Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An identity verification method, device, electronic equipment and storage medium

An authentication method and distributed storage technology, applied in the field of network security, can solve problems such as CSRF vulnerabilities, replay attacks, man-in-the-middle attacks, etc., and achieve the effect of eliminating CSRF vulnerabilities and improving security.

Active Publication Date: 2021-03-16
GUANGDONG UNIV OF TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the process, it may lead to CSRF vulnerabilities, replay attacks, man-in-the-middle attacks, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity verification method, device, electronic equipment and storage medium
  • An identity verification method, device, electronic equipment and storage medium
  • An identity verification method, device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0051] The embodiment of the present application discloses an identity verification method, which improves the security of identity verification.

[0052] see figure 1 , a flow chart of an identity verification method shown according to an exemplary embodiment, as shown in figure 1 shown, including:

[0053] S101: Obtain a random character string from the server of the website, request the account information corresponding to the website from the distributed storage system, encrypt the acc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity verification method and device, electronic equipment and a computer readable storage medium. The method comprises the following steps: acquiring a random characterstring from a server of a website, requesting account information corresponding to the website from a distributed storage system, encrypting the account information by using a public key of the website, and re-uploading the encrypted account information to the distributed storage system; receiving a first hash value corresponding to the encrypted account information sent by the distributed storagesystem, encrypting the first hash value by using the random character string, and broadcasting the first hash value to the server by using a decentralized message protocol, so that the server acquires the encrypted account information from the distributed storage system based on the first hash value and verifies the encrypted account information; and receiving a verification result sent by the server. According to the identity authentication method provided by the invention, the security of identity authentication is improved.

Description

technical field [0001] The present application relates to the technical field of network security, and more specifically, relates to an identity verification method and device, an electronic device, and a computer-readable storage medium. Background technique [0002] With the development of the Internet, users have more and more identities on the Internet, and the traditional login method of entering user names and passwords will also face serious problems such as "password fatigue", "phishing" and "crash stuffing". Therefore, safely and effectively managing users' network identities has become a very valuable research direction in the current social form with developed networks. [0003] In the OAuth2.0 mechanism, the authorization server uses http / https to issue tokens to third-party applications, and the third-party applications with tokens apply for information from the server of the resource by calling the interface. In the process, CSRF vulnerabilities, replay attack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/3236H04L9/3247H04L63/0428H04L63/0815H04L63/083H04L67/1097
Inventor 刘文印吴鸿文
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products