Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for realizing information verification, computer system and storage medium

An information verification and computer technology, applied in the field of data security, can solve problems such as low security and easy information leakage, and achieve the effect of ensuring security and reliability

Active Publication Date: 2019-11-15
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In order to solve the technical problems of low security and easy leakage of information in the implementation of information verification in related technologies, the present invention provides a method, device, computer system and computer-readable storage medium for realizing information verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing information verification, computer system and storage medium
  • Method and device for realizing information verification, computer system and storage medium
  • Method and device for realizing information verification, computer system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0051] figure 1 It is a schematic diagram of an implementation environment involved in the present invention shown according to an exemplary embodiment. In an exemplary embodiment, the information verification performed in the network by the present invention will provide security guarantee for all key information held by each terminal, so that any key information will not be leaked during the info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of block chains, and discloses a method and a device for realizing information verification, a computer system and a storage medium. The method comprises the following steps: a terminal acquires a public key corresponding to a private key held by the terminal; and the terminal sends the public key, the encrypted abstract of the verified information andthe digital signature of the encrypted abstract to a receiving end of a network access behavior so as to request the receiving end to use the public key to verify the digital signature according to the encrypted abstract, and the verified information is part of key information needing to be verified by the terminal. According to the embodiments of the invention, information verification is executed by a third party based on the blockchain technology, and any data related to the information needing to be verified except the encrypted abstract does not need to be obtained, so that the security and reliability of information verification are ensured, and only ciphertext interaction exists in the whole information verification process.

Description

[0001] This application is a divisional application of the Chinese patent application CN201810553455.4 submitted on May 31, 2018, with the title of invention "Method, system, device and computer system for realizing information verification". technical field [0002] The present invention relates to the technical field of data security, in particular to a method, device, computer system and computer-readable storage medium for realizing information verification. Background technique [0003] With the rapid development of the Internet, various business scenarios often require certain information verification before performing network access behaviors for terminals. Network access behaviors will only be performed for terminals on the premise of ensuring that the verified information is correct. [0004] The information verification carried out is the process of identifying whether the terminal that triggers the network access behavior has the authority. For the receiving end co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/06
CPCH04L9/0643H04L9/321H04L9/3239H04L9/3247H04L9/3297H04L63/08H04L63/10H04L63/12
Inventor 郭锐李茂材王宗友屠海涛孔利周开班杨常青王楠丁勇时一防
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products