Supercharge Your Innovation With Domain-Expert AI Agents!

Authority verification method and device, storage medium and electronic equipment

A verification method and authority technology, applied in the field of network security, can solve problems such as low authentication efficiency, and achieve the effects of improving security and stability, reducing maintenance costs, and improving authentication efficiency and authentication performance.

Pending Publication Date: 2020-12-08
SHENZHEN HEYTAP TECHNOLOGY CO LTD +1
View PDF11 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present disclosure provides an authority verification method, an authority verification device, a computer-readable storage medium, and an electronic device, thereby overcoming the problem of low authentication efficiency at least to a certain extent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority verification method and device, storage medium and electronic equipment
  • Authority verification method and device, storage medium and electronic equipment
  • Authority verification method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details being omitted, or other methods, components, devices, steps, etc. may be adopted. In other instances, well-known technical solution...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authority verification method, an authority verification device, a storage medium and electronic equipment, and relates to the technical field of network security. The authority verification method comprises the following steps: if a user access request to a service system is received, sending the user access request to an entry server of an authentication system, and forwarding the user access request to the authentication system through the entry server; authenticating the user access request, and performing user authentication on the parameter information corresponding to the user access request through an authentication system so as to determine whether the user access request passes authority verification or not; and if the user access request passes the authority verification, sending the user access request to a business service so as to execute a business operation corresponding to the business service. According to the embodiment of the invention, theauthentication efficiency and reliability can be improved.

Description

technical field [0001] The present disclosure relates to the technical field of network security, and in particular, to an authority verification method, an authority verification device, a computer-readable storage medium, and electronic equipment. Background technique [0002] With the development of network technology, the security of network access is very important. [0003] In related technologies, gateway authentication is adopted. All access requests first pass through the gateway to determine whether to log in and whether they have permission to access. The business system does not need to care about login and authentication issues. [0004] In the above methods, the existing unified authentication method needs to maintain an authentication-free list. When there are many authentication-free access requests, it is inconvenient to maintain, and the authentication efficiency and performance are reduced. It is not very safe to store user login information in a shared s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/08Y04S40/20
Inventor 汪群
Owner SHENZHEN HEYTAP TECHNOLOGY CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More