Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Interface authentication method, device and equipment and computer readable storage medium

A storage medium, computer technology, applied in secure communication devices, user identity/authority verification, digital transmission systems, etc., can solve problems such as data confusion, different forms of third-party authorization, and unfavorable management.

Active Publication Date: 2019-08-20
PING AN TECH (SHENZHEN) CO LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002]With the continuous development of communication technology, various communication technology standards have been widely used, and the existing system platforms generally need to be called and Obtain data, but if there is no authentication management for the interface, users can access the platform at will through the Internet and call the interface at will, which will cause a large amount of platform resources to be occupied, affecting the maintenance management and operation of the platform
Therefore, in project application engineering, when different third parties access the platform, authentication configuration is required. At the same time, the authorization forms of third parties are different, and the logic business that needs to be processed in the authentication process is complex and changeable, which is not conducive to management and easy Lead to data confusion or incompatibility, and there are certain security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Interface authentication method, device and equipment and computer readable storage medium
  • Interface authentication method, device and equipment and computer readable storage medium
  • Interface authentication method, device and equipment and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0041] refer to figure 1 , figure 1 It is a schematic structural diagram of the operating environment of the interface authentication device involved in the solution of the embodiment of the present invention.

[0042] Such as figure 1 As shown, the interface authentication device may include: a processor 1001 , such as a CPU, a communication bus 1002 , a user interface 1003 , a network interface 1004 , and a memory 1005 . Wherein, the communication bus 1002 is used to realize connection and communication between these components. The user interface 1003 may include a display screen (Display) and an input unit such as a keyboard (Keyboard), and the network interface 1004 may optionally include a standard wired interface or a wireless interface (such as a WI-FI interface). The memory 1005 can be a high-speed RAM me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of security protection, and provides an interface authentication method, which comprises the following steps: when an interface authorization application is received, extracting an application ID and a key from the interface authorization application, the application ID being an enterprise ID or an application ID; performing authentication configurationon the enterprise ID or the application ID according to a preset configuration rule so as to grant the use permission of the application under the enterprise ID or the use permission of the application corresponding to the application ID; recording and storing configured authentication information so as to perform authentication verification on the request according to the authentication information when the request sent by the client is received; and when the authentication verification is passed, obtaining a user identity label, and allowing a client corresponding to the request to access the platform and / or call an interface of the platform. The invention further provides a device, equipment and a computer readable storage medium. The legality of the request is verified according to the configured authentication information, a normal response is given to a legal request, an illegal request is rejected, and therefore platform site resources are effectively protected.

Description

technical field [0001] The present invention relates to the technical field of security protection, in particular to an interface authentication method, device, equipment and computer-readable storage medium. Background technique [0002] With the continuous development of communication technology, various communication technology standards have been widely used. Existing system platforms generally need to call and obtain data through interfaces. However, if there is no authentication management for interfaces, users can Random access to the platform through the Internet and arbitrarily calling the interface will cause a large amount of platform resources to be occupied, affecting the maintenance, management and operation of the platform. Therefore, in project application engineering, when different third parties access the platform, authentication configuration is required. At the same time, the authorization forms of third parties are different, and the logic business that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/10H04L63/108H04L63/0876H04L63/0807H04L9/3213H04L9/3236H04L67/133
Inventor 刘潇吕素刚
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products