Identity authentication method, device and client

An identity authentication device and identity authentication technology are applied in the field of identity authentication methods, devices and clients, which can solve problems such as low security, service access keys are easy to leak security, and the acquisition and use of keys is cumbersome, so as to improve security. , The effect of simplifying the identity authentication process

Active Publication Date: 2017-10-13
GUANGZHOU XUANWU WIRELESS TECH CO LTD
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The entire process of obtaining and using the key is cumbersome, and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and client
  • Identity authentication method, device and client
  • Identity authentication method, device and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0048] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0049] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the description.

[0050] In all examples shown and discussed herein, any specific values ​​should be construed as exemplary only, and not as limitations. Therefore, other instances of the exemplary embodiment may have dif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an identity authentication method, an identity authentication device and a client. The identity authentication method comprises the following steps that: the client sends a request for obtaining a verification code and parameter information corresponding to the request to a server; the server generates the verification code according to the request; the client performs calculation according to the verification code and the parameter information to obtain a first calculation result and adopts the first calculation result as the signature of a current API request; the server performs calculation to obtain a second calculation result according to the parameter information and a client key stored in the server by the client; whether the second calculation result is identical with the signature in the API request is judged through comparison; and an identity authentication result is generated according to a comparison result. With the identity authentication method, the identity authentication device and the client adopted, an identity authentication process is simplified, and the security of identity authentication is improved.

Description

technical field [0001] The present invention relates to the communication field, and more specifically, to an identity authentication method, device and client. Background technique [0002] REST is a popular web application interaction method based on HTTP protocol in the Internet environment. Since this communication method is efficient, lightweight, and cross-platform, it is also very suitable for scenarios where mobile Internet applications call server-side network service APIs. [0003] The full name of REST is Representational State Transfer, which means representational stateless transfer. Since it is based on the HTTP protocol, it is also stateless and does not require a session, so each request must bring identity authentication information. The current practice is generally a digital signature authentication method based on the API key and service access key mechanism. [0004] Generally speaking, before the user can call the REST interface, he first needs to app...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/08
Inventor 韦长英陈永辉
Owner GUANGZHOU XUANWU WIRELESS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products