Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Unauthorized verification method and device, equipment and storage medium

A verification method and equipment technology, applied in the field of unauthorized verification, can solve the problems of strong code intrusion and poor scalability, and achieve the effect of strong scalability and avoiding pollution

Pending Publication Date: 2022-02-25
CHINA PING AN LIFE INSURANCE CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The code is highly intrusive. When the business scenario changes, the code needs to be modified, and the scalability is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unauthorized verification method and device, equipment and storage medium
  • Unauthorized verification method and device, equipment and storage medium
  • Unauthorized verification method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0063] The terms used in the following embodiments of the present application are only for the purpose of describing specific embodiments, and are not intended to limit the present application. As used in the specification and appended claims of this application, the singular expressions "a", "an", "said", "above", "the" and "this" are intended to also Plural expressions are included unless the context clearly indicates otherwise.

[0064] In this application, "at least one (item)" means one or more, "multiple" means two or more, "at least two (items)" means two or three and three Above, "and / or" is used to describe the association relationship of associated objects, which means that there can be three kinds of relationships, for example, "A and / or B" can mean: only A exists, only B exists, and A and B exist at the same time A case where A and B can be sing...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of unauthorized verification, and provides an unauthorized verification method and device, equipment and a storage medium, and the unauthorized verification method comprises the steps: receiving a user request sent by terminal equipment, and determining a target service interface corresponding to the user request; under the condition that a section layer is configured for the target service interface in advance, obtaining a target unauthorized verification protocol configured for the target service interface through the section layer, and the target unauthorized verification protocol comprising at least one unauthorized verification parameter; and through the section layer, according to the at least one unauthorized verification parameter, carrying out unauthorized verification on the user request. By implementing the application, decoupling with a business layer can be realized, and pollution of service codes is avoided.

Description

technical field [0001] The present application relates to the technical field of unauthorized verification, in particular to an unauthorized verification method, device and storage medium. Background technique [0002] The problem of unauthorized access is a common vulnerability in web applications, and it can be divided into horizontal verification (for example, user A has accessed the information of user B) and vertical verification (for example, ordinary users have obtained information with administrator rights). Violation of authority means that the business system does not impose strict restrictions on a certain operation authority or account, resulting in normal operation authority for accounts that do not have operation authority, resulting in the leakage of a large number of user sensitive information, and even illegally manipulate the private data of other accounts. [0003] The unauthorized vulnerability is a logical vulnerability related to the business. The tradi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F9/455
CPCG06F21/577G06F9/45558G06F2009/45591
Inventor 李杨成杰峰
Owner CHINA PING AN LIFE INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products