Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Long-link internet service multi-mode security verification code technology

An Internet business and security verification code technology, which is applied in the field of multi-mode security verification codes for long-link Internet services, can solve the problems of poor security, transaction data tampering, and low transaction efficiency in long-link Internet services, so as to ensure non-tampering , the effect of ensuring correctness and enhancing security

Active Publication Date: 2021-06-15
上海帆立信息科技有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, at present, in the transaction process of the long-link Internet business, the transaction business is mainly encrypted by entering a password. Since the verification method in the Internet transaction process is relatively simple, the long-link Internet business is encrypted during the transaction process. The security is poor, there are security issues such as transaction data tampering, transaction links being bypassed, and transaction replay. At the same time, due to the unsmooth transaction process, the transaction efficiency is relatively low, and it is not convenient for large-scale promotion and application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Long-link internet service multi-mode security verification code technology
  • Long-link internet service multi-mode security verification code technology
  • Long-link internet service multi-mode security verification code technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In the actual Internet business, the implementation steps of the long-link Internet business multi-mode security verification code technology are as follows:

[0019] In the distributed micro-service scenario, the gateway is the gate of specific core business services. All forwarding background transactions need to pass through the gateway. Taking the zuul gateway as an example, the zuul gateway routes user requests. The routing process is divided into pre-routing filters (pre), routing forwarder (routing), post-routing filter (post), and error filter (error), among which the pre-routing filter uses the transaction link control mode to check whether the transaction is necessary to pre-order according to the transaction elements condition, if the matching precondition is completed, it will pass; otherwise, the current transaction will be exited abnormally.

[0020] After the routing forwarder forwards the specific core business service, the post-routing filter will use t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a long-link internet service multi-mode security verification code technology, which comprises a transaction link control mode, a graphic verification code mode and an anti-repeated submission mode, and the three modes are flexibly combined according to use scenes. At present, the scheme is widely verified in the financial industry Internet application, and has the beneficial effects that the transaction of the long-link Internet business is ensured by adopting a triple security verification technology, so that the correctness and non-tampering property of the business process, especially the long business process, are ensured to the greatest extent; and the security of the long-link internet business transaction is enhanced, the efficiency of the long-link internet business transaction is ensured, and the method is safe and practical.

Description

technical field [0001] The invention relates to the technical field of long-link Internet service security verification, in particular to the long-link Internet service multi-mode security verification code technology. Background technique [0002] With the continuous development of Internet technology and the continuous improvement of customer experience and other requirements, Internet business, especially mobile Internet business fragmentation, and business with long business processes are becoming more and more common. [0003] However, at present, in the transaction process of the long-link Internet business, the transaction business is mainly encrypted by entering a password. Since the verification method in the Internet transaction process is relatively simple, the long-link Internet business is encrypted during the transaction process. The security is poor, and there are security problems such as transaction data tampering, transaction link bypassing, transaction rep...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0807H04L63/083H04L63/12
Inventor 田华明李华胜何凯志
Owner 上海帆立信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products