Supercharge Your Innovation With Domain-Expert AI Agents!

Processing method, device, electronic device, and computer-readable medium of verification information

A technology for verifying information and processing methods, applied in computer security devices, computing, electrical digital data processing and other directions, can solve problems such as low security, and achieve the effect of improving security

Active Publication Date: 2022-03-18
BEIJING BYTEDANCE NETWORK TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, when the accessed terminal is accessed by multiple different access-initiating terminals, the same secret key is usually used to encrypt the verification information, resulting in low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method, device, electronic device, and computer-readable medium of verification information
  • Processing method, device, electronic device, and computer-readable medium of verification information
  • Processing method, device, electronic device, and computer-readable medium of verification information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although certain embodiments of the present disclosure are shown in the drawings, it should be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein; A more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the present disclosure are for exemplary purposes only, and are not intended to limit the protection scope of the present disclosure.

[0050] It should be understood that the various steps described in the method implementations of the present disclosure may be executed in different orders, and / or executed in parallel. Additionally, method embodiments may include additional steps and / or omit performing illustrated steps. The scope of the present disclosure is not limited in this regard. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosure provides a verification information processing method, device, electronic equipment, and computer-readable storage medium, and relates to the technical field of information processing. The method includes: receiving an access request sent by an access initiating terminal, obtaining verification information of the access initiating terminal based on the access request; converting the verification information according to a preset conversion rule to obtain secret key information, and converting the verification information to The secret key information is sent to the accessed terminal; wherein, the visited terminal is used to perform reverse conversion on the secret key information according to the reverse conversion rule corresponding to the conversion rule, and check the verification information obtained by the reverse conversion Checking is performed to allow the access initiating terminal to perform access when the check information meets a preset condition. The method for processing verification information provided by the present disclosure can improve security.

Description

technical field [0001] The present disclosure relates to the technical field of information processing, and in particular, the present disclosure relates to a processing method, device, electronic device, and computer-readable medium for verifying information. Background technique [0002] With the development of the Internet and the advent of the era of big data, the security of software systems has attracted more and more attention. When the access initiating terminal requests to access the accessed terminal, it usually needs to verify the verification information of the access initiating terminal. In order to prevent the verification information from being modified, the verification information is usually encrypted. [0003] In the prior art, when the accessed terminal is accessed by multiple different access-initiating terminals, the same secret key is usually used to encrypt the verification information, resulting in low security. Contents of the invention [0004] T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60
CPCG06F21/602
Inventor 刘高吴佳明
Owner BEIJING BYTEDANCE NETWORK TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More