Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity verification configuration method and device and computer readable storage medium

A technology of identity verification and configuration method, which is applied in the field of information security, can solve problems such as not being identical, business systems accessing each other is complicated, etc., to solve development problems, avoid the process of version release, and reduce the effect of high error rate

Active Publication Date: 2019-05-21
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This complicates the mutual access between these business systems—both sides of the interaction need to develop according to the identity authentication method of the other party, and authentication rules are often related to specific businesses
Therefore, although the identity authentication codes have a great similarity, they are not exactly the same. Almost every docking requires code development for identity authentication
Therefore, although the identity authentication code has a great similarity, it is not exactly the same, so almost every docking requires code development for identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification configuration method and device and computer readable storage medium
  • Identity verification configuration method and device and computer readable storage medium
  • Identity verification configuration method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Embodiments of the identity verification configuration method, device and computer-readable storage medium of the present invention will be described below with reference to the accompanying drawings. Those skilled in the art would recognize that the described embodiments can be modified in various ways or combinations thereof without departing from the spirit and scope of the invention. Accordingly, the drawings and description are illustrative in nature and not intended to limit the scope of the claims. Also, in this specification, the drawings are not drawn to scale, and like reference numerals denote like parts.

[0020] An authentication configuration method such as figure 1 shown, including the following steps:

[0021] Step S10, encapsulating the data models of the encryption rules, decryption rules, signature rules, and signature verification rules in the FreeMarker template engine, so as to replace the content in the interpolation symbol ${} in the later stag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of information security, and provides an identity verification configuration method and device and a computer readable storage medium, and the method comprises the steps: respectively packaging data models of encryption, decryption, signature and signature verification rules in a template engine; An identity verification configuration template is established, andreplaceable data is set through a ${}; Embedding the identity verification configuration template as a dependency packet into a JAVA application; calling an identity verification configuration template at the JAVA application through an interface; the Encryption rules, Decryption rules, Signature rules, and the signature verification rule are used for replacing replaceable data in ${}; or, the JAVA application accesses the identity verification configuration template through HTTP, and replaces replaceable data of a cache ${} in the identity verification configuration template with packaged encryption, decryption, signature and signature verification rules to form the identity verification rule. Repeated code development is not needed, and the workload is reduced.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an identity verification configuration method, device and computer-readable storage medium. Background technique [0002] Digital signatures are now commonly used for identity authentication. For some newer systems, standard Basic Auth, OAuth, HMAC and other methods are generally used to implement identity authentication. But for some older business systems, many of them have adopted custom authentication schemes. This complicates the mutual access between these business systems—both sides of the interaction need to develop according to the identity authentication method of the other party, and the authentication rules are often related to specific businesses. Therefore, although the identity authentication codes have a great similarity, they are not exactly the same. Almost every docking requires the development of identity authentication codes. Therefore...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/32
Inventor 吴春海谭智文王峰李国颂
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products