Verification method, device and storage medium

A verification method and a technology of a verification device, which are applied in the field of information security, can solve problems such as excessive work pressure on the server and affect the normal operation of the server, and achieve the effect of increasing the attack cost, reducing the workload, and ensuring normal operation

Active Publication Date: 2020-08-11
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of realizing the present invention, the inventor found that the above-mentioned related technologies have at least the following problems: the server also needs to use the slow hash algorithm for calculation, and the workload will bring excessive work pressure to the server, affecting the normal operation of the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method, device and storage medium
  • Verification method, device and storage medium
  • Verification method, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, rather than all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0039] Before describing the embodiments of the present invention in detail, the following concepts are first explained:

[0040] Proof Of Work (POW for short) is used to confirm that a certain amount of work has been done. The proof-of-work algorithm requires the initiator to perform a certain amount of calculations to provide data that meets certain conditions. The calculation process consumes a certain amount of time and workload of the initiator, whi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a verification method and device and a storage medium, and belongs to the field of information security. The method comprises the steps of obtaining a verification task, wherein the verification task comprises a preset algorithm and a preset condition; Determining at least one piece of verification data, and calculating the determined verification data according to a preset algorithm to obtain a calculation result corresponding to the determined verification data; And when a calculation result corresponding to the currently determined check data satisfies a preset condition, sending the currently determined check data to a server, calculating the currently determined check data by the server according to a preset algorithm; and when the calculationresult obtained by calculation satisfies the preset condition, determining that the verification is passed. According to the embodiment of the invention, under the condition that the security is ensured, the server only needs to calculate the verification data which are sent by the terminal and meet the verification task, and the verification data which do not meet the verification task do not need to be calculated, so that the workload of the server is reduced, and the working pressure of the server is reduced.

Description

Technical field [0001] The embodiments of the present invention relate to the field of information security, in particular to a verification method, device and storage medium. Background technique [0002] With the rapid development of Internet technology, people’s lives are flooded with a variety of information, such as online shopping order information, online banking record information, etc. This information involves the privacy of users and even the security of users’ property. Considering that many malicious users will use automata to impersonate users to perform operations and steal user information during the operation. Therefore, in order to ensure information security, when a user requests to perform certain operations, it is necessary to verify whether the user is a real user or an automaton. . [0003] The currently commonly used verification method is slow hash verification. When a user requests the server to perform certain operations, the server verifies the user's v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 黄希彤
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products