Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A user data verification method and system

A technology of user data and verification method, applied in the field of data verification, can solve problems such as user economic losses, information verification loopholes, malicious server attacks, etc., to improve security and reliability, avoid unnecessary losses, and ensure user data security Effect

Active Publication Date: 2019-04-30
福建省天奕网络科技有限公司
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above-mentioned patents have improved the security of data to a certain extent, but there are still the following deficiencies: Since the above-mentioned uses the year, month, and day as variable private keys, there are loopholes in information verification, and others can send them by intercepting packets. Capture the data, and then simulate and send the same data packets to attack, because the time verification only verifies to the date, so as long as it is today’s packet, it can be sent, and the verification can pass, which will cause hackers to be able to Malicious attacks on the server, causing economic losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A user data verification method and system
  • A user data verification method and system
  • A user data verification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] Please refer to figure 1 , Embodiment 1 of the present invention is:

[0070] A method for verifying user data provided by the present invention includes the following steps:

[0071] S1: Receive the information sent by the client, the information includes user data, first time stamp and first Sign data, and the first Sign data is paired by the client using a fixed private key to the user data and the first time The stamp is obtained by MD5 encryption, and the first timestamp is the timestamp corresponding to the client when encrypted with a fixed private key;

[0072] S2: Encrypt the user data and the first timestamp in the information with the pre-stored fixed private key through MD5 to obtain the second Sign data, determine whether the second Sign data is consistent with the first Sign data, if not, then Discard the information; otherwise, execute step S3;

[0073] "Judge whether the second Sign data is consistent with the first Sign data" is specifical...

Embodiment 2

[0084] A method for verifying user data provided by the present invention includes the following steps:

[0085] Encrypt the user data and the current first timestamp with a fixed key to obtain the first Sign data;

[0086] According to the user data, the first timestamp and the first Sign data, the information in JSON format is obtained;

[0087] And send the information to the server through the HTTP protocol, so that the server encrypts the user data and the first timestamp in the information with the fixed private key stored in advance by the server to obtain the second Sign data, and judges the second Whether the Sign data is consistent with the first Sign data, if not, then discard the information; otherwise: determine whether the time difference between the second timestamp of the server corresponding to receiving the information and the first timestamp is greater than the preset first time value , if so, then discard the information; otherwise, judge whether t...

Embodiment 3

[0089] The present invention also provides a user data signature verification system, including a client and a server. The client includes a first memory, a first processor, and a system stored in the first memory and capable of running on the first processor. A first computer program, the server includes a second memory, a second processor, and a second computer program stored on the second memory and operable on the second processor, and the first processor executes the The first computer program implements the following steps:

[0090] Encrypt the user data and the current first timestamp with a fixed key to obtain the first Sign data;

[0091] According to the user data, the first timestamp and the first Sign data, the information in JSON format is obtained;

[0092] And send the information to the server through the HTTP protocol, so that the server encrypts the user data and the first timestamp in the information with the fixed private key stored in advance by th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a user data verification method and system. The timestamp of the client is used as a variable private key to encrypt the user data during encryption; the safety and the reliability of the first Sign data are improved; the problem that user data is tampered, the server side cannot be accurately verified; and economic loss of a user is caused can be solved. meanwhile, the server receives the first Sign data of the information, judges whether information corresponding to the first Sign data is processed or not according to the list; If processing has been performed, the information is directly abandoned, meanwhile, the time difference between the second timestamp and the first timestamp of the server is within a preset first time value range when the information is received; By means of the method, the problem that the server is attacked maliciously for multiple times within a period of time can be prevented, the data verification reliability is improved, the user data is safer, and unnecessary loss is avoided.

Description

technical field [0001] The invention relates to the technical field of data verification, in particular to a user data verification method and system. Background technique [0002] With the rapid development of Internet technology, data interaction through the Internet has become a common business requirement, and Internet users will also appear diverse, random, and uncontrollable. For the design of an Internet server, how to determine the user's sending The data has not been tampered with, which is very important for the user's identity security and data security; and the data transmission process is often attacked by hackers, and the data is maliciously tampered with, causing huge losses to the user; [0003] The Chinese patent application number: 201610919867.6 discloses a time-sensitive user data signature verification method, as follows: 1. The client sends an HTTP request, and the format of the requested parameter is <key> = <value>, which includes the par...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/06
CPCH04L9/0643H04L9/3239H04L9/3297H04L63/123G06F21/602H04L2463/121
Inventor 刘德建陈辉东陈宏展
Owner 福建省天奕网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products