Supercharge Your Innovation With Domain-Expert AI Agents!

Authentication system and method

An authentication and authentication request technology, which is applied in the field of information security, can solve the problems that the availability of the authentication system cannot be guaranteed, and achieve the effect of improving the quality of authentication services, reducing access delays, and improving availability

Active Publication Date: 2020-09-18
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem that the availability of the authentication system cannot be guaranteed in the prior art, the embodiment of the present invention provides an authentication system and method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication system and method
  • Authentication system and method
  • Authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0041] Before introducing the embodiments of the present invention, the "authorization" and "authentication" involved in the embodiments of the present invention are first explained.

[0042] Authorization refers to granting certain permissions to users. For example, the service provider grants the user the right to perform a certain operation, the service provider grants the user the access right to a certain resource, and the service provider grants the user the right to perform a certain operation on a certain resource. By granting permissions to users, service providers can help service providers securely control their users' access to their resources. For example, control which users can access resources, and control which resource...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An authentication system and method, and a server (1000). The authentication system comprises a service access layer (21), an authentication logical layer (22), and a data storage layer (23). The service access layer (21) comprises multiple service access servers (21a), the authentication logical layer (22) comprises multiple authentication logical servers (22a), and the data storage layer (23) comprises a primary database (23a) and multiple secondary databases (23b). Servers and databases on all layers are deployed in a cross-region manner. A target service access server (21a1) is used for receiving an authentication request (501, 801) sent by a service provider, and sending the authentication request to a target authentication logical server (22a1). The target authentication logical server (22a1) is used for obtaining an authorization policy (503) related to the authentication request from a target secondary database (23b1), performs analysis processing on the authentication request according to the obtained authorization policy, so as to obtain an authentication result (504), and sends the authentication result (505) to the target service access server (21a1). The target service access server (21a1) is further used for sending the authentication result (506, 508) to the service provider. The method improves the usability of the authentication system, and reduces the access delay, thereby improving the overall authentication service quality.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular to an authentication system and method. Background technique [0002] Authentication refers to verifying whether a user has certain permissions. An authentication system refers to a system for providing authentication services to authenticate user operations. [0003] Please refer to figure 1 , which shows a schematic diagram of an authentication system provided by the prior art. The authentication system includes: a service access layer 11 , an authentication logic layer 12 and a data storage layer 13 . The service access layer 11 is used to provide an authentication interface to the service provider, and the service provider sends an authentication request to the service access layer 11 by calling the authentication interface. The service access layer 11 may include multiple service access servers 11a. The service access layer 11 is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/20G06F21/31
CPCG06F11/202G06F21/31
Inventor 袁哲
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More