Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication-based session authority verification method, system and electronic device

A technology for authentication and verification methods, applied in the field of passwords, can solve the problem of low session success rate and achieve the effect of improving the success rate

Active Publication Date: 2022-07-08
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the technical problem of the low success rate of session establishment between any two application systems existing in the related art, the present invention provides a method, system and electronic device for verifying session authority based on identity verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication-based session authority verification method, system and electronic device
  • Authentication-based session authority verification method, system and electronic device
  • Authentication-based session authority verification method, system and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The description will now be made in detail of exemplary embodiments, examples of which are illustrated in the accompanying drawings. Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with some aspects of the invention as recited in the appended claims.

[0031] figure 1 It is a schematic diagram of a network scenario to which an authentication-based session permission verification method is applicable according to an exemplary embodiment. exist figure 1 In the shown network scenario, a first application client and a second application client may be included; wherein, both the first application client and the second application client may ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, system and electronic device for verifying session authority based on identity verification. The method includes: the first application client generates a user token according to the user's identity information; obtains the user number of the user, and stores the user number and the user token in association with the user; the first application client further sends the second application client Send a session request including the user number and user token; when the second application client detects that the user number and user token in the received session request pass the session permission verification, it establishes a session connection with the first application client. Under this method, based on the authentication technology in the password technology, the success rate of establishing a session between any two application systems can be improved.

Description

technical field [0001] The present invention relates to the technical field of cryptography, in particular to a method, system and electronic device for verifying session authority based on identity verification. Background technique [0002] A software project can contain multiple application clients, and different users can log in to their respective application clients. When a user uses an application client, it is usually necessary to establish the application client currently used by the user and the application used by another user. As for the session between clients, the current method of establishing a session between any two application clients is usually to establish a session between any two application clients by using a session control method based on the time domain (Session). [0003] The disadvantage of this solution is that, since the format of the Session objects corresponding to different application clients may be inconsistent, the Session object generate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32H04L67/141
CPCH04L63/08H04L9/3213H04L67/141
Inventor 文棒棒
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN