Unlock instant, AI-driven research and patent intelligence for your innovation.

An authentication method, device and system

A technology for authentication and authentication information, applied in the field of data processing, which can solve the problems of cumbersome operations and occupying extra space on the server

Active Publication Date: 2015-09-09
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the technical problem to be solved by this application is to provide a second temporary authorization processing method and device, which can solve the problem of cumbersome operation of the server of the software system due to temporary authorization application and occupying extra space on the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method, device and system
  • An authentication method, device and system
  • An authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to more clearly describe the implementation of the authentication method, device and system of the present application, the applicable system structure of the present application will be described first. For example, the authentication method, device and system of this application can be applied to figure 1 shown in the software system, where,

[0029] The client 110 directly faces the user and provides a platform for the user to perform various business operations; when the user performs operations, the client 110 and the server 120 perform data interaction to realize various business operations of the user.

[0030] Hereinafter, implementations of the authentication method, device and system of the present application will be described in detail in conjunction with the accompanying drawings.

[0031] figure 2 It is a schematic flow chart of the first embodiment of the authentication method of this application, as shown in figure 2 As shown, the method in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method, an authentication device and an authentication system. The authentication method includes receiving menu ID and first user ID which are transmitted by a client, transmitting first indication information which is used for indicating the client to display authentication information input interface for users to the client when judging that the first user ID has no authority limit to operate corresponding business of the menu ID, receiving the authentication information transmitted by the client while the authentication information is acquired by the client through the authentication information input interface, judging whether the authentication information meets the authentication conditions that the menu ID corresponds to and sending second indication information to the client on yes judgment. The second indication information is used for indicating temporary authorization of the client to distribute corresponding businesses of the menu ID for the first user ID. The method, the device and the system are capable of resolving the problem of low data processing efficiency caused by temporary authorization application of a server of a software system.

Description

technical field [0001] The present application relates to data processing technology, in particular to an authentication method, device and system. Background technique [0002] In the software system, it is necessary to control the authority of the operator in the system. If the operator has the operation authority of a certain business, he can perform the operation, and if he does not have the authority, he cannot perform the operation. [0003] If the operator wants to perform a certain business operation in the software system, the system administrator needs to authorize the operator. Such authorization includes long-term authorization and temporary authorization. [0004] Every time an operator obtains a temporary authorization process, the following process is required: the operator applies for a temporary authorization for a certain business operation on the client side, and the client side where the operator is located sends the temporary authorization application t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31H04L9/32H04L29/06
Inventor 陈国良
Owner HUAWEI TECH CO LTD