CN109684819A - Data verification method and device - Google Patents
Data verification method and device Download PDFInfo
- Publication number
- CN109684819A CN109684819A CN201811596391.2A CN201811596391A CN109684819A CN 109684819 A CN109684819 A CN 109684819A CN 201811596391 A CN201811596391 A CN 201811596391A CN 109684819 A CN109684819 A CN 109684819A
- Authority
- CN
- China
- Prior art keywords
- user terminal
- network service
- service end
- data
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
- G06F21/445—Program or device authentication by mutual authentication, e.g. between devices or programs
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The embodiment of the present disclosure discloses a kind of data verification method, which comprises network service end marks user terminal, and when the user terminal meets the first flag condition, the network service end determines the data invalid that the user terminal is sent;When the user terminal meets the second flag condition, the network service end carries out the first verifying to the user terminal;When the user terminal meets third flag condition, the network service end carries out the second verifying to the user terminal.To use the data verification mode of otherness to different user terminals, improve accuracy and the verification efficiency of data verification.
Description
Technical field
This disclosure relates to Internet technical field more particularly to a kind of data verification method, device, electronic equipment and meter
Calculation machine readable storage medium storing program for executing.
Background technique
With the rapid development of internet technology with the expansion of application field, the network information is interactive more and more to be penetrated into
In daily life.User can send and receive mass data by network to obtain information, for example, network service
Provider can submit commodity evaluation by internet delivered advertisements, user by Internet user terminal.But in Pang
Many invalid datas are equally contained in big network exchange data, these data can reduce the accuracy of information collection, even
Network security is impacted.It is to be mentioned by robot simulation's real user to network that a kind of common invalid data, which generates process,
Intersection number evidence, such as the brush single act of business site, the behavior of pouring water of forum.Therefore, effectively believe to be obtained in mass data
Breath, needs to verify these data, so that invalid data be filtered out.
Identify that network data exchange object is robot or real user, figure usually using identifying code in the prior art
Piece identifying code and short message verification code are most common two kinds of identifying codes.At present usually using single type identifying code to invalid data
It is intercepted, for common robot behavior, a part of invalid data can be filtered by doing so.But machine learning techniques
Breakthrough allow robot to crack single picture validation code and short-message verification by image recognition and short message backfill technology
Code, to reduce the accuracy and validity of data verification.Therefore, the prior art needs a kind of data of more precise and high efficiency
Verification method.
Summary of the invention
The embodiment of the present disclosure provides a kind of data verification method, user terminal can be marked, thus to difference
User terminal use otherness data verification mode, improve accuracy and the verification efficiency of data verification.
On the one hand, the embodiment of the present disclosure provides a kind of data verification method, comprising: network service end marks user terminal;
When the user terminal meets the first flag condition, the network service end determine data that the user terminal is sent without
Effect;When the user terminal meets the second flag condition, the network service end carries out the first verifying to the user terminal;
When the user terminal meets third flag condition, the network service end carries out the second verifying to the user terminal.It is logical
The scheme of embodiment of the present disclosure offer is provided, the data verification mode of otherness can be used to different user terminals, is improved
The accuracy of data verification and verification efficiency.
In a possible design, it includes: described that the network service end, which carries out the first verifying to the user terminal,
Network service end sends the first verification information to the user terminal;The network service end receive that the client sends the
One verifying feedback information;The network service end determines that the data of the user terminal are according to the first verifying feedback information
It is no effective.
In a possible design, it includes: described that the network service end, which carries out the second verifying to the user terminal,
Network service end sends the second verification information to the user terminal;The network service end receive that the client sends the
Two verifying feedback informations;The network service end determines that the data of the user terminal are according to the second verifying feedback information
It is no effective.
In a possible design, first verification information is graphical verification code.
In a possible design, second verification information is short message verification code.
In a possible design, the method also includes when the user terminal meet four flag conditions when, institute
It states network service end and third verifying is carried out to the user terminal.
In a possible design, it includes: described that the network service end, which carries out third verifying to the user terminal,
Network service end sends customized verification information to the user terminal;The network service end receive the user terminal according to
The feedback information that the customized verification information is sent;The network service end determines that the user is whole according to the feedback information
Whether the data at end are effective.
In a possible design, the network service end is before marking the user terminal to the user terminal
The third verifying is carried out, to reduce the user terminal number for needing to verify by screening in advance to the user terminal
Amount saves the memory source of the network service end, and the time needed for reducing data verification improves verification efficiency.
In a possible design, the network service end is tested to the first verifying of user terminal progress or second
After card, the third verifying is carried out to the user terminal, has been verified by what the modes such as code were verified so as to be directed to
Data do further verifying, improve the accuracy of data verification
In a possible design, it is the user that label user terminal, which includes: according to the information of the user terminal,
Terminal assesses score.
In a possible design, the information of the user terminal includes the number, device id, IP of the user terminal
More than one in address.
It is each described user when the information of the user terminal includes two or more in a possible design
Weight is arranged in the information of terminal.
On the other hand, the embodiment of the present disclosure provides a kind of data verification device, comprising: mark module, for marking user
Terminal;Authentication module, wherein when the user terminal meets the first flag condition, the authentication module determines the user
The data invalid that terminal is sent;When the user terminal meets the second flag condition, the authentication module is whole to the user
End carries out the first verifying;When the user terminal meets third flag condition, the authentication module to the user terminal into
Row second is verified.
In a possible design, the data verification device further includes transceiver module, and the authentication module is to described
It includes: that the authentication module control transceiver module is tested to user terminal transmission first that user terminal, which carries out the first verifying,
Demonstrate,prove information;The transceiver module receives the first verifying feedback information that the client is sent;The authentication module is according to
First verifying feedback information determines whether the data of the user terminal are effective.
In a possible design, the data verification device further includes transceiver module, and the authentication module is to described
It includes: that the authentication module control transceiver module is tested to user terminal transmission second that user terminal, which carries out the second verifying,
Demonstrate,prove information;The transceiver module receives the second verifying feedback information that the client is sent;The authentication module is according to
Second verifying feedback information determines whether the data of the user terminal are effective.
In a possible design, first verification information is graphical verification code.
In a possible design, second verification information is short message verification code.
In a possible design, the authentication module is also used to carry out third verifying to the user terminal.
In a possible design, the data verification device further includes transceiver module, and the authentication module is to described
It includes: that the authentication module control transceiver module is customized to user terminal transmission that user terminal, which carries out third verifying,
Verification information;The transceiver module receives the feedback information that the user terminal is sent according to the customized verification information;Institute
It states authentication module and determines whether the data of the user terminal are effective according to the feedback information.
In a possible design, the mark module label user terminal includes: the mark module according to
The information of user terminal is that the user terminal assesses score.
In a possible design, the information of the user terminal includes the number, device id, IP of the user terminal
More than one in address.
In a possible design, when the information of the user terminal includes two or more, the mark module is
Weight is arranged in the information of each user terminal.
In another aspect, the embodiment of the present disclosure provides a kind of electronic equipment, comprising: at least one processor;And with it is described
The memory of at least one processor communication connection;Wherein, the memory, which is stored with, to be held by least one described processor
Capable instruction, described instruction are executed by least one described processor so that at least one described processor be able to carry out it is aforementioned
Data verification method described in aspect.
Another aspect, the embodiment of the present disclosure provide a kind of non-transient computer readable storage medium, which is characterized in that this is non-
Transitory computer readable storage medium stores computer instruction, and the computer instruction is for executing computer described in aforementioned aspects
Data verification method.
According to the data verification method that the embodiment of the present disclosure provides, network service end can first be marked user terminal
Note provides the data verification mode of differentiation according to the not isolabeling grade of the user terminal, tests so as to improve data
The accuracy of card and verification efficiency.
Detailed description of the invention
It, below will be to required use in embodiment description for the clearer technical solution for illustrating the embodiment of the present disclosure
Attached drawing be briefly described.
Fig. 1 is the flow chart for the data verification method that the embodiment of the present disclosure provides;
The flow chart of step S3 in the data verification method that Fig. 2 provides for the embodiment of the present disclosure;
The flow chart of step S4 in the data verification method that Fig. 3 provides for the embodiment of the present disclosure;
The flow chart of step S5 in the data verification method that Fig. 4 provides for the embodiment of the present disclosure;
Fig. 5 is the structural schematic diagram for the data verification device that the embodiment of the present disclosure provides;
Fig. 6 is the structural schematic diagram for the electronic equipment that the embodiment of the present disclosure provides.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present disclosure, the scheme in the embodiment of the present disclosure is carried out clear, complete
Description.
The solution that the embodiment of the present disclosure proposes is based on internet data interactive system.The internet can for
Computer, PC etc. are the network interconnection net of user terminal, or mutual as the movement of user terminal using mobile device
Networking.Within the system, user terminal and network service end rely on internet to carry out data interaction, and by sending and receiving
Data obtain required information, and the network service end is, for example, server.
But partial invalidity data are usually contained in interactive data, a typical scene is that user passes through machine
The true user behavior of human simulation submits data to network service end by internet.For example, passing through machine in shopping website
Device people frequently loads evaluation data, interferes judgement of the user for commodity.In another example persistently sending rubbish to network using robot
Rubbish data, to carry out network attack.Therefore, these invalid datas are filtered, to prevent the interference from invalid data
It is very necessary with attack.
In order to shield invalid data, network service end can be according to the behavior trigger data verification process of user terminal.In general,
Data validation process includes intercepting invalid data using single picture validation code or short message verification code.But user terminal can
Readily to crack identifying code by identifying code cracking programs or equipment, such as image recognition technology, short message cat etc., this is greatly
The effect for weakening data verification.In addition, frequently sending identifying code to user terminal also reduces the efficiency of data verification,
Waste Internet resources.
In the scheme that the embodiment of the present disclosure provides, network service end is first marked user terminal, then according to quilt
The different situations of the user terminal of label provide different proof scheme, to mention while guaranteeing data verification accuracy
High verification efficiency simultaneously saves Internet resources.
Fig. 1 is the flow chart for the data verification method that the embodiment of the present disclosure provides.Below with reference to Fig. 1, the present embodiment is mentioned
The data verification method of confession is described in detail.
User terminal is marked in S1, network service end.
Optionally, user terminal is marked in network service end, comprising: the network service end is whole according to the user
The information at end is that the user terminal assesses score, and the user terminal according to the fractional marks of assessment.The score
It is invisible to the user terminal.
The network service end can assess the score of the user terminal according to preset information pool.It can be by cumulative
Mode assesses the score.For example, 0 is set by the initial score of each user terminal, described in including in the information pool
When the information of user terminal, corresponding score is superimposed to the user terminal.The score can also be assessed by deduction mode.
For example, 100 are set by the initial score of each user terminal, when the information in the information pool including the user terminal
When, corresponding score is reduced on the initial score of the user terminal.It is appreciated that fraction assessment mode is according to actual needs
It chooses, and is not limited to cited mode.
In a kind of implementation, the information of the user terminal includes the telephone number of the user terminal.Correspondingly, institute
Stating information pool is the pre-set pool of phone numbers of the network service end.When the user terminal attempts and the network service
When holding interaction data, the network service end searches the telephone number of the user terminal in the pool of phone numbers, works as institute
When stating the telephone number of user terminal and being present in the pool of phone numbers, the network service end gives user terminal setting
Corresponding score.
Optionally, the telephone number in the pool of phone numbers includes but is not limited to: attacking the network service end
Telephone number can be confirmed it is the telephone number of robot, the telephone number for having violation historical behavior, quilt according to its behavioural characteristic
The telephone number etc. reported.
In another implementation, the information of the user terminal includes the device id of the user terminal.Correspondingly, institute
Stating information pool is device id pond.When the user terminal attempts with the network service end interaction data, the network service
The device id of the user terminal is searched at end in the device id pond, when the device id of the user terminal is present in described set
When in the standby pond ID, corresponding score is arranged to the user terminal in the network service end.
Device id in the device id pond may include: the device id for attacking the network service end, robot mould
Quasi- device ID, the device id for having violation historical behavior, the device id reported etc..
In another implementation, the information of the user terminal includes the IP address of the user terminal.Correspondingly, institute
Stating information pool is IP address pond.When the user terminal attempts with the network service end interaction data, the network service
The IP address of the user terminal is searched at end in the IP address pond, when the IP address of the user terminal is present in the IP
When in address pool, corresponding score is arranged to the user terminal in the network service end.
IP address in the IP address pond may include: the IP address for attacking the network service end, have abnormal row
For IP address, the IP address reported etc..
It should be noted that the network service end can also be according to more user terminal informations to the user terminal
Score is assessed, and is not limited to above enumerate.For example, the information of the user terminal can also include going through for the user terminal
History behavior, the login times in short-term (for example, the user terminal frequently logs in a short time) of the user terminal, the use
Short-term operation number (for example, the user terminal frequent repetitive operation in a short time) of family terminal etc..
It is appreciated that the network service end can be according to above-mentioned one of the user terminal or several information to described
User terminal assesses score.It, can when the network service end assesses score to the user terminal according to different items of information
Think each item of information setting weight.For example, the network service end according to the telephone number of the user terminal, device id and
When IP address carries out fraction assessment, the weight of the telephone number of the user terminal, device id and IP address can be set respectively
It is set to 0.4,0.3 and 0.3.The weight determine according to actual needs, such as can pass through data statistics, model training, big number
It is determined according to means such as analyses, it is concise to ask, no longer describe one by one.
S2, when the user terminal meets the first flag condition, the network service end determines the user terminal hair
The data invalid sent.
Specifically, first flag condition is preset first score section.When the assessment score of the user terminal
When falling into the first score section, the data of the user terminal are considered as invalid data, and the network service end is direct
Filter the data that the user terminal is sent.
For example, when assessing the score of the user terminal by cumulative mode, initial score 0, highest score 100.
When the score of the user terminal is lower than 30 timesharing, the user terminal is confirmed to be simulator robot, comes from the user
The data of terminal are directly labeled as invalid and filter out, and carry out data verification without retransmiting identifying code.Both may be used in this way
Effectively to save Internet resources, and the client terminal can be allowed to think to be successfully transmitted invalid data, thus in certain journey
The transmission again of invalid data is avoided on degree.
S3, when the user terminal meets the second flag condition, the network service end carries out the user terminal
First verifying.
Specifically, second flag condition is preset second score section.When the assessment score of the user terminal
When falling into the second score section, the user terminal is considered as suspicious user terminal and needs to carry out data verification.Example
Such as, in aforementioned exemplary, when the score of the user terminal is located at 30-50 points of section, the network service end is to described
User terminal carries out the first verifying.
Optionally, as shown in Fig. 2, step S3 further includes following steps:
S301, the network service end send the first verification information to the user terminal;
S302, the user terminal receives first verification information, and sends the first verifying to the network service end
Feedback information;
S303, the network service end according to it is described first verifying feedback information determine the user terminal data whether
Effectively.
In one possible implementation, first verification information is picture validation code.The user terminal according to
The picture validation code sends a feedback information to the network service end.If the network service end judges the feedback letter
Breath is not that simulator robot issues, i.e., the described user terminal is verified by described first, then the network service end determines
The data of the user terminal are effective, conversely, the data invalid of the user terminal.
S4, when the user terminal meets third flag condition, the network service end carries out the user terminal
Second verifying.
Specifically, the third flag condition is preset third score section.When the assessment score of the user terminal
When falling into the third score section, need to carry out data verification to the user terminal.Precedent is connect, when the user terminal
When score is located at 50-70 points of section, the network service end carries out the second verifying to the user terminal.Second verifying
Different from first verifying.
Optionally, as shown in figure 3, step S4 further includes following steps:
S401, the network service end send the second verification information to the user terminal;
S402, the user terminal receives second verification information, and sends the second verifying to the network service end
Feedback information;
S403, the network service end according to it is described second verifying feedback information determine the user terminal data whether
Effectively.
In one possible implementation, second verification information is short message verification code.The user terminal according to
The short message verification code sends a short message as feedback information to the network service end.If the user terminal passes through described
Second verifying, then the network service end determines that the data of the user terminal are effective, conversely, the data of the user terminal without
Effect.
It is appreciated that in the above example, more score sections can also be arranged, for each different scores section
User terminal, using the verification mode of differentiation.For example, to the user terminal in different score sections send text identifying code,
Picture validation code, short message verification code, formula identifying code etc..Optionally, the data verification method that the embodiment of the present disclosure provides also wraps
It includes:
S5, the network service end carry out third verifying to the user terminal.
In a kind of implementation, the network service end is when the user terminal meets four flag conditions, to described
User terminal carries out third verifying.4th flag condition can be preset 4th score section.Continue precedent, when described
The score of user terminal is higher than 70 timesharing, and the network service end thinks that the user terminal is true network user, from
And carry out third verifying.
Optionally, as shown in figure 4, step S5 further includes following steps:
S501, the network service end send customized verification information to the user terminal;
S502, the network service end receive the feedback letter that the user terminal is sent according to the customized verification information
Breath;
S503, the network service end determine whether the data of the user terminal are effective according to the feedback information.
Specifically, the customized verification information is verifying list.The verifying list may include it is more than one from
Option is defined, the custom option is that the network service end is arranged according to the needs of data screening.The user terminal
The custom option is filled according to preset rules or the custom option is selected.When the user terminal is filled in
It is interior perhaps made by selection when meeting validation criteria, the network service end determines that the data of the user terminal are effective.
For example, including option " common mailbox " in the verifying list, when the list feedback information that user terminal is submitted
Middle when by this option being that empty or mailbox format does not meet validation criteria, the network service end can determine the user terminal
Data invalid.In another example including 2 gender, age custom options in the verifying list, the validation criteria is the age
Women between 20-40 years old.Then the gender only in verifying list is the user terminal of women, age between 20-40 years old
The data submitted are effective, and the data that other users terminal is submitted are invalid datas.By in the verifying list
More accurate data verification may be implemented in the screening of natural information.The customized verification information can be taken by the network
Business end is set as needed, and which is not described herein again.
It is appreciated that the network service end can be whole to the user before the score for assessing the user terminal
End carries out third verifying, to reduce the user terminal for needing to assess score by screening in advance to the user terminal
Quantity saves the memory source of the network service end, and the time needed for reducing data verification improves verification efficiency.
The network service end can also the user terminal by described first verify or it is described second verifying after,
Third verifying is carried out to the user terminal.Doing so can do for the data that the modes such as code are verified are had been verified by into one
Step card, to improve the accuracy of data verification.
Certainly, the network service end can also process according to Fig.4, only verified by third whole to the user
The data at end are screened, quick screening of this mode suitable for interaction data amount when smaller.
In disclosure disclosed embodiment, network service end is first marked user terminal, according to the user terminal
Not isolabeling grade provide differentiation data verification mode, so as to improve data verification accuracy and verifying effect
Rate.
Fig. 5 is the structural schematic diagram for the data verification device 500 that the embodiment of the present disclosure provides.Data provided in this embodiment
Verifying device 500 can execute data verification method described in Fig. 1.The data verification device 500 can be implemented as software, or
Person is embodied as the combination of software and hardware, and the data verification device 500 can integrate certain equipment being arranged in network system
In, such as in network service end equipment.
As shown in figure 5, the data verification device 500 includes: mark module 501, authentication module 502 and transceiver module
503。
The mark module 501 is for being marked user terminal.
Optionally, the mark module 501 is user terminal assessment score according to the information of the user terminal, and
According to user terminal described in the fractional marks of assessment.The mark module 501 can in the method according to described in Fig. 1,
Preset information pool described in step S1 assesses the score of the user terminal.The mark module 501 can also be according to
One of user terminal or several information assess score to the user terminal.Further, the mark module 501 can be
Weight is arranged in different items of information.
The authentication module 502 is used to determine the user terminal when the user terminal meets the first flag condition
The data invalid of transmission.
The authentication module 502 is also used to when the user terminal meets the second flag condition, to the user terminal
Carry out the first verifying.
Optionally, as described in Figure 2, the authentication module 502 controls the transceiver module 503 to the user
Terminal sends the first verification information.The transceiver module 503 receives the first verifying feedback information that the user terminal is sent.Institute
It states authentication module 502 and determines whether the data of the user terminal are effective according to the first verifying feedback information.
The authentication module 502 is also used to when the user terminal meets third flag condition, to the user terminal
Carry out the second verifying.
Optionally, as described in Figure 3, the authentication module 502 controls the transceiver module 503 to the user
Terminal sends the second verification information.The transceiver module 503 receives the second verifying feedback information that the user terminal is sent.Institute
It states authentication module 502 and determines whether the data of the user terminal are effective according to the second verifying feedback information.
The authentication module 502 is also used to carry out third verifying to the user terminal.The third verification process can be with
As described in Figure 4, it is customized to user terminal transmission to control the transceiver module 503 for the authentication module 502
Verification information.The transceiver module 503 receives the feedback information that the user terminal is sent according to the customized verification information.
The authentication module 502 determines whether the data of the user terminal are effective according to the feedback information.
As shown in figure 5, electronic equipment 600 may include processing unit (such as central processing unit, graphics processor etc.)
601, random access can be loaded into according to the program being stored in read-only memory (ROM) 602 or from storage device 608
Program in memory (RAM) 603 and execute various movements appropriate and processing.In RAM 603, it is also stored with electronic equipment
Various programs and data needed for 600 operations.Processing unit 601, ROM 602 and RAM 603 pass through bus or communication line
604 are connected with each other.Input/output (I/O) interface 605 is also connected to bus or communication line 604.
In general, following device can connect to I/O interface 605: including such as touch screen, touch tablet, keyboard, mouse, figure
As the input unit 606 of sensor, microphone, accelerometer, gyroscope etc.;Including such as liquid crystal display (LCD), loudspeaking
The output device 607 of device, vibrator etc.;Storage device 608 including such as tape, hard disk etc.;And communication device 609.It is logical
T unit 609 can permit electronic equipment 600 and wirelessly or non-wirelessly be communicated with other equipment to exchange data.Although Fig. 4 shows
The electronic equipment 600 with various devices is gone out, it should be understood that being not required for implementing or having all dresses shown
It sets.It can alternatively implement or have more or fewer devices.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description
Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium
On computer program, which includes the program code for method shown in execution flow chart.In such reality
It applies in example, which can be downloaded and installed from network by communication device 609, or from storage device 608
It is mounted, or is mounted from ROM 602.When the computer program is executed by processing unit 601, the embodiment of the present disclosure is executed
Method in the above-mentioned function that limits.
It should be noted that the above-mentioned computer-readable medium of the disclosure can be computer-readable signal media or meter
Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not
Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter
The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires
Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage
Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device,
Or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can be it is any include or storage journey
The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this
In open, computer-readable signal media may include in a base band or as the data-signal that carrier wave a part is propagated,
In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to
Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable and deposit
Any computer-readable medium other than storage media, the computer-readable signal media can send, propagate or transmit and be used for
By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium
Program code can transmit with any suitable medium, including but not limited to: electric wire, optical cable, RF (radio frequency) etc. are above-mentioned
Any appropriate combination.
Above-mentioned computer-readable medium can be included in above-mentioned electronic equipment;It is also possible to individualism, and not
It is fitted into the electronic equipment.
Above-mentioned computer-readable medium carries one or more program, when said one or multiple programs are by the electricity
When sub- equipment executes, so that the electronic equipment: obtaining at least two internet protocol addresses;Send to Node evaluation equipment includes institute
State the Node evaluation request of at least two internet protocol addresses, wherein the Node evaluation equipment is internet from described at least two
In protocol address, chooses internet protocol address and return;Receive the internet protocol address that the Node evaluation equipment returns;Its
In, the fringe node in acquired internet protocol address instruction content distributing network.
Alternatively, above-mentioned computer-readable medium carries one or more program, when said one or multiple programs
When being executed by the electronic equipment, so that the electronic equipment: receiving the Node evaluation including at least two internet protocol addresses and request;
From at least two internet protocol address, internet protocol address is chosen;Return to the internet protocol address selected;Wherein,
The fringe node in internet protocol address instruction content distributing network received.
The calculating of the operation for executing the disclosure can be write with one or more programming languages or combinations thereof
Machine program code, above procedure design language include object oriented program language-such as Java, Smalltalk, C+
+, it further include conventional procedural programming language-such as " C " language or similar programming language.Program code can
Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package,
Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part.
In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN)
Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service
Provider is connected by internet).
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use
The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse
Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding
The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction
Combination realize.
Being described in unit involved in the embodiment of the present disclosure can be realized by way of software, can also be by hard
The mode of part is realized.Wherein, the title of unit does not constitute the restriction to the unit itself under certain conditions, for example, the
One acquiring unit is also described as " obtaining the unit of at least two internet protocol addresses ".
Above description is only the preferred embodiment of the disclosure and the explanation to institute's application technology principle.Those skilled in the art
Member is it should be appreciated that the open scope involved in the disclosure, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from design disclosed above, it is carried out by above-mentioned technical characteristic or its equivalent feature
Any combination and the other technical solutions formed.Such as features described above has similar function with (but being not limited to) disclosed in the disclosure
Can technical characteristic replaced mutually and the technical solution that is formed.
Claims (13)
1. a kind of data verification method characterized by comprising
Network service end marks user terminal;
When the user terminal meets the first flag condition, the network service end determines the data that the user terminal is sent
In vain;
When the user terminal meets the second flag condition, the network service end carries out first to the user terminal and tests
Card;
When the user terminal meets third flag condition, the network service end carries out second to the user terminal and tests
Card.
2. data verification method as described in claim 1, which is characterized in that the network service end to the user terminal into
Row first is verified
The network service end sends the first verification information to the user terminal;
The network service end receives the first verifying feedback information that the client is sent;
The network service end determines whether the data of the user terminal are effective according to the first verifying feedback information.
3. data verification method as described in claim 1, which is characterized in that the network service end to the user terminal into
Row second is verified
The network service end sends the second verification information to the user terminal;
The network service end receives the second verifying feedback information that the client is sent;
The network service end determines whether the data of the user terminal are effective according to the second verifying feedback information.
4. data verification method as claimed in claim 2, which is characterized in that first verification information is graphical verification code.
5. data verification method as described in claim 3, which is characterized in that second verification information is short-message verification
Code.
6. data verification method according to any one of claims 1 to 5, which is characterized in that the method also includes when described
When user terminal meets four flag conditions, the network service end carries out third verifying to the user terminal.
7. data verification method as described in claim 6, which is characterized in that the network service end is to the user terminal
Carrying out third verifying includes:
The network service end sends customized verification information to the user terminal;
The network service end receives the feedback information that the user terminal is sent according to the customized verification information;
The network service end determines whether the data of the user terminal are effective according to the feedback information.
8. data verification method as described in claim 7, which is characterized in that label user terminal include:
It is that the user terminal assesses score according to the information of the user terminal.
9. data verification method as claimed in claim 8, which is characterized in that the information of the user terminal includes the user
The number of terminal, device id, more than one in IP address.
10. such as the data verification method in claim 9, which is characterized in that when the information of the user terminal includes
It is that weight is arranged in the information of each user terminal at two or more.
11. a kind of data verification device characterized by comprising
Mark module, for marking user terminal;
Authentication module, wherein
When the user terminal meets the first flag condition, the authentication module determine data that the user terminal is sent without
Effect;
When the user terminal meets the second flag condition, the authentication module carries out the first verifying to the user terminal;
When the user terminal meets third flag condition, the authentication module carries out the second verifying to the user terminal.
12. a kind of electronic equipment, comprising:
Memory, for storing non-transitory computer-readable instruction;And
Processor is appointed in -10 for running the computer-readable instruction so that the processor executes according to claim 1
Data verification method described in one.
13. a kind of computer readable storage medium, for storing non-transitory computer-readable instruction, when the non-transitory meter
When calculation machine readable instruction is executed by computer, so that the computer perform claim requires data described in any one of 1-10 to test
Card method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811596391.2A CN109684819A (en) | 2018-12-26 | 2018-12-26 | Data verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811596391.2A CN109684819A (en) | 2018-12-26 | 2018-12-26 | Data verification method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109684819A true CN109684819A (en) | 2019-04-26 |
Family
ID=66189485
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811596391.2A Pending CN109684819A (en) | 2018-12-26 | 2018-12-26 | Data verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109684819A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111241518A (en) * | 2020-01-03 | 2020-06-05 | 北京字节跳动网络技术有限公司 | User authentication method, device, equipment and medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104426847A (en) * | 2013-08-22 | 2015-03-18 | 腾讯科技(深圳)有限公司 | Method, system and server for securely accessing and verifying an Internet service |
US20150363775A1 (en) * | 2013-01-10 | 2015-12-17 | Tendyron Corporation | Key protection method and system |
CN106709733A (en) * | 2016-12-15 | 2017-05-24 | 咪咕文化科技有限公司 | Verification strategy selection method and equipment |
CN107707529A (en) * | 2017-09-06 | 2018-02-16 | 北京五八到家信息技术有限公司 | A kind of client validation method for realizing limitation identifying code transmission times |
CN108173864A (en) * | 2017-12-29 | 2018-06-15 | 咪咕文化科技有限公司 | A kind of Information Authentication mode method of adjustment and device and storage medium |
CN108900479A (en) * | 2018-06-12 | 2018-11-27 | 泰康保险集团股份有限公司 | Short message verification code acquisition methods and device |
-
2018
- 2018-12-26 CN CN201811596391.2A patent/CN109684819A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150363775A1 (en) * | 2013-01-10 | 2015-12-17 | Tendyron Corporation | Key protection method and system |
CN104426847A (en) * | 2013-08-22 | 2015-03-18 | 腾讯科技(深圳)有限公司 | Method, system and server for securely accessing and verifying an Internet service |
CN106709733A (en) * | 2016-12-15 | 2017-05-24 | 咪咕文化科技有限公司 | Verification strategy selection method and equipment |
CN107707529A (en) * | 2017-09-06 | 2018-02-16 | 北京五八到家信息技术有限公司 | A kind of client validation method for realizing limitation identifying code transmission times |
CN108173864A (en) * | 2017-12-29 | 2018-06-15 | 咪咕文化科技有限公司 | A kind of Information Authentication mode method of adjustment and device and storage medium |
CN108900479A (en) * | 2018-06-12 | 2018-11-27 | 泰康保险集团股份有限公司 | Short message verification code acquisition methods and device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111241518A (en) * | 2020-01-03 | 2020-06-05 | 北京字节跳动网络技术有限公司 | User authentication method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3930286A1 (en) | Prompting users to annotate simulated phishing emails in cybersecurity training | |
CN106487747B (en) | User identification method, system, device and processing method, device | |
CN109196818A (en) | Generation, management and the tracking of digital certificate | |
CN105530175A (en) | Message processing method, device and system | |
CN106796526A (en) | JSON Stylesheet Language Transformations | |
US20130013706A1 (en) | Method for determining interpersonal relationship influence information using textual content from interpersonal interactions | |
CN107295607A (en) | Method and apparatus for connecting WAP | |
CN107634947A (en) | Limitation malice logs in or the method and apparatus of registration | |
US11398163B2 (en) | Secure computer-implemented execution and evaluation of programming assignments for on demand courses | |
CN110225104A (en) | Data capture method, device and terminal device | |
CN109992732A (en) | Information sharing method, device, electronic equipment and storage medium | |
CN109947408A (en) | Information push method and device, storage medium and electronic equipment | |
CN109284198A (en) | A kind of method and apparatus verifying data | |
CN109582407A (en) | Tabulating equipment frame | |
CN107295067A (en) | Across the method and apparatus of screen identification user | |
CN108933823A (en) | User's touching reaches method and apparatus | |
CN109471976A (en) | Processing method, device, electronic equipment and the storage medium of web page operation data | |
CN108959642A (en) | Method and apparatus for information to be written | |
CN108629619A (en) | Use the motivational techniques, system and server of sharing articles | |
CN108702334A (en) | The method and system of distributed testing for the network configuration for zero rate | |
CN109800378A (en) | Content processing method, device and electronic equipment based on custom browser | |
CN109684819A (en) | Data verification method and device | |
CN108804501A (en) | A kind of method and device of detection effective information | |
CN110348438A (en) | A kind of picture character identifying method, device and electronic equipment based on artificial nerve network model | |
CN110213281A (en) | Safety protecting method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190426 |
|
RJ01 | Rejection of invention patent application after publication |