CN110309668A - Multi-platform data managing method, device, computer equipment and storage medium - Google Patents
Multi-platform data managing method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110309668A CN110309668A CN201910411252.6A CN201910411252A CN110309668A CN 110309668 A CN110309668 A CN 110309668A CN 201910411252 A CN201910411252 A CN 201910411252A CN 110309668 A CN110309668 A CN 110309668A
- Authority
- CN
- China
- Prior art keywords
- user
- platform
- default
- data
- cryptographic hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 230000006399 behavior Effects 0.000 claims description 31
- 238000004590 computer program Methods 0.000 claims description 22
- 230000015654 memory Effects 0.000 claims description 20
- 238000007726 management method Methods 0.000 claims description 16
- 230000005540 biological transmission Effects 0.000 claims description 4
- 238000013524 data verification Methods 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 claims 1
- 101150060512 SPATA6 gene Proteins 0.000 description 100
- 238000013523 data management Methods 0.000 description 20
- 150000003839 salts Chemical class 0.000 description 14
- 230000006870 function Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 10
- 238000004458 analytical method Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 238000007405 data analysis Methods 0.000 description 3
- 239000000203 mixture Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 238000012508 change request Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000019771 cognition Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 235000013305 food Nutrition 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
Abstract
This application involves a kind of multi-platform data managing methods, device, computer equipment and storage medium, the described method includes: user's logging request that the user terminal for receiving third-party platform is sent, logging request includes platform identification, user account and user key, corresponding default random sequence and default cryptographic Hash are inquired according to user account, splice default random sequence and the account number cipher, obtain corresponding splicing sequence, Hash operation is carried out to splicing sequence, obtain current cryptographic Hash, current cryptographic Hash and default cryptographic Hash are verified, when the authentication succeeds, return to the message being proved to be successful extremely third-party platform corresponding with platform identification.Pre-stored default cryptographic Hash and default random sequence are inquired by user account, what server and third-party platform obtained is all user key and cryptographic Hash, even if leaking data, true data can just be obtained by needing to be decrypted, to ensure that the Information Security of user.
Description
Technical field
This application involves field of computer technology more particularly to a kind of multi-platform data managing method, device, computer to set
Standby and storage medium.
Background technique
With the continuous development of computer technology, there are more and more data management platforms, each data management is flat
The mode of platform storing data contains the private data of user directly to store user data in user data, once data
Leakage or data manager defalcate, then can seriously affect the data safety of user.
Summary of the invention
In order to solve the above-mentioned technical problem, this application provides a kind of multi-platform data managing method, device, computers to set
Standby and storage medium.
In a first aspect, this application provides a kind of multi-platform data managing methods, comprising:
User's logging request that the user terminal of third-party platform is sent is received, logging request includes platform identification, user
Account and user key;
Corresponding default random sequence and default cryptographic Hash are inquired according to user account;
Splice default random sequence and the account number cipher, obtains corresponding splicing sequence;
Hash operation is carried out to splicing sequence, current cryptographic Hash is obtained, current cryptographic Hash and default cryptographic Hash is tested
Card;
When the authentication succeeds, the message being proved to be successful extremely third-party platform corresponding with platform identification is returned.
Second aspect, this application provides one kind
User's logging request that the user terminal of third-party platform is sent is received, logging request includes platform identification, user
Account and user key;
Corresponding default random sequence and default cryptographic Hash are inquired according to user account;
Splice default random sequence and the account number cipher, obtains corresponding splicing sequence;
Hash operation is carried out to splicing sequence, current cryptographic Hash is obtained, current cryptographic Hash and default cryptographic Hash is tested
Card;
When the authentication succeeds, the message being proved to be successful extremely third-party platform corresponding with platform identification is returned.
A kind of computer equipment can be run on a memory and on a processor including memory, processor and storage
Computer program, the processor perform the steps of when executing the computer program
User's logging request that the user terminal of third-party platform is sent is received, logging request includes platform identification, user
Account and user key;
Corresponding default random sequence and default cryptographic Hash are inquired according to user account;
Splice default random sequence and the account number cipher, obtains corresponding splicing sequence;
Hash operation is carried out to splicing sequence, current cryptographic Hash is obtained, current cryptographic Hash and default cryptographic Hash is tested
Card;
When the authentication succeeds, the message being proved to be successful extremely third-party platform corresponding with platform identification is returned.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
It is performed the steps of when row
User's logging request that the user terminal of third-party platform is sent is received, logging request includes platform identification, user
Account and user key;
Corresponding default random sequence and default cryptographic Hash are inquired according to user account;
Splice default random sequence and the account number cipher, obtains corresponding splicing sequence;
Hash operation is carried out to splicing sequence, current cryptographic Hash is obtained, current cryptographic Hash and default cryptographic Hash is tested
Card;
When the authentication succeeds, the message being proved to be successful extremely third-party platform corresponding with platform identification is returned.
Above-mentioned multi-platform data managing method, device, computer equipment and storage medium, which comprises receive the
User's logging request that the user terminal of tripartite's platform is sent, logging request include platform identification, user account and user key,
Corresponding default random sequence and default cryptographic Hash are inquired according to user account, splices default random sequence and the account is close
Code, obtains corresponding splicing sequence, carries out Hash operation to splicing sequence, obtains current cryptographic Hash, to current cryptographic Hash and in advance
If cryptographic Hash is verified, when the authentication succeeds, the message being proved to be successful extremely third-party platform corresponding with platform identification is returned to.
Pre-stored default cryptographic Hash and default random sequence are inquired by user account, according to the corresponding user key of user account
Hash operation is carried out with default random sequence, obtained cryptographic Hash and default cryptographic Hash are verified, so that account number cipher is not
It is easy to meet by chance, what server and third-party platform obtained is all that user key and cryptographic Hash are solved even if leaking data
It is close just to obtain true data, to ensure that the Information Security of user.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, for those of ordinary skill in the art
Speech, without any creative labor, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the application scenario diagram of multi-platform data managing method in one embodiment;
Fig. 2 is the flow diagram of multi-platform data managing method in one embodiment;
Fig. 3 is the association schematic diagram of table in a specific embodiment;
Fig. 4 is the module diagram of ciphering user data in one embodiment;
Fig. 5 is the timing diagram of ciphering user data in one embodiment;
Fig. 6 is the timing diagram that user logs in one embodiment;
Fig. 7 is the structural block diagram of multi-platform data administrator in one embodiment;
Fig. 8 is the inside structure block diagram of computer equipment in one embodiment.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the application, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
Member's every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
Fig. 1 is the applied environment figure of multi-platform data managing method in one embodiment.Referring to Fig.1, the multi-platform data
Management method is applied to multi-platform data management system.The multi-platform data management system includes terminal 110 and server 120.
Terminal 110 and server 120 pass through network connection.The user that the terminal 110 that server 120 receives third-party platform is sent logs in
Request, logging request include platform identification, user account and user key, inquire corresponding default stochastic ordering according to user account
Column and default cryptographic Hash splice default random sequence and the account number cipher, obtain corresponding splicing sequence, to splicing sequence into
Row Hash operation obtains current cryptographic Hash, verifies to current cryptographic Hash and default cryptographic Hash, when the authentication succeeds, returns
The message being proved to be successful extremely third-party platform corresponding with platform identification.
Terminal 110 specifically can be terminal console or mobile terminal, and mobile terminal specifically can be with mobile phone, tablet computer, pen
Remember at least one of this computer etc..Server 120 can use the service of the either multiple server compositions of independent server
Device cluster is realized.
As shown in Fig. 2, in one embodiment, providing a kind of multi-platform data managing method.The present embodiment mainly with
This method is applied to the server 120 in above-mentioned Fig. 1 to illustrate.Referring to Fig. 2, which is specifically wrapped
Include following steps:
Step S201 receives user's logging request that the user terminal of third-party platform is sent, and logging request includes platform
Mark, user account and user key.
Step S202 inquires corresponding default random sequence and default cryptographic Hash according to user account.
Step S203 splices default random sequence and the account number cipher, obtains corresponding splicing sequence.
Step S204 carries out Hash operation to splicing sequence, current cryptographic Hash is obtained, to current cryptographic Hash and default Hash
Value is verified.
Step S205 returns to the message being proved to be successful extremely third-party platform corresponding with platform identification when the authentication succeeds.
Specifically, third-party platform refers to that the platform that specified permission is awarded, server can be with multiple third-party platforms
Establish connection.User's logging request refers to the computer instruction for being logged in, and platform mark is carried in the computer instruction
Knowledge, terminal iidentification, user account and user key etc. are for indicating platform and the information of user.Platform identification is for uniquely marking
Know the label data of platform, user account can be that user is customized, be also possible to server or platform asking according to user
Seek the account information for identity user automatically generated.User key refers to raw with according to the corresponding account number cipher of user account
At key, wherein the generation method of key can use common Encryption Algorithm.
Default random sequence and default cryptographic Hash refer respectively to be stored in advance random sequence and cryptographic Hash in the server,
Wherein presetting random sequence is the string sequence generated at random according to user account, and default cryptographic Hash refers to previously according to pre- Mr.
At the splicing data spliced of key and default random sequence carry out the cryptographic Hash that Hash operation obtains.Using hash algorithm
Secondary encryption is carried out to user key, carries out the secondary encryption of data, a possibility that data are cracked is reduced, to improve data
Safety.
When pre-generated key and default random sequence are spliced, it can splice according to predetermined manner, it can be by pre- Mr.
At key splicing in default random sequence any position, as splicing preset before random sequence, centre or back,
When pre-generated key has been determined after default random sequence stitching position, when logging in, user key is in default stochastic ordering
The position stitching position of column is identical as predetermined position, avoids causing to verify unacceptable ask because of stitching position mistake
Topic.
Hash operation is carried out to splicing sequence, current cryptographic Hash is obtained, current cryptographic Hash and default cryptographic Hash is tested
Card, when current cryptographic Hash is identical with default cryptographic Hash, indicates to be proved to be successful, and returns to the message that is proved to be successful extremely and platform identification
Corresponding third-party platform, when current cryptographic Hash is identical as default cryptographic Hash, return the message of authentication failed to platform mark
Corresponding third-party platform is known, so that the prompt that third-party platform returns to login failure is whole to user corresponding with terminal iidentification
End.
Above-mentioned multi-platform data managing method, which comprises receive the use that the user terminal of third-party platform is sent
Family logging request, logging request include platform identification, user account and user key, are preset according to user account inquiry is corresponding
Random sequence and default cryptographic Hash splice default random sequence and the account number cipher, corresponding splicing sequence are obtained, to splicing
Sequence carries out Hash operation, obtains current cryptographic Hash, verifies to current cryptographic Hash and default cryptographic Hash, when being proved to be successful
When, return to the message being proved to be successful extremely third-party platform corresponding with platform identification.Secondary encryption is carried out by user key, from
And reduce the security risk of leaking data.
In one embodiment, before step S201, further includes:
Step S301 constructs main table and corresponding multiple subtabulations, includes the first user identifier in main table, wraps in each subtabulation
It is identified containing second user, the first user identifier is corresponding with second user mark.
Step S302 generates first according to registration request and uses when receiving the registration request of any one third fang platform
Family mark generates second user corresponding with the first user identifier according to the corresponding platform identification of registration request and identifies.
Step S303 generates default random sequence according to registration request, splices and take in default random sequence and registration request
The registration user key of band obtains default splicing value.
Step S304 carries out Hash operation to default splicing value, obtains default cryptographic Hash.
Specifically, main table is used to store the number of users of corresponding platform for storing user data and platform data, subtabulation
According to, commodity data, user behavior data, platform behavioral data etc..The first user identifier, the first user are stored in the table
Mark refers to identification information of the user in main table, and second user mark refers to the user identifier in each platform, and second uses
Family is identified by the generation of the first user identifier, and corresponding with the first user identifier, same first user identifier can correspond to
The second user of multiple and different platforms identifies.User identifier in such as main table indicates that then second in subtabulation is used using UnionID
Family mark indicates that the subtabulation of same platform can be indicated using identical NumberID using NumberID.
When receiving the registration request of user terminal transmission, is generated and corresponded to according to the registration information carried in registration request
Default random sequence, the corresponding default random training of different user accounts is not identical, in this way convenient for differentiation user, will register
The registration user key carried in request and default random sequence are spliced, and in splicing, registration user key splicing can be existed
Position in customized default random sequence, the customized of the position can be set with technical staff such as algorithm designers, can also
To be to devise various ways, user can like choosing corresponding setting means according to individual.
Hash operation is carried out to default splicing value, obtains default cryptographic Hash, wherein the common Hash hash side of Hash operation
Method can obtain the default cryptographic Hash of default splicing value by this method.By default cryptographic Hash and default random sequence with to
Family mark establishes corresponding relationship, and saves the corresponding relationship, when user logs in, by user account match it is corresponding it is default with
Machine sequence and default cryptographic Hash.Server can handle the registration request of each platform, and save corresponding after the registration request
User data, the user data of the same each platform of management, so that data are more concentrated, in third-party platform and server
User data is encrypted personal user's data, so that data are more concealed, to enhance the safety of data.
In one embodiment, above-mentioned multi-platform data managing method, further includes:
Step S401 obtains the operation note of each third-party platform, saves operation note.
Step S402 generates the corresponding management strategy of each third-party platform according to operation note.
Step S403 executes the corresponding management strategy of each third-party platform, to realize the number to each third-party platform
According to the control of stream.
Specifically, operation note includes but is not limited to the operation note of user operation records and platform administrator, is obtained each
The operation note of a third-party platform, and save operation note.Third-party platform can effectively be recognized by obtaining operation note,
With the carrying pressure of server, and then the management strategy of each third-party platform is preferably controlled, wherein management strategy refers to pair
The data access request of third-party platform, data change request etc. are managed, and are mainly controlled data traffic
Management.Since the user data access peak period of different platform is possible to be staggered, then in the user data for monitoring Partial flats
Amount of access is smaller, when partial data amount of access is larger, can adjust amount of access less than the first default threshold by setting access thresholds
The flowing of access of value or the platform greater than the second preset threshold, wherein the first preset threshold is less than the second preset threshold, less than the
The corresponding flowing of access of the platform of one preset threshold can be turned down suitably, and the flowing of access greater than the second preset threshold can be appropriate
It tunes up, multiple threshold values also can be set, different threshold values corresponds to different flowing of access grades.
In one embodiment, above-mentioned multi-platform data managing method, further includes:
Step S501 obtains the corresponding historical operating data of user identifier.
Step S502 analyzes historical operating data of each user identifier in corresponding each third-party platform, obtains
Behavior outcome of each user identifier in corresponding third-party platform.
Step S503 is sent to corresponding third by each user identifier in the behavior outcome of corresponding third-party platform
Fang Pingtai, so that third-party platform pushes corresponding prompt information according to the corresponding behavior outcome of each user identifier.
Specifically, the corresponding historical operating data of user identifier refers to operand of each user on corresponding platform
According to if the membership information of user changes, the consumption data of user, consumption type, consumption time etc. user operate on platform
Data record.The corresponding data on each third-party platform of user identifier are analyzed, corresponding behavior knot is obtained
Fruit, such as consumption time, the consumption event, consumer credit of analysis user on the platform, include quotient if user is businessman
Family user evaluates businessman the analysis of data, the sales data analysis of businessman etc., obtains the corresponding analysis data of each user.
Send corresponding each user identifier in corresponding third-party platform for corresponding analysis data so that third-party platform according to
The corresponding analysis data of user identifier, push corresponding prompt information, which includes but is not limited to clothes link, dining room
The various Shopping directeries such as link and furniture link also may include sport video link, teaching link etc..It will be prompted to information exhibition
Show on the subscriber terminal.Demand of the same user in different platforms is inconsistent, therefore can be according to platform to the history of user
Operation data is analyzed, and more accurate Users'Data Analysis result is obtained.
In one embodiment, analyze the corresponding user data of each user identifier, obtain corresponding customer analysis as a result,
The analysis result, in the user data of each platform, can more comprehensively reflect the consumption idea of user and disappear with reference to user
Expense credit etc. is for describing the personal behavior of user and the evaluation data of personal preference.
In an embodiment specifically, a kind of multi-platform data management system is provided, passes through multi-platform data pipe
Reason system realizes multi-platform data managing method.Wherein multi-platform data management system includes cross-platform data management function, meeting
Member's information encryption function.
Cross-platform data management function.Multi-platform data management system provides unique interface to third-party platform, this connects
The storage of data may be implemented in mouth, including the latest data after increasing data newly and changing, i.e., opens write-in to third-party platform
Permission.Since data type is more, for convenience, by taking member data as an example, multi-platform data management system is not to
Tripartite's platform provides the function of inquiry data and member data, i.e., does not open to third-party platform and read data and delete data
Permission.Multi-platform data management system can write on the operation note of third-party platform in journal file.Real-time tracking and control
The operation of third party's access control member data.
In multi-platform data management system, by increasing a super main table of membership information and associated subtabulation, reach
The member data unified integration purpose of different platform.As shown in figure 3, providing the incidence relation of specific a main table and subtabulation
Scheme, includes main table, member's charging information table, change information of member card table, integral increase and decrease information table, accumulated point exchanging information in figure
Information table, wechat information of member card table and food and drink information of member card table are reported the loss in table, member card activation.The super member of this system
UnionID field is added in the main table of information, the unique identification of one user of field expression in the present system, i.e. expression are at this
User only one UnionID in system.MemberID is added in third party's subtabulation, that is, is directed to a user, system pair
Different third party systems can generate different memberID, these memberID for belonging to the same user can be associated with super meeting
The UnionID field of the main table of member can inquire associated card type to realize the UnionID according to a user.
Membership information encryption.As shown in figure 4, using highly-safe cipher mode: SHA512 (SHA512 (password)
+ salt), this cipher mode is to generate numeric string salt at random by system, and a member generates a salt, is obtained final
After ciphertext, need to store salt in the database.The clear-text passwords character string that member inputs is added using SHA512
Close, the ciphertext after encrypting needs and salt does splicing, and the content after splicing is done SHA512 encryption again, is obtained most
Whole ciphertext.Again by the storage of obtained ciphertext into database.
Such as: salt=88669900345;Password=BeePLUS;
SHA512 (BeePLUS)=57442defeb7309285510741d1d68529cb30af1eee651e38a051
8b946ddd17028025e2fa9c75765cac9784393405836225c118473fd8d8adf1336b3f15884cd
3f;
SHA512 (SHA512 (BeePLUS)+salt)=
0c7c99ad4655bb436546934ec567c29b8724a7637c156055776e3ea596f1643f43e8
b8c3205542dbc91636428fc609f78f877b4a92a83a3332358760ec797061。
As shown in figure 5, when user's registration, 1, user's offer password and other users information.2, system is raw for user
At salt value.3, multi-platform data management system connects together salt value with account number cipher, carries out to the value after connection
Hash, obtains hash value.4, hash value and salt value are put into database respectively.5, it succeeds in registration.
Member data is encrypted, DBA is merely able to view encrypted ciphertext, not necessarily knows Encryption Algorithm, institute
To be difficult to crack password.Same administrator can only see encrypted ciphertext from database.MD5 (MD5+salt) encryption
Method can not have been produced at present by rainbow table, if to produce the password of such 10 digits (letter+data), rainbow
The data volume that table needs also is not implemented.So either external attempt to obtain the work people of the people or enterprises of membership password
Member, can not view the password of member.To ensure the safety of member account.
As shown in fig. 6, when users log on, 1, user's offer username and password.2, server passes through username data
Corresponding hash value and salt value are found in library.3, database returns to corresponding hash value and salt value.4, server will
The password that salt value and user provide is spliced together, then is hashed with the value after connection, and Hash1 is obtained, compare Hash and
Whether Hash1 is equal.5, equal, indicate that password is correct, it is not equal then to indicate password mistake.
Electronics member card.For old member, wechat is opened, scans the member card two dimensional code in businessman shop, old member can be real
Real cognition person's card conversion electron member card, electronics member card will be stored into the card packet of wechat.The Stored Value of entity member card,
The information such as integral, Gift Voucher will synchronize electronics member card strictly according to the facts.
For recruit, wechat is opened, scans the member card two dimensional code in businessman shop, super member can be become, and obtain
An electronics member card is obtained, is stored in wechat card packet.When businessman consumes and settles accounts, businessman can be enjoyed by showing wechat member card
Member's discount of offer and preferential, and it is able to achieve the functions such as integral, Stored Value, discount coupon, Gift Voucher, metering consumption.
Update practical member data.Multi-platform data management system provides real time automatic update member data function, avoids
Manual operation fault.When member modifies member card data, click after submitting function, multi-platform data management system will be received
To modification information of member card push, system judges automatically the field to change, updates up-to-date information to super member database.
When businessman cancels or reinstates a member, click after submitting function, multi-platform data management system will receive
Change member's status information push, system judge automatically last state be cancel or restore, system update last state to surpass
Grade member database.
Member's real-name authentication.This system provides verifying membership information function, the name inputted by user, password, mobile phone
Number or identity card, in conjunction with transfer member binding bank card essential information, judge member whether real-name authentication.If user inputs
Name, cell-phone number or identity card are consistent with the bank card information for transferring member's binding, then this member is the member authenticated,
This system can cryptographically store in the database the member authenticated is again labelled.
Member's automatic customization service.Increase message timing push function in multi-platform data management system.Pass through extraction
Data in the super main table of membership information, member data have the commemoration day information such as birthday and wedding anniversary of member, in conjunction with fixed
When building block technique, realize on time to member push greet blessing message function.
Analyze member's consumer behavior data.By extracting the user behavior data being stored in data, data include member
History supplements record, membership buying commodity historical data, member's hobby data, member's essential information data etc. with money, uses number
According to analytical technology, member's consumer behavior is effectively analyzed, to improve the loyalty and purchase rate again of member.
Multi-platform data management system supports third-party platform insertion, keeps set expandability stronger.Member data is unified to be added
In the close database for being stored in multi-platform data management system, improve member data safety and stability with, while
Facilitate management member data.The encryption of member data links the operating right of this system with control third party, ensures member data
Safety.This system, which is realized, is converted into electronics member card material object card, to be enterprise's save the cost.Member's real-name authentication,
Improve the degree of belief between businessman and member.This system real-time update member's latest data, can achieve the true of member data
Reliability carries out technical foundation for analysis member's consumer behavior.
Fig. 2 is the flow diagram of multi-platform data managing method in one embodiment.Although should be understood that Fig. 2
Flow chart in each step successively show that but these steps are not inevitable to indicate according to arrow according to the instruction of arrow
Sequence successively execute.Unless expressly stating otherwise herein, there is no stringent sequences to limit for the execution of these steps, these
Step can execute in other order.Moreover, at least part step in Fig. 2 may include multiple sub-steps or multiple
Stage, these sub-steps or stage are not necessarily to execute completion in synchronization, but can execute at different times,
These sub-steps perhaps the stage execution sequence be also not necessarily successively carry out but can be with other steps or other steps
Sub-step or at least part in stage execute in turn or alternately.
In one embodiment, as shown in fig. 7, providing a kind of multi-platform data administrator 200, comprising:
Data reception module 201, user's logging request that the user terminal for receiving third-party platform is sent, login are asked
It asks including platform identification, user account and user key.
Data inquiry module 202, for inquiring corresponding default random sequence and default cryptographic Hash according to user account.
Data splicing module 203 obtains corresponding splicing sequence for splicing default random sequence and account number cipher.
Data Verification module 204 obtains current cryptographic Hash, to current Hash for carrying out Hash operation to splicing sequence
Value and default cryptographic Hash are verified.
Data transmission blocks 205, it is extremely corresponding with platform identification for when the authentication succeeds, returning to the message being proved to be successful
Third-party platform.
In one embodiment, above-mentioned multi-platform data administrator, further includes:
Table establishes module, includes the first user identifier, each pair in main table for building main table and corresponding multiple subtabulations
It is identified in table comprising second user, the first user identifier is corresponding with second user mark;
Registration module generates the according to registration request for when receiving the registration request of any one third fang platform
One user identifier generates second user corresponding with the first user identifier according to the corresponding platform identification of registration request and identifies, root
Default random sequence is generated according to registration request, splices the registration user key carried in default random sequence and registration request, obtains
To default splicing value, Hash operation is carried out to default splicing value, obtains default cryptographic Hash.
In one embodiment, above-mentioned multi-platform data administrator, further includes:
Operation note obtains module, for obtaining the operation note of each third-party platform, saves operation note.
Management strategy generation module, for generating the corresponding management strategy of each third-party platform according to operation note.
Policy enforcement module, for executing the corresponding management strategy of each third-party platform, to realize to each third party
The control of the data flow of platform.
In one embodiment, above-mentioned multi-platform data administrator, further includes:
User data obtains module, for obtaining the corresponding historical operating data of user identifier.
Users'Data Analysis module, for analyzing history behaviour of each user identifier in corresponding each third-party platform
Make data, obtains each user identifier in the behavior outcome of corresponding third-party platform.
Data-pushing module, in the behavior outcome of the corresponding third-party platform, sending each user identifier
To corresponding third-party platform, so that third-party platform pushes corresponding mention according to the corresponding behavior outcome of each user identifier
Show information.
Fig. 8 shows the internal structure chart of computer equipment in one embodiment.The computer equipment specifically can be Fig. 1
In terminal 110 (or server 120).As shown in figure 8, it includes total by system that the computer equipment, which includes the computer equipment,
Processor, memory, network interface, input unit and the display screen of line connection.Wherein, memory includes that non-volatile memories are situated between
Matter and built-in storage.The non-volatile memory medium of the computer equipment is stored with operating system, can also be stored with computer journey
Sequence when the computer program is executed by processor, may make processor to realize multi-platform data managing method.In the built-in storage
Computer program can also be stored, when which is executed by processor, processor may make to execute multi-platform data pipe
Reason method.The display screen of computer equipment can be liquid crystal display or electric ink display screen, the input of computer equipment
Device can be the touch layer covered on display screen, be also possible to the key being arranged on computer equipment shell, trace ball or touching
Plate is controlled, can also be external keyboard, Trackpad or mouse etc..
It will be understood by those skilled in the art that structure shown in Fig. 8, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, multi-platform data administrator provided by the present application can be implemented as a kind of computer program
Form, computer program can run in computer equipment as shown in Figure 8.Group can be stored in the memory of computer equipment
At each program module of the multi-platform data administrator, for example, A module shown in Fig. 7, B module and C module.Each journey
The computer program of sequence module composition makes processor execute the multi-platform of each embodiment of the application described in this specification
Step in data managing method.
For example, computer equipment shown in Fig. 8 can pass through the data in multi-platform data administrator as shown in Figure 7
Receiving module 201, which executes, receives user's logging request that the user terminal of third-party platform is sent, and logging request includes platform mark
Knowledge, user account and user key.Computer equipment can be executed to be inquired according to user account by data inquiry module 202 and be corresponded to
Default random sequence and default cryptographic Hash.Computer equipment can be executed by data splicing module 203 splices default stochastic ordering
Column and account number cipher, obtain corresponding splicing sequence.Computer equipment can be executed by Data Verification module 204 to splicing sequence
Hash operation is carried out, current cryptographic Hash is obtained, current cryptographic Hash and default cryptographic Hash is verified.Computer equipment can pass through
It is flat to third party corresponding with platform identification that data transmission blocks 205 execute the message for returning be proved to be successful when the authentication succeeds
Platform.
In one embodiment, a kind of computer equipment is provided, including memory, processor and storage are on a memory
And the computer program that can be run on a processor, processor performs the steps of when executing computer program receives third party
User's logging request that the user terminal of platform is sent, logging request include platform identification, user account and user key, according to
User account inquires corresponding default random sequence and default cryptographic Hash, splices default random sequence and account number cipher, obtains pair
The splicing sequence answered carries out Hash operation to splicing sequence, obtains current cryptographic Hash, to current cryptographic Hash and default cryptographic Hash into
Row verifying returns to the message being proved to be successful extremely third-party platform corresponding with platform identification when the authentication succeeds.
In one embodiment, receive at least one third-party platform forwarding user terminal send logging request it
Before, processor also performs the steps of when executing computer program constructs main table and corresponding multiple subtabulations, comprising the in main table
One user identifier is identified comprising second user in each subtabulation, and the first user identifier is corresponding with second user mark, when receiving
When the registration request of any one third fang platform, the first user identifier is generated according to registration request, it is corresponding according to registration request
Platform identification generates second user mark corresponding with the first user identifier, generates default random sequence according to registration request, spells
The registration user key carried in default random sequence and registration request is connect, default splicing value is obtained, default splicing value is carried out
Hash operation obtains default cryptographic Hash.
In one embodiment, it is flat that acquisition each third party is also performed the steps of when processor executes computer program
The operation note of platform saves operation note, generates the corresponding management strategy of each third-party platform according to operation note, executes each
The corresponding management strategy of a third-party platform, to realize the control to the data flow of each third-party platform.
In one embodiment, it is corresponding that acquisition user identifier is also performed the steps of when processor executes computer program
Historical operating data, analyze historical operating data of each user identifier in corresponding each third-party platform, obtain each
A user identifier corresponding third-party platform behavior outcome, by each user identifier corresponding third-party platform behavior
As a result, corresponding third-party platform is sent to, so that third-party platform is according to the corresponding behavior outcome of each user identifier, push
Corresponding prompt information.
In one embodiment, behavior outcome includes credit result and behavior trend, and credit result is for evaluating user's
Credit rating, behavior trend is for predicting the interested information of user.
In one embodiment, user key be the account number cipher that is carried according to logging request according to predetermined encryption mode into
The key that row encryption obtains.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of when being executed by processor receives user's logging request that the user terminal of third-party platform is sent,
Logging request includes platform identification, user account and user key, according to user account inquire corresponding default random sequence and
Default cryptographic Hash splices default random sequence and account number cipher, obtains corresponding splicing sequence, carries out Hash fortune to splicing sequence
It calculates, obtains current cryptographic Hash, current cryptographic Hash and default cryptographic Hash are verified, when the authentication succeeds, return is proved to be successful
Message to third-party platform corresponding with platform identification.
In one embodiment, receive at least one third-party platform forwarding user terminal send logging request it
Before, it is also performed the steps of when computer program is executed by processor and constructs main table and corresponding multiple subtabulations, include in main table
First user identifier is identified comprising second user in each subtabulation, and the first user identifier is corresponding with second user mark, works as reception
To any one third fang platform registration request when, the first user identifier is generated according to registration request, it is corresponding according to registration request
Platform identification generate corresponding with the first user identifier second user mark, generated according to registration request and preset random sequence,
Splice the registration user key carried in default random sequence and registration request, obtain default splicing value, to default splicing be worth into
Row Hash operation obtains default cryptographic Hash.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains each third party
The operation note of platform saves operation note, generates the corresponding management strategy of each third-party platform according to operation note, executes
The corresponding management strategy of each third-party platform, to realize the control to the data flow of each third-party platform.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains user identifier pair
The historical operating data answered is analyzed historical operating data of each user identifier in corresponding each third-party platform, is obtained
Each user identifier corresponding third-party platform behavior outcome, by each user identifier corresponding third-party platform row
For as a result, corresponding third-party platform is sent to, so that third-party platform is pushed away according to the corresponding behavior outcome of each user identifier
Send corresponding prompt information.
In one embodiment, behavior outcome includes credit result and behavior trend, and credit result is for evaluating user's
Credit rating, behavior trend is for predicting the interested information of user.
In one embodiment, user key be the account number cipher that is carried according to logging request according to predetermined encryption mode into
The key that row encryption obtains.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a non-volatile computer and can be read
In storage medium, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, provided herein
Each embodiment used in any reference to memory, storage, database or other media, may each comprise non-volatile
And/or volatile memory.Nonvolatile memory may include that read-only memory (ROM), programming ROM (PROM), electricity can be compiled
Journey ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include random access memory
(RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, such as static state RAM
(SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhanced SDRAM
(ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) directly RAM (RDRAM), straight
Connect memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
It should be noted that, in this document, the relational terms of such as " first " and " second " or the like are used merely to one
A entity or operation with another entity or operate distinguish, without necessarily requiring or implying these entities or operation it
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to
Cover non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or setting
Standby intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in the process, method, article or apparatus that includes the element.
The above is only a specific embodiment of the invention, is made skilled artisans appreciate that or realizing this hair
It is bright.Various modifications to these embodiments will be apparent to one skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and applied principle and features of novelty phase one herein
The widest scope of cause.
Claims (10)
1. a kind of multi-platform data managing method, which is characterized in that the described method includes:
User's logging request that the user terminal of third-party platform is sent is received, the logging request includes platform identification, user
Account and user key;
Corresponding default random sequence and default cryptographic Hash are inquired according to the user account;
Splice the default random sequence and the account number cipher, obtains corresponding splicing sequence;
Hash operation is carried out to the splicing sequence, current cryptographic Hash is obtained, to the current cryptographic Hash and the default Hash
Value is verified;
When the authentication succeeds, the message the being proved to be successful extremely third-party platform corresponding with the platform identification is returned.
2. the method according to claim 1, wherein the user for receiving the forwarding of at least one third-party platform
Before the logging request that terminal is sent, further includes:
It constructs main table and corresponding multiple subtabulations, includes the first user identifier in the main table, comprising the in each subtabulation
Two user identifiers, first user identifier are corresponding with second user mark;
When receiving the registration request of any one of third fang platform, first user is generated according to the registration request
Mark generates the second user corresponding with first user identifier according to the corresponding platform identification of registration request and identifies;
The default random sequence is generated according to the registration request, is spliced in the default random sequence and the registration request
The registration user key of carrying obtains default splicing value;
Hash operation is carried out to the default splicing value, obtains the default cryptographic Hash.
3. the method according to claim 1, wherein the method also includes:
The operation note for obtaining each third-party platform, saves the operation note;
The corresponding management strategy of each third-party platform is generated according to the operation note;
The corresponding management strategy of each third-party platform is executed, to realize the data to each third-party platform
The control of stream.
4. the method according to claim 1, wherein the method also includes:
Obtain the corresponding historical operating data of the user identifier;
Historical operating data of each user identifier in corresponding each third-party platform is analyzed, each institute is obtained
User identifier is stated in the behavior outcome of the corresponding third-party platform;
By each user identifier in the behavior outcome of the corresponding third-party platform, it is sent to the corresponding third party
Platform, so that the third-party platform pushes corresponding prompt information according to the corresponding behavior outcome of each user identifier.
5. according to the method described in claim 4, it is characterized in that, the behavior outcome includes credit result and behavior trend,
The credit result is used to evaluate the credit rating of user, and the behavior trend is for predicting the interested information of user.
6. according to claim 1 to method described in 5 any one, which is characterized in that the user key is to step on according to
The key that the account number cipher that record request carries is encrypted according to predetermined encryption mode.
7. a kind of multi-platform data administrator, which is characterized in that described device includes:
Data reception module, user's logging request that the user terminal for receiving third-party platform is sent, the logging request
Including platform identification, user account and user key;
Data inquiry module, for inquiring corresponding default random sequence and default cryptographic Hash according to the user account;
Data splicing module obtains corresponding splicing sequence for splicing the default random sequence and the account number cipher;
Data Verification module obtains current cryptographic Hash, to the current Hash for carrying out Hash operation to the splicing sequence
Value and the default cryptographic Hash are verified;
Data transmission blocks, for when the authentication succeeds, returning to the message being proved to be successful to institute corresponding with the platform identification
State third-party platform.
8. device according to claim 7, which is characterized in that described device further include:
Table establishes module, includes the first user identifier, Ge Gesuo in the main table for building main table and corresponding multiple subtabulations
It states in subtabulation and is identified comprising second user, first user identifier is corresponding with second user mark;
Registration module, for being given birth to according to the registration request when receiving the registration request of any one of third fang platform
At first user identifier, generated according to the corresponding platform identification of registration request corresponding with first user identifier described
Second user mark generates the default random sequence according to the registration request, splice the default random sequence with it is described
The registration user key carried in registration request obtains default splicing value, carries out Hash operation to the default splicing value, obtains
The default cryptographic Hash.
9. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor
Calculation machine program, which is characterized in that the processor realizes any one of claims 1 to 6 institute when executing the computer program
The step of stating method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 6 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910411252.6A CN110309668A (en) | 2019-05-16 | 2019-05-16 | Multi-platform data managing method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910411252.6A CN110309668A (en) | 2019-05-16 | 2019-05-16 | Multi-platform data managing method, device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110309668A true CN110309668A (en) | 2019-10-08 |
Family
ID=68075507
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910411252.6A Pending CN110309668A (en) | 2019-05-16 | 2019-05-16 | Multi-platform data managing method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110309668A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111241081A (en) * | 2020-01-09 | 2020-06-05 | 杭州涂鸦信息技术有限公司 | IOT platform data collection method and system, readable storage medium and computer equipment |
CN111523132A (en) * | 2020-04-21 | 2020-08-11 | 国网电子商务有限公司 | Data storage and transmission method and device based on identification technology |
CN112463749A (en) * | 2020-12-03 | 2021-03-09 | 平安普惠企业管理有限公司 | File sharing method, device, medium and electronic equipment |
CN112712328A (en) * | 2019-10-25 | 2021-04-27 | 拉扎斯网络科技(上海)有限公司 | Information processing method, information processing device, electronic equipment and computer readable storage medium |
CN112966168A (en) * | 2021-03-11 | 2021-06-15 | 支付宝(杭州)信息技术有限公司 | Business label query method and device for realizing privacy protection |
CN113726830A (en) * | 2020-05-25 | 2021-11-30 | 网联清算有限公司 | Message identifier generation method and device |
CN113965365A (en) * | 2021-10-15 | 2022-01-21 | 杭州安恒信息技术股份有限公司 | Platform data management method, system, computer and readable storage medium |
CN114584314A (en) * | 2022-02-28 | 2022-06-03 | 天翼安全科技有限公司 | Registration method, device, equipment and medium |
CN115708340A (en) * | 2021-08-20 | 2023-02-21 | 清华大学 | Data verification method, device and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106558149A (en) * | 2016-11-29 | 2017-04-05 | 国网山东省电力公司鄄城县供电公司 | A kind of intelligent electricity charge pre-storage method and system |
CN107733656A (en) * | 2017-10-23 | 2018-02-23 | 北京深思数盾科技股份有限公司 | A kind of cipher authentication method and device |
CN109002490A (en) * | 2018-06-26 | 2018-12-14 | 腾讯科技(深圳)有限公司 | User's portrait generation method, device, server and storage medium |
-
2019
- 2019-05-16 CN CN201910411252.6A patent/CN110309668A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106558149A (en) * | 2016-11-29 | 2017-04-05 | 国网山东省电力公司鄄城县供电公司 | A kind of intelligent electricity charge pre-storage method and system |
CN107733656A (en) * | 2017-10-23 | 2018-02-23 | 北京深思数盾科技股份有限公司 | A kind of cipher authentication method and device |
CN109002490A (en) * | 2018-06-26 | 2018-12-14 | 腾讯科技(深圳)有限公司 | User's portrait generation method, device, server and storage medium |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112712328A (en) * | 2019-10-25 | 2021-04-27 | 拉扎斯网络科技(上海)有限公司 | Information processing method, information processing device, electronic equipment and computer readable storage medium |
CN111241081A (en) * | 2020-01-09 | 2020-06-05 | 杭州涂鸦信息技术有限公司 | IOT platform data collection method and system, readable storage medium and computer equipment |
CN111523132A (en) * | 2020-04-21 | 2020-08-11 | 国网电子商务有限公司 | Data storage and transmission method and device based on identification technology |
CN113726830A (en) * | 2020-05-25 | 2021-11-30 | 网联清算有限公司 | Message identifier generation method and device |
CN113726830B (en) * | 2020-05-25 | 2023-09-12 | 网联清算有限公司 | Message identifier generation method and device |
CN112463749A (en) * | 2020-12-03 | 2021-03-09 | 平安普惠企业管理有限公司 | File sharing method, device, medium and electronic equipment |
CN112966168A (en) * | 2021-03-11 | 2021-06-15 | 支付宝(杭州)信息技术有限公司 | Business label query method and device for realizing privacy protection |
CN112966168B (en) * | 2021-03-11 | 2022-05-17 | 支付宝(杭州)信息技术有限公司 | Business label query method and device for realizing privacy protection |
CN115708340A (en) * | 2021-08-20 | 2023-02-21 | 清华大学 | Data verification method, device and storage medium |
CN115708340B (en) * | 2021-08-20 | 2024-07-23 | 清华大学 | Data verification method, device and storage medium |
CN113965365A (en) * | 2021-10-15 | 2022-01-21 | 杭州安恒信息技术股份有限公司 | Platform data management method, system, computer and readable storage medium |
CN114584314A (en) * | 2022-02-28 | 2022-06-03 | 天翼安全科技有限公司 | Registration method, device, equipment and medium |
CN114584314B (en) * | 2022-02-28 | 2024-06-14 | 天翼安全科技有限公司 | Registration method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110309668A (en) | Multi-platform data managing method, device, computer equipment and storage medium | |
EP3520319B1 (en) | Distributed electronic record and transaction history | |
CN109639406A (en) | Efficient trust solution based on block chain and IPFS | |
US20190172021A1 (en) | Distributed Ledger Applications | |
CN110365670A (en) | Blacklist sharing method, device, computer equipment and storage medium | |
CN103377332B (en) | The method of access application and device | |
CN109242467A (en) | Network-building method, device, computer equipment and storage medium based on block chain | |
US20090228370A1 (en) | Systems and methods for identification and authentication of a user | |
US20080120507A1 (en) | Methods and systems for authentication of a user | |
CN105022966B (en) | Database data encryption decryption method and system | |
US10762543B2 (en) | Data security system and method | |
CN104994064B (en) | A kind of authorization and authentication method and system based on client plug-in | |
TW201032157A (en) | Multifactor authentication with changing unique values | |
CN107332844B (en) | Private information using method and personal credit assessment scoring method | |
KR102718148B1 (en) | Method and system for the generation of user-initiated federated identities | |
CN112231284A (en) | Block chain-based big data sharing system, method, device and storage medium | |
CN111160998A (en) | Comment data processing method and device based on block chain and comment system | |
CN107707356B (en) | A kind of mobile device secure binding method and application system based on two dimensional code identification | |
CN105871923A (en) | Information processing method, information recording nodes and participation nodes | |
CN110135175A (en) | Information processing, acquisition methods, device, equipment and medium based on block chain | |
CN112446780A (en) | Account management method and device, computer equipment and storage medium | |
CN109739827A (en) | A kind of block chain storage system based on double-strand framework | |
CN109409041A (en) | A kind of server-side safety certifying method and system based on the application of more certificates | |
CN110471908A (en) | A kind of joint modeling method and device | |
CN111210190B (en) | File signing method, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191008 |