Unlock instant, AI-driven research and patent intelligence for your innovation.

Data verification method, device, storage medium and computer equipment

A data verification and to-be-verified technology, applied in the computer field, can solve problems such as poor operability and failure of account security verification.

Active Publication Date: 2021-07-06
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Based on this, it is necessary to provide a data verification method, device, computer-readable storage medium and computer equipment for the technical problems that the user forgets the answer to the original secret security question, which leads to account security verification failure and poor operability.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data verification method, device, storage medium and computer equipment
  • Data verification method, device, storage medium and computer equipment
  • Data verification method, device, storage medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0089] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0090] figure 1 It is an application environment diagram of the data verification method in one embodiment. refer to figure 1 , the data verification method is applied to the data verification system. The data verification system includes a terminal 110, a security center platform 120 and a blockchain network. The blockchain network includes a plurality of blockchain nodes 130, and each blockchain node can transmit data in pairs. The terminal 110 and the security center platform 120 are connected through the network, and the security center platform 120 and the block c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to a data verification method, device, computer-readable storage medium, and computer equipment. The method includes: obtaining a data verification request; the data verification request carries target data to be verified, and by corresponding to the target data The user signature obtained by encrypting the user private key; find the user public key associated with the target data from the blockchain network; decrypt the user signature through the found user public key to obtain decrypted data; when the decrypted data When matching the target data to be verified, broadcast the target data and user signature in the block chain network for consensus operation; after the target data and user signature pass the consensus, determine the target data approved. The solution provided by this application can realize safe and reliable verification of target data, and has high operability.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a data verification method, device, storage medium and computer equipment. Background technique [0002] With the development of computer technology, there are more and more application programs with different functions. The user can log in to the corresponding application program through the user account and account password to realize related functions. However, once the user forgets the account password, he cannot log in to the corresponding application program through the user account. In this case, the user can initiate account security verification, and the user account and corresponding account password can be retrieved after the verification is passed. For the account security verification system, the most concerned is the security of the user account and account password. It must be ensured that the account security verification initiated by the account owne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/602G06F21/604
Inventor 赖俊凡尤飞
Owner TENCENT TECH (SHENZHEN) CO LTD