CN111249740A - Resource data access method and system - Google Patents
Resource data access method and system Download PDFInfo
- Publication number
- CN111249740A CN111249740A CN202010013456.7A CN202010013456A CN111249740A CN 111249740 A CN111249740 A CN 111249740A CN 202010013456 A CN202010013456 A CN 202010013456A CN 111249740 A CN111249740 A CN 111249740A
- Authority
- CN
- China
- Prior art keywords
- resource
- private key
- request
- client
- key signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000004422 calculation algorithm Methods 0.000 claims description 12
- 238000012795 verification Methods 0.000 claims description 12
- 230000002194 synthesizing effect Effects 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 abstract description 2
- 230000005540 biological transmission Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 230000015572 biosynthetic process Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000003786 synthesis reaction Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 241001124156 Mecoptera Species 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000008707 rearrangement Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/70—Game security or game management aspects
- A63F13/71—Game security or game management aspects using secure communication between game devices and game servers, e.g. by encrypting game data or authenticating players
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a method and a system for accessing resource data. The method comprises the following steps: the game server receives a resource encryption request sent by a client based on a resource access request instruction, wherein the resource encryption request comprises an identity authentication request; the game server acquires an identity code corresponding to the identity authentication request and generates a private key signature corresponding to the resource encryption request according to the identity code; and the game server sends the identity code and the private key signature to the client so that the client accesses a resource server to acquire resource data according to the identity code and the private key signature. The embodiment of the invention encrypts the user identity needing resource access through the game server, solves the problem that an attacker maliciously modifies the resource access request, improves the security of the user identity in the resource access request, and also reduces the calculation pressure of the client for executing the encryption process.
Description
Technical Field
The embodiment of the invention relates to the technical field of network transmission, in particular to a resource data access method and system.
Background
Currently, there are 4 kinds of network communication Transmission protocols in game development, which are Transmission Control Protocol (TCP), User Datagram Protocol (UDP), hypertext Transfer Protocol (http), and WebSocket Protocol. The http protocol is widely used due to the low research and development cost, rapid development, more open source software, mature protocol and the like. Under the scene with low requirement on interactivity, the method is often used as an auxiliary communication means. But the http protocol has a great disadvantage in terms of security. The simple http protocol directly uses plaintext transmission, an attacker can directly intercept a transmitted data packet and modify player identity information in the data packet to obtain request resources returned by the http server.
In the prior art, the content of a data packet is usually signed and encrypted at a client to ensure the reliability of the player identity information in the data packet. However, based on the technical method, an attacker can modify the player identity information in the data packet before the signature starts by modifying the memory through third-party software and the like, so that the risk of verifying the signature by an http server is avoided.
Disclosure of Invention
The embodiment of the invention provides a resource data access method and a resource data access system, which are used for improving the safety of user identities in resource access requests and reducing the computing pressure of a client side in an encryption process.
In a first aspect, an embodiment of the present invention provides a method for accessing resource data, where the method includes:
the game server receives a resource encryption request sent by a client based on a resource access request instruction, wherein the resource encryption request comprises an identity authentication request;
the game server acquires an identity code corresponding to the identity authentication request and generates a private key signature corresponding to the resource encryption request according to the identity code;
and the game server sends the identity code and the private key signature to the client so that the client accesses a resource server to acquire resource data according to the identity code and the private key signature.
In a second aspect, an embodiment of the present invention further provides a system for accessing resource data, where the system includes: at least one client, a game server and a resource server;
the game server comprises a resource encryption request receiving module, a private key signature generating module and a private key signature sending module;
the resource encryption request receiving module is used for receiving a resource encryption request sent by a client based on a resource access request instruction, wherein the resource encryption request comprises an identity authentication request;
the private key signature generation module is used for acquiring the identity code corresponding to the identity verification request and generating a private key signature corresponding to the resource encryption request according to the identity code;
and the private key signature sending module is used for sending the identity code and the private key signature to the client so that the client accesses a resource server to obtain resource data according to the identity code and the private key signature.
The embodiment of the invention encrypts the user identity needing resource access through the game server, solves the problem that an attacker maliciously modifies the resource access request, improves the security of the user identity in the resource access request, and also reduces the calculation pressure of the client for executing the encryption process.
Drawings
Fig. 1 is a flowchart of a method for accessing resource data according to an embodiment of the present invention.
Fig. 2 is a flowchart of a resource data access method according to a second embodiment of the present invention.
Fig. 3 is a flowchart of a specific example of a method for accessing resource data according to a second embodiment of the present invention.
Fig. 4 is a schematic structural diagram of a system for accessing resource data according to a third embodiment of the present invention.
Fig. 5 is a schematic diagram of a specific example of a system for accessing resource data according to a third embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of a resource data access method according to an embodiment of the present invention, which is applicable to a situation where a client accesses resource data to a resource server. The method specifically comprises the following steps:
s110, the game server receives a resource encryption request sent by the client based on the resource access request instruction, wherein the resource encryption request comprises an identity authentication request.
Wherein the type of game server illustratively comprises a dedicated game server. The dedicated game server refers to a server operated by a game developer, and the dedicated game server can bear a plurality of persons and is online at the same time, so that the dedicated game server is more applied to online games.
The resource access request instruction refers to a request instruction generated when a client needs to access resource data to a resource server. In one embodiment, optionally, the client generates a resource access request instruction corresponding to the resource access operation when receiving the resource access operation input by the user, where the resource access operation includes at least one of accessing a web page, synthesizing equipment, and accessing a game announcement.
When a user inputs an operation of accessing a webpage at a client, a resource access request needs to be sent to a resource server, so that the resource server returns corresponding content to the client, and the user can view webpage information at the client conveniently; the equipment synthesis refers to an operation in game software, for example, a user possesses a primary equipment A and a primary equipment B, and the primary equipment A and the primary equipment B can be synthesized into a piece of high-level equipment according to a preset program of the game software, and the equipment synthesis operation executed by the user needs to call resource data related to the high-level equipment provided in a resource server to load the high-level equipment in the game software of the user so as to complete the equipment synthesis operation; the game bulletin is game information such as game activities, game rules and game rewards issued by a game developer system, and when a user performs an operation of accessing the game bulletin, information on the game bulletin can be returned by accessing the resource server. The resource access operation input by the user is not limited here, and may be set according to the specific use condition of the client.
The resource encryption request refers to request information which is sent to the game server by the client and needs to be encrypted. In this embodiment, the resource encryption request comprises an authentication request. When a user logs in to the game software, the game server identifies account information corresponding to the login information. The login information may be, for example, a user name, a login password, face information, voiceprint information, fingerprint information, and the like. Correspondingly, the authentication request may be a user name, a login password, face information, voiceprint information, and fingerprint information, or may be an authentication instruction generated by the client based on the login information. The specific form of the authentication request is not limited herein.
S120, the game server obtains the identity code corresponding to the identity verification request and generates a private key signature corresponding to the resource encryption request according to the identity code.
When the user registers the game software, the game server generates an identity code corresponding to the registered user. The identity code is coded information for uniquely identifying the registered user. Exemplary methods for generating the identity code of the registered user include a UUID algorithm and a snowfly algorithm, and the method for generating the identity code is not limited herein.
The signature processing is a private key signature, and is a valid proof of the authenticity of the information transmitted by the sender of the information. The private key signature is to encrypt the contents to be transmitted by a private key and transmit the encrypted file and the transmitted contents to the receiver at the same time. The receiver decrypts the encrypted file using the public key corresponding to the private key, and determines whether the transmitted content is the same as the decrypted content. In one embodiment, optionally, the game server signs the identity code with a private key using a SHA256 encryption algorithm to generate a private key signature corresponding to the resource encryption request. Among them, the SHA256 encryption algorithm is a one-way hash function that converts messages of arbitrary length into shorter and fixed-length message digests.
S130, the game server sends the identity code and the private key signature to the client, so that the client accesses the resource server to obtain resource data according to the identity code and the private key signature.
The client generates a resource access request according to the identity code, the private key signature and the resource access information, and sends the resource access request to the resource server; and the client receives the resource data sent by the resource server based on the resource access request.
The resource access information is access information generated by the client based on resource access operation input by a user, and the resource server can determine resource data which needs to be returned to the client according to the resource access information. In an embodiment, optionally, the client concatenates the identity code, the private key signature, and the resource access information to generate the resource access request. Illustratively, the concatenation is performed in the order of identity encoding, private key signature, and resource access information. The order of splicing is not limited herein.
The resource server may be a web server or an http server, for example. In an embodiment, optionally, the resource server receives a resource access request sent by the client, and determines whether to send resource data corresponding to the resource access request to the client according to a private key signature in the resource access request.
Specifically, the resource server decrypts a private key signature in the received resource access request by using a public key algorithm corresponding to the SHA256 encrypted private key, and verifies an identity code in the resource access request according to a decryption result; and if the verification is successful, the resource server sends the resource data corresponding to the resource access request to the client.
If the identity code obtained by decryption is the same as the identity code in the resource access request, the verification is considered to be successful; and if the identity code obtained by decryption is different from the identity code in the resource access request, the authentication is considered to be failed.
In one embodiment, optionally, the resource server performs a failure response operation if the authentication fails. The exemplary failure response operation includes at least one response operation of the resource server refusing the client to access the resource data, the resource server generating an access refusing instruction and sending the access refusing instruction to the client, and the resource server generating a risk prompt instruction and sending the risk prompt instruction to the client. The risk prompting instruction is used for prompting that the client has access risk during resource access, so that the client can perform subsequent processing on the access risk.
According to the technical scheme, the game server is used for encrypting the user identity needing resource access, so that the problem that an attacker maliciously modifies the resource access request is solved, the security of the user identity in the resource access request is improved, and the computing pressure of the client side in the encryption process is reduced.
Example two
Fig. 2 is a flowchart of a resource data access method provided in the second embodiment of the present invention, and the technical solution of the present embodiment is further detailed based on the foregoing embodiment. Optionally, the resource encryption request further includes resource access information, and correspondingly, before the game server generates a private key signature corresponding to the resource encryption request according to the identity code, the method further includes: and the game server splices the identity code and the resource access information to generate initial encryption information.
The specific real-time steps of this embodiment include:
s210, the game server receives a resource encryption request sent by the client based on the resource access request instruction, wherein the resource encryption request comprises an identity authentication request and resource access information.
The resource access information is access information generated by the client based on resource access operation input by a user, and the resource server can determine resource data which needs to be returned to the client according to the resource access information.
S220, the game server obtains the identity code corresponding to the identity authentication request, and splices the identity code and the resource access information to generate initial encryption information.
For example, the identity code and the resource access information may be spliced by writing the identity code into any information position in the resource access information. Specifically, the information position may be a start, end, or middle position of the resource access information. Accordingly, the initial encryption information includes the identity code and the resource access information.
And S230, the game server generates a private key signature corresponding to the resource encryption request according to the initial encryption information.
In one embodiment, optionally, the game server uses the SHA256 encryption algorithm to sign the initial encryption information with the private key, and generates a private key signature corresponding to the resource encryption request. Among them, the SHA256 encryption algorithm is a one-way hash function that converts messages of arbitrary length into shorter and fixed-length message digests.
S240, the game server sends the identity code and the private key signature to the client, so that the client accesses the resource server to obtain resource data according to the identity code and the private key signature.
The client generates a resource access request according to the initial encryption information and the private key signature, and sends the resource access request to the resource server; and the client receives the resource data sent by the resource server based on the resource access request.
Specifically, the resource server decrypts a private key signature in the received resource access request by using a public key algorithm corresponding to the SHA256 encrypted private key, and verifies initial encrypted information in the resource access request according to a decryption result; and if the verification is successful, the resource server sends the resource data corresponding to the resource access request to the client.
If the initial encryption information obtained by decryption is the same as the initial encryption information in the resource access request, namely the identity code and the resource access information are the same, the authentication is considered to be successful; and if the initial encrypted information obtained by decryption is different from the initial encrypted information in the resource access request, namely at least one information object in the identity code and the resource access information is different, the authentication is considered to be failed.
Fig. 3 is a flowchart of a specific example of a method for accessing resource data according to a second embodiment of the present invention. When a client receives a resource access operation input by a user, generating a resource access request instruction; and sending a resource encryption request to the game server based on the resource access request instruction, wherein the resource encryption request comprises an identity authentication request and resource access information. The game server acquires the identity code corresponding to the identity authentication request, and splices the identity code with the resource access information to generate initial encryption information. The game server signs the initial encryption information by using a private key to generate a private key signature. And sending the identity code and the private key signature to the client. The client splices the identity code, the private key signature and the resource access information to generate a resource access request, and sends the resource access request to a resource server, wherein the resource server can be an http server. And the http server verifies the private key signature in the resource access request and determines whether the initial encryption information corresponding to the private key signature is the same as the initial encryption information in the resource access request. And if the verification is successful, sending the resource data corresponding to the resource access request to the client so that the client can continuously execute subsequent work. And if the verification fails, the http server does not execute the access response operation on the resource access request.
According to the technical scheme, the game server is used for simultaneously encrypting the user identity and the resource access information which need to be subjected to resource access, so that the problem that an attacker maliciously modifies the resource access request is solved, the safety of the user identity and the resource access information in the resource access request is improved, and the computing pressure of the client side in the encryption process is reduced.
EXAMPLE III
Fig. 4 is a schematic structural diagram of a system for accessing resource data according to a third embodiment of the present invention, where the third embodiment of the present invention provides a service for implementing the method for accessing resource data according to the foregoing embodiment of the present invention.
The access system of the resource data includes at least one client 30, a game server 31, and a resource server 32.
The game server 31 includes a resource encryption request receiving module 311, a private key signature generating module 312, and a private key signature transmitting module 313;
the resource encryption request receiving module 311 is configured to receive a resource encryption request sent by a client based on a resource access request instruction, where the resource encryption request includes an identity authentication request;
a private key signature generating module 312, configured to obtain an identity code corresponding to the identity verification request, and generate a private key signature corresponding to the resource encryption request according to the identity code;
and the private key signature sending module 313 is configured to send the identity code and the private key signature to the client, so that the client accesses the resource server to obtain the resource data according to the identity code and the private key signature.
In an embodiment, optionally, the resource encryption request further includes resource access information, and correspondingly, the game server 31 further includes an initial encryption information generating module (not shown in the figure) for splicing the identity code and the resource access information to generate initial encryption information.
On the basis of the foregoing embodiment, optionally, the private key signature generating module 312 is specifically configured to:
and signing the identity code or the initial encryption information by using a private key by adopting an SHA256 encryption algorithm to generate a private key signature corresponding to the resource encryption request.
The client 30 includes a resource access request sending module 301, configured to generate a resource access request according to the identity code, the private key signature, and the resource access information, and send the resource access request to the resource server; and receiving resource data sent by the resource server based on the resource access request.
In an embodiment, optionally, the client 30 further includes a resource access request instruction generating module (not shown in the figure) configured to generate a resource access request instruction corresponding to a resource access operation when the resource access operation input by the user is received, where the resource access operation includes at least one of accessing a web page, synthesizing equipment, and accessing a game announcement.
The resource server 32 includes a resource data sending module 321, configured to receive a resource access request sent by a client, and determine whether to send resource data corresponding to the resource access request to the client according to a private key signature in the resource access request.
On the basis of the foregoing embodiment, the resource data sending module 321 is specifically configured to:
decrypting the private key signature in the received resource access request by adopting a public key algorithm corresponding to the SHA256 encrypted private key, and verifying the identity code or the initial encrypted information in the resource access request according to a decryption result; and if the verification is successful, sending the resource data corresponding to the resource access request to the client.
Fig. 5 is a schematic diagram of a specific example of a system for accessing resource data according to a third embodiment of the present invention. The client 30 may be a smart phone, an ipad, a desktop computer, a tablet computer, or the like.
By the resource data access system, the problem that an attacker maliciously modifies the resource access request is solved, the security of the user identity in the resource access request is improved, and the computing pressure of a client side in the encryption process is reduced.
Example four
An embodiment of the present invention further provides a storage medium containing computer-executable instructions, where the computer-executable instructions are executed by a computer processor to perform a method for accessing resource data, and the method includes:
the game server receives a resource encryption request sent by a client based on a resource access request instruction, wherein the resource encryption request comprises an identity authentication request;
the game server acquires an identity code corresponding to the identity verification request and generates a private key signature corresponding to the resource encryption request according to the identity code;
the game server sends the identity code and the private key signature to the client side, so that the client side can access the resource server to obtain resource data according to the identity code and the private key signature.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, or the like, as well as conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
Of course, the storage medium provided by the embodiment of the present invention contains computer-executable instructions, and the computer-executable instructions are not limited to the above method operations, and may also perform related operations in the resource data access method provided by any embodiment of the present invention.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.
Claims (9)
1. A method for accessing resource data, comprising:
the game server receives a resource encryption request sent by a client based on a resource access request instruction, wherein the resource encryption request comprises an identity authentication request;
the game server acquires an identity code corresponding to the identity authentication request and generates a private key signature corresponding to the resource encryption request according to the identity code;
and the game server sends the identity code and the private key signature to the client so that the client accesses a resource server to acquire resource data according to the identity code and the private key signature.
2. The method of claim 1, wherein the client accesses a resource server to obtain resource data according to the identity code and the private key signature, comprising:
the client generates a resource access request according to the identity code, the private key signature and the resource access information and sends the resource access request to a resource server;
and the client receives the resource data sent by the resource server based on the resource access request.
3. The method of claim 2, further comprising:
and the resource server receives a resource access request sent by the client, and determines whether to send resource data corresponding to the resource access request to the client according to a private key signature in the resource access request.
4. The method of claim 3, wherein the resource encryption request further includes resource access information, and wherein, prior to the game server generating the private key signature corresponding to the resource encryption request based on the identity code, further comprising:
and the game server splices the identity code and the resource access information to generate initial encryption information.
5. The method of claim 4, wherein the game server generates a private key signature corresponding to the resource encryption request based on the identity code, comprising:
and the game server adopts an SHA256 encryption algorithm to sign the identity code or the initial encryption information by using a private key to generate a private key signature corresponding to the resource encryption request.
6. The method of claim 5, wherein the resource server determining whether to send the resource data corresponding to the resource access request to the client according to a private key signature in the resource access request comprises:
the resource server decrypts the private key signature in the received resource access request by adopting a public key algorithm corresponding to the SHA256 encrypted private key, and verifies the identity code or the initial encrypted information in the resource access request according to a decryption result;
and if the verification is successful, the resource server sends the resource data corresponding to the resource access request to the client.
7. The method of claim 1, further comprising:
the client generates a resource access request instruction corresponding to the resource access operation when receiving the resource access operation input by a user, wherein the resource access operation comprises at least one operation of accessing a webpage, synthesizing equipment and accessing a game announcement.
8. A system for accessing resource data, comprising: at least one client, a game server and a resource server;
the game server comprises a resource encryption request receiving module, a private key signature generating module and a private key signature sending module;
the resource encryption request receiving module is used for receiving a resource encryption request sent by a client based on a resource access request instruction, wherein the resource encryption request comprises an identity authentication request;
the private key signature generation module is used for acquiring the identity code corresponding to the identity verification request and generating a private key signature corresponding to the resource encryption request according to the identity code;
and the private key signature sending module is used for sending the identity code and the private key signature to the client so that the client accesses a resource server to obtain resource data according to the identity code and the private key signature.
9. The access system of claim 8, wherein the client comprises:
the resource access request sending module is used for generating a resource access request according to the identity code, the private key signature and the resource access information and sending the resource access request to a resource server; and receiving resource data sent by the resource server based on the resource access request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010013456.7A CN111249740A (en) | 2020-01-07 | 2020-01-07 | Resource data access method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010013456.7A CN111249740A (en) | 2020-01-07 | 2020-01-07 | Resource data access method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111249740A true CN111249740A (en) | 2020-06-09 |
Family
ID=70943913
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010013456.7A Pending CN111249740A (en) | 2020-01-07 | 2020-01-07 | Resource data access method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111249740A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112883400A (en) * | 2021-03-11 | 2021-06-01 | 杭州网易云音乐科技有限公司 | Business resource service method, device, electronic equipment and storage medium |
CN113630412A (en) * | 2021-08-05 | 2021-11-09 | 百度在线网络技术(北京)有限公司 | Resource downloading method, resource downloading device, electronic equipment and storage medium |
CN114531246A (en) * | 2022-02-22 | 2022-05-24 | 中国银行股份有限公司 | Data downloading method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1445707A (en) * | 2002-03-15 | 2003-10-01 | 松下电器产业株式会社 | Service submitting system for supplying service to user equipment from service submitting equipment |
US20040098609A1 (en) * | 2002-11-20 | 2004-05-20 | Bracewell Shawn Derek | Securely processing client credentials used for Web-based access to resources |
CN105354451A (en) * | 2014-08-20 | 2016-02-24 | 腾讯科技(深圳)有限公司 | Access authentication method and system |
CN106341429A (en) * | 2016-11-28 | 2017-01-18 | 浙江工业大学 | Authentication method capable of protecting safety of server data |
-
2020
- 2020-01-07 CN CN202010013456.7A patent/CN111249740A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1445707A (en) * | 2002-03-15 | 2003-10-01 | 松下电器产业株式会社 | Service submitting system for supplying service to user equipment from service submitting equipment |
US20040098609A1 (en) * | 2002-11-20 | 2004-05-20 | Bracewell Shawn Derek | Securely processing client credentials used for Web-based access to resources |
CN1505309A (en) * | 2002-11-20 | 2004-06-16 | Securely processing client credentials used for web-based access to resources | |
CN105354451A (en) * | 2014-08-20 | 2016-02-24 | 腾讯科技(深圳)有限公司 | Access authentication method and system |
CN106341429A (en) * | 2016-11-28 | 2017-01-18 | 浙江工业大学 | Authentication method capable of protecting safety of server data |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112883400A (en) * | 2021-03-11 | 2021-06-01 | 杭州网易云音乐科技有限公司 | Business resource service method, device, electronic equipment and storage medium |
CN113630412A (en) * | 2021-08-05 | 2021-11-09 | 百度在线网络技术(北京)有限公司 | Resource downloading method, resource downloading device, electronic equipment and storage medium |
CN113630412B (en) * | 2021-08-05 | 2023-06-30 | 百度在线网络技术(北京)有限公司 | Resource downloading method, resource downloading device, electronic equipment and storage medium |
CN114531246A (en) * | 2022-02-22 | 2022-05-24 | 中国银行股份有限公司 | Data downloading method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108566381A (en) | A kind of security upgrading method, device, server, equipment and medium | |
CN111835774B (en) | Data processing method, device, equipment and storage medium | |
US20200092101A1 (en) | Information processing apparatus, computer program product, and resource providing method | |
CN108322416B (en) | Security authentication implementation method, device and system | |
CN109362074B (en) | Method for h5 and server side safety communication in mixed mode APP | |
CN112689014B (en) | Double-full-work communication method, device, computer equipment and storage medium | |
CN109145628B (en) | Data acquisition method and system based on trusted execution environment | |
WO2009146655A1 (en) | A method, equipment and system for password inputting | |
CN107517194B (en) | Return source authentication method and device of content distribution network | |
CN111249740A (en) | Resource data access method and system | |
CN111193725B (en) | Configuration-based combined login method and device and computer equipment | |
CN112566121B (en) | Method for preventing attack, server and storage medium | |
CN114448605A (en) | Encrypted ciphertext verification method, system, equipment and computer readable storage medium | |
CN114244508A (en) | Data encryption method, device, equipment and storage medium | |
CN113630412B (en) | Resource downloading method, resource downloading device, electronic equipment and storage medium | |
CN115348015A (en) | Secure access method and device, computer readable storage medium and electronic equipment | |
CN112073185B (en) | Cloud game safety transmission method and device | |
CN114070568A (en) | Data processing method and device, electronic equipment and storage medium | |
JP2023532976A (en) | Method and system for verification of user identity | |
CN112565156B (en) | Information registration method, device and system | |
CN113794553A (en) | Data transmission method and device, electronic equipment and storage medium | |
CN117632099A (en) | Multi-language calling method, device, equipment and medium based on application program interface | |
CN116647345A (en) | Method and device for generating permission token, storage medium and computer equipment | |
CN113727059B (en) | Network access authentication method, device and equipment for multimedia conference terminal and storage medium | |
CN114090996A (en) | Multi-party system mutual trust authentication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200609 |