Verification method and system

A verification method and verification algorithm technology, applied in the field of communication, can solve problems such as difficult verification of pseudo-clients

Inactive Publication Date: 2017-02-22
WUHAN DOUYU NETWORK TECH CO LTD
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problems existing in the prior art, the embodiment of the present invention provides a verification method and system for solving the technical problem in the prior art that it is difficult to verify a fake client when verifying the client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and system
  • Verification method and system
  • Verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] Before introducing the method embodiment of the present invention, first introduce the verification system architecture in the embodiment of the present invention, such as figure 1 As shown, the system includes: a client 101 and a server 102 . server 102 as figure 1 As shown, communication connections can be realized with N clients 101, and N is a natural number, wherein, the communication mode between the clients 101 and the server 102 can be wired communication or wireless communication, and the client 101 can specifically be A smart phone may also be a tablet computer, or a smart wearable device, etc., which are not limited in this application.

[0059] like figure 2 As shown, the data interaction process between the client 101 and the server 102 is as follows:

[0060] S1. The client sends a first acquisition request to the server through the first communication channel.

[0061] In this step, when verifying the legitimacy of the client, the client needs to sen...

Embodiment 2

[0083] This embodiment provides a verification method, which is applied on the server side, see image 3 , the method includes:

[0084] S301. The server receives a first acquisition request through a first communication channel, and sends first verification data based on the first acquisition request.

[0085] In this step, when verifying the legitimacy of the client, the client needs to send a first acquisition request to the server through the first communication channel to obtain verification data; wherein, the first communication channel may be based on the HTTP protocol, or Based on the TCP protocol, or the communication channel established based on the UDT protocol, or other protocols that can communicate between the client and the server, etc.

[0086] When the server receives the first acquisition request through the first communication channel, the server sends the first verification data to the client based on the first acquisition request. Wherein, the first veri...

Embodiment 3

[0107] This embodiment also provides a verification method, which is applied on the client side, such as Figure 4 As shown, the method includes:

[0108] S401. The client sends a first acquisition request through a first communication channel, so that the server can return first verification data based on the first acquisition request.

[0109] In this step, when verifying the legitimacy of the client, the client needs to send a first acquisition request to the server through the first communication channel to obtain verification data; wherein, the first communication channel may be based on the HTTP protocol, or Based on the TCP protocol, or the communication channel established based on the UDT protocol, or other protocols that can communicate between the client and the server, etc.

[0110] After the server receives the first acquisition request, it will send the first verification data to the client through the first communication channel based on the first acquisition r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a verification method and system. The method comprises the following steps: receiving a first obtaining request by a server through a first communication channel, sending first verification data on the basis of the first obtaining request; receiving a first verification result through a second communication channel, wherein the first verification result is obtained by using pre-constructed verification algorithm to calculate the first verification data; judging whether the first verification result is correct, if the first verification result is correct, sending first confirmation information through the second communication channel, wherein the first communication channel and the second communication channel are established according to different communication protocols; and the verification algorithm contains logic of operation, circulation, skip and address change. In this way, the complexity of the verification algorithm is improved, HACK does not find out a code of the corresponding algorithm from the network easily, the validity of the client can be verified more accurately, and in the verification process, the safety of the verification process is further improved by using two different communication channels to perform the data interaction.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a verification method and system. Background technique [0002] At present, for an application system with account login, generally the client first registers, and then uses the account name and password for login verification after registration. For systems that are generally not particularly important, the above methods can solve the verification process of the client and the server. For some more important systems, only using an account to log in to the system is not enough to ensure the legitimacy of the client, so an additional protocol will be added between the client and the server to verify the legitimacy of a client. [0003] The practice in the prior art is to use an asymmetric encryption algorithm between the client and the server to verify the legitimacy of the client. Currently, the asymmetric encryption algorithms are open and open source, and it ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/18H04L63/0815
Inventor 周志刚
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products