Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and device

An authentication and authentication request technology, applied in the authentication field, can solve problems such as high back-end pressure and complex system implementation methods, and achieve the effect of simplified process, safe and convenient processing and rendering

Active Publication Date: 2021-11-12
JINGDONG TECH HLDG CO LTD
View PDF17 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of this, the embodiment of the present invention provides an authentication method and device, which can solve the technical defects of the existing technology that adopts the unified management of identity tokens on the backend to put a lot of pressure on the backend and the system implementation method is complicated, and then realize the backend only Provide permission data to the front-end, simplify the process of permission management, and the back-end does not need to monitor page jumps, so that the front-end independently assigns permissions and handles rendering more safely and conveniently.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device
  • Authentication method and device
  • Authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The exemplary embodiments of the present invention will be described below, including various details of the embodiments of the invention to help understand, and they should be considered simply exemplary. Accordingly, it will be appreciated by those skilled in the art that various modifications and modifications can be made to the embodiments described herein without departing from the scope and spirit of the invention. Also, for the sake of clarity and concise, the following description is omitted in the following description.

[0075] In the authentication process mainly directed to the front and rear two portions. In order to simplify the development process that may be developed during a rear end of the front, front and rear ends are not mutually dependent, reduce the coupling of the front and rear ends, front and rear ends so that development can be carried out simultaneously, thus reducing development time and improve the efficiency of program development.

[0076] A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and device, and relates to the technical field of computers. A specific implementation of the method includes: receiving the identity token returned by the backend after successful login; sending an authentication request to the backend according to the identity token; receiving the authority and route returned by the backend; According to the authority and routing, the display page of the front end is rendered. This implementation method solves the technical defects of the existing technology that adopts the back-end unified management of identity tokens to put a lot of pressure on the back-end and the system implementation method is complicated, and then realizes that the back-end only provides authority data to the front-end, simplifies the process of authority management, and the back-end does not need Monitor page jumps to achieve the technical effect of independently assigning permissions at the front end and processing rendering more safely and conveniently.

Description

Technical field [0001] The present invention relates to computer technologies, and particularly to a method and apparatus for authentication. Background technique [0002] The prior art using the MVC ( "Model" - "View" - "controller") architecture, there is a session record stored in a server, the user needs to complete the authentication operation by the system when accessing the server. Get Permissions way for the back-end control authority, front-end session control only record issued unique identification (sessionID). [0003] In the process of implementing the invention, the inventors have found that there is at least the following problems in the prior art: [0004] 1. higher front end (client) and the rear end (i.e. server) coupling, in the development of the front and rear ends, respectively, can not be developed, leading to the development of the time consumed, the higher labor costs; [0005] 2. The large number of users to uniquely identify the session control (session...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L63/083H04L63/10
Inventor 罗兆富
Owner JINGDONG TECH HLDG CO LTD