Check patentability & draft patents in minutes with Patsnap Eureka AI!

Identity verification method and device, computer equipment and readable storage medium

An identity verification and verification code technology, applied in the Internet field, can solve problems such as different identity authentication methods of business systems, and achieve the effects of reducing cumbersome work, improving security, and reducing maintenance costs

Active Publication Date: 2020-06-26
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF11 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of Internet technology, enterprises usually need to interface with multiple business systems to achieve different business operations. For example, enterprises in the financial industry need to interface with multiple businesses such as product management, order management, risk control and compliance management, and financial management. system; however, each business system has a different login entry, and user terminals in the enterprise need to go through frequent login operations to use different business systems, and the identity authentication methods of each business system are different. The terminal needs to obtain the login account information of each business system; therefore, how to simplify the complexity of user terminal access to various business systems and ensure the security of user terminal access to business systems has become a technical problem that needs to be solved urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and device, computer equipment and readable storage medium
  • Identity verification method and device, computer equipment and readable storage medium
  • Identity verification method and device, computer equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] The embodiment of the present invention provides an identity verification method, which is applied to an asset management integration platform in the financial industry, such as figure 1 As shown, the method specifically includes the following steps:

[0042] Step S101: Receive an access request sent by an access terminal; wherein, the access request includes: a verification code and information of the accessed terminal.

[0043] In this embodiment, the asset management integration platform is an integrated platform that integrates multiple asset management business systems; the access terminal is a user terminal used to access each asset management business system through the asset management integration platform; each integrated in the asset management The asset management business system of the integrated platform can be regarded as a visited end. Preferably, the accessed terminal information is the IP address information or identity ID information of the accessed termina...

Embodiment 2

[0073] The embodiment of the present invention provides an identity verification method, which is applied to an asset management integration platform. The asset management integration platform integrates various asset management business systems, and the access terminal can access various assets through the asset management integration platform. Management business system; specifically, the asset management integration platform includes: a user interaction module, an identity verification module, and a business module; wherein the user interaction module is connected to the access terminal for the access terminal to log in to the office through the user interaction module The asset management integration platform; the identity verification module is used to perform identity verification and authorization verification for users logging in the asset management integration platform, and only users who have passed the identity verification and have corresponding permissions can acces...

Embodiment 3

[0107] The embodiment of the present invention provides an identity verification device, which is applied to an asset management integration platform, such as figure 2 As shown, the device specifically includes the following components:

[0108] The receiving module 301 is configured to receive an access request sent by an access terminal; where the access request includes: a verification code and information of the accessed terminal.

[0109] Specifically, the device further includes:

[0110] The processing module is configured to receive platform registration information sent by the access terminal; wherein the platform registration information includes: login account information and user basic information; the verification code is generated according to the login account information, and the verification code is generated according to the login account information. The user basic information determines the access authority level; the verification code and the access authority le...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method and device, computer equipment and a readable storage medium. The method comprises the following steps: receiving an access request sent by anaccess end; wherein the access request comprises a verification code and accessed end information; judging whether the verification code is valid or not, and searching an access permission level corresponding to the verification code from a local database under the condition that the verification code is valid; judging whether an authority list corresponding to the access authority level containsthe accessed end information or not; acquiring login password information corresponding to the access permission level from a password database corresponding to the accessed end information when theaccessed end information is contained in the permission list; sending the login password information to an accessed end corresponding to the access request so as to log in the accessed end by utilizing the login password information. According to the invention, the login process can be simplified, and the access safety is improved.

Description

Technical field [0001] The present invention relates to the field of Internet technology, in particular to an identity verification method, device, computer equipment and readable storage medium. Background technique [0002] With the continuous development of Internet technology, companies usually need to dock multiple business systems to achieve different business operations. For example, companies in the financial industry need to dock multiple businesses such as product management, order management, risk control compliance management, and financial management. System; however, each business system has a different login entry. The user terminal in the enterprise needs to log in frequently to use different business systems, and the identity authentication method of each business system is different. The users in the enterprise The terminal needs to obtain the login account information of each business system; therefore, how to simplify the complexity of the user terminal access...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/46
CPCH04L63/083H04L63/10H04L63/105G06F21/46G06F2221/2141
Inventor 李正航艾文敏
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More