Supercharge Your Innovation With Domain-Expert AI Agents!

A method, related device, equipment and storage medium for information verification

A technology for information verification and verification, which is applied in digital data authentication and other directions, and can solve problems such as information security is difficult to be guaranteed

Active Publication Date: 2021-06-22
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this process, the server of the third-party application can indirectly obtain the user's account information and store the summary information of the password, making it difficult to guarantee the security of the information.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, related device, equipment and storage medium for information verification
  • A method, related device, equipment and storage medium for information verification
  • A method, related device, equipment and storage medium for information verification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] The embodiment of the present application provides an information verification method, related devices, equipment, and storage media, which can log in to the server of a third-party application without exposing the user's private information to the third-party application, thereby improving the security of identity authentication. safety.

[0100] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of this application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein, for example, can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "corresponding to" and any variations thereof, are intended to cover a non-exclusive inclusion...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses an information verification method based on cloud security technology. This application includes: obtaining key negotiation data; sending key negotiation data to terminal equipment, and the terminal equipment uses the second random number and the The public key and the first random number encrypt the information to be verified for the target application to obtain the ciphertext information to be verified; receive the ciphertext information to be verified and the session identifier sent by the terminal device; The ciphertext information to be verified is decrypted to obtain the first information digest; the first information digest is matched with the second information digest to obtain the information verification result; and the information verification result is sent to the terminal device. The present application also provides related devices, equipment and storage media. This application can log in to the server of the third-party application without exposing the user's private information to the third-party application, thereby improving the security of identity authentication.

Description

technical field [0001] The present application relates to the field of cloud security technology, and in particular to an information verification method, related devices, equipment and storage media. Background technique [0002] The Open Authorization (OAuth) protocol provides a safe, open and simple standard for authorization of user resources. Different from previous authorization methods, OAuth authorization will not allow third parties to touch the user's account information (for example, user name and password), that is, third parties can apply for authorization to obtain the user's resources without using the user's account information , therefore, the OAuth protocol is relatively secure. [0003] At present, under the OAuth protocol, a single hash calculation is performed on the password through the front-end program, for example, using Secure Hash Algorithm 1 (Secure Hash Algorithm, SHA-1) or using Secure Hash Algorithm 256 (Secure Hash Algorithm, SHA-256) , to g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/46
CPCG06F21/31G06F21/46H04L63/045H04L63/06H04L63/0807H04L63/08
Inventor 王犇王旭曾祥楷李俊浩
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More