Unlock instant, AI-driven research and patent intelligence for your innovation.

Signature verification method, terminal and system

A signature verification and terminal technology, applied in the field of network security, can solve the problems of low security and difficulty in ensuring the security of data interaction, and achieve the effect of improving security

Inactive Publication Date: 2017-09-12
SHENZHEN GIONEE COMM EQUIP
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the risk of the key being leaked or cracked violently, the security of the above-mentioned API interface signature verification process is low, and it is difficult to guarantee the security of data interaction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature verification method, terminal and system
  • Signature verification method, terminal and system
  • Signature verification method, terminal and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.

[0037] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0038] It should also be understood that the terminology used in the description of the present invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the present invention. As used in this specification and the appended claims, the singular forms "a", "an" and "the" are intended to include plural referents unless the context clearly dictates...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a signature verification method, terminal and system, wherein the method includes: obtaining the application program interface request parameter and the current timestamp; obtaining the first signature value according to the application program interface request parameter and the current timestamp; The application program interface request parameters, the current timestamp and the first signature value construct the target request; send the target request to the interface provider, so that the interface provider generates the second signature value according to the target request; receive the verification result sent by the interface provider , the verification result is obtained by comparing the first signature value with the second signature value by the interface provider. The embodiment of the present invention first obtains the first signature value and the second signature value based on the application program interface request parameters and the current time stamp, and then obtains the verification result by comparing the first signature value and the second signature value, which improves signature verification and data verification. Interaction security.

Description

technical field [0001] The invention relates to the field of network security, in particular to a signature verification method, terminal and system. Background technique [0002] When an interface caller and an interface provider perform data interaction, in order to ensure data security, it is generally necessary to perform signature verification on an application programming interface (Application Programming Interface, API). At present, the signature verification of the API interface needs to use the key agreed between the interface caller and the interface provider. Since the key has the risk of being leaked or cracked by force, the security of the above API interface signature verification process is low, and it is difficult to guarantee the security of data interaction. Contents of the invention [0003] Embodiments of the present invention provide a signature verification method, terminal and system, so as to improve the security of signature verification and data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L63/0807H04L9/3247H04L63/12
Inventor 黄浩坚
Owner SHENZHEN GIONEE COMM EQUIP