Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network certificate information security verification method and device, medium and terminal equipment

An information security and verification technology, applied in the field of information security, can solve problems such as insufficient security of the network certificate verification scheme, and achieve the effect of maintaining personal information and property security and improving security

Active Publication Date: 2020-03-27
广州大白互联网科技有限公司
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides a network certificate information security verification method, device, medium and terminal equipment, which solves the existing network certificate verification scheme by performing legality verification and biometric data consistency comparison on the original network certificate verification data Insufficient security technical problems, so as to verify the security of the network certificate data, in order to improve the security of network communication and maintain the user's personal information and property security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network certificate information security verification method and device, medium and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0027] The network certificate verification is to verify the authenticity and validity of the network certificate logo provided by the access application. Citizens' personal identity-related data information, the online certificate platform will compare and verify the consistency of the data information with the personal identity information database provided by authoritative and legal organizations.

[0028] Please refer to figure 1 , the preferred embodiment of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network certificate information security verification method which comprises the following steps: acquiring original network certificate verification data, decoding the original network certificate verification data and performing basic data verification; carrying out abstract cutting on the successfully decoded character string, carrying out public key signature verification on the cut network certificate related data, and verifying the integrity of the network certificate data; after the network certificate data are completely verified, identifying and extracting basic attribute data from the network certificate related data to carry out legality verification processing; after the validity verification of the basic attribute data is passed, identifying and extracting the identity information of the user and the biological characteristic data of the user from the network certificate related data, and performing consistency comparison and verification processing on the identity information and the biological characteristic data through a third-party database to determine the security of the network certificate information; according to the method, the legality verification and the biological characteristic data consistency comparison are carried out on the original network certificate verification data, so that the security verification is carried out,the network communication security is improved, and the user information and property security are maintained.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method, device, medium and terminal equipment for network certificate information security verification. Background technique [0002] The development of the Internet is gradually affecting people's lifestyles at an alarming rate. Today, with the popularity of the Internet, people's social activities on the Internet are becoming more frequent, and the usage rate of personal information on the Internet is also rising. If it is not strictly controlled, personal Internet activities and even real social activities will be affected, causing an identity information security disaster. With the release of the "Network Security Level Protection Regulations" and the "Information Security Level Protection Management Measures", it is not difficult to find that the country attaches great importance to information security, and the guidance and Regulatory efforts are gr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/0876H04L63/0861H04L63/123
Inventor 续磊刘磊张楠
Owner 广州大白互联网科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products