Signature authentication method, related device, and computer-readable storage medium

A signature authentication and signature verification technology, applied in the computer field, can solve the problems that terminal privacy and security cannot be effectively guaranteed, identity information and other private information are easily leaked, and achieve the effect of ensuring privacy and security

Inactive Publication Date: 2018-07-17
SHENZHEN GIONEE COMM EQUIP
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above method can easily trace the terminal through the signature, the user's identity information an

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature authentication method, related device, and computer-readable storage medium
  • Signature authentication method, related device, and computer-readable storage medium
  • Signature authentication method, related device, and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0040] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0041] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a signature authentication method, a related device, and a computer-readable storage medium, wherein the method includes: receiving to-be-signed data sent bya first terminal, wherein the first terminal is a terminal that initiates a signature verification behavior; determining a second terminal from a group terminal set according to a preset signature rule, and sending the to-be-signed data to the second terminal; receiving the signature verification data sent by the second terminal, wherein the signature verification data is the to-be-signed data signed by second terminal according to the private key of the second terminal; sending the signature verification data to the first terminal so that the first terminal sends the signature verification data to a signature verification server for signature verification. The signature authentication method can effectively protect the privacy of the terminal.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a signature verification method, related equipment and a computer-readable storage medium. Background technique [0002] With the continuous development of communication technology, mobile payment has been more and more widely used. As the core of mobile payment, the identity verification system can effectively verify the identity of users, which is a favorable guarantee for the security of mobile payment. [0003] At present, commonly used identity verification systems include FIDD (Fast Identity Online), IFAA (Internet Finance Authentication Alliance), etc. They use a built-in private key in the terminal and store the corresponding public key in the server. When identifying the identity, use the terminal to sign the data to be signed with the private key, and use the public key to verify the signature through the server to confirm the user's identity. [0004] Howeve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L9/3255
Inventor 曲大伟王三新
Owner SHENZHEN GIONEE COMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products