Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application authentication method and device and electronic equipment

An authentication method and target application technology, applied in the field of devices and electronic equipment, application authentication methods, can solve the problems of Token invalid authentication, failure, etc., and achieve the effect of ensuring reliability

Pending Publication Date: 2022-07-12
NEW H3C BIG DATA TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides an application authentication method, device and electronic equipment to solve the problem of authentication failure caused by user Token invalidation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application authentication method and device and electronic equipment
  • Application authentication method and device and electronic equipment
  • Application authentication method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative efforts shall fall within the protection scope of the present invention.

[0064] The application authentication method provided by the embodiment of the present invention is applied to a scenario where multiple applications need to be invoked to process the same user operation request. For example, for user operation request A, application 1 is called first, then application 2, application 3, and so on. The number...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of identity authentication, in particular to an application authentication method and device and electronic equipment.The method comprises the steps that an application calling request of a last called application for a current to-be-called application is obtained, and the application calling request carries a user token and an application token of the last called application; the user token is used for authenticating identity information of a current user and the user token passes authentication in a called application, and the application token is used for authenticating a calling permission of the current application; and based on the user token and the application token, calling authentication of the current to-be-called application is carried out, and an authentication result is determined. According to the method, the application token is carried in the application calling request when the current application is called after the authentication of the user token in the last called application is passed, and when the current to-be-called application is authenticated, even if the user token is invalid, the application token can be used for authentication, so that the problem of authentication failure caused by expiration of the user token is solved.

Description

technical field [0001] The present invention relates to the technical field of identity authentication, in particular to an application authentication method, device and electronic device. Background technique [0002] Token is a credential that identifies the user's identity. When the user operates the application, the system client or web page will bring the user's Token, and the application system will verify the user's Token to determine the user's identity. For example, as figure 1 As shown, the process of a user logging in to an application: the user enters the user name and password in the browser; the browser transmits the user name and password to the application system; the application system calls the internal authentication system to generate a Token; the application system returns the Token to the browser , the browser saves in cookies. Further, as figure 2 As shown, the user operates an application function process: the user clicks the page button in the br...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/40
CPCH04L9/3213H04L63/08
Inventor 郭勇
Owner NEW H3C BIG DATA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products