Unlock instant, AI-driven research and patent intelligence for your innovation.

An identity verification method and device

An identity verification method and an identity verification technology, which are applied in the field of identity verification methods and devices, can solve the problems of easy leakage of account numbers and passwords, and achieve the effects of not easily leaking and improving security.

Active Publication Date: 2021-07-20
BEIJING QIYI CENTURY SCI & TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The account number and password of the copyright demander may be easily leaked. Therefore, there is a security risk when using the account number and password for identity verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity verification method and device
  • An identity verification method and device
  • An identity verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096] The technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.

[0097] In order to improve the security of identity verification, the embodiments of the present invention provide an identity verification method, device, electronic equipment, and computer-readable storage medium.

[0098] First, an application scenario of an identity verification method provided by an embodiment of the present invention is described. The solution provided by the embodiment of the present invention is applied in a scenario where the first terminal needs to verify the identity of the second terminal. For example, an application scenario may be: the first terminal is the copyright owner, and the second terminal is the copyright demander. When the second terminal acquires data resources from the first terminal, the first terminal needs to first verify whether the identity of the first te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present invention provides an identity verification method and device, and the method applied to a first terminal includes: when it is determined that identity verification needs to be performed on a second terminal, generating seed data and sending the seed data to the second terminal; receiving the signature data sent by the second terminal, wherein the signature data is: the data obtained after the second terminal digitally signs the seed data with a private key; The public key of the data; if it exists, it is determined that the second terminal has passed the identity verification. Applying the solutions provided by the embodiments of the present invention can improve the security of identity verification.

Description

technical field [0001] The invention relates to the technical field of data transmission, in particular to an identity verification method and device. Background technique [0002] With the rapid development of the Internet, the dissemination and use of copyrighted data resources have become increasingly frequent, for example, data resources such as video and audio. [0003] In order to reduce the risk of data leakage during the dissemination of the above-mentioned data resources, the copyright owner of the data resources generally authenticates the copyright requester before transmitting the data resources to the copyright requester, and only transmits the data resource to the copyright requester after the authentication is passed. Copyright demand side. [0004] In the prior art, when the copyright owner authenticates the copyright demander, he generally authenticates the copyright demander through an account number and a password. [0005] However, the inventor found in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3247H04L63/0442H04L63/08H04L2463/103
Inventor 叶权吴杰珂
Owner BEIJING QIYI CENTURY SCI & TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More