CN111199025B - Information verification method and device, computer equipment and storage medium - Google Patents

Information verification method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN111199025B
CN111199025B CN201911324679.9A CN201911324679A CN111199025B CN 111199025 B CN111199025 B CN 111199025B CN 201911324679 A CN201911324679 A CN 201911324679A CN 111199025 B CN111199025 B CN 111199025B
Authority
CN
China
Prior art keywords
verification
field
fields
information
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911324679.9A
Other languages
Chinese (zh)
Other versions
CN111199025A (en
Inventor
陈欣炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CMB Yunchuang Information Technology Co Ltd
Original Assignee
CMB Yunchuang Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CMB Yunchuang Information Technology Co Ltd filed Critical CMB Yunchuang Information Technology Co Ltd
Priority to CN201911324679.9A priority Critical patent/CN111199025B/en
Publication of CN111199025A publication Critical patent/CN111199025A/en
Application granted granted Critical
Publication of CN111199025B publication Critical patent/CN111199025B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2129Authenticate client device independently of the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The application relates to an information verification method, an information verification device, computer equipment and a storage medium. Relates to the technical field of safety. The method comprises the following steps: firstly, sequentially receiving a plurality of first verification fields sent by a first terminal; then splicing the plurality of first verification fields to obtain spliced first verification fields; and finally, comparing the spliced first verification field with a prestored legal verification field, and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field. By adopting the method, the safety of information verification can be improved.

Description

Information verification method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of security technologies, and in particular, to an information verification method and apparatus, a computer device, and a storage medium.
Background
In daily life, the safety of information can be guaranteed by setting and using the verification information. In using the authentication information, the specific content of the authentication information can be grasped by at least one user. When a user who grasps the authentication information intentionally reveals specific content of the authentication information, or the user who grasps the authentication information is maliciously stolen with the specific content of the authentication information, a very large security risk will be caused.
Therefore, an information verification method capable of improving security is required.
Disclosure of Invention
In view of the above, it is necessary to provide an information verification method, an apparatus, a computer device, and a storage medium capable of improving security in view of the above technical problems.
In a first aspect, an information verification method is provided, and the method includes:
when information verification is carried out, a plurality of first verification fields sent by a first terminal are sequentially received;
splicing the plurality of first verification fields to obtain spliced first verification fields;
and comparing the spliced first verification field with a prestored legal verification field, and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field.
In one embodiment, the sequentially receiving a plurality of first authentication fields sent by the first terminal includes:
receiving first verification field input completion information after receiving a first verification field input based on the field input interface each time;
after receiving the first verification field input completion information every time, providing a refreshed field input interface for inputting the first verification field next time.
In one embodiment, the receiving a plurality of first authentication fields sent by a first terminal in sequence includes:
sequentially receiving the plurality of first authentication fields transmitted by a plurality of different first terminals; or,
and sequentially receiving the plurality of first verification fields transmitted by the same first terminal.
In one embodiment, before sequentially receiving a plurality of first authentication fields when performing information authentication, the method further includes:
when receiving a verification field setting instruction, sequentially receiving a plurality of second verification fields sent by a second terminal;
and splicing the plurality of second verification fields to obtain the legal verification fields, and storing the legal verification fields.
In one embodiment, the receiving the plurality of second authentication fields in sequence comprises:
receiving second verification field input completion information after receiving a second verification field input based on the field setting interface each time;
and after receiving the second field input completion information every time, providing a refreshed field setting interface for inputting a second verification field next time.
In one embodiment, the receiving the plurality of second authentication fields sent by the second terminal in sequence includes:
sequentially receiving the plurality of second authentication fields transmitted by a plurality of different second terminals; or,
and sequentially receiving the plurality of second verification fields transmitted by the same second terminal.
In one embodiment, the method further comprises:
when the spliced first verification field is different from the prestored legal verification field, receiving a preset verification information carrier sent by a third terminal, wherein the verification information carrier stores a plurality of second verification fields, and the plurality of second verification fields belong to the legal verification field;
acquiring the plurality of second authentication fields from the authentication information carrier according to a pre-stored authentication information carrier enabling password;
splicing the plurality of second verification fields to obtain spliced second verification fields;
and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In one embodiment, the method further comprises:
when the spliced first verification field is different from the prestored legal verification field, receiving a plurality of second verification fields sent by the third terminal, wherein the plurality of second verification fields are obtained from the verification information carrier through the verification information carrier starting password;
splicing the plurality of second verification fields to obtain spliced second verification fields;
and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In a second aspect, there is provided an information verification apparatus, the apparatus comprising:
the receiving module is used for sequentially receiving a plurality of first verification fields sent by a first terminal when information verification is carried out;
the splicing module is used for splicing the plurality of first verification fields to obtain spliced first verification fields;
and the comparison module is used for comparing the spliced first verification field with a prestored legal verification field and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field.
In one embodiment, the receiving module is specifically configured to receive the first verification field input completion information after receiving the first verification field input based on the field input interface each time;
after receiving the first verification field input completion information every time, providing a refreshed field input interface for inputting the first verification field next time.
In one embodiment, the first terminal is a terminal, or the first terminal is a plurality of different terminals, and the receiving module is specifically configured to sequentially receive the plurality of first authentication fields sent by the plurality of different first terminals; or, the plurality of first authentication fields transmitted by the same first terminal are received in sequence.
In one embodiment, the apparatus further includes a valid verification field obtaining module, where the valid verification field obtaining module is configured to, when receiving a verification field setting instruction, sequentially receive a plurality of second verification fields sent by the second terminal;
and splicing the plurality of second verification fields to obtain the legal verification fields, and storing the legal verification fields.
In one embodiment, the valid verification field obtaining module is specifically configured to receive second verification field input completion information after receiving a second verification field input based on the field setting interface each time;
and after receiving the second field input completion information every time, providing a refreshed field setting interface for inputting a second verification field next time.
In one embodiment, the second terminal is a terminal, or the second terminal is a plurality of different terminals, and the valid authentication field obtaining module is specifically configured to sequentially receive the plurality of second authentication fields sent by the plurality of different second terminals; alternatively, the plurality of second authentication fields transmitted by the same second terminal are sequentially received.
In one embodiment, the apparatus further includes a second verification field obtaining module, where the second verification field obtaining module is configured to receive a preset verification information carrier sent by a third terminal when the spliced first verification field is different from the pre-stored legal verification field, where the verification information carrier stores the plurality of second verification fields;
acquiring a plurality of second verification fields from the verification information carrier according to a prestored verification information carrier starting password, wherein the plurality of second verification fields belong to the legal verification fields;
splicing the plurality of second verification fields to obtain spliced second verification fields;
and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In one embodiment, the second authentication field obtaining module is further configured to receive the plurality of second authentication fields sent by the third terminal when the spliced first authentication field is different from the pre-stored legal authentication field, where the plurality of second authentication fields are obtained from the authentication information carrier through the authentication information carrier enabling password;
splicing the plurality of second verification fields to obtain spliced second verification fields;
and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In a third aspect, there is provided a computer device comprising a memory and a processor, wherein the memory stores a computer program, and the processor implements the information verification method according to any one of the first aspect when executing the computer program.
In a fourth aspect, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the information verification method of any one of the first aspects described above.
According to the information verification method, the information verification device, the computer equipment and the storage medium, firstly, when information verification is carried out, a plurality of first verification fields sent by a first terminal are sequentially received; then splicing the plurality of first verification fields to obtain spliced first verification fields; and finally, comparing the spliced first verification field with a prestored legal verification field, and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field. According to the information verification method provided by the application, when information verification is carried out, the combination of the plurality of first verification fields is used as the basis of final information verification, so that a user only knowing one of the first verification fields cannot leak all the contents of the real legal verification fields. Compared with the traditional situation that the specific content of the verification information is mastered by at least one user, the information verification method provided by the application greatly improves the safety of information verification.
Drawings
FIG. 1 is a diagram of an application environment of a method for verifying information in one embodiment;
FIG. 2 is a diagram showing an application environment of the information verification method in another embodiment;
FIG. 3 is a flow diagram illustrating a method for information verification in one embodiment;
FIG. 4 is a flow diagram that illustrates a method for receiving a first authentication field in one embodiment;
FIG. 5 is a flow diagram that illustrates a method for setting a verification field in one embodiment;
FIG. 6 is a flow diagram that illustrates a method for receiving a second authentication field in one embodiment;
FIG. 7 is a schematic flow chart of a method for authenticating information using an authentication information carrier in one embodiment;
fig. 8 is a schematic flow chart of a method of authenticating information using an authenticating information carrier in another embodiment;
FIG. 9 is a block diagram showing the structure of an information authentication apparatus according to an embodiment;
FIG. 10 is a block diagram showing the construction of an information authentication apparatus according to another embodiment;
FIG. 11 is a diagram illustrating an internal structure of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In daily life, for some specific information, a user needs to ensure the security of the information. Often, a user can ensure the security of information by using authentication information. Specifically, the user may set a legal verification field for the specific information to be protected, and when the user wants to obtain the specific information, the user needs to input a correct legal verification field to pass the information verification, so as to obtain the specific information.
For example, if a bank administrator wants to protect information of the whole bank system, the bank administrator may set a validity verification field 123456 for the whole bank system, and when the information of the bank system needs to be acquired, the bank administrator must correctly input the validity verification field 123456 set in advance, so as to acquire the information of the whole bank system.
However, in the conventional process of using the authentication information, the specific contents of the authentication information can be grasped by at least one user. When a user who grasps the authentication information intentionally reveals specific content of the authentication information, or the user who grasps the authentication information is maliciously stolen with the specific content of the authentication information, a very large security risk will be caused. For example, the bank administrator may know the specific content of the legal verification field, and when the bank administrator intentionally leaks the legal verification field to another person, the bank administrator may pose a very great security risk to the bank system.
Therefore, an information verification method capable of improving security is required.
The information verification method provided by the application can be applied to the application environment shown in fig. 1. Wherein the first terminal 101 and the second terminal 102 may communicate with the server 103 through a network connection. The server 103 has a valid authentication field stored thereon. First, the server 103 may receive a plurality of first verification fields sent by the first terminal 101, then the server 103 may splice the received plurality of first verification fields to obtain a spliced first verification field, then the server 103 may compare the spliced first verification field with a pre-stored legal verification field, and when the spliced first verification field is the same as the pre-stored legal verification field, the server 103 may output verification information passing information.
Moreover, the server 103 may further receive a verification field setting instruction sent by the second terminal 102, after the server 103 receives the verification field setting instruction sent by the second terminal 102, the server 103 may sequentially receive a plurality of second verification fields sent by the second terminal 102, and then the server 103 may splice the plurality of second verification fields received sequentially and store the spliced second verification fields as valid verification fields.
In the information verification method provided by the present application, the application environment may further include a third terminal 104, and in the case that the implementation environment includes the third terminal 104, a specific schematic diagram thereof may refer to fig. 2. Wherein, the first terminal 101, the second terminal 102 and the third terminal 104 can all communicate with the server 103 through network connection. The specific functions of the first terminal 101 and the second terminal 102 are the same as those in the above-described implementation environment, and are not described herein again. The third terminal 104 may store an authentication information carrier, where a plurality of preset second authentication fields are stored in the authentication information carrier, and when the first authentication field spliced on the server 103 is different from the prestored valid authentication field, the server 103 may receive the authentication information carrier sent by the third terminal 104, then obtain the plurality of second authentication fields from the authentication information carrier by using the prestored authentication information carrier activation password, and finally, the server 103 completes information authentication according to the obtained plurality of second authentication fields.
The number of the first terminals 101 may be one or more. The number of the second terminals 102 may be one or more. The first terminal 101, the second terminal 102, and the third terminal 104 may be implemented by the same terminal.
The first terminal 101, the second terminal 102 and the third terminal 104 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices, and the server 103 may be implemented by an independent server or a server cluster composed of a plurality of servers.
In the embodiment of the present application, as shown in fig. 3, an information verification method is provided, which is described by taking an example that the method is applied to the server in fig. 1 or fig. 2, and includes the following steps:
step 301, when performing information verification, the server sequentially receives a plurality of first verification fields sent by the first terminal.
The first authentication field may be a part of a pre-stored legal authentication field, for example, the pre-stored legal authentication field is 123456, and then the first authentication field may be a part of 123456 with any length such as 1234 or 56. In practical applications, the plurality of first authentication fields may be sequentially input by different users on the first terminal. For example, for two users a and B and a first terminal, the a user may input 1234 on the first terminal, then the B user inputs 56 on the first terminal, and then the server receives the two first authentication fields which are input by the a and B users in sequence from the first terminal.
Step 302, the server splices the plurality of first verification fields to obtain spliced first verification fields.
Based on the steps, after receiving that the two first verification fields are sequentially input by the user A and the user B sent by the first terminal, the server splices the two received first verification fields. Specifically, taking the two first verification fields 1234 and 56 as an example, the server concatenates the sequentially received 1234 and 56 to obtain a concatenated first verification field 123456.
Optionally, the server may splice the received first verification fields according to the order sent by the first terminal, or may splice the received first verification fields according to other predefined orders.
Step 303, the server compares the spliced first verification field with a pre-stored legal verification field, and outputs information verification passing information when the spliced first verification field is the same as the pre-stored legal verification field.
Based on the above steps, after obtaining the spliced first verification field 123456, the server compares the spliced first verification field 123456 with the pre-stored legal verification field, finds that the spliced first verification field is the same as the pre-stored legal verification field, and then outputs information verification passing information.
In the information verification method, when information verification is carried out, a plurality of first verification fields sent by a first terminal are received in sequence; then splicing the plurality of first verification fields to obtain spliced first verification fields; and finally, comparing the spliced first verification field with a prestored legal verification field, and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field. According to the information verification method provided by the application, when information verification is carried out, the combination of the plurality of first verification fields is used as the basis of final information verification, so that a user only knowing one of the first verification fields cannot leak all the contents of the real legal verification fields. Compared with the traditional situation that the specific content of the verification information is mastered by at least one user, the information verification method provided by the application greatly improves the safety of information verification.
In an embodiment of the present application, please refer to fig. 4, which provides a method for receiving a first verification field, the method including:
in step 401, the server receives the first verification field input completion information after receiving the first verification field input based on the field input interface each time.
Specifically, the server provides a field input interface, and the field input interface is displayed to the user through the first terminal. After a user inputs a first verification field mastered by the user on the field input interface, a confirmation button can be selected in the field input interface to indicate that the user has finished inputting, and after receiving field input completion information triggered by the user, the server can prepare for receiving the next first verification field.
In step 402, after receiving the first verification field input completion information each time, the server provides a refreshed field input interface for the next input of the first verification field.
Optionally, in order to distinguish between a plurality of first verification fields sent by the first terminal, after receiving field input completion information each time, the server provides a refreshed field input interface for receiving different first verification fields.
Assuming that the plurality of first authentication fields are input by a plurality of users, after the server receives the first authentication field input by the user and the authentication field input completion information sent by the terminal each time, the interface of the user input first authentication field is refreshed, and a new field input interface is provided for the next user. The server may provide the new field entry interface by replacing the first validation field of the previous user input with a unicode on the new field entry interface or by hiding the first validation field of the previous user input on the new field entry interface and also by setting the first validation field of the previous user input in the non-editable mode on the new field entry interface.
For ease of understanding, the manner in which the server refreshes the field input interface in actual practice will now be described by way of example. After the a user inputs the first verification field 1234 and then sends field input completion information to the server through the confirmation button, the server refreshes the field input interface in such a manner that the first verification field 1234 input by the a user in the field input interface is collectively displayed with "+" instead, and the first verification field 1234 input by the a user in the field input interface is locked in a non-editable mode. This prevents the user B from directly knowing the first authentication field mastered by the user a when entering the first authentication field 56 mastered by the user B, thereby mastering the real valid authentication field, and at the same time, prevents the user B from modifying the first authentication field entered by the user a.
In the embodiment of the application, by means of refreshing the field input interface after field input completion information is received every time, under the condition that a plurality of first verification fields exist, the risk that the first verification fields are leaked can be effectively reduced, and the safety during information verification is greatly improved.
In this embodiment, the first terminal is one terminal, or the first terminal is a plurality of different terminals. The sequentially receiving a plurality of first verification fields sent by a first terminal includes: the server receives the first verification fields sent by different first terminals in sequence; alternatively, the server receives the plurality of first authentication fields transmitted by the same first terminal in sequence.
In the embodiment of the present application, it is assumed that there are two users a and B, where the two users a and B may sequentially input the first authentication field mastered by themselves on the same terminal, and the two users a and B may also respectively input the first authentication field mastered by themselves on different terminals.
In the embodiment of the application, the plurality of first verification fields are not limited to be sent by one terminal, and the plurality of first verification fields can be sent by a plurality of terminals, so that the flexibility and the usability of the information verification method are greatly improved.
In an embodiment of the present application, please refer to fig. 5, which provides a method for setting a verification field, the method includes:
step 501, when receiving a verification field setting instruction, the server sequentially receives a plurality of second verification fields sent by the second terminal.
In the embodiment of the present application, before information authentication is performed, it is necessary to set an authentication field, which is equivalent to setting a password in advance before using the password. The second terminal mentioned in this step may be the same terminal as the first terminal.
In practical application, the setting of the verification field can be completed by a plurality of users, specifically, when the verification field is set, one of the users can trigger the verification field setting instruction, and then the other users can respectively input the second verification field which the other users want to set.
For example, the setting of the authentication field may be done by A, B along with the C user, where the C user may trigger an authentication field setting instruction on the second terminal and then leave the scene. Then the a-user and the B-user can respectively input the second authentication field they want to set. The server will receive the second authentication field that was last entered by both user a and user B at the second terminal.
Step 502, the server splices the plurality of second verification fields to obtain the legal verification field, and stores the legal verification field.
Based on the above steps, after receiving the plurality of second verification fields sent by the second verification terminal, the server splices the plurality of second verification fields received in sequence, and stores the spliced second verification fields as the valid verification fields.
For example, the setting of the verification field may be performed by A, B together with the user C who first requests for setting the verification field and leaves the site for setting the verification field after triggering a verification field setting instruction at the second terminal. After receiving the verification field setting instruction sent by the second terminal, the server prepares for receiving a plurality of second verification fields. At this point, the a user may first enter the second authentication field 1234 on the second terminal, and then the B user may again enter the second authentication field 56 on the second terminal. And after receiving the two second verification fields sent by the second terminal, the server splices the two received second verification fields. Specifically, the splicing sequence of the received second verification fields by the server may be the sequence in which the second verification fields are sent by the second terminal, or may be other preset splicing sequences. For example, for the second authentication field 1234 set by the user a and the second authentication field 56 set by the user B, after the server splices the two received second authentication fields according to the sequence that the second terminal first sends the second authentication field 1234 and then sends the second authentication field 56, the obtained spliced second authentication field may be 123456. The server will then store the concatenated second authentication field 123456 as a valid authentication field.
In the embodiment of the application, the received second verification fields are spliced together to serve as the legal verification fields by adopting a component verification field setting mode, so that no independent individual can master all contents of the legal verification fields, and the safety when the verification fields are set is greatly improved.
In an embodiment of the present application, please refer to fig. 6, a method for receiving a second verification field is provided, the method includes:
step 601, after receiving the second verification field input based on the field setting interface each time, the server receives second verification field input completion information.
In step 602, after receiving the second field input completion information each time, the server provides a refreshed field setting interface for inputting the second verification field next time.
The implementation principle and technical effect of the method for receiving the second verification field provided in the embodiment of the present application may refer to the above-mentioned specific description content for receiving the first verification field, and are not described herein again.
In this embodiment of the present application, the receiving a plurality of second verification fields sent by a second terminal in sequence, where the second terminal is a terminal, or the second terminal is a plurality of different terminals, includes: the server receives the second verification fields sent by different second terminals in sequence; alternatively, the server receives the plurality of second authentication fields transmitted by the same second terminal in sequence.
The implementation principle and technical effect of the embodiment are similar to that of the embodiment in which the server receives the plurality of first verification fields sent by the first terminal in sequence and the server receives the plurality of first verification fields sent by the plurality of different terminals in sequence, and thus, the description is omitted here.
In an embodiment of the present application, please refer to fig. 7, which provides a method for information verification using a verification information carrier, the method comprising:
step 701, when the spliced first verification field is different from the pre-stored legal verification field, the server receives a pre-set verification information carrier sent by the third terminal, where the verification information carrier stores the plurality of second verification fields, and the plurality of second verification fields belong to the legal verification field.
In this step, the spliced first verification field is different from the preset legal verification field, and can be understood as a password input error condition in practical application. The reason for this may be that the user forgets the correct first authentication field and enters the wrong first authentication field. At this time, if the correct information verification is to be continued, the correct first verification field needs to be acquired. Optionally, the information verification method provided by the present application may store the correct first verification field in a verification information carrier in advance, where the verification information carrier may be a folder or a file compression package.
Further, the verification information carrier may be pre-stored in a third terminal, and it should be noted that the third terminal in this step may be the same terminal as the first terminal and the second terminal.
The production and storage of the authentication information carrier will now be described in detail. Assuming that there are A, B and C three users, after the a and B users successfully set the valid authentication field using the method for setting the authentication field provided in the above embodiment, at this time, the a user grasps the first half 1234 of the valid authentication field 123456, and the B user grasps the second half 56 of the valid authentication field 123456. Then, the a user may store the first half field 1234 of the legitimacy verification field set by the B user as a text file, and the second half field 56 of the legitimacy verification field set by the B user may also be stored as a text file. The first half section and the second half section of the legal verification field can be set and stored on the same terminal, or the first half section and the second half section of the legal verification field can be set and stored on two different terminals.
The terminal storing the two text files may then send the two text files to a third terminal, and the terminal storing the two text files may not continue to save the two text files. Then, the user C may store the two received text files on the third terminal, package the two received text files into a folder, compress the folder to obtain a compressed packet, set an enabling password for the compressed packet, and send the enabling password to the server, where the server stores the enabling password. This compressed package may be referred to as an authentication information carrier in the embodiments of the present application.
In step 702, the server obtains the plurality of second authentication fields from the authentication information carrier according to a pre-stored authentication information carrier enabling password.
When a plurality of second authentication fields in the authentication information carrier need to be used, the enabling password of the authentication information carrier needs to be input, and after the user C correctly inputs the preset enabling password of the authentication information carrier, a plurality of second authentication fields stored in advance can be obtained from the authentication information carrier.
In step 703, the server splices the multiple second verification fields to obtain spliced second verification fields.
Step 704, the server compares the spliced second verification field with the pre-stored legal verification field, and outputs the information verification passing information when the spliced second verification field is the same as the pre-stored legal verification field.
The implementation principle and technical effect of step 703 and step 704 in the embodiment of the present application are similar to those of step 302 and step 303 described above, and are not described herein again.
In the embodiment of the application, the verification information carrier is used and the password is started by setting the verification information carrier, so that the user can conveniently and accurately continue to carry out information verification when the user inputs the first verification field by mistake or forgets the first verification field mastered by the user, and the practicability of the information verification is improved.
In an embodiment of the present application, please refer to fig. 8, there is provided another method for information verification using a verification information carrier, the method comprising:
step 801, when the spliced first authentication field is different from the pre-stored legal authentication field, the server receives the plurality of second authentication fields sent by the third terminal, where the plurality of second authentication fields are obtained from the authentication information carrier through the authentication information carrier enabling password.
Based on the specific contents of step 701 and step 702 in the foregoing embodiment, optionally, the server may obtain the plurality of second authentication fields by using the authentication information carrier sent by the third terminal and the authentication information carrier enabling password stored in the server, and may also directly receive the plurality of second authentication fields sent by the third authentication terminal. Specifically, when the plurality of second authentication fields in the authentication information carrier needs to be used, the user C may input a preset authentication information carrier enabling password on the third terminal, thereby obtaining the plurality of second authentication fields in the authentication information carrier, and then send the plurality of second authentication fields to the server by using the third terminal.
Step 802, the server splices the plurality of second verification fields to obtain spliced second verification fields.
Step 803, the server compares the spliced second verification field with the prestored legal verification field, and outputs the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
The implementation principle and technical effect of step 802 and step 803 in this embodiment are similar to those of step 302 and step 303 described above, and are not described herein again.
It should be understood that although the steps in the flowcharts of fig. 3 to 8 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 3-8 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least some of the sub-steps or stages of other steps.
In an embodiment of the present application, as shown in fig. 9, there is provided an information verification apparatus 900 including: a receiving module 901, a splicing module 902, and a comparing module 903, wherein:
a receiving module 901, configured to sequentially receive a plurality of first verification fields sent by a first terminal when performing information verification;
a splicing module 902, configured to splice the multiple first verification fields to obtain spliced first verification fields;
a comparing module 903, configured to compare the spliced first verification field with a pre-stored legal verification field, and output information verification passing information when the spliced first verification field is the same as the pre-stored legal verification field.
In this embodiment of the application, the receiving module 901 is specifically configured to receive the first verification field input completion information after receiving the first verification field input based on the field input interface each time;
after receiving the first verification field input completion information every time, providing a refreshed field input interface for inputting the first verification field next time.
In this embodiment of the application, the first terminal is a terminal, or the first terminal is a plurality of different terminals, and the receiving module 901 is specifically configured to sequentially receive the plurality of first verification fields sent by the plurality of different first terminals; or, the plurality of first authentication fields transmitted by the same first terminal are received in sequence.
In the embodiment of the present application, please refer to fig. 10, another information verification apparatus 1000 is provided, wherein the information verification apparatus 1000 includes, in addition to the modules included in the information verification apparatus 900, optionally, the information verification apparatus 1000 further includes a legal verification field obtaining module 904 and a second verification field obtaining module 905.
The valid verification field obtaining module 904 is configured to, when receiving the verification field setting instruction, sequentially receive a plurality of second verification fields sent by the second terminal;
and splicing the plurality of second verification fields to obtain the legal verification fields, and storing the legal verification fields.
In this embodiment of the application, the legal verification field obtaining module 904 is specifically configured to receive the second verification field input completion information after receiving the second verification field input based on the field setting interface each time;
and after receiving the second field input completion information every time, providing a refreshed field setting interface for inputting a second verification field next time.
In this embodiment, the second terminal is a terminal, or the second terminal is a plurality of different terminals, and the valid authentication field obtaining module 904 is specifically configured to sequentially receive the plurality of second authentication fields sent by the plurality of different second terminals; alternatively, the plurality of second authentication fields transmitted by the same second terminal are received in sequence.
In this embodiment of the present application, the second verification field obtaining module 905 is configured to, when the spliced first verification field is different from the pre-stored legal verification field, receive a pre-set verification information carrier sent by a third terminal, where the verification information carrier stores the plurality of second verification fields, and the plurality of second verification fields belong to the legal verification field;
acquiring the plurality of second authentication fields from the authentication information carrier according to a pre-stored authentication information carrier enabling password;
splicing the plurality of second verification fields to obtain spliced second verification fields;
and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In this embodiment of the application, the second verification field obtaining module 905 is further configured to, when the spliced first verification field is different from the pre-stored legal verification field, receive the plurality of second verification fields sent by the third terminal, where the plurality of second verification fields are obtained from the verification information carrier through the verification information carrier enabling password;
splicing the plurality of second verification fields to obtain spliced second verification fields;
and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
For specific limitations of the information verification apparatus, reference may be made to the above limitations of the information verification method, which are not described herein again. The modules in the information verification device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In the embodiment of the present application, a computer device is provided, and the computer device may be a server, and its internal structure diagram may be as shown in fig. 11. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing information verification data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement an information verification method.
Those skilled in the art will appreciate that the architecture shown in fig. 11 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In an embodiment of the present application, there is provided a computer device, including a memory and a processor, where the memory stores a computer program, and the processor implements the following steps when executing the computer program:
when information verification is carried out, a plurality of first verification fields sent by a first terminal are sequentially received;
splicing the plurality of first verification fields to obtain spliced first verification fields;
and comparing the spliced first verification field with a prestored legal verification field, and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field.
In the embodiment of the present application, the processor, when executing the computer program, further implements the following steps:
receiving first verification field input completion information after receiving a first verification field input based on the field input interface each time; after receiving the first verification field input completion information every time, providing a refreshed field input interface for inputting the first verification field next time.
In this embodiment, the first terminal is a terminal, or the first terminal is a plurality of different terminals, and the processor executes the computer program to further implement the following steps:
sequentially receiving the plurality of first authentication fields transmitted by a plurality of different first terminals; or, the plurality of first authentication fields transmitted by the same first terminal are received in sequence.
In the embodiment of the present application, the processor, when executing the computer program, further implements the following steps:
when receiving a verification field setting instruction, sequentially receiving a plurality of second verification fields sent by a second terminal; and splicing the plurality of second verification fields to obtain the legal verification fields, and storing the legal verification fields.
In the embodiment of the present application, the processor, when executing the computer program, further implements the following steps:
receiving second verification field input completion information after receiving a second verification field input based on the field setting interface each time; and after receiving the second field input completion information every time, providing a refreshed field setting interface for inputting a second verification field next time.
In this embodiment, the second terminal is a terminal, or the second terminal is a plurality of different terminals, and the processor executes the computer program to further implement the following steps:
sequentially receiving the plurality of second authentication fields transmitted by a plurality of different second terminals; alternatively, the plurality of second authentication fields transmitted by the same second terminal are sequentially received.
In the embodiment of the present application, the processor, when executing the computer program, further implements the following steps:
when the spliced first verification field is different from the prestored legal verification field, receiving a preset verification information carrier sent by a third terminal, wherein the verification information carrier stores a plurality of second verification fields, and the plurality of second verification fields belong to the legal verification field; acquiring the plurality of second authentication fields from the authentication information carrier according to a pre-stored authentication information carrier enabling password; splicing the plurality of second verification fields to obtain spliced second verification fields; and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In the embodiment of the present application, the processor, when executing the computer program, further implements the following steps:
when the spliced first verification field is different from the prestored legal verification field, receiving a plurality of second verification fields sent by the third terminal, wherein the plurality of second verification fields are obtained from the verification information carrier through the verification information carrier starting password; splicing the plurality of second verification fields to obtain spliced second verification fields; and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In an embodiment of the application, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, realizes the steps of:
when information verification is carried out, a plurality of first verification fields sent by a first terminal are sequentially received; splicing the plurality of first verification fields to obtain spliced first verification fields; and comparing the spliced first verification field with a prestored legal verification field, and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field.
In an embodiment of the application, the computer program when executed by the processor further performs the steps of:
after receiving the first verification field input based on the field input interface every time, receiving first verification field input completion information; after receiving the first verification field input completion information every time, providing a refreshed field input interface for inputting the first verification field next time.
In this embodiment, the first terminal is a terminal, or the first terminal is a plurality of different terminals, and the computer program further implements the following steps when executed by the processor:
sequentially receiving the plurality of first authentication fields transmitted by a plurality of different first terminals; or, the plurality of first authentication fields transmitted by the same first terminal are received in sequence.
In an embodiment of the application, the computer program, when executed by the processor, further performs the steps of:
when receiving a verification field setting instruction, sequentially receiving a plurality of second verification fields sent by a second terminal; and splicing the plurality of second verification fields to obtain the legal verification fields, and storing the legal verification fields.
In an embodiment of the application, the computer program when executed by the processor further performs the steps of:
receiving second verification field input completion information after receiving a second verification field input based on the field setting interface each time; and after receiving the second field input completion information every time, providing a refreshed field setting interface for inputting a second verification field next time.
In this embodiment, the second terminal is a terminal, or the second terminal is a plurality of different terminals, and the computer program further implements the following steps when executed by the processor:
sequentially receiving the plurality of second authentication fields transmitted by a plurality of different second terminals; alternatively, the plurality of second authentication fields transmitted by the same second terminal are sequentially received.
In an embodiment of the application, the computer program when executed by the processor further performs the steps of:
when the spliced first verification field is different from the prestored legal verification field, receiving a preset verification information carrier sent by a third terminal, wherein the verification information carrier stores a plurality of second verification fields, and the plurality of second verification fields belong to the legal verification field; acquiring the plurality of second authentication fields from the authentication information carrier according to a pre-stored authentication information carrier enabling password; splicing the plurality of second verification fields to obtain spliced second verification fields; and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
In an embodiment of the application, the computer program when executed by the processor further performs the steps of:
when the spliced first verification field is different from the prestored legal verification field, receiving a plurality of second verification fields sent by the third terminal, wherein the plurality of second verification fields are obtained from the verification information carrier through the verification information carrier starting password; splicing the plurality of second verification fields to obtain spliced second verification fields; and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. An information verification method, the method comprising:
when information verification is carried out, a plurality of first verification fields sent by a first terminal are sequentially received;
splicing the plurality of first verification fields to obtain spliced first verification fields;
comparing the spliced first verification field with a prestored legal verification field, and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field;
when the spliced first verification field is different from the prestored legal verification field, receiving a preset verification information carrier sent by a third terminal, wherein a plurality of second verification fields are stored in the verification information carrier, and the plurality of second verification fields belong to the legal verification fields; acquiring the plurality of second authentication fields from the authentication information carrier according to a prestored authentication information carrier enabling password;
splicing the plurality of second verification fields to obtain spliced second verification fields; and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
2. The method of claim 1, wherein the sequentially receiving the plurality of first authentication fields sent by the first terminal comprises:
receiving first verification field input completion information after receiving a first verification field input based on the field input interface each time;
and after receiving the first verification field input completion information every time, providing a refreshed field input interface for inputting the first verification field next time.
3. The method according to claim 1, wherein the first terminal is a terminal, or the first terminal is a plurality of different terminals, and the sequentially receiving the plurality of first authentication fields sent by the first terminal comprises:
receiving the plurality of first authentication fields transmitted by a plurality of different first terminals in sequence; or,
and sequentially receiving the plurality of first verification fields sent by the same first terminal.
4. The method of claim 1, wherein before receiving the plurality of first authentication fields in sequence when performing information authentication, the method further comprises:
when receiving a verification field setting instruction, sequentially receiving a plurality of second verification fields sent by a second terminal;
and splicing the plurality of second verification fields to obtain the legal verification fields, and storing the legal verification fields.
5. The method according to claim 4, wherein said sequentially receiving the plurality of second authentication fields sent by the second terminal comprises:
receiving second verification field input completion information after receiving a second verification field input based on the field setting interface each time;
and after receiving the second verification field input completion information every time, providing a refreshed field setting interface for inputting the second verification field next time.
6. The method according to claim 4, wherein the second terminal is a terminal, or the second terminal is a plurality of different terminals, and the sequentially receiving the plurality of second authentication fields sent by the second terminal comprises:
receiving the plurality of second authentication fields transmitted by a plurality of different second terminals in sequence; or,
and sequentially receiving the plurality of second verification fields sent by the same second terminal.
7. The method of claim 1, further comprising:
when the spliced first verification field is different from the prestored legal verification field, receiving a plurality of second verification fields sent by the third terminal, wherein the plurality of second verification fields are obtained from the verification information carrier through the verification information carrier starting password;
splicing the plurality of second verification fields to obtain spliced second verification fields;
and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
8. An information authentication apparatus, characterized in that the apparatus comprises:
the receiving module is used for sequentially receiving a plurality of first verification fields sent by a first terminal when information verification is carried out;
the splicing module is used for splicing the plurality of first verification fields to obtain spliced first verification fields;
the comparison module is used for comparing the spliced first verification field with a prestored legal verification field and outputting information verification passing information when the spliced first verification field is the same as the prestored legal verification field; when the spliced first verification field is different from the prestored legal verification field, receiving a preset verification information carrier sent by a third terminal, wherein the verification information carrier stores a plurality of second verification fields, and the plurality of second verification fields belong to the legal verification field; acquiring the plurality of second authentication fields from the authentication information carrier according to a prestored authentication information carrier enabling password; splicing the plurality of second verification fields to obtain spliced second verification fields; and comparing the spliced second verification field with the prestored legal verification field, and outputting the information verification passing information when the spliced second verification field is the same as the prestored legal verification field.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN201911324679.9A 2019-12-20 2019-12-20 Information verification method and device, computer equipment and storage medium Active CN111199025B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911324679.9A CN111199025B (en) 2019-12-20 2019-12-20 Information verification method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911324679.9A CN111199025B (en) 2019-12-20 2019-12-20 Information verification method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111199025A CN111199025A (en) 2020-05-26
CN111199025B true CN111199025B (en) 2022-07-05

Family

ID=70746958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911324679.9A Active CN111199025B (en) 2019-12-20 2019-12-20 Information verification method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111199025B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231682A (en) * 2020-10-16 2021-01-15 广州零世纪信息科技有限公司 Security authentication method, system, device and computer equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588377A (en) * 2009-06-18 2009-11-25 成都市华为赛门铁克科技有限公司 Obtaining method, system and device of session key
CN105827404A (en) * 2015-01-05 2016-08-03 ***通信集团陕西有限公司 Identity authentication method, identity authentication device, and server
CN105959317A (en) * 2016-07-11 2016-09-21 深圳市金立通信设备有限公司 Security authentication method and terminal
CN107038580A (en) * 2016-11-16 2017-08-11 辽宁科技大学 A kind of bank transaction system
CN107733868A (en) * 2017-09-13 2018-02-23 深圳市三阶微控实业有限公司 Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium
CN110177134A (en) * 2019-05-10 2019-08-27 东南大学 A kind of security password manager and its application method based on cloudy storage

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101588377A (en) * 2009-06-18 2009-11-25 成都市华为赛门铁克科技有限公司 Obtaining method, system and device of session key
CN105827404A (en) * 2015-01-05 2016-08-03 ***通信集团陕西有限公司 Identity authentication method, identity authentication device, and server
CN105959317A (en) * 2016-07-11 2016-09-21 深圳市金立通信设备有限公司 Security authentication method and terminal
CN107038580A (en) * 2016-11-16 2017-08-11 辽宁科技大学 A kind of bank transaction system
CN107733868A (en) * 2017-09-13 2018-02-23 深圳市三阶微控实业有限公司 Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium
CN110177134A (en) * 2019-05-10 2019-08-27 东南大学 A kind of security password manager and its application method based on cloudy storage

Also Published As

Publication number Publication date
CN111199025A (en) 2020-05-26

Similar Documents

Publication Publication Date Title
CN109684790B (en) Software starting method, software authorization verification method, device and storage medium
CN108810894B (en) Terminal authorization method, device, computer equipment and storage medium
CN108322451B (en) Data processing method, data processing device, computer equipment and storage medium
CN111475824B (en) Data access method, device, equipment and storage medium
CN108304698B (en) Product authorized use method and device, computer equipment and storage medium
CN107220547B (en) Terminal equipment and starting method thereof
CN108763888B (en) User profile processing method and device, computer equipment and storage medium
CN112860778B (en) Database management method, device, equipment and medium for desktop application program
CN107273150B (en) Preloading firmware downloading and writing method and device
CN108496323B (en) Certificate importing method and terminal
CN112800393B (en) Authorization authentication method, software development kit generation method, device and electronic equipment
CN107944234A (en) A kind of brush machine control method of Android device
CN111343170A (en) Electronic signing method and system
CN107688756B (en) Hard disk control method, equipment and readable storage medium storing program for executing
CN111143399B (en) Data processing method, device, storage medium and computer equipment
CN111199025B (en) Information verification method and device, computer equipment and storage medium
CN115514492A (en) BIOS firmware verification method, device, server, storage medium and program product
CN109491716A (en) Start method and device, program storage method and device
CN111652720A (en) Cloud evidence obtaining method and device, computer equipment and storage medium
CN108390758B (en) User password processing method and device and internal control security monitoring system
CN112861137A (en) Secure firmware
CN113868628B (en) Signature verification method, signature verification device, computer equipment and storage medium
CN114239004A (en) Electronic signature generation method and device, computer equipment and storage medium
CN110995437B (en) ETC system-based user information input method, device, equipment and storage medium
CN111478770A (en) Security verification method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 1901, building 5, Shenzhen new generation industrial park, 136 Zhongkang Road, Meidu community, Meilin street, Futian District, Shenzhen, Guangdong 518000

Applicant after: Zhaoyin yunchuang Information Technology Co.,Ltd.

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: MBCLOUD (SHENZHEN) INFORMATION TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Information verification methods, devices, computer equipment, and storage media

Effective date of registration: 20231117

Granted publication date: 20220705

Pledgee: Shenzhen Branch of China Merchants Bank Co.,Ltd.

Pledgor: Zhaoyin yunchuang Information Technology Co.,Ltd.

Registration number: Y2023980065913