Enterprise real name authentication method and authentication server
An authentication server and real-name authentication technology, applied in the field of information security, can solve the problems of error-prone, high logistics or time cost, low efficiency, etc., and achieve the effect of improved user login experience, efficient and convenient online real-name authentication service
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0030] see figure 1 , the embodiment of the present invention provides an enterprise real-name authentication method, which can be applied to an authentication server independently deployed as an objective third party. like figure 1 As shown, the enterprise real-name authentication method described in the embodiment of the present invention includes:
[0031] Step 101, obtain the enterprise real-name authentication request sent by the user through the third-party network application, and the enterprise real-name authentication request includes the application identification of the third-party network application;
[0032] Step 102, judging whether the third-party network application is legal according to the application identifier;
[0033] Step 103, when judging that the third-party network application is legal according to the application identifier, obtain the user identifier of the user's terminal application program;
[0034] Step 104, according to the user identificat...
no. 2 example
[0040] see figure 2 , the embodiment of the present invention provides a specific implementation of an enterprise real-name authentication method. like figure 2As shown, the enterprise real-name authentication method described in the embodiment of the present invention includes:
[0041] Step 201, obtain the enterprise real-name authentication request sent by the user through the third-party network application, and the enterprise real-name authentication request includes the application identification of the third-party network application;
[0042] Step 202, judging whether the third-party network application is legal according to the application identifier;
[0043] Step 203, when judging that the third-party network application is legal according to the application identifier, obtain the user identifier of the user's terminal application program;
[0044] Step 204, according to the user identification, it is judged whether the enterprise identity authorization informa...
no. 3 example
[0107] see Image 6 , the embodiment of the present invention provides an authentication server, which can be independently deployed as an objective third party and applied to the scenario of providing real-name authentication services for enterprises to log in to third-party network applications. like Image 6 As shown, the authentication server in the embodiment of the present invention includes:
[0108] The first acquiring module 601 is configured to acquire the enterprise real-name authentication request sent by the user through the third-party network application, wherein the enterprise real-name authentication request includes the application identification of the third-party network application;
[0109] The first judging module 602 is configured to judge whether the third-party network application is legal according to the application identifier;
[0110] The second acquiring module 603 is configured to acquire the user identifier of the user's terminal application ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com