Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for information authentication

A technology to be authenticated and information sent, applied in the computer field, can solve the problems of increasing the cost of real-name authentication and increasing the cost of calling the verification interface, and achieve the effects of ensuring credibility, reducing authentication costs, and reducing costs

Active Publication Date: 2021-02-09
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] If the same information to be authenticated is sent to the server of Guozhengtong multiple times, it will increase the cost of invoking the verification interface of Guozhengtong, thereby increasing the cost of real-name authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for information authentication
  • Method and device for information authentication
  • Method and device for information authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0059] figure 1 For the system architecture diagram provided for this application, see figure 1 , the system architecture includes a terminal device 11 , a cloud server 12 , multiple storage servers 13 , an authentication server 14 and an area server 15 . The authentication server may be a server used for real-name authentication of the Guozhengtong system....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a method and device for information authentication. The method includes: according to the information to be authenticated from the terminal device, determine a target server capable of storing the information to be authenticated, and send the information to be authenticated to the target server; there are N target servers One of the storage servers, N storage servers are used for distributed storage of a plurality of first information authenticated by the authentication server and the validity period information of each first information; receiving the query result sent by the target server; if the query result indicates that the target server If the information to be authenticated is stored in and the stored information to be authenticated is valid, a message that the information to be authenticated is passed is sent to the terminal device. The method and device of the present application effectively reduce the authentication cost.

Description

technical field [0001] The embodiment of the present application relates to computer technology, and in particular to a method and device for information authentication. Background technique [0002] The real-name registration of telephone users is the basic work related to national network information security and social stability. Among them, the real-name registration of telephone users needs the support of real-name authentication of the Guozhengtong system. [0003] The real-name authentication method is that the terminal device sends the information to be authenticated to the server of Guozhengtong, and the server of Guozhengtong verifies whether the information to be authenticated is true and valid, that is, the authentication process needs to call the verification interface of Guozhengtong, All common verification interfaces need to be paid. [0004] If the same information to be authenticated is sent to Guozhengtong's server multiple times, it will increase the cal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
CPCH04L9/3297H04L63/08H04L67/1097
Inventor 杨友洪张晶龙梁璠王磊原林张雨金津李娜纪欣之
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products