CN107463855A - Tamper resistant method and system based on SDK - Google Patents
Tamper resistant method and system based on SDK Download PDFInfo
- Publication number
- CN107463855A CN107463855A CN201710555693.4A CN201710555693A CN107463855A CN 107463855 A CN107463855 A CN 107463855A CN 201710555693 A CN201710555693 A CN 201710555693A CN 107463855 A CN107463855 A CN 107463855A
- Authority
- CN
- China
- Prior art keywords
- data
- sdk
- signed
- check field
- application server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention proposes a kind of tamper resistant method and system based on SDK, wherein, method includes:The result data is added in check field by SDK servers, and then after the first signature value that the signature of check field is obtained is added in signed data, signed data is carried application server is supplied to by SDK instruments in interaction data.The signed data is signed again using the signature key by application server, obtains check field and the second signature value, if the second signature value is different from the first signature value, determines that the interaction data has been tampered.So as to prevent that the result data of SDK servers is distorted.
Description
Technical field
The present invention relates to Internet technical field, more particularly to a kind of tamper resistant method and system based on SDK.
Background technology
In the prior art, third party service provider SDK (Software is used more and more
Development Kit, SDK) realize corresponding functional requirement.But due to being third party's service, it is necessary to which SDK is from SDK
Server obtains task data and is submitted to application server again, and in this process, malicious user can be to the use of SDK servers
Distorted in carrying out corresponding result data to character data, cause application server to receive incorrect call result and cause
The business processing of mistake.
But lack anti-tamper method in the prior art.
The content of the invention
It is contemplated that at least solves one of technical problem in correlation technique to a certain extent.
Therefore, first purpose of the present invention is to propose a kind of tamper resistant method and system based on SDK, to prevent pair
The result data of SDK servers is distorted.
Second object of the present invention is to propose a kind of tamper resistant systems based on SDK.
For the above-mentioned purpose, first aspect present invention embodiment proposes a kind of tamper resistant method based on SDK, including with
Lower step:
SDK servers obtain the task data of application program submission from SDK instruments;
The SDK servers are handled to obtain result data for the task data, and the result data is added
It is added in check field;
The SDK servers are signed using the signature key to the check field, obtain the first signature value;
The SDK servers generate signed data according to the first signature value and the check field, and by the label
Name data carry is supplied to application server in interaction data by SDK instruments;
The application server is signed again using the signature key to the check field in the signed data,
Obtain the second signature value;
If the second signature value is different from the first signature value in the signed data, the application server determines institute
Interaction data is stated to be tampered.
Alternatively, methods described, in addition to:
The SDK instruments send the user context information of maintenance to the SDK servers in company with the task data;
The user context information is added in the check field by the SDK servers.
Alternatively, the application server carries out weight to the check field in the signed data using the signature key
New signature, after obtaining the second signature value, in addition to:
The application server extracts user context information to the check field;
According to the user context information of extraction, whether matched with the SDK instruments owning user of the submission signed data,
Determine user's check results.
Alternatively, the check field includes mission number, and methods described also includes:
The application server is by the mission number compared with the historic task numbering stored in database;
If in the presence of consistent mission number, the application server determines task verification failure;
If in the absence of consistent mission number, the mission number is stored in database by the application server.
Alternatively, the interaction data, including:Error code, the result data and the signed data.
The embodiment of the present invention, the result data is added in check field by SDK servers, and then by check word
After the first signature value that the signature of section obtains is added in signed data, signed data is carried and passes through SDK in interaction data
Instrument is supplied to application server.The signed data is signed again using the signature key by application server,
Check field and the second signature value are obtained, if the second signature value is different from the first signature value, determines the interactive number
According to being tampered.So as to prevent that the result data of SDK servers is distorted.
For the above-mentioned purpose, second aspect of the present invention embodiment proposes a kind of tamper resistant systems based on SDK, including:
SDK instruments, for obtaining the task data of application program submission;
SDK servers, for obtaining the task data of the application program submission from the SDK instruments;To the task
Data are handled to obtain result data, and the result data is added in check field;To the check field, use
The signature key is signed, and obtains the first signature value;According to the first signature value and check field generation signature
Data, and the signed data is carried application server is supplied to by SDK instruments in interaction data;
The application server, for being carried out again to the check field in the signed data using the signature key
Signature, obtains the second signature value;If the second signature value is different from the first signature value in the signed data, it is determined that described
Interaction data has been tampered.
Alternatively, the SDK instruments, be additionally operable to by the user context information of maintenance in company with the task data send to
The SDK servers;
The SDK servers, it is additionally operable to the user context information being added in the check field.
Alternatively, the application server, it is additionally operable to extract user context information to the check field;According to extraction
User context information, with submitting whether the SDK instruments owning user of the signed data matches, determine that user verifies knot
Fruit.
Alternatively, the check field includes mission number,
The application server, it is additionally operable to the mission number compared with the historic task numbering stored in database;
If in the presence of consistent mission number, task verification failure is determined;If in the absence of consistent mission number, the mission number is deposited
Storage is in database.
Alternatively, the interaction data, including:Error code, the result data and the signed data.
The embodiment of the present invention, the result data is added in check field by SDK servers, and then by check word
After the first signature value that the signature of section obtains is added in signed data, signed data is carried and passes through SDK in interaction data
Instrument is supplied to application server.The signed data is signed again using the signature key by application server,
Check field and the second signature value are obtained, if the second signature value is different from the first signature value, determines the interactive number
According to being tampered.So as to prevent that the result data of SDK servers is distorted.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following description
Obtain substantially, or recognized by the practice of the present invention.
Brief description of the drawings
Of the invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments
Substantially and it is readily appreciated that, wherein:
A kind of structural representation for tamper resistant systems based on SDK that Fig. 1 is provided by the embodiment of the present invention;
Fig. 2 is the interaction schematic diagram for the system of distorting;
A kind of schematic flow sheet for tamper resistant method based on SDK that Fig. 3 is provided by the embodiment of the present invention;
The schematic flow sheet for another tamper resistant method based on SDK that Fig. 4 is provided by the embodiment of the present invention.
Embodiment
Embodiments of the invention are described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end
Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
Below with reference to the accompanying drawings the tamper resistant method and system based on SDK of the embodiment of the present invention are described.
The structural representation for a kind of tamper resistant systems based on SDK that Fig. 1 is provided by the embodiment of the present invention, such as Fig. 1 institutes
Show, the system includes:SDK instruments 10, SDK servers 20 and application server 30.
SDK instruments 10, for obtaining the task data of application program submission.
SDK servers 20, for obtaining the task data of the application program submission from the SDK instruments;To described
Business data are handled to obtain result data, and the result data is added in check field;To the check field, adopt
Signed with the signature key, obtain the first signature value;According to the first signature value and the check field, generation label
Name data, and the signed data is carried application server is supplied to by SDK instruments in interaction data.
Specifically, interaction data, including:Error code, the result data and the signed data.
Application server 30, for being signed again to the check field in the signed data using the signature key
Name, obtains the second signature value;If the second signature value is different from the first signature value in the signed data, the friendship is determined
Mutual data have been tampered.
Further, SDK instruments 10, be additionally operable to by the user context information of maintenance in company with the task data send to
The SDK servers.
Based on this, SDK servers 20, it is additionally operable to the user context information being added in the check field.
The application server 30, it is additionally operable to extract user context information to the check field;According to the use of extraction
Family contextual information, with submitting whether the SDK instruments owning user of the signed data matches, determine user's check results.
Wherein, check field also includes mission number.
As shown in Fig. 2 be the interaction schematic diagram for the system of distorting, as shown in Fig. 2 SDK instruments 10 are by task data, Yong Hushang
Context information is supplied to SDK servers 20, and interaction data, the structure institute specific as follows of interaction data are generated by SDK servers 20
Show:
Wherein, mission number is corresponding with task data, for distinguishing different task.Here for simplicity, by original knot
Fruit data, current time, user context information and mission number are referred to as check field, that is to say, that check field includes knot
It is at least one in fruit data, current time, user context information and mission number.
Interaction data is supplied to application server 30 by SDK servers 20 by SDK instruments 10, so that application server 30
The step of carrying out verification and business processing.
Based on this, application server 30, the historic task for being additionally operable to store in the mission number and database is numbered
Compare;If in the presence of consistent mission number, task verification failure is determined;If in the absence of consistent mission number, by the task
Numbering is stored in database.
In the embodiment of the present invention, the result data is added in check field by SDK servers, and then will verification
After the first signature value that the signature of field obtains is added in signed data, signed data is carried and passed through in interaction data
SDK instruments are supplied to application server.The signed data is signed again using the signature key by application server
Name, obtains check field and the second signature value, if the second signature value is different from the first signature value, determines the interaction
Data have been tampered.So as to prevent that the result data of SDK servers is distorted.
For clear explanation previous embodiment, a kind of tamper resistant method based on SDK is present embodiments provided, Fig. 3 is this
A kind of schematic flow sheet for tamper resistant method based on SDK that inventive embodiments are provided.
As shown in figure 3, comprise the following steps:
Step 201, SDK servers obtain the task data of application program submission from SDK instruments.
Further, specifically, it is necessary to submit a current user context while SDK instruments submit task data
Information, such as user identifies or other can identify current user information, and the number is checked when being verified for subsequent applications server
According to whether belonging to this user.
Step 202, SDK servers are handled to obtain result data for task data, and result data is added to
In check field.
Step 203, SDK servers are signed using the signature key to the check field, obtain the first signature
Value.
Step 204, SDK servers are according to the first signature value and the check field, generate signed data, and by institute
State signed data carrying and application server is supplied to by SDK instruments in interaction data.
Specifically, the structure of interaction data is specific as follows shown:
Wherein, mission number is corresponding with task data, for distinguishing different task.Here for simplicity, by original knot
Fruit data, current time, user context information and mission number are referred to as check field, that is to say, that check field includes knot
It is at least one in fruit data, current time, user context information and mission number.
It should be noted that here in order to distinguish SDK server signatures, signed with application server, by SDK server label
Signature value in the signed data of name, is designated as the first signature value;By the signature value in the signed data of application server signature, note
For the second signature value.
If there is not situation about distorting, the first signature value should with the second signature value correspondent equal, if occurring what is distorted
Situation, then difference occurs.
Step 205, application server is carried out again using the signature key to the check field in the signed data
Signature, obtains the second signature value.
Step 206, if the second signature value is different from the first signature value, determine that the interaction data is usurped
Change.
Specifically, by the signature key distributed from SDK servers, the baseline results data in signed data are taken out, when
The preceding time, user context information, mission numbers, these check fields are signed using signature key, obtain the second signature value,
By the second signature value compared with the first signature value, if inconsistent, illustrate that data have been tampered, verification failure.
In the present embodiment, the result data is added in check field by SDK servers, and then by check field
Obtained the first signature value of signature be added in signed data after, signed data is carried and passes through SDK works in interaction data
Tool is supplied to application server.The signed data is signed again using the signature key by application server, obtained
To check field and the second signature value, if the second signature value is different from the first signature value, the interaction data is determined
It has been tampered.So as to prevent that the result data of SDK servers is distorted.
Further, on the basis of a upper embodiment, after step 206, as shown in figure 4, also including:
Step 208, application server carries out user's verification and task verification.
Application server can also verify whether interaction data be other users data, that is to say, that use other users
Result data substituted for the result data of active user.
Specifically, application server extracts user context information to check field, and then application server is according to extraction
User context information, with submitting whether the SDK instruments owning user of the signed data matches, determine that user verifies knot
Fruit.
If the user context information of extraction is with submitting the SDK instruments owning user of the signed data to mismatch, explanation
User verifies failure;If the user context information of extraction is said with submitting the SDK instrument owning users of the signed data to match
Bright user verifies successfully.
In addition, application server can also verify whether interaction data for active user historic task result data,
That is, the result data of the current task of active user is substituted for the result data of the historic task of active user.
Specifically, application server numbers the historic task stored in mission number that check field includes and database
Compare;If in the presence of consistent mission number, the application server determines task verification failure;If compiled in the absence of consistent task
Number, it is determined that task verification passes through, and the mission number is stored in database by the application server.
Step 209, pass through when user verifies, and task verification passes through, application server reads result data and carries out business
Processing.
The present embodiment, first, checking process are simple, and application server can be verified with complete independently, it is not necessary to application service
Device and SDK server communications.Secondly, the verification of washability:Check field is not made an amendment to existing business data, but is used as one
Individual extra check field, application server can select to use or verified without using check field.Finally, verifying function
Comprehensively, not only can verify whether initial data is tampered, can also verify result data before whether having reused and
Whether the result data of other users has been used.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description
Point is contained at least one embodiment or example of the present invention.In this manual, to the schematic representation of above-mentioned term not
Identical embodiment or example must be directed to.Moreover, specific features, structure, material or the feature of description can be with office
Combined in an appropriate manner in one or more embodiments or example.In addition, in the case of not conflicting, the skill of this area
Art personnel can be tied the different embodiments or example and the feature of different embodiments or example described in this specification
Close and combine.
In addition, term " first ", " second " are only used for describing purpose, and it is not intended that instruction or hint relative importance
Or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the invention, " multiple " are meant that at least two, such as two, three
It is individual etc., unless otherwise specifically defined.
Any process or method described otherwise above description in flow chart or herein is construed as, and represents to include
Module, fragment or the portion of the code of the executable instruction of one or more the step of being used to realize custom logic function or process
Point, and the scope of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable
Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be of the invention
Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (such as computer based system including the system of processor or other can be held from instruction
The system of row system, device or equipment instruction fetch and execute instruction) use, or combine these instruction execution systems, device or set
It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass
Defeated program is for instruction execution system, device or equipment or the dress used with reference to these instruction execution systems, device or equipment
Put.The more specifically example (non-exhaustive list) of computer-readable medium includes following:Electricity with one or more wiring
Connecting portion (electronic installation), portable computer diskette box (magnetic device), random access memory (RAM), read-only storage
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device, and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium, which can even is that, to print the paper of described program thereon or other are suitable
Medium, because can then enter edlin, interpretation or if necessary with it for example by carrying out optical scanner to paper or other media
His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned
In embodiment, software that multiple steps or method can be performed in memory and by suitable instruction execution system with storage
Or firmware is realized.Such as, if realized with hardware with another embodiment, following skill well known in the art can be used
Any one of art or their combination are realized:With the logic gates for realizing logic function to data-signal from
Logic circuit is dissipated, the application specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene can compile
Journey gate array (FPGA) etc..
Those skilled in the art are appreciated that to realize all or part of step that above-described embodiment method carries
Suddenly it is that by program the hardware of correlation can be instructed to complete, described program can be stored in a kind of computer-readable storage medium
In matter, the program upon execution, including one or a combination set of the step of embodiment of the method.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, can also
That unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould
Block can both be realized in the form of hardware, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized in the form of software function module and as independent production marketing or in use, can also be stored in a computer
In read/write memory medium.
Storage medium mentioned above can be read-only storage, disk or CD etc..Although have been shown and retouch above
Embodiments of the invention are stated, it is to be understood that above-described embodiment is exemplary, it is impossible to be interpreted as the limit to the present invention
System, one of ordinary skill in the art can be changed to above-described embodiment, change, replace and become within the scope of the invention
Type.
Claims (10)
1. a kind of tamper resistant method based on SDK, it is characterised in that comprise the following steps:
SDK servers obtain the task data of application program submission from SDK instruments;
The SDK servers are handled to obtain result data for the task data, and the result data is added to
In check field;
The SDK servers are signed using the signature key to the check field, obtain the first signature value;
The SDK servers generate signed data according to the first signature value and the check field, and by the number of signature
Application server is supplied to by SDK instruments in interaction data according to carrying;
The application server is signed again using the signature key to the check field in the signed data, is obtained
Second signature value;
If the second signature value is different from the first signature value in the signed data, the application server determines the friendship
Mutual data have been tampered.
2. tamper resistant method according to claim 1, it is characterised in that methods described, in addition to:
The SDK instruments send the user context information of maintenance to the SDK servers in company with the task data;
The user context information is added in the check field by the SDK servers.
3. tamper resistant method according to claim 2, it is characterised in that the application server uses the signature key
Check field in the signed data is signed again, after obtaining the second signature value, in addition to:
The application server extracts user context information to the check field;
According to the user context information of extraction, whether matched with the SDK instruments owning user of the submission signed data, it is determined that
User's check results.
4. according to the tamper resistant method described in claim any one of 1-3, it is characterised in that the check field is compiled including task
Number, methods described also includes:
The application server is by the mission number compared with the historic task numbering stored in database;
If in the presence of consistent mission number, the application server determines task verification failure;
If in the absence of consistent mission number, the mission number is stored in database by the application server.
5. according to the tamper resistant method described in claim any one of 1-3, it is characterised in that the interaction data, including:Mistake
Code, the result data and the signed data.
A kind of 6. tamper resistant systems based on SDK, it is characterised in that including:
SDK instruments, for obtaining the task data of application program submission;
SDK servers, for obtaining the task data of the application program submission from the SDK instruments;To the task data
Handled to obtain result data, and the result data is added in check field;To the check field, using described
Signature key is signed, and obtains the first signature value;Signed data is generated according to the first signature value and the check field,
And the signed data is carried application server is supplied to by SDK instruments in interaction data;
The application server, for being signed again to the check field in the signed data using the signature key
Name, obtains the second signature value;If the second signature value is different from the first signature value in the signed data, the friendship is determined
Mutual data have been tampered.
7. tamper resistant systems according to claim 6, it is characterised in that
The SDK instruments, it is additionally operable in company with the task data send the user context information of maintenance to SDK services
Device;
The SDK servers, it is additionally operable to the user context information being added in the check field.
8. tamper resistant systems according to claim 7, it is characterised in that
The application server, it is additionally operable to extract user context information to the check field;Above and below the user of extraction
Literary information, with submitting whether the SDK instruments owning user of the signed data matches, determine user's check results.
9. according to the tamper resistant systems described in claim any one of 6-8, it is characterised in that the check field is compiled including task
Number,
The application server, it is additionally operable to the mission number compared with the historic task numbering stored in database;If deposit
In consistent mission number, task verification failure is determined;If in the absence of consistent mission number, the mission number is stored in
In database.
10. according to the tamper resistant systems described in claim any one of 6-8, it is characterised in that the interaction data, including:It is wrong
Error code, the result data and the signed data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710555693.4A CN107463855A (en) | 2017-07-10 | 2017-07-10 | Tamper resistant method and system based on SDK |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710555693.4A CN107463855A (en) | 2017-07-10 | 2017-07-10 | Tamper resistant method and system based on SDK |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107463855A true CN107463855A (en) | 2017-12-12 |
Family
ID=60546560
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710555693.4A Withdrawn CN107463855A (en) | 2017-07-10 | 2017-07-10 | Tamper resistant method and system based on SDK |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107463855A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111562928A (en) * | 2020-04-28 | 2020-08-21 | 北京字节跳动网络技术有限公司 | Resource providing method and device and resource downloading method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110185189A1 (en) * | 2010-01-26 | 2011-07-28 | Kyocera Mita Corporation | SDK Use-Restriction Imposing Device, Use-Restriction-Imposed SDK Developing System, and SDK Use-Restriction Imposing Method |
CN103699852A (en) * | 2014-01-08 | 2014-04-02 | 安投融(北京)网络科技有限公司 | Multi-digital signature method for network transaction electronic contract |
CN103973505A (en) * | 2013-01-25 | 2014-08-06 | 北京思博途信息技术有限公司 | Method for processing monitoring request, SDK and server |
CN106656468A (en) * | 2016-10-13 | 2017-05-10 | 上海拓畅信息技术有限公司 | Novel encryption false prevention discrimination method for online advertisements |
-
2017
- 2017-07-10 CN CN201710555693.4A patent/CN107463855A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110185189A1 (en) * | 2010-01-26 | 2011-07-28 | Kyocera Mita Corporation | SDK Use-Restriction Imposing Device, Use-Restriction-Imposed SDK Developing System, and SDK Use-Restriction Imposing Method |
CN103973505A (en) * | 2013-01-25 | 2014-08-06 | 北京思博途信息技术有限公司 | Method for processing monitoring request, SDK and server |
CN103699852A (en) * | 2014-01-08 | 2014-04-02 | 安投融(北京)网络科技有限公司 | Multi-digital signature method for network transaction electronic contract |
CN106656468A (en) * | 2016-10-13 | 2017-05-10 | 上海拓畅信息技术有限公司 | Novel encryption false prevention discrimination method for online advertisements |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111562928A (en) * | 2020-04-28 | 2020-08-21 | 北京字节跳动网络技术有限公司 | Resource providing method and device and resource downloading method and device |
CN111562928B (en) * | 2020-04-28 | 2023-05-05 | 北京字节跳动网络技术有限公司 | Resource providing method and device, and resource downloading method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11562451B1 (en) | Apparatus for proportional calculation regarding non-fungible tokens | |
CN109075971A (en) | System and method for document information authenticity verification | |
CN112819466A (en) | Digital certificate processing method and device, terminal equipment and storage medium | |
CN111597817B (en) | Event information extraction method and device | |
CN107025252B (en) | Method, system, and program for enabling real-time availability of published documents | |
US11323245B2 (en) | Method for linking block-chain using hyper-chain, and apparatus therefor | |
CN109858911A (en) | Qualification verification method, device, system, equipment and readable storage medium storing program for executing | |
CN108053545A (en) | Certificate verification method and apparatus, server, storage medium | |
WO2023015312A1 (en) | Methods for securely adding data to a blockchain using dynamic time quanta and version authentication | |
US20130191641A1 (en) | Captcha (completely automated public test to tell computers and humans apart) data generation methods and related data management systems and computer program products thereof | |
CN111797217A (en) | Information query method based on FAQ matching model and related equipment thereof | |
US20160012024A1 (en) | Method and system for automatic generation and validation of html5 compliant scripts | |
CN107171808A (en) | A kind of verification method and device of electronic record authenticity | |
CN107463855A (en) | Tamper resistant method and system based on SDK | |
CN105593876A (en) | Validation in serialization flow | |
CN111311179A (en) | Object processing method and device, electronic equipment and computer readable storage medium | |
CN117034894A (en) | Credential generation method, device, equipment and readable storage medium | |
CN107453876A (en) | A kind of identifying code implementation method and device based on picture | |
Tornés et al. | Receipt Dataset for Document Forgery Detection | |
CN108038101B (en) | Method and device for identifying tampered text | |
CN108140076B (en) | Authentication with fault tolerance for secure product identifiers | |
CN112560055B (en) | Credible electronic license system based on PKI technology and working method | |
Sousa et al. | Authentic Non Fungible Tokens | |
KR102636312B1 (en) | Regionally specialized product confirmation server that performs confirmation of whether a regionally specialized product is the regionally specialized product that has been genuinely authenticated based on the two-dimensional code, and operating method thereof | |
CN110099070A (en) | A kind of single input frame login validation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20171212 |
|
WW01 | Invention patent application withdrawn after publication |