Authentication method, device, system and storage medium

An authentication and authority technology, applied in the security field, can solve problems such as low authentication speed, and achieve the effect of improving security and high security

Active Publication Date: 2021-03-05
HUAWEI TECH CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem of low authentication speed in the prior art, the embodiment of the present invention provides an authentication method, device, system and storage medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device, system and storage medium
  • Authentication method, device, system and storage medium
  • Authentication method, device, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0088] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0089] Please refer to figure 1 , which shows a schematic diagram of an implementation environment involved in various embodiments of the present application, and the implementation environment may include: a client 01 , an application 02 and a user center 03 . The client 01 can respectively establish connections with the application 02 and the user center 03 , and the application 02 can establish connections with the user center 03 . Both the client 01 and the application 03 can have at least one, and the user center 03 can have one. Among them, the client 01, the application 02 and the user center 03 can all be programs running on terminals (terminals can include mobile phones, tablets, computers, laptops, digital cameras or s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses an authentication method, device, system and storage medium, belonging to the field of security technology. The method includes: the application obtains the client ID of the client generated by the user center, and the client ID is an ID assigned by the user center after the client logs in at the user center; when the application receives the authentication information including the authorization certificate sent by the client , verify the authority of the authorization certificate through the client ID, the authorization certificate is sent to the client by the user center, and is used to cooperate with the client ID to prove the client's authority; when the authorization certificate passes the authority verification, the application allows the client to perform access. In this application, each application locally uses the authority information in the authorization certificate to perform the authentication operation, without going to the authentication service provided by the user center for centralized authentication. Compared with the centralized authentication method in the related art, the authentication speed is improved by a discrete authentication method.

Description

technical field [0001] The present application relates to the field of security technology, in particular to an authentication method, device, system and storage medium. Background technique [0002] Authentication (English: authentication) refers to verifying whether the client has the right to access an application (the application can be a program for providing business functions). [0003] The authentication system usually includes a user center, multiple clients and multiple applications. When a client accesses an application, it will send the token (English: Token) provided by the user center to the application, and the application will The token is sent to the user center, and the token is verified by the user center. When the token is verified, the user center notifies the application to allow the client to access. [0004] The above-mentioned method of centralized authentication through the user center may cause the user center to verify the token slowly due to the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06H04L9/32
CPCH04L9/0866H04L9/3247H04L63/0807H04L63/10H04L9/08H04L9/32H04L63/0815H04L63/08
Inventor 张胜泉陈开权李爱华
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products