×

Tolerant key verification method

  • US 8,386,775 B2
  • Filed: 08/13/2010
  • Issued: 02/26/2013
  • Est. Priority Date: 05/31/2010
  • Status: Expired due to Fees
First Claim
Patent Images

1. A tolerant key verification method, comprising the steps of:

  • generating a first key instantly according to a plurality of first characteristic values from a user terminal;

    transmitting the first key to a verification server;

    comparing the first key with a data stored in the verification server;

    when the data in the verification server matches the first key, the verification server makes no response to the user terminal and requests a network-service server to provide a network service to the user terminal;

    when the data doesn'"'"'t match the first key, the verification server makes no response to the user terminal; and

    when the data is not available, the verification server makes no response to the user terminal and requests a message server to send a key-regeneration signal to the user terminal such that the user terminal generates a second key instantly according to a plurality of second characteristic values and transmits the second key to the verification server so that the verification server saves the second key and requests the network-service server to provide the network service to the user terminal, wherein the message server and the verification server are whether the same server or two different servers.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×