Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication processing method and device, electronic equipment and storage medium

A technology of identity authentication and processing methods, applied in the direction of digital data authentication, etc., can solve problems such as increasing the number of reciprocating interactions between Internet applications and identity authentication systems, reducing user operation experience, and reducing identity authentication efficiency, so as to ensure security and improve efficiency , the effect of improving efficiency and accuracy

Pending Publication Date: 2020-02-11
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] It can be seen that although multiple identity authentications in related technologies can guarantee security, they will interrupt the normal operation of the user, reduce the user's operating experience, and increase the number of reciprocating interactions between the Internet application and the identity authentication system, reducing the identity authentication. s efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication processing method and device, electronic equipment and storage medium
  • Identity authentication processing method and device, electronic equipment and storage medium
  • Identity authentication processing method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the object, technical scheme and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the accompanying drawings. All other embodiments obtained under labor conditions belong to the protection scope of the present invention.

[0053] In the following description, references to "some embodiments" describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or a different subset of all possible embodiments, and The various technical solutions described in the embodiments of the present invention may be combined with each other without conflict.

[0054] In the following description, the terms "first", "second", etc. involved are only used to distinguish similar objects, and do not represent a specific order or sequence for the objects. Understandably, "first", "second", etc. "Second" and the like, where permitted, may interchan...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication processing method and device, electronic equipment and a storage medium. The method comprises the following steps: acquiring identity information submitted by a client; determining a target password strategy for verifying the identity information in a plurality of password strategies; authorizing the client to log in a third-party application basedon the identity information when the identity authentication of the identity information based on the target password strategy is passed, and allocating an operation authority after the login of thethird-party application to the client based on the security classification corresponding to the target password strategy; and based on the operation authority, controlling the operation of the clientafter logging in the third-party application. According to the method and the device, the operation experience and the identity authentication efficiency of the user can be improved while the safety is ensured.

Description

technical field [0001] The present invention relates to the technical field of information processing, in particular to an identity authentication processing method, device, electronic equipment and storage medium. Background technique [0002] As the use scenarios and functions of Internet applications become more and more extensive, Internet applications also begin to involve more and more information security issues. For this reason, when a user wants to access information in an Internet application, the user needs to be authenticated, especially for access to core information with a high security level, or when sensitive operations such as payment operations are involved in Internet applications, the user needs to be authenticated. The user performs secondary verification. [0003] It can be seen that although multiple identity authentications in related technologies can guarantee security, they will interrupt the normal operation of the user, reduce the user's operatin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/31
CPCG06F21/31
Inventor 焦远东
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products