Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity information verification method, server and storage medium

A technology for identity information and verification methods, applied in the field of servers, storage media, and identity information verification methods, can solve the problems of identity information leakage, external attacks, and difficulty in guaranteeing the security of identity verification results, so as to improve privacy and security, The effect of guaranteeing credibility

Pending Publication Date: 2020-04-10
上海隔镜信息科技有限公司
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The inventor found that there are at least the following problems in the prior art: in the current identity verification process, users need to provide their own identity information repeatedly for different identity verification parties. At the same time, the current service provider will store a large amount of user identity information locally, and then verify the identity information, resulting in an external attacker or an internal malicious employee, who may conduct a large amount of user identity information on the service provider. Stealing, leading to the leakage of identity information, the security of identity verification results is difficult to guarantee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity information verification method, server and storage medium
  • Identity information verification method, server and storage medium
  • Identity information verification method, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, various implementation modes of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solutions claimed in this application can also be realized. The division of the following embodiments is for the convenience of description, and should not constitute any limitation to the specific implementation of the present invention, and the various embodiments can be combined and referred to each other on the premise of no contradiction.

[0020] The first embod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the technical field of network security, and discloses an identity information verification method, a server and a storage medium. The method comprises the steps of receiving an auditing request sent by a target terminal, the auditing request is transmitted through a trusted channel, the auditing request comprises a digital signature indicating user identity information, and the digital signature is generated by encrypting a preset target private key; authenticating the auditing request according to a pre-stored target public key; and after the authentication is passed, an auditing result corresponding to the auditing request is sent to a target terminal, so that the target terminal sends the auditing result to an application server needing identity authentication to complete identity authentication, and the auditing result does not include user identity information. In the auditing process, the auditing request is transmitted through the credible channel, it is ensured that the identity information is located in the safe environment, the auditing request comprises the encrypted digital signature, the credibility of identity information verification is ensured, and the privacy and safety of the identity verification process are improved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of network security, and in particular to an identity information verification method, a server and a storage medium. Background technique [0002] At present, the personal identity verification of users has become a necessary supervision method in the fields of finance and games. Before using certain functions, regulators will require service providers to authenticate users, such as providing ID card information, binding bank cards, etc. Some more stringent identity authentication, such as Taobao seller authentication, requires the user to take a photo of the identity card in hand to confirm that the actual user and the submitted identity information are the same person. [0003] The inventor found that there are at least the following problems in the prior art: in the current identity verification process, users need to provide their own identity information repeatedly for differ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/45G06F21/60G06F21/31
CPCG06F21/45G06F21/602G06F21/606G06F21/31G06F2221/2107
Inventor 华志超
Owner 上海隔镜信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products