Authentication method, apparatus, server, and storage medium

A storage medium and server technology, applied in the direction of electrical components, transmission systems, etc., can solve problems that affect the service or system security in the enterprise or platform, and achieve the effect of ensuring security

Inactive Publication Date: 2019-01-25
RUN TECH CO LTD BEIJING
View PDF11 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to obtain the required functions, some existing technologies send call requests to services or systems in enterprises or platforms through third-party applications, and services or systems in enterprises or platforms directly provide corresponding services to third-party applications after receiving call requests , but for enterprises or platforms with high security, not all third-party applications can call certain services provided by enterprises or platforms, therefore, it will seriously affect the security of services or systems within enterprises or platforms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, apparatus, server, and storage medium
  • Authentication method, apparatus, server, and storage medium
  • Authentication method, apparatus, server, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] figure 1 This is a flowchart of an authentication method provided in Embodiment 1 of the present invention. This embodiment can be applied to a situation in which the security of the enterprise or platform is ensured by authenticating third-party applications that access services or systems in the enterprise or platform. The method can be performed by an authentication device, which is integrated in an authentication system. Specifically, the authentication system includes a unified authentication system and a basic service module, wherein the basic service module is used to receive a call request from a third-party application, Send the authentication content in the call request to the unified authentication system, and the unified authentication system is used to authenticate the received authentication content to identify whether the third-party application has the right to call the service provided by the basic service module, wherein , the authentication content ca...

Embodiment 2

[0056] figure 2 It is a flow chart of an authentication method provided by Embodiment 2 of the present invention. On the basis of the above embodiments, the "authentication of the authentication content according to the set authentication rules" is optimized. Specifically, The method comprises the steps of:

[0057] S210. Receive a calling request sent by a third-party application.

[0058] S220. Authenticate the identity of the third-party application according to the set authentication rule and the identity information of the third-party application.

[0059] Specifically, the embodiment sets the authentication content to include: the identity information of the third-party application. The identity information can be the ID of the third-party application, the access time stamp and the identity authentication string, wherein the identity authentication string is the third-party application. The string used to verify the identity of the third-party application. The specifi...

Embodiment 3

[0068] image 3 It is a structural diagram of an authentication device provided in Embodiment 3 of the present invention. The device can execute the authentication method provided in any of the above embodiments. Specifically, the device includes:

[0069] A receiving module 310, configured to receive a call request sent by a third-party application, where the call request includes authentication content;

[0070] An authentication module 320, configured to authenticate the authentication content according to set authentication rules;

[0071] The call instruction generating module 330 is configured to generate a call instruction of the third-party application if the authentication is passed.

[0072] Embodiment 3 of the present invention provides an authentication device. By receiving a call request sent by a third-party application, the call request includes authentication content, and performs authentication on the authentication content according to the set authentication...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method, a device, a server and a storage medium. The method comprises: receiving a call request sent by a third party application, wherein the call request includes an authentication content, authenticating the authentication content according to a set authentication rule, and if the authentication is passed, generating a call instruction of the third party application. The technical proposal solves the problems in the prior art such as providing service to the third party application according to the invocation request directly, affecting the securityof the enterprise or the platform, etc. by authenticating the invocation request sent by the third party application. Only after the authentication is passed, the service can be provided to the thirdparty application, thereby ensuring the security of the enterprise or the platform.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of computer network security, and in particular, to an authentication method, an apparatus, a server, and a storage medium. Background technique [0002] With the development of Internet technology, various services and systems in enterprises or platforms have gradually increased, with more and more functions and services that can be provided. As a third-party application, when it needs to perform a certain function, but it does not have the function, it needs to send a call request to the service or system with the function to obtain the permission to call the function. For example, a third-party application needs to send a short message, but does not have the function of sending a short message, so it needs to send a call request to the system that provides the short message service to complete the sending of the third-party application short message. [0003] In order to obtain ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L67/53
Inventor 万月亮武新明赵轶骅
Owner RUN TECH CO LTD BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products