Synchronous authentication method and device

A consistent and business-identified technology, applied in the computer field, can solve problems such as poor user experience, reduce the number of authentications and improve the experience

Pending Publication Date: 2021-06-25
北京读我网络技术有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, when the user uses the applet to transfer data to the H5 page, he needs to perform identity verification on the applet first, and then perform identity verification on the H5 page after the applet passes the identity verification. After passing the identity verification, the user can access the H5 page and transmit data to the H5 page through the applet. This method requires multiple authentications, resulting in poor user experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Synchronous authentication method and device
  • Synchronous authentication method and device
  • Synchronous authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Next, the technical solutions in the embodiments of the present invention will be apparent from the embodiment of the present invention, and it is clearly described, and it is understood that the described embodiments are merely embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, there are all other embodiments obtained without making creative labor without making creative labor premises.

[0056] The term "comprising" as used herein and its deformation is open to include, ie, "including but not limited to". The term "based on" is "at least partially based on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Related definitions of other terms will be given in the following description.

[0057] It is to be noted that the "first", "second" and other concepts mention...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a synchronous authentication method and device, and the method comprises the steps: user information sent by a user is acquired by a client, and identity verification of the user is performed according to user information; if the identity verification of the user is passed, a service identifier application request is sent to the server, so that the server generates a corresponding service identifier based on the service identifier application request, and feeds back the service identifier to the client; the client sends the service identifier and the user information sent by the server to the server, and the server generates a temporary code according to the service identifier and the user information and returns the temporary code to the client; the client sends the temporary code fed back by the server side to the H5 page, the H5 page sends the temporary code to the server side, the server side analyzes the temporary code and sends obtained target user information to the H5 page, and the H5 page verifies the identity of a user based on the target user information. When the user accesses the H5 page through the client, multiple times of identity verification are not needed, so that the purpose of improving the user experience is achieved.

Description

Technical field [0001] The present invention relates to the field of computer technology, and more particularly to a synchronous authentication method and apparatus. Background technique [0002] With the continuous development of computer technology, the application of data transmission with the H5 page is increasingly widely used. [0003] In the prior art, when the user uses the applet to transmit data to the H5 page, you need to authenticate on the applet, after the applet is authenticated by the app, then authenticate on the H5 page, on the H5 page After authentication, the user can access the H5 page and transmit data to the H5 page via a small program. This method requires multiple authentication to cause the user to experience poor. Inventive content [0004] In view of this, the present invention provides a synchronous authentication method and apparatus to enable the user without having to perform multiple authentication when the user accesses the H5 page through the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F21/31G06F2221/2151
Inventor 顾乐威王强
Owner 北京读我网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products