files platform forbids receiving end to download file to be sent, to supervise reception end subscriber flat in exchange files within a certain period of time
File needed for platform downloading.
Further, document sending method fourth embodiment of the present invention is proposed.
The area of the document sending method fourth embodiment and first, second or third embodiment of document sending method
It is not, referring to Fig. 4, step S40 further include:
Step S44, after receiving the logging request that the receiving end is sent, the login detected in the logging request is close
Whether code is correct.
After exchange files platform receives the file extraction code and logging request of receiving end transmission, the inspection of exchange files platform
Whether correct survey the login password carried in logging request.The login password carried in exchange files detection of platform logging request is
No correct process are as follows: the login password that will be carried in the logging request of receiving end transmission, the i.e. login of reception end subscriber input
The login password that password is generated and stored at random in advance with it compares.If the login password carried in logging request and random
The login password of generation is consistent, it is determined that the login password carried in logging request is correct;If the login carried in logging request
Password and the login password generated at random are inconsistent, it is determined that the login password mistake carried in logging request.
Step S45, if the login password mistake in the logging request, continues to logging request.
If the login password mistake carried in exchange files platform logging request, exchange files platform exports prompt letter
Breath is touched again with prompting reception end subscriber to re-enter login password in corresponding download system according to the prompt information
It is pre- whether the continuous errors number of login password sent out the logging request for logging in download system, and detect reception end subscriber input is less than
If number.In the present embodiment, prompt information can be exported in the form of text or voice etc..Preset times are according to specific needs
And be arranged, it is inferior such as to may be configured as 3 times, 4 times or 6.
Further, if the login password carried in logging request is correct, exchange files platform determines receiving end success
Download system is logged in, and code check receiving end is extracted with the presence or absence of under downloading file to be sent according to the file that receiving end is sent
Carry permission.
Step S46, until the login password in received logging request is correct, and the continuous errors number of login password is small
In the preset times, it is determined that the receiving end logins successfully, and extracts code check institute according to the file that the receiving end is sent
Receiving end is stated with the presence or absence of the download permission for downloading the file to be sent.
If login password is correct in the received logging request of exchange files platform, and determines the login carried in logging request
The continuous errors number of password is less than preset times, and exchange files platform then determines that receiving end successfully logs in download system, and according to
The file that receiving end is sent extracts code check receiving end with the presence or absence of the download permission for downloading file to be sent.Such as work as preset times
When being 4 times, if exchange files platform determines that receiving the login password that end subscriber is inputted at the 3rd time is only correctly, exchange files
Platform, which then extracts code check receiving end according to the file that receiving end is sent, whether there is the download permission of downloading file to be sent,
When file extraction code is correct, determination has download permission.
Further, document sending method further include:
Step k, if the continuous errors number of login password reaches the preset times in logging request, it is determined that described to connect
Receiving end login failure locks the receiving end for logging in the logon account of the exchange files platform.
If exchange files platform determines the login password carried in logging request, continuous errors number reaches preset times, text
Part switching plane then determines that receiving end logs in download system failure, and locking receiving end is used for the login account of log file switching plane
Family is further increased pending with forbidding receiving end to download file to be sent in exchange files platform with the logon account
Send the safety of file.
It should be noted that uploading system and download system are present in exchange files platform, but uploading system and
Download system is independent from each other.
The present embodiment is by the way that it is close to detect the login carried in logging request after exchange files platform receives logging request
Code it is whether correct, if the login password mistake, continues to test the login password in logging request, until login password success and
Whether continuous errors number is less than preset times, it is determined that receiving end logins successfully;If continuous errors number reaches preset times,
It then determines receiving end login failure, and locks logon account of the receiving end for log file switching plane, avoid illegal point
Son repeatedly attempts different login password log file switching planes, downloads file to be sent, further improves text to be sent
The safety of part.
In addition, the embodiment of the present invention also proposes a kind of computer readable storage medium, the computer readable storage medium
On be stored with file and send program, the file, which is sent, realizes reward sending method as described above when program is executed by processor
The step of.
Computer readable storage medium specific embodiment of the present invention and the basic phase of each embodiment of above-mentioned document sending method
Together, details are not described herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes
Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of document sending method, which is characterized in that the document sending method the following steps are included:
After exchange files platform, which detects transmitting terminal, uploads file upload request to be sent, obtained according to the file upload request
The transmission information of the file to be sent and the file to be sent that take the transmitting terminal to upload, and audit the transmission information;
If the transmission information generates file extraction code and log-on message by audit;
The file extraction code and the log-on message are sent to receiving end, for the receiving end log file switching plane
Afterwards, logging request is initiated according to the log-on message, and sends the file extraction code after logining successfully;
After determining that the receiving end logins successfully, the file sent according to the receiving end, which extracts receiving end described in code check, is
It is no to there is the download permission for downloading the file to be sent;
If there are the download permissions for the receiving end, the file to be sent is sent to by the reception according to downloading request
End, so that the file to be sent is downloaded in the receiving end.
2. document sending method as described in claim 1, which is characterized in that if the transmission information passes through audit,
It generates file extraction code and the step of log-on message includes:
If the transmission information encrypts the file to be sent, obtains the encrypted file to be sent by audit, and
Generate file extraction code and log-on message.
3. document sending method as described in claim 1, which is characterized in that described when the determining receiving end logins successfully
Afterwards, the file sent according to the receiving end extracts receiving end described in code check with the presence or absence of under the downloading file to be sent
Carry permission the step of include:
After determining that the receiving end logins successfully, the file extraction code that the receiving end is sent is denoted as Objective extraction code;
Detect whether the Objective extraction code is in validity period;
If the Objective extraction code was in validity period, under whether there is according to receiving end described in the Objective extraction code check
Carry the download permission of the file to be sent.
4. document sending method as claimed in claim 3, which is characterized in that if the Objective extraction code is in validity period
Interior, then the receiving end according to the Objective extraction code check whether there is the step for downloading the download permission of the file to be sent
Suddenly include:
If the Objective extraction code was in validity period, the Objective extraction code and file extraction code generated are carried out pair
Than;
If the Objective extraction code is consistent with file extraction code generated, it is determined that it is described pending that the receiving end has downloading
Send the download permission of file;
If the Objective extraction code and file extraction code generated are inconsistent, it is determined that there is no described in downloading for the receiving end
The download permission of file to be sent.
5. document sending method as described in claim 1, which is characterized in that described when the determining receiving end logins successfully
Afterwards, the file sent according to the receiving end extracts receiving end described in code check with the presence or absence of under the downloading file to be sent
Carry permission the step of include:
After receiving the logging request that the receiving end is sent, whether the login password detected in the logging request is correct;
If the login password mistake in the logging request, continues to logging request;
Until the login password in received logging request is correct, and the continuous errors number of login password is less than described default time
Number, it is determined that the receiving end logins successfully, and whether the file sent according to the receiving end extracts receiving end described in code check
In the presence of the download permission for downloading the file to be sent.
6. document sending method as claimed in claim 5, which is characterized in that if the login password mistake, continues
After the step of receiving logging request, further includes:
If the continuous errors number of login password reaches the preset times in logging request, it is determined that the receiving end, which logs in, loses
It loses, locks the receiving end for logging in the logon account of the exchange files platform.
7. document sending method as described in claim 1, which is characterized in that if the transmission information passes through audit,
It generates file extraction code and the step of log-on message includes:
If the transmission information is obtained in current time, device identification, file serial number and the transmission information by audit
Receiving end account;
The current time, the device identification and the file serial number are encrypted, the file extraction code is obtained;
According to the logon account of receiving end account creation receiving end, and login corresponding with the logon account is generated at random
Password, to obtain the log-on message.
8. document sending method as described in any one of claim 1 to 7, which is characterized in that the audit transmission information
The step of include:
The examination & approval odd numbers and receiving end account in the transmission information are obtained, examination and approval document is obtained according to the examination & approval odd numbers, is extracted
Approval information in the examination and approval document;
The file information of the approval information and the file to be sent is compared, by the receiving end account and transmitting terminal
The reception account of user's input matches;
If the approval information is consistent with the file information, and the receiving end account and the reception account successful match,
Then determine that the transmission information passes through examination & approval;
If the approval information and the file information are inconsistent and/or the receiving end account is matched with the reception account
Failure, it is determined that the transmission information does not pass through examination & approval.
9. a kind of file sending device, which is characterized in that the file sending device includes memory, processor and is stored in institute
The file that stating can run on memory and on the processor sends program, and the file sends program and held by the processor
It realizes when row such as the step of document sending method described in any item of the claim 1 to 8.
10. a kind of computer readable storage medium, which is characterized in that be stored with file hair on the computer readable storage medium
Program is sent, the file sends and realizes that file described in any item of the claim 1 to 8 such as is sent when program is executed by processor
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810883806.8A CN109040070B (en) | 2018-08-02 | 2018-08-02 | File transmission method, device and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810883806.8A CN109040070B (en) | 2018-08-02 | 2018-08-02 | File transmission method, device and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109040070A true CN109040070A (en) | 2018-12-18 |
CN109040070B CN109040070B (en) | 2020-12-15 |
Family
ID=64648702
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810883806.8A Active CN109040070B (en) | 2018-08-02 | 2018-08-02 | File transmission method, device and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109040070B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110351329A (en) * | 2019-05-27 | 2019-10-18 | 深圳壹账通智能科技有限公司 | A kind of outer forwarding method of file and file outgoing system |
CN110392095A (en) * | 2019-06-19 | 2019-10-29 | 深圳壹账通智能科技有限公司 | Method for uploading, device, server and the storage medium of installation package file |
CN111385130A (en) * | 2018-12-29 | 2020-07-07 | 北京奇虎科技有限公司 | Published application processing method and device, electronic equipment and computer storage medium |
CN111431896A (en) * | 2020-03-20 | 2020-07-17 | 上海中通吉网络技术有限公司 | Data sharing method and system |
CN111683076A (en) * | 2020-06-02 | 2020-09-18 | 中国建设银行股份有限公司 | Authority management and control method, device, equipment and storage medium |
CN112291268A (en) * | 2020-11-26 | 2021-01-29 | 上海优扬新媒信息技术有限公司 | Information transmission method, device, equipment and storage medium |
CN113836592A (en) * | 2021-09-07 | 2021-12-24 | 前海人寿保险股份有限公司 | Data acquisition and delivery method, system, equipment and computer readable storage medium |
CN114124542A (en) * | 2021-11-25 | 2022-03-01 | 合芯科技(苏州)有限公司 | Method for exporting confidential data to shared security area after approval of research and development network |
CN115622801A (en) * | 2022-11-30 | 2023-01-17 | 中化现代农业有限公司 | Data downloading method and device, electronic equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104035780A (en) * | 2014-06-26 | 2014-09-10 | 北京京东尚科信息技术有限公司 | Method and device for publishing APK file |
CN105915330A (en) * | 2016-06-24 | 2016-08-31 | 武汉斗鱼网络科技有限公司 | Security data sharing method and system |
CN106027632A (en) * | 2016-05-16 | 2016-10-12 | 北京小米移动软件有限公司 | Data transmission method and device |
CN106506618A (en) * | 2016-10-24 | 2017-03-15 | 北京奇虎科技有限公司 | A kind of information sharing method, device and mobile terminal |
JP2017073084A (en) * | 2015-10-09 | 2017-04-13 | キヤノン株式会社 | Document management system, document management server, information processing device, document management method, and program |
CN106712955A (en) * | 2015-11-18 | 2017-05-24 | 珠海金山办公软件有限公司 | File sharing method and apparatus thereof |
CN107276888A (en) * | 2017-07-06 | 2017-10-20 | 广东欧珀移动通信有限公司 | Data sharing method and device, server, mobile terminal and storage medium |
-
2018
- 2018-08-02 CN CN201810883806.8A patent/CN109040070B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104035780A (en) * | 2014-06-26 | 2014-09-10 | 北京京东尚科信息技术有限公司 | Method and device for publishing APK file |
JP2017073084A (en) * | 2015-10-09 | 2017-04-13 | キヤノン株式会社 | Document management system, document management server, information processing device, document management method, and program |
CN106712955A (en) * | 2015-11-18 | 2017-05-24 | 珠海金山办公软件有限公司 | File sharing method and apparatus thereof |
CN106027632A (en) * | 2016-05-16 | 2016-10-12 | 北京小米移动软件有限公司 | Data transmission method and device |
CN105915330A (en) * | 2016-06-24 | 2016-08-31 | 武汉斗鱼网络科技有限公司 | Security data sharing method and system |
CN106506618A (en) * | 2016-10-24 | 2017-03-15 | 北京奇虎科技有限公司 | A kind of information sharing method, device and mobile terminal |
CN107276888A (en) * | 2017-07-06 | 2017-10-20 | 广东欧珀移动通信有限公司 | Data sharing method and device, server, mobile terminal and storage medium |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111385130A (en) * | 2018-12-29 | 2020-07-07 | 北京奇虎科技有限公司 | Published application processing method and device, electronic equipment and computer storage medium |
CN110351329A (en) * | 2019-05-27 | 2019-10-18 | 深圳壹账通智能科技有限公司 | A kind of outer forwarding method of file and file outgoing system |
CN110392095A (en) * | 2019-06-19 | 2019-10-29 | 深圳壹账通智能科技有限公司 | Method for uploading, device, server and the storage medium of installation package file |
CN111431896A (en) * | 2020-03-20 | 2020-07-17 | 上海中通吉网络技术有限公司 | Data sharing method and system |
CN111683076A (en) * | 2020-06-02 | 2020-09-18 | 中国建设银行股份有限公司 | Authority management and control method, device, equipment and storage medium |
CN112291268A (en) * | 2020-11-26 | 2021-01-29 | 上海优扬新媒信息技术有限公司 | Information transmission method, device, equipment and storage medium |
CN113836592A (en) * | 2021-09-07 | 2021-12-24 | 前海人寿保险股份有限公司 | Data acquisition and delivery method, system, equipment and computer readable storage medium |
CN114124542A (en) * | 2021-11-25 | 2022-03-01 | 合芯科技(苏州)有限公司 | Method for exporting confidential data to shared security area after approval of research and development network |
CN114124542B (en) * | 2021-11-25 | 2024-03-15 | 合芯科技(苏州)有限公司 | Method for exporting confidential data to shared security area after approval by research and development network |
CN115622801A (en) * | 2022-11-30 | 2023-01-17 | 中化现代农业有限公司 | Data downloading method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109040070B (en) | 2020-12-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109040070A (en) | Document sending method, equipment and computer readable storage medium | |
US9419969B2 (en) | Method and system for granting access to a secured website | |
US20180295137A1 (en) | Techniques for dynamic authentication in connection within applications and sessions | |
CN105376216B (en) | A kind of remote access method, proxy server and client | |
CN105024819B (en) | A kind of multiple-factor authentication method and system based on mobile terminal | |
CN111615105B (en) | Information providing and acquiring method, device and terminal | |
US9344896B2 (en) | Method and system for delivering a command to a mobile device | |
KR101383761B1 (en) | User authentication system and method thereof | |
US20160112437A1 (en) | Apparatus and Method for Authenticating a User via Multiple User Devices | |
EP2657871A2 (en) | Secure configuration of mobile application | |
JP2015509632A (en) | Login method, login device, terminal, and network server | |
US9124571B1 (en) | Network authentication method for secure user identity verification | |
US9256724B2 (en) | Method and system for authorizing an action at a site | |
CN104426659B (en) | Dynamic password formation method, authentication method and system, relevant device | |
US20190245847A1 (en) | System and method for providing a one-time key for identification | |
US11177963B2 (en) | Method for authenticating a user based on an image relation rule and corresponding first user device, server and system | |
CN105184567B (en) | Processing method, processing unit and the mobile terminal of information | |
CN103763104B (en) | A kind of method and system of dynamic authentication | |
CN108076056A (en) | Cloud server login method and device | |
US20210234858A1 (en) | Authentication system, authentication method and authentication apparatus | |
CN106101064A (en) | Account login method and device | |
US20190057199A1 (en) | Method for authenticating a user and corresponding user devices, server and system | |
CN106416336A (en) | Identification and/or authentication system and method | |
CN105556893B (en) | Secure access using password to mobile device | |
Jubur et al. | Bypassing push-based second factor and passwordless authentication with human-indistinguishable notifications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |