[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112769802B - Access verification method and device based on server, electronic equipment and storage medium - Google Patents

Access verification method and device based on server, electronic equipment and storage medium Download PDF

Info

Publication number
CN112769802B
CN112769802B CN202011630029.XA CN202011630029A CN112769802B CN 112769802 B CN112769802 B CN 112769802B CN 202011630029 A CN202011630029 A CN 202011630029A CN 112769802 B CN112769802 B CN 112769802B
Authority
CN
China
Prior art keywords
target
file
program
domain name
service domain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011630029.XA
Other languages
Chinese (zh)
Other versions
CN112769802A (en
Inventor
章青周
李洪波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weiyiyun Hangzhou Holding Co ltd
Original Assignee
Weiyiyun Hangzhou Holding Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weiyiyun Hangzhou Holding Co ltd filed Critical Weiyiyun Hangzhou Holding Co ltd
Priority to CN202011630029.XA priority Critical patent/CN112769802B/en
Publication of CN112769802A publication Critical patent/CN112769802A/en
Application granted granted Critical
Publication of CN112769802B publication Critical patent/CN112769802B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention discloses an access verification method, a device, electronic equipment and a storage medium based on a server, wherein the method comprises the following steps: when a page request for accessing a target page is received, determining target service domain name information in the page request; and calling a to-be-fed back check file corresponding to the target service domain name information from the database, and feeding back the to-be-fed back check file to the target access program, so that the target access program configures the service domain name information for the target access program according to the received to-be-fed back check file and the target check file prestored in the target access program. According to the technical scheme of the embodiment of the invention, the check file is managed through the database corresponding to the server side, and the traceability of the check file and the convenience for acquiring the check file are improved.

Description

Access verification method and device based on server side, electronic equipment and storage medium
Technical Field
The embodiment of the invention relates to an information verification technology, in particular to an access verification method and device based on a server, electronic equipment and a storage medium.
Background
In recent years, third party platforms, such as applets, public numbers and the like, have emerged, and many functions of traditional web pages or APPs can be migrated to the third party platforms. When configuring the third-party platform, the service domain name needs to be checked to complete the configuration of the service domain name, so that the third-party platform can be normally used.
The existing method for checking the service domain name is to upload a check file to the root directory of the service domain name in the system, and the operation and maintenance is performed on the nginnx (high-performance HTTP and reverse proxy web server). The access name of the check file points to the root directory, and then the third party platform can access the check file under the service domain name root directory to perform subsequent check on the content of the check file.
In the above manner, the check file needs to be uploaded to the root directory of the service domain name in the system, and the check file cannot record information such as a corresponding checker, so that great difficulty exists in management and tracing of the check file. Moreover, an accessible directory of the check file needs to be configured on the Nginx, and each service domain name needs to be configured separately for the Nginx, which causes problems of poor maintainability and complex operation due to a large number of configurations.
Disclosure of Invention
The embodiment of the invention provides an access verification method and device based on a server, electronic equipment and a storage medium, so that a verification file is managed through a database corresponding to the server, the traceability of the verification file is improved, and the convenience of obtaining the verification file is improved.
In a first aspect, an embodiment of the present invention provides a server-based access verification method, where the method includes:
when a page request for accessing a target page is received, determining target service domain name information in the page request;
and calling a to-be-fed back check file corresponding to the target service domain name information from a database, and feeding back the to-be-fed back check file to a target access program, so that the target access program configures the service domain name information for the target access program according to the received to-be-fed back check file and the target check file prestored in the target access program.
In a second aspect, an embodiment of the present invention further provides a server-based access checking apparatus, where the apparatus includes:
the information determining module is used for determining target service domain name information in a page request when the page request for accessing a target page is received;
and the file sending module is used for calling a to-be-fed back check file corresponding to the target service domain name information from a database and feeding the to-be-fed back check file back to a target access program, so that the target access program configures the service domain name information for the target access program according to the received to-be-fed back check file and a target check file prestored in the target access program.
In a third aspect, an embodiment of the present invention further provides a server, where the server includes:
one or more processors;
a storage device for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors implement the server-based access checking method according to any of the embodiments of the present invention.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the server-based access checking method according to any one of the embodiments of the present invention.
According to the technical scheme of the embodiment of the invention, when a page request for accessing a target page is received, target service domain name information in the page request is determined, a file to be fed back and verified corresponding to the target service domain name information is called from a database, and the file to be fed back and verified is fed back to a target access program, so that the target access program configures the service domain name information for the target access program according to the received file to be fed back and the target verification file prestored in the target access program, the problems that the verification file is difficult to manage and trace back and the problems that the maintainability is poor and the operation is complex due to the large number of configured Nginx are solved, the management of the file through the data corresponding to a service end is realized, and the traceability of the verification file and the convenience for obtaining the verification file are improved.
Drawings
In order to more clearly illustrate the technical solutions of the exemplary embodiments of the present invention, a brief description is given below of the drawings used in describing the embodiments. It should be clear that the described figures are only views of some of the embodiments of the invention to be described, not all, and that for a person skilled in the art, other figures can be derived from these figures without inventive effort.
Fig. 1 is a schematic flowchart of a server-based access verification method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a server-based access verification method according to a second embodiment of the present invention;
fig. 3 is a schematic diagram of a service-based access verification method according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a server-based access checking apparatus according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of a server according to a fifth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not to be construed as limiting the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a schematic flow chart of a server-based access verification method according to a first embodiment of the present invention, where the present embodiment is applicable to a situation where a verification file corresponding to a target service domain name is called from a server, and the method may be executed by a server-based access verification method apparatus, which may be implemented in a form of software and/or hardware, where the hardware may be a server, and the like.
Before the technical solution of the embodiment of the present invention is introduced, an application scenario is introduced. Under the condition that platforms such as a WeChat public number, a WeChat applet, a headline applet, a Payment baby applet and the like have the webpage skipping requirement, a service domain name can be configured through the platforms, and a corresponding verification file is downloaded according to the service domain name, so that the technical scheme of the embodiment is used for verifying the service domain name and managing and maintaining the verification file. When the configuration of the service domain name is successful, any legal service domain name can be accessed.
As shown in fig. 1, the method of this embodiment specifically includes the following steps:
s110, when a page request for accessing a target page is received, determining target service domain name information in the page request.
The target page may be a World Wide WEB (World Wide WEB) page. The page request may be a request to access a target page, and may be, for example, a request instruction or a request code, etc. The target service domain name information can be the domain name information corresponding to the page request, the service domain name needs to be recorded by ICP, the newly recorded domain name can be configured after 24 hours, and the domain name format only supports English capital and small letters, numbers and a < - >, and does not support an IP address.
Specifically, when the service domain name of the target page is configured, a page request for accessing the target page may be sent to the server. When the server receives a page request for accessing a target page, the service domain name information carried in the page request can be used as the target service domain name information, or the service domain name information corresponding to the page request can be obtained according to the page request and used as the target service domain name information.
S120, a to-be-fed back check file corresponding to the target service domain name information is called from the database, and the to-be-fed back check file is fed back to the target access program, so that the target access program configures the service domain name information for the target access program according to the received to-be-fed back check file and the target check file pre-stored in the target access program.
The database may be a database configured by the server and used for storing the check file, and the database may store the check file corresponding to each service domain name that the target access program can access. Js server, etc. The target access program may be a third party platform, for example: WeChat public number, WeChat applet, headline applet, Payment program, and the like. The check file to be fed back may be a check file corresponding to the target service domain name in the database, and is used to check whether the target page corresponding to the target service domain name can be normally accessed. The target verification file may be a file pre-stored in the target access program and used for verifying whether the file to be subjected to feedback verification is correct.
It should be noted that, in the prior art, the check file is uploaded to the root directory of the service domain name in the system. However, in different target access programs, the check files corresponding to the same service domain name are stored in the root directory of the same service domain name, and the source information of the different check files contained in the root directory of the service domain name cannot be identified, that is, it cannot be known to which target access program the check file belongs, which causes great difficulty in managing and retrieving the check file. In this embodiment, the check file may be managed and retrieved through a database of a server (e.g., node. js). For example: the corresponding relation between the verification file and the target access program can be established through an ES (elastic search) database, so that the management efficiency of the verification file is improved, and the searching and calling efficiency of the verification file can be improved. The types of the server and the database may be selected according to actual requirements, and are not specifically limited in this embodiment. Specifically, the check files stored in the database may be stored separately according to the service domain names, or may be stored separately according to the application programs to which the check files belong. And calling a check file to be fed back corresponding to the target service domain name from a database according to the target service domain name information. And then, the server side can send the called file to be checked back to the target access program. When the target access program receives the check file to be fed back, which is fed back by the server, the target check file corresponding to the target service domain name, which is pre-stored in the target access program, can be called. Further, matching the verification content of the verification file to be fed back with the verification content of the target verification file. If the matching is successful, the service domain name information can be configured for the target access program. If the matching fails, the check file to be fed back corresponding to the target service domain name can be requested to be obtained again for subsequent matching; and sending a prompt message of failed configuration to prompt the reconfiguration of the target service domain name.
Optionally, the page request for accessing the target page may include two or more target service domain names, and the check file is sequentially retrieved from the database according to each target service domain name for checking. And if the file to be fed back and verified corresponding to any one target service domain name passes verification, stopping verification and finishing the configuration of the target service domain name. If the files to be fed back and corresponding to all the target service domain names are not verified, prompt information of configuration failure can be sent to prompt reconfiguration of the target service domain names.
According to the technical scheme of the embodiment of the invention, when a page request for accessing a target page is received, target service domain name information in the page request is determined, a file to be fed back and verified corresponding to the target service domain name information is called from a database, and the file to be fed back and verified is fed back to a target access program, so that the target access program configures the service domain name information for the target access program according to the received file to be fed back and the target verification file prestored in the target access program, the problems that the verification file is difficult to manage and trace back and the problems that the maintainability is poor and the operation is complex due to the large number of configured Nginx are solved, the management of the file through the data corresponding to a service end is realized, and the traceability of the verification file and the convenience for obtaining the verification file are improved.
Example two
Fig. 2 is a schematic flow chart of an access verification method based on a server according to a second embodiment of the present invention, and this embodiment refers to the technical solution of this embodiment for a manner of obtaining a verification file to be fed back and a verification manner of the verification file to be fed back and a target verification file on the basis of the foregoing embodiments. The same or corresponding terms as those in the above embodiments are not explained in detail herein.
As shown in fig. 2, the method of this embodiment specifically includes the following steps:
s210, when a page request for accessing a target page is received, determining target service domain name information in the page request.
S220, acquiring a target field in the page request, and calling a file to be checked for feedback, which is matched with the target field, from the database according to the target field.
The target field may be a partial field in the page request, and is used to indicate the name of the check file corresponding to the page request. Typically, the check file may be a TXT formatted file, and thus, the target field may be the file name of the TXT file.
Specifically, the determination rule of the target field may be preset, for example: the target field may be the filename of the txt file. According to the determination rule of the target field, a field corresponding to the determination rule of the target field can be obtained from the page request, and the field is used as the target field, so that the check file to be fed back, which is matched with the target field, can be called from the database according to the target field.
And S230, calling the check file to be fed back corresponding to the target service domain name information from the database.
Specifically, the check file can be searched in the database according to the target field, the check file with the searched file name matched with the target field is used as the check file to be fed back, and the check file to be fed back is called for use in subsequent check.
The method for searching and retrieving the check file to be fed back in the database may be to match the file name of the check file stored in the database with the target field one by one. In order to save the time for searching the check file to be fed back, the check files in the database can be classified according to the index information, so that the check file to be fed back can be searched and called conveniently according to the index information.
Optionally, the check file to be fed back corresponding to the target service domain name information may be called from the database according to the following manner:
step one, determining target index information corresponding to a target field.
The target index information may be index information for marking check files in the database. Optionally, the index information may be distributed according to an access program, for example: the index information corresponding to the WeChat applet is 1, the index information corresponding to the Paibao applet is 2, and the like.
Specifically, index information corresponding to the access program may be added to each check file in the database, so as to search for the check file according to the index information. And, the corresponding relation between the file name of each check file and the index information can be established. After the target field is determined, the file name of the file to be fed back for verification can be obtained from the target field. Further, target index information corresponding to target discretion is specified from the correspondence between the file name of each check file and the index information.
Optionally, index information may be allocated to the check file in the database according to the first letter of the file name of the check file, for example: if the verification file name is pass, index information P and the like may be allocated to the verification file.
It should be noted that the check file may be managed by the database of the server, the check file may be tagged, the index information may be allocated to the check file, and a corresponding relationship between the check file and the target access program and/or the target program to which the target access program belongs may be established. By the method, the problem that in the prior art, after the check file is acquired from the root directory of the service domain name, the target access program corresponding to the check file is difficult to judge can be solved.
Step two, determining whether the database comprises a file to be fed back and matched with the target index information or not according to the target index information; if yes, the file to be checked for feedback, which is matched with the target index information, is called from the database.
Specifically, according to the target index information corresponding to the target field, the check file corresponding to the target index information is determined as the check file to be selected in the database. And searching whether the verification file matched with the file name in the target field exists in the verification file to be selected according to the file name in the target field. And if the verification file exists, taking the matched verification file as the verification file to be fed back, and calling the verification file to be fed back from the database. If the configuration failure information does not exist, it indicates that the to-be-fed-back check file corresponding to the target field does not exist in the database, and also indicates that the to-be-fed-back check file corresponding to the target service domain name information does not exist in the database, and a prompt message of configuration failure can be sent to the target access program to prompt the reconfiguration of the target service domain name.
And S240, feeding back the verification file to be fed back to the target access program.
Specifically, if the check file to be fed back corresponding to the target service domain name information is called from the database, the check file to be fed back may be sent to the target access program, so that the target access program checks the check file to be fed back, and further determines whether the configuration of the target service domain name is completed.
And S250, the target access program sends a calling instruction to a target server of the target program to which the target access program belongs, so that the target server feeds back a pre-stored target verification file.
The target program may be a higher-level program of the target access program, that is, the target program includes the target access program. For example: the target access program is a WeChat applet, and the target program is WeChat; the target access program is a small payment program, and the target program is a payment program and the like. The target server is a server corresponding to the target program. The call instruction may be instruction information for calling the verification file in the target server, and in this embodiment, the call instruction may be instruction information for calling the verification file corresponding to the file name of the verification file to be fed back in the target server, that is, instruction information for calling the verification file corresponding to the target field in the target server.
Specifically, the target access program may send a call instruction for calling a verification file for verifying the file to be fed back to the target server of the target program to which the target access program belongs. After receiving the call instruction, the target server may call a target verification file corresponding to the call instruction according to the call instruction, so as to be used for subsequent verification.
And S260, when the target access program detects that the target verification file is matched with the file to be fed back, configuring service domain name information for the target access program.
Specifically, after the target access program calls the target verification file and the verification file to be fed back, the verification contents in the two verification files are matched. If the verification content of the target verification file is the same as that of the file to be fed back, the verification is passed, and the service domain name information can be configured for the target access program. If the verification contents of the target verification file and the verification file to be fed back are different, the verification is not passed, and prompt information can be sent to a target access program to remind a worker to reconfigure the target service domain name.
On the basis of the above technical solution, in order to facilitate management and retrieval of the check file in the database, a program tag of a corresponding target program may be set for the stored check file. At this time, the manner of determining the target service domain name information in the page request may also be to determine the target service domain name information in the page request and a program tag of a target program to which the target access program belongs.
The program tag may be a tag corresponding to the target program, and may be used to uniquely identify the target program. The page request may include the target service domain name information and the program tag of the target program to which the target access program belongs. By analyzing the page request, the domain name information of the target service and the program label of the target program affiliated to the target access program can be obtained.
Correspondingly, the check file to be fed back corresponding to the target service domain name information is called from the database, or at least one check file matched with the program label is determined, and the check file to be fed back is determined from the at least one check file according to the target service domain name.
Specifically, at least one check file including the program label may be called from the database according to the program label, where the at least one check file is a check file for configuring a service domain name in the target program. And searching in the at least one check file according to the target service domain name, and taking the searched check file as a check file to be fed back.
Optionally, the method for setting the program tag for the verification file may be to receive the verification file of each target access program, and determine the target access program corresponding to the verification file and the program tag of the target program to which the target access program belongs; and establishing a corresponding relation among the program label, the target access program and the check file so as to call the corresponding check file to be fed back according to the program label.
Specifically, different program tags may be set in advance for different object programs, so as to distinguish the object programs according to the program tags. When a check file is newly added to the database, a target access program and a program label corresponding to the newly added check file can be acquired. In order to facilitate calling of the corresponding file to be fed back according to the program tag, a corresponding relation among the program tag, the target access program and the verification file can be established and stored.
The technical scheme of the embodiment of the invention comprises the steps of determining target service domain name information in a page request when receiving the page request for accessing a target page, calling a file to be checked and fed back corresponding to the target service domain name information from a database, calling the file to be checked and fed back matched with a target field from the database according to the target field of the page request, feeding back the file to be checked and fed back to a target access program, sending a calling instruction to a target service terminal of the target program belonging to the target access program by the target access program so as to enable the target service terminal to feed back the pre-stored target check file, configuring service domain name information for the target access program when the target access program detects that the target check file is matched with the file to be checked and fed back, solving the problems of difficult management and check file tracing and poor maintainability caused by configuring a large number of Nginx, the check file management method has the advantages that the check file is managed through the database corresponding to the server side due to the complex operation, and the traceability of the check file and the convenience of obtaining the check file are improved.
EXAMPLE III
As an optional embodiment of the foregoing embodiments, fig. 3 is a schematic diagram of an access checking method based on a server according to a third embodiment of the present invention. The technical terms that are the same as or corresponding to the above-mentioned embodiments are not repeated.
As shown in fig. 3, the access checking method based on the server may be:
and uploading the newly-checked file to a database of a server background, wherein the server background can be a file management system and the like corresponding to the server, and the server can be a node.
When the target service domain name is configured on the verifier (i.e., target access program), a URL request (i.e., page request) can be initiated to the server for verification. When the server receives the URL request, the requested URL may be verified. If the path (path) of the URL request does not contain ". txt", the check fails. If the path of the URL request contains ". txt", the path of the URL can be used as a parameter to initiate an interface request for calling the check file in the database. Wherein, ". txt" corresponds to the verification file name. And if the verification file corresponding to the URL request is included in the verification file in the database, returning the verification content of the verification file (namely the verification file to be fed back) to the verifier.
When the verifying party receives the verifying content, the verifying content is matched with the verifying content of the verifying file (namely, the target verifying file) stored by the verifying party, if the verifying content is consistent, the matching is successful, which indicates that the verifying is successful, and the target service domain name can be successfully configured.
According to the technical scheme of the embodiment of the invention, the check file is uploaded to the database of the server background, the check file corresponding to the target service domain name is called from the database of the server according to the target service domain name configured on the checker, and the check content is sent to the checker, so that the checker matches the check content with the check content of the check file stored by the checker, when the matching is successful, the configuration of the target service domain name is completed, the problems that the check file is difficult to manage and trace are solved, and the problems that the maintainability is poor and the operation is complex due to the large amount of Nginx configuration are solved, the check file is managed through the database corresponding to the server, and the traceability of the check file and the convenience for obtaining the check file are improved.
Example four
Fig. 4 is a schematic structural diagram of a service-based access checking apparatus according to a fourth embodiment of the present invention, where the apparatus includes: an information determination module 310 and a file transmission module 320.
The information determining module 310 is configured to, when a page request for accessing a target page is received, determine target service domain name information in the page request; the file sending module 320 is configured to retrieve a to-be-fed back check file corresponding to the target service domain name information from a database, and feed back the to-be-fed back check file to a target access program, so that the target access program configures the service domain name information for the target access program according to the received to-be-fed back check file and a target check file pre-stored in the target access program.
Optionally, the apparatus further comprises: and the target field acquisition module is used for acquiring a target field in the page request so as to call the file to be checked for feedback, which is matched with the target field, from a database according to the target field.
Optionally, the file sending module 320 includes:
the target index information determining unit is used for determining target index information corresponding to the target field;
the file calling unit is used for determining whether the database comprises a file to be subjected to feedback verification matched with the target index information or not according to the target index information; and if so, calling the check file to be fed back matched with the target index information from the database.
Optionally, the file sending module 320 further includes:
the file feedback unit is used for feeding back the check file to be fed back to the target access program;
the instruction sending unit is used for sending a calling instruction to a target server of a target program to which the target access program belongs by the target access program so as to enable the target server to feed back a pre-stored target verification file;
and the information configuration unit is used for configuring service domain name information for the target access program when the target access program detects that the target verification file is matched with the verification file to be fed back.
Optionally, the information determining module 310 includes:
and the label determining unit is used for determining the target service domain name information in the page request and the program label of the target program affiliated to the target access program.
Accordingly, the file sending module 320 includes:
and the file determining unit is used for determining at least one check file matched with the program label and determining the check file to be fed back from the at least one check file according to the target service domain name.
Optionally, the apparatus further comprises:
the file receiving module is used for receiving the verification files of all the target access programs and determining the target access programs corresponding to the verification files and the program labels of the target programs affiliated to the target access programs;
and the file calling module is used for establishing the corresponding relation among the program label, the target access program and the verification file so as to call the corresponding file to be fed back and verified according to the program label.
According to the technical scheme of the embodiment of the invention, when a page request for accessing a target page is received, target service domain name information in the page request is determined, a file to be fed back and verified corresponding to the target service domain name information is called from a database, and the file to be fed back and verified is fed back to a target access program, so that the target access program configures the service domain name information for the target access program according to the received file to be fed back and the target verification file prestored in the target access program, the problems that the verification file is difficult to manage and trace back and the problems that the maintainability is poor and the operation is complex due to the large number of configured Nginx are solved, the management of the file through the data corresponding to a service end is realized, and the traceability of the verification file and the convenience for obtaining the verification file are improved.
The server-based access verification device provided by the embodiment of the invention can execute the server-based access verification method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
It should be noted that, each unit and module included in the above access checking apparatus based on the server are only divided according to functional logic, but are not limited to the above division, as long as the corresponding function can be realized; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the embodiment of the invention.
EXAMPLE five
Fig. 5 is a schematic structural diagram of a server according to a fifth embodiment of the present invention. FIG. 5 illustrates a block diagram of an exemplary server 40 suitable for use in implementing embodiments of the present invention. The server 40 shown in fig. 5 is only an example, and should not bring any limitation to the function and the scope of use of the embodiment of the present invention.
As shown in fig. 5, the server 40 is in the form of a general purpose computing device. The components of server 40 may include, but are not limited to: one or more processors or processing units 401, a system memory 402, and a bus 403 that couples various system components including the system memory 402 and the processing unit 401.
Bus 403 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
The server 40 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by server 40 and includes both volatile and nonvolatile media, removable and non-removable media.
The system memory 402 may include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)404 and/or cache memory 405. The server 40 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 406 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 5, commonly referred to as a "hard drive"). Although not shown in FIG. 5, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to the bus 403 by one or more data media interfaces. Memory 402 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 408 having a set (at least one) of program modules 407 may be stored, for example, in memory 402, such program modules 407 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 407 generally perform the functions and/or methods of the described embodiments of the invention.
The server 40 may also communicate with one or more external devices 409 (e.g., keyboard, pointing device, display 410, etc.), with one or more devices that enable a user to interact with the server 40, and/or with any devices (e.g., network card, modem, etc.) that enable the server 40 to communicate with one or more other computing devices. Such communication may be through input/output (I/O) interface 411. Also, server 40 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via network adapter 412. As shown, the network adapter 412 communicates with the other modules of the server 40 over the bus 403. It should be appreciated that although not shown in FIG. 5, other hardware and/or software modules may be used in conjunction with the server 40, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
The processing unit 401 executes various functional applications and data processing by running programs stored in the system memory 402, for example, to implement the server-based access verification method provided by the embodiment of the present invention.
EXAMPLE six
An embodiment of the present invention further provides a storage medium containing computer-executable instructions, where the computer-executable instructions are executed by a computer processor to perform a server-based access checking method, and the method includes:
when a page request for accessing a target page is received, determining target service domain name information in the page request;
and calling a to-be-fed back check file corresponding to the target service domain name information from a database, and feeding back the to-be-fed back check file to a target access program, so that the target access program configures the service domain name information for the target access program according to the received to-be-fed back check file and the target check file prestored in the target access program.
Computer storage media for embodiments of the present invention may take the form of any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for embodiments of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. Those skilled in the art will appreciate that the present invention is not limited to the particular embodiments described herein, and that various obvious changes, rearrangements and substitutions will now be apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (7)

1. An access checking method based on a server side is characterized by comprising the following steps:
when a page request for accessing a target page is received, determining target service domain name information in the page request;
calling a to-be-fed back check file corresponding to the target service domain name information from a database, and feeding back the to-be-fed back check file to a target access program, so that the target access program configures the service domain name information for the target access program according to the received to-be-fed back check file and the target check file prestored in the target access program;
determining the target service domain name information in the page request in a manner of determining the target service domain name information in the page request and a program tag of a target program to which a target access program belongs;
and calling the check file to be fed back corresponding to the target service domain name information from the database to determine at least one check file matched with a program label, and determining the check file to be fed back from the at least one check file according to the target service domain name.
2. The method according to claim 1, wherein the feeding back the check file to be fed back to a target access program so that the target access program configures the service domain name information for the target access program according to the received check file to be fed back and a target check file pre-stored in the target access program comprises:
feeding back the check file to be fed back to the target access program;
the target access program sends a calling instruction to a target server of the target program to which the target access program belongs, so that the target server feeds back a pre-stored target verification file;
and when the target access program detects that the target verification file is matched with the file to be fed back, configuring service domain name information for the target access program.
3. The method of claim 1, wherein the determining the target service domain name information in the page request comprises:
determining target service domain name information in the page request and a program label of a target program to which the target access program belongs;
correspondingly, the retrieving of the check file to be fed back corresponding to the target service domain name information from the database includes:
and determining at least one check file matched with the program label, and determining the check file to be fed back from the at least one check file according to the target service domain name.
4. The method of claim 3, further comprising:
receiving a verification file of each target access program, and determining a target access program corresponding to the verification file and a program label of the target program to which the target access program belongs;
and establishing a corresponding relation among the program label, the target access program and the check file so as to call the corresponding check file to be fed back according to the program label.
5. An access checking device based on a server side is characterized by comprising:
the information determining module is used for determining target service domain name information in a page request when the page request for accessing a target page is received;
the file sending module is used for calling a to-be-fed back check file corresponding to the target service domain name information from a database and feeding the to-be-fed back check file back to a target access program, so that the target access program configures the service domain name information for the target access program according to the received to-be-fed back check file and a target check file prestored in the target access program;
determining the target service domain name information in the page request in a manner of determining the target service domain name information in the page request and a program tag of a target program to which a target access program belongs;
and calling the check file to be fed back corresponding to the target service domain name information from the database to determine at least one check file matched with a program label, and determining the check file to be fed back from the at least one check file according to the target service domain name.
6. A server, characterized in that the server comprises:
one or more processors;
a storage device to store one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the server-based access verification method of any of claims 1-4.
7. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a server-based access checking method according to any one of claims 1 to 4.
CN202011630029.XA 2020-12-31 2020-12-31 Access verification method and device based on server, electronic equipment and storage medium Active CN112769802B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011630029.XA CN112769802B (en) 2020-12-31 2020-12-31 Access verification method and device based on server, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011630029.XA CN112769802B (en) 2020-12-31 2020-12-31 Access verification method and device based on server, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112769802A CN112769802A (en) 2021-05-07
CN112769802B true CN112769802B (en) 2022-09-30

Family

ID=75699501

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011630029.XA Active CN112769802B (en) 2020-12-31 2020-12-31 Access verification method and device based on server, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112769802B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113296981A (en) * 2021-05-25 2021-08-24 建信金融科技有限责任公司 Data processing method and device, electronic equipment and storage medium
CN113778956B (en) * 2021-09-15 2024-09-20 京东科技信息技术有限公司 Resource processing method, device, electronic equipment and computer readable medium
CN113806111A (en) * 2021-09-18 2021-12-17 平安普惠企业管理有限公司 Front-end and back-end interactive interface scheduling optimization method, device, equipment and storage medium
CN114003844A (en) * 2021-11-03 2022-02-01 中国银行股份有限公司 Page resource loading method and system
CN115758300B (en) * 2022-11-28 2023-08-01 北京淘友天下技术有限公司 Data processing method, device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108319575A (en) * 2018-01-30 2018-07-24 百度在线网络技术(北京)有限公司 A kind of method of calibration of page assembly, device, server and storage medium
CN109150930A (en) * 2017-06-15 2019-01-04 北京金山云网络技术有限公司 Configuration information loading method and device, method for processing business and device
CN109284616A (en) * 2018-08-17 2019-01-29 优视科技有限公司 Data access and data distributing method, device, equipment and storage medium

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004208102A (en) * 2002-12-26 2004-07-22 Nec Soft Ltd Domain name solution processing method
US9137094B1 (en) * 2012-12-12 2015-09-15 Google Inc. Method for setting DNS records
CN104243627A (en) * 2014-08-29 2014-12-24 华为技术有限公司 Domain name resolution method, device and system
US20160164826A1 (en) * 2014-12-04 2016-06-09 Cisco Technology, Inc. Policy Implementation at a Network Element based on Data from an Authoritative Source
CN107846483A (en) * 2017-11-10 2018-03-27 北京粉笔蓝天科技有限公司 A kind of domain name analytic method, system and server
CN110399578B (en) * 2018-04-17 2023-07-14 腾讯科技(深圳)有限公司 Page access method and device
CN109088764B (en) * 2018-08-15 2022-04-22 郑州悉知信息科技股份有限公司 Access request processing method and related equipment
CN109040134B (en) * 2018-09-28 2021-03-16 武汉斗鱼网络科技有限公司 Information encryption design method and related device
CN109862074B (en) * 2018-12-29 2022-03-25 医渡云(北京)技术有限公司 Data acquisition method and device, readable medium and electronic equipment
CN110602270B (en) * 2019-11-01 2022-10-14 北京博睿宏远数据科技股份有限公司 Domain name resolution method and device, computer equipment and storage medium
CN112134968A (en) * 2020-09-29 2020-12-25 平安普惠企业管理有限公司 Domain name access method and device, electronic equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109150930A (en) * 2017-06-15 2019-01-04 北京金山云网络技术有限公司 Configuration information loading method and device, method for processing business and device
CN108319575A (en) * 2018-01-30 2018-07-24 百度在线网络技术(北京)有限公司 A kind of method of calibration of page assembly, device, server and storage medium
CN109284616A (en) * 2018-08-17 2019-01-29 优视科技有限公司 Data access and data distributing method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN112769802A (en) 2021-05-07

Similar Documents

Publication Publication Date Title
CN112769802B (en) Access verification method and device based on server, electronic equipment and storage medium
CN112491602B (en) Behavior data monitoring method and device, computer equipment and medium
CN109558525B (en) Test data set generation method, device, equipment and storage medium
CN110895472A (en) Method and device for identifying service change
CN112860706A (en) Service processing method, device, equipment and storage medium
CN113626223A (en) Interface calling method and device
CN114253864A (en) Service testing method and device, electronic equipment and storage medium
CN104298675A (en) Method and device for cache management
CN110659210A (en) Information acquisition method and device, electronic equipment and storage medium
CN110716804A (en) Method and device for automatically deleting useless resources, storage medium and electronic equipment
US11146571B2 (en) Data transmission method, apparatus, terminal device, and medium
CN114020689A (en) Data processing method, data processing device, electronic device, and storage medium
CN111026613B (en) Log processing method and device
CN112818204A (en) Service processing method, device, equipment and storage medium
CN113569538A (en) Document generation method and device, storage medium and electronic equipment
WO2023151397A1 (en) Application program deployment method and apparatus, device, and medium
CN115242861B (en) RTE layer communication data mapping configuration file generation method and system, computer readable storage medium and electronic equipment
CN113806416B (en) Method and device for realizing real-time data service and electronic equipment
CN114253642B (en) System information processing method, device, electronic equipment and medium
CN112416875B (en) Log management method, device, computer equipment and storage medium
CN116627778A (en) Service system performance monitoring method and device, computer equipment and storage medium
CN110471708B (en) Method and device for acquiring configuration items based on reusable components
CN110753136B (en) Domain name resolution method, device, equipment and storage medium
CN113590564A (en) Data storage method and device, electronic equipment and storage medium
CN112860538A (en) Method and device for performing interface regression test based on online log

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant