Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An authentication configuration method, device and computer-readable storage medium

A technology of identity verification and configuration method, which is applied in the field of information security, can solve problems such as not being identical, business systems accessing each other is complicated, etc., to solve development problems, avoid the process of version release, and reduce the effect of high error rate

Active Publication Date: 2021-08-03
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This complicates the mutual access between these business systems—both sides of the interaction need to develop according to the identity authentication method of the other party, and authentication rules are often related to specific businesses
Therefore, although the identity authentication codes have a great similarity, they are not exactly the same. Almost every docking requires code development for identity authentication
Therefore, although the identity authentication code has a great similarity, it is not exactly the same, so almost every docking requires code development for identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication configuration method, device and computer-readable storage medium
  • An authentication configuration method, device and computer-readable storage medium
  • An authentication configuration method, device and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Embodiments of the identity verification configuration method, device and computer-readable storage medium of the present invention will be described below with reference to the accompanying drawings. Those skilled in the art would recognize that the described embodiments can be modified in various ways or combinations thereof without departing from the spirit and scope of the invention. Accordingly, the drawings and description are illustrative in nature and not intended to limit the scope of the claims. Also, in this specification, the drawings are not drawn to scale, and like reference numerals denote like parts.

[0020] An authentication configuration method such as figure 1 shown, including the following steps:

[0021] Step S10, encapsulating the data models of the encryption rules, decryption rules, signature rules, and signature verification rules in the FreeMarker template engine, so as to replace the content in the interpolation symbol ${} in the later stag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This solution relates to the field of information security, and provides an identity verification configuration method, device, and computer-readable storage medium. The method includes: separately encapsulating the data models of encryption, decryption, signature, and signature verification rules in a template engine; establishing an identity verification configuration Template, set replaceable data through ${}; embed the authentication configuration template into the JAVA application as a dependency package, call the authentication configuration template through the interface in the JAVA application, and make the encryption rules, decryption rules, signature rules, and signature verification rules Replace the replaceable data in ${} to form an identity authentication rule, or, the identity authentication configuration template is stored on the server, and the JAVA application accesses the identity authentication configuration template through HTTP, and replaces the identity authentication with the encapsulated encryption, decryption, signature, and signature verification rules The replaceable data of ${} in the configuration template forms an identity authentication rule. The present invention does not require repeated code development and reduces workload.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an identity verification configuration method, device and computer-readable storage medium. Background technique [0002] Digital signatures are now commonly used for identity authentication. For some newer systems, standard Basic Auth, OAuth, HMAC and other methods are generally used to implement identity authentication. But for some older business systems, many of them have adopted custom authentication schemes. This complicates the mutual access between these business systems—both sides of the interaction need to develop according to the identity authentication method of the other party, and the authentication rules are often related to specific businesses. Therefore, although the identity authentication codes have a great similarity, they are not exactly the same. Almost every docking requires the development of identity authentication codes. Therefore...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/32
Inventor 吴春海谭智文王峰李国颂
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products