User identity verification method, equipment and system in business chain

A technology of user identity and verification method, applied in the fields of identity creation request method, equipment and system, and user identity verification method, which can solve problems such as user inconvenience and cumbersome processing procedures

Active Publication Date: 2010-06-30
HUAWEI TECH CO LTD
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, each service node still needs to know the account number of the user at the next service node. During the call process of the service chain, different accounts of the user need to be used to access different service nodes. Login credentials, the processing flow is still very cumbersome and brings great inconvenience to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity verification method, equipment and system in business chain
  • User identity verification method, equipment and system in business chain
  • User identity verification method, equipment and system in business chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0041] In the embodiment of the present invention, in the process of invoking the same service chain, the user client and each service node use the same service chain user identity to call the service node in the service chain, and the service node receives from the service chain manager. The user identity analysis is requested, and when the service node obtains the user account and login credentials for the user to access the service nod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a user identity verification method, equipment and a system in a business chain, wherein the method comprises the following steps: receiving business chain calling requests containing business chain user identity marks by business nodes in the business chain; sending user identity analysis requests which comprise the business chain user identity marks andthe business node marks of the business nodes to a business chain management device by the business nodes; and making sure that users corresponding to the business chain user identity marks pass the identity verification when the business nodes receive first identity analysis result information which is sent by the business chain management device and comprises the account and logging authentication information of the users corresponding to the business chain user identity marks to visit the business nodes. When being adopted, the invention has the advantage that the user identity verification can be realized by adopting a simple process flow.

Description

Technical field [0001] The present invention relates to the field of communications, in particular to a user identity verification method, identity creation request method, equipment and system. Background technique [0002] With the enhancement of telecommunications network capabilities, third parties and even ordinary business users are required to create services. If any business needs to be developed from scratch, this will result in very low efficiency. [0003] In this regard, an open service architecture specification Parlay API interface is proposed. Through this interface, the complexity of the underlying telecommunications network protocol is shielded, so that third-party service developers can develop and use basic telecommunications without having to master professional telecommunications network knowledge. Network capability business. In addition, with the rapid development of Web technology, service-oriented architecture (SOA) has become the development trend of bus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L29/08
CPCH04L9/32
Inventor 常恒石晓旻马其锋陈维亮王环李彦
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products