Information Security Verification Method and Terminal
First Claim
1. A terminal, comprising:
- a memory configured to;
store instructions; and
store historical information received by the terminal; and
a processor coupled to the memory and configured to execute the instructions, which cause the processor to be configured to;
obtain abstract information of to-be-verified information and an identification code from the historical information, wherein the identification code identifies a sender that sends the to-be-verified information to the terminal; and
send an information security verification request to the sender, wherein the information security verification request comprises the abstract information of the to-be-verified information; and
receive a verification result from the sender, wherein the verification result indicates whether the sender has previously sent information that matches the to-be-verified information.
1 Assignment
0 Petitions
Accused Products
Abstract
An information security verification method comprises obtaining, by a terminal, abstract information of to-be-verified information and an identification code, where the identification code is used to identify a sender that sends the to-be-verified information to the terminal, then sending an information security verification request to the sender of the to-be-verified information based on the identification code, where the information security verification request includes the abstract information of the to-be-verified information, and finally receiving a verification result from the sender, where the verification result indicates whether the sender has ever sent information same as the to-be-verified information.
0 Citations
20 Claims
-
1. A terminal, comprising:
-
a memory configured to; store instructions; and store historical information received by the terminal; and a processor coupled to the memory and configured to execute the instructions, which cause the processor to be configured to; obtain abstract information of to-be-verified information and an identification code from the historical information, wherein the identification code identifies a sender that sends the to-be-verified information to the terminal; and send an information security verification request to the sender, wherein the information security verification request comprises the abstract information of the to-be-verified information; and receive a verification result from the sender, wherein the verification result indicates whether the sender has previously sent information that matches the to-be-verified information. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An information security verification method, comprising:
-
obtaining, by a terminal, abstract information of to-be-verified information and an identification code, wherein the identification code identifies a sender that sends the to-be-verified information to the terminal; sending an information security verification request to the sender of the to-be-verified information based on the identification code, wherein the information security verification request comprises the abstract information of the to-be-verified information; and receiving a verification result from the sender, wherein the verification result indicates whether the sender has previously sent information that matches the to-be-verified information. - View Dependent Claims (8, 9, 10, 11)
-
-
12. An information security application method, comprising:
-
obtaining abstract information of to-be-verified information and an identification code, wherein the identification code identifies a sender that sends the to-be-verified information to a terminal; sending an information security verification request to the sender of the to-be-verified information based on the identification code, wherein the information security verification request comprises the abstract information of the to-be-verified information; and receiving a verification result from the sender, wherein the verification result indicates whether the sender has previously sent information that matches the to-be-verified information. - View Dependent Claims (13, 14)
-
-
15. A terminal, comprising:
-
a memory configured to store historical information that is received and sent by the RF circuit; a processor coupled to the memory and configured to obtain abstract information of to-be-verified information and an identification code from the historical information, wherein the identification code identifies a sender that sends the to-be-verified information to the terminal, and a radio frequency (RF) circuit coupled to the processor and configured to; send an information security verification request to the sender, wherein the information security verification request comprises the abstract information of the to-be-verified information; and receive a verification result from the sender, wherein the verification result indicates whether the sender has previously sent information that matches the to-be-verified information. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification