Unlock instant, AI-driven research and patent intelligence for your innovation.

Safe operation legality verification method and device

A legality verification and safe operation technology, which is applied in the field of safe operation legality verification methods and devices, can solve the problems of not being able to guarantee the legal identity and verification of users

Active Publication Date: 2018-11-20
BEIJING SENSESHIELD TECH
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on the above two reasons, it can be seen that in this technical field, digital signatures or second channel verification methods cannot guarantee the verification of the user's legal identity.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe operation legality verification method and device
  • Safe operation legality verification method and device
  • Safe operation legality verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] figure 2 Shown is a logical composition block diagram of the security operation legality verification device of this embodiment, as figure 2 As shown, a security operation legality verification device provided by Embodiment 1 of the present invention is used as a first electronic device capable of authenticating the legal identity of a client user in a network environment, and the device includes:

[0064] A communication interface 220, configured to receive a security operation command sent by the client to the first electronic device 210;

[0065] The safety operation module 270 is used to respond to the safety operation command, execute the safety operation and save the result data to the data storage module 240; and generate verification information according to the safety operation order;

[0066] A verification prompt module 260, configured to prompt the user to verify the verification information through the first electronic device 210;

[0067] The main proc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety operation legality verifying method. The safety operation legality verifying method is applied to a first electronic device, and the first electronic device can verify the legal identity of a client side user in a network environment. The method comprises the steps that S1, the first electronic device receives a safety operation command of a client side; S2, the first electronic device executes safety operation corresponding to the safety operation command and stores result data; S3, the first electronic device generates verification information according to the safety operation command; S4, the first electronic device carries out first verifying operation according to the verification information, if verification succeeds, the first electronic device sends the result data of the safety operation to the client side, and otherwise, the first electronic device generates a canceling code and returns the canceling code to the client side. The invention further discloses a safety operation legality verifying device.

Description

technical field [0001] The invention relates to the field of computer and communication security, in particular to a method and device for verifying the legality of a security operation. Background technique [0002] In online transactions, it is necessary to ensure the security of the server, communication channel, and client. All three are indispensable. If any one of them is unsafe, secure transactions cannot be realized. From the perspective of the client, ensuring that the user of the client has a legal identity is the first factor that needs to be considered. [0003] In the prior art, the methods for authenticating the legal identity of the client user mainly include: using a smart password key (USB Key), which contains a cryptographic algorithm private key representing the identity of the user. When it is necessary to authenticate the identity of the user, Use this private key to make a digital signature, and the server verifies the signature to verify the legal ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0853H04L63/14
Inventor 孙吉平刘跃峰
Owner BEIJING SENSESHIELD TECH