Unlock instant, AI-driven research and patent intelligence for your innovation.

Information legality verification method and device, storage medium and electronic equipment

A verification method and legality technology, which is applied in the field of computer data processing, can solve problems such as low system security, and achieve the effect of improving security and ensuring security

Pending Publication Date: 2022-04-05
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present disclosure is to provide a method for verifying the legality of information, a device for verifying the legality of information, a computer-readable storage medium, and electronic equipment, so as to overcome the limitations and defects of related technologies at least to a certain extent. The problem of low security of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information legality verification method and device, storage medium and electronic equipment
  • Information legality verification method and device, storage medium and electronic equipment
  • Information legality verification method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details being omitted, or other methods, components, devices, steps, etc. may be adopted. In other instances, well-known technical solution...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an information legality verification method and device, a storage medium and electronic equipment, and relates to the technical field of computer data processing.The method comprises the steps that according to a request source and a target service included in a current service request, an external credible verification signature corresponding to the current service request is generated; according to the external credible verification signature and a preset internal service calling chain, generating an internal credible verification signature corresponding to the current service request, and writing the internal credible verification signature into the current service request to obtain a target service request; when the validity verification of the internal credible signature verification is passed, sending the target service request to an internal service group; and processing the target service request through the internal service group to obtain a current request execution result, and generating a target request execution result according to the external credible verification and the current request execution result after determining that the validity verification of the internal credible verification included in the current request execution result is passed. The security of the system is improved.

Description

technical field [0001] The embodiments of the present disclosure relate to the technical field of computer data processing, and in particular, to a method for verifying the validity of information, a device for verifying the validity of information, a computer-readable storage medium, and electronic equipment. Background technique [0002] In the existing service access, it can be realized in the following way: first, the client sends a service request to the gateway; when the gateway receives the service request, if the gateway handler mapping determines that the request matches the route, it will send it to the gateway secondly, after the web processing program receives the service request, it can execute the service request through the filter chain specific to the service request. [0003] In the specific application process, the filter can be divided into a pre-filter and a post-filter. That is to say, in the process of running the business request through the filter ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/40H04L67/133H04L12/66H04L67/02
Inventor 王延正
Owner CHINA TELECOM CORP LTD