Information verification method

A technology for information verification and registration information, which is applied in the field of information verification and can solve problems such as inconvenience and high cost

Inactive Publication Date: 2017-05-10
林锦吾 +4
View PDF10 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Although voice verification has appeared in recent years, it is necessary to broadcast a voice verification code to the user every time they make a call, and the user needs to remember the verification code, which is not only inconvenient, but also has the problem of high cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information verification method
  • Information verification method
  • Information verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The present invention will be further described below in conjunction with the embodiments shown in the accompanying drawings.

[0070] The present invention proposes a kind of information verification method, and this method comprises the following steps:

[0071] (1) The client sends user registration information to the server, requesting to verify the user's identity;

[0072] The above-mentioned server is used to verify the identity of the user, and after the identity of the user is successfully verified, according to the registration information of the user, a key container file corresponding to the client is generated.

[0073] (2) After receiving the message from the server indicating that the user identity is successfully verified, the client downloads the above key container file from the server or updates the original key container file to the above key container file. The key container file contains the information to be matched, and the public-private key pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention presents an information verification method including the following steps: (1) a client sends user registration information to a server to request for user identity verification, the server is used for verifying user identity, and the server generates a key container file corresponding to the client according to the user registration information after verification succeeds; (2) the client downloads the key container file from the server or gets the key container file by updating, wherein the key container file contains to-be-matched information and the public-private key pair of asymmetric keys or symmetric keys, and the information is bound to the key container file for client authentication; and (3) after actual information in the client is matched with the to-be-matched information, when the application service of the client requires user identity authentication, the client and the server conduct two-way authentication based on the asymmetric keys or one-way authentication based on the symmetric keys. The process of verification is simplified greatly and the cost of verification cost is lowered while the reliability and safety of verification are improved greatly.

Description

technical field [0001] The invention belongs to the technical field of information security and relates to an information verification technology. Background technique [0002] With the rapid development of mobile communication and Internet technology, there are more and more applications for personal identity authentication in banking, securities, business, trade, office, education and other industries, and the security of personal identity authentication has also attracted extensive attention. . At present, authentication technologies such as dynamic tokens, USB shields, and fingerprints are commonly used in the Internet field. However, these technologies generally require users to carry certified hardware products with them, which is very inconvenient. SMS verification is relatively simple and has a good user experience, but each verification requires a text message to send a plain text verification code to the user, which not only has high verification costs, but also ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/062H04L63/08H04L63/0869
Inventor 林锦吾董宇刘虎喻斌李振洪
Owner 林锦吾
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products