User authentication method and device, server and storage medium

A technology for server and user rights, applied in the computer field, can solve the problems of slow authentication speed and large workload of rights maintenance, and achieve the effect of reducing workload and improving authentication speed.

Pending Publication Date: 2021-03-16
BEIJING DAJIA INTERNET INFORMATION TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present disclosure provides a user authentication method, device, server, and storage medium to at least solve the problems of heavy authority maintenance workload and slow authentication speed in the user authentication method in the related art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and device, server and storage medium
  • User authentication method and device, server and storage medium
  • User authentication method and device, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to enable ordinary persons in the art to better understand the technical solutions of the present disclosure, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the accompanying drawings.

[0033] It should be noted that the terms "first" and "second" in the specification and claims of the present disclosure and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein can be practiced in sequences other than those illustrated or described herein. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a user authentication method and device, a server and a storage medium, and relates to the technical field of computers, and the method comprises the steps of obtaining an access object parameter and a user identification carried in an access request; obtaining a user permission list matched with the user identifier, wherein the user permission list comprises a path list with access permission and a service identifier list with access permission; comparing an access path in the access object parameter with a path list, and comparing an access service identifier in theaccess object parameter with a service identifier list; and under the condition that the prefix of the access path exists in the path list and the access service identifier exists in the service identifier list, determining that the access request passes the authentication, and allowing the access path to access the service corresponding to the access service identifier. The authentication of theaccess request of the user is realized, the authentication speed is improved, and the workload of authority maintenance is reduced.

Description

technical field [0001] The present disclosure relates to the field of computer technology, and in particular to a user authentication method, device, server and storage medium. Background technique [0002] At present, when a user accesses the service platform, in order to ensure the security of the user and the platform, the user's access request needs to be authenticated, and the user is allowed to access the service of the service platform only when the authentication is passed. [0003] In the related art, in order to authenticate the user's access request, a large number of permission schemes need to be set in advance, which leads to a heavy workload of permission maintenance. Compared with multiple permission schemes to authenticate the user's access request, if a large number of permission schemes are set in advance, the authentication speed will be slow. Contents of the invention [0004] The present disclosure provides a user authentication method, device, server...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/45G06F16/903
CPCG06F21/31G06F21/45G06F2221/2141G06F16/90344
Inventor 辛洋汐
Owner BEIJING DAJIA INTERNET INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products