Unlock instant, AI-driven research and patent intelligence for your innovation.

Data verification method and terminal equipment

A technology for data verification and terminal equipment, applied in user identity/authority verification, transmission systems, electrical components, etc., can solve the problems of data security threats, forged certificates and signatures, etc., to achieve the effect of improving security

Active Publication Date: 2021-12-03
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the embodiment of the present invention provides a data verification method, a terminal device and a computer-readable storage medium to solve the problem in the prior art that the certificate and the signature may be forged at the same time, resulting in threats to data security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data verification method and terminal equipment
  • Data verification method and terminal equipment
  • Data verification method and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In the following description, specific details such as specific system structures and technologies are presented for the purpose of illustration rather than limitation, so as to thoroughly understand the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the invention may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.

[0025] In order to illustrate the technical solutions of the present invention, specific examples are used below to illustrate.

[0026] see figure 1 , figure 1 It is a flow chart of the data verification method provided by Embodiment 1 of the present invention. The execution subject of the data verification method in this embodiment is the terminal. Terminals include, but are not limited to, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention is applicable to the technical field of computer application, and provides a data verification method, a terminal device and a computer-readable storage medium, including: by obtaining a node certificate of a storage node, verifying whether the node certificate is issued by a preset trusted root certificate; If the node certificate is issued by the trusted root certificate, then obtain the public key of the storage node, and verify whether the public key of the storage node is correct according to the pre-stored node ID; if the public key of the storage node is correct, then according to The public key of the storage node verifies the signature in the storage data stored by the storage node, and if the signature verification passes, it means that the storage data is correct. By not only verifying the node certificate and signature of the storage node, but also verifying the correctness of the stored data in the storage node, the security of the node storage data in the peer-to-peer network is improved.

Description

technical field [0001] The invention belongs to the field of computer application technology, and in particular relates to a data verification method, terminal equipment and a computer-readable storage medium. Background technique [0002] P2P storage is a kind of network storage based on P2P (Peer-to-Peer, peer-to-peer network) technology, which organizes many machines in a peer-to-peer manner to provide users with super-large-capacity data storage services. Network technology on the Internet. It is the product of the combination of computer network and distributed system. The core idea is to remove the concept of the central server and build the Internet on the basis of peer-to-peer interconnection to achieve the greatest degree of resource sharing. However, in many existing applications, certificates are used to verify signatures and realize identity authentication. However, it is still possible for the certificate and the signature to be forged at the same time, result...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/32
Inventor 雷琼郑映锋
Owner PING AN TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More