Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access certificate verification method and device, computer equipment and storage medium

A technology of access credentials and verification methods, applied in the field of identity authentication, which can solve the problems of data file privacy leakage, inability to ensure that A will not disclose user name and password, third-party cracking, etc.

Pending Publication Date: 2019-07-09
PING AN TECH (SHENZHEN) CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the commonly used data sharing method generally adopts the access method based on user name and password, which has the following defects: if the user name and password are too simple, it is easy to be cracked by a malicious third party; The data is shared with A, but there is no guarantee that A will not disclose the user name and password to other B, which is what the file owner does not want to happen; if user A obtains the access link of a data file through normal channels, but the If the link is accidentally leaked, the privacy of the data file will be leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access certificate verification method and device, computer equipment and storage medium
  • Access certificate verification method and device, computer equipment and storage medium
  • Access certificate verification method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0038] The flow charts shown in the drawings are just illustrations, and do not necessarily include all contents and operations / steps, nor must they be performed in the order described. For example, some operations / steps can be decomposed, combined or partly combined, so the actual order of execution may be changed according to the actual situation. In addition, although the functional modules are divided in the schematic diagram of the device, in some cases, they ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of identity authentication. An access certificate is generated and verified according to an access code corresponding to a file requested by a client and feature information of the client, and the file is prevented from being accessed through a stolen, tampered or forged access certificate. The invention concretely discloses an access certificate verification method and device, computer equipment and a storage medium. The access certificate verification method comprises the steps of acquiring an access request sent by a client side, wherein the access requestcomprises an access purpose; obtaining an access code corresponding to the access purpose; generating an access certificate according to the access code and the feature information of the client; sending the access certificate to the client; obtaining an access instruction sent by the client, wherein the access instruction comprises an access purpose, feature information of the client and an access certificate; generating a verification certificate according to the access code corresponding to the access purpose and the feature information of the client; and if the verification voucher is consistent with the access voucher in the access instruction, enabling the access instruction to pass the verification.

Description

technical field [0001] The present application relates to the technical field of identity authentication, and in particular to an access credential authentication method, device, computer equipment and storage medium. Background technique [0002] A certain type of data file is stored on the cloud server, and the owner of the data file can share it with a designated third party. [0003] At present, the commonly used data sharing method generally adopts the access method based on user name and password, which has the following defects: if the user name and password are too simple, it is easy to be cracked by a malicious third party; The data is shared with A, but there is no guarantee that A will not disclose the user name and password to other B, which is what the file owner does not want to happen; if user A obtains the access link of a data file through normal channels, but the If the link is accidentally leaked, the privacy of the data file will be leaked. Contents of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/604G06F21/602G06F2221/2141
Inventor 邹陈波
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products