Movatterモバイル変換


[0]ホーム

URL:


CN111343168B - Identity authentication method and device, computer equipment and readable storage medium - Google Patents

Identity authentication method and device, computer equipment and readable storage medium
Download PDF

Info

Publication number
CN111343168B
CN111343168BCN202010102388.1ACN202010102388ACN111343168BCN 111343168 BCN111343168 BCN 111343168BCN 202010102388 ACN202010102388 ACN 202010102388ACN 111343168 BCN111343168 BCN 111343168B
Authority
CN
China
Prior art keywords
information
access
verification code
terminal
accessed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN202010102388.1A
Other languages
Chinese (zh)
Other versions
CN111343168A (en
Inventor
李正航
艾文敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Financial Technology Co Ltd Shanghai
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd ShanghaifiledCriticalOneConnect Financial Technology Co Ltd Shanghai
Priority to CN202010102388.1ApriorityCriticalpatent/CN111343168B/en
Publication of CN111343168ApublicationCriticalpatent/CN111343168A/en
Priority to PCT/CN2021/071060prioritypatent/WO2021164459A1/en
Application grantedgrantedCritical
Publication of CN111343168BpublicationCriticalpatent/CN111343168B/en
Expired - Fee Relatedlegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

Translated fromChinese

本发明公开了一种身份验证的方法、装置、计算机设备及可读存储介质,该方法包括:接收由访问端发送来的访问请求;其中,所述访问请求包括:验证码、被访问端信息;判断所述验证码是否有效,并在所述验证码有效的情况下从本地数据库中查找到与所述验证码对应的访问权限级别;判断在与所述访问权限级别对应的权限列表中是否包含所述被访问端信息;当在所述权限列表中包含所述被访问端信息时,从与所述被访问端信息对应的密码数据库中获取与所述访问权限级别对应的登录密码信息;将所述登录密码信息发送至与所述访问请求对应的被访问端,以利用所述登录密码信息登录所述被访问端;本发明可以简化登录流程,提高访问安全性。

Figure 202010102388

The invention discloses a method, device, computer equipment and readable storage medium for identity verification. The method includes: receiving an access request sent by an access terminal; wherein, the access request includes: verification code, information of the accessed terminal ; Judging whether the verification code is valid, and finding the access authority level corresponding to the verification code from the local database when the verification code is valid; Judging whether in the authority list corresponding to the access authority level Including the accessed terminal information; when the accessed terminal information is included in the permission list, obtain the login password information corresponding to the access authority level from the password database corresponding to the accessed terminal information; The login password information is sent to the accessed terminal corresponding to the access request, so as to use the login password information to log in to the accessed terminal; the present invention can simplify the login process and improve the access security.

Figure 202010102388

Description

Identity authentication method and device, computer equipment and readable storage medium
Technical Field
The invention relates to the technical field of internet, in particular to an identity authentication method, an identity authentication device, computer equipment and a readable storage medium.
Background
With the continuous development of internet technology, enterprises generally need to interface multiple business systems to implement different business operations, for example, enterprises in the financial industry need to interface multiple business systems for product management, instruction management, wind control compliance management, financial management, and the like; however, each business system has different login entries, the user terminal in the enterprise needs to use different business systems through frequent login operations, the identity authentication modes of each business system are different, and the user terminal in the enterprise needs to acquire login account information of each business system; therefore, how to simplify the complexity of the user terminal accessing each service system and ensure the security of the user terminal accessing the service system by the enterprise becomes a technical problem which needs to be solved urgently.
Disclosure of Invention
The invention aims to provide an identity authentication method, an identity authentication device, computer equipment and a readable storage medium, which can simplify a login process and improve access security.
According to an aspect of the present invention, there is provided an identity authentication method, specifically including the steps of:
receiving an access request sent by an access terminal; wherein the access request comprises: verification code and accessed terminal information;
judging whether the verification code is valid or not, and searching the access authority level corresponding to the verification code from a local database under the condition that the verification code is valid;
judging whether the access terminal information is contained in a permission list corresponding to the access permission level;
when the access terminal information is contained in the authority list, obtaining login password information corresponding to the access authority level from a password database corresponding to the access terminal information;
and sending the login password information to an accessed terminal corresponding to the access request so as to log in the accessed terminal by utilizing the login password information.
Optionally, before the receiving the access request sent by the access terminal, the method further includes:
receiving platform registration information sent by the access terminal; wherein the platform registration information includes: login account information and user basic information;
generating the verification code according to the login account information, and determining the access authority level according to the user basic information;
and storing the verification code and the access authority level into the local database, and sending the verification code to the access terminal.
Optionally, the determining whether the verification code is valid specifically includes:
and when the verification code exists in the local database and the time interval between the first time for storing the verification code and the second time for receiving the access request is less than a preset threshold value, judging that the verification code is valid.
Optionally, the method further includes:
sending invitation information to the accessed terminal through a preset interface, and receiving connection establishment approval information fed back by the accessed terminal through the preset interface;
and configuring a database according to the connection establishment agreement information to provide an access entrance for accessing the accessed terminal.
Optionally, after the access terminal successfully logs in the access terminal, the method further includes:
obtaining event information to be handled and reminding event information from the accessed terminal; wherein the event information to be handled includes: the event reminding method comprises the following steps of obtaining information of the number of events to be handled, name information of the events to be handled and skip link information of the events to be handled, wherein the reminding event information comprises: reminding event number information, reminding event name information and reminding event skip link information;
and displaying the information of the event to be handled and the information of the reminding event through a display interface.
According to another aspect of the present invention, there is also provided an identity verification apparatus, which specifically includes the following components:
the receiving module is used for receiving the access request sent by the access terminal; wherein the access request comprises: verification code and accessed terminal information;
the searching module is used for judging whether the verification code is valid or not and searching the access authority level corresponding to the verification code from a local database under the condition that the verification code is valid;
the judging module is used for judging whether the access terminal information is contained in the authority list corresponding to the access authority level;
the acquisition module is used for acquiring login password information corresponding to the access authority level from a password database corresponding to the accessed terminal information when the authority list contains the accessed terminal information;
and the sending module is used for sending the login password information to an accessed terminal corresponding to the access request so as to log in the accessed terminal by using the login password information.
Optionally, the apparatus further comprises:
the processing module is used for receiving the platform registration information sent by the access terminal; wherein the platform registration information includes: login account information and user basic information; generating the verification code according to the login account information, and determining the access authority level according to the user basic information; and storing the verification code and the access authority level into the local database, and sending the verification code to the access terminal.
Optionally, the determining module is specifically configured to:
and when the verification code exists in the local database and the time interval between the first time for storing the verification code and the second time for receiving the access request is less than a preset threshold value, judging that the verification code is valid.
According to another aspect of the present invention, there is also provided a computer device, specifically including: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method of authentication described above when executing the program.
According to another aspect of the present invention, there is also provided a computer readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the steps of the method of authentication described above.
According to the identity authentication method, the identity authentication device, the computer equipment and the readable storage medium, the access terminal can access each service system through the integrated platform integrating each service system, so that unified access entries of different service systems are realized, and the tedious work of repeatedly accessing each service system is reduced; the invention provides a unified identity verification mechanism, realizes the function of repeated authentication of once login, and greatly reduces the maintenance cost of identity verification. In addition, the invention can also improve the safety of identity authentication.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a schematic flow chart of an alternative method for authentication according to an embodiment;
fig. 2 is a schematic diagram of an alternative program module of the apparatus for identity authentication according to the third embodiment;
fig. 3 is a schematic diagram of an alternative hardware architecture of the computer device according to the fourth embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
The embodiment of the invention provides an identity authentication method, which is applied to a financial-industry resource management integrated platform, and as shown in figure 1, the identity authentication method specifically comprises the following steps:
step S101: receiving an access request sent by an access terminal; wherein the access request comprises: verification code, accessed terminal information.
In this embodiment, the resource management integrated platform is an integrated platform integrating a plurality of resource management service systems; the access terminal is a user terminal used for accessing each resource management service system through the resource management integrated platform; each of the asset management service systems integrated in the asset management integration platform can be regarded as a visited end. Preferably, the accessed terminal information is the IP address information or the ID information of the accessed terminal;
specifically, before the receiving the access request sent by the access terminal, the method further includes:
step A1: receiving platform registration information sent by the access terminal; wherein the platform registration information includes: login account information and user basic information;
when a user logs in the resource management integration platform for the first time through the access terminal, a registration operation is required; in the registration operation process, the user needs to log in the resource management integration platform by using the login account information and report the basic information of the user.
Preferably, the user level information includes: the system comprises user current network environment information, user affiliated department information and user position information.
Step A2: generating the verification code according to the login account information, and determining the access authority level according to the user basic information;
preferably, the access right level includes: high, medium, low; the higher the access authority level is, the more the number of the accessed terminals accessible by the access terminal is; in step a2, the access right level may be determined according to a preset algorithm based on the current network environment information of the user, the department information of the user, and the position information of the user.
Step A3: and storing the verification code and the access authority level into a local database, and sending the verification code to the access terminal.
Step S102: and judging whether the verification code is valid or not, and searching the access authority level corresponding to the verification code from the local database under the condition that the verification code is valid.
Specifically, the determining whether the verification code is valid specifically includes:
and when the verification code exists in the local database and the time interval between the first time for storing the verification code and the second time for receiving the access request is less than a preset threshold value, judging that the verification code is valid.
In the application, the verification code has timeliness, and after the verification code is expired, a new verification code needs to be distributed to the user again, so that the safety of the resource management integration platform is improved.
Step S103: and judging whether the access terminal information is contained in the authority list corresponding to the access authority level.
Specifically, the method further comprises:
respectively setting a corresponding authority list for each access authority level; each permission list contains accessed terminal information which can be accessed by the corresponding access permission level.
In this embodiment, different users have different access right levels, and the types of accessed terminals that can be accessed by the users are limited by setting the access right levels of the users.
Step S104: and when the access terminal information is contained in the authority list, obtaining login password information corresponding to the access authority level from a password database corresponding to the access terminal information.
Specifically, the method further comprises:
respectively setting a corresponding password database for each accessed terminal information, and respectively setting corresponding login password information for each access authority level in each password database; and the access right of the user in the accessed terminal is limited by different login password information.
Step S105: and sending the login password information to the access terminal so that the access terminal can log in the accessed terminal by using the login password information.
In this embodiment, the identity of the user is verified through the verification code, whether the user can access the accessed terminal is judged according to the access authority level, and finally the user logs in the accessed terminal through the login password information corresponding to the access authority level.
Specifically, the method further comprises:
sending invitation information to the accessed terminal through a preset interface, and receiving connection establishment approval information fed back by the accessed terminal through the preset interface;
and configuring a database according to the connection establishment agreement information to provide an access entrance for accessing the accessed terminal.
In this embodiment, the asset management integration platform integrates access portals of various types of asset management service systems (i.e., accessed terminals), and a user can access each asset management service system through the asset management integration platform.
Further, after the access terminal successfully logs in the access terminal, the method further includes:
obtaining event information to be handled and reminding event information from the accessed terminal; wherein the event information to be handled includes: the event reminding method comprises the following steps of obtaining information of the number of events to be handled, name information of the events to be handled and skip link information of the events to be handled, wherein the reminding event information comprises: reminding event number information, reminding event name information and reminding event skip link information;
and displaying the information of the event to be handled and the information of the reminding event through a display interface.
In this embodiment, the user can visually check the backlog and the reminder in each asset management service system, and quickly access the detailed data through the backlog link and the reminder link.
Example two
The embodiment of the invention provides an identity authentication method, which is applied to a resource management integration platform, wherein the resource management integration platform integrates various resource management service systems, and an access terminal can access the various resource management service systems through the resource management integration platform; specifically, the asset management integration platform comprises: the system comprises a user interaction module, an identity authentication module and a service module; the user interaction module is connected with the access terminal, so that the access terminal can log in the resource management integration platform through the user interaction module; the identity authentication module is used for performing identity authentication and authority authentication on the user logging in the resource management integration platform, and only the user who passes the identity authentication and has corresponding authority can access the corresponding service module through the resource management integration platform; each service module corresponds to a resource management service system, and the service module comprises: the system comprises a product management module, an instruction management module, a wind control compliance management module, a combination management module and a financial management module.
The identity authentication method specifically comprises the following steps:
step S201: the user interaction module receives a service access request from an access terminal and judges whether the service access request contains a verification code;
if yes, go to step S202; if not, a rejection request message is sent to the access terminal.
The service access request is information which is input by a user on the access terminal and is used for requesting a certain service operation; the service access request comprises: the method comprises the steps of verifying codes, service module information to be accessed by a user and service information to be executed by the user;
it should be noted that the service module information in this embodiment is equivalent to the visited end information in the first embodiment, and the service module in this embodiment is equivalent to the visited end in the first embodiment.
Specifically, before step S201, the method further includes:
step A1: the user interaction module receives platform registration information sent by the access terminal and sends the platform registration information to the identity verification module; wherein the platform registration information includes: login account information and user basic information;
step A2: the identity authentication module generates the authentication code according to the login account information and determines the access authority level according to the user basic information;
step A3: the identity authentication module stores the authentication code and the access authority level into a local database and sends the authentication code to the user interaction module;
step A4: and the user interaction module sends the verification code to the access terminal.
Specifically, the access terminal stores the authentication information into a cookie when receiving the authentication code.
In this embodiment, when an access terminal logs in the resource management integration platform for the first time, registration is required to be performed, so that the resource management integration platform generates a verification code for the access terminal.
Step S202: and the user interaction module sends the verification code and the service module information in the service access request to the identity verification module.
Step S203: the identity authentication module judges whether the authentication code is valid, if so, the step S204 is executed; if not, sending authentication failure information to the user interaction module, so that the user interaction module sends an access refusing message to the access terminal when receiving the authentication failure information.
Specifically, the method further comprises:
in step a3, the authentication module stores the first time at which the authentication information was formed in the local database.
Further, in step S203, the identity authentication module obtains a second time when the identity authentication module is received, and determines whether a time interval between the second time and the first time is smaller than a preset threshold, if so, sends a verification failure message to the user interaction module, and if not, determines that the verification code is valid.
In this embodiment, a unique verification code is generated for each user logging in the resource management integration platform, and when the user needs to access any service module through the resource management integration platform, the user interaction module sends the verification code of the user to the identity verification module to verify the identity verification information of the user; in this embodiment, when a user logs in the resource management integration platform for the first time, the identity authentication module may assign an authentication code to the user, and after obtaining the authentication code, the user may access the service module through the resource management integration platform within a set time period.
Step S204: the identity authentication module searches an access authority level corresponding to the authentication code from a local database and judges whether the service module information is contained in an authority list corresponding to the access authority level; if so, executing step S205, otherwise, sending verification failure information to the user interaction module, so that the user interaction module sends a message of denying access to the access terminal when receiving the verification failure information.
Specifically, before step S204, a corresponding permission list is set in the identity authentication module for each access permission level; each permission list contains the service module information which can be accessed by the corresponding access permission level.
In this embodiment, different users have different access right levels, and the types of service modules that can be accessed by the users are limited by setting the access right levels of the users.
Step S205: and the identity authentication module acquires login password information corresponding to the access authority level from a password database corresponding to the service module information.
Specifically, before step S205, the method further includes: the identity authentication module sets a corresponding password database for each service module respectively, and sets corresponding login password information for each access authority level in the password database of each service module respectively; and limiting the access right of the user in the service module through different login password information.
In this embodiment, the identity authentication module authenticates the identity of the user through the authentication code, determines whether the user can access the service module according to the access permission level, and finally logs in the service module through login password information corresponding to the access permission level.
Step S206: and the identity authentication module sends the login password information to a service module corresponding to the service module information so as to login the service module, thereby executing corresponding resource management service according to the service information.
Specifically, the resource management integration platform further comprises: building a connecting module; the connection module is used for establishing the connection between the resource management integration platform and each resource management service system, and therefore, the method further comprises the following steps:
step B1: the building module sends invitation information to each resource management service system which needs to be integrated in the resource management integration platform through an HTTP API (hyper text transport protocol API) interface;
step B2: the connection establishing module receives connection establishing agreement information fed back by each resource management service system through an HTTP API;
wherein the connection establishment agreement information comprises: service module name information, service module access authority information, and service module access address information.
Step B3: and the connection module performs database configuration according to the connection agreement information so as to provide an access entrance for accessing each resource management service system in the resource management integration platform.
Further, the resource management integration platform further comprises: the display module is used for acquiring the information of the event to be handled and the information of the reminding event from the service module after the access terminal successfully logs in the service module; wherein the event information to be handled includes: the event reminding method comprises the following steps of obtaining information of the number of events to be handled, name information of the events to be handled and skip link information of the events to be handled, wherein the reminding event information comprises: reminding event number information, reminding event name information and reminding event skip link information; and sending the to-do time information and the reminding event information to the access terminal so that the access terminal can display the to-do event information and the reminding event information through a display interface.
In this embodiment, the resource management integration platform provides a universal interface based on an OpenAPI for each resource management service system, so that all the resource management service systems of the B/S architecture can be accessed to the resource management integration platform; in addition, the resource management integrated platform provides access entries of all resource management service systems for users in a unified mode through the user interaction module, and displays the information of events to be handled and the information of reminding events of all the resource management service systems for the users through the user interaction module, so that the users can access all the service modules through the user interaction module and check all the events to be handled and all the reminding events.
EXAMPLE III
The embodiment of the invention provides an identity authentication device, which is applied to a resource management integrated platform, and as shown in fig. 2, the identity authentication device specifically comprises the following components:
a receiving module 301, configured to receive an access request sent by an access terminal; wherein the access request comprises: verification code, accessed terminal information.
Specifically, the apparatus further comprises:
the processing module is used for receiving the platform registration information sent by the access terminal; wherein the platform registration information includes: login account information and user basic information; generating the verification code according to the login account information, and determining the access authority level according to the user basic information; and storing the verification code and the access authority level into the local database, and sending the verification code to the access terminal.
The searching module 302 is configured to determine whether the verification code is valid, and search, in a local database, an access permission level corresponding to the verification code when the verification code is valid.
Specifically, the search module 302 is specifically configured to:
and when the verification code exists in the local database and the time interval between the first time for storing the verification code and the second time for receiving the access request is less than a preset threshold value, judging that the verification code is valid.
The judging module 303 is configured to judge whether the authority list corresponding to the access authority level includes the accessed terminal information.
An obtaining module 304, configured to, when the authority list includes the accessed terminal information, obtain login password information corresponding to the access authority level from a password database corresponding to the accessed terminal information.
A sending module 305, configured to send the login password information to the access end, so that the access end logs in the accessed end by using the login password information.
Specifically, the apparatus further comprises:
the integrated module is used for sending invitation information to the accessed terminal through a preset interface and receiving connection establishment approval information fed back by the accessed terminal through the preset interface; and configuring a database according to the connection establishment agreement information to provide an access entrance for accessing the accessed terminal.
Further, the apparatus further comprises:
the display module is used for acquiring information of events to be handled and information of reminding events from the accessed terminal after the accessed terminal successfully logs in the accessed terminal; wherein the event information to be handled includes: the event reminding method comprises the following steps of obtaining information of the number of events to be handled, name information of the events to be handled and skip link information of the events to be handled, wherein the reminding event information comprises: reminding event number information, reminding event name information and reminding event skip link information; and displaying the information of the event to be handled and the information of the reminding event through a display interface.
Example four
The embodiment also provides a computer device, such as a smart phone, a tablet computer, a notebook computer, a desktop computer, a rack server, a blade server, a tower server or a rack server (including an independent server or a server cluster composed of a plurality of servers) capable of executing programs, and the like. As shown in fig. 3, the computer device 40 of the present embodiment at least includes but is not limited to: amemory 401, a processor 402, which may be communicatively coupled to each other via a system bus. It is noted that FIG. 3 only shows the computer device 40 havingcomponents 401 and 402, but it is understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead.
In this embodiment, the memory 401 (i.e., a readable storage medium) includes a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, thestorage 401 may be an internal storage unit of the computer device 40, such as a hard disk or a memory of the computer device 40. In other embodiments, thememory 401 may also be an external storage device of the computer device 40, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), or the like, provided on the computer device 40. Of course, thememory 401 may also include both internal and external storage devices for the computer device 40. In the present embodiment, thememory 401 is generally used for storing an operating system installed in the computer device 40 and various types of application software, such as program codes of the apparatus for implementing authentication in the third embodiment. Further, thememory 401 may also be used to temporarily store various types of data that have been output or are to be output.
Processor 402 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 402 is generally operative to control the overall operation of the computer device 40.
Specifically, in this embodiment, the processor 402 is configured to execute the program of the method for authentication stored in the processor 402, and the program of the method for authentication implements the following steps when executed:
receiving an access request sent by an access terminal; wherein the access request comprises: verification code and accessed terminal information;
judging whether the verification code is valid or not, and searching the access authority level corresponding to the verification code from a local database under the condition that the verification code is valid;
judging whether the access terminal information is contained in a permission list corresponding to the access permission level;
when the access terminal information is contained in the authority list, obtaining login password information corresponding to the access authority level from a password database corresponding to the access terminal information;
and sending the login password information to an accessed terminal corresponding to the access request so as to log in the accessed terminal by utilizing the login password information.
The specific embodiment process of the above method steps can be referred to in the first embodiment, and the detailed description of this embodiment is not repeated here.
EXAMPLE five
The present embodiments also provide a computer readable storage medium, such as a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application mall, etc., having stored thereon a computer program that when executed by a processor implements the method steps of:
receiving an access request sent by an access terminal; wherein the access request comprises: verification code and accessed terminal information;
judging whether the verification code is valid or not, and searching the access authority level corresponding to the verification code from a local database under the condition that the verification code is valid;
judging whether the access terminal information is contained in a permission list corresponding to the access permission level;
when the access terminal information is contained in the authority list, obtaining login password information corresponding to the access authority level from a password database corresponding to the access terminal information;
and sending the login password information to an accessed terminal corresponding to the access request so as to log in the accessed terminal by utilizing the login password information.
The specific embodiment process of the above method steps can be referred to in the first embodiment, and the detailed description of this embodiment is not repeated here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

Translated fromChinese
1.一种身份验证的方法,其特征在于,所述方法包括:1. a method for identity verification, characterized in that the method comprises:接收由访问端发送来的访问请求;其中,所述访问请求包括:验证码、被访问端信息;Receive the access request sent by the access terminal; wherein, the access request includes: verification code, information of the accessed terminal;判断所述验证码是否有效,并在所述验证码有效的情况下从本地数据库中查找到与所述验证码对应的访问权限级别;Judging whether the verification code is valid, and finding the access authority level corresponding to the verification code from the local database when the verification code is valid;判断在与所述访问权限级别对应的权限列表中是否包含所述被访问端信息;Judging whether the accessed terminal information is included in the permission list corresponding to the access permission level;当在所述权限列表中包含所述被访问端信息时,从与所述被访问端信息对应的密码数据库中获取与所述访问权限级别对应的登录密码信息;When the accessed terminal information is included in the permission list, obtain login password information corresponding to the access authority level from a password database corresponding to the accessed terminal information;将所述登录密码信息发送至与所述访问请求对应的被访问端,以利用所述登录密码信息登录所述被访问端;sending the login password information to the accessed terminal corresponding to the access request, so as to log in to the accessed terminal by using the login password information;此外,所述方法还包括:In addition, the method also includes:分别为每个访问权限级别设置对应的权限列表;每个权限列表中包含对应的访问权限级别所能访问的被访问端信息;Set a corresponding permission list for each access permission level; each permission list contains the accessed terminal information that can be accessed by the corresponding access permission level;分别为每个被访问端信息设置对应的密码数据库,并在每个密码数据库中分别为各个访问权限级别设置对应的登录密码信息。A corresponding password database is respectively set for each accessed terminal information, and corresponding login password information is respectively set for each access authority level in each password database.2.根据权利要求1所述的身份验证的方法,其特征在于,在所述接收由访问端发送来的访问请求之前,所述方法还包括:2. The method for identity verification according to claim 1, wherein before the receiving the access request sent by the access terminal, the method further comprises:接收由所述访问端发送来的平台注册信息;其中,所述平台注册信息包括:登录账号信息和用户基本信息;Receive the platform registration information sent by the access terminal; wherein, the platform registration information includes: login account information and basic user information;根据所述登录账号信息生成所述验证码,并根据所述用户基本信息确定出所述访问权限级别;Generate the verification code according to the login account information, and determine the access authority level according to the basic user information;将所述验证码和访问权限级别存储到所述本地数据库中,并将所述验证码发送至所述访问端。The verification code and the access authority level are stored in the local database, and the verification code is sent to the access terminal.3.根据权利要求2所述的身份验证的方法,其特征在于,所述判断所述验证码是否有效,具体包括:3. The method for identity verification according to claim 2, wherein the judging whether the verification code is valid, specifically comprises:当在所述本地数据库中存在所述验证码,且存储所述验证码的第一时间与接收到所述访问请求的第二时间的时间间隔小于预设阈值时,判定所述验证码有效。When the verification code exists in the local database, and the time interval between the first time when the verification code is stored and the second time when the access request is received is less than a preset threshold, it is determined that the verification code is valid.4.根据权利要求1所述的身份验证的方法,其特征在于,所述方法还包括:4. The method for identity verification according to claim 1, wherein the method further comprises:通过预设接口向所述被访问端发送邀请信息,并通过所述预设接口接收由所述被访问端反馈回的同意建连信息;Send invitation information to the visited terminal through a preset interface, and receive connection establishment approval information fed back by the visited terminal through the preset interface;根据所述同意建连信息进行数据库配置,以提供用于访问所述被访问端的访问入口。Database configuration is performed according to the agreed connection establishment information, so as to provide an access entry for accessing the accessed terminal.5.根据权利要求1所述的身份验证的方法,其特征在于,在所述访问端成功登录所述被访问端之后,所述方法还包括:5. The method for identity verification according to claim 1, wherein after the accessing terminal successfully logs in the accessed terminal, the method further comprises:从所述被访问端中获取待办事件信息和提醒事件信息;其中,所述待办事件信息包括:待办事件数量信息、待办事件名称信息、待办事件跳转链接信息,所述提醒事件信息包括:提醒事件数量信息、提醒事件名称信息、提醒事件跳转链接信息;Obtain to-do event information and reminder event information from the visited terminal; wherein, the to-do event information includes: to-do event quantity information, to-do event name information, to-do event jump link information, and the reminder The event information includes: reminder event quantity information, reminder event name information, reminder event jump link information;通过显示界面显示所述待办事件信息和提醒事件信息。The to-do event information and the reminder event information are displayed through the display interface.6.一种身份验证的装置,其特征在于,所述装置包括:6. A device for identity verification, wherein the device comprises:接收模块,用于接收由访问端发送来的访问请求;其中,所述访问请求包括:验证码、被访问端信息;a receiving module, configured to receive an access request sent by an access terminal; wherein, the access request includes: a verification code and information of the accessed terminal;查找模块,用于判断所述验证码是否有效,并在所述验证码有效的情况下从本地数据库中查找到与所述验证码对应的访问权限级别;a search module for judging whether the verification code is valid, and finding the access authority level corresponding to the verification code from the local database when the verification code is valid;判断模块,用于判断在与所述访问权限级别对应的权限列表中是否包含所述被访问端信息;a judging module for judging whether the accessed terminal information is included in the permission list corresponding to the access permission level;获取模块,用于当在所述权限列表中包含所述被访问端信息时,从与所述被访问端信息对应的密码数据库中获取与所述访问权限级别对应的登录密码信息;an acquisition module, configured to acquire login password information corresponding to the access authority level from a password database corresponding to the accessed terminal information when the accessed terminal information is included in the authority list;发送模块,用于将所述登录密码信息发送至与所述访问请求对应的被访问端,以利用所述登录密码信息登录所述被访问端;a sending module, configured to send the login password information to the accessed terminal corresponding to the access request, so as to log in to the accessed terminal by using the login password information;此外,所述装置还用于:In addition, the device is also used for:分别为每个访问权限级别设置对应的权限列表;每个权限列表中包含对应的访问权限级别所能访问的被访问端信息;Set a corresponding permission list for each access permission level; each permission list contains the accessed terminal information that can be accessed by the corresponding access permission level;分别为每个被访问端信息设置对应的密码数据库,并在每个密码数据库中分别为各个访问权限级别设置对应的登录密码信息。A corresponding password database is respectively set for each accessed terminal information, and corresponding login password information is respectively set for each access authority level in each password database.7.根据权利要求6所述的身份验证的装置,其特征在于,所述装置还包括:7. The device for identity verification according to claim 6, wherein the device further comprises:处理模块,用于接收由所述访问端发送来的平台注册信息;其中,所述平台注册信息包括:登录账号信息和用户基本信息;根据所述登录账号信息生成所述验证码,并根据所述用户基本信息确定出所述访问权限级别;将所述验证码和访问权限级别存储到所述本地数据库中,并将所述验证码发送至所述访问端。a processing module, configured to receive the platform registration information sent by the access terminal; wherein, the platform registration information includes: login account information and basic user information; generate the verification code according to the login account information, and The access authority level is determined from the basic user information; the verification code and the access authority level are stored in the local database, and the verification code is sent to the access terminal.8.根据权利要求7所述的身份验证的装置,其特征在于,所述判断模块,具体用于:8. The device for identity verification according to claim 7, wherein the judging module is specifically used for:当在所述本地数据库中存在所述验证码,且存储所述验证码的第一时间与接收到所述访问请求的第二时间的时间间隔小于预设阈值时,判定所述验证码有效。When the verification code exists in the local database, and the time interval between the first time when the verification code is stored and the second time when the access request is received is less than a preset threshold, it is determined that the verification code is valid.9.一种计算机设备,所述计算机设备包括:存储器、处理器以及存储在所述存储器上并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述程序时实现权利要求1至5任一项所述方法的步骤。9. A computer device, the computer device comprising: a memory, a processor, and a computer program stored on the memory and executable on the processor, characterized in that when the processor executes the program Carry out the steps of the method of any one of claims 1 to 5.10.一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述程序被处理器执行时实现权利要求1至5任一项所述方法的步骤。10. A computer-readable storage medium on which a computer program is stored, characterized in that, when the program is executed by a processor, the steps of the method according to any one of claims 1 to 5 are implemented.
CN202010102388.1A2020-02-192020-02-19Identity authentication method and device, computer equipment and readable storage mediumExpired - Fee RelatedCN111343168B (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
CN202010102388.1ACN111343168B (en)2020-02-192020-02-19Identity authentication method and device, computer equipment and readable storage medium
PCT/CN2021/071060WO2021164459A1 (en)2020-02-192021-01-11Identity verification method and apparatus, computer device, and readable storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202010102388.1ACN111343168B (en)2020-02-192020-02-19Identity authentication method and device, computer equipment and readable storage medium

Publications (2)

Publication NumberPublication Date
CN111343168A CN111343168A (en)2020-06-26
CN111343168Btrue CN111343168B (en)2022-01-28

Family

ID=71186966

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202010102388.1AExpired - Fee RelatedCN111343168B (en)2020-02-192020-02-19Identity authentication method and device, computer equipment and readable storage medium

Country Status (2)

CountryLink
CN (1)CN111343168B (en)
WO (1)WO2021164459A1 (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111343168B (en)*2020-02-192022-01-28深圳壹账通智能科技有限公司Identity authentication method and device, computer equipment and readable storage medium
CN112528305B (en)*2020-12-162023-10-10平安银行股份有限公司Access control method, device, electronic equipment and storage medium
CN113076529B (en)*2021-04-142022-09-27湖南快乐阳光互动娱乐传媒有限公司Access control method, device, computer readable storage medium and equipment
CN113707346B (en)*2021-09-022022-06-14广州方舟信息科技有限公司Novel online inquiry system and method based on Internet hospital
CN113722691A (en)*2021-09-142021-11-30京东科技控股股份有限公司Method and device for realizing self-service access of merchant data
CN114117376B (en)*2022-01-282022-04-15蘑菇物联技术(深圳)有限公司Identity authentication method, method for distributing dynamic password and corresponding equipment
CN115964687A (en)*2022-12-142023-04-14武汉卓讯互动信息科技有限公司Block chain-based enterprise unified account authentication method and platform
CN116112279A (en)*2023-02-222023-05-12中国建设银行股份有限公司Access control method, device, computer equipment and storage medium
CN118502985B (en)*2024-05-062025-02-18广州逸虎网络科技有限公司 A method and device for acquiring sub-application data based on a unified management platform
CN118821169B (en)*2024-06-172025-02-28山东科信融创科技服务有限公司 A digital enterprise information management method and management system
CN119011306B (en)*2024-10-252025-01-28中船奥蓝托无锡软件技术有限公司 Data security protection method, device and industrial system based on 1+N architecture
CN119696903B (en)*2024-12-192025-06-13河南融创新合科技有限公司Cloud computing-based password service unified management system, method and storage medium

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN100464336C (en)*2005-06-142009-02-25华为技术有限公司 A method of controlling system account authority
CN102054203A (en)*2009-11-052011-05-11上海久隆信息工程有限公司Processing method and device for enterprise-oriented information resource application integration
CN104243532A (en)*2013-06-212014-12-24鸿富锦精密工业(深圳)有限公司Data access method and system
CN103457878B (en)*2013-09-052016-03-23电子科技大学A kind of access control method based on stream
CN104394174B (en)*2014-12-152017-06-09邱红涛The login method and its login system of social networking system
US10783266B2 (en)*2017-04-062020-09-22Indais Corp.Systems and methods for access control and data management
US11303627B2 (en)*2018-05-312022-04-12Oracle International CorporationSingle Sign-On enabled OAuth token
CN109040024A (en)*2018-07-062018-12-18广东微云科技股份有限公司Resource access authority control method and system
CN109492374B (en)*2018-09-262022-03-18平安医疗健康管理股份有限公司System login method, device, server and storage medium based on identity authentication
CN109670768A (en)*2018-09-272019-04-23深圳壹账通智能科技有限公司Right management method, device, platform and the readable storage medium storing program for executing in multi-service domain
CN109150910A (en)*2018-10-112019-01-04平安科技(深圳)有限公司Log in token generation and verification method, device and storage medium
CN109257391A (en)*2018-11-302019-01-22北京锐安科技有限公司A kind of access authority opening method, device, server and storage medium
CN109639740B (en)*2019-01-312022-02-22平安科技(深圳)有限公司Login state sharing method and device based on equipment ID
CN110516454A (en)*2019-08-132019-11-29苏州浪潮智能科技有限公司 Multi-device interaction method, system, device and computer-readable storage medium
CN110784450A (en)*2019-09-242020-02-11云深互联(北京)科技有限公司Single sign-on method and device based on browser
CN110750765B (en)*2019-09-272022-03-01奇安信科技集团股份有限公司Service system, front-end page control method thereof, computer device, and storage medium
CN111343168B (en)*2020-02-192022-01-28深圳壹账通智能科技有限公司Identity authentication method and device, computer equipment and readable storage medium

Also Published As

Publication numberPublication date
WO2021164459A1 (en)2021-08-26
CN111343168A (en)2020-06-26

Similar Documents

PublicationPublication DateTitle
CN111343168B (en)Identity authentication method and device, computer equipment and readable storage medium
US11138300B2 (en)Multi-factor profile and security fingerprint analysis
US10666637B2 (en)Certificate renewal and deployment
CN113014475B (en)Message pushing integration method and device
US9721106B2 (en)Method and system for scanning a computer system for sensitive content
CN110784450A (en)Single sign-on method and device based on browser
US20130144633A1 (en)Enforcement and assignment of usage rights
CN105162775A (en)Logging method and device of virtual machine
CN110619206A (en)Operation and maintenance risk control method, system, equipment and computer readable storage medium
CN110601832A (en)Data access method and device
CN105162774A (en) Virtual machine login method, virtual machine login method and device for terminal
CN103415847A (en)A system and method for accessing a service
CN109829321B (en)Method, device, equipment and storage medium for authenticating identity
CN111415246A (en)Online business processing method and device for bank outlets
CN111030997A (en)Method and device for monitoring and filtering internal and external network flow, electronic equipment and storage medium
CN106101125A (en)Authentication processing method, Apparatus and system
CN111431857B (en)Authorized access method and device for super account book and storage medium
CN118132247A (en)Cloud platform access method and device, electronic equipment and storage medium
US20180063110A1 (en)Methods and systems for generating a user profile
CN112732676A (en)Data migration method, device, equipment and storage medium based on block chain
CN111709688A (en)Ex-warehouse data processing method and device
CN116226879B (en)Service interface access control method, device, computer equipment and storage medium
CN113395273B (en) Login authentication method, device, device and storage medium
CN115242403A (en)Unified login system and method for intelligent application warehouse
CN109327814B (en)Short message processing method and device, electronic equipment and readable storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant
CF01Termination of patent right due to non-payment of annual fee

Granted publication date:20220128

CF01Termination of patent right due to non-payment of annual fee

[8]ページ先頭

©2009-2025 Movatter.jp