Tolerant key verification method
First Claim
1. A tolerant key verification method, comprising the steps of:
- generating a first key instantly according to a plurality of first characteristic values from a user terminal;
transmitting the first key to a verification server;
comparing the first key with a data stored in the verification server;
when the data in the verification server matches the first key, the verification server makes no response to the user terminal and requests a network-service server to provide a network service to the user terminal;
when the data doesn'"'"'t match the first key, the verification server makes no response to the user terminal; and
when the data is not available, the verification server makes no response to the user terminal and requests a message server to send a key-regeneration signal to the user terminal such that the user terminal generates a second key instantly according to a plurality of second characteristic values and transmits the second key to the verification server so that the verification server saves the second key and requests the network-service server to provide the network service to the user terminal, wherein the message server and the verification server are whether the same server or two different servers.
1 Assignment
0 Petitions
Accused Products
Abstract
A tolerant key verification method is provided. The tolerant key verification method comprises the following steps. A first key is generated instantly according to first characteristic values from a user terminal and is transmitted to a verification server to perform a comparison. When a data in the verification server matches the first key, the verification server makes no response and asks a network-service server to provide a network service to the user terminal. When the data doesn'"'"'t match the first key, the verification server makes no response. When no data is available, the verification server makes no response and asks a message server to send a key-regeneration signal to the user terminal such that the user terminal generates a second key instantly according to second characteristic values. The verification server saves the second key and asks the network-service server to provide the network service to the user terminal.
-
Citations
12 Claims
-
1. A tolerant key verification method, comprising the steps of:
-
generating a first key instantly according to a plurality of first characteristic values from a user terminal; transmitting the first key to a verification server; comparing the first key with a data stored in the verification server; when the data in the verification server matches the first key, the verification server makes no response to the user terminal and requests a network-service server to provide a network service to the user terminal; when the data doesn'"'"'t match the first key, the verification server makes no response to the user terminal; and when the data is not available, the verification server makes no response to the user terminal and requests a message server to send a key-regeneration signal to the user terminal such that the user terminal generates a second key instantly according to a plurality of second characteristic values and transmits the second key to the verification server so that the verification server saves the second key and requests the network-service server to provide the network service to the user terminal, wherein the message server and the verification server are whether the same server or two different servers. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification