Identity verification method, server and readable storage medium

An identity verification method and identity verification technology, applied in the fields of identity verification methods, servers and readable storage media, can solve the problems of resource security on the server side, malicious calls, etc., to prevent malicious calls and improve security sexual effect

Active Publication Date: 2017-12-15
WUHAN DOUYU NETWORK TECH CO LTD
View PDF5 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the API rules are open to developers, adopting such a user authentication method may cause the functional interface of the server of other applications logged in through the applet function to be maliciously invoked, and the security of resources on the server side cannot be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method, server and readable storage medium
  • Identity verification method, server and readable storage medium
  • Identity verification method, server and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0049] Please refer to figure 1 , the first embodiment of the present invention provides an identity verification method, which is applied to the server of the first application program, and the identity verification method includes the following steps:

[0050]S101: Apply for a first access authentication token, the first access authentication token is applied by the server to the second application when logging in to the first application through the applet function of the second application An access authentication token generated based on the corresponding rules of the second application;

[0051] S102: Convert the first access authentication token into a second access authentication token based on the identity verification rule of the first application;

[0052] S103: Verify the identity of the request object based on the second access authentication token when it is detected that the functional interface of the server is requested.

[0053] Specifically, in this embodi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an identity verification method, a server and a readable storage medium. The identity verification method is used for preventing a function interface of the server from being called maliciously, and the resource safety of a server-side is improved. The method is applied to the server of a first application program. The method comprises the steps that a first access authentication token is acquired, and the first access authentication token is the access authentication token generated based on a rule corresponding to a second application program when the server logs into the first application program through a small program function of the second application program; based on an identity verification rule of the first application program, the first access authentication token is converted into a second access authentication token; when it is detected that the function interface of the server-side is requested, based on the second access authentication token, an identity of a request object is verified.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to an identity verification method, a server and a readable storage medium. Background technique [0002] The applet function of an application is a function that can use other applications without downloading and installing other applications. Users can open other applications by scanning or searching. For example: after the mini-program in the WeChat application program can search for the application program A, the user can open the application program A through the mini-program of the WeChat application program. When other applications develop mini-programs, they must adapt to the API (Application Programming Interface, Application Programming Interface) rules of the application to which the function of the mini-program belongs to perform user authentication. Since the API rules are open to developers, adopting such a user authentication method may cause the functional inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L9/3236H04L63/08
Inventor 张翔张文明陈少杰
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products