Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network request method, network authentication method, terminal equipment and server

A network request and network authentication technology, applied in the field of communication, can solve the problems of terminal device system incompatibility, high development cost, and difficulty in development for developers, so as to avoid incompatibility, reduce development difficulty and development cost.

Pending Publication Date: 2022-02-08
中电金信软件有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, among many network frameworks, for example, the OKhttp network framework does not provide users with identity authentication functions. If users want to implement identity authentication functions on the basis of this network framework, they need to change the The front-end program code of the applied terminal equipment. Therefore, enterprises using this network framework need to modify the program code of the existing network framework through developers who have the ability to change the program code to increase the identity authentication function. Because the developer The level of the identity authentication function is uneven, and the code writing quality of the identity authentication function cannot be guaranteed. Moreover, due to the difference in the development components used by the developers when developing the program, after changing the code of the front-end program, the system of the terminal device will appear abnormal. The situation of compatibility makes it more difficult for developers to develop and the development cost is higher

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network request method, network authentication method, terminal equipment and server
  • Network request method, network authentication method, terminal equipment and server
  • Network request method, network authentication method, terminal equipment and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] Below in conjunction with the accompanying drawings in Example embodiments of the present application, technical solutions in the embodiments of the present application will be clearly and completely described.

[0088] Below in conjunction with embodiments illustrated in the drawings of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described, obviously, the described embodiments are merely part of embodiments of the present application, rather than all embodiments. Components of the present application embodiments described and illustrated in the drawings herein can be arranged and designed in a variety of different configurations. Thus, the following detailed description of the embodiments of the present application provided in the drawings is not intended to limit the scope of the present application claimed, but only the selected embodiments of the present application. Based on the embodimen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network request method, a network authentication method, terminal equipment and a server. The method comprises the following steps: acquiring a network authentication level of a server network interface required to be called by accessing a service system; according to the registration information of the user, determining at least one identity authentication mode required for performing access authority authentication on the user under the network authentication level; obtaining at least one identity authentication parameter needing to be authenticated in each identity authentication mode; and sending a network request token generated based on at least one identity authentication parameter of each identity authentication mode and the interface authentication parameter of the network interface to a server, so that the server authenticates whether the user has the access authority. Therefore, whether the user has the access authority or not can be authenticated through the network interface of the server side, the situation that a system of the terminal equipment is incompatible due to the fact that a front-end program code is changed can be avoided, and the development difficulty and development cost of developers can be reduced.

Description

Technical field [0001] This application relates to the field of communication technology, and in particular, there is a network request method, a network authentication method, a terminal device, and a server. Background technique [0002] With the increasing maturity of network communication technology, more and more companies need to rely on the network during processing related businesses, and exchanges between employees in the enterprises also need to rely on the network, so network communication on terminal devices. Safety has gradually received everyone's attention, in order to ensure that the security of network communications is an indispensable step of authenticating the visitor's identity. [0003] Currently, in a wide range of network frameworks, for example, the OKHTTP network framework does not provide identity authentication capabilities for users. If the user wants to implement the authentication function on the basis of the network framework, you need to change th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/40
CPCH04L9/3236H04L9/3226H04L9/3213H04L63/0807H04L63/083H04L63/0876H04L63/102
Inventor 张剑锋苏景博
Owner 中电金信软件有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More