Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and system

An authentication and character string technology, applied in the field of communication, can solve problems such as not being able to meet the higher requirements of authentication efficiency, and achieve the effect of preventing malicious imitation

Active Publication Date: 2017-06-30
WUHAN DOUYU NETWORK TECH CO LTD
View PDF11 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, due to their own security considerations, different large technology companies will design their own authentication encryption algorithms; at the same time, using PHP for authentication operations cannot meet the higher requirements for authentication efficiency in many cases

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system
  • Authentication method and system
  • Authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0020] First, some technical terms involved in the specific embodiments of the present invention will be described.

[0021] HTTP: Request messages from client to server.

[0022] Header: Header header information carried in the HTTP request.

[0023] API (Application Programming Interface, application programming interface): It is some predefined functions, the purpose is to provide applications and developers with the ability to access a set of routines based on certain software or hardware without accessing source code, or understanding internal The details of the working mechanism.

[0024] The public key (Public Key) and the private key (Private Key) are a key pair...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method and system. The method comprises the following steps: adding authentication information in HTTP request header information at a client terminal, and then performing an authentication operation. The authentication method provided by the invention has the advantages that the authentication information is added in the HTTP request Header information and cannot cause a condition that the Urls in the HTTP request Header information are inconsistent; and a special authentication encrypted character string generating algorithm can effectively prevent the third-party from maliciously imitating.

Description

technical field [0001] The present invention relates to the technical field of communication, and more specifically, to an authentication method and system. Background technique [0002] At present, Internet software products are mainly divided into two categories in terms of product audiences, including mass Internet products for end consumers, such as Sina Weibo Web and Zhihu Web. The characteristic of this type of product is that the object of use of this type of product is human beings, and most of the media content provided is unstructured text (such as novels, blogs), pictures, audio and video, etc. Another type of product is aimed at computers, that is, the main form of service is an API (Application Programming Interface, Application Programming Interface) that provides a programming interface, which is convenient for programmers to use the API for secondary development. The characteristic of this type of product is that the service object is a computer, and most of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/06H04L9/00
CPCH04L9/002H04L9/0643H04L63/062H04L63/083H04L63/10H04L63/108H04L67/02
Inventor 胡龙军
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products