Unlock instant, AI-driven research and patent intelligence for your innovation.

Data verification method, data processing method and device

A data verification and signature verification technology, applied in the field of data transmission, can solve problems such as tampering, affecting data security, illegal hijacking of signature verification data, etc.

Pending Publication Date: 2022-08-02
BEIJING SENSETIME TECH DEV CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in related technologies, the user end generally sends the signature verification data after the user authentication is passed. During this process, the signature verification data may be illegally hijacked, and then tampered with, affecting the security of the data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data verification method, data processing method and device
  • Data verification method, data processing method and device
  • Data verification method, data processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0081] In order to make the purposes, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present disclosure. Obviously, the described embodiments are only These are some, but not all, embodiments of the present disclosure. The components of the disclosed embodiments generally described and illustrated in the drawings herein may be arranged and designed in a variety of different configurations. Therefore, the following detailed description of the embodiments of the disclosure provided in the accompanying drawings is not intended to limit the scope of the disclosure as claimed, but is merely representative of selected embodiments of the disclosure. Based on the embodiments of the present disclosure, all other embodiments obtained by those skilled in the ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data verification method and device and a data processing method and device.The data verification method comprises the steps that token information and an encrypted request data packet sent by a user side are received, the token information comprises signature information and signature verification information, and the signature verification information comprises signature verification information; the signature information comprises a signed user identifier and summary information of the request data packet, and the signature verification information comprises a processed user identifier; the signature information is generated based on a software development kit SDK of the user side; and performing signature verification processing on the signature information based on the signature verification information and the encrypted request data packet, and performing authentication processing based on the user identifier.

Description

technical field [0001] The present disclosure relates to the technical field of data transmission, and in particular, to a data verification method, a data processing method, and an apparatus. Background technique [0002] Currently, in order to easily share data and applications between different devices, the use of public cloud services is becoming more and more common. In order to ensure the security of data transmission, the public cloud service generally needs to perform authentication processing on the current user's identity to ensure that the user has the data processing authority. If it is tampered with, a signature mechanism must be introduced for verification. [0003] However, in the related art, the user terminal generally sends the signature verification data after the user authentication is passed. During this process, the signature verification data may be illegally hijacked and then tampered with, affecting the security of the data. SUMMARY OF THE INVENTI...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/40
CPCH04L9/3213H04L9/3247H04L9/3297H04L9/0869H04L63/0435H04L2209/72
Inventor 杨毅刘文民郝石磊张殿炎
Owner BEIJING SENSETIME TECH DEV CO LTD