Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Invitation code generation method and device, invitation code verification method and device, electronic device and storage medium

An invitation code and code generation technology, applied in the field of information processing, can solve the problems of reduced system security and stability, reduced query verification efficiency, and easy cracking

Active Publication Date: 2019-08-16
BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the current problem is that the traditional invitation code is transmitted and recorded in plain text, which is easy to be cracked, resulting in a decrease in system security and stability
In addition, since the invitation code can only be verified by querying the database during the entire verification process, when a large number of invitation codes are verified at the same time, the system will generate a large number of data queries, which will reduce the efficiency of query verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Invitation code generation method and device, invitation code verification method and device, electronic device and storage medium
  • Invitation code generation method and device, invitation code verification method and device, electronic device and storage medium
  • Invitation code generation method and device, invitation code verification method and device, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Embodiments of the present application are described in detail below, examples of which are shown in the accompanying drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present application, and should not be construed as limiting the present application.

[0044] The following describes the invitation code generation method, verification method, device, electronic device, and computer-readable storage medium of the embodiments of the present application with reference to the accompanying drawings. Among them, the invitation code generation and verification method of the embodiment of the present application can be applied to any business event corresponding to the information processing based on the invitation code. After verifying that the invitation code informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an invitation code generation method and device, an invitation code verification method and device, an electronic device and a storage medium and the method comprises the steps: generating a character string according to a preset rule, and generating a first redundancy check code according to the character string; generating a reference characteristic value of the characterstring according to the first redundancy check code; generating an identification code which is used for uniquely representing the reference characteristic value, and storing the reference characteristic value and the identification code into a database according to a corresponding relation between the reference characteristic value and the identification code; generating a first characteristic value according to the first redundancy check code, the identification code and a preset private key; generating a second redundancy check code according to the first feature value; and generating invitation code information according to the first redundancy check code, the identification code and the second redundancy check code. Therefore, part of character strings in the invitation code are stored in the database in the form of feature values (namely ciphertext), so that the security and the stability of the system are improved, and the verification efficiency and the performance of the invitation code can be effectively improved.

Description

technical field [0001] The present application relates to the technical field of information processing, and in particular to an invitation code generation method, a verification method, a device, electronic equipment, and a computer-readable storage medium. Background technique [0002] At present, the invitation code information processing business based on string verification is extensive. For example, in order to prevent malicious registration by machines, some websites and applications require a special pass when registering—that is, the invitation code. Increase sales and use event invitation codes to attract consumers to purchase products. In related technologies, when the invitation code is issued to the consumer, the issued invitation code is usually recorded in the database in plain text, so that when it is detected that a consumer uses the invitation code, it is verified by querying the database. Whether the invitation code is legal. [0003] However, the curren...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/36
CPCG06F21/36G06F2221/2133
Inventor 高春盟
Owner BEIJING KINGSOFT INTERNET SECURITY SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products