Information verification method, system and device
A technology for information verification and environmental information, applied in the fields of systems and devices, and information verification methods, can solve the problems of information leakage and low security in user application systems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0112] This embodiment provides an information verification system, including a user terminal, a reverse proxy server, and a service server, see figure 1 As shown, a schematic diagram of an interaction flow of an information verification system provided by an embodiment of the present application includes the following steps:
[0113] Step 101: The user terminal receives the operation request, and sends the received operation request to the reverse proxy server.
[0114] The operation request may be input by the user through the user terminal.
[0115] Exemplarily, the operation request received by the user terminal may be that the user triggers an operation request button through the user terminal, such as clicking a login button.
[0116] Step 102: The reverse proxy server receives the operation request sent by the user terminal, generates operation indication information based on the operation request, and sends the operation indication information to the user terminal.
[...
Embodiment 2
[0186] This embodiment provides an information verification device, see Figure 4 As shown, a schematic structural diagram of the information verification apparatus 400 provided in this embodiment includes a first receiving module 401, a second receiving module 402, a first sending module 403, a second sending module 404, and a third sending module 405, specific:
[0187] The first receiving module 401 is configured to receive an operation request initiated by a user, and send the operation request to the reverse proxy server;
[0188] A second receiving module 402, configured to receive the operation indication information sent by the reverse proxy server according to the operation request;
[0189] a first sending module 403, configured to send environment information to the reverse proxy server based on the operation instruction information;
[0190] The second sending module 404 is configured to generate and send the secondary authentication information to the reverse pr...
Embodiment 3
[0220] Based on the same technical concept, the embodiment of the present application also provides an electronic device 600, which is applied to a user terminal. Image 6 As shown, a schematic structural diagram of an electronic device 600 provided in an embodiment of the present application includes a processor 601 , a memory 602 , and a bus 603 . Among them, the memory 602 is used to store the execution instructions, including the memory 6021 and the external memory 6022; the memory 6021 here is also called the internal memory, and is used to temporarily store the operation data in the processor 601 and the data exchanged with the external memory 6022 such as the hard disk, The processor 601 exchanges data with the external memory 6022 through the memory 6021. When the electronic device 600 is running, the processor 601 communicates with the memory 602 through the bus 603, so that the processor 601 executes the following instructions:
[0221] Receive an operation request i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


