A method, device, computer equipment and storage medium for authorization authentication

An authentication method and permission technology, applied in the security field, can solve problems such as one-sided permission authentication, high business system coupling, and repeated development, so as to avoid repeated development work, ensure comprehensiveness, and reduce coupling.

Active Publication Date: 2021-07-02
GUANGZHOU HUYA INFORMATION TECH CO LTD
View PDF17 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides a permission authentication method, device, computer equipment and storage medium to solve the problem of one-sidedness and repeated development work in the permission authentication due to the high degree of coupling of business systems and independent development and application

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device, computer equipment and storage medium for authorization authentication
  • A method, device, computer equipment and storage medium for authorization authentication
  • A method, device, computer equipment and storage medium for authorization authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] figure 1 It is a flow chart of an authority authentication method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation where authority authentication is uniformly provided for system clusters. The method can be executed by an authority authentication device, which can be implemented by a software And / or hardware implementation, can be configured in computer equipment, such as server etc., this method specifically comprises the following steps:

[0040] S110. Receive an authentication request sent by an application for a user operation.

[0041] In this embodiment, a unified authentication system is set up in the system cluster to provide unified authorization authentication for each application in the system cluster.

[0042] Since most of the user operations in the business system are real-time operations, in order to ensure the real-time performance of user operations, the authentication system can be set as a real-time op...

Embodiment 2

[0094] image 3 It is a flowchart of an authority authentication method provided by Embodiment 2 of the present invention. This embodiment is based on the foregoing embodiments, and further adds processing operations of editing authentication rules and penalty lists. The method specifically includes the following steps:

[0095] S310. A rule processing operation is received.

[0096] S320. Process the authentication rule according to the rule processing operation.

[0097] In this embodiment, a unified authentication system is set in the system cluster to provide unified authentication rules for each application in the system cluster.

[0098] The management user can send a rule processing operation to the authentication system for the authentication rule, and request the authentication system to process the authentication rule accordingly.

[0099] In one embodiment, as figure 2 As shown, the policy service 213 can provide a unified processing interface, and the internal...

Embodiment 3

[0127] Figure 4 It is a flow chart of an authority authentication method provided by Embodiment 3 of the present invention. This embodiment is applicable to the situation where authority authentication is uniformly provided for system clusters. The method can be executed by an authority authentication device, which can be implemented by a software And / or hardware implementation, can be configured in computer equipment, such as server etc., this method specifically comprises the following steps:

[0128] S410. Receive a user operation.

[0129] In this embodiment, there are multiple business-related applications in the system cluster, and each application may be relatively independent, that is, provide specific services for users independently.

[0130] For example, the live broadcast platform includes business-related applications such as broadcasting applications, barrage applications, and user information applications.

[0131] For the broadcasting application, the user's...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a permission authentication method, device, computer equipment, and storage medium. The method includes: receiving an authentication request sent by an application for a user operation; determining the authentication corresponding to the user operation according to the authentication request. rules; performing authorization authentication on the user operation according to the authentication rules to generate an authentication result; sending the authentication result to the application. Separating the authority authentication from each application can reduce the coupling degree between the modules in the application, and there is no need to care about the authority authentication during development, which reduces the development cost of the application; for the authority authentication of each application development, not only can refer to the authority authentication of other applications As a result, the comprehensiveness of authority authentication is guaranteed, and for overlapping authority authentication, the same authentication rule can be configured, which avoids repeated development work, thereby improving development efficiency.

Description

technical field [0001] The embodiments of the present invention relate to security technologies, and in particular to a method, device, computer equipment and storage medium for authorization verification. Background technique [0002] A system cluster usually includes multiple business-related applications, and each application usually independently provides specific services for users, and performs authorization authentication independently. [0003] For example, for a system cluster such as a live broadcast platform, it usually includes applications such as broadcasting applications, barrage applications, and user information applications. Authorization authentication and user information application can be used to perform authorization authentication on user information (such as user avatar, user nickname, user profile, etc.) modified by the user. [0004] When each application is developed, a functional module for authorization authentication will be encapsulated into ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06F21/45
Inventor 张迪峰黄洁斌
Owner GUANGZHOU HUYA INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products