CN110298691A - Legality identification method, device and electronic equipment - Google Patents

Legality identification method, device and electronic equipment Download PDF

Info

Publication number
CN110298691A
CN110298691A CN201910498639.XA CN201910498639A CN110298691A CN 110298691 A CN110298691 A CN 110298691A CN 201910498639 A CN201910498639 A CN 201910498639A CN 110298691 A CN110298691 A CN 110298691A
Authority
CN
China
Prior art keywords
coding
target
code
verification code
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910498639.XA
Other languages
Chinese (zh)
Inventor
张伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN201910498639.XA priority Critical patent/CN110298691A/en
Publication of CN110298691A publication Critical patent/CN110298691A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0211Determining the effectiveness of discounts or incentives
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0225Avoiding frauds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Game Theory and Decision Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a kind of legality identification method, device and electronic equipment, and a specific embodiment of the method comprises determining that corresponding first coding of target verification code, the second coding and third coding;Obtain the corresponding target computational algorithm of first coding;Second coding is calculated according to the target computational algorithm, obtains target code;Legitimacy based on target verification code described in the target code and the third encoding verification.The embodiment can realize legitimate verification without storing mass data, when carrying out legitimate verification, without the mass data of traversal storage.A large amount of storage resource is not only saved, and improves verification efficiency.

Description

Legality identification method, device and electronic equipment
Technical field
This application involves technical field of internet application, in particular to a kind of legality identification method, device and electronics are set It is standby.
Background technique
For at present, in technical field of internet application, in order to identify the false data of malice, many business need to carry out Legitimate verification.For example, needing to carry out legitimacy to discount coupon or coupons to test in the use process of discount coupon or coupons Card.In another example needing the request to client to carry out legitimate verification after server receives the request of client.In phase In the technology of pass, usually valid data is stored, and legitimate verification is carried out based on the valid data prestored.But this Kind mode needs to store mass data, not only occupies a large amount of storage resource, but also verification efficiency is lower.
Summary of the invention
In order to solve the above-mentioned technical problem one of, the application provides a kind of legality identification method, device and electronic equipment.
According to the embodiment of the present application in a first aspect, providing a kind of legality identification method, comprising:
Determine corresponding first coding of target verification code, the second coding and third coding;
Obtain the corresponding target computational algorithm of first coding;
Second coding is calculated according to the target computational algorithm, obtains target code;
Legitimacy based on target verification code described in the target code and the third encoding verification.
Optionally, corresponding first coding of the determining target verification code, the second coding and third coding, comprising:
Determine that preset extracting rule, the extracting rule include for extracting the rule of first coding, for mentioning Take the rule of second coding and the rule for extracting the third coding;
Extracted from the target verification code according to the extracting rule it is described first coding, it is described second coding and it is described Third coding.
Optionally, the legitimacy based on target verification code described in the target code and the third encoding verification, Include:
If the target code is identical as the third coding, determine that the target verification code is legal;
If the target code is different from third coding, determine that the target verification code is illegal.
Optionally, it encodes, before the second coding and third coding in the determining target verification code corresponding first, also wraps It includes:
Destination request is received, the destination request carries the target verification code;
It is described based on the legitimacy of target verification code described in the target code and the third encoding verification after, also Include:
If the target verification code is legal, the target interface of the destination request access is determined;
If the target interface is preset interface, the corresponding service configuration information of the target interface is obtained;And
Obtain the history access data of the corresponding account of the destination request;
Legitimacy based on destination request described in the service configuration information and history access data verification;
If the destination request is legal, the operation for responding the destination request is executed.
Optionally, the conjunction based on destination request described in the service configuration information and history access data verification Method, comprising:
The corresponding whole basic business requests of the target interface are obtained from the service configuration information;
If the history access data include all basic business requests, determine that the destination request is legal;
If the history access data do not include all basic business requests, determine that the destination request is illegal.
Optionally, the method also includes:
Receive the device code sent by target account and the corresponding original coding of the device code;
The original coding is decrypted using default decipherment algorithm, obtains restoring code;
If the restoring code is consistent with the device code, it is based on the original coding, is generated for the target account Legal target verification code;
Send the legal target verification code for being directed to the target account.
Optionally, legal target verification code is based on corresponding first coding of the target verification code, the second coding and third Coding, generates according to preset coding rule;Wherein, which is encoded to be calculated using the corresponding target of the first coding and be calculated The result that second coding is calculated in method.
According to the second aspect of the embodiment of the present application, a kind of legitimate verification device is provided, comprising:
First determining module, for determining corresponding first coding of target verification code, the second coding and third coding;
First obtains module, for obtaining the corresponding target computational algorithm of first coding;
Computing module obtains target code for calculating according to the target computational algorithm second coding;
First authentication module, for the conjunction based on target verification code described in the target code and the third encoding verification Method.
According to the third aspect of the embodiment of the present application, a kind of computer readable storage medium is provided, the storage medium is deposited Computer program is contained, the computer program realizes side described in any one of above-mentioned first aspect when being executed by processor Method.
According to the fourth aspect of the embodiment of the present application, a kind of electronic equipment is provided, including memory, processor and be stored in On memory and the computer program that can run on a processor, the processor realize above-mentioned first party when executing described program Method described in any one of face.
The technical solution that embodiments herein provides can include the following benefits:
The legality identification method and device that embodiments herein provides pass through corresponding first coding of target verification code It determines target computational algorithm, according to target computational algorithm the second coding corresponding to target verification code carries out that target volume is calculated Code, and legitimate verification is carried out based on target code and the corresponding third coding of target verification code.It is therefore not necessary to store a large amount of numbers According to that can realize legitimate verification, when carrying out legitimate verification, without the mass data of traversal storage.It not only saves A large amount of storage resource, and improve verification efficiency.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The application can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the application Example, and together with specification it is used to explain the principle of the application.
Fig. 1 is the exemplary system architecture schematic diagram using the embodiment of the present application;
Fig. 2 is a kind of the application flow chart of legality identification method shown according to an exemplary embodiment;
Fig. 3 is the flow chart of the application another legality identification method shown according to an exemplary embodiment;
Fig. 4 is the flow chart of the application another legality identification method shown according to an exemplary embodiment;
Fig. 5 is a kind of the application block diagram of legitimate verification device shown according to an exemplary embodiment;
Fig. 6 is the block diagram of the application another legitimate verification device shown according to an exemplary embodiment;
Fig. 7 is the block diagram of the application another legitimate verification device shown according to an exemplary embodiment;
Fig. 8 is the block diagram of the application another legitimate verification device shown according to an exemplary embodiment;
Fig. 9 is the block diagram of the application another legitimate verification device shown according to an exemplary embodiment;
Figure 10 is the structural schematic diagram of the application a kind of electronic equipment shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the application.
It is only to be not intended to be limiting the application merely for for the purpose of describing particular embodiments in term used in this application. It is also intended in the application and the "an" of singular used in the attached claims, " described " and "the" including majority Form, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein refers to and wraps It may be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application A little information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not departing from In the case where the application range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determination ".
Referring to Fig. 1, for using the exemplary system architecture schematic diagram of the embodiment of the present application:
As shown in Figure 1, system architecture 100 may include terminal device 101,102, network 103 and server 104.It should Understand, the number or type of terminal device, network and server in Fig. 1 are only schematical.It, can be with according to needs are realized Terminal device, network and server with arbitrary number or type.
Network 103 between terminal device, server for providing the medium of communication link.Network 103 may include each Kind connection type, such as wired, wireless communication link or fiber optic cables etc..
Terminal device 101,102 can be interacted by network 103 with server, to receive or send request or information Deng.Terminal device 101,102 can be various electronic equipments, and including but not limited to smart phone, tablet computer, intelligence wearing is set Standby, laptop portable computer and desktop computer etc..
Server 104 can be to provide the server of various services.Server can store the data received, The processing such as analysis can also send control command or request etc. to terminal device or other servers.Server can respond In user service request and service is provided.It is appreciated that a server can provide one or more services, same clothes Business can also be provided by multiple servers.
Based on system architecture shown in fig. 1, in the embodiment of the present application, terminal device 101 or terminal device 102 can pass through Network 103 sends checking request to server 104, which carries target verification code to be verified, and server 104 receives To after above-mentioned checking request, target verification code can be obtained from the checking request, and determine target verification code corresponding first Coding, the second coding and third coding.Then, the corresponding target computational algorithm of the first coding is obtained, according to target computational algorithm Second coding is calculated, target code is obtained.Finally, target code and third encoding verification target verification code can be based on Legitimacy.
The application is described in detail below in conjunction with specific embodiments.
As shown in Fig. 2, Fig. 2 is a kind of flow chart of legality identification method shown according to an exemplary embodiment, it should Method can be applied in server.Method includes the following steps:
In step 201, corresponding first coding of target verification code, the second coding and third coding are determined.
In the present embodiment, target verification code is identifying code to be verified, and target verification code can be mounted to terminal and set Standby upper client is sent to identifying code entrained in the request of server.For example, under a kind of application scenarios, target verification Code can be the discount coupon number provided by customer or coupons number of client transmission etc..In another example in another applied field Under scape, target verification code is also possible to the identifying code that header parameter includes in the destination request of client transmission.It is appreciated that mesh Mark identifying code can also be other identifying codes for verifying, and the application to not limiting in this respect.
In the present embodiment, legal target verification code is to compile according to preset coding rule to predetermined first Code, the second coding and third coding are handled and are generated.Wherein, third coding can be compiles according to the first coding and second What code obtained.Specifically, it can use target computational algorithm corresponding to the first coding, the second coding calculated, root Determine that third encodes according to the result of calculating.For example, can be encoded the result of the calculating as third.It can also be to the calculating As a result it is simply handled and (e.g., according to preset arrangement mode, adjusts sequence etc. digital in the result of the calculating), will be located Result after reason is encoded as third.Therefore, the first coding, the second coding corresponding to legal target verification code and third are compiled Between code, above-mentioned calculated relationship can satisfy.
In the present embodiment, the first coding, the second coding corresponding to the target verification code received can be determined first It is encoded with third.It is then possible to encode it by verifying the first coding, the second coding corresponding to the target verification code and third Between, if meet above-mentioned calculated relationship, to judge whether the target verification code is legal.Specifically, such as lower section can be passed through Formula determines the first coding, the second coding corresponding to the target verification code received and third coding: can determine preset mention Rule is taken, which may include for extracting the rule of the first coding, for extracting the second rule and use encoded In the rule for extracting third coding.It is corresponding that the target verification code is extracted from above-mentioned target verification code according still further to the extracting rule First coding, the second coding and third coding.
In step 202, the corresponding target computational algorithm of the first coding is obtained.
In one implementation, it can set different calculating in advance for every kind of first coding that may be present and calculate Method, and every kind of first coding that may be present is stored with being associated with corresponding computational algorithm.When determining target verification code After corresponding first coding, can be obtained from the data prestored and first encode associated computational algorithm with this, as this first Encode corresponding target computational algorithm.
For example, it may be possible to which existing first coding includes 1,2 and 3, it can be directed to 1 setup algorithm algorithm A, counted for 2 settings Algorithm B is calculated, for 3 setup algorithm algorithm C.It is then possible to which 1 and computational algorithm A is stored with being associated, 2 and calculating are calculated Method B is stored with being associated, and 3 and computational algorithm C is stored with being associated.If it is determined that corresponding first coding of target verification code Be 2, then can be obtained from the data prestored with 2 associated computational algorithm B, as target computational algorithm.
In another implementation, different meters can also be set first against every kind of first coding that may be present Calculate algorithm.Then, every kind of first coding that may be present is encrypted, obtains the corresponding ciphertext data of the first coding.For Every kind of first coding that may be present, by the corresponding ciphertext data of the first coding computational algorithm corresponding with first coding into Row associatedly stores.After determining that target verification code corresponding first encodes, can first corresponding to target verification code first it compile Code is encrypted, then the computational algorithm with obtained ciphertext data correlation is obtained from the data prestored, as first volume The corresponding target computational algorithm of code.
For example, it may be possible to which existing first coding includes 1,2 and 3, it can be directed to 1 setup algorithm algorithm A, counted for 2 settings Algorithm B is calculated, for 3 setup algorithm algorithm C.Then, it is encrypted respectively to 1,2 and 3, obtaining corresponding ciphertext data is respectively 7,8 and 9.7 and computational algorithm A can be stored with being associated, 8 and computational algorithm B is stored with being associated, by 9 and meter Algorithm C is calculated to store with being associated.If it is determined that target verification code corresponding first is encoded to 1, then can first be encrypted to 1, Obtain ciphertext data 7.Acquisition and 7 associated computational algorithm A from the data prestored again, as target computational algorithm.
In step 203, the second coding is calculated according to target computational algorithm, obtains target code.
In step 204, the legitimacy based on target code and third encoding verification target verification code.
In the present embodiment, it is possible, firstly, to second coding carry out that target volume is calculated according to target computational algorithm Code.For example, second is encoded to 631, target computational algorithm is that the number in each numerical digit is summed.Therefore, according to target meter It calculates algorithm to calculate second coding, available target code 10.In another example second is encoded to 631, target, which calculates, to be calculated Method is that the difference of the number in adjacent numerical digit is summed.Therefore, second coding is calculated according to target computational algorithm, can be obtained To target code 5.
It is then possible to verify the legal of target verification code based on target code and the corresponding third coding of target verification code Property.Specifically, in one implementation, if target code is identical as the third coding, it is determined that target verification code is legal. If target code is different from third coding, it is determined that target verification code is illegal.In another implementation, target is compiled Code is simply handled and (e.g., adjusts sequence etc. digital in the target code), will treated result and third coding It is compared.If should treated that result is identical as the third coding, it is determined that target verification code is legal.If being somebody's turn to do, treated is tied Fruit is different from third coding, it is determined that target verification code is illegal.
In the present embodiment, under a kind of application scenarios, target verification code is that being provided by customer for client transmission is excellent Favour certificate number or coupons number etc..If discount coupon number or coupons number are legal, illustrate discount coupon or coupons are effectively may be used , subsequent operation can be carried out further directed to discount coupon or coupons.
Under another application scenarios, target verification code is header parameter testing of including in destination request that client is sent Demonstrate,prove code.If identifying code is legal, illustrates that destination request is legitimate request, can further execute the behaviour of response destination request Make.
The legality identification method provided by the above embodiment of the application, it is true by corresponding first coding of target verification code Set the goal computational algorithm, according to target computational algorithm the second coding corresponding to target verification code carries out that target volume is calculated Code, and legitimate verification is carried out based on target code and the corresponding third coding of target verification code.It is therefore not necessary to store a large amount of numbers According to that can realize legitimate verification, when carrying out legitimate verification, without the mass data of traversal storage.It not only saves A large amount of storage resource, and improve verification efficiency.
As shown in figure 3, the flow chart of Fig. 3 another legality identification method shown according to an exemplary embodiment, it should Embodiment describes the process of corresponding first coding of determining target verification code, the second coding and third coding, and this method can be with Applied in server, comprising the following steps:
In step 301, determine preset extracting rule, the extracting rule include for extract first coding rule, Rule for extracting the rule of the second coding and for extracting third coding.
In step 302, the first coding, the second coding and third are extracted from target verification code according to the extracting rule to compile Code.
In the present embodiment, legal target verification code is to compile according to preset coding rule to predetermined first Code, the second coding and third coding are handled and are generated.Wherein, third coding can be compiles according to the first coding and second What code obtained.Specifically, it can use target computational algorithm corresponding to the first coding, the second coding calculated, root Determine that third encodes according to the result of calculating.For example, can be encoded the result of the calculating as third.It can also be to the calculating As a result it is simply handled and (e.g., according to preset arrangement mode, adjusts sequence etc. digital in the result of the calculating), will be located Result after reason is encoded as third.Therefore, the first coding, the second coding corresponding to legal target verification code and third are compiled Between code, above-mentioned calculated relationship can satisfy.
In the present embodiment, preset extracting rule can be rule corresponding with above-mentioned preset coding rule.Example Such as, the first coding, the second coding and third coding are predefined, wherein the digit of the first coding is 1, the digit of the second coding It is 6, the digit of third coding is 2.Preset coding rule can be by first coding, second coding and third coding successively into Row arrangement, to generate legal identifying code.Legal the 1st digit of identifying code is the first coding, and 2-7 digit is the second volume Code, 8-9 digit are third coding.Then extracting rule corresponding with the coding rule, which can be, extracts the of target verification code 1 digit extracts the 2-7 digit of target verification code as the target verification code as corresponding first coding of the target verification code Corresponding second coding extracts the 8-9 digit of target verification code as the corresponding third coding of the target verification code.
The second coding, third coding and the first coding are successively arranged in another example preset coding rule can also be Column, to generate legal identifying code.The legal identifying code 1-6 digit is the second coding, and 7-8 digit is third volume Code, the 9th digit are the first coding.Then extracting rule corresponding with the coding rule can be the 1- for extracting target verification code 6 digits extract the 7-8 digit of target verification code as the target verification code as corresponding second coding of the target verification code Corresponding third coding extracts the 9th digit of target verification code as corresponding first coding of the target verification code.It can manage Solution, preset coding rule and preset extracting rule can also be other any reasonable rules, and the application is to preset volume It is not limited in terms of the particular content of code rule and preset extracting rule.
In the present embodiment, target verification code corresponding first can be extracted from target verification code according to the extracting rule Coding, the second coding and third coding.
In step 303, the corresponding target computational algorithm of the first coding is obtained.
In step 304, the second coding is calculated according to target computational algorithm, obtains target code.
In step 305, the legitimacy based on target code and third encoding verification target verification code.
It should be noted that no longer going to live in the household of one's in-laws on getting married in above-mentioned Fig. 2 embodiment for the step identical with Fig. 3 embodiment It states, related content can be found in Fig. 2 embodiment.
The legality identification method provided by the above embodiment of the application passes through the preset extracting rule of determination, the extraction Rule includes for extracting the rule of the first coding, the rule for extracting the second coding and the rule for extracting third coding Then, the first coding, the second coding and third coding are extracted from target verification code according to the extracting rule.Obtain the first coding pair The target computational algorithm answered is calculated the second coding according to target computational algorithm, obtains target code, and compiled based on target The legitimacy of code and third encoding verification target verification code.It not only facilitates and saves a large amount of storage resource, and further mention High verification efficiency.
As shown in figure 4, the flow chart of Fig. 4 another legality identification method shown according to an exemplary embodiment, it should The process verified to destination request is described in detail in embodiment, and this method can be applied in server, including following step It is rapid:
In step 401, destination request is received, which carries target verification code.
In the present embodiment, since some requests that server receives are related to interests, for example, the request of neck red packet, or Person robs the request of discount coupon, or gets the request etc. of task reward.Accordingly, it is possible to which it is non-to server transmission to have malicious user Method request, to obtain unlawful interests.So server needs to carry out legitimate verification to the request for being related to interests received.
In the present embodiment, the received destination request of server can be is sent by the client being installed on terminal device , target verification code is carried in the header parameter of the destination request.If the target verification code is legal, which is tested Card code can be based on device code corresponding to the terminal device and generate.
In step 402, corresponding first coding of target verification code, the second coding and third coding are determined.
In step 403, the corresponding target computational algorithm of the first coding is obtained.
In step 404, the second coding is calculated according to target computational algorithm, obtains target code.
In step 405, the legitimacy based on target code He the third encoding verification target verification code.
In a step 406, if target verification code is legal, the target interface of destination request access is determined.
In step 407, if target interface is preset interface, the corresponding service configuration information of target interface is obtained.
In the present embodiment, preset interface can be related to interests sensitive kind interface (e.g., get the interface of reward, Or get the interface etc. of integral).When determining that target verification code is legal, the target of destination request access may further determine that Interface, and judge whether target interface is to be related to the preset interface of interests.If target interface is preset interface, available mesh The corresponding service configuration information of tag splice mouth, the service configuration information may include the corresponding whole basic business requests of target interface Etc. information.The corresponding whole basic business requests of target interface can be before access target interface, it is necessary to carry out Request.For example, before requesting access to target interface C, it is necessary to have requested that and access interface A and interface B, then requesting access to The service request of interface A and the service request for requesting access to interface B, the corresponding whole basic business requests of as target interface C.
In a step 408, the history for obtaining the corresponding account of destination request accesses data.
In the present embodiment, the history of the corresponding account of available destination request accesses data, which accesses data It may include the corresponding account of destination request in preset historical period, all access data of progress.For example, the history is visited Ask that data may include the total interface etc. that the corresponding account of destination request accessed in preset historical period.
In step 409, the legal of data verification destination request is accessed based on above-mentioned service configuration information and above-mentioned history Property.
In the present embodiment, data verification destination request can be accessed based on above-mentioned service configuration information and above-mentioned history Legitimacy.Specifically, the corresponding whole basic business requests of target interface can be obtained from above-mentioned service configuration information, if Above-mentioned history access data include whole basic business requests, then can determine that destination request is legal.If above-mentioned history access number According to not including whole basic business requests, then it can determine that destination request is illegal.
For example, client sends destination request to server by account first, to request access to target interface C.And it is asking Before seeking access target interface C, it is necessary to have requested that and access interface A and interface B, then the business for requesting access to interface A is asked Summation requests access to the service request of interface B, the corresponding whole basic business requests of as target interface C.Available account The history of first accesses data, can access data according to the history of account first, determine whether account first has requested that access and connect Mouth A and interface B.If account first, which has requested that, accessed interface A and interface B, illustrate that destination request is legal.If account first Any one in interface A and interface B is skipped, direct request access target interface C then illustrates that destination request is illegal.
In step 410, if destination request is legal, the operation of response destination request is executed.
In the present embodiment, if it is determined that destination request is legal, then can further execute the operation of response destination request.
It should be noted that for the step identical with Fig. 2 and Fig. 3 embodiment, in above-mentioned Fig. 4 embodiment no longer into Row repeats, and related content can be found in Fig. 2 and Fig. 3 embodiment.
The legality identification method provided by the above embodiment of the application, in the mesh for determining that the destination request received carries When mark identifying code is legal, further judge whether the target interface of destination request access is preset interface, and be in target interface When preset interface, data are accessed based on the history of the corresponding service configuration information of target interface and the corresponding account of destination request, Further whether verifying destination request is legal, so as to save a large amount of storage resource, under the premise of improving verification efficiency, Further filter out the spurious requests of part malice.
In some optional embodiments, on the basis of Fig. 4 embodiment, this method can also include: that reception passes through mesh The device code original coding corresponding with the device code that account is sent is marked, original coding is solved using default decipherment algorithm It is close, obtain restoring code.If the restoring code is consistent with the device code, it is based on the original coding, is generated for the legal of target account Target verification code, and send be directed to target account legal target verification code.
In the present embodiment, it when first logging into the target account of client on a terminal device, can obtain first The device code (for example, MAC Address of terminal device or the equipment Serial Number of terminal device etc.) of the terminal device.Then, it adopts It is encrypted with device code of the predetermined encryption algorithm to the terminal device, obtains the corresponding original coding of the device code, and pass through The device code that target account sends the terminal device to server original coding corresponding with the device code.
In the present embodiment, it is corresponding with the device code original to receive the device code sent by target account for server After coding, the original coding can be decrypted using default decipherment algorithm, obtain restoring code.Wherein, decipherment algorithm is preset For decipherment algorithm corresponding with predetermined encryption algorithm.Therefore, if device code original coding corresponding with the device code is legal, The restoring code that then original coding is decrypted using default decipherment algorithm, it should consistent with the device code.If really Fixed above-mentioned restoring code is consistent with the device code, and server can generate the legal target for being directed to target account based on original coding Identifying code, and above-mentioned legal target verification code is sent to the terminal device for having logged in client objectives account.
Specifically, the legal target verification for being directed to target account can be generated based on original coding in the following way Code: it is possible, firstly, to obtain the first coding and the second coding based on original coding.For example, in original coding first can be preset Number in numerical digit is extracted as the first coding, and the number in the in original coding second default numerical digit is extracted as the second coding.In another example Number in original coding first default numerical digit can also be carried out to simple operation as the first coding, by original coding second Number in default numerical digit carries out simple operation as the second coding.It is appreciated that other any reasonable manners can also be passed through The first coding and the second coding are obtained based on original coding, the application is encoded to acquisition first and the concrete mode side of the second coding Face does not limit.
Then, the corresponding target computational algorithm of available first coding, and calculated using the corresponding target of the first coding Algorithm calculates the second coding, determines that third encodes based on the result being calculated.By the first coding, the second coding and the Three codings are handled according to preset coding rule, generate the legal target verification code for being directed to target account.
In the present embodiment, the terminal device for having logged in client objectives account is tested receiving above-mentioned legal target After demonstrate,proving code, above-mentioned legal target verification code can be stored with being associated with target account.In the terminal after user When sending request to server by the target account of client in equipment, it is legal this to be carried in the header parameter of the request Target verification code, so that server carries out legitimate verification.
Since the present embodiment is receiving the device code sent by target account original coding corresponding with the device code Afterwards, one-time authentication is carried out first, after one-time authentication passes through, can be generated and sent based on above-mentioned original coding for target account Number legal target verification code.Because the original coding is coding obtained from being encrypted for the device code, increase The safety of target verification code is added.
Although should be noted that in the above-described embodiments, the operation of the application method is described with particular order, this These operations must be executed in this particular order by not requiring that or implying, or is had to carry out and operated just shown in whole It is able to achieve desired result.On the contrary, the step of describing in flow chart can change and execute sequence.It additionally or alternatively, can be with Certain steps are omitted, multiple steps are merged into a step and are executed, and/or a step is decomposed into execution of multiple steps.
Below with reference to a complete application example, application scheme is schematically illustrated.
Application scenarios can be with are as follows: the granting and use process of discount coupon.
Specifically, the distribution process of discount coupon is as follows: firstly, server obtains the original coding of discount coupon to be provided, What the original coding can be randomly generated, it is also possible to according to specified rule generation.Then, server can be original from this The first coding and the second coding are extracted in coding.For example, if original coding is 123456, it can be by the 1st of the original coding Number 1 is as the first coding, by the 2-6 digit 23456 of the original coding as the second coding.
Then, server, which can be found, encodes associated target computational algorithm M with first, utilizes target computational algorithm M Second coding is calculated, and determines that third encodes based on the result of calculating.For example, target computational algorithm M is by every number Number on position is summed, and second is encoded to 23456.Then the second coding is calculated using target computational algorithm M, can be obtained To 20, directly 20 can be encoded as third.
Finally, can according to preset coding rule, to predetermined first coding, the second coding and third encode into Row processing, to generate legal coupon code.For example, first is encoded to 1, second is encoded to 23456, and third is encoded to 20, Preset coding rule is that the 1st digit is the first coding, and 2-6 digit is the second coding, and 7-8 digit is third coding.Then It is 12345620 that legal coupon code, which can be generated,.The legal coupon code of generation can be delivered to legal use by server The account at family, with for users to use.
Discount coupon use process is as follows: customer can provide coupon code to businessman when using discount coupon, and will be excellent Favour certificate code is input to merchant client, and coupon code can be sent to server and verified by merchant client.Server connects After receiving coupon code, using coupon code as target verification code, it is corresponding that target verification code is extracted according to preset extracting rule First coding, second coding and third coding.The preset extracting rule is corresponding with above-mentioned preset coding rule, example Such as, if target verification code is 12345620, preset coding rule is that the 1st digit is the first coding, and 2-6 digit is the second volume Code, 7-8 digit are third coding.Then the preset extracting rule is to extract the 1st digit of target verification code as the first volume Code extracts the 2-6 digit of target verification code as the second coding, and the 7-8 digit for extracting target verification code is compiled as third Code.Therefore, corresponding first coding of target verification code, the second coding and third coding are respectively 1,23456 and 20.
Then, available target computational algorithm M corresponding with the first coding is compiled using target computational algorithm M to second Code be calculated target code, and based on obtaining the legitimacy of target code and third encoding verification target verification code.Example Such as, target computational algorithm M is that the number in each numerical digit is summed, and is counted using target computational algorithm M to the second coding It calculates, available target code 20.Target code 20 and third coding 20 are compared, can determine target code and third Encode it is identical, hence, it can be determined that target verification code is legal.Target verification code is legal to illustrate that customer provides coupon code to businessman Be it is legal effective, can be used, server can further execute preferential operation accordingly according to the discount coupon.
As it can be seen that can realize legitimate verification without storing mass data using above scheme, tested carrying out legitimacy When card, without the mass data of traversal storage.A large amount of storage resource is not only saved, and improves verification efficiency.
Below with reference to another complete application example, application scheme is schematically illustrated.
Application scenarios can be with are as follows: gets the request checking procedure of task reward.
Specifically, the generating process of legal identifying code is as follows: firstly, first logging into client on terminal device S When target account, the device code E of terminal device S can be obtained first.Then, device code E is carried out using predetermined encryption algorithm Encryption obtains corresponding original coding F, and passes through target account to server sending device code E and original coding F.
Then, server can solve original coding F using default decipherment algorithm corresponding with predetermined encryption algorithm It is close, if the obtained restoring code of decryption is identical with device code E, original coding F can be based further on, extract the first coding with Second coding.
Finally, server, which can be found, encodes associated target computational algorithm N with first, target computational algorithm N is utilized Second coding is calculated, and determines that third encodes based on the result of calculating.It can be according to preset coding rule, to first Coding, the second coding and third coding are handled, to generate the legal identifying code H for being directed to target account.Server can Legal identifying code H is back to terminal device S.
The process for getting task reward is as follows: user is by the target account of the terminal device S client logged in, to service Device sends the destination request for getting task reward, carries identifying code H in the header parameter of the destination request.Server receives mesh After mark request, identifying code H is taken out from the header parameter of destination request, and extract target verification code according to preset extracting rule Corresponding first coding, the second coding and third coding, the preset extracting rule are corresponding with above-mentioned preset coding rule.
Then, available target computational algorithm N corresponding with the first coding is compiled using target computational algorithm N to second Code be calculated target code, and based on obtaining the legitimacy of target code and third encoding verification identifying code H.Work as determination When identifying code H is legal, then it may further determine that the target interface P of destination request access.Target interface P is for getting task The interface of reward, therefore, to be related to the sensitive kind interface of interests.It is therefore desirable to further obtain the corresponding industry of target interface P Business configuration information, the service configuration information may include the information such as the corresponding whole basic businesses requests of target interface P.It gets and appoints The precondition of business reward is must to submit completion task a and task b, and therefore, the corresponding whole basic businesses of target interface P are asked It asks the request including submitting completion task a and submits the request of completion task b.
Then, the history of the available target account of server accesses data, and it includes target account which, which accesses data, In preset historical period, all access data of progress.Whether can search in history access data includes having submitted At the request of task a and the request of submission completion task b.If it includes submitting completion task a's in data that the history, which accesses, Request, and the request including submitting completion task b can then determine that destination request is legitimate request, and server can be to target Account provides corresponding reward.Conversely, can then determine that destination request is illegal request, server can be refused to target account Number provide reward.
As it can be seen that using above scheme a large amount of storage resource can be being saved, under the premise of improving verification efficiency, into one Step filters out the spurious requests of part malice.
Corresponding with aforementioned legality identification method embodiment, present invention also provides the implementations of legitimate verification device Example.
As shown in figure 5, Fig. 5 is a kind of the application legitimate verification device block diagram shown according to an exemplary embodiment, The apparatus may include: the first determining module 501, first obtains module 502, computing module 503 and the first authentication module 504.
Wherein, the first determining module 501, for determining corresponding first coding of target verification code, the second coding and third Coding.
First obtains module 502, for obtaining the corresponding target computational algorithm of the first coding.
Computing module 503 obtains target code for calculating according to target computational algorithm the second coding.
First authentication module 504, for the legitimacy based on target code and third encoding verification target verification code.
As shown in fig. 6, Fig. 6 is the application another legitimate verification device frame shown according to an exemplary embodiment Figure, for the embodiment on the basis of aforementioned embodiment illustrated in fig. 5, the first determining module 501 may include: the first determining submodule 601 and extracting sub-module 602.
Wherein, first submodule 601 is determined, for determining preset extracting rule, which includes for extracting The rule of first coding, the rule for extracting the second coding and the rule for extracting third coding.
Extracting sub-module 602, for is extracted from target verification code according to the extracting rule first coding, second encode and Third coding.
As shown in fig. 7, Fig. 7 is the application another legitimate verification device frame shown according to an exemplary embodiment Figure, for the embodiment on the basis of aforementioned embodiment illustrated in fig. 5, the first authentication module 504 may include: the first verifying submodule 701 and second verify submodule 702.
Wherein, the first verifying submodule 701, for determining target verification code when target code is identical as third coding It is legal.
Second verifying submodule 702, for determining that target verification code does not conform to when target code is different from third coding Method.
As shown in figure 8, Fig. 8 is the application another legitimate verification device frame shown according to an exemplary embodiment Figure, on the basis of aforementioned embodiment illustrated in fig. 5, which can further include the embodiment: the first receiving module 505, the second determining module 506, second obtains module 507, and third obtains module 508, the second authentication module 509 and execution module 510。
Wherein, the first receiving module 505, for receiving destination request, which carries target verification code.
Second determining module 506, for when target verification code is legal, determining the target interface of destination request access.
Second obtains module 507, for obtaining the corresponding business configuration of target interface when target interface is preset interface Information.
Third obtains module 508, and the history for obtaining the corresponding account of destination request accesses data.
Second authentication module 509, for accessing data verification destination request based on the service configuration information and the history Legitimacy.
Execution module 510, for executing the operation of response destination request when destination request is legal.
As shown in figure 9, Fig. 9 is the application another legitimate verification device frame shown according to an exemplary embodiment Figure, for the embodiment on the basis of aforementioned embodiment illustrated in fig. 8, the second authentication module 509 may include: acquisition submodule 901, Second determines that submodule 902 and third determine submodule 903.
Wherein, acquisition submodule 901, for obtaining the corresponding all bases of target interface from above-mentioned service configuration information Service request.
Second determines submodule 902, for determining mesh when above-mentioned history access data include whole basic business requests Mark request is legal.
Third determines submodule 903, for determining when above-mentioned history access data do not include whole basic businesses request Destination request is illegal.
In some optional embodiments, which be can further include: the second receiving module, deciphering module, raw At module and sending module (not shown).
Wherein, the second receiving module, for receiving the device code sent by target account original corresponding with the device code Begin coding.
Deciphering module, for original coding to be decrypted to obtain restoring code using default decipherment algorithm.
Generation module generates the conjunction for being directed to target account for being based on original coding when restoring code is consistent with device code The target verification code of method.
Sending module, for sending the legal target verification code for being directed to target account.
In other optional embodiments, legal target verification code is based on the target verification code corresponding first and compiles Code, the second coding and third coding, generate according to preset coding rule.Wherein, which, which is encoded to, utilizes first volume The result that second coding is calculated in the corresponding target computational algorithm of code.
It should be appreciated that above-mentioned apparatus can be preset in the server, can also be loaded by modes such as downloadings In server.Corresponding module in above-mentioned apparatus can cooperate with the module in server to realize legitimate verification side Case.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual The purpose for needing to select some or all of the modules therein to realize application scheme.Those of ordinary skill in the art are not paying Out in the case where creative work, it can understand and implement.
The embodiment of the present application also provides a kind of computer readable storage medium, which is stored with computer journey Sequence, computer program can be used for executing the legality identification method that above-mentioned Fig. 2 is provided to Fig. 4 any embodiment.
Corresponding to above-mentioned legality identification method, the embodiment of the present application also proposed shown in Fig. 10 according to the application's The schematic configuration diagram of the electronic equipment of one exemplary embodiment.Referring to FIG. 10, the electronic equipment includes processing in hardware view Device, internal bus, network interface, memory and nonvolatile memory are also possible that required for other business hard certainly Part.Processor from read in nonvolatile memory corresponding computer program into memory then run, on logic level Form legitimate verification device.Certainly, other than software realization mode, other implementations are not precluded in the application, such as Logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is not limited to each Logic unit is also possible to hardware or logical device.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the application Its embodiment.This application is intended to cover any variations, uses, or adaptations of the application, these modifications, purposes or Person's adaptive change follows the general principle of the application and including the undocumented common knowledge in the art of the application Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the application are by following Claim is pointed out.
It should be understood that the application is not limited to the precise structure that has been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.Scope of the present application is only limited by the accompanying claims.

Claims (10)

1. a kind of legality identification method, which is characterized in that the described method includes:
Determine corresponding first coding of target verification code, the second coding and third coding;
Obtain the corresponding target computational algorithm of first coding;
Second coding is calculated according to the target computational algorithm, obtains target code;
Legitimacy based on target verification code described in the target code and the third encoding verification.
2. the method according to claim 1, wherein corresponding first coding of the determining target verification code, the Two codings and third coding, comprising:
Determine that preset extracting rule, the extracting rule include for extracting the rule of first coding, for extracting State the rule of the second coding and the rule for extracting the third coding;
First coding, second coding and the third are extracted from the target verification code according to the extracting rule Coding.
3. the method according to claim 1, wherein described tested based on the target code and third coding Demonstrate,prove the legitimacy of the target verification code, comprising:
If the target code is identical as the third coding, determine that the target verification code is legal;
If the target code is different from third coding, determine that the target verification code is illegal.
4. the method according to claim 1, wherein corresponding first coding of the determining target verification code, Before second coding and third coding, further includes:
Destination request is received, the destination request carries the target verification code;
It is described based on the legitimacy of target verification code described in the target code and the third encoding verification after, also wrap It includes:
If the target verification code is legal, the target interface of the destination request access is determined;
If the target interface is preset interface, the corresponding service configuration information of the target interface is obtained;And
Obtain the history access data of the corresponding account of the destination request;
Legitimacy based on destination request described in the service configuration information and history access data verification;
If the destination request is legal, the operation for responding the destination request is executed.
5. according to the method described in claim 4, it is characterized in that, described visited based on the service configuration information and the history Ask the legitimacy of destination request described in data verification, comprising:
The corresponding whole basic business requests of the target interface are obtained from the service configuration information;
If the history access data include all basic business requests, determine that the destination request is legal;
If the history access data do not include all basic business requests, determine that the destination request is illegal.
6. according to the method described in claim 4, it is characterized in that, the method also includes:
Receive the device code sent by target account and the corresponding original coding of the device code;
The original coding is decrypted using default decipherment algorithm, obtains restoring code;
If the restoring code is consistent with the device code, it is based on the original coding, is generated for the legal of the target account Target verification code;
Send the legal target verification code for being directed to the target account.
7. any method in -6 according to claim 1, which is characterized in that legal target verification code is based on the target and tests Corresponding first coding of code, the second coding and third coding are demonstrate,proved, is generated according to preset coding rule;Wherein, which compiles Code is the result that second coding is calculated using the corresponding target computational algorithm of the first coding.
8. a kind of legitimate verification device, which is characterized in that described device includes:
First determining module, for determining corresponding first coding of target verification code, the second coding and third coding;
First obtains module, for obtaining the corresponding target computational algorithm of first coding;
Computing module obtains target code for calculating according to the target computational algorithm second coding;
First authentication module, for based on the legal of target verification code described in the target code and the third encoding verification Property.
9. a kind of computer readable storage medium, which is characterized in that the storage medium is stored with computer program, the calculating Method described in any one of the claims 1-7 is realized when machine program is executed by processor.
10. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the processor realizes side described in any one of the claims 1-7 when executing described program Method.
CN201910498639.XA 2019-06-10 2019-06-10 Legality identification method, device and electronic equipment Pending CN110298691A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910498639.XA CN110298691A (en) 2019-06-10 2019-06-10 Legality identification method, device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910498639.XA CN110298691A (en) 2019-06-10 2019-06-10 Legality identification method, device and electronic equipment

Publications (1)

Publication Number Publication Date
CN110298691A true CN110298691A (en) 2019-10-01

Family

ID=68027798

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910498639.XA Pending CN110298691A (en) 2019-06-10 2019-06-10 Legality identification method, device and electronic equipment

Country Status (1)

Country Link
CN (1) CN110298691A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113421090A (en) * 2021-06-22 2021-09-21 康键信息技术(深圳)有限公司 Method, device, equipment and storage medium for issuing electronic vouchers
CN114978723A (en) * 2022-05-26 2022-08-30 中国电子信息产业集团有限公司第六研究所 Safety authentication method for programmable logic controller
CN117131489B (en) * 2023-08-31 2024-03-19 杭州峰景科技有限公司 Authority verification method, device and storage medium of offline electric welding machine

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281386A (en) * 2013-06-03 2013-09-04 复旦大学 Method for providing safety protection for item identification and an item resolution service
CN105450592A (en) * 2014-08-05 2016-03-30 阿里巴巴集团控股有限公司 Safety verification method and device, server and terminal
CN108965222A (en) * 2017-12-08 2018-12-07 翟红鹰 Identity identifying method, system and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281386A (en) * 2013-06-03 2013-09-04 复旦大学 Method for providing safety protection for item identification and an item resolution service
CN105450592A (en) * 2014-08-05 2016-03-30 阿里巴巴集团控股有限公司 Safety verification method and device, server and terminal
CN108965222A (en) * 2017-12-08 2018-12-07 翟红鹰 Identity identifying method, system and computer readable storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113421090A (en) * 2021-06-22 2021-09-21 康键信息技术(深圳)有限公司 Method, device, equipment and storage medium for issuing electronic vouchers
CN114978723A (en) * 2022-05-26 2022-08-30 中国电子信息产业集团有限公司第六研究所 Safety authentication method for programmable logic controller
WO2023226126A1 (en) * 2022-05-26 2023-11-30 中国电子信息产业集团有限公司第六研究所 Programmable logic controller security authentication method
CN117131489B (en) * 2023-08-31 2024-03-19 杭州峰景科技有限公司 Authority verification method, device and storage medium of offline electric welding machine

Similar Documents

Publication Publication Date Title
CN105512881B (en) A kind of method and terminal for completing payment based on two dimensional code
CN103581108B (en) Login authentication method, login authentication client, login authentication server and login authentication system
JP6574168B2 (en) Terminal identification method, and method, system, and apparatus for registering machine identification code
CN105164633B (en) The configuration and verifying carried out by trusted provider
CN112000951B (en) Access method, device, system, electronic equipment and storage medium
CN107493291A (en) A kind of identity identifying method and device based on safety element SE
CN106209749A (en) Single-point logging method and the processing method and processing device of device, relevant device and application
CN110298691A (en) Legality identification method, device and electronic equipment
CN111275419B (en) Block chain wallet signature right confirming method, device and system
CN107465660B (en) A kind of video flowing address method for authenticating and device
US20150256542A1 (en) User authentication
CN106302606B (en) Across the application access method and device of one kind
CN110535648A (en) Electronic certificate is generated and verified and key controlling method, device, system and medium
CN109086596A (en) The authentication method of application program, apparatus and system
CN106878250B (en) Cross-application single-state login method and device
CN106411950A (en) Block-chain transaction ID based authentication method, device and system
CN110011950A (en) A kind of method for authenticating and device of video flowing address
CN105635168A (en) Off-line transaction device and security key using method thereof
CN109842616A (en) Account binding method, device and server
CN109474600A (en) A kind of account binding method, system, device and its equipment
CN109815659A (en) Safety certifying method, device, electronic equipment and storage medium based on WEB project
CN111489164A (en) Electric power transaction method and device based on Internet of things identification and block chain and electronic equipment
CN109088890A (en) A kind of identity identifying method, relevant apparatus and system
CN109218334A (en) Data processing method, device, access control equipment, certificate server and system
CN110445751B (en) Distributed information sharing method and system based on re-encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination