Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authentication method and device and storage medium

A security authentication and request message technology, applied in the computer field, can solve the problem of poor message transmission security, achieve the effect of preventing tampering and improving security

Inactive Publication Date: 2019-09-03
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention provide a security authentication method, device, and storage medium to at least solve the technical problem of poor message transmission security due to the symmetric key being intercepted during transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method and device and storage medium
  • Security authentication method and device and storage medium
  • Security authentication method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0023] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security authentication method and device and a storage medium. The method comprises the following steps: encrypting a message abstract of target content by using a public key in an asymmetric key to obtain a user signature; encrypting the message content included in the target content by using a symmetric key to obtain encrypted content; and sending a request message containing the user signature and the encrypted content to a receiving end, and sending the request message to a receiving end, thereby enabling the receiving end to carry out security authentication onthe request message. The request message is used for requesting target data associated with a user identifier of a target user corresponding to a sending end, the request message further comprises theuser identifier, and the asymmetric secret key and the symmetric secret key have a unique corresponding relation with the user identifier of the target user. According to the method and the device, the technical problem that the message transmission security is poor due to the fact that the symmetric key is intercepted in the transmission process is solved.

Description

technical field [0001] The present invention relates to the field of computers, in particular to a security authentication method and device and a storage medium. Background technique [0002] At present, the security authentication method of the open data platform is: the client uses a pre-assigned symmetric key to encrypt the content to be transmitted, and the open data platform uses the same symmetric key as the client to decrypt the received message: if If the decryption is successful, the corresponding business processing will be performed according to the decrypted content; if the decryption fails, it will be considered as an illegal request and cannot pass the authentication. [0003] Since the content of the message is encrypted using a symmetric key, the symmetric key is easily intercepted during transmission, so there is a problem of poor message transmission security. [0004] For the above problems, no effective solution has been proposed yet. Contents of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/14
CPCH04L9/14H04L9/3247H04L63/045H04L63/08
Inventor 郝博高忠山
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products