Nothing Special   »   [go: up one dir, main page]

CN111249740A - Resource data access method and system - Google Patents

Resource data access method and system Download PDF

Info

Publication number
CN111249740A
CN111249740A CN202010013456.7A CN202010013456A CN111249740A CN 111249740 A CN111249740 A CN 111249740A CN 202010013456 A CN202010013456 A CN 202010013456A CN 111249740 A CN111249740 A CN 111249740A
Authority
CN
China
Prior art keywords
resource
private key
request
client
key signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010013456.7A
Other languages
Chinese (zh)
Inventor
吴双
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Mihoyo Tianming Technology Co Ltd
Original Assignee
Shanghai Mihoyo Tianming Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Mihoyo Tianming Technology Co Ltd filed Critical Shanghai Mihoyo Tianming Technology Co Ltd
Priority to CN202010013456.7A priority Critical patent/CN111249740A/en
Publication of CN111249740A publication Critical patent/CN111249740A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/71Game security or game management aspects using secure communication between game devices and game servers, e.g. by encrypting game data or authenticating players
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a method and a system for accessing resource data. The method comprises the following steps: the game server receives a resource encryption request sent by a client based on a resource access request instruction, wherein the resource encryption request comprises an identity authentication request; the game server acquires an identity code corresponding to the identity authentication request and generates a private key signature corresponding to the resource encryption request according to the identity code; and the game server sends the identity code and the private key signature to the client so that the client accesses a resource server to acquire resource data according to the identity code and the private key signature. The embodiment of the invention encrypts the user identity needing resource access through the game server, solves the problem that an attacker maliciously modifies the resource access request, improves the security of the user identity in the resource access request, and also reduces the calculation pressure of the client for executing the encryption process.

Description

Resource data access method and system
Technical Field
The embodiment of the invention relates to the technical field of network transmission, in particular to a resource data access method and system.
Background
Currently, there are 4 kinds of network communication Transmission protocols in game development, which are Transmission Control Protocol (TCP), User Datagram Protocol (UDP), hypertext Transfer Protocol (http), and WebSocket Protocol. The http protocol is widely used due to the low research and development cost, rapid development, more open source software, mature protocol and the like. Under the scene with low requirement on interactivity, the method is often used as an auxiliary communication means. But the http protocol has a great disadvantage in terms of security. The simple http protocol directly uses plaintext transmission, an attacker can directly intercept a transmitted data packet and modify player identity information in the data packet to obtain request resources returned by the http server.
In the prior art, the content of a data packet is usually signed and encrypted at a client to ensure the reliability of the player identity information in the data packet. However, based on the technical method, an attacker can modify the player identity information in the data packet before the signature starts by modifying the memory through third-party software and the like, so that the risk of verifying the signature by an http server is avoided.
Disclosure of Invention
The embodiment of the invention provides a resource data access method and a resource data access system, which are used for improving the safety of user identities in resource access requests and reducing the computing pressure of a client side in an encryption process.
In a first aspect, an embodiment of the present invention provides a method for accessing resource data, where the method includes:
the game server receives a resource encryption request sent by a client based on a resource access request instruction, wherein the resource encryption request comprises an identity authentication request;
the game server acquires an identity code corresponding to the identity authentication request and generates a private key signature corresponding to the resource encryption request according to the identity code;
and the game server sends the identity code and the private key signature to the client so that the client accesses a resource server to acquire resource data according to the identity code and the private key signature.
In a second aspect, an embodiment of the present invention further provides a system for accessing resource data, where the system includes: at least one client, a game server and a resource server;
the game server comprises a resource encryption request receiving module, a private key signature generating module and a private key signature sending module;
the resource encryption request receiving module is used for receiving a resource encryption request sent by a client based on a resource access request instruction, wherein the resource encryption request comprises an identity authentication request;
the private key signature generation module is used for acquiring the identity code corresponding to the identity verification request and generating a private key signature corresponding to the resource encryption request according to the identity code;
and the private key signature sending module is used for sending the identity code and the private key signature to the client so that the client accesses a resource server to obtain resource data according to the identity code and the private key signature.
The embodiment of the invention encrypts the user identity needing resource access through the game server, solves the problem that an attacker maliciously modifies the resource access request, improves the security of the user identity in the resource access request, and also reduces the calculation pressure of the client for executing the encryption process.
Drawings
Fig. 1 is a flowchart of a method for accessing resource data according to an embodiment of the present invention.
Fig. 2 is a flowchart of a resource data access method according to a second embodiment of the present invention.
Fig. 3 is a flowchart of a specific example of a method for accessing resource data according to a second embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a system for accessing resource data according to a third embodiment of the present invention.
Fig. 5 is a schematic diagram of a specific example of a system for accessing resource data according to a third embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of a resource data access method according to an embodiment of the present invention, which is applicable to a situation where a client accesses resource data to a resource server. The method specifically comprises the following steps:
s110, the game server receives a resource encryption request sent by the client based on the resource access request instruction, wherein the resource encryption request comprises an identity authentication request.
Wherein the type of game server illustratively comprises a dedicated game server. The dedicated game server refers to a server operated by a game developer, and the dedicated game server can bear a plurality of persons and is online at the same time, so that the dedicated game server is more applied to online games.
The resource access request instruction refers to a request instruction generated when a client needs to access resource data to a resource server. In one embodiment, optionally, the client generates a resource access request instruction corresponding to the resource access operation when receiving the resource access operation input by the user, where the resource access operation includes at least one of accessing a web page, synthesizing equipment, and accessing a game announcement.
When a user inputs an operation of accessing a webpage at a client, a resource access request needs to be sent to a resource server, so that the resource server returns corresponding content to the client, and the user can view webpage information at the client conveniently; the equipment synthesis refers to an operation in game software, for example, a user possesses a primary equipment A and a primary equipment B, and the primary equipment A and the primary equipment B can be synthesized into a piece of high-level equipment according to a preset program of the game software, and the equipment synthesis operation executed by the user needs to call resource data related to the high-level equipment provided in a resource server to load the high-level equipment in the game software of the user so as to complete the equipment synthesis operation; the game bulletin is game information such as game activities, game rules and game rewards issued by a game developer system, and when a user performs an operation of accessing the game bulletin, information on the game bulletin can be returned by accessing the resource server. The resource access operation input by the user is not limited here, and may be set according to the specific use condition of the client.
The resource encryption request refers to request information which is sent to the game server by the client and needs to be encrypted. In this embodiment, the resource encryption request comprises an authentication request. When a user logs in to the game software, the game server identifies account information corresponding to the login information. The login information may be, for example, a user name, a login password, face information, voiceprint information, fingerprint information, and the like. Correspondingly, the authentication request may be a user name, a login password, face information, voiceprint information, and fingerprint information, or may be an authentication instruction generated by the client based on the login information. The specific form of the authentication request is not limited herein.
S120, the game server obtains the identity code corresponding to the identity verification request and generates a private key signature corresponding to the resource encryption request according to the identity code.
When the user registers the game software, the game server generates an identity code corresponding to the registered user. The identity code is coded information for uniquely identifying the registered user. Exemplary methods for generating the identity code of the registered user include a UUID algorithm and a snowfly algorithm, and the method for generating the identity code is not limited herein.
The signature processing is a private key signature, and is a valid proof of the authenticity of the information transmitted by the sender of the information. The private key signature is to encrypt the contents to be transmitted by a private key and transmit the encrypted file and the transmitted contents to the receiver at the same time. The receiver decrypts the encrypted file using the public key corresponding to the private key, and determines whether the transmitted content is the same as the decrypted content. In one embodiment, optionally, the game server signs the identity code with a private key using a SHA256 encryption algorithm to generate a private key signature corresponding to the resource encryption request. Among them, the SHA256 encryption algorithm is a one-way hash function that converts messages of arbitrary length into shorter and fixed-length message digests.
S130, the game server sends the identity code and the private key signature to the client, so that the client accesses the resource server to obtain resource data according to the identity code and the private key signature.
The client generates a resource access request according to the identity code, the private key signature and the resource access information, and sends the resource access request to the resource server; and the client receives the resource data sent by the resource server based on the resource access request.
The resource access information is access information generated by the client based on resource access operation input by a user, and the resource server can determine resource data which needs to be returned to the client according to the resource access information. In an embodiment, optionally, the client concatenates the identity code, the private key signature, and the resource access information to generate the resource access request. Illustratively, the concatenation is performed in the order of identity encoding, private key signature, and resource access information. The order of splicing is not limited herein.
The resource server may be a web server or an http server, for example. In an embodiment, optionally, the resource server receives a resource access request sent by the client, and determines whether to send resource data corresponding to the resource access request to the client according to a private key signature in the resource access request.
Specifically, the resource server decrypts a private key signature in the received resource access request by using a public key algorithm corresponding to the SHA256 encrypted private key, and verifies an identity code in the resource access request according to a decryption result; and if the verification is successful, the resource server sends the resource data corresponding to the resource access request to the client.
If the identity code obtained by decryption is the same as the identity code in the resource access request, the verification is considered to be successful; and if the identity code obtained by decryption is different from the identity code in the resource access request, the authentication is considered to be failed.
In one embodiment, optionally, the resource server performs a failure response operation if the authentication fails. The exemplary failure response operation includes at least one response operation of the resource server refusing the client to access the resource data, the resource server generating an access refusing instruction and sending the access refusing instruction to the client, and the resource server generating a risk prompt instruction and sending the risk prompt instruction to the client. The risk prompting instruction is used for prompting that the client has access risk during resource access, so that the client can perform subsequent processing on the access risk.
According to the technical scheme, the game server is used for encrypting the user identity needing resource access, so that the problem that an attacker maliciously modifies the resource access request is solved, the security of the user identity in the resource access request is improved, and the computing pressure of the client side in the encryption process is reduced.
Example two
Fig. 2 is a flowchart of a resource data access method provided in the second embodiment of the present invention, and the technical solution of the present embodiment is further detailed based on the foregoing embodiment. Optionally, the resource encryption request further includes resource access information, and correspondingly, before the game server generates a private key signature corresponding to the resource encryption request according to the identity code, the method further includes: and the game server splices the identity code and the resource access information to generate initial encryption information.
The specific real-time steps of this embodiment include:
s210, the game server receives a resource encryption request sent by the client based on the resource access request instruction, wherein the resource encryption request comprises an identity authentication request and resource access information.
The resource access information is access information generated by the client based on resource access operation input by a user, and the resource server can determine resource data which needs to be returned to the client according to the resource access information.
S220, the game server obtains the identity code corresponding to the identity authentication request, and splices the identity code and the resource access information to generate initial encryption information.
For example, the identity code and the resource access information may be spliced by writing the identity code into any information position in the resource access information. Specifically, the information position may be a start, end, or middle position of the resource access information. Accordingly, the initial encryption information includes the identity code and the resource access information.
And S230, the game server generates a private key signature corresponding to the resource encryption request according to the initial encryption information.
In one embodiment, optionally, the game server uses the SHA256 encryption algorithm to sign the initial encryption information with the private key, and generates a private key signature corresponding to the resource encryption request. Among them, the SHA256 encryption algorithm is a one-way hash function that converts messages of arbitrary length into shorter and fixed-length message digests.
S240, the game server sends the identity code and the private key signature to the client, so that the client accesses the resource server to obtain resource data according to the identity code and the private key signature.
The client generates a resource access request according to the initial encryption information and the private key signature, and sends the resource access request to the resource server; and the client receives the resource data sent by the resource server based on the resource access request.
Specifically, the resource server decrypts a private key signature in the received resource access request by using a public key algorithm corresponding to the SHA256 encrypted private key, and verifies initial encrypted information in the resource access request according to a decryption result; and if the verification is successful, the resource server sends the resource data corresponding to the resource access request to the client.
If the initial encryption information obtained by decryption is the same as the initial encryption information in the resource access request, namely the identity code and the resource access information are the same, the authentication is considered to be successful; and if the initial encrypted information obtained by decryption is different from the initial encrypted information in the resource access request, namely at least one information object in the identity code and the resource access information is different, the authentication is considered to be failed.
Fig. 3 is a flowchart of a specific example of a method for accessing resource data according to a second embodiment of the present invention. When a client receives a resource access operation input by a user, generating a resource access request instruction; and sending a resource encryption request to the game server based on the resource access request instruction, wherein the resource encryption request comprises an identity authentication request and resource access information. The game server acquires the identity code corresponding to the identity authentication request, and splices the identity code with the resource access information to generate initial encryption information. The game server signs the initial encryption information by using a private key to generate a private key signature. And sending the identity code and the private key signature to the client. The client splices the identity code, the private key signature and the resource access information to generate a resource access request, and sends the resource access request to a resource server, wherein the resource server can be an http server. And the http server verifies the private key signature in the resource access request and determines whether the initial encryption information corresponding to the private key signature is the same as the initial encryption information in the resource access request. And if the verification is successful, sending the resource data corresponding to the resource access request to the client so that the client can continuously execute subsequent work. And if the verification fails, the http server does not execute the access response operation on the resource access request.
According to the technical scheme, the game server is used for simultaneously encrypting the user identity and the resource access information which need to be subjected to resource access, so that the problem that an attacker maliciously modifies the resource access request is solved, the safety of the user identity and the resource access information in the resource access request is improved, and the computing pressure of the client side in the encryption process is reduced.
EXAMPLE III
Fig. 4 is a schematic structural diagram of a system for accessing resource data according to a third embodiment of the present invention, where the third embodiment of the present invention provides a service for implementing the method for accessing resource data according to the foregoing embodiment of the present invention.
The access system of the resource data includes at least one client 30, a game server 31, and a resource server 32.
The game server 31 includes a resource encryption request receiving module 311, a private key signature generating module 312, and a private key signature transmitting module 313;
the resource encryption request receiving module 311 is configured to receive a resource encryption request sent by a client based on a resource access request instruction, where the resource encryption request includes an identity authentication request;
a private key signature generating module 312, configured to obtain an identity code corresponding to the identity verification request, and generate a private key signature corresponding to the resource encryption request according to the identity code;
and the private key signature sending module 313 is configured to send the identity code and the private key signature to the client, so that the client accesses the resource server to obtain the resource data according to the identity code and the private key signature.
In an embodiment, optionally, the resource encryption request further includes resource access information, and correspondingly, the game server 31 further includes an initial encryption information generating module (not shown in the figure) for splicing the identity code and the resource access information to generate initial encryption information.
On the basis of the foregoing embodiment, optionally, the private key signature generating module 312 is specifically configured to:
and signing the identity code or the initial encryption information by using a private key by adopting an SHA256 encryption algorithm to generate a private key signature corresponding to the resource encryption request.
The client 30 includes a resource access request sending module 301, configured to generate a resource access request according to the identity code, the private key signature, and the resource access information, and send the resource access request to the resource server; and receiving resource data sent by the resource server based on the resource access request.
In an embodiment, optionally, the client 30 further includes a resource access request instruction generating module (not shown in the figure) configured to generate a resource access request instruction corresponding to a resource access operation when the resource access operation input by the user is received, where the resource access operation includes at least one of accessing a web page, synthesizing equipment, and accessing a game announcement.
The resource server 32 includes a resource data sending module 321, configured to receive a resource access request sent by a client, and determine whether to send resource data corresponding to the resource access request to the client according to a private key signature in the resource access request.
On the basis of the foregoing embodiment, the resource data sending module 321 is specifically configured to:
decrypting the private key signature in the received resource access request by adopting a public key algorithm corresponding to the SHA256 encrypted private key, and verifying the identity code or the initial encrypted information in the resource access request according to a decryption result; and if the verification is successful, sending the resource data corresponding to the resource access request to the client.
Fig. 5 is a schematic diagram of a specific example of a system for accessing resource data according to a third embodiment of the present invention. The client 30 may be a smart phone, an ipad, a desktop computer, a tablet computer, or the like.
By the resource data access system, the problem that an attacker maliciously modifies the resource access request is solved, the security of the user identity in the resource access request is improved, and the computing pressure of a client side in the encryption process is reduced.
Example four
An embodiment of the present invention further provides a storage medium containing computer-executable instructions, where the computer-executable instructions are executed by a computer processor to perform a method for accessing resource data, and the method includes:
the game server receives a resource encryption request sent by a client based on a resource access request instruction, wherein the resource encryption request comprises an identity authentication request;
the game server acquires an identity code corresponding to the identity verification request and generates a private key signature corresponding to the resource encryption request according to the identity code;
the game server sends the identity code and the private key signature to the client side, so that the client side can access the resource server to obtain resource data according to the identity code and the private key signature.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, or the like, as well as conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
Of course, the storage medium provided by the embodiment of the present invention contains computer-executable instructions, and the computer-executable instructions are not limited to the above method operations, and may also perform related operations in the resource data access method provided by any embodiment of the present invention.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (9)

1. A method for accessing resource data, comprising:
the game server receives a resource encryption request sent by a client based on a resource access request instruction, wherein the resource encryption request comprises an identity authentication request;
the game server acquires an identity code corresponding to the identity authentication request and generates a private key signature corresponding to the resource encryption request according to the identity code;
and the game server sends the identity code and the private key signature to the client so that the client accesses a resource server to acquire resource data according to the identity code and the private key signature.
2. The method of claim 1, wherein the client accesses a resource server to obtain resource data according to the identity code and the private key signature, comprising:
the client generates a resource access request according to the identity code, the private key signature and the resource access information and sends the resource access request to a resource server;
and the client receives the resource data sent by the resource server based on the resource access request.
3. The method of claim 2, further comprising:
and the resource server receives a resource access request sent by the client, and determines whether to send resource data corresponding to the resource access request to the client according to a private key signature in the resource access request.
4. The method of claim 3, wherein the resource encryption request further includes resource access information, and wherein, prior to the game server generating the private key signature corresponding to the resource encryption request based on the identity code, further comprising:
and the game server splices the identity code and the resource access information to generate initial encryption information.
5. The method of claim 4, wherein the game server generates a private key signature corresponding to the resource encryption request based on the identity code, comprising:
and the game server adopts an SHA256 encryption algorithm to sign the identity code or the initial encryption information by using a private key to generate a private key signature corresponding to the resource encryption request.
6. The method of claim 5, wherein the resource server determining whether to send the resource data corresponding to the resource access request to the client according to a private key signature in the resource access request comprises:
the resource server decrypts the private key signature in the received resource access request by adopting a public key algorithm corresponding to the SHA256 encrypted private key, and verifies the identity code or the initial encrypted information in the resource access request according to a decryption result;
and if the verification is successful, the resource server sends the resource data corresponding to the resource access request to the client.
7. The method of claim 1, further comprising:
the client generates a resource access request instruction corresponding to the resource access operation when receiving the resource access operation input by a user, wherein the resource access operation comprises at least one operation of accessing a webpage, synthesizing equipment and accessing a game announcement.
8. A system for accessing resource data, comprising: at least one client, a game server and a resource server;
the game server comprises a resource encryption request receiving module, a private key signature generating module and a private key signature sending module;
the resource encryption request receiving module is used for receiving a resource encryption request sent by a client based on a resource access request instruction, wherein the resource encryption request comprises an identity authentication request;
the private key signature generation module is used for acquiring the identity code corresponding to the identity verification request and generating a private key signature corresponding to the resource encryption request according to the identity code;
and the private key signature sending module is used for sending the identity code and the private key signature to the client so that the client accesses a resource server to obtain resource data according to the identity code and the private key signature.
9. The access system of claim 8, wherein the client comprises:
the resource access request sending module is used for generating a resource access request according to the identity code, the private key signature and the resource access information and sending the resource access request to a resource server; and receiving resource data sent by the resource server based on the resource access request.
CN202010013456.7A 2020-01-07 2020-01-07 Resource data access method and system Pending CN111249740A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010013456.7A CN111249740A (en) 2020-01-07 2020-01-07 Resource data access method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010013456.7A CN111249740A (en) 2020-01-07 2020-01-07 Resource data access method and system

Publications (1)

Publication Number Publication Date
CN111249740A true CN111249740A (en) 2020-06-09

Family

ID=70943913

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010013456.7A Pending CN111249740A (en) 2020-01-07 2020-01-07 Resource data access method and system

Country Status (1)

Country Link
CN (1) CN111249740A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112883400A (en) * 2021-03-11 2021-06-01 杭州网易云音乐科技有限公司 Business resource service method, device, electronic equipment and storage medium
CN113630412A (en) * 2021-08-05 2021-11-09 百度在线网络技术(北京)有限公司 Resource downloading method, resource downloading device, electronic equipment and storage medium
CN114531246A (en) * 2022-02-22 2022-05-24 中国银行股份有限公司 Data downloading method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1445707A (en) * 2002-03-15 2003-10-01 松下电器产业株式会社 Service submitting system for supplying service to user equipment from service submitting equipment
US20040098609A1 (en) * 2002-11-20 2004-05-20 Bracewell Shawn Derek Securely processing client credentials used for Web-based access to resources
CN105354451A (en) * 2014-08-20 2016-02-24 腾讯科技(深圳)有限公司 Access authentication method and system
CN106341429A (en) * 2016-11-28 2017-01-18 浙江工业大学 Authentication method capable of protecting safety of server data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1445707A (en) * 2002-03-15 2003-10-01 松下电器产业株式会社 Service submitting system for supplying service to user equipment from service submitting equipment
US20040098609A1 (en) * 2002-11-20 2004-05-20 Bracewell Shawn Derek Securely processing client credentials used for Web-based access to resources
CN1505309A (en) * 2002-11-20 2004-06-16 Securely processing client credentials used for web-based access to resources
CN105354451A (en) * 2014-08-20 2016-02-24 腾讯科技(深圳)有限公司 Access authentication method and system
CN106341429A (en) * 2016-11-28 2017-01-18 浙江工业大学 Authentication method capable of protecting safety of server data

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112883400A (en) * 2021-03-11 2021-06-01 杭州网易云音乐科技有限公司 Business resource service method, device, electronic equipment and storage medium
CN113630412A (en) * 2021-08-05 2021-11-09 百度在线网络技术(北京)有限公司 Resource downloading method, resource downloading device, electronic equipment and storage medium
CN113630412B (en) * 2021-08-05 2023-06-30 百度在线网络技术(北京)有限公司 Resource downloading method, resource downloading device, electronic equipment and storage medium
CN114531246A (en) * 2022-02-22 2022-05-24 中国银行股份有限公司 Data downloading method and device

Similar Documents

Publication Publication Date Title
CN108566381A (en) A kind of security upgrading method, device, server, equipment and medium
CN111835774B (en) Data processing method, device, equipment and storage medium
US20200092101A1 (en) Information processing apparatus, computer program product, and resource providing method
CN108322416B (en) Security authentication implementation method, device and system
CN109362074B (en) Method for h5 and server side safety communication in mixed mode APP
CN112689014B (en) Double-full-work communication method, device, computer equipment and storage medium
CN109145628B (en) Data acquisition method and system based on trusted execution environment
WO2009146655A1 (en) A method, equipment and system for password inputting
CN107517194B (en) Return source authentication method and device of content distribution network
CN111249740A (en) Resource data access method and system
CN111193725B (en) Configuration-based combined login method and device and computer equipment
CN112566121B (en) Method for preventing attack, server and storage medium
CN114448605A (en) Encrypted ciphertext verification method, system, equipment and computer readable storage medium
CN114244508A (en) Data encryption method, device, equipment and storage medium
CN113630412B (en) Resource downloading method, resource downloading device, electronic equipment and storage medium
CN115348015A (en) Secure access method and device, computer readable storage medium and electronic equipment
CN112073185B (en) Cloud game safety transmission method and device
CN114070568A (en) Data processing method and device, electronic equipment and storage medium
JP2023532976A (en) Method and system for verification of user identity
CN112565156B (en) Information registration method, device and system
CN113794553A (en) Data transmission method and device, electronic equipment and storage medium
CN117632099A (en) Multi-language calling method, device, equipment and medium based on application program interface
CN116647345A (en) Method and device for generating permission token, storage medium and computer equipment
CN113727059B (en) Network access authentication method, device and equipment for multimedia conference terminal and storage medium
CN114090996A (en) Multi-party system mutual trust authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200609