Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity verification method and system and storage medium

An identity verification and generation algorithm technology, applied in the field of information security, can solve the problem of occupying server resources, and achieve the effect of reducing storage pressure and saving server resources.

Pending Publication Date: 2022-05-17
AGRICULTURAL BANK OF CHINA
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above method depends on the validity of the session and needs to occupy server resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and system and storage medium
  • Identity verification method and system and storage medium
  • Identity verification method and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0057] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an identity verification method and system and a storage medium, and the method comprises the steps: a server generates a first time-efficient token according to a token generation algorithm and first user information which is uploaded by a terminal and contains a verification identifier; after the terminal establishes request connection with the server, the terminal receives and stores a first aging token issued by the server; after the terminal triggers an identity verification event, the terminal uploads the first aging token and the second user information to the server, so that the server performs identity verification by using the first aging token and the second user information and generates a verification result; and after the server executes the terminal request operation according to the verification result, the request connection is interrupted. According to the embodiment of the invention, identity verification in a session-free state can be realized, the problem that the existing identity verification method needs to occupy server resources is solved, the storage pressure of the server is reduced, and the server resources are saved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security, and in particular to an identity verification method, system and storage medium. Background technique [0002] At present, programs and software of many terminals need to provide users with corresponding query, display and other service functions by accessing online resources of the server. Before sending online resources, the server needs to confirm whether the request sent by the terminal is valid to ensure access security. [0003] As far as the prior art is concerned, before sending online resources to the terminal, the server usually stores the user information in the session for user identity verification, and then confirms the validity of the online resource request sent by the terminal. However, the above methods depend on the validity of the session and need to occupy server resources. Contents of the invention [0004] The invention provides an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32H04L9/08H04L67/141
CPCH04L63/0807H04L67/141H04L9/3213H04L9/0861H04L9/3297
Inventor 蔡志兆
Owner AGRICULTURAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products