Unlock instant, AI-driven research and patent intelligence for your innovation.

An authentication method, device and system

A technology for authentication and authentication information, which is applied in the fields of authentication methods, devices and systems, and can solve problems such as no authentication methods.

Active Publication Date: 2021-03-30
ALIBABA GRP HLDG LTD
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is currently no effective authentication method to identify whether the user who accesses the resource has access rights, that is, whether it is a legitimate user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method, device and system
  • An authentication method, device and system
  • An authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are the Claim some of the examples, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0057] With the development of network technology, resource sharing on the network is becoming more and more common, and resource providers can share resources stored in servers with other users through the network. Especially with the emergence of the fifth generation of Hypertext Markup Language (English: Hyper Text Markup Language 5, abbreviation: HTML5), it becomes possible to sh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an authentication method, device and system. A server and a legal user preset a key. When a resource request sent by a to-be-authenticated user is received, the server authenticates whether authentication information in the resource request is legal or not through utilization of the preset key and a first identity in the resource request. The first identity is used for identifying the legal user relative to a resource. The legal authentication information is obtained by carrying out encryption through the first identity and the key. If it is judged that the authentication information is obtained by carrying out the encryption through the first identity and the key, the to-be-authenticated user is determined as the legal user with the access authority of the resource according to the authentication information. The server has a function of effectively authenticating the access authority of the user accessing the resource.

Description

technical field [0001] The present application relates to the field of data processing, in particular to an authentication method, device and system. Background technique [0002] With the development of network technology, resource sharing on the network is becoming more and more common, and resource providers can share resources stored in servers with other users through the network. The general resource sharing process is that the resource provider provides the resource address of the shared resource on the network in various sharing ways, and other users finally use the resource address to access the corresponding resource according to the sharing method of the resource provider, so as to realize resource sharing on the network. [0003] In general, resource providers hope to provide resources to legitimate users who have permission to access the resources, and do not want irrelevant users to access the resources. However, the third party will always try to obtain the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/08H04L63/10
Inventor 魏晋
Owner ALIBABA GRP HLDG LTD