An operation right judgment system and method realized by introducing right judgment client end

A business authentication and client technology, applied in the field of authentication system, can solve the problem of heavy load on the authentication server, achieve the effects of reducing construction and expansion costs, speeding up processing speed, and improving scalability

Active Publication Date: 2008-07-09
CHINA MOBILE COMM GRP CO LTD
View PDF5 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a system that introduces an authentication client to implement service authentication and a service authentication method based on the system, so as to solve the above-mentioned problem of excessive communication between the authentication server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An operation right judgment system and method realized by introducing right judgment client end
  • An operation right judgment system and method realized by introducing right judgment client end
  • An operation right judgment system and method realized by introducing right judgment client end

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0045] The first implementation mode: the authentication data is a token, the token is generated by the authentication server, the authentication client stores the token, the service request carries the token, and the service platform only verifies the validity of the token;

[0046] The second implementation mode: the authentication data is a token and / or connection information, the token is generated by the authentication server, and the connection data is preset on the service platform, the authentication client stores the token and related connection information, and the service request carries Connection information, the service platform compares the connection information in the service request with the preset connection data to verify the validity;

[0047] The third implementation mode: the authentication data is a token, the authentication client downloads the necessary service authentication information from the authentication server, the authentication client stores ...

specific Embodiment 2

[0061] Specific embodiment two specifically comprises the following steps:

[0062] Step 201: the application client initiates an authentication data request instruction to the authentication client;

[0063] Step 202: After receiving the authentication data request instruction, the authentication server checks the status of the saved token, if it finds that there is no token or the token is invalid, execute step 203, and if the token is valid, execute step 209;

[0064] Step 203: the authentication client sends an authentication data request instruction to the authentication server;

[0065] Step 204: The authentication server verifies the legitimacy of the user's identity after receiving the authentication data request instruction, if it is legal, execute step 205, otherwise execute step 212;

[0066] Step 205: the authentication server notifies the service platform to establish relevant connection information;

[0067] Step 206: The service platform establishes and saves ...

specific Embodiment 3

[0076] Specific embodiment three comprises the following steps:

[0077] Step 301: the application client initiates an authentication data request instruction to the authentication client;

[0078] Step 302: After receiving the authentication data request instruction, the authentication client checks the status of the stored authentication information. If no authentication information is found or the authentication information is invalid, execute step 303; otherwise, execute step 306;

[0079] Step 303: the authentication client sends an authentication data request instruction to the authentication server;

[0080] Step 304: The authentication server generates corresponding authentication information after receiving the authentication data request instruction, and sends the authentication information to the authentication client;

[0081] Step 305: the authentication client stores the authentication information;

[0082] Step 306: The authentication client verifies the legit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system used for realizing the business authentication by adopting an authentication client end, and comprises an application client side, an authentication server, an authentication client side and a business platform; wherein, the authentication client side which is communicatively connected with the application client side is used for the pre-store of authentication data, receiving the request instructions of authentication data of the application client side and returning the related authentication data to the application client side; the business platform which is communicatively connected with the application client side is used for receiving business requests consisting of the authentication data sent by the application client side, verifying the authentication data and returning verifying results to the application client side. The invention also discloses a method which realizes the business authentication by adopting the authentication client side based on the system. The invention which increases a new module of the authentication client side finishes the function of business authentication together with the authentication server and the business platform and has the advantages of reducing the processing pressure of the authentication server, improving the expansibility of the business authentication system and decreasing the construction and dilation cost of the authentication server.

Description

technical field [0001] The invention relates to an authentication system and method for communication services, in particular to an authentication system and method for completing authentication through information interaction between a service platform and an authentication server. Background technique [0002] At present, the authentication methods adopted by the communication service all complete the authentication through the information interaction between the service platform and the authentication server. Such as figure 1 As shown, after a user initiates a service request through the application client 10, the service platform 12 communicates with the authentication server 11 after receiving the service request to determine whether the user can use the application. If authentication server 11 gives the response of authentication success, the user just can start to use this application, otherwise if authentication server 12 gives the response of authentication failure...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 周华段翔唐华斌周彬
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products