CN113010792A - Authentication data information construction method, system, storage medium and electronic equipment - Google Patents
Authentication data information construction method, system, storage medium and electronic equipment Download PDFInfo
- Publication number
- CN113010792A CN113010792A CN202110382754.8A CN202110382754A CN113010792A CN 113010792 A CN113010792 A CN 113010792A CN 202110382754 A CN202110382754 A CN 202110382754A CN 113010792 A CN113010792 A CN 113010792A
- Authority
- CN
- China
- Prior art keywords
- data information
- application
- authentication
- recommendation
- authentication data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000010276 construction Methods 0.000 title claims abstract description 38
- 230000010365 information processing Effects 0.000 claims abstract description 21
- 238000012545 processing Methods 0.000 claims abstract description 18
- 238000000034 method Methods 0.000 claims description 23
- 238000004590 computer program Methods 0.000 claims description 11
- 238000004364 calculation method Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 4
- 238000004422 calculation algorithm Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000005242 forging Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a construction method, a system, a storage medium and electronic equipment for identifying data information, wherein the construction method comprises the following steps: data information acquisition: collecting data information in a recommendation request applied by a user, and performing grouping processing on the data information according to the data information application to obtain application data information; a data information processing step: and merging and encrypting the use data information to obtain the authentication data information. The invention improves the safety and the applicability of the authentication data information.
Description
Technical Field
The invention belongs to the field of construction of identification data information, and particularly relates to a construction method, a construction system, a storage medium and electronic equipment of identification data information.
Background
One recommendation system can serve a plurality of users, for a system with a large number of commodities, one user initiates a recommendation request, and a plurality of commodities which meet the conditions are calculated through the recommendation system. Since a user only views one page of recommended content at a time, for example, 10 commodities, and then views one page at a time, the commodities obtained by the recommendation system operating once need to be cached, so that the user can look slowly.
The recommendation system needs a large number of users to be served, which results in a large number of cache contents, and an authentication data information is needed to correspond to a certain recommendation request of a certain user during caching, but how to design the authentication data information data which needs to be stored at the user side is a problem, and the safety needs to be ensured, the data volume is small, the transmission is convenient, and enough information is provided to distinguish different requests.
The prior art has the following ways to obtain authentication data information: 1. the user identity id is directly used as authentication data information without additional data; 2. and the application target and the time of the user application recommendation are used as authentication data information. However, in practical use, the user identity information is not enough to support the storage of various request contents, such as common commodity recommendation and promotion commodity recommendation; if the authentication data information is intercepted, the authentication data information can be used for forging user requests and synchronously checking user browsing information, and the security is not enough.
Disclosure of Invention
The embodiment of the application provides a construction method, a construction system, a storage medium and electronic equipment of authentication data information, and aims to at least solve the problems of safety and applicability of the existing authentication data information.
The invention provides a construction method of identification data information, which comprises the following steps:
data information acquisition: collecting data information in a recommendation request applied by a user, and performing grouping processing on the data information according to the data information application to obtain application data information;
a data information processing step: and merging and encrypting the use data information to obtain the authentication data information.
The above construction method, wherein the data information acquisition step includes:
a data information collection step: collecting the data information;
data information grouping step: grouping the data information according to the data information usage;
a usage data information obtaining step: and splicing the data information of each group to obtain the use data information corresponding to the group.
The above construction method, wherein the data information processing step includes:
merging the use data information: merging the at least two groups of corresponding use data information to obtain merged data information;
and a step of processing merged data information: carrying out Hash calculation on the merged data information and then carrying out encryption;
authentication data information obtaining step: and splicing the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
The above construction method, wherein the data information uses: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
The invention also provides a recommendation method, which comprises the construction method of any one of the above, and the recommendation method further comprises the following steps:
a distinguishing step: the authentication data information constructed by the construction method of any one of the above distinguishes different recommendation requests of the user.
The invention also provides a construction system of the authentication data information, wherein the authentication data information is used for distinguishing different recommendation requests, and the construction system comprises:
the data information acquisition module is used for collecting data information in a recommendation request applied by a user and carrying out grouping processing on the data information according to the data information application to obtain application data information;
and the data information processing module is used for merging and encrypting the data information for use to obtain the authentication data information.
The above construction system, wherein the data information collecting module comprises:
a data information collection unit that collects the data information;
a data information grouping unit that groups the data information according to the data information usage;
and the application data information acquisition unit splices the data information of each group to acquire the application data information corresponding to the group.
The above construction system, wherein the data information processing module comprises:
the application data information merging unit merges the application data information corresponding to at least two groups to obtain merged data information;
the merged data information processing unit encrypts the merged data information after performing hash calculation on the merged data information;
and the authentication data information obtaining unit splices the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
The above construction system, wherein the data information usage includes: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
The invention also provides a recommendation device, which comprises the construction system of any one of the above, and the recommendation device further comprises:
a distinguishing module: the authentication data information constructed by the construction system of any one of the above distinguishes different recommendation requests of users.
The present invention further includes an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the method for constructing the authentication data information according to any one of the above methods when executing the computer program.
The present invention also includes a storage medium having a computer program stored thereon, wherein the program, when executed by a processor, implements any of the above-described authentication data information construction methods.
The invention belongs to the technical field of recommendation. The invention has the beneficial effects that:
1. the encryption processing in the combined data information processing step can ensure the safe transmission of the user request and prevent the attack of a third party.
2. The combined data information processing step processes the data information through the Hash algorithm, so that the transmission data volume can be reduced, and the quick and efficient transmission can be realized.
3. The information attached in the identification data information of the invention has enough information to distinguish different recommendation requests.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application.
In the drawings:
FIG. 1 is a flow chart of a method of construction of authentication data information of the present invention;
FIG. 2 is a flow chart illustrating the substeps of step S1 in FIG. 1;
FIG. 3 is a flow chart illustrating the substeps of step S2 in FIG. 1;
FIG. 4 is a flow chart for constructing authentication data information;
FIG. 5 is a schematic diagram of the construction system of the authentication data information of the present invention;
FIG. 6 is a block diagram of an electronic device according to an embodiment of the invention;
FIG. 7 is a flow chart of a recommendation method;
fig. 8 is a schematic view of the structure of the recommending apparatus.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as referred to herein means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The present invention is described in detail with reference to the embodiments shown in the drawings, but it should be understood that these embodiments are not intended to limit the present invention, and those skilled in the art should understand that functional, methodological, or structural equivalents or substitutions made by these embodiments are within the scope of the present invention.
Before describing in detail the various embodiments of the present invention, the core inventive concepts of the present invention are summarized and described in detail by the following several embodiments.
The first embodiment is as follows:
referring to fig. 1, fig. 1 is a flowchart of a method for constructing authentication data information. As shown in fig. 1, the method for constructing authentication data information of the present invention includes:
data information acquisition step S1: and collecting data information in a recommendation request applied by a user, and grouping the data information according to the data information application to obtain application data information.
Specifically, information of a user applying for a recommendation request, such as a user id, a device type, and the like, is collected and is processed in groups according to different purposes.
Data information processing step S2: and merging and encrypting the use data information to obtain the authentication data information.
Specifically, the invention can ensure safe transmission of user request, small data volume and convenient transmission by additionally constructing authentication data information in session of http interaction, and simultaneously, enough information can distinguish different requests.
It can be known from the above that, to construct the authentication data information, information sufficient to distinguish different requests of users is collected first, then the information is stored in groups and spliced respectively, and finally the information is selectively encrypted for transmission.
Referring to fig. 2, fig. 2 is a flowchart illustrating a sub-step of step S1 in fig. 1. As shown in fig. 2, the data information collecting step S1 includes:
data information collection step S11: collecting the data information;
data information grouping step S12: grouping the data information according to the data information usage;
usage data information obtaining step S13: and splicing the data information of each group to obtain the use data information corresponding to the group.
Referring to fig. 3, fig. 3 is a flowchart illustrating a sub-step of step S2 in fig. 1. As shown in fig. 3, the data information processing step S2 includes:
usage data information merging step S21: and merging the at least two groups of corresponding use data information to obtain merged data information.
Specifically, as shown in fig. 4, for the demand use data information (corresponding to the demand data in fig. 4) that can indicate the demand target of the recommendation request, such as the device type, the request tag, and the like, only the code data is needed, and these data are uniformly spliced together; for the preference use data information (corresponding to the preference data in fig. 4) indicating the user preference item of the recommendation request, accurate data is needed, such as clicking, collection and the like, and the data are uniformly spliced or spliced after characteristics are extracted; for recommendation progress usage data information (corresponding to the recommendation progress data in fig. 4) indicating the degree of progress of the current recommendation, such as the number of items, the watched data, and the like, relatively broad statistical data may be used. In this embodiment, the demand-use data information and the preference-use data information are combined to obtain the combined data information, but the invention is not limited thereto.
Merged data information processing step S22: carrying out Hash calculation on the merged data information and then carrying out encryption;
authentication data information obtaining step S23: and splicing the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
Specifically, the data are merged and then processed by a hash algorithm, and then encrypted, so that the transmission security is increased, and the recommended schedule use data information is spliced to obtain the proposed authentication data information data, wherein the authentication data information data is transmitted in a request.
Wherein the data information usage includes: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
Example two:
referring to fig. 5, fig. 5 is a schematic structural diagram of a system for constructing authentication data information according to the present invention. Fig. 5 shows a system for constructing authentication data information according to the present invention, which includes:
the data information acquisition module is used for collecting data information in a recommendation request applied by a user and carrying out grouping processing on the data information according to the data information application to obtain application data information;
and the data information processing module is used for merging and encrypting the data information for use to obtain the authentication data information.
Wherein, the data information acquisition module includes:
a data information collection unit that collects the data information;
a data information grouping unit that groups the data information according to the data information usage;
and the application data information acquisition unit splices the data information of each group to acquire the application data information corresponding to the group.
Wherein, the data information processing module comprises:
the application data information merging unit merges the application data information corresponding to at least two groups to obtain merged data information;
the merged data information processing unit encrypts the merged data information after performing hash calculation on the merged data information;
and the authentication data information obtaining unit splices the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
Wherein the data information usage includes: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
Example three:
referring to fig. 6, this embodiment discloses a specific implementation of an electronic device. The electronic device may include a processor 81 and a memory 82 storing computer program instructions.
Specifically, the processor 81 may include a Central Processing Unit (CPU), or A Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
The memory 82 may be used to store or cache various data files for processing and/or communication use, as well as possible computer program instructions executed by the processor 81.
The processor 81 realizes any one of the authentication data information construction methods in the above embodiments by reading and executing the computer program instructions stored in the memory 82.
In some of these embodiments, the electronic device may also include a communication interface 83 and a bus 80. As shown in fig. 6, the processor 81, the memory 82, and the communication interface 83 are connected via the bus 80 to complete communication therebetween.
The communication interface 83 is used for implementing communication between modules, devices, units and/or equipment in the embodiment of the present application. The communication port 83 may also be implemented with other components such as: the data communication is carried out among external equipment, image/data acquisition equipment, a database, external storage, an image/data processing workstation and the like.
The bus 80 includes hardware, software, or both to couple the components of the electronic device to one another. Bus 80 includes, but is not limited to, at least one of the following: data Bus (Data Bus), Address Bus (Address Bus), Control Bus (Control Bus), Expansion Bus (Expansion Bus), and Local Bus (Local Bus). By way of example, and not limitation, Bus 80 may include an Accelerated Graphics Port (AGP) or other Graphics Bus, an Enhanced Industry Standard Architecture (EISA) Bus, a Front-Side Bus (FSB), a Hyper Transport (HT) Interconnect, an ISA (ISA) Bus, an InfiniBand (InfiniBand) Interconnect, a Low Pin Count (LPC) Bus, a memory Bus, a microchannel Architecture (MCA) Bus, a PCI (Peripheral Component Interconnect) Bus, a PCI-Express (PCI-X) Bus, a Serial Advanced Technology Attachment (SATA) Bus, a Video Electronics Bus (audio Electronics Association), abbreviated VLB) bus or other suitable bus or a combination of two or more of these. Bus 80 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
The electronic device may implement the methods described in connection with fig. 1-3 based on the construction of the authentication data information.
In addition, in combination with the method for constructing the authentication data information in the foregoing embodiments, the embodiments of the present application may provide a computer-readable storage medium to implement. The computer readable storage medium having stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any one of the above described embodiments of the method of construction of authentication data information.
Referring to fig. 7, fig. 7 is a flowchart of a recommendation method. As shown in fig. 7, the present invention further provides a recommendation method, including:
data information acquisition step S1: collecting data information in a recommendation request applied by a user, and performing grouping processing on the data information according to the data information application to obtain application data information;
data information processing step S2: merging and encrypting the use data information to obtain the authentication data information;
distinguishing step S3: and distinguishing different recommendation requests of the user through the authentication data information.
Wherein the authentication data information is obtained by the construction method according to any one of the above.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a recommendation device. As shown in fig. 8, the present invention also provides a recommendation apparatus, including:
a construction system, comprising:
the data information acquisition module: collecting data information in a recommendation request applied by a user, and performing grouping processing on the data information according to the data information application to obtain application data information;
the data information processing module: merging and encrypting the use data information to obtain the authentication data information;
and the distinguishing module is used for receiving and distinguishing different recommendation requests of the user according to the identification data information.
Wherein the authentication data information is obtained by the construction system according to any one of the above.
Therefore, the problems that the existing recommendation system needs more users to be served and has more cache contents are solved through the authentication data information constructed by the invention.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
In summary, the method has the advantages that the encryption processing in the step of processing the merged data information can ensure the safe transmission of the user request and prevent the attack of a third party; the combined data information processing step processes the data through the Hash algorithm, so that the data transmission quantity can be reduced, and the method is quick and efficient; the information attached to the data use information of the invention has enough information to distinguish different requests.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
Claims (10)
1. A construction method of authentication data information, wherein the authentication data information is used for distinguishing different recommendation requests, the construction method comprising:
data information acquisition: collecting data information in a recommendation request applied by a user, and performing grouping processing on the data information according to the data information application to obtain application data information;
a data information processing step: and merging and encrypting the use data information to obtain the authentication data information.
2. The construction method according to claim 1, wherein the data information collecting step includes:
a data information collection step: collecting the data information;
data information grouping step: grouping the data information according to the data information usage;
a usage data information obtaining step: and splicing the data information of each group to obtain the use data information corresponding to the group.
3. The constructing method according to claim 2, wherein the data information processing step includes:
merging the use data information: merging the at least two groups of corresponding use data information to obtain merged data information;
and a step of processing merged data information: carrying out Hash calculation on the merged data information and then carrying out encryption;
authentication data information obtaining step: and splicing the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
4. The method of constructing as claimed in claim 1, wherein said data information usage includes: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
5. A construction system of authentication data information for distinguishing different recommendation requests, the construction system comprising:
the data information acquisition module is used for collecting data information in a recommendation request applied by a user and carrying out grouping processing on the data information according to the data information application to obtain application data information;
and the data information processing module is used for merging and encrypting the data information for use to obtain the authentication data information.
6. The build system of claim 5, wherein the data information collection module comprises:
a data information collection unit that collects the data information;
a data information grouping unit that groups the data information according to the data information usage;
and the application data information acquisition unit splices the data information of each group to acquire the application data information corresponding to the group.
7. The build system of claim 6 wherein the data-information processing module comprises:
the application data information merging unit merges the application data information corresponding to at least two groups to obtain merged data information;
the merged data information processing unit encrypts the merged data information after performing hash calculation on the merged data information;
and the authentication data information obtaining unit splices the encrypted combined data information and the rest of the application data information which is not subjected to combined encryption to obtain the authentication data information.
8. The build system of claim 5 wherein the data information usage comprises: the requirement target of the recommendation request, the user preference item of the recommendation request and the progress degree of the current recommendation, and the use data information comprises: demand use data information, preference use data information, and recommended progress use data information.
9. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the construction method according to any one of claims 1 to 4 when executing the computer program.
10. A storage medium on which a computer program is stored, which program, when executed by a processor, implements the construction method according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110382754.8A CN113010792A (en) | 2021-04-09 | 2021-04-09 | Authentication data information construction method, system, storage medium and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110382754.8A CN113010792A (en) | 2021-04-09 | 2021-04-09 | Authentication data information construction method, system, storage medium and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113010792A true CN113010792A (en) | 2021-06-22 |
Family
ID=76388318
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110382754.8A Pending CN113010792A (en) | 2021-04-09 | 2021-04-09 | Authentication data information construction method, system, storage medium and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113010792A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1572099A (en) * | 2001-10-19 | 2005-01-26 | 松下电器产业株式会社 | Device authentication system and device authentication method |
CN104380690A (en) * | 2012-06-15 | 2015-02-25 | 阿尔卡特朗讯 | Architecture of privacy protection system for recommendation services |
CN109861992A (en) * | 2019-01-10 | 2019-06-07 | 深圳英飞拓智能技术有限公司 | A kind of information interacting method and across scene method for tracing of monitor terminal |
WO2021027955A1 (en) * | 2019-08-15 | 2021-02-18 | 纳恩博(常州)科技有限公司 | Information processing method and device, and storage medium |
-
2021
- 2021-04-09 CN CN202110382754.8A patent/CN113010792A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1572099A (en) * | 2001-10-19 | 2005-01-26 | 松下电器产业株式会社 | Device authentication system and device authentication method |
CN104380690A (en) * | 2012-06-15 | 2015-02-25 | 阿尔卡特朗讯 | Architecture of privacy protection system for recommendation services |
CN109861992A (en) * | 2019-01-10 | 2019-06-07 | 深圳英飞拓智能技术有限公司 | A kind of information interacting method and across scene method for tracing of monitor terminal |
WO2021027955A1 (en) * | 2019-08-15 | 2021-02-18 | 纳恩博(常州)科技有限公司 | Information processing method and device, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170134162A1 (en) | System and process for verifying digital media content authenticity | |
US10778680B2 (en) | Method and apparatus for accessing website | |
CN109977684B (en) | Data transmission method and device and terminal equipment | |
EP3253026B1 (en) | Cdn-based access control method and relevant device | |
CN110502602B (en) | Data storage method, device, equipment and computer storage medium | |
CN112784823B (en) | Face image recognition method, face image recognition device, computing equipment and medium | |
CN113411404A (en) | File downloading method, device, server and storage medium | |
CN109067746B (en) | Communication method and device between client and server | |
JP2019519849A (en) | Method and device for preventing attacks on servers | |
CN112905542B (en) | File processing method, device, server, equipment and storage medium | |
WO2017215650A1 (en) | Automatic login method and device for micro-game client, program, and medium | |
CN113656648A (en) | Data query method, related device and medium | |
CN108833500B (en) | Service calling method, service providing method, data transmission method and server | |
CN108055299B (en) | Portal page pushing method, network access server and Portal authentication system | |
CN113079219A (en) | Large file fragment uploading method and system | |
CN108920971A (en) | The method of data encryption, the method for verification, the device of encryption and verification device | |
CN112528125A (en) | Method and device for avoiding content repeated recommendation, electronic equipment and storage medium | |
CN112507229A (en) | Document recommendation method and system and computer equipment | |
CN113746913A (en) | Information recommendation method, system, device and storage medium | |
CN110858832B (en) | Password information reinforcement and data processing method, device, system and storage medium | |
CN112152993A (en) | Method and device for detecting webpage hijacking, computer equipment and storage medium | |
CN115361450B (en) | Request information processing method, apparatus, electronic device, medium, and program product | |
CN113010792A (en) | Authentication data information construction method, system, storage medium and electronic equipment | |
CN110851794A (en) | Media file uplink method and device, storage medium and electronic device | |
CN110020290B (en) | Webpage resource caching method and device, storage medium and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |