Method and device for processing information

A technology for requesting information and configuring information, which is applied in the computer field, can solve problems such as potential safety hazards, and achieve the effect of reducing the risk of tampering or interception

Active Publication Date: 2019-01-04
XIAMEN ANSCEN NETWORK TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the user name and user password are intercepted d

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing information
  • Method and device for processing information
  • Method and device for processing information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0029] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0030] figure 1 An exemplary system architecture 100 to which the method for processing information or the device for processing information of the embodiments of the present application can be applied is shown.

[0031] Such as figure 1 As shown, the system architecture 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for processing information. The method comprises receiving verification request information sent by the client of a target user; responding to the fact thatthe verification request information comprises a user name, a request time, a user signature code and a client application code, and acquiring the preset configuration information of the target user;determining whether the verification request information is valid or not according to the request time, and responding to the determination that the verification request information is valid, determining whether the preset storage area comprises the user signature code; responding to the determination that the user signature code is not included, and storing the user signature code into the preset storage area, and calculating to obtain the server application code based on the user password, the request time and the user signature code; and responding to the determination that the server application code is matched with the client application code, and generating verification success information which is used for representing the verification request as a legal request. According to the embodiment, the risk that the information sent by the client side is tampered or intercepted is reduced.

Description

technical field [0001] The embodiments of the present application relate to the field of computer technologies, and in particular to methods and devices for processing information. Background technique [0002] With the development of network communication and information technology, information security in the network environment is becoming more and more important. However, most of the existing communication methods between the server and the client are transmitted in the form of an interface, which leads to information being easily leaked, tampered with, or deleted during transmission, which poses a great threat to information security. . Therefore, it is particularly important to adopt a safe verification technology in interface communication. [0003] In the existing API (Application Programming Interface, Application Programming Interface) signature authentication, the more commonly used verification method is to perform interface security verification through Token ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/108H04L63/12
Inventor 魏国庆陈贵民郑汉军黄惠海陈思德李剑煜邱峰兴郭任煌罗佳王毅宏
Owner XIAMEN ANSCEN NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products