Identity authentication method and device, agent server and storage medium

A technology of identity authentication and proxy service, applied in the data processing field of master-slave architecture, it can solve the problems of no verification function, illegal verification, no verification or storage information, etc.

Active Publication Date: 2019-01-01
SHANGHAI DAMENG DATABASE
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, the proxy server starts and stops more frequently than the central client, so the proxy server generally sends relevant information to the central client; at the same time, the proxy server is only used as the central client to monitor or deploy in the user device, etc. The proxy function exists only for monitoring or deploying the operation of each user device. Therefore, the proxy server verifies the legitimacy of the central client. First, there is no verification function at all. Since the proxy server is configured on the user device, it needs to face All kinds of users, so considering the issue of data security, generally do not store relevant verification or storage information, and if the verification or storage information is added to the proxy server, it will also affect the characteristics of the proxy server itself; the second is When there is a verification function, it is necessary to store the corresponding verification file locally on the proxy server to verify the central client. At this time, the verification file stored locally is for various user devices, and there is a risk of deletion or illegal use.
[0004] To sum up, the existing verification methods in the single central client-multiple proxy server mode, because the relevant verification or stored information is easily lost in the local storage of the proxy server, there will be certain risks of verification failure and illegal verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device, agent server and storage medium
  • Identity authentication method and device, agent server and storage medium
  • Identity authentication method and device, agent server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] Figure 1A It is a flow chart of an identity authentication method provided by Embodiment 1 of the present invention. This embodiment is applicable to applications such as unified monitoring and deployment of user equipment through a single central client-multiple proxy server mode. An identity authentication method provided in this embodiment can be executed by an identity authentication device provided in an embodiment of the present invention. The device can be realized by means of software and / or hardware, and integrated in the proxy server executing the method. In this embodiment, the proxy server executing the method may be any terminal that requires unified monitoring and deployment, such as a tablet computer, a desktop computer, and a notebook. Specifically, refer to Figure 1A , the method may include the following steps:

[0038] S110, when it is detected that the agent program of the local machine starts, an identity request is sent to the central client, whe...

Embodiment 2

[0054] Figure 2A It is a flow chart of an identity authentication method provided by Embodiment 2 of the present invention. This embodiment is optimized on the basis of the foregoing embodiments. Since the identity authentication code cached on the central client and proxy server is only valid at runtime, if the central client is closed or restarted, the identity authentication code on it will be automatically destroyed, and in order to maintain the identity of the central client and proxy server The consistency of the authentication code ensures data security. At this time, the identity authentication code cached by the proxy server needs to be regenerated by the central client to update the cache. Specifically, such as Figure 2A As shown, the following steps may be included in this embodiment:

[0055] S210, when it is detected that the agent program of the local machine starts, an identity request is sent to the central client, where the identity request includes the id...

Embodiment 3

[0075] Figure 3A It is a flow chart of an identity authentication method provided by Embodiment 3 of the present invention. This embodiment is based on the above-mentioned embodiments, an interactive process for identity authentication between the central client and the proxy server. The specific interactive process is as follows: Figure 3B shown. refer to Figure 3A , the method of this embodiment may specifically include the following steps:

[0076] S310, when the proxy server detects that the proxy program is started, it sends an identity request to the central client, where the identity request includes identification information of the proxy server.

[0077] S311. The central client receives the identity request sent by the proxy server, generates an identity authentication code of the proxy server according to the identification information, and sends it to the proxy server.

[0078] Optionally, when the central client receives the identity request sent by the pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an identity authentication method and device, an agent server and a storage medium. The method comprises the steps of: when it is detected that an agent program of a local is started, sending an identity request to a center client, wherein the identity request comprises the identification information of the local; receiving an identity authentication codefrom the center client, and performing cache for the identity authentication codes during the operation of the agent program; receiving a transfer request of the center client, and performing identityauthentication for the center client according to the identity authentication codes carried in the transfer request and the identity authentication codes cached on the local. According to the technical scheme provided by the embodiment of the invention, the instant obtaining and the cache for the identity authentication codes by the agent server when the agent program is started each time so as to ensure the timeliness of identity authentication information and reduce the risk caused by verification failure and illegal authentication because identity authentication information is easily lostand easily obtained.

Description

technical field [0001] The embodiment of the present invention relates to the field of data processing of a master-slave architecture, in particular to an identity authentication method, device, proxy server and storage medium. Background technique [0002] At present, the network architecture in the software system mainly applies the client-server (Client / Server, C / S) architecture model, and the C / S architecture can be divided into multiple clients-single server and single central client-multiple There are two main modes of proxy server. In order to ensure the legitimacy of the client and the security of the data interaction during data interaction, when verifying the identity of the client, the multiple clients-single server mode mainly pre-stores the identity information of each client on the server. The corresponding client sends a verification message containing its own information to the server, and compares it with the pre-stored identity information to judge the leg...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/568
Inventor 郑靖博杨超
Owner SHANGHAI DAMENG DATABASE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products