User authentication method, intelligent gateway and authentication server
A technology of authentication server and intelligent gateway, which is applied to a method of user authentication, in the field of intelligent gateway and authentication server, can solve the problems of different authentication processes, inconvenience for users to access third-party business systems, and inability to realize unified authentication of users, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] figure 1It is a flow chart of the user authentication method provided by Embodiment 1 of the present invention. The embodiment of the present invention aims at the fact that when a user accesses different third-party business systems at present, due to the different service providers, the corresponding third-party business platforms have different verification processes for customers, which brings great benefits to users when accessing third-party business systems. Inconvenience, and for different third-party business systems, the corresponding third-party business platforms have different authentication methods for users, and the unified authentication of users cannot be realized, so a user authentication method is provided. Such as figure 1 As shown, the specific steps of the method are as follows:
[0039] Step S101 , the intelligent gateway receives a first service access request sent by a user through a terminal, and the first service access request includes user...
Embodiment 2
[0052] figure 2 It is a flow chart of the user authentication method provided by Embodiment 2 of the present invention. On the basis of the first embodiment above, in this embodiment, before the intelligent gateway sends the first user authentication request to the authentication server, it further includes: the intelligent gateway determines whether to Allow access to the target service through the smart gateway; if it is determined that the target service is allowed to be accessed through the smart gateway, the smart gateway sends a first user authentication request to the authentication server. Such as figure 2 As shown, the specific steps of the method are as follows:
[0053] Step S201, the intelligent gateway receives a first service access request sent by a user through a terminal, and the first service access request includes user login information and characteristic information of a target service that the user requests to access.
[0054] Wherein, the target ser...
Embodiment 3
[0076] image 3 It is a flow chart of the user authentication method provided by Embodiment 3 of the present invention. The embodiment of the present invention aims at the fact that when a user accesses different third-party business systems at present, due to the different service providers, the corresponding third-party business platforms have different verification processes for customers, which brings great benefits to users when accessing third-party business systems. Inconvenience, and for different third-party business systems, the corresponding third-party business platforms have different authentication methods for users, and the unified authentication of users cannot be realized, so a user authentication method is provided. Such as image 3 As shown, the specific steps of the method are as follows:
[0077] Step S301, the authentication server receives the first user authentication request sent by the smart gateway, the first user authentication request includes th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com