Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method, first service device, second service device and terminal device

A technology of service equipment and terminal equipment, which is applied in the field of login authentication, can solve problems such as poor authentication performance, and achieve the effect of improving authentication performance

Active Publication Date: 2021-11-19
CHINA MOBILE SHANGHAI ICT CO LTD +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides an authentication method, a first service device, a second service device and a terminal device to solve the problem of poor authentication performance in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, first service device, second service device and terminal device
  • Authentication method, first service device, second service device and terminal device
  • Authentication method, first service device, second service device and terminal device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0047] see figure 1 , figure 1 is a flow chart of an authentication method provided by an embodiment of the present invention, which is used for the first service device, such as figure 1 As shown, the method includes the following steps:

[0048] Step 101: Receive a first authentication request sent by a terminal device.

[0049] Wherein, the first authentication request is used to request to perform login authentication on the first service system ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an authentication method, a first service device, a second service device and a terminal device. The method includes: receiving a first authentication request sent by the terminal device; including the first authentication request associated with the second service system in the first authentication request. In the case of authentication information, send a first authentication query request to the second service device; receive the first return result sent by the second service device based on the query of the first authentication information and authentication records; the first return result indicates the second business When the authentication status of the system is authentication success, and it is determined that the authentication status of the second service system is verified, a first authentication passing message is sent to the terminal device. Through the authentication method of the present invention, the terminal device requests login authentication of the first business system, sends the first authentication request to the first service device corresponding to the first business system, performs authentication through the first service device, and sends the first authentication Through messages, authentication performance can be improved.

Description

technical field [0001] The present invention relates to the technical field of login authentication, in particular to an authentication method, a first service device, a second service device and a terminal device. Background technique [0002] With the continuous development of business, various business systems will be built. The user authentication management of each business system can mainly use a unified user authentication management module to authenticate the user login of each business system, that is, there is only one user authentication management module, and each business The system shares this user authentication management module to perform authentication management on users. [0003] Because all user authentication needs to go through the unified user authentication management module, it is easy to cause the performance bottleneck of the user authentication management module, and once this module crashes, all users will not be able to authenticate, that is, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F21/45G06F16/23G06F16/245
CPCG06F21/44G06F21/45G06F16/2358G06F16/245
Inventor 余程钢
Owner CHINA MOBILE SHANGHAI ICT CO LTD