Authority authentication method, device and system

A permission authentication and permission technology, applied in the Internet field, can solve the problem of not ensuring the security of business systems, and achieve the effect of improving security and ensuring permissions

Inactive Publication Date: 2017-11-28
SHANGHAI ZHONGXIN INFORMATION DEV
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It does not guarantee the security of the business system during operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority authentication method, device and system
  • Authority authentication method, device and system
  • Authority authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without cre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an authority authentication method, device and system and relates to the technical field of internet. The method comprises the following steps: acquiring a current environmental image by a terminal at which a logged user is positioned; transmitting the current environmental image to a server, so that whether a to-be-authenticated facial image exists in the current environmental image or not is judged when the server detects that an image of image acquisition equipment does not exist in the current environmental image; if yes, judging whether the to-be-authenticated facial image is similar to a prestored target facial image of the logged user; if no, transmitting authentication failure prompt information to the terminal; and executing a preset operating mode based on the authentication failure prompt information, thereby ensuring the authority of the logged user. According to the method, real identity authentication of the user is realized by performing face detection on the acquired environmental image, the authority of the logged user is ensured, and the security of the system is improved.

Description

technical field [0001] The present invention relates to the technical field of the Internet, in particular, to a method, device and system for authorization authentication. Background technique [0002] As information technology is more and more widely used in various fields of society, it also brings severe challenges to information security. In the session verification method adopted by today's computer business systems, the server finds the corresponding session information in the memory according to the user session ID, and judges the validity of the user's operation. It does not guarantee the security during the operation of the business system. Contents of the invention [0003] The object of the present invention is to provide an authority authentication method, device and system to improve the above problems. In order to achieve the above object, the technical scheme that the present invention takes is as follows: [0004] In the first aspect, an embodiment of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06K9/00H04L29/06
CPCH04L63/0861G06F21/32G06V40/172
Inventor 胡东平钟诗慧
Owner SHANGHAI ZHONGXIN INFORMATION DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products