Method and device for processing authentication information

A technology of authentication information and processing methods, applied in data processing applications, commerce, instruments, etc., can solve problems such as unfavorable user experience consistency, authentication information dispersion, redundancy, etc., to achieve simple and fast access, improve consistency, and fast The effect of development

Inactive Publication Date: 2018-06-29
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

From a business point of view, the processing of authentication information is undertaken by the product lines separately, and the authentication information is scattered, redundant, and may even contradict each other, which is not conducive to the standardization of authentication inf

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing authentication information
  • Method and device for processing authentication information
  • Method and device for processing authentication information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] In this embodiment, another authentication information processing method is proposed, combining figure 2 , including the following steps:

[0060] S210. Obtain authentication information of the user.

[0061] The differentiation of authentication information is mainly reflected in two aspects, one is that the scene determines the authentication content, and the other is the authentication content itself.

[0062] For scenarios to determine authentication content, for the sake of versatility and scalability, this embodiment can locate a set of authentication information from the following dimensions for specific business scenarios:

[0063] (1), product line ID: between each product line, authentication information can include multiple copies;

[0064] (2), unique identification ID: within the product line, the same type of certification information can include multiple copies;

[0065] (3), authentication object ID: usually refers to the user's account, and can also...

Embodiment 2

[0095] In this embodiment, another authentication information processing method is proposed, combining Figure 7 , including the following steps:

[0096] S710. Acquire authentication information of the user.

[0097] In order to unify the storage form of all authentication information, combine Figure 8 As shown, this embodiment summarizes all authentication data.

[0098] First, divide the basic types of data fields according to the data form:

[0099] Text: usually includes plain text information, which may have regular restrictions, sensitive word restrictions, etc.;

[0100]Multiple choice: configurable setting options, as well as the business meaning of each option, and the processing logic of the corresponding business;

[0101] Image: You can control the number and size of uploads, support online preview, asynchronous multi-scale compression, etc.;

[0102] Time: Support time points or time periods, and configure time-triggered business processes;

[0103] Addres...

Embodiment 3

[0153] In this embodiment, another authentication information processing device is proposed, combining Figure 10 As shown in , including the following devices:

[0154] A device for obtaining authentication information of a user (hereinafter referred to as "information obtaining device") 1010;

[0155] A device for generating an authentication information model (hereinafter referred to as "generating device") 1020 according to the single item of authentication information configured by the user;

[0156]A device for configuring and analyzing authentication information (hereinafter referred to as "parsing device") 1030;

[0157] A device for updating the authentication information model through the front-end form generation control (hereinafter referred to as "updating device") 1040;

[0158] A device for computing and aggregating authentication information (hereinafter referred to as "information computing device") 1050 .

[0159] The differentiation of authentication info...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for processing authentication information. The method comprises the steps of generating an authentication information model according to single authentication information configured by a user; checking authentication information submitted by the user according to the authentication information model; and updating an authentication state of the user according to a checking result of the authentication information. According to the method, the authentication information model is generated according to the single authentication information configured bythe user, and the authentication state of the user is updated according to the checking result of the authentication information model, thereby enabling the authentication information to be unified inacquisition standard and entry and consistent in structuralization rule, ensuring the authentication information to be reused across product lines, reducing the convenience of repeated audit submission of merchants, and improving the consistency of the user experience; and the product lines can realize simple and rapid access through the configured authentication information model, thereby reducing the coupling between systems, not requiring repeated opening of the product lines, and thus being capable of supporting rapid development of new products.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and device for processing authentication information. Background technique [0002] With the combination of the Internet and commerce, user authentication has become a very important link, which is the basis for business development and risk prevention and control. At present, the authentication process for users is different for different businesses, and with the growth of business volume, there are more and more certified products, and each product needs to develop a new authentication process. [0003] For example, the existing authentication process mainly includes endorsement authentication, phone authentication, and video authentication. For endorsement certification, processes such as qualification certification, business site certification, and violation record certification are usually required; for telephone certification, processes such as customer service phone cert...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q30/00
CPCG06Q30/018
Inventor 李维之李兴会赵秀慧周剑
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products