Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication processing method, device and system

A processing method and technology of an authentication system, applied in the field of computer data processing, can solve the problems of increased investment in research and development costs, increased system coupling, and high design costs, reducing investment in research and development costs, speeding up access, and achieving universal the effect of

Active Publication Date: 2020-08-04
ADVANCED NEW TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The processing method adopted by the existing technology, whenever there is a new authentication access requirement, authentication information verification, persistence, verification channel call, authentication result calculation, etc., often need to be based on the personalized requirements of the new business redesign and development
However, conventional code development, testing, regression, release and other research and development processes consume a lot of labor costs and operating hours, which increases the investment in research and development costs, and the access speed of new authentication scenarios is also relatively low.
At the same time, with the continuous access of authentication scenarios, the coupling degree of the system will continue to increase, resulting in an increase in maintenance costs
[0004] The R&D and design cost of the authentication method used in the existing technology is high, the cycle is long, the efficiency is low, and the flexibility is poor, and the authentication system designed by the existing technology will lead to the maintenance of the entire authentication system with the continuous access of authentication scenarios cost increase

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication processing method, device and system
  • Authentication processing method, device and system
  • Authentication processing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of this application.

[0039] The scene-based adaptive authentication method and device described in this application will be described in detail below with reference to the accompanying drawings. figure 1 It is a schematic flow chart of an embodiment of an authentication processing method described in this application. Although the present application provides t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication processing method, an authentication processing device and an authentication processing system. The authentication processing method comprises steps: authentication information constraint configuration in preset authentication configuration information is analyzed and acquired, and the acquired authentication information is checked according to the authentication information constraint configuration; the authentication information after being checked is converted to domain model data in a preset data format and the data are persisted to a database; checking service configuration in the authentication configuration information is analyzed and acquired, and according to the checking service configuration, validity checking is carried out on the authentication information in the database, and a checking result is persisted to the database; and an authentication status calculation rule in the authentication configuration information is read, the checking result is calculated according to the authentication status calculation rule, and an authentication result is determined according to the calculation result. By adopting the embodiment of the invention, service authentication in multiple authentication scenes can be realized quickly, flexibly and conveniently, the authentication efficiency is improved, and the authentication process development design period and the development cost are reduced.

Description

technical field [0001] The present application belongs to the field of computer data processing, and in particular relates to an authentication processing method, device and system. Background technique [0002] Authentication processing is often required in various industry fields such as enterprise registration, new user registration, and online banking account opening. Due to different services, each application has different requirements for authentication. Therefore, for the certification requirements of different applications, it is often necessary to develop a set of corresponding certification processes. [0003] The development of a certification process usually requires a complete set of research and development processes such as development, testing, regression, and release. In the face of complex and diverse authentication processes, the current existing technology mainly adopts a use-case-driven approach, which can design corresponding authentication processes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0876H04L65/1073
Inventor 葛雍龙
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products