Data authentication method and apparatus

A data and authentication technology, applied in the field of data processing, can solve the problems of long authentication time, low efficiency, and waiting for the authentication result.

Active Publication Date: 2017-04-05
ALIBABA GRP HLDG LTD
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the current authentication process, the server needs to complete the authentication of all the data requested by the client before returning the authentication result to the client. The authentication time is long and the efficiency is very low.
Especially when the amount of data requested by the client is large, the server may be stuck, etc.
As a result, the client often waits for the authentication result for too long or even fails to wait for the authentication result, and the user experience is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data authentication method and apparatus
  • Data authentication method and apparatus
  • Data authentication method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0123] image 3 A device structure diagram of a data authentication device provided by an embodiment of the present invention, the device includes:

[0124] The acquisition unit 301 originally acquires a data acquisition request sent by a client, the data acquisition request includes a client identifier and a data set requested to be acquired, the data set includes N data, and N is greater than or equal to 2.

[0125] The first judging unit 302 is configured to judge whether N is greater than a first threshold, and if so, trigger the extraction unit.

[0126] The extraction unit 303 is configured to extract M pieces of unauthenticated data from the N pieces of data, and save the extraction record, and the unauthenticated data is the data that has not been corresponding to the client through the authentication server by the server For the authenticated data, the extraction record is used to record the data information of the extracted data, M

[0127] The authentication un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the invention disclose a data authentication method and apparatus. The method comprises the following steps: obtaining by a server the data obtaining request sent from a customer terminal wherein the data obtaining request includes customer terminal identification and a data set requested to be obtained and the data set includes N data; determining whether N is greater than a first threshold value or not; and if N is greater, extracting M unauthenticated data from the N data and recording the extraction record; using the authentication server to conduct authentication to the M unauthenticated data from the corresponding customer terminal so as to determine the right confirmation data; and based on the customer terminal identification, returning to the customer terminal the right confirmation data and the extraction record wherein the extraction record is used to indicate the extraction record returned to the server when the customer terminal completes data display. Therefore, all that needs to be done is authenticate some parts of the data and then, right confirmation data can be returned to the customer terminal, reducing the time of the customer terminal to wait for an authentication result and increasing the user's use experience.

Description

technical field [0001] The invention relates to the field of data processing, in particular to a data authentication method and device. Background technique [0002] The client can obtain the data requested by the data request from the server by sending a data request to the server. In order to consider the security of sensitive data, permissions are generally set for data and clients, and clients can only obtain data corresponding to their permissions. Therefore, in the process of the client requesting data from the server, the server needs to authenticate the data requested by the client, and determine which data the client has the right to obtain in the requested data through authentication, and will have The data obtained with permission is returned to the client. [0003] In the current authentication process, the server needs to complete the authentication of all the data requested by the client before returning the authentication result to the client. The authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/10H04L65/40
Inventor 王铎
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products