CN109684819A - Data verification method and device - Google Patents

Data verification method and device Download PDF

Info

Publication number
CN109684819A
CN109684819A CN201811596391.2A CN201811596391A CN109684819A CN 109684819 A CN109684819 A CN 109684819A CN 201811596391 A CN201811596391 A CN 201811596391A CN 109684819 A CN109684819 A CN 109684819A
Authority
CN
China
Prior art keywords
user terminal
network service
service end
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811596391.2A
Other languages
Chinese (zh)
Inventor
贾立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN201811596391.2A priority Critical patent/CN109684819A/en
Publication of CN109684819A publication Critical patent/CN109684819A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the present disclosure discloses a kind of data verification method, which comprises network service end marks user terminal, and when the user terminal meets the first flag condition, the network service end determines the data invalid that the user terminal is sent;When the user terminal meets the second flag condition, the network service end carries out the first verifying to the user terminal;When the user terminal meets third flag condition, the network service end carries out the second verifying to the user terminal.To use the data verification mode of otherness to different user terminals, improve accuracy and the verification efficiency of data verification.

Description

Data verification method and device
Technical field
This disclosure relates to Internet technical field more particularly to a kind of data verification method, device, electronic equipment and meter Calculation machine readable storage medium storing program for executing.
Background technique
With the rapid development of internet technology with the expansion of application field, the network information is interactive more and more to be penetrated into In daily life.User can send and receive mass data by network to obtain information, for example, network service Provider can submit commodity evaluation by internet delivered advertisements, user by Internet user terminal.But in Pang Many invalid datas are equally contained in big network exchange data, these data can reduce the accuracy of information collection, even Network security is impacted.It is to be mentioned by robot simulation's real user to network that a kind of common invalid data, which generates process, Intersection number evidence, such as the brush single act of business site, the behavior of pouring water of forum.Therefore, effectively believe to be obtained in mass data Breath, needs to verify these data, so that invalid data be filtered out.
Identify that network data exchange object is robot or real user, figure usually using identifying code in the prior art Piece identifying code and short message verification code are most common two kinds of identifying codes.At present usually using single type identifying code to invalid data It is intercepted, for common robot behavior, a part of invalid data can be filtered by doing so.But machine learning techniques Breakthrough allow robot to crack single picture validation code and short-message verification by image recognition and short message backfill technology Code, to reduce the accuracy and validity of data verification.Therefore, the prior art needs a kind of data of more precise and high efficiency Verification method.
Summary of the invention
The embodiment of the present disclosure provides a kind of data verification method, user terminal can be marked, thus to difference User terminal use otherness data verification mode, improve accuracy and the verification efficiency of data verification.
On the one hand, the embodiment of the present disclosure provides a kind of data verification method, comprising: network service end marks user terminal; When the user terminal meets the first flag condition, the network service end determine data that the user terminal is sent without Effect;When the user terminal meets the second flag condition, the network service end carries out the first verifying to the user terminal; When the user terminal meets third flag condition, the network service end carries out the second verifying to the user terminal.It is logical The scheme of embodiment of the present disclosure offer is provided, the data verification mode of otherness can be used to different user terminals, is improved The accuracy of data verification and verification efficiency.
In a possible design, it includes: described that the network service end, which carries out the first verifying to the user terminal, Network service end sends the first verification information to the user terminal;The network service end receive that the client sends the One verifying feedback information;The network service end determines that the data of the user terminal are according to the first verifying feedback information It is no effective.
In a possible design, it includes: described that the network service end, which carries out the second verifying to the user terminal, Network service end sends the second verification information to the user terminal;The network service end receive that the client sends the Two verifying feedback informations;The network service end determines that the data of the user terminal are according to the second verifying feedback information It is no effective.
In a possible design, first verification information is graphical verification code.
In a possible design, second verification information is short message verification code.
In a possible design, the method also includes when the user terminal meet four flag conditions when, institute It states network service end and third verifying is carried out to the user terminal.
In a possible design, it includes: described that the network service end, which carries out third verifying to the user terminal, Network service end sends customized verification information to the user terminal;The network service end receive the user terminal according to The feedback information that the customized verification information is sent;The network service end determines that the user is whole according to the feedback information Whether the data at end are effective.
In a possible design, the network service end is before marking the user terminal to the user terminal The third verifying is carried out, to reduce the user terminal number for needing to verify by screening in advance to the user terminal Amount saves the memory source of the network service end, and the time needed for reducing data verification improves verification efficiency.
In a possible design, the network service end is tested to the first verifying of user terminal progress or second After card, the third verifying is carried out to the user terminal, has been verified by what the modes such as code were verified so as to be directed to Data do further verifying, improve the accuracy of data verification
In a possible design, it is the user that label user terminal, which includes: according to the information of the user terminal, Terminal assesses score.
In a possible design, the information of the user terminal includes the number, device id, IP of the user terminal More than one in address.
It is each described user when the information of the user terminal includes two or more in a possible design Weight is arranged in the information of terminal.
On the other hand, the embodiment of the present disclosure provides a kind of data verification device, comprising: mark module, for marking user Terminal;Authentication module, wherein when the user terminal meets the first flag condition, the authentication module determines the user The data invalid that terminal is sent;When the user terminal meets the second flag condition, the authentication module is whole to the user End carries out the first verifying;When the user terminal meets third flag condition, the authentication module to the user terminal into Row second is verified.
In a possible design, the data verification device further includes transceiver module, and the authentication module is to described It includes: that the authentication module control transceiver module is tested to user terminal transmission first that user terminal, which carries out the first verifying, Demonstrate,prove information;The transceiver module receives the first verifying feedback information that the client is sent;The authentication module is according to First verifying feedback information determines whether the data of the user terminal are effective.
In a possible design, the data verification device further includes transceiver module, and the authentication module is to described It includes: that the authentication module control transceiver module is tested to user terminal transmission second that user terminal, which carries out the second verifying, Demonstrate,prove information;The transceiver module receives the second verifying feedback information that the client is sent;The authentication module is according to Second verifying feedback information determines whether the data of the user terminal are effective.
In a possible design, first verification information is graphical verification code.
In a possible design, second verification information is short message verification code.
In a possible design, the authentication module is also used to carry out third verifying to the user terminal.
In a possible design, the data verification device further includes transceiver module, and the authentication module is to described It includes: that the authentication module control transceiver module is customized to user terminal transmission that user terminal, which carries out third verifying, Verification information;The transceiver module receives the feedback information that the user terminal is sent according to the customized verification information;Institute It states authentication module and determines whether the data of the user terminal are effective according to the feedback information.
In a possible design, the mark module label user terminal includes: the mark module according to The information of user terminal is that the user terminal assesses score.
In a possible design, the information of the user terminal includes the number, device id, IP of the user terminal More than one in address.
In a possible design, when the information of the user terminal includes two or more, the mark module is Weight is arranged in the information of each user terminal.
In another aspect, the embodiment of the present disclosure provides a kind of electronic equipment, comprising: at least one processor;And with it is described The memory of at least one processor communication connection;Wherein, the memory, which is stored with, to be held by least one described processor Capable instruction, described instruction are executed by least one described processor so that at least one described processor be able to carry out it is aforementioned Data verification method described in aspect.
Another aspect, the embodiment of the present disclosure provide a kind of non-transient computer readable storage medium, which is characterized in that this is non- Transitory computer readable storage medium stores computer instruction, and the computer instruction is for executing computer described in aforementioned aspects Data verification method.
According to the data verification method that the embodiment of the present disclosure provides, network service end can first be marked user terminal Note provides the data verification mode of differentiation according to the not isolabeling grade of the user terminal, tests so as to improve data The accuracy of card and verification efficiency.
Detailed description of the invention
It, below will be to required use in embodiment description for the clearer technical solution for illustrating the embodiment of the present disclosure Attached drawing be briefly described.
Fig. 1 is the flow chart for the data verification method that the embodiment of the present disclosure provides;
The flow chart of step S3 in the data verification method that Fig. 2 provides for the embodiment of the present disclosure;
The flow chart of step S4 in the data verification method that Fig. 3 provides for the embodiment of the present disclosure;
The flow chart of step S5 in the data verification method that Fig. 4 provides for the embodiment of the present disclosure;
Fig. 5 is the structural schematic diagram for the data verification device that the embodiment of the present disclosure provides;
Fig. 6 is the structural schematic diagram for the electronic equipment that the embodiment of the present disclosure provides.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present disclosure, the scheme in the embodiment of the present disclosure is carried out clear, complete Description.
The solution that the embodiment of the present disclosure proposes is based on internet data interactive system.The internet can for Computer, PC etc. are the network interconnection net of user terminal, or mutual as the movement of user terminal using mobile device Networking.Within the system, user terminal and network service end rely on internet to carry out data interaction, and by sending and receiving Data obtain required information, and the network service end is, for example, server.
But partial invalidity data are usually contained in interactive data, a typical scene is that user passes through machine The true user behavior of human simulation submits data to network service end by internet.For example, passing through machine in shopping website Device people frequently loads evaluation data, interferes judgement of the user for commodity.In another example persistently sending rubbish to network using robot Rubbish data, to carry out network attack.Therefore, these invalid datas are filtered, to prevent the interference from invalid data It is very necessary with attack.
In order to shield invalid data, network service end can be according to the behavior trigger data verification process of user terminal.In general, Data validation process includes intercepting invalid data using single picture validation code or short message verification code.But user terminal can Readily to crack identifying code by identifying code cracking programs or equipment, such as image recognition technology, short message cat etc., this is greatly The effect for weakening data verification.In addition, frequently sending identifying code to user terminal also reduces the efficiency of data verification, Waste Internet resources.
In the scheme that the embodiment of the present disclosure provides, network service end is first marked user terminal, then according to quilt The different situations of the user terminal of label provide different proof scheme, to mention while guaranteeing data verification accuracy High verification efficiency simultaneously saves Internet resources.
Fig. 1 is the flow chart for the data verification method that the embodiment of the present disclosure provides.Below with reference to Fig. 1, the present embodiment is mentioned The data verification method of confession is described in detail.
User terminal is marked in S1, network service end.
Optionally, user terminal is marked in network service end, comprising: the network service end is whole according to the user The information at end is that the user terminal assesses score, and the user terminal according to the fractional marks of assessment.The score It is invisible to the user terminal.
The network service end can assess the score of the user terminal according to preset information pool.It can be by cumulative Mode assesses the score.For example, 0 is set by the initial score of each user terminal, described in including in the information pool When the information of user terminal, corresponding score is superimposed to the user terminal.The score can also be assessed by deduction mode. For example, 100 are set by the initial score of each user terminal, when the information in the information pool including the user terminal When, corresponding score is reduced on the initial score of the user terminal.It is appreciated that fraction assessment mode is according to actual needs It chooses, and is not limited to cited mode.
In a kind of implementation, the information of the user terminal includes the telephone number of the user terminal.Correspondingly, institute Stating information pool is the pre-set pool of phone numbers of the network service end.When the user terminal attempts and the network service When holding interaction data, the network service end searches the telephone number of the user terminal in the pool of phone numbers, works as institute When stating the telephone number of user terminal and being present in the pool of phone numbers, the network service end gives user terminal setting Corresponding score.
Optionally, the telephone number in the pool of phone numbers includes but is not limited to: attacking the network service end Telephone number can be confirmed it is the telephone number of robot, the telephone number for having violation historical behavior, quilt according to its behavioural characteristic The telephone number etc. reported.
In another implementation, the information of the user terminal includes the device id of the user terminal.Correspondingly, institute Stating information pool is device id pond.When the user terminal attempts with the network service end interaction data, the network service The device id of the user terminal is searched at end in the device id pond, when the device id of the user terminal is present in described set When in the standby pond ID, corresponding score is arranged to the user terminal in the network service end.
Device id in the device id pond may include: the device id for attacking the network service end, robot mould Quasi- device ID, the device id for having violation historical behavior, the device id reported etc..
In another implementation, the information of the user terminal includes the IP address of the user terminal.Correspondingly, institute Stating information pool is IP address pond.When the user terminal attempts with the network service end interaction data, the network service The IP address of the user terminal is searched at end in the IP address pond, when the IP address of the user terminal is present in the IP When in address pool, corresponding score is arranged to the user terminal in the network service end.
IP address in the IP address pond may include: the IP address for attacking the network service end, have abnormal row For IP address, the IP address reported etc..
It should be noted that the network service end can also be according to more user terminal informations to the user terminal Score is assessed, and is not limited to above enumerate.For example, the information of the user terminal can also include going through for the user terminal History behavior, the login times in short-term (for example, the user terminal frequently logs in a short time) of the user terminal, the use Short-term operation number (for example, the user terminal frequent repetitive operation in a short time) of family terminal etc..
It is appreciated that the network service end can be according to above-mentioned one of the user terminal or several information to described User terminal assesses score.It, can when the network service end assesses score to the user terminal according to different items of information Think each item of information setting weight.For example, the network service end according to the telephone number of the user terminal, device id and When IP address carries out fraction assessment, the weight of the telephone number of the user terminal, device id and IP address can be set respectively It is set to 0.4,0.3 and 0.3.The weight determine according to actual needs, such as can pass through data statistics, model training, big number It is determined according to means such as analyses, it is concise to ask, no longer describe one by one.
S2, when the user terminal meets the first flag condition, the network service end determines the user terminal hair The data invalid sent.
Specifically, first flag condition is preset first score section.When the assessment score of the user terminal When falling into the first score section, the data of the user terminal are considered as invalid data, and the network service end is direct Filter the data that the user terminal is sent.
For example, when assessing the score of the user terminal by cumulative mode, initial score 0, highest score 100. When the score of the user terminal is lower than 30 timesharing, the user terminal is confirmed to be simulator robot, comes from the user The data of terminal are directly labeled as invalid and filter out, and carry out data verification without retransmiting identifying code.Both may be used in this way Effectively to save Internet resources, and the client terminal can be allowed to think to be successfully transmitted invalid data, thus in certain journey The transmission again of invalid data is avoided on degree.
S3, when the user terminal meets the second flag condition, the network service end carries out the user terminal First verifying.
Specifically, second flag condition is preset second score section.When the assessment score of the user terminal When falling into the second score section, the user terminal is considered as suspicious user terminal and needs to carry out data verification.Example Such as, in aforementioned exemplary, when the score of the user terminal is located at 30-50 points of section, the network service end is to described User terminal carries out the first verifying.
Optionally, as shown in Fig. 2, step S3 further includes following steps:
S301, the network service end send the first verification information to the user terminal;
S302, the user terminal receives first verification information, and sends the first verifying to the network service end Feedback information;
S303, the network service end according to it is described first verifying feedback information determine the user terminal data whether Effectively.
In one possible implementation, first verification information is picture validation code.The user terminal according to The picture validation code sends a feedback information to the network service end.If the network service end judges the feedback letter Breath is not that simulator robot issues, i.e., the described user terminal is verified by described first, then the network service end determines The data of the user terminal are effective, conversely, the data invalid of the user terminal.
S4, when the user terminal meets third flag condition, the network service end carries out the user terminal Second verifying.
Specifically, the third flag condition is preset third score section.When the assessment score of the user terminal When falling into the third score section, need to carry out data verification to the user terminal.Precedent is connect, when the user terminal When score is located at 50-70 points of section, the network service end carries out the second verifying to the user terminal.Second verifying Different from first verifying.
Optionally, as shown in figure 3, step S4 further includes following steps:
S401, the network service end send the second verification information to the user terminal;
S402, the user terminal receives second verification information, and sends the second verifying to the network service end Feedback information;
S403, the network service end according to it is described second verifying feedback information determine the user terminal data whether Effectively.
In one possible implementation, second verification information is short message verification code.The user terminal according to The short message verification code sends a short message as feedback information to the network service end.If the user terminal passes through described Second verifying, then the network service end determines that the data of the user terminal are effective, conversely, the data of the user terminal without Effect.
It is appreciated that in the above example, more score sections can also be arranged, for each different scores section User terminal, using the verification mode of differentiation.For example, to the user terminal in different score sections send text identifying code, Picture validation code, short message verification code, formula identifying code etc..Optionally, the data verification method that the embodiment of the present disclosure provides also wraps It includes:
S5, the network service end carry out third verifying to the user terminal.
In a kind of implementation, the network service end is when the user terminal meets four flag conditions, to described User terminal carries out third verifying.4th flag condition can be preset 4th score section.Continue precedent, when described The score of user terminal is higher than 70 timesharing, and the network service end thinks that the user terminal is true network user, from And carry out third verifying.
Optionally, as shown in figure 4, step S5 further includes following steps:
S501, the network service end send customized verification information to the user terminal;
S502, the network service end receive the feedback letter that the user terminal is sent according to the customized verification information Breath;
S503, the network service end determine whether the data of the user terminal are effective according to the feedback information.
Specifically, the customized verification information is verifying list.The verifying list may include it is more than one from Option is defined, the custom option is that the network service end is arranged according to the needs of data screening.The user terminal The custom option is filled according to preset rules or the custom option is selected.When the user terminal is filled in It is interior perhaps made by selection when meeting validation criteria, the network service end determines that the data of the user terminal are effective.
For example, including option " common mailbox " in the verifying list, when the list feedback information that user terminal is submitted Middle when by this option being that empty or mailbox format does not meet validation criteria, the network service end can determine the user terminal Data invalid.In another example including 2 gender, age custom options in the verifying list, the validation criteria is the age Women between 20-40 years old.Then the gender only in verifying list is the user terminal of women, age between 20-40 years old The data submitted are effective, and the data that other users terminal is submitted are invalid datas.By in the verifying list More accurate data verification may be implemented in the screening of natural information.The customized verification information can be taken by the network Business end is set as needed, and which is not described herein again.
It is appreciated that the network service end can be whole to the user before the score for assessing the user terminal End carries out third verifying, to reduce the user terminal for needing to assess score by screening in advance to the user terminal Quantity saves the memory source of the network service end, and the time needed for reducing data verification improves verification efficiency.
The network service end can also the user terminal by described first verify or it is described second verifying after, Third verifying is carried out to the user terminal.Doing so can do for the data that the modes such as code are verified are had been verified by into one Step card, to improve the accuracy of data verification.
Certainly, the network service end can also process according to Fig.4, only verified by third whole to the user The data at end are screened, quick screening of this mode suitable for interaction data amount when smaller.
In disclosure disclosed embodiment, network service end is first marked user terminal, according to the user terminal Not isolabeling grade provide differentiation data verification mode, so as to improve data verification accuracy and verifying effect Rate.
Fig. 5 is the structural schematic diagram for the data verification device 500 that the embodiment of the present disclosure provides.Data provided in this embodiment Verifying device 500 can execute data verification method described in Fig. 1.The data verification device 500 can be implemented as software, or Person is embodied as the combination of software and hardware, and the data verification device 500 can integrate certain equipment being arranged in network system In, such as in network service end equipment.
As shown in figure 5, the data verification device 500 includes: mark module 501, authentication module 502 and transceiver module 503。
The mark module 501 is for being marked user terminal.
Optionally, the mark module 501 is user terminal assessment score according to the information of the user terminal, and According to user terminal described in the fractional marks of assessment.The mark module 501 can in the method according to described in Fig. 1, Preset information pool described in step S1 assesses the score of the user terminal.The mark module 501 can also be according to One of user terminal or several information assess score to the user terminal.Further, the mark module 501 can be Weight is arranged in different items of information.
The authentication module 502 is used to determine the user terminal when the user terminal meets the first flag condition The data invalid of transmission.
The authentication module 502 is also used to when the user terminal meets the second flag condition, to the user terminal Carry out the first verifying.
Optionally, as described in Figure 2, the authentication module 502 controls the transceiver module 503 to the user Terminal sends the first verification information.The transceiver module 503 receives the first verifying feedback information that the user terminal is sent.Institute It states authentication module 502 and determines whether the data of the user terminal are effective according to the first verifying feedback information.
The authentication module 502 is also used to when the user terminal meets third flag condition, to the user terminal Carry out the second verifying.
Optionally, as described in Figure 3, the authentication module 502 controls the transceiver module 503 to the user Terminal sends the second verification information.The transceiver module 503 receives the second verifying feedback information that the user terminal is sent.Institute It states authentication module 502 and determines whether the data of the user terminal are effective according to the second verifying feedback information.
The authentication module 502 is also used to carry out third verifying to the user terminal.The third verification process can be with As described in Figure 4, it is customized to user terminal transmission to control the transceiver module 503 for the authentication module 502 Verification information.The transceiver module 503 receives the feedback information that the user terminal is sent according to the customized verification information. The authentication module 502 determines whether the data of the user terminal are effective according to the feedback information.
As shown in figure 5, electronic equipment 600 may include processing unit (such as central processing unit, graphics processor etc.) 601, random access can be loaded into according to the program being stored in read-only memory (ROM) 602 or from storage device 608 Program in memory (RAM) 603 and execute various movements appropriate and processing.In RAM 603, it is also stored with electronic equipment Various programs and data needed for 600 operations.Processing unit 601, ROM 602 and RAM 603 pass through bus or communication line 604 are connected with each other.Input/output (I/O) interface 605 is also connected to bus or communication line 604.
In general, following device can connect to I/O interface 605: including such as touch screen, touch tablet, keyboard, mouse, figure As the input unit 606 of sensor, microphone, accelerometer, gyroscope etc.;Including such as liquid crystal display (LCD), loudspeaking The output device 607 of device, vibrator etc.;Storage device 608 including such as tape, hard disk etc.;And communication device 609.It is logical T unit 609 can permit electronic equipment 600 and wirelessly or non-wirelessly be communicated with other equipment to exchange data.Although Fig. 4 shows The electronic equipment 600 with various devices is gone out, it should be understood that being not required for implementing or having all dresses shown It sets.It can alternatively implement or have more or fewer devices.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium On computer program, which includes the program code for method shown in execution flow chart.In such reality It applies in example, which can be downloaded and installed from network by communication device 609, or from storage device 608 It is mounted, or is mounted from ROM 602.When the computer program is executed by processing unit 601, the embodiment of the present disclosure is executed Method in the above-mentioned function that limits.
It should be noted that the above-mentioned computer-readable medium of the disclosure can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can be it is any include or storage journey The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this In open, computer-readable signal media may include in a base band or as the data-signal that carrier wave a part is propagated, In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable and deposit Any computer-readable medium other than storage media, the computer-readable signal media can send, propagate or transmit and be used for By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to: electric wire, optical cable, RF (radio frequency) etc. are above-mentioned Any appropriate combination.
Above-mentioned computer-readable medium can be included in above-mentioned electronic equipment;It is also possible to individualism, and not It is fitted into the electronic equipment.
Above-mentioned computer-readable medium carries one or more program, when said one or multiple programs are by the electricity When sub- equipment executes, so that the electronic equipment: obtaining at least two internet protocol addresses;Send to Node evaluation equipment includes institute State the Node evaluation request of at least two internet protocol addresses, wherein the Node evaluation equipment is internet from described at least two In protocol address, chooses internet protocol address and return;Receive the internet protocol address that the Node evaluation equipment returns;Its In, the fringe node in acquired internet protocol address instruction content distributing network.
Alternatively, above-mentioned computer-readable medium carries one or more program, when said one or multiple programs When being executed by the electronic equipment, so that the electronic equipment: receiving the Node evaluation including at least two internet protocol addresses and request; From at least two internet protocol address, internet protocol address is chosen;Return to the internet protocol address selected;Wherein, The fringe node in internet protocol address instruction content distributing network received.
The calculating of the operation for executing the disclosure can be write with one or more programming languages or combinations thereof Machine program code, above procedure design language include object oriented program language-such as Java, Smalltalk, C+ +, it further include conventional procedural programming language-such as " C " language or similar programming language.Program code can Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package, Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part. In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN) Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service Provider is connected by internet).
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction Combination realize.
Being described in unit involved in the embodiment of the present disclosure can be realized by way of software, can also be by hard The mode of part is realized.Wherein, the title of unit does not constitute the restriction to the unit itself under certain conditions, for example, the One acquiring unit is also described as " obtaining the unit of at least two internet protocol addresses ".
Above description is only the preferred embodiment of the disclosure and the explanation to institute's application technology principle.Those skilled in the art Member is it should be appreciated that the open scope involved in the disclosure, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from design disclosed above, it is carried out by above-mentioned technical characteristic or its equivalent feature Any combination and the other technical solutions formed.Such as features described above has similar function with (but being not limited to) disclosed in the disclosure Can technical characteristic replaced mutually and the technical solution that is formed.

Claims (13)

1. a kind of data verification method characterized by comprising
Network service end marks user terminal;
When the user terminal meets the first flag condition, the network service end determines the data that the user terminal is sent In vain;
When the user terminal meets the second flag condition, the network service end carries out first to the user terminal and tests Card;
When the user terminal meets third flag condition, the network service end carries out second to the user terminal and tests Card.
2. data verification method as described in claim 1, which is characterized in that the network service end to the user terminal into Row first is verified
The network service end sends the first verification information to the user terminal;
The network service end receives the first verifying feedback information that the client is sent;
The network service end determines whether the data of the user terminal are effective according to the first verifying feedback information.
3. data verification method as described in claim 1, which is characterized in that the network service end to the user terminal into Row second is verified
The network service end sends the second verification information to the user terminal;
The network service end receives the second verifying feedback information that the client is sent;
The network service end determines whether the data of the user terminal are effective according to the second verifying feedback information.
4. data verification method as claimed in claim 2, which is characterized in that first verification information is graphical verification code.
5. data verification method as described in claim 3, which is characterized in that second verification information is short-message verification Code.
6. data verification method according to any one of claims 1 to 5, which is characterized in that the method also includes when described When user terminal meets four flag conditions, the network service end carries out third verifying to the user terminal.
7. data verification method as described in claim 6, which is characterized in that the network service end is to the user terminal Carrying out third verifying includes:
The network service end sends customized verification information to the user terminal;
The network service end receives the feedback information that the user terminal is sent according to the customized verification information;
The network service end determines whether the data of the user terminal are effective according to the feedback information.
8. data verification method as described in claim 7, which is characterized in that label user terminal include:
It is that the user terminal assesses score according to the information of the user terminal.
9. data verification method as claimed in claim 8, which is characterized in that the information of the user terminal includes the user The number of terminal, device id, more than one in IP address.
10. such as the data verification method in claim 9, which is characterized in that when the information of the user terminal includes It is that weight is arranged in the information of each user terminal at two or more.
11. a kind of data verification device characterized by comprising
Mark module, for marking user terminal;
Authentication module, wherein
When the user terminal meets the first flag condition, the authentication module determine data that the user terminal is sent without Effect;
When the user terminal meets the second flag condition, the authentication module carries out the first verifying to the user terminal;
When the user terminal meets third flag condition, the authentication module carries out the second verifying to the user terminal.
12. a kind of electronic equipment, comprising:
Memory, for storing non-transitory computer-readable instruction;And
Processor is appointed in -10 for running the computer-readable instruction so that the processor executes according to claim 1 Data verification method described in one.
13. a kind of computer readable storage medium, for storing non-transitory computer-readable instruction, when the non-transitory meter When calculation machine readable instruction is executed by computer, so that the computer perform claim requires data described in any one of 1-10 to test Card method.
CN201811596391.2A 2018-12-26 2018-12-26 Data verification method and device Pending CN109684819A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811596391.2A CN109684819A (en) 2018-12-26 2018-12-26 Data verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811596391.2A CN109684819A (en) 2018-12-26 2018-12-26 Data verification method and device

Publications (1)

Publication Number Publication Date
CN109684819A true CN109684819A (en) 2019-04-26

Family

ID=66189485

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811596391.2A Pending CN109684819A (en) 2018-12-26 2018-12-26 Data verification method and device

Country Status (1)

Country Link
CN (1) CN109684819A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111241518A (en) * 2020-01-03 2020-06-05 北京字节跳动网络技术有限公司 User authentication method, device, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104426847A (en) * 2013-08-22 2015-03-18 腾讯科技(深圳)有限公司 Method, system and server for securely accessing and verifying an Internet service
US20150363775A1 (en) * 2013-01-10 2015-12-17 Tendyron Corporation Key protection method and system
CN106709733A (en) * 2016-12-15 2017-05-24 咪咕文化科技有限公司 Verification strategy selection method and equipment
CN107707529A (en) * 2017-09-06 2018-02-16 北京五八到家信息技术有限公司 A kind of client validation method for realizing limitation identifying code transmission times
CN108173864A (en) * 2017-12-29 2018-06-15 咪咕文化科技有限公司 A kind of Information Authentication mode method of adjustment and device and storage medium
CN108900479A (en) * 2018-06-12 2018-11-27 泰康保险集团股份有限公司 Short message verification code acquisition methods and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150363775A1 (en) * 2013-01-10 2015-12-17 Tendyron Corporation Key protection method and system
CN104426847A (en) * 2013-08-22 2015-03-18 腾讯科技(深圳)有限公司 Method, system and server for securely accessing and verifying an Internet service
CN106709733A (en) * 2016-12-15 2017-05-24 咪咕文化科技有限公司 Verification strategy selection method and equipment
CN107707529A (en) * 2017-09-06 2018-02-16 北京五八到家信息技术有限公司 A kind of client validation method for realizing limitation identifying code transmission times
CN108173864A (en) * 2017-12-29 2018-06-15 咪咕文化科技有限公司 A kind of Information Authentication mode method of adjustment and device and storage medium
CN108900479A (en) * 2018-06-12 2018-11-27 泰康保险集团股份有限公司 Short message verification code acquisition methods and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111241518A (en) * 2020-01-03 2020-06-05 北京字节跳动网络技术有限公司 User authentication method, device, equipment and medium

Similar Documents

Publication Publication Date Title
EP3930286A1 (en) Prompting users to annotate simulated phishing emails in cybersecurity training
CN106487747B (en) User identification method, system, device and processing method, device
CN109196818A (en) Generation, management and the tracking of digital certificate
CN105530175A (en) Message processing method, device and system
CN106796526A (en) JSON Stylesheet Language Transformations
US20130013706A1 (en) Method for determining interpersonal relationship influence information using textual content from interpersonal interactions
CN107295607A (en) Method and apparatus for connecting WAP
CN107634947A (en) Limitation malice logs in or the method and apparatus of registration
US11398163B2 (en) Secure computer-implemented execution and evaluation of programming assignments for on demand courses
CN110225104A (en) Data capture method, device and terminal device
CN109992732A (en) Information sharing method, device, electronic equipment and storage medium
CN109947408A (en) Information push method and device, storage medium and electronic equipment
CN109284198A (en) A kind of method and apparatus verifying data
CN109582407A (en) Tabulating equipment frame
CN107295067A (en) Across the method and apparatus of screen identification user
CN108933823A (en) User's touching reaches method and apparatus
CN109471976A (en) Processing method, device, electronic equipment and the storage medium of web page operation data
CN108959642A (en) Method and apparatus for information to be written
CN108629619A (en) Use the motivational techniques, system and server of sharing articles
CN108702334A (en) The method and system of distributed testing for the network configuration for zero rate
CN109800378A (en) Content processing method, device and electronic equipment based on custom browser
CN109684819A (en) Data verification method and device
CN108804501A (en) A kind of method and device of detection effective information
CN110348438A (en) A kind of picture character identifying method, device and electronic equipment based on artificial nerve network model
CN110213281A (en) Safety protecting method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190426

RJ01 Rejection of invention patent application after publication