Identity information authentication method, server, client and system

A technology of identity information and authentication method, which is applied in the server, identity information authentication method, client and system fields, and can solve problems such as poor security

Active Publication Date: 2020-05-29
STATE GRID E COMMERCE CO LTD +2
View PDF6 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present invention provides an identity information authenticat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity information authentication method, server, client and system
  • Identity information authentication method, server, client and system
  • Identity information authentication method, server, client and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0077] In this application, the term "comprises", "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus comprising a set of elements includes not only those elements, but also includes none. other elements specifically listed, or also include elements inherent in such a process, method, article, or apparatus. Without further limitations, an element defined by the phrase "com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity information authentication method, a server, a client and a system, and the method comprises the steps: enabling the server to determine whether a login request passes the authentication or not according to a second public key, a user name, a first client timestamp and a first short-time token of the client after receiving the login request of the client; if thelogin request passes the authentication, feeding back a newly generated second short-time token to the client, and generating the first short-time token and the second short-time token according to the user identity information, the equipment fingerprint information and the corresponding random number, wherein the client carries the second short-time token when the client sends the service request; if the server determines that the service request passes the authentication, determining the operation authority of the client according to the predetermined security trust degree of the client, andprocessing the service request according to the operation authority. In the scheme, the server generates the short-time token through the equipment fingerprint information, the short-time token is refreshed after login authentication is passed, and the operation authority of the client is determined through the security trust degree, so the communication security is improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an identity information authentication method, server, client and system. Background technique [0002] With the development of Internet technology, there are various application software emerging on the market. In the process of using the application software, authentication of identity information needs to be completed between the client and the server. [0003] The current authentication method between the client and the server is: when the user uses the client to log in to the server with the account and password for the first time, the server generates a token (Token) and feeds back the token to the client, and then the client Each time the client makes a data request to the server, it only needs to carry the token without account information to complete the data request. But on the one hand, the token is used as the unique identification of authentication. When the atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0866H04L9/0869H04L9/3228H04L9/3247H04L9/3297H04L63/0815H04L63/0846H04L63/0876
Inventor 王栋赵丽花杨珂廖会敏玄佳兴秦日臻吕梓童
Owner STATE GRID E COMMERCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products