Unlock instant, AI-driven research and patent intelligence for your innovation.

An authentication method and device

An authentication method and an authentication server technology, which are applied in the field of authentication methods and devices, can solve problems such as cumbersome operations and poor user experience, and achieve the effect of improving user experience and simplifying the authentication process

Active Publication Date: 2020-06-26
XINHUASAN INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Applying the above method can successfully authenticate the target user, but each time the third-party application client accesses the protected resources, it needs to authorize the login and repeat the above process, which is cumbersome and poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method and device
  • An authentication method and device
  • An authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0059] figure 1 It is a schematic flow diagram of the first authentication method provided in the embodiment of this application. The method is applied to the access point device, including:

[0060] S101: When the target user terminal accesses the network for the first time, receive a network connection request sent by the target user through a third-party application client, parse and save a verification code from the received network connection request.

[0061] The above-mentioned targ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an authentication method and device, and relates to the technical field of the Internet. The method and device are used for access point equipment. The method comprises the steps: receiving a network connection request sent by a target user through a third-side application client when a target user terminal accesses to a network for the first time, analyzing a verification code from the received network connection request, and storing the verification code; transmitting the analyzed verification code to an authentication server after the authentication of the target user is passed; obtaining the verification code and an access token from the authentication server when the target user terminal accesses to the network again, and enabling the access token to serve as a first access token; obtaining the identity information of the target user from the authentication server according to the first access token if the verification code returned by the authentication server is the same as a verification code stored locally, and determining that the authentication of the target user is passed. According to the scheme of the invention, the method simplifies the authentication, and improves the user experience.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular to an authentication method and device. Background technique [0002] With the increasing use of distributed network services and cloud computing, many third-party application clients need to access some server-managed resources, but these resources are generally protected, requiring resource owners to pass private certificates (username and password, etc.) to authenticate the target user used when the target user terminal where the third-party application client is located accesses the network. [0003] In order for the third-party application client to access the protected resources, the resource owner needs to disclose his private certificate to the third-party application client, which may cause the third-party application client to have too much permission to use the above resources. This leads to user resource leakage. [0004] In order to meet the needs of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L63/083H04L63/0876H04L63/102
Inventor 沈竺睿
Owner XINHUASAN INFORMATION TECH CO LTD