Identity authentication method, device and system

A technology for identity verification and identity verification information, applied in transmission systems, electrical components, etc., can solve problems such as slow speed of verifying identity information, poor user experience, and high pressure on information processing

Inactive Publication Date: 2016-08-17
LETV HLDG BEIJING CO LTD +1
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, only using the dispatch center server to identify users with tens of millions of data volumes requires not only high-end configuration of the server's hardware, but also the use of complex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and system
  • Identity authentication method, device and system
  • Identity authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the drawings in the embodiments of the present disclosure. Obviously, the described embodiments It is a part of the embodiments of the present disclosure, but not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present disclosure.

[0034] refer to figure 1 , which shows a flow chart of the identity verification method in the first embodiment of the present disclosure.

[0035] like figure 1 As shown, authentication methods can include:

[0036] Step 101: the CDN node receives a service access request and obtains user identity verification information.

[0037] In t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an identity authentication method, device and system. The method comprises the steps that CDN nodes receive a service access request and acquire identification authentication information of users; whether the acquired identity authentication information is in a prestored identity information base or not is queried; if yes, identity authentication succeeds; if not, identity authentication fails, or the acquired identity authentication information is further sent to a center service for identity authentication auditing through a central identity information base. Accordingly, by authenticating the user identity through the CDN nodes, the user identity authentication speed can be significantly increased, the crowded condition of a network can be relieved, and the resource access efficiency of the users is improved. In addition, the CDN nodes can be regionally arranged in a distributed mode to authenticate the identity information of the users in the regional range of the CDN nodes, the user identity authentication speed can be further increased, the resource access efficiency of the users is improved, and the user experience is improved.

Description

technical field [0001] The embodiments of the present disclosure relate to the technical field of network communication, and in particular, to an identity verification method, device and system. Background technique [0002] With the rapid development of network technology, more and more people will choose to watch or download video programs online. More prominently, the LeTV media resource library provides LeTV members with excellent network resources such as various types of film and television works. Usually, an excellent network resource provider has a large number of members, for example, the number of members reaches tens of millions. Usually, network resource providers will provide high-quality services to members only after verifying their identities. [0003] Existing technologies usually distribute network resources to members through a CDN (Content Delivery Network, content distribution network). Among them, CDN is a layer of intelligent virtual network based o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/10
Inventor 李洪福马宙
Owner LETV HLDG BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products