Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for verifying user data

A technology of user data and verification method, applied in the field of data verification, can solve problems such as information verification loopholes, malicious server attacks, and user economic losses, so as to improve safety and reliability, avoid unnecessary losses, and ensure user data security Effect

Active Publication Date: 2021-12-28
福建省天奕网络科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above-mentioned patents have improved the security of data to a certain extent, but there are still the following deficiencies: Since the above-mentioned uses the year, month, and day as variable private keys, there are loopholes in information verification, and others can send them by intercepting packets. Capture the data, and then simulate and send the same data packets to attack, because the time verification only verifies to the date, so as long as it is today’s packet, it can be sent, and the verification can pass, which will cause hackers to be able to Malicious attacks on the server, causing economic losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for verifying user data
  • Method and system for verifying user data
  • Method and system for verifying user data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0069] Please refer to figure 1 , Embodiment 1 of the present invention is:

[0070] A method for verifying user data provided by the present invention includes the following steps:

[0071] S1: Receive the information sent by the client, the information includes user data, first time stamp and first Sign data, and the first Sign data is paired by the client using a fixed private key to the user data and the first time The stamp is obtained by MD5 encryption, and the first timestamp is the timestamp corresponding to the client when encrypted with a fixed private key;

[0072] S2: Encrypt the user data and the first timestamp in the information with the pre-stored fixed private key through MD5 to obtain the second Sign data, determine whether the second Sign data is consistent with the first Sign data, if not, then Discard the information; otherwise, execute step S3;

[0073] "Judge whether the second Sign data is consistent with the first Sign data" is specifical...

Embodiment 2

[0084] A method for verifying user data provided by the present invention includes the following steps:

[0085] Encrypt the user data and the current first timestamp with a fixed key to obtain the first Sign data;

[0086] According to the user data, the first timestamp and the first Sign data, the information in JSON format is obtained;

[0087] And send the information to the server through the HTTP protocol, so that the server encrypts the user data and the first timestamp in the information with the fixed private key stored in advance by the server to obtain the second Sign data, and judges the second Whether the Sign data is consistent with the first Sign data, if not, then discard the information; otherwise: determine whether the time difference between the second timestamp of the server corresponding to receiving the information and the first timestamp is greater than the preset first time value , if so, then discard the information; otherwise, judge whether t...

Embodiment 3

[0089] The present invention also provides a user data signature verification system, including a client and a server. The client includes a first memory, a first processor, and a system stored in the first memory and capable of running on the first processor. A first computer program, the server includes a second memory, a second processor, and a second computer program stored on the second memory and operable on the second processor, and the first processor executes the The first computer program implements the following steps:

[0090] Encrypt the user data and the current first timestamp with a fixed key to obtain the first Sign data;

[0091] According to the user data, the first timestamp and the first Sign data, the information in JSON format is obtained;

[0092] And send the information to the server through the HTTP protocol, so that the server encrypts the user data and the first timestamp in the information with the fixed private key stored in advance by th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and system for verifying user data, which encrypts user data according to the time stamp of the client during encryption as a variable private key, improves the security and reliability of the first Sign data, and prevents user data from being tampered with. The server cannot verify accurately, causing economic loss to the user. At the same time, the server judges whether the information corresponding to the first Sign data has been processed according to the list of the first Sign data received. If it has been processed, it directly discards the information, and at the same time, according to the time difference between the second timestamp and the first timestamp of the server when receiving the information is within the preset first time value range, the information will pass the verification, otherwise the information will be discarded, and the above method can Prevent the server from being attacked by multiple malicious attacks within a period of time, improve the reliability of data verification, make user data more secure, and avoid unnecessary losses.

Description

technical field [0001] The invention relates to the technical field of data verification, in particular to a user data verification method and system. Background technique [0002] With the rapid development of Internet technology, data interaction through the Internet has become a common business need, and Internet users will also appear diverse, random, and uncontrollable. For the design of an Internet server, how to determine the user's sending The data has not been tampered with, which is very important for the user's identity security and data security; and the data transmission process is often attacked by hackers, and the data is maliciously tampered with, causing huge losses to the user; [0003] The Chinese patent application number: 201610919867.6 discloses a time-sensitive user data signature verification method, as follows: 1. The client sends an HTTP request, and the format of the requested parameter is <key> = <value>, which includes the parameter ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/06
CPCH04L9/0643H04L9/3239H04L9/3297H04L63/123G06F21/602H04L2463/121
Inventor 刘德建陈辉东陈宏展
Owner 福建省天奕网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products