Unlock instant, AI-driven research and patent intelligence for your innovation.

Enterprise personnel authentication method, device and system

An authentication method and enterprise technology, applied in the computer field, can solve problems such as cumbersome authentication process and limited credibility of authentication results, and achieve the effect of authentication

Active Publication Date: 2022-07-22
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the current certification process designed for enterprise personnel is relatively cumbersome, and at the same time, the credibility of the certification results is limited due to many certification links

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise personnel authentication method, device and system
  • Enterprise personnel authentication method, device and system
  • Enterprise personnel authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0074] In one embodiment, the logins to the enterprise information platform and the personal information platform are independent of each other. There are also various ways to log in to the enterprise information platform, and accordingly, different login methods correspond to different types of login information. In one embodiment, the login method may be an account and password login, and accordingly, the above-mentioned enterprise login information may include an enterprise account and a password. In another embodiment, the login method may be login with a mobile phone number, and accordingly, the above-mentioned enterprise login information may include a mobile phone number and a dynamic verification code. In this implementation manner, the verification of the enterprise login information can be implemented by using an existing verification method, which will not be repeated here.

[0075] In another embodiment, the login to the enterprise information platform may depend ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of this specification provide an authentication method, device, and system for enterprise personnel. The execution subject of the authentication method is an authentication application, including: redirecting to the first login interface of the personal information platform in response to a trigger instruction for the authentication of the enterprise personnel; in the case of successfully logging in to the personal account based on the first login interface, Obtain the personal identity information corresponding to the personal account from the personal information platform; redirect to the second login interface of the enterprise information platform; in the case of successfully logging in to the enterprise account based on the second login interface, from the enterprise information platform Obtaining the enterprise personnel information corresponding to the enterprise account; using the enterprise personnel information to match the personal identity information, and obtaining the authentication result of the enterprise personnel authentication.

Description

technical field [0001] One or more embodiments of this specification relate to the field of computer technology, and in particular, to an authentication method for enterprise personnel, an authentication device for enterprise personnel, and an authentication system for enterprise personnel. Background technique [0002] With the advancement of science and technology and the development of society, more and more enterprises have emerged. In the process of inter-enterprise cooperation, or in the process of providing services for individuals, the enterprise usually sends enterprise personnel to connect with the partner. The victim's property loss requires verification and authentication of the identity of a person or the person who claims to be an enterprise employee. [0003] However, the current certification process designed for enterprise personnel is cumbersome, and at the same time, the credibility of the certification results is limited due to the large number of certif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/40
CPCH04L9/3213H04L63/08H04L63/10
Inventor 林斌
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD