CN113010792A - Authentication data information construction method, system, storage medium and electronic equipment - Google Patents

Authentication data information construction method, system, storage medium and electronic equipment Download PDF

Info

Publication number
CN113010792A
CN113010792A CN202110382754.8A CN202110382754A CN113010792A CN 113010792 A CN113010792 A CN 113010792A CN 202110382754 A CN202110382754 A CN 202110382754A CN 113010792 A CN113010792 A CN 113010792A
Authority
CN
China
Prior art keywords
data information
application
authentication
recommendation
authentication data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110382754.8A
Other languages
Chinese (zh)
Inventor
张琛
接钧靖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Mininglamp Software System Co ltd
Original Assignee
Beijing Mininglamp Software System Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Mininglamp Software System Co ltd filed Critical Beijing Mininglamp Software System Co ltd
Priority to CN202110382754.8A priority Critical patent/CN113010792A/en
Publication of CN113010792A publication Critical patent/CN113010792A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a construction method, a system, a storage medium and electronic equipment for identifying data information, wherein the construction method comprises the following steps: data information acquisition: collecting data information in a recommendation request applied by a user, and performing grouping processing on the data information according to the data information application to obtain application data information; a data information processing step: and merging and encrypting the use data information to obtain the authentication data information. The invention improves the safety and the applicability of the authentication data information.

Description

Authentication data information construction method, system, storage medium and electronic equipment
Technical Field
The invention belongs to the field of construction of identification data information, and particularly relates to a construction method, a construction system, a storage medium and electronic equipment of identification data information.
Background
One recommendation system can serve a plurality of users, for a system with a large number of commodities, one user initiates a recommendation request, and a plurality of commodities which meet the conditions are calculated through the recommendation system. Since a user only views one page of recommended content at a time, for example, 10 commodities, and then views one page at a time, the commodities obtained by the recommendation system operating once need to be cached, so that the user can look slowly.
The recommendation system needs a large number of users to be served, which results in a large number of cache contents, and an authentication data information is needed to correspond to a certain recommendation request of a certain user during caching, but how to design the authentication data information data which needs to be stored at the user side is a problem, and the safety needs to be ensured, the data volume is small, the transmission is convenient, and enough information is provided to distinguish different requests.
The prior art has the following ways to obtain authentication data information: 1. the user identity id is directly used as authentication data information without additional data; 2. and the application target and the time of the user application recommendation are used as authentication data information. However, in practical use, the user identity information is not enough to support the storage of various request contents, such as common commodity recommendation and promotion commodity recommendation; if the authentication data information is intercepted, the authentication data information can be used for forging user requests and synchronously checking user browsing information, and the security is not enough.
Disclosure of Invention
The embodiment of the application provides a construction method, a construction system, a storage medium and electronic equipment of authentication data information, and aims to at least solve the problems of safety and applicability of the existing authentication data information.
The invention provides a construction method of identification data information, which comprises the following steps:
data information acquisition: collecting data information in a recommendation request applied by a user, and performing grouping processing on the data information according to the data information application to obtain application data information;
a data information processing step: and merging and encrypting the use data information to obtain the authentication data information.
The above construction method, wherein the data information acquisition step includes:
a data information collection step: collecting the data information;
data information grouping step: grouping the data information according to the data information usage;
a usage data information obtaining step: and splicing the data information of each group to obtain the use data information corresponding to the group.
The above construction method, wherein the data information processing step includes:
merging the use data information: merging the at least two groups of corresponding use data information to obtain merged data information;
and a step of processing merged data information: carrying out Hash calculation on the merged data information and then carrying out encryption;
authentication data information obtaining step: and splicing the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
The above construction method, wherein the data information uses: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
The invention also provides a recommendation method, which comprises the construction method of any one of the above, and the recommendation method further comprises the following steps:
a distinguishing step: the authentication data information constructed by the construction method of any one of the above distinguishes different recommendation requests of the user.
The invention also provides a construction system of the authentication data information, wherein the authentication data information is used for distinguishing different recommendation requests, and the construction system comprises:
the data information acquisition module is used for collecting data information in a recommendation request applied by a user and carrying out grouping processing on the data information according to the data information application to obtain application data information;
and the data information processing module is used for merging and encrypting the data information for use to obtain the authentication data information.
The above construction system, wherein the data information collecting module comprises:
a data information collection unit that collects the data information;
a data information grouping unit that groups the data information according to the data information usage;
and the application data information acquisition unit splices the data information of each group to acquire the application data information corresponding to the group.
The above construction system, wherein the data information processing module comprises:
the application data information merging unit merges the application data information corresponding to at least two groups to obtain merged data information;
the merged data information processing unit encrypts the merged data information after performing hash calculation on the merged data information;
and the authentication data information obtaining unit splices the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
The above construction system, wherein the data information usage includes: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
The invention also provides a recommendation device, which comprises the construction system of any one of the above, and the recommendation device further comprises:
a distinguishing module: the authentication data information constructed by the construction system of any one of the above distinguishes different recommendation requests of users.
The present invention further includes an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the method for constructing the authentication data information according to any one of the above methods when executing the computer program.
The present invention also includes a storage medium having a computer program stored thereon, wherein the program, when executed by a processor, implements any of the above-described authentication data information construction methods.
The invention belongs to the technical field of recommendation. The invention has the beneficial effects that:
1. the encryption processing in the combined data information processing step can ensure the safe transmission of the user request and prevent the attack of a third party.
2. The combined data information processing step processes the data information through the Hash algorithm, so that the transmission data volume can be reduced, and the quick and efficient transmission can be realized.
3. The information attached in the identification data information of the invention has enough information to distinguish different recommendation requests.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application.
In the drawings:
FIG. 1 is a flow chart of a method of construction of authentication data information of the present invention;
FIG. 2 is a flow chart illustrating the substeps of step S1 in FIG. 1;
FIG. 3 is a flow chart illustrating the substeps of step S2 in FIG. 1;
FIG. 4 is a flow chart for constructing authentication data information;
FIG. 5 is a schematic diagram of the construction system of the authentication data information of the present invention;
FIG. 6 is a block diagram of an electronic device according to an embodiment of the invention;
FIG. 7 is a flow chart of a recommendation method;
fig. 8 is a schematic view of the structure of the recommending apparatus.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as referred to herein means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The present invention is described in detail with reference to the embodiments shown in the drawings, but it should be understood that these embodiments are not intended to limit the present invention, and those skilled in the art should understand that functional, methodological, or structural equivalents or substitutions made by these embodiments are within the scope of the present invention.
Before describing in detail the various embodiments of the present invention, the core inventive concepts of the present invention are summarized and described in detail by the following several embodiments.
The first embodiment is as follows:
referring to fig. 1, fig. 1 is a flowchart of a method for constructing authentication data information. As shown in fig. 1, the method for constructing authentication data information of the present invention includes:
data information acquisition step S1: and collecting data information in a recommendation request applied by a user, and grouping the data information according to the data information application to obtain application data information.
Specifically, information of a user applying for a recommendation request, such as a user id, a device type, and the like, is collected and is processed in groups according to different purposes.
Data information processing step S2: and merging and encrypting the use data information to obtain the authentication data information.
Specifically, the invention can ensure safe transmission of user request, small data volume and convenient transmission by additionally constructing authentication data information in session of http interaction, and simultaneously, enough information can distinguish different requests.
It can be known from the above that, to construct the authentication data information, information sufficient to distinguish different requests of users is collected first, then the information is stored in groups and spliced respectively, and finally the information is selectively encrypted for transmission.
Referring to fig. 2, fig. 2 is a flowchart illustrating a sub-step of step S1 in fig. 1. As shown in fig. 2, the data information collecting step S1 includes:
data information collection step S11: collecting the data information;
data information grouping step S12: grouping the data information according to the data information usage;
usage data information obtaining step S13: and splicing the data information of each group to obtain the use data information corresponding to the group.
Referring to fig. 3, fig. 3 is a flowchart illustrating a sub-step of step S2 in fig. 1. As shown in fig. 3, the data information processing step S2 includes:
usage data information merging step S21: and merging the at least two groups of corresponding use data information to obtain merged data information.
Specifically, as shown in fig. 4, for the demand use data information (corresponding to the demand data in fig. 4) that can indicate the demand target of the recommendation request, such as the device type, the request tag, and the like, only the code data is needed, and these data are uniformly spliced together; for the preference use data information (corresponding to the preference data in fig. 4) indicating the user preference item of the recommendation request, accurate data is needed, such as clicking, collection and the like, and the data are uniformly spliced or spliced after characteristics are extracted; for recommendation progress usage data information (corresponding to the recommendation progress data in fig. 4) indicating the degree of progress of the current recommendation, such as the number of items, the watched data, and the like, relatively broad statistical data may be used. In this embodiment, the demand-use data information and the preference-use data information are combined to obtain the combined data information, but the invention is not limited thereto.
Merged data information processing step S22: carrying out Hash calculation on the merged data information and then carrying out encryption;
authentication data information obtaining step S23: and splicing the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
Specifically, the data are merged and then processed by a hash algorithm, and then encrypted, so that the transmission security is increased, and the recommended schedule use data information is spliced to obtain the proposed authentication data information data, wherein the authentication data information data is transmitted in a request.
Wherein the data information usage includes: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
Example two:
referring to fig. 5, fig. 5 is a schematic structural diagram of a system for constructing authentication data information according to the present invention. Fig. 5 shows a system for constructing authentication data information according to the present invention, which includes:
the data information acquisition module is used for collecting data information in a recommendation request applied by a user and carrying out grouping processing on the data information according to the data information application to obtain application data information;
and the data information processing module is used for merging and encrypting the data information for use to obtain the authentication data information.
Wherein, the data information acquisition module includes:
a data information collection unit that collects the data information;
a data information grouping unit that groups the data information according to the data information usage;
and the application data information acquisition unit splices the data information of each group to acquire the application data information corresponding to the group.
Wherein, the data information processing module comprises:
the application data information merging unit merges the application data information corresponding to at least two groups to obtain merged data information;
the merged data information processing unit encrypts the merged data information after performing hash calculation on the merged data information;
and the authentication data information obtaining unit splices the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
Wherein the data information usage includes: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
Example three:
referring to fig. 6, this embodiment discloses a specific implementation of an electronic device. The electronic device may include a processor 81 and a memory 82 storing computer program instructions.
Specifically, the processor 81 may include a Central Processing Unit (CPU), or A Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 82 may include, among other things, mass storage for data or instructions. By way of example, and not limitation, memory 82 may include a Hard Disk Drive (Hard Disk Drive, abbreviated to HDD), a floppy Disk Drive, a Solid State Drive (SSD), flash memory, an optical Disk, a magneto-optical Disk, tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 82 may include removable or non-removable (or fixed) media, where appropriate. The memory 82 may be internal or external to the data processing apparatus, where appropriate. In a particular embodiment, the memory 82 is a Non-Volatile (Non-Volatile) memory. In particular embodiments, Memory 82 includes Read-Only Memory (ROM) and Random Access Memory (RAM). The ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (EPROM), Electrically Erasable PROM (EEPROM), Electrically rewritable ROM (EAROM), or FLASH Memory (FLASH), or a combination of two or more of these, where appropriate. The RAM may be a Static Random-Access Memory (SRAM) or a Dynamic Random-Access Memory (DRAM), where the DRAM may be a Fast Page Mode Dynamic Random-Access Memory (FPMDRAM), an Extended data output Dynamic Random-Access Memory (EDODRAM), a Synchronous Dynamic Random-Access Memory (SDRAM), and the like.
The memory 82 may be used to store or cache various data files for processing and/or communication use, as well as possible computer program instructions executed by the processor 81.
The processor 81 realizes any one of the authentication data information construction methods in the above embodiments by reading and executing the computer program instructions stored in the memory 82.
In some of these embodiments, the electronic device may also include a communication interface 83 and a bus 80. As shown in fig. 6, the processor 81, the memory 82, and the communication interface 83 are connected via the bus 80 to complete communication therebetween.
The communication interface 83 is used for implementing communication between modules, devices, units and/or equipment in the embodiment of the present application. The communication port 83 may also be implemented with other components such as: the data communication is carried out among external equipment, image/data acquisition equipment, a database, external storage, an image/data processing workstation and the like.
The bus 80 includes hardware, software, or both to couple the components of the electronic device to one another. Bus 80 includes, but is not limited to, at least one of the following: data Bus (Data Bus), Address Bus (Address Bus), Control Bus (Control Bus), Expansion Bus (Expansion Bus), and Local Bus (Local Bus). By way of example, and not limitation, Bus 80 may include an Accelerated Graphics Port (AGP) or other Graphics Bus, an Enhanced Industry Standard Architecture (EISA) Bus, a Front-Side Bus (FSB), a Hyper Transport (HT) Interconnect, an ISA (ISA) Bus, an InfiniBand (InfiniBand) Interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a microchannel Architecture (MCA) Bus, a PCI (Peripheral Component Interconnect) Bus, a PCI-Express (PCI-X) Bus, a Serial Advanced Technology Attachment (SATA) Bus, a Video Electronics Bus (audio Electronics Association), abbreviated VLB) bus or other suitable bus or a combination of two or more of these. Bus 80 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
The electronic device may implement the methods described in connection with fig. 1-3 based on the construction of the authentication data information.
In addition, in combination with the method for constructing the authentication data information in the foregoing embodiments, the embodiments of the present application may provide a computer-readable storage medium to implement. The computer readable storage medium having stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any one of the above described embodiments of the method of construction of authentication data information.
Referring to fig. 7, fig. 7 is a flowchart of a recommendation method. As shown in fig. 7, the present invention further provides a recommendation method, including:
data information acquisition step S1: collecting data information in a recommendation request applied by a user, and performing grouping processing on the data information according to the data information application to obtain application data information;
data information processing step S2: merging and encrypting the use data information to obtain the authentication data information;
distinguishing step S3: and distinguishing different recommendation requests of the user through the authentication data information.
Wherein the authentication data information is obtained by the construction method according to any one of the above.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a recommendation device. As shown in fig. 8, the present invention also provides a recommendation apparatus, including:
a construction system, comprising:
the data information acquisition module: collecting data information in a recommendation request applied by a user, and performing grouping processing on the data information according to the data information application to obtain application data information;
the data information processing module: merging and encrypting the use data information to obtain the authentication data information;
and the distinguishing module is used for receiving and distinguishing different recommendation requests of the user according to the identification data information.
Wherein the authentication data information is obtained by the construction system according to any one of the above.
Therefore, the problems that the existing recommendation system needs more users to be served and has more cache contents are solved through the authentication data information constructed by the invention.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
In summary, the method has the advantages that the encryption processing in the step of processing the merged data information can ensure the safe transmission of the user request and prevent the attack of a third party; the combined data information processing step processes the data through the Hash algorithm, so that the data transmission quantity can be reduced, and the method is quick and efficient; the information attached to the data use information of the invention has enough information to distinguish different requests.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. A construction method of authentication data information, wherein the authentication data information is used for distinguishing different recommendation requests, the construction method comprising:
data information acquisition: collecting data information in a recommendation request applied by a user, and performing grouping processing on the data information according to the data information application to obtain application data information;
a data information processing step: and merging and encrypting the use data information to obtain the authentication data information.
2. The construction method according to claim 1, wherein the data information collecting step includes:
a data information collection step: collecting the data information;
data information grouping step: grouping the data information according to the data information usage;
a usage data information obtaining step: and splicing the data information of each group to obtain the use data information corresponding to the group.
3. The constructing method according to claim 2, wherein the data information processing step includes:
merging the use data information: merging the at least two groups of corresponding use data information to obtain merged data information;
and a step of processing merged data information: carrying out Hash calculation on the merged data information and then carrying out encryption;
authentication data information obtaining step: and splicing the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
4. The method of constructing as claimed in claim 1, wherein said data information usage includes: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
5. A construction system of authentication data information for distinguishing different recommendation requests, the construction system comprising:
the data information acquisition module is used for collecting data information in a recommendation request applied by a user and carrying out grouping processing on the data information according to the data information application to obtain application data information;
and the data information processing module is used for merging and encrypting the data information for use to obtain the authentication data information.
6. The build system of claim 5, wherein the data information collection module comprises:
a data information collection unit that collects the data information;
a data information grouping unit that groups the data information according to the data information usage;
and the application data information acquisition unit splices the data information of each group to acquire the application data information corresponding to the group.
7. The build system of claim 6 wherein the data-information processing module comprises:
the application data information merging unit merges the application data information corresponding to at least two groups to obtain merged data information;
the merged data information processing unit encrypts the merged data information after performing hash calculation on the merged data information;
and the authentication data information obtaining unit splices the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
8. The build system of claim 5 wherein the data information usage comprises: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
9. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the construction method according to any one of claims 1 to 4 when executing the computer program.
10. A storage medium on which a computer program is stored, which program, when executed by a processor, implements the construction method according to any one of claims 1 to 4.
CN202110382754.8A 2021-04-09 2021-04-09 Authentication data information construction method, system, storage medium and electronic equipment Pending CN113010792A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110382754.8A CN113010792A (en) 2021-04-09 2021-04-09 Authentication data information construction method, system, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110382754.8A CN113010792A (en) 2021-04-09 2021-04-09 Authentication data information construction method, system, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN113010792A true CN113010792A (en) 2021-06-22

Family

ID=76388318

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110382754.8A Pending CN113010792A (en) 2021-04-09 2021-04-09 Authentication data information construction method, system, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113010792A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1572099A (en) * 2001-10-19 2005-01-26 松下电器产业株式会社 Device authentication system and device authentication method
CN104380690A (en) * 2012-06-15 2015-02-25 阿尔卡特朗讯 Architecture of privacy protection system for recommendation services
CN109861992A (en) * 2019-01-10 2019-06-07 深圳英飞拓智能技术有限公司 A kind of information interacting method and across scene method for tracing of monitor terminal
WO2021027955A1 (en) * 2019-08-15 2021-02-18 纳恩博(常州)科技有限公司 Information processing method and device, and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1572099A (en) * 2001-10-19 2005-01-26 松下电器产业株式会社 Device authentication system and device authentication method
CN104380690A (en) * 2012-06-15 2015-02-25 阿尔卡特朗讯 Architecture of privacy protection system for recommendation services
CN109861992A (en) * 2019-01-10 2019-06-07 深圳英飞拓智能技术有限公司 A kind of information interacting method and across scene method for tracing of monitor terminal
WO2021027955A1 (en) * 2019-08-15 2021-02-18 纳恩博(常州)科技有限公司 Information processing method and device, and storage medium

Similar Documents

Publication Publication Date Title
US20170134162A1 (en) System and process for verifying digital media content authenticity
US10778680B2 (en) Method and apparatus for accessing website
CN109977684B (en) Data transmission method and device and terminal equipment
EP3253026B1 (en) Cdn-based access control method and relevant device
CN110502602B (en) Data storage method, device, equipment and computer storage medium
CN112784823B (en) Face image recognition method, face image recognition device, computing equipment and medium
CN113411404A (en) File downloading method, device, server and storage medium
CN109067746B (en) Communication method and device between client and server
JP2019519849A (en) Method and device for preventing attacks on servers
CN112905542B (en) File processing method, device, server, equipment and storage medium
WO2017215650A1 (en) Automatic login method and device for micro-game client, program, and medium
CN113656648A (en) Data query method, related device and medium
CN108833500B (en) Service calling method, service providing method, data transmission method and server
CN108055299B (en) Portal page pushing method, network access server and Portal authentication system
CN113079219A (en) Large file fragment uploading method and system
CN108920971A (en) The method of data encryption, the method for verification, the device of encryption and verification device
CN112528125A (en) Method and device for avoiding content repeated recommendation, electronic equipment and storage medium
CN112507229A (en) Document recommendation method and system and computer equipment
CN113746913A (en) Information recommendation method, system, device and storage medium
CN110858832B (en) Password information reinforcement and data processing method, device, system and storage medium
CN112152993A (en) Method and device for detecting webpage hijacking, computer equipment and storage medium
CN115361450B (en) Request information processing method, apparatus, electronic device, medium, and program product
CN113010792A (en) Authentication data information construction method, system, storage medium and electronic equipment
CN110851794A (en) Media file uplink method and device, storage medium and electronic device
CN110020290B (en) Webpage resource caching method and device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination