Supercharge Your Innovation With Domain-Expert AI Agents!

Authentication method, authentication system and computing device

An authentication method and technology of computing equipment, applied in the field of network communication, to achieve the effect of improving authentication efficiency, good experience, and good user experience

Active Publication Date: 2020-11-13
UNIONTECH SOFTWARE TECH CO LTD
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] To this end, the present invention provides an authentication method, authentication system and computing equipment to solve or at least alleviate the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, authentication system and computing device
  • Authentication method, authentication system and computing device
  • Authentication method, authentication system and computing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0034] figure 1 A schematic diagram of an authentication system 100 according to an embodiment of the present invention is shown.

[0035] Such as figure 1 As shown, the authentication system 100 includes a client 110 , an authentication control device 120 , and one or more third-party authentication servers 130 . Wherein, the authentication control device 120 communicates with the client 110 and the authentication server 130 res...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method, which is executed in computing equipment, the computing equipment is connected with one or more applications, the computing equipment is connected with a plurality of authentication modules, and the method comprises the following steps: receiving an identity authentication request for a user sent by an application; determining one or more authentication classes corresponding to the identity authentication request, and determining one or more authentication modes in each authentication class; determining an authentication module corresponding toeach authentication mode in each authentication class, and synchronously requesting a plurality of corresponding authentication modules to perform identity authentication on the user; and obtaining an authentication result of at least one authentication mode in each authentication class so as to determine an authentication result of each authentication class and a final authentication result forthe user. The invention also discloses a corresponding authentication system and the computing equipment. According to the technical scheme of the invention, the authentication result is more reliable, and the authentication efficiency is higher.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to an authentication method, an authentication system and a computing device. Background technique [0002] PAM (Pluggable Authentication Modules, embeddable authentication module) is a system library for handling authentication tasks of applications in Linux systems. PAM provides a stable interface against which privilege-granting programs perform standard authentication tasks. [0003] In the Linux desktop environment, various privilege granting programs and login verification programs (such as Sudo, Lightdm, Polkit, etc.), usually use the PAM library as a standard authentication method. With the development of the Linux desktop environment, in many cases, multiple authentication methods such as password authentication and fingerprint authentication need to be performed on the application at the same time, and even face recognition authentication needs to be perform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L29/06H04L29/12
CPCH04W12/06H04L63/083H04L61/4523
Inventor 宋文泰闫博文张继德
Owner UNIONTECH SOFTWARE TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More