CN116760585A - Information verification method, device, server and medium based on characteristic information - Google Patents

Information verification method, device, server and medium based on characteristic information Download PDF

Info

Publication number
CN116760585A
CN116760585A CN202310671670.5A CN202310671670A CN116760585A CN 116760585 A CN116760585 A CN 116760585A CN 202310671670 A CN202310671670 A CN 202310671670A CN 116760585 A CN116760585 A CN 116760585A
Authority
CN
China
Prior art keywords
information
trigger account
trigger
account
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310671670.5A
Other languages
Chinese (zh)
Inventor
吴猛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202310671670.5A priority Critical patent/CN116760585A/en
Publication of CN116760585A publication Critical patent/CN116760585A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The application provides an information verification method, device, server and medium based on characteristic information, which can be applied to the field of network security or finance, and the method comprises the following steps: receiving first information sent by a client, wherein the first information is information obtained by encrypting input information of a trigger account by the client according to an encryption mapping rule of the trigger account, the encryption mapping rule of the trigger account is generated by feature information of the trigger account, and the feature information of the trigger account is used for identifying the trigger account; generating second information according to the key information which indicates the same content with the input information, wherein the second information is information obtained by encrypting the key information by the server according to an encryption mapping rule of the trigger account; and comparing the first information with the second information to obtain an information verification result. According to the method, the key information and the characteristic information of the user are associated, so that the information security of the user can be protected.

Description

Information verification method, device, server and medium based on characteristic information
Technical Field
The present application relates to the field of network security, and in particular, to an information verification method, device, server and medium based on feature information.
Background
With the rapid development of computer technology, different kinds of Applications (APP) have been developed. In general, the APP adopts a client-server architecture, and information transmission can be performed between the client and the server, so that normal operation of the APP is realized.
In order to improve information security in the process of using the APP by a user, the APP can perform identity authentication. For example, the APP may perform authentication through key information such as a password, an authentication code, etc.
In traditional authentication, key information such as passwords and verification codes can be leaked when being transmitted between a client and a server, so that risks can exist when a user uses the APP, and information security of the user cannot be guaranteed.
Disclosure of Invention
The application provides an information verification method based on characteristic information, which utilizes the characteristic information of a trigger account to encrypt information and ensures the information security of a user. The application also provides a device, a server and a medium corresponding to the method.
In a first aspect, the present application provides an information verification method based on feature information. The method comprises the following steps:
receiving first information sent by a client, wherein the first information is information obtained by encrypting input information of a trigger account by the client according to an encryption mapping rule of the trigger account, the encryption mapping rule of the trigger account is generated by characteristic information of the trigger account, and the characteristic information of the trigger account is used for identifying the trigger account;
generating second information according to key information which indicates the same content with the input information, wherein the second information is information obtained by encrypting the key information by the server according to an encryption mapping rule of a trigger account;
and comparing the first information with the second information to obtain an information verification result.
In some possible implementations, the encryption mapping rule of the trigger account is generated by:
acquiring feature information of a trigger account;
generating an encryption mapping rule aiming at least one information type according to the characteristic information of the trigger account;
and determining the encryption mapping rule of the at least one information type as the encryption mapping rule of the trigger account.
In some possible implementations, the feature information of the trigger account includes at least one of an international mobile equipment identity IMEI corresponding to the trigger account, an internet protocol IP address of the trigger account, and an identification number ID corresponding to the trigger account.
In some possible implementations, the key information and the input information indicate a verification code, and before the receiving the first information sent by the client, the method further includes:
randomly generating and storing key information;
and sending the key information to the client.
In some possible implementations, the key information and the input information indicate a password for the trigger account, the key information being stored at the server.
In some possible implementations, the at least one information type includes a number type, and the encryption mapping rule includes:
and mapping the information of the number type into the information of the corresponding letter type.
In some possible implementations, the comparing the first information with the second information to obtain an information verification result includes:
and when the first information and the second information are the same, obtaining an information verification result of the passing of the characterization verification.
In a second aspect, the present application provides an information verification apparatus based on characteristic information. The device comprises:
the communication module is used for receiving first information sent by a client, wherein the first information is information obtained by encrypting input information of a trigger account by the client according to an encryption mapping rule of the trigger account, the encryption mapping rule of the trigger account is generated by characteristic information of the trigger account, and the characteristic information of the trigger account is used for identifying the trigger account;
the generation module is used for generating second information according to the key information which indicates the same content with the input information, wherein the second information is information obtained by encrypting the key information by the server according to the encryption mapping rule of the trigger account;
and the verification module is used for comparing the first information with the second information to obtain an information verification result.
In some possible implementations, the apparatus further includes:
the rule determining module is used for acquiring the characteristic information of the trigger account; generating an encryption mapping rule aiming at least one information type according to the characteristic information of the trigger account; and determining the encryption mapping rule of the at least one information type as the encryption mapping rule of the trigger account.
In some possible implementations, the feature information of the trigger account includes at least one of an international mobile equipment identity IMEI corresponding to the trigger account, an internet protocol IP address of the trigger account, and an identification number ID corresponding to the trigger account.
In some possible implementations, the key information and the input information indicate a verification code, and the generating module is further configured to:
randomly generating and storing key information;
the communication module is further configured to:
and sending the key information to the client.
In some possible implementations, the key information and the input information indicate a password for the trigger account, the key information being stored at the server.
In some possible implementations, the at least one information type includes a digital type, and the generating module is specifically configured to:
and mapping the information of the number type into the information of the corresponding letter type.
In some possible implementations, the verification module is specifically configured to:
and when the first information and the second information are the same, obtaining an information verification result of the passing of the characterization verification.
In a third aspect, the present application provides a server. The server comprises a processor and a memory, the memory having instructions stored therein, the processor executing the instructions to cause the server to perform the method according to the first aspect or any implementation of the first aspect of the present application.
In a fourth aspect, the present application provides a computer-readable storage medium. The computer readable storage medium has instructions stored therein which, when run on a server, cause the server to perform the method of the first aspect or any implementation of the first aspect.
Further combinations of the present application may be made to provide further implementations based on the implementations provided in the above aspects.
Based on the above description, the technical scheme of the application has the following beneficial effects:
specifically, the method comprises the steps of firstly receiving first information sent by a client, wherein the first information is information obtained by encrypting input information of a trigger account by the client according to an encryption mapping rule of the trigger account, the encryption mapping rule of the trigger account is generated by characteristic information of the trigger account, the characteristic information of the trigger account is used for identifying the trigger account, then generating second information according to key information indicating the same content with the input information, wherein the second information is information obtained by encrypting the key information by a server according to the encryption mapping rule of the trigger account, and comparing the first information with the second information to obtain an information verification result.
According to the method, an encryption mapping rule of the trigger account is generated according to the characteristic information of the trigger account, key information (such as a password and a verification code) is encrypted by utilizing the encryption mapping rule of the trigger account, and the key information and the characteristic information of a user are associated, so that even if information leakage occurs in the information transmission process, the information cannot be verified because the characteristic information of the user cannot be obtained, and the information safety of the user is protected.
Drawings
The above and other features, advantages and aspects of embodiments of the present application will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. The same or similar reference numbers will be used throughout the drawings to refer to the same or like elements. It should be understood that the figures are schematic and that elements and components are not necessarily drawn to scale.
Fig. 1 is a schematic flow chart of an information verification method based on feature information according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an information verification device based on feature information according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a server for implementing information verification according to an embodiment of the present application.
Detailed Description
Embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While the application is susceptible of embodiment in the drawings, it is to be understood that the application may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided to provide a more thorough and complete understanding of the application. It should be understood that the drawings and embodiments of the application are for illustration purposes only and are not intended to limit the scope of the present application.
The term "including" and variations thereof as used herein are intended to be open-ended, i.e., including, but not limited to. The term "based on" is based at least in part on. The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments. Related definitions of other terms will be given in the description below.
It should be noted that the terms "first," "second," and the like herein are merely used for distinguishing between different devices, modules, or units and not for limiting the order or interdependence of the functions performed by such devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those skilled in the art will appreciate that "one or more" is intended to be construed as "one or more" unless the context clearly indicates otherwise.
In order to facilitate understanding of the technical scheme of the present application, a specific application scenario in the present application is described below.
With the rapid development of computer technology, different kinds of Applications (APP) have been developed. In general, an APP adopts a client-server (also called a server or an application server) architecture, and information can be transmitted between the client and the server, so that normal operation of the APP is realized.
In order to improve information security in the process of using the APP by a user, the APP can perform identity authentication. For example, the user may enter a password in the client, the client sends the password entered by the user to the server, and the server compares the password entered by the user with the user password stored in the server, thereby performing authentication. For another example, the server may generate a verification code and send the verification code to the client, the user may input the verification code at the client, and the server compares the verification code input by the user with the verification code stored in the server, thereby performing identity verification.
In the traditional identity verification process, information such as passwords and verification codes input by users can be leaked in the information transmission process, so that risks such as account theft and fund theft and brushing can be caused, and the information safety of the users can not be guaranteed.
Based on the feature information, the embodiment of the application provides an information verification method based on the feature information. Specifically, first information sent by a client is received, wherein the first information is information obtained by encrypting input information of a trigger account by the client according to an encryption mapping rule of the trigger account, the encryption mapping rule of the trigger account is generated by feature information of the trigger account, the feature information of the trigger account is used for identifying the trigger account, then second information is generated according to key information indicating the same content with the input information, the second information is information obtained by encrypting the key information by a server according to the encryption mapping rule of the trigger account, and the first information and the second information are compared to obtain an information verification result.
According to the method, an encryption mapping rule of the trigger account is generated according to the characteristic information of the trigger account, key information (such as a password and a verification code) is encrypted by utilizing the encryption mapping rule of the trigger account, and the key information and the characteristic information of a user are associated, so that even if information leakage occurs in the information transmission process, the information cannot be verified because the characteristic information of the user cannot be obtained, and the information safety of the user is protected.
Next, a detailed description will be given of an information verification method based on feature information provided in an embodiment of the present application with reference to the accompanying drawings.
Referring to fig. 1, a flow chart of a method for verifying information based on feature information is shown, which may be executed by a server, and specifically includes the following steps:
s101: the server receives first information sent by the client.
The first information is information obtained by encrypting the input information of the trigger account according to the encryption mapping rule of the trigger account by the client.
It will be appreciated that during the use of the APP by the user, the client may perform authentication. In particular, a user may input information in a client and transmit the input information to a server for verification.
In consideration of the risk of information leakage possibly occurring in the information transmission process, the client can encrypt input information of the trigger account and send the encrypted information to the server. In the embodiment of the application, different trigger accounts can correspond to different encryption mapping rules, and in particular, the encryption mapping rules of the trigger accounts can be generated by feature information of the trigger accounts.
The feature information of the trigger account is used for identifying the trigger account. In some embodiments, the characteristic information of the trigger account may include at least one of an international mobile equipment identity (international mobile equipment identity, IMEI) corresponding to the trigger account, an internet protocol (internet protocol, IP) address of the trigger account, and an identification number (identity document, ID) corresponding to the trigger account. Because the feature information of the trigger account can identify or uniquely identify the trigger account, compared with the general encryption mapping rule, the encryption mapping rule in the embodiment of the application corresponds to the trigger account, and the security of information encryption can be improved.
In some possible implementations, the server may obtain feature information of the trigger account, generate an encryption mapping rule for at least one information type according to the feature information of the trigger account, and determine the encryption mapping rule of the at least one information type as the encryption mapping rule of the trigger account.
The information types can include a number type, a letter type and a symbol type, and can also include a combination type formed by combining at least two types of the number type, the letter type and the symbol type. By generating encryption mapping rules aiming at different information types, the information encryption is enabled to be more logical, and the efficiency of the information encryption is improved.
In some embodiments, when the information type is a numeric type, the encryption mapping rule may be mapping the numeric type of information to corresponding alphabetic type of information. For example, the numbers 0 to 9 are mapped to the letters a to j by means of a matrix. Further, for another triggering account, the digits 0 through 9 may be mapped to the letters b through k by way of a matrix. Thus, encryption of digital type information is achieved for different trigger accounts.
S102: and generating second information according to the key information indicating the same content as the input information.
The second information is information obtained by encrypting the key information by the server according to the encryption mapping rule of the trigger account.
In some embodiments, the key information and the input information are indicative of a verification code. In particular implementations, in response to an information verification request triggering an account, the server may randomly generate and store key information (i.e., a verification code) and send the key information to the client. The triggering account inputs the key information received by the client, the client obtains the input information, encrypts the input information and generates first information. Further, the server encrypts the key information according to the encryption mapping rule of the trigger account based on the generated key information, and generates second information. Thus, the authentication code is encrypted locally at the server for information authentication.
In other embodiments, the key information and the input information indicate a password. In particular, the server may receive the first information sent by the client in response to an information verification request of the trigger account, for example, in response to a password input operation of the trigger account. Further, the server may encrypt the key information (i.e., the password of the trigger account) based on the key information stored in the server, and generate the second information according to an encryption mapping rule of the trigger account. Thus, the password is encrypted locally at the server for information verification.
In the embodiment of the application, the client and the server encrypt the input information or the key information indicating the same content by adopting the same encryption mapping rule generated by the characteristic information of the trigger account, so that even if information leakage occurs in the information transmission process, the encrypted information cannot be decrypted because the characteristic information of the trigger account cannot be obtained, and the information safety of a user is ensured.
S103: the server compares the first information with the second information to obtain an information verification result.
Specifically, when the first information and the second information are the same, the server may obtain an information verification result that characterizes the verification passing. When the first information and the second information are different, the server can obtain an information verification result that the characterization verification is not passed. Thus, information verification is achieved.
Based on the above description, the embodiment of the application provides an information verification method based on characteristic information. The method comprises the steps of firstly receiving first information sent by a client, wherein the first information is information obtained by encrypting input information of a trigger account by the client according to an encryption mapping rule of the trigger account, the encryption mapping rule of the trigger account is generated by characteristic information of the trigger account, the characteristic information of the trigger account is used for identifying the trigger account, then, according to key information indicating the same content with the input information, generating second information, wherein the second information is information obtained by encrypting the key information by a server according to the encryption mapping rule of the trigger account, and comparing the first information with the second information to obtain an information verification result.
According to the method, an encryption mapping rule of the trigger account is generated according to the characteristic information of the trigger account, key information (such as a password and a verification code) is encrypted by utilizing the encryption mapping rule of the trigger account, and the key information and the characteristic information of a user are associated, so that even if information leakage occurs in the information transmission process, the information cannot be verified because the characteristic information of the user cannot be obtained, and the information safety of the user is protected.
Based on the method provided by the embodiment of the application, the embodiment of the application also provides an information verification device based on the characteristic information, which corresponds to the method. The units/modules described in the embodiments of the present application may be implemented by software, or may be implemented by hardware. Wherein the names of the units/modules do not constitute a limitation of the units/modules themselves in some cases.
Referring to the schematic structural diagram of the information verification apparatus based on feature information shown in fig. 2, the apparatus 200 includes:
the communication module 201 is configured to receive first information sent by a client, where the first information is information obtained by encrypting input information of a trigger account by the client according to an encryption mapping rule of the trigger account, the encryption mapping rule of the trigger account is generated by feature information of the trigger account, and the feature information of the trigger account is used to identify the trigger account;
a generating module 202, configured to generate second information according to key information indicating the same content as the input information, where the second information is information obtained by encrypting the key information by the server according to an encryption mapping rule of a trigger account;
and the verification module 203 is configured to compare the first information with the second information to obtain an information verification result.
In some possible implementations, the apparatus 200 further includes:
the rule determining module is used for acquiring the characteristic information of the trigger account; generating an encryption mapping rule aiming at least one information type according to the characteristic information of the trigger account; and determining the encryption mapping rule of the at least one information type as the encryption mapping rule of the trigger account.
In some possible implementations, the feature information of the trigger account includes at least one of an international mobile equipment identity IMEI corresponding to the trigger account, an internet protocol IP address of the trigger account, and an identification number ID corresponding to the trigger account.
In some possible implementations, the key information and the input information indicate a verification code, and the generating module 202 is further configured to:
randomly generating and storing key information;
the communication module 201 is further configured to:
and sending the key information to the client.
In some possible implementations, the key information and the input information indicate a password for the trigger account, the key information being stored at the server.
In some possible implementations, the at least one information type includes a digital type, and the generating module 202 is specifically configured to:
and mapping the information of the number type into the information of the corresponding letter type.
In some possible implementations, the verification module 203 is specifically configured to:
and when the first information and the second information are the same, obtaining an information verification result of the passing of the characterization verification.
The feature information-based information verification apparatus 200 according to the embodiment of the present application may correspond to performing the method described in the embodiment of the present application, and the above and other operations and/or functions of the respective modules/units of the feature information-based information verification apparatus 200 are respectively for implementing the respective flows of the respective methods in the embodiment shown in fig. 1, and are not described herein again for brevity.
The information verification method, device, server and medium based on the characteristic information provided by the application can be used in the field of network security or finance, and the information verification method, device, server and medium based on the characteristic information provided by the application are not limited in application field.
The functions described above herein may be performed, at least in part, by one or more hardware logic components. Referring to the schematic structural diagram of the server 300 for implementing information verification shown in fig. 3, it should be noted that the server shown in fig. 3 is only an example, and should not impose any limitation on the functions and application scope of the embodiments of the present application.
As shown in fig. 3, the server 300 may include a processing device (e.g., a central processing unit, a graphics processor, etc.) 301 that may perform various suitable actions and processes in accordance with programs stored in a Read Only Memory (ROM) 302 or loaded from a storage device 308 into a Random Access Memory (RAM) 303. In the RAM303, various programs and data required for the operation of the server 300 are also stored. The processing device 301, the ROM 302, and the RAM303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
In general, the following devices may be connected to the I/O interface 305: input devices 306 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 307 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 308 including, for example, magnetic tape, hard disk, etc.; and communication means 309. The communication means 309 may allow the server 300 to communicate with other devices wirelessly or by wire to exchange data. While fig. 3 shows a server 300 having various devices, it is to be understood that not all illustrated devices are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
The present application also provides a computer-readable storage medium, also referred to as a machine-readable medium. In the context of the present application, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable medium of the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
The computer readable medium carries one or more programs which, when executed by the server, cause the server to: and receiving first information sent by the client, generating second information according to key information indicating the same content with the input information, and comparing the first information with the second information to obtain an information verification result.
In particular, according to embodiments of the present application, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a non-transitory computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via a communications device, or from a storage device. The above-described functions defined in the method of the embodiment of the present application are performed when the computer program is executed by the processing device.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are example forms of implementing the claims.
While several specific implementation details are included in the above discussion, these should not be construed as limiting the scope of the application. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
The above description is only illustrative of the preferred embodiments of the present application and of the principles of the technology employed. It will be appreciated by persons skilled in the art that the scope of the disclosure referred to in the present application is not limited to the specific combinations of technical features described above, but also covers other technical features formed by any combination of the technical features described above or their equivalents without departing from the spirit of the disclosure. Such as the above-mentioned features and the technical features disclosed in the present application (but not limited to) having similar functions are replaced with each other.

Claims (10)

1. An information verification method based on characteristic information, which is applied to a server, the method comprising:
receiving first information sent by a client, wherein the first information is information obtained by encrypting input information of a trigger account by the client according to an encryption mapping rule of the trigger account, the encryption mapping rule of the trigger account is generated by characteristic information of the trigger account, and the characteristic information of the trigger account is used for identifying the trigger account;
generating second information according to key information which indicates the same content with the input information, wherein the second information is information obtained by encrypting the key information by the server according to an encryption mapping rule of a trigger account;
and comparing the first information with the second information to obtain an information verification result.
2. The method of claim 1, wherein the encryption mapping rule for the trigger account is generated by:
acquiring feature information of a trigger account;
generating an encryption mapping rule aiming at least one information type according to the characteristic information of the trigger account;
and determining the encryption mapping rule of the at least one information type as the encryption mapping rule of the trigger account.
3. The method of claim 1, wherein the characteristic information of the trigger account includes at least one of an international mobile equipment identity IMEI corresponding to the trigger account, an internet protocol IP address of the trigger account, and an identification number ID corresponding to the trigger account.
4. The method of claim 1, wherein the key information and the input information indicate a verification code, the method further comprising, prior to the receiving the first information sent by the client:
randomly generating and storing key information;
and sending the key information to the client.
5. The method of claim 1, wherein the key information and the input information indicate a password for the trigger account, the key information being stored at the server.
6. The method of claim 2, wherein the at least one information type comprises a numeric type, and wherein the encryption mapping rule comprises:
and mapping the information of the number type into the information of the corresponding letter type.
7. The method according to any one of claims 1 to 6, wherein said comparing said first information with said second information to obtain an information verification result comprises:
and when the first information and the second information are the same, obtaining an information verification result of the passing of the characterization verification.
8. An information verification apparatus based on characteristic information, the apparatus comprising:
the communication module is used for receiving first information sent by a client, wherein the first information is information obtained by encrypting input information of a trigger account by the client according to an encryption mapping rule of the trigger account, the encryption mapping rule of the trigger account is generated by characteristic information of the trigger account, and the characteristic information of the trigger account is used for identifying the trigger account;
the generation module is used for generating second information according to the key information which indicates the same content with the input information, wherein the second information is information obtained by encrypting the key information by the server according to the encryption mapping rule of the trigger account;
and the verification module is used for comparing the first information with the second information to obtain an information verification result.
9. A server comprising a processor and a memory, the memory having instructions stored therein, the processor executing the instructions to cause the server to perform the method of any of claims 1 to 7.
10. A computer readable storage medium comprising computer readable instructions which, when run on a server, cause the server to perform the method of any one of claims 1 to 7.
CN202310671670.5A 2023-06-07 2023-06-07 Information verification method, device, server and medium based on characteristic information Pending CN116760585A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310671670.5A CN116760585A (en) 2023-06-07 2023-06-07 Information verification method, device, server and medium based on characteristic information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310671670.5A CN116760585A (en) 2023-06-07 2023-06-07 Information verification method, device, server and medium based on characteristic information

Publications (1)

Publication Number Publication Date
CN116760585A true CN116760585A (en) 2023-09-15

Family

ID=87952621

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310671670.5A Pending CN116760585A (en) 2023-06-07 2023-06-07 Information verification method, device, server and medium based on characteristic information

Country Status (1)

Country Link
CN (1) CN116760585A (en)

Similar Documents

Publication Publication Date Title
EP3319292B1 (en) Methods, client and server for checking security based on biometric features
CN109150499B (en) Method and device for dynamically encrypting data, computer equipment and storage medium
CN110519309B (en) Data transmission method, device, terminal, server and storage medium
CN108566381A (en) A kind of security upgrading method, device, server, equipment and medium
US20210092108A1 (en) Non-custodial tool for building decentralized computer applications
KR20100016579A (en) System and method for distribution of credentials
CN111666564B (en) Application program safe starting method and device, computer equipment and storage medium
CN113836506A (en) Identity authentication method, device, system, electronic equipment and storage medium
CN114363088B (en) Method and device for requesting data
CN110545542B (en) Main control key downloading method and device based on asymmetric encryption algorithm and computer equipment
CN107548542B (en) User authentication method with enhanced integrity and security
CN110601836B (en) Key acquisition method, device, server and medium
CN112862484A (en) Secure payment method and device based on multi-terminal interaction
CN112202794A (en) Transaction data protection method and device, electronic equipment and medium
CN112150151B (en) Secure payment method, apparatus, electronic device and storage medium
CN114117404A (en) User authentication method, device, equipment, system and storage medium
CN114117388A (en) Device registration method, device registration apparatus, electronic device, and storage medium
CN113946862A (en) Data processing method, device and equipment and readable storage medium
CN114172923A (en) Data transmission method, communication system and communication device
CN116760585A (en) Information verification method, device, server and medium based on characteristic information
CN114598478B (en) Data encryption method, device, electronic equipment and storage medium
KR101511451B1 (en) Method of encryption to keyboard input information
CN112769565B (en) Method, device, computing equipment and medium for upgrading cryptographic algorithm
CN114785560B (en) Information processing method, device, equipment and medium
CN117522417B (en) Transaction security verification method and device based on quantum encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination