[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN107463855A - Tamper resistant method and system based on SDK - Google Patents

Tamper resistant method and system based on SDK Download PDF

Info

Publication number
CN107463855A
CN107463855A CN201710555693.4A CN201710555693A CN107463855A CN 107463855 A CN107463855 A CN 107463855A CN 201710555693 A CN201710555693 A CN 201710555693A CN 107463855 A CN107463855 A CN 107463855A
Authority
CN
China
Prior art keywords
data
sdk
signed
check field
application server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710555693.4A
Other languages
Chinese (zh)
Inventor
沈力
刘又
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Green Bay Network Technology Co Ltd
Original Assignee
Hangzhou Green Bay Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Green Bay Network Technology Co Ltd filed Critical Hangzhou Green Bay Network Technology Co Ltd
Priority to CN201710555693.4A priority Critical patent/CN107463855A/en
Publication of CN107463855A publication Critical patent/CN107463855A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention proposes a kind of tamper resistant method and system based on SDK, wherein, method includes:The result data is added in check field by SDK servers, and then after the first signature value that the signature of check field is obtained is added in signed data, signed data is carried application server is supplied to by SDK instruments in interaction data.The signed data is signed again using the signature key by application server, obtains check field and the second signature value, if the second signature value is different from the first signature value, determines that the interaction data has been tampered.So as to prevent that the result data of SDK servers is distorted.

Description

Tamper resistant method and system based on SDK
Technical field
The present invention relates to Internet technical field, more particularly to a kind of tamper resistant method and system based on SDK.
Background technology
In the prior art, third party service provider SDK (Software is used more and more Development Kit, SDK) realize corresponding functional requirement.But due to being third party's service, it is necessary to which SDK is from SDK Server obtains task data and is submitted to application server again, and in this process, malicious user can be to the use of SDK servers Distorted in carrying out corresponding result data to character data, cause application server to receive incorrect call result and cause The business processing of mistake.
But lack anti-tamper method in the prior art.
The content of the invention
It is contemplated that at least solves one of technical problem in correlation technique to a certain extent.
Therefore, first purpose of the present invention is to propose a kind of tamper resistant method and system based on SDK, to prevent pair The result data of SDK servers is distorted.
Second object of the present invention is to propose a kind of tamper resistant systems based on SDK.
For the above-mentioned purpose, first aspect present invention embodiment proposes a kind of tamper resistant method based on SDK, including with Lower step:
SDK servers obtain the task data of application program submission from SDK instruments;
The SDK servers are handled to obtain result data for the task data, and the result data is added It is added in check field;
The SDK servers are signed using the signature key to the check field, obtain the first signature value;
The SDK servers generate signed data according to the first signature value and the check field, and by the label Name data carry is supplied to application server in interaction data by SDK instruments;
The application server is signed again using the signature key to the check field in the signed data, Obtain the second signature value;
If the second signature value is different from the first signature value in the signed data, the application server determines institute Interaction data is stated to be tampered.
Alternatively, methods described, in addition to:
The SDK instruments send the user context information of maintenance to the SDK servers in company with the task data;
The user context information is added in the check field by the SDK servers.
Alternatively, the application server carries out weight to the check field in the signed data using the signature key New signature, after obtaining the second signature value, in addition to:
The application server extracts user context information to the check field;
According to the user context information of extraction, whether matched with the SDK instruments owning user of the submission signed data, Determine user's check results.
Alternatively, the check field includes mission number, and methods described also includes:
The application server is by the mission number compared with the historic task numbering stored in database;
If in the presence of consistent mission number, the application server determines task verification failure;
If in the absence of consistent mission number, the mission number is stored in database by the application server.
Alternatively, the interaction data, including:Error code, the result data and the signed data.
The embodiment of the present invention, the result data is added in check field by SDK servers, and then by check word After the first signature value that the signature of section obtains is added in signed data, signed data is carried and passes through SDK in interaction data Instrument is supplied to application server.The signed data is signed again using the signature key by application server, Check field and the second signature value are obtained, if the second signature value is different from the first signature value, determines the interactive number According to being tampered.So as to prevent that the result data of SDK servers is distorted.
For the above-mentioned purpose, second aspect of the present invention embodiment proposes a kind of tamper resistant systems based on SDK, including:
SDK instruments, for obtaining the task data of application program submission;
SDK servers, for obtaining the task data of the application program submission from the SDK instruments;To the task Data are handled to obtain result data, and the result data is added in check field;To the check field, use The signature key is signed, and obtains the first signature value;According to the first signature value and check field generation signature Data, and the signed data is carried application server is supplied to by SDK instruments in interaction data;
The application server, for being carried out again to the check field in the signed data using the signature key Signature, obtains the second signature value;If the second signature value is different from the first signature value in the signed data, it is determined that described Interaction data has been tampered.
Alternatively, the SDK instruments, be additionally operable to by the user context information of maintenance in company with the task data send to The SDK servers;
The SDK servers, it is additionally operable to the user context information being added in the check field.
Alternatively, the application server, it is additionally operable to extract user context information to the check field;According to extraction User context information, with submitting whether the SDK instruments owning user of the signed data matches, determine that user verifies knot Fruit.
Alternatively, the check field includes mission number,
The application server, it is additionally operable to the mission number compared with the historic task numbering stored in database; If in the presence of consistent mission number, task verification failure is determined;If in the absence of consistent mission number, the mission number is deposited Storage is in database.
Alternatively, the interaction data, including:Error code, the result data and the signed data.
The embodiment of the present invention, the result data is added in check field by SDK servers, and then by check word After the first signature value that the signature of section obtains is added in signed data, signed data is carried and passes through SDK in interaction data Instrument is supplied to application server.The signed data is signed again using the signature key by application server, Check field and the second signature value are obtained, if the second signature value is different from the first signature value, determines the interactive number According to being tampered.So as to prevent that the result data of SDK servers is distorted.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following description Obtain substantially, or recognized by the practice of the present invention.
Brief description of the drawings
Of the invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments Substantially and it is readily appreciated that, wherein:
A kind of structural representation for tamper resistant systems based on SDK that Fig. 1 is provided by the embodiment of the present invention;
Fig. 2 is the interaction schematic diagram for the system of distorting;
A kind of schematic flow sheet for tamper resistant method based on SDK that Fig. 3 is provided by the embodiment of the present invention;
The schematic flow sheet for another tamper resistant method based on SDK that Fig. 4 is provided by the embodiment of the present invention.
Embodiment
Embodiments of the invention are described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
Below with reference to the accompanying drawings the tamper resistant method and system based on SDK of the embodiment of the present invention are described.
The structural representation for a kind of tamper resistant systems based on SDK that Fig. 1 is provided by the embodiment of the present invention, such as Fig. 1 institutes Show, the system includes:SDK instruments 10, SDK servers 20 and application server 30.
SDK instruments 10, for obtaining the task data of application program submission.
SDK servers 20, for obtaining the task data of the application program submission from the SDK instruments;To described Business data are handled to obtain result data, and the result data is added in check field;To the check field, adopt Signed with the signature key, obtain the first signature value;According to the first signature value and the check field, generation label Name data, and the signed data is carried application server is supplied to by SDK instruments in interaction data.
Specifically, interaction data, including:Error code, the result data and the signed data.
Application server 30, for being signed again to the check field in the signed data using the signature key Name, obtains the second signature value;If the second signature value is different from the first signature value in the signed data, the friendship is determined Mutual data have been tampered.
Further, SDK instruments 10, be additionally operable to by the user context information of maintenance in company with the task data send to The SDK servers.
Based on this, SDK servers 20, it is additionally operable to the user context information being added in the check field.
The application server 30, it is additionally operable to extract user context information to the check field;According to the use of extraction Family contextual information, with submitting whether the SDK instruments owning user of the signed data matches, determine user's check results.
Wherein, check field also includes mission number.
As shown in Fig. 2 be the interaction schematic diagram for the system of distorting, as shown in Fig. 2 SDK instruments 10 are by task data, Yong Hushang Context information is supplied to SDK servers 20, and interaction data, the structure institute specific as follows of interaction data are generated by SDK servers 20 Show:
Wherein, mission number is corresponding with task data, for distinguishing different task.Here for simplicity, by original knot Fruit data, current time, user context information and mission number are referred to as check field, that is to say, that check field includes knot It is at least one in fruit data, current time, user context information and mission number.
Interaction data is supplied to application server 30 by SDK servers 20 by SDK instruments 10, so that application server 30 The step of carrying out verification and business processing.
Based on this, application server 30, the historic task for being additionally operable to store in the mission number and database is numbered Compare;If in the presence of consistent mission number, task verification failure is determined;If in the absence of consistent mission number, by the task Numbering is stored in database.
In the embodiment of the present invention, the result data is added in check field by SDK servers, and then will verification After the first signature value that the signature of field obtains is added in signed data, signed data is carried and passed through in interaction data SDK instruments are supplied to application server.The signed data is signed again using the signature key by application server Name, obtains check field and the second signature value, if the second signature value is different from the first signature value, determines the interaction Data have been tampered.So as to prevent that the result data of SDK servers is distorted.
For clear explanation previous embodiment, a kind of tamper resistant method based on SDK is present embodiments provided, Fig. 3 is this A kind of schematic flow sheet for tamper resistant method based on SDK that inventive embodiments are provided.
As shown in figure 3, comprise the following steps:
Step 201, SDK servers obtain the task data of application program submission from SDK instruments.
Further, specifically, it is necessary to submit a current user context while SDK instruments submit task data Information, such as user identifies or other can identify current user information, and the number is checked when being verified for subsequent applications server According to whether belonging to this user.
Step 202, SDK servers are handled to obtain result data for task data, and result data is added to In check field.
Step 203, SDK servers are signed using the signature key to the check field, obtain the first signature Value.
Step 204, SDK servers are according to the first signature value and the check field, generate signed data, and by institute State signed data carrying and application server is supplied to by SDK instruments in interaction data.
Specifically, the structure of interaction data is specific as follows shown:
Wherein, mission number is corresponding with task data, for distinguishing different task.Here for simplicity, by original knot Fruit data, current time, user context information and mission number are referred to as check field, that is to say, that check field includes knot It is at least one in fruit data, current time, user context information and mission number.
It should be noted that here in order to distinguish SDK server signatures, signed with application server, by SDK server label Signature value in the signed data of name, is designated as the first signature value;By the signature value in the signed data of application server signature, note For the second signature value.
If there is not situation about distorting, the first signature value should with the second signature value correspondent equal, if occurring what is distorted Situation, then difference occurs.
Step 205, application server is carried out again using the signature key to the check field in the signed data Signature, obtains the second signature value.
Step 206, if the second signature value is different from the first signature value, determine that the interaction data is usurped Change.
Specifically, by the signature key distributed from SDK servers, the baseline results data in signed data are taken out, when The preceding time, user context information, mission numbers, these check fields are signed using signature key, obtain the second signature value, By the second signature value compared with the first signature value, if inconsistent, illustrate that data have been tampered, verification failure.
In the present embodiment, the result data is added in check field by SDK servers, and then by check field Obtained the first signature value of signature be added in signed data after, signed data is carried and passes through SDK works in interaction data Tool is supplied to application server.The signed data is signed again using the signature key by application server, obtained To check field and the second signature value, if the second signature value is different from the first signature value, the interaction data is determined It has been tampered.So as to prevent that the result data of SDK servers is distorted.
Further, on the basis of a upper embodiment, after step 206, as shown in figure 4, also including:
Step 208, application server carries out user's verification and task verification.
Application server can also verify whether interaction data be other users data, that is to say, that use other users Result data substituted for the result data of active user.
Specifically, application server extracts user context information to check field, and then application server is according to extraction User context information, with submitting whether the SDK instruments owning user of the signed data matches, determine that user verifies knot Fruit.
If the user context information of extraction is with submitting the SDK instruments owning user of the signed data to mismatch, explanation User verifies failure;If the user context information of extraction is said with submitting the SDK instrument owning users of the signed data to match Bright user verifies successfully.
In addition, application server can also verify whether interaction data for active user historic task result data, That is, the result data of the current task of active user is substituted for the result data of the historic task of active user.
Specifically, application server numbers the historic task stored in mission number that check field includes and database Compare;If in the presence of consistent mission number, the application server determines task verification failure;If compiled in the absence of consistent task Number, it is determined that task verification passes through, and the mission number is stored in database by the application server.
Step 209, pass through when user verifies, and task verification passes through, application server reads result data and carries out business Processing.
The present embodiment, first, checking process are simple, and application server can be verified with complete independently, it is not necessary to application service Device and SDK server communications.Secondly, the verification of washability:Check field is not made an amendment to existing business data, but is used as one Individual extra check field, application server can select to use or verified without using check field.Finally, verifying function Comprehensively, not only can verify whether initial data is tampered, can also verify result data before whether having reused and Whether the result data of other users has been used.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not Identical embodiment or example must be directed to.Moreover, specific features, structure, material or the feature of description can be with office Combined in an appropriate manner in one or more embodiments or example.In addition, in the case of not conflicting, the skill of this area Art personnel can be tied the different embodiments or example and the feature of different embodiments or example described in this specification Close and combine.
In addition, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint relative importance Or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the invention, " multiple " are meant that at least two, such as two, three It is individual etc., unless otherwise specifically defined.
Any process or method described otherwise above description in flow chart or herein is construed as, and represents to include Module, fragment or the portion of the code of the executable instruction of one or more the step of being used to realize custom logic function or process Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system including the system of processor or other can be held from instruction The system of row system, device or equipment instruction fetch and execute instruction) use, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass Defeated program is for instruction execution system, device or equipment or the dress used with reference to these instruction execution systems, device or equipment Put.The more specifically example (non-exhaustive list) of computer-readable medium includes following:Electricity with one or more wiring Connecting portion (electronic installation), portable computer diskette box (magnetic device), random access memory (RAM), read-only storage (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device, and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium, which can even is that, to print the paper of described program thereon or other are suitable Medium, because can then enter edlin, interpretation or if necessary with it for example by carrying out optical scanner to paper or other media His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned In embodiment, software that multiple steps or method can be performed in memory and by suitable instruction execution system with storage Or firmware is realized.Such as, if realized with hardware with another embodiment, following skill well known in the art can be used Any one of art or their combination are realized:With the logic gates for realizing logic function to data-signal from Logic circuit is dissipated, the application specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene can compile Journey gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method carries Suddenly it is that by program the hardware of correlation can be instructed to complete, described program can be stored in a kind of computer-readable storage medium In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, can also That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould Block can both be realized in the form of hardware, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and as independent production marketing or in use, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..Although have been shown and retouch above Embodiments of the invention are stated, it is to be understood that above-described embodiment is exemplary, it is impossible to be interpreted as the limit to the present invention System, one of ordinary skill in the art can be changed to above-described embodiment, change, replace and become within the scope of the invention Type.

Claims (10)

1. a kind of tamper resistant method based on SDK, it is characterised in that comprise the following steps:
SDK servers obtain the task data of application program submission from SDK instruments;
The SDK servers are handled to obtain result data for the task data, and the result data is added to In check field;
The SDK servers are signed using the signature key to the check field, obtain the first signature value;
The SDK servers generate signed data according to the first signature value and the check field, and by the number of signature Application server is supplied to by SDK instruments in interaction data according to carrying;
The application server is signed again using the signature key to the check field in the signed data, is obtained Second signature value;
If the second signature value is different from the first signature value in the signed data, the application server determines the friendship Mutual data have been tampered.
2. tamper resistant method according to claim 1, it is characterised in that methods described, in addition to:
The SDK instruments send the user context information of maintenance to the SDK servers in company with the task data;
The user context information is added in the check field by the SDK servers.
3. tamper resistant method according to claim 2, it is characterised in that the application server uses the signature key Check field in the signed data is signed again, after obtaining the second signature value, in addition to:
The application server extracts user context information to the check field;
According to the user context information of extraction, whether matched with the SDK instruments owning user of the submission signed data, it is determined that User's check results.
4. according to the tamper resistant method described in claim any one of 1-3, it is characterised in that the check field is compiled including task Number, methods described also includes:
The application server is by the mission number compared with the historic task numbering stored in database;
If in the presence of consistent mission number, the application server determines task verification failure;
If in the absence of consistent mission number, the mission number is stored in database by the application server.
5. according to the tamper resistant method described in claim any one of 1-3, it is characterised in that the interaction data, including:Mistake Code, the result data and the signed data.
A kind of 6. tamper resistant systems based on SDK, it is characterised in that including:
SDK instruments, for obtaining the task data of application program submission;
SDK servers, for obtaining the task data of the application program submission from the SDK instruments;To the task data Handled to obtain result data, and the result data is added in check field;To the check field, using described Signature key is signed, and obtains the first signature value;Signed data is generated according to the first signature value and the check field, And the signed data is carried application server is supplied to by SDK instruments in interaction data;
The application server, for being signed again to the check field in the signed data using the signature key Name, obtains the second signature value;If the second signature value is different from the first signature value in the signed data, the friendship is determined Mutual data have been tampered.
7. tamper resistant systems according to claim 6, it is characterised in that
The SDK instruments, it is additionally operable in company with the task data send the user context information of maintenance to SDK services Device;
The SDK servers, it is additionally operable to the user context information being added in the check field.
8. tamper resistant systems according to claim 7, it is characterised in that
The application server, it is additionally operable to extract user context information to the check field;Above and below the user of extraction Literary information, with submitting whether the SDK instruments owning user of the signed data matches, determine user's check results.
9. according to the tamper resistant systems described in claim any one of 6-8, it is characterised in that the check field is compiled including task Number,
The application server, it is additionally operable to the mission number compared with the historic task numbering stored in database;If deposit In consistent mission number, task verification failure is determined;If in the absence of consistent mission number, the mission number is stored in In database.
10. according to the tamper resistant systems described in claim any one of 6-8, it is characterised in that the interaction data, including:It is wrong Error code, the result data and the signed data.
CN201710555693.4A 2017-07-10 2017-07-10 Tamper resistant method and system based on SDK Withdrawn CN107463855A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710555693.4A CN107463855A (en) 2017-07-10 2017-07-10 Tamper resistant method and system based on SDK

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710555693.4A CN107463855A (en) 2017-07-10 2017-07-10 Tamper resistant method and system based on SDK

Publications (1)

Publication Number Publication Date
CN107463855A true CN107463855A (en) 2017-12-12

Family

ID=60546560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710555693.4A Withdrawn CN107463855A (en) 2017-07-10 2017-07-10 Tamper resistant method and system based on SDK

Country Status (1)

Country Link
CN (1) CN107463855A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111562928A (en) * 2020-04-28 2020-08-21 北京字节跳动网络技术有限公司 Resource providing method and device and resource downloading method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110185189A1 (en) * 2010-01-26 2011-07-28 Kyocera Mita Corporation SDK Use-Restriction Imposing Device, Use-Restriction-Imposed SDK Developing System, and SDK Use-Restriction Imposing Method
CN103699852A (en) * 2014-01-08 2014-04-02 安投融(北京)网络科技有限公司 Multi-digital signature method for network transaction electronic contract
CN103973505A (en) * 2013-01-25 2014-08-06 北京思博途信息技术有限公司 Method for processing monitoring request, SDK and server
CN106656468A (en) * 2016-10-13 2017-05-10 上海拓畅信息技术有限公司 Novel encryption false prevention discrimination method for online advertisements

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110185189A1 (en) * 2010-01-26 2011-07-28 Kyocera Mita Corporation SDK Use-Restriction Imposing Device, Use-Restriction-Imposed SDK Developing System, and SDK Use-Restriction Imposing Method
CN103973505A (en) * 2013-01-25 2014-08-06 北京思博途信息技术有限公司 Method for processing monitoring request, SDK and server
CN103699852A (en) * 2014-01-08 2014-04-02 安投融(北京)网络科技有限公司 Multi-digital signature method for network transaction electronic contract
CN106656468A (en) * 2016-10-13 2017-05-10 上海拓畅信息技术有限公司 Novel encryption false prevention discrimination method for online advertisements

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111562928A (en) * 2020-04-28 2020-08-21 北京字节跳动网络技术有限公司 Resource providing method and device and resource downloading method and device
CN111562928B (en) * 2020-04-28 2023-05-05 北京字节跳动网络技术有限公司 Resource providing method and device, and resource downloading method and device

Similar Documents

Publication Publication Date Title
US11562451B1 (en) Apparatus for proportional calculation regarding non-fungible tokens
CN109075971A (en) System and method for document information authenticity verification
CN112819466A (en) Digital certificate processing method and device, terminal equipment and storage medium
CN111597817B (en) Event information extraction method and device
CN107025252B (en) Method, system, and program for enabling real-time availability of published documents
US11323245B2 (en) Method for linking block-chain using hyper-chain, and apparatus therefor
CN109858911A (en) Qualification verification method, device, system, equipment and readable storage medium storing program for executing
CN108053545A (en) Certificate verification method and apparatus, server, storage medium
WO2023015312A1 (en) Methods for securely adding data to a blockchain using dynamic time quanta and version authentication
US20130191641A1 (en) Captcha (completely automated public test to tell computers and humans apart) data generation methods and related data management systems and computer program products thereof
CN111797217A (en) Information query method based on FAQ matching model and related equipment thereof
US20160012024A1 (en) Method and system for automatic generation and validation of html5 compliant scripts
CN107171808A (en) A kind of verification method and device of electronic record authenticity
CN107463855A (en) Tamper resistant method and system based on SDK
CN105593876A (en) Validation in serialization flow
CN111311179A (en) Object processing method and device, electronic equipment and computer readable storage medium
CN117034894A (en) Credential generation method, device, equipment and readable storage medium
CN107453876A (en) A kind of identifying code implementation method and device based on picture
Tornés et al. Receipt Dataset for Document Forgery Detection
CN108038101B (en) Method and device for identifying tampered text
CN108140076B (en) Authentication with fault tolerance for secure product identifiers
CN112560055B (en) Credible electronic license system based on PKI technology and working method
Sousa et al. Authentic Non Fungible Tokens
KR102636312B1 (en) Regionally specialized product confirmation server that performs confirmation of whether a regionally specialized product is the regionally specialized product that has been genuinely authenticated based on the two-dimensional code, and operating method thereof
CN110099070A (en) A kind of single input frame login validation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20171212

WW01 Invention patent application withdrawn after publication