Enterprise real name authentication method and authentication server

An authentication server and real-name authentication technology, applied in the field of information security, can solve the problems of error-prone, high logistics or time cost, low efficiency, etc., and achieve the effect of improved user login experience, efficient and convenient online real-name authentication service

Active Publication Date: 2019-04-19
爱信诺征信有限公司
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, one of the technical problems solved by the embodiments of the present invention is to provide an enterprise real-name authentication method and authentication server to overcome the cumbersome authentication operations, error-prone, low efficiency, and high logistics or time costs in the prior art. To achieve the effect of providing efficient and convenient online real-name authentication services for enterprises, so that enterprise users can directly and quickly log in to third-party network applications based on enterprise identity authorization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise real name authentication method and authentication server
  • Enterprise real name authentication method and authentication server
  • Enterprise real name authentication method and authentication server

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0030] see figure 1 , the embodiment of the present invention provides an enterprise real-name authentication method, which can be applied to an authentication server independently deployed as an objective third party. like figure 1 As shown, the enterprise real-name authentication method described in the embodiment of the present invention includes:

[0031] Step 101, obtain the enterprise real-name authentication request sent by the user through the third-party network application, and the enterprise real-name authentication request includes the application identification of the third-party network application;

[0032] Step 102, judging whether the third-party network application is legal according to the application identifier;

[0033] Step 103, when judging that the third-party network application is legal according to the application identifier, obtain the user identifier of the user's terminal application program;

[0034] Step 104, according to the user identificat...

no. 2 example

[0040] see figure 2 , the embodiment of the present invention provides a specific implementation of an enterprise real-name authentication method. like figure 2As shown, the enterprise real-name authentication method described in the embodiment of the present invention includes:

[0041] Step 201, obtain the enterprise real-name authentication request sent by the user through the third-party network application, and the enterprise real-name authentication request includes the application identification of the third-party network application;

[0042] Step 202, judging whether the third-party network application is legal according to the application identifier;

[0043] Step 203, when judging that the third-party network application is legal according to the application identifier, obtain the user identifier of the user's terminal application program;

[0044] Step 204, according to the user identification, it is judged whether the enterprise identity authorization informa...

no. 3 example

[0107] see Image 6 , the embodiment of the present invention provides an authentication server, which can be independently deployed as an objective third party and applied to the scenario of providing real-name authentication services for enterprises to log in to third-party network applications. like Image 6 As shown, the authentication server in the embodiment of the present invention includes:

[0108] The first acquiring module 601 is configured to acquire the enterprise real-name authentication request sent by the user through the third-party network application, wherein the enterprise real-name authentication request includes the application identification of the third-party network application;

[0109] The first judging module 602 is configured to judge whether the third-party network application is legal according to the application identifier;

[0110] The second acquiring module 603 is configured to acquire the user identifier of the user's terminal application ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an enterprise real name authentication method and an authentication server, and belongs to the technical field of the information security. The method comprises the following steps: acquiring an enterprise real name authentication request sent by a user through a third-party network application, wherein the enterprise real name authentication request comprises an application identifier of the third-party network application; judging whether the third-party network application is legal according to the application identifier; if the third-party network application is legal, acquiring a user identifier of a terminal application program of the user, and judging whether enterprise identity authorization information corresponding to the user identifier is existent at local according to the user identifier; if the enterprise identity authorization information corresponding to the user identifier is existent at local, sending the enterprise identity information corresponding to the enterprise identity authorization information to the third-party network application. Through the enterprise real name authentication method provided by the embodiment of the invention, an efficient and convenient online real name authentication service can be provided for the enterprise, so that an enterprise user can directly and quickly login the third-party network application based on the identity authorization of the enterprise, and the user login experience is improved.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of information security, and in particular to an enterprise real-name authentication method and an authentication server. Background technique [0002] With the rapid development of the Internet, various network applications continue to emerge, and more and more network applications provide services for enterprises. Before providing services to enterprise users, network applications generally need to authenticate the registered enterprise. At present, there are mainly two ways for network application service providers to authenticate enterprises. One is the traditional offline authentication mode, that is, enterprises submit business licenses, tax registration certificates, etc. to network application service providers to prove their corporate identity. The materials are affixed with the official seal, and sent to the network application service provider by express delivery to real...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L63/0823H04L63/0876
Inventor 郭向国陈昌凡金端峰
Owner 爱信诺征信有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products