Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method and system, computer device and storage medium

An identity authentication and relationship technology, applied in the computer field, can solve problems such as large network consumption and achieve the effect of reducing consumption

Active Publication Date: 2019-09-06
PING AN TECH (SHENZHEN) CO LTD
View PDF11 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of this application is to provide an identity authentication method, system, computer equipment, and storage medium, aiming to solve the problem of large network consumption during the process of identity authentication by the server to the consumer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system, computer device and storage medium
  • Identity authentication method and system, computer device and storage medium
  • Identity authentication method and system, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0047] Reference figure 1 with image 3 , The embodiment of this application provides an identity authentication method, which is applied to an identity authentication system. The identity authentication system includes a consumer, a server, and a service registry. The consumer, the server, and the service registry can communicate with each other through the network. The form realizes mutual communication, and the identity authentication method includes:

[0048] S11, the service party receives the service invocation request sent by the consumer, where the service invocation request includes the consumption code information of the consumer and the authorization relationship encryption information pre-stored in the consumer, and the authorization relationship encryption information contains the consumption code-service c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method and system, a computer device and a storage medium. The identity authentication method comprises : a service party receiving a service callingrequest sent by a consumer, the service calling request comprising consumption code information and authorization relation encryption information, and the authorization relation encryption information comprising consumption code-service code calling relation information; checking whether a service key is pre-stored or not according to the consumption coding information; if the service key is pre-stored, decrypting the authorization relationship encryption information by using the service key to obtain consumption code-service code calling relationship information; verifying whether the consumption code-service code calling relation information is legal or not according to the consumption code information and pre-stored service code information; and if yes, responding to the service calling request, and returning corresponding service resources to the consumer. According to the identity authentication method, the problem of high network consumption in the process of performing identityauthentication on the consumer by the service party can be solved.

Description

Technical field [0001] This application relates to the field of computer technology, in particular to an identity authentication method, system, computer equipment and storage medium. Background technique [0002] Internet services are inseparable from identity authentication. For server clusters, or a cross-domain service-oriented architecture, when the consumer (ie the consumer of the service, such as the application system that calls each service interface) cross-domain access to the server (ie, the service provider) For example, when providing the resources of the application system of each service interface, since there is no prior trust relationship between the consumer and the server, the server needs to authenticate the consumer to determine whether it has access rights. In the prior art, the service party needs to rely on a third-party authentication data source (that is, it needs to rely on a third-party authentication center for identity authentication) in the process ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/06
CPCH04L9/0643H04L9/3297H04L63/06H04L63/08H04L63/10
Inventor 王丽
Owner PING AN TECH (SHENZHEN) CO LTD