Method, device, equipment and system for executing third-party authentication

A technology of an authentication device and an execution device, which is applied in the computer field, can solve the problems of user-side performance degradation, multiple authentication protocols, and integrated authentication protocols, etc., and achieve the effects of improving user experience, reducing conversion process, and improving efficiency

Inactive Publication Date: 2012-07-25
SHANGHAI SYNACAST MEDIA TECH
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the usual third-party authentication process, it is often impossible to support the situation when the third-party authentication server has multiple different authentication protocols. One solution is to use the main authentication server corresponding to the client to replace the client to authenticate to the third party. The server executes the authentication request and obtains the authentication, but the problem with this solution is that when there are many users, it will greatly increase the burden on the main authentication server; another solution is to include support for various authentication in the client Protocol modules, the problem with this solution is that the third-party authentication server may use many types of authentication protocols, and it is difficult to integrate all types of authentication protocols on the client side, and when the client side contains too many modules, it will cause the user End use performance declines, affecting the normal use of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, equipment and system for executing third-party authentication
  • Method, device, equipment and system for executing third-party authentication
  • Method, device, equipment and system for executing third-party authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0045] figure 1 A system topology diagram of an authentication system for third-party authentication according to one aspect of the present invention is illustrated. The authentication system includes a user device for requesting third-party authentication, a first network device for assisting in performing third-party authentication, and a second network device for performing the authentication process.

[0046] Wherein, the user equipment, the first network equipment, and the second network equipment are all electronic equipment capable of automatically performing numerical calculation and / or various information processing according to pre-stored programs, and its hardware includes but not limited to Microprocessors, FPGAs, DSPs, embedded devices, etc. Wherein, the user equipment includes but is not limited to a computer, a smart phone, a PDA, and the lik...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims at providing a method, a device, equipment and a system for executing third-party authentication. The method comprises the following steps of: receiving first information to be authenticated from user equipment; when an authentication protocol type does not belong to the authentication protocol type used when network equipment executes authentication, and converting the first information to be authenticated into second information to be authenticated used when the network equipment executes the authentication; authenticating the second information to be authenticated; and feeding authentication result information back to the user equipment. The method, the device, the equipment and the system have the advantages that the application under the network environment with multiple authentication protocol types can be realized, so that the efficiency for executing the third-party authentication is increased; the times for carrying out third-party authentication are reduced, so that the use experience of a user is improved; first network equipment does not need to keep connection with the user equipment all the time and can acquire information related to the authentication process directly according to authentication identifying information, so that the load of the first network equipment is reduced.

Description

technical field [0001] The present invention relates to the computer field, in particular to a method, device, equipment and system for performing third-party authentication. Background technique [0002] In the usual third-party authentication process, it is often impossible to support the situation when the third-party authentication server has multiple different authentication protocols. One solution is to use the main authentication server corresponding to the client to replace the client to authenticate to the third party. The server executes the authentication request and obtains the authentication, but the problem with this solution is that when there are many users, it will greatly increase the burden on the main authentication server; another solution is to include support for various authentication in the client Protocol modules, the problem with this solution is that the third-party authentication server may use many types of authentication protocols, and it is di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 王文杰张小兵
Owner SHANGHAI SYNACAST MEDIA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products