CN112182535A - Operation request processing method and device, electronic equipment and readable storage medium - Google Patents

Operation request processing method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN112182535A
CN112182535A CN202011015166.2A CN202011015166A CN112182535A CN 112182535 A CN112182535 A CN 112182535A CN 202011015166 A CN202011015166 A CN 202011015166A CN 112182535 A CN112182535 A CN 112182535A
Authority
CN
China
Prior art keywords
authentication
user
operation request
authentication result
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011015166.2A
Other languages
Chinese (zh)
Inventor
康岩基
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCB Finetech Co Ltd filed Critical CCB Finetech Co Ltd
Priority to CN202011015166.2A priority Critical patent/CN112182535A/en
Publication of CN112182535A publication Critical patent/CN112182535A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The embodiment of the application provides an operation request processing method and device, electronic equipment and a readable storage medium. The method comprises the following steps: when an operation request sent by a user through a browser is detected, acquiring an authentication mode corresponding to the operation request; authenticating the user based on the authentication mode to obtain an authentication result; and processing the operation request based on the authentication result. Based on the scheme, the authority authentication of the operation request of the user can be realized through the browser, complicated authority setting in the financial system can be responded, the authority does not need to be applied, and the processing efficiency is higher.

Description

Operation request processing method and device, electronic equipment and readable storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for processing an operation request, an electronic device, and a readable storage medium.
Background
Browsers are application programs used to retrieve, present, and deliver Web information resources. A Web information Resource is tagged by a Uniform Resource Identifier (URI), which is a Web page, a picture, a piece of video, or any content presented on the Web. The user can browse the information associated with each other through a browser by means of Hyperlinks (Hyperlinks).
With the development of technology, browsers are not only information browsing tools, but also gradually become some transaction processing tools, such as making an online purchase, booking an air ticket, completing a workflow, and the like.
When a browser user uses a browser to perform certain operations, the operations may have certain security level requirements, currently, a system pre-manufactured authorization system is mainly adopted to limit an account number of the user, the user obtains corresponding authorization information through permission approval, and the system determines whether the user can perform related operations to browse related contents. However, the business process in the financial field is duplicated, the authority setting is complicated, the application needs to be submitted for the authorization of new authority, the auditing period is long, and the business is not favorable for quick development.
Disclosure of Invention
The present application aims to solve at least one of the above technical drawbacks. The technical scheme adopted by the application is as follows:
in a first aspect, an embodiment of the present application provides a method for processing an operation request, where the method includes:
when an operation request sent by a user through a browser is detected, acquiring an authentication mode corresponding to the operation request;
authenticating the user based on the authentication mode to obtain an authentication result;
and processing the operation request based on the authentication result.
Optionally, processing the operation request based on the authentication result includes:
if the authentication result is that the authentication is passed, authorizing the operation request;
and if the authentication result is that the authentication is not passed, refusing the authorization of the operation request.
Optionally, if the authentication method corresponding to the operation request is face recognition authentication, authenticating the user based on the authentication method to obtain an authentication result, including:
acquiring a facial image of a user, and performing identity identification verification based on the facial image;
and if the identity identification passes the verification, determining that the authentication result of the user is authentication passing.
Optionally, capturing a facial image of the user, comprising:
and calling a camera through the browser to acquire a facial image of the user.
Optionally, the identity authentication is performed based on the facial image pair, including:
and through a preset face recognition module, performing identity recognition verification based on the face image pair.
Optionally, if the authentication manner corresponding to the operation request is login authentication, authenticating the user based on the authentication manner to obtain an authentication result, including:
acquiring login information of a user, and performing login authentication based on the login information;
and if the login authentication is passed, determining that the authentication result of the user is passed.
Optionally, obtaining login information of the user includes:
and displaying the login interface, and acquiring login information submitted by the user on the login interface.
In a second aspect, an embodiment of the present application provides an apparatus for processing an operation request, where the apparatus includes:
the authentication mode acquisition module is used for acquiring an authentication mode corresponding to an operation request when the operation request sent by a user through a browser is detected;
the authentication module is used for authenticating the user based on the authentication mode to obtain an authentication result;
and the request processing module is used for processing the operation request based on the authentication result.
Optionally, the request processing module is specifically configured to:
if the authentication result is that the authentication is passed, authorizing the operation request;
and if the authentication result is that the authentication is not passed, refusing the authorization of the operation request.
Optionally, if the authentication manner corresponding to the operation request is face identification authentication, the authentication module is specifically configured to:
acquiring a facial image of a user, and performing identity identification verification based on the facial image;
and if the identity identification passes the verification, determining that the authentication result of the user is authentication passing.
Optionally, the authentication module is specifically configured to, when acquiring a facial image of a user:
and calling a camera through the browser to acquire a facial image of the user.
Optionally, the authentication module, when performing the identification verification based on the facial image pair, is specifically configured to:
and through a preset face recognition module, performing identity recognition verification based on the face image pair.
Optionally, if the authentication manner corresponding to the operation request is login authentication, the authentication module is specifically configured to:
acquiring login information of a user, and performing login authentication based on the login information;
and if the login authentication is passed, determining that the authentication result of the user is passed.
Optionally, when obtaining the login information of the user, the authentication module is specifically configured to:
and displaying the login interface, and acquiring login information submitted by the user on the login interface.
In a third aspect, an embodiment of the present application provides an electronic device, including: a processor and a memory;
a memory for storing operating instructions;
the processor is used for executing the processing method of the operation request shown in any implementation mode of the first aspect of the application by calling the operation instruction.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a method for processing an operation request shown in any implementation manner of the first aspect of the present application.
The technical scheme provided by the embodiment of the application has the following beneficial effects:
according to the scheme provided by the embodiment of the application, when the operation request sent by the user through the browser is detected, the authentication mode corresponding to the operation request is obtained, the user is authenticated based on the authentication mode to obtain the authentication result, and the operation request is processed based on the authentication result. Based on the scheme, the authority authentication of the operation request of the user can be realized through the browser, complicated authority setting in the financial system can be responded, the authority does not need to be applied, and the processing efficiency is higher.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flowchart of a method for processing an operation request according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an operation request processing apparatus according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 1 shows a schematic flowchart of a method for processing an operation request according to an embodiment of the present application, and as shown in fig. 1, the method mainly includes:
step S110: when an operation request sent by a user through a browser is detected, acquiring an authentication mode corresponding to the operation request;
step S120: authenticating the user based on the authentication mode to obtain an authentication result;
step S130: and processing the operation request based on the authentication result.
The browser in the embodiment of the application can be a safe browser developed based on the safety requirement of a financial system, and the management of the authority of the user operation request can be realized through the browser.
In the embodiment of the application, because each step operation in the business process has certain safety requirements when the user transacts the financial business, the corresponding authentication mode can be respectively preset for each operation request in the business process.
In the embodiment of the application, the authentication result can be obtained by authenticating the user, and the authority management is performed on the operation request according to the authentication result.
According to the method provided by the embodiment of the application, when the operation request sent by the user through the browser is detected, the authentication mode corresponding to the operation request is obtained, the user is authenticated based on the authentication mode to obtain the authentication result, and the operation request is processed based on the authentication result. Based on the scheme, the authority authentication of the operation request of the user can be realized through the browser, complicated authority setting in the financial system can be responded, the authority does not need to be applied, and the processing efficiency is higher.
In an optional manner of the embodiment of the present application, processing the operation request based on the authentication result includes:
if the authentication result is that the authentication is passed, authorizing the operation request;
and if the authentication result is that the authentication is not passed, refusing the authorization of the operation request.
In the embodiment of the application, if the authentication result of the user authentication is that the authentication is passed, the operation request can be authorized to be executed.
In the embodiment of the application, if the authentication result of the user authentication is that the authentication fails, the operation request can be authorized to be refused to be executed.
In an optional manner of the embodiment of the application, if the authentication manner corresponding to the operation request is face identification authentication, authenticating the user based on the authentication manner to obtain an authentication result includes:
acquiring a facial image of a user, and performing identity identification verification based on the facial image;
and if the identity identification passes the verification, determining that the authentication result of the user is authentication passing.
In the embodiment of the application, some authentication modes of the operation request can be configured as face recognition authentication.
Specifically, a facial image of the user may be captured and identity verification may be performed based on the facial image of the user. If the identity identification passes the verification, the user can be considered to have the authority of the operation request, and the authentication result of the user can be determined to be that the authentication passes.
In an optional mode of the embodiment of the present application, acquiring a facial image of a user includes:
and calling a camera through the browser to acquire a facial image of the user.
In the embodiment of the application, the browser can call the camera of the terminal equipment to collect the facial image of the user, and a basis is provided for face recognition.
In an optional mode of the embodiment of the present application, performing identification verification based on a facial image pair includes:
and through a preset face recognition module, performing identity recognition verification based on the face image pair.
In the embodiment of the application, the browser can preset a facial recognition module for processing the facial image so as to realize identity recognition and verification.
In an optional manner of the embodiment of the application, if the authentication manner corresponding to the operation request is login authentication, authenticating the user based on the authentication manner to obtain an authentication result, including:
acquiring login information of a user, and performing login authentication based on the login information;
and if the login authentication is passed, determining that the authentication result of the user is passed.
In the embodiment of the application, some authentication modes of the operation request can be configured as login authentication.
Specifically, the user model may be login-authenticated to verify whether the authority of the user supports the operation corresponding to the execution operation request.
In an optional manner of the embodiment of the present application, obtaining login information of a user includes:
and displaying the login interface, and acquiring login information submitted by the user on the login interface.
In the embodiment of the application, the browser can display the login interface, and the user can enter login information on the login interface.
Based on the same principle as the method shown in fig. 1, fig. 2 shows a schematic structural diagram of an operation request processing apparatus provided in an embodiment of the present application, and as shown in fig. 2, the operation request processing apparatus 20 may include:
an authentication mode obtaining module 210, configured to obtain, when an operation request sent by a user through a browser is detected, an authentication mode corresponding to the operation request;
the authentication module 220 is configured to authenticate the user based on an authentication manner to obtain an authentication result;
and a request processing module 230, configured to process the operation request based on the authentication result.
According to the device provided by the embodiment of the application, when the operation request sent by the user through the browser is detected, the authentication mode corresponding to the operation request is obtained, the user is authenticated based on the authentication mode to obtain the authentication result, and the operation request is processed based on the authentication result. Based on the scheme, the authority authentication of the operation request of the user can be realized through the browser, complicated authority setting in the financial system can be responded, the authority does not need to be applied, and the processing efficiency is higher.
Optionally, the request processing module is specifically configured to:
if the authentication result is that the authentication is passed, authorizing the operation request;
and if the authentication result is that the authentication is not passed, refusing the authorization of the operation request.
Optionally, if the authentication manner corresponding to the operation request is face identification authentication, the authentication module is specifically configured to:
acquiring a facial image of a user, and performing identity identification verification based on the facial image;
and if the identity identification passes the verification, determining that the authentication result of the user is authentication passing.
Optionally, the authentication module is specifically configured to, when acquiring a facial image of a user:
and calling a camera through the browser to acquire a facial image of the user.
Optionally, the authentication module, when performing the identification verification based on the facial image pair, is specifically configured to:
and through a preset face recognition module, performing identity recognition verification based on the face image pair.
Optionally, if the authentication manner corresponding to the operation request is login authentication, the authentication module is specifically configured to:
acquiring login information of a user, and performing login authentication based on the login information;
and if the login authentication is passed, determining that the authentication result of the user is passed.
Optionally, when obtaining the login information of the user, the authentication module is specifically configured to:
and displaying the login interface, and acquiring login information submitted by the user on the login interface.
It is to be understood that the above modules of the processing apparatus of the operation request in the present embodiment have functions of implementing the corresponding steps of the processing method of the operation request in the embodiment shown in fig. 1. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above. The modules can be software and/or hardware, and each module can be implemented independently or by integrating a plurality of modules. For the functional description of each module of the processing apparatus for the operation request, reference may be specifically made to the corresponding description of the processing method for the operation request in the embodiment shown in fig. 1, and details are not repeated here.
The embodiment of the application provides an electronic device, which comprises a processor and a memory;
a memory for storing operating instructions;
and the processor is used for executing the processing method of the operation request provided by any embodiment of the application by calling the operation instruction.
As an example, fig. 3 shows a schematic structural diagram of an electronic device to which an embodiment of the present application is applicable, and as shown in fig. 3, the electronic device 2000 includes: a processor 2001 and a memory 2003. Wherein the processor 2001 is coupled to a memory 2003, such as via a bus 2002. Optionally, the electronic device 2000 may also include a transceiver 2004. It should be noted that the transceiver 2004 is not limited to one in practical applications, and the structure of the electronic device 2000 is not limited to the embodiment of the present application.
The processor 2001 is applied to the embodiment of the present application to implement the method shown in the above method embodiment. The transceiver 2004 may include a receiver and a transmitter, and the transceiver 2004 is applied to the embodiments of the present application to implement the functions of the electronic device of the embodiments of the present application to communicate with other devices when executed.
The Processor 2001 may be a CPU (Central Processing Unit), general Processor, DSP (Digital Signal Processor), ASIC (Application Specific Integrated Circuit), FPGA (Field Programmable Gate Array) or other Programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 2001 may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs and microprocessors, and the like.
Bus 2002 may include a path that conveys information between the aforementioned components. The bus 2002 may be a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus 2002 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 3, but this does not mean only one bus or one type of bus.
The Memory 2003 may be a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these.
Optionally, the memory 2003 is used for storing application program code for performing the disclosed aspects, and is controlled in execution by the processor 2001. The processor 2001 is configured to execute the application program code stored in the memory 2003 to implement the processing method of the operation request provided in any embodiment of the present application.
The electronic device provided by the embodiment of the application is applicable to any embodiment of the method, and is not described herein again.
Compared with the prior art, when an operation request sent by a user through a browser is detected, an authentication mode corresponding to the operation request is obtained, the user is authenticated based on the authentication mode to obtain an authentication result, and the operation request is processed based on the authentication result. Based on the scheme, the authority authentication of the operation request of the user can be realized through the browser, complicated authority setting in the financial system can be responded, the authority does not need to be applied, and the processing efficiency is higher.
The embodiment of the present application provides a computer-readable storage medium, which stores a computer program thereon, and when the program is executed by a processor, the program implements the processing method of the operation request shown in the above method embodiment.
The computer-readable storage medium provided in the embodiments of the present application is applicable to any of the embodiments of the foregoing method, and is not described herein again.
Compared with the prior art, when an operation request sent by a user through a browser is detected, an authentication mode corresponding to the operation request is obtained, the user is authenticated based on the authentication mode to obtain an authentication result, and the operation request is processed based on the authentication result. Based on the scheme, the authority authentication of the operation request of the user can be realized through the browser, complicated authority setting in the financial system can be responded, the authority does not need to be applied, and the processing efficiency is higher.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (10)

1. A method for processing operation requests is characterized by comprising the following steps:
when an operation request sent by a user through a browser is detected, acquiring an authentication mode corresponding to the operation request;
authenticating the user based on the authentication mode to obtain an authentication result;
and processing the operation request based on the authentication result.
2. The method of claim 1, wherein processing the operation request based on the authentication result comprises:
if the authentication result is that the authentication is passed, authorizing the operation request;
and if the authentication result is that the authentication is not passed, refusing the authorization of the operation request.
3. The method according to claim 1, wherein if an authentication method corresponding to the operation request is face recognition authentication, the authenticating the user based on the authentication method to obtain an authentication result includes:
acquiring a facial image of a user, and performing identity recognition verification based on the facial image;
and if the identity identification passes the verification, determining that the authentication result of the user is authentication passing.
4. The method of claim 3, wherein the capturing of the facial image of the user comprises:
and calling a camera through the browser to acquire a facial image of the user.
5. The method of claim 3, wherein said performing identification verification based on said facial image comprises:
and through a preset facial recognition module, performing identity recognition verification based on the facial image.
6. The method according to claim 1, wherein if the authentication method corresponding to the operation request is login authentication, the authenticating the user based on the authentication method to obtain the authentication result comprises:
acquiring login information of the user, and performing login authentication based on the login information;
and if the login authentication is passed, determining that the authentication result of the user is passed.
7. The method of claim 6, wherein the obtaining login information of the user comprises:
and displaying a login interface, and acquiring login information submitted by the user on the login interface.
8. An apparatus for processing an operation request, comprising:
the authentication mode acquisition module is used for acquiring an authentication mode corresponding to an operation request sent by a user through a browser when the operation request is detected;
the authentication module is used for authenticating the user based on the authentication mode to obtain an authentication result;
and the request processing module is used for processing the operation request based on the authentication result.
9. An electronic device comprising a processor and a memory;
the memory is used for storing operation instructions;
the processor is used for executing the method of any one of claims 1-7 by calling the operation instruction.
10. A computer-readable storage medium, characterized in that the storage medium has stored thereon a computer program which, when being executed by a processor, carries out the method of any one of claims 1-7.
CN202011015166.2A 2020-09-24 2020-09-24 Operation request processing method and device, electronic equipment and readable storage medium Pending CN112182535A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011015166.2A CN112182535A (en) 2020-09-24 2020-09-24 Operation request processing method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011015166.2A CN112182535A (en) 2020-09-24 2020-09-24 Operation request processing method and device, electronic equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN112182535A true CN112182535A (en) 2021-01-05

Family

ID=73956195

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011015166.2A Pending CN112182535A (en) 2020-09-24 2020-09-24 Operation request processing method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN112182535A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170289146A1 (en) * 2016-04-04 2017-10-05 Nhn Entertainment Corporation Authentication method with enhanced security based on eye recognition and authentication system thereof
US20180091490A1 (en) * 2016-09-23 2018-03-29 Apple Inc. Authentication framework for a client of a remote database
CN108667761A (en) * 2017-03-27 2018-10-16 上海格尔软件股份有限公司 A method of protecting single-sign-on using safe socket character layer conversation
CN108900561A (en) * 2018-09-28 2018-11-27 北京芯盾时代科技有限公司 The method, apparatus and system of single-sign-on
CN110071932A (en) * 2019-04-29 2019-07-30 云深互联(北京)科技有限公司 A kind of security access system and method
CN111193710A (en) * 2019-11-29 2020-05-22 云深互联(北京)科技有限公司 Multi-application login method and device based on browser

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170289146A1 (en) * 2016-04-04 2017-10-05 Nhn Entertainment Corporation Authentication method with enhanced security based on eye recognition and authentication system thereof
US20180091490A1 (en) * 2016-09-23 2018-03-29 Apple Inc. Authentication framework for a client of a remote database
CN108667761A (en) * 2017-03-27 2018-10-16 上海格尔软件股份有限公司 A method of protecting single-sign-on using safe socket character layer conversation
CN108900561A (en) * 2018-09-28 2018-11-27 北京芯盾时代科技有限公司 The method, apparatus and system of single-sign-on
CN110071932A (en) * 2019-04-29 2019-07-30 云深互联(北京)科技有限公司 A kind of security access system and method
CN111193710A (en) * 2019-11-29 2020-05-22 云深互联(北京)科技有限公司 Multi-application login method and device based on browser

Similar Documents

Publication Publication Date Title
US20200162457A1 (en) System for electronic authentication with live user determination
CN109389723B (en) Visitor management method and device using face recognition and computer equipment
EP2929479B1 (en) Method and apparatus of account login
US11057372B1 (en) System and method for authenticating a user to provide a web service
CN111030812A (en) Token verification method, device, storage medium and server
CN110011957B (en) Security authentication method and device for enterprise account, electronic equipment and storage medium
CN114556356B (en) User authentication framework
US11663306B2 (en) System and method for confirming a person's identity
TWM539667U (en) System of online credentials application for network transaction via carrier
CN111104653B (en) User operation processing method and device, electronic equipment and readable storage medium
CN103975567A (en) Dual-factor authentication method and virtual machine device
CN111464555A (en) File signing confirmation method based on client screen video, service server, authentication server and client
CN111585987B (en) Identity authentication method and device, electronic equipment and computer readable storage medium
CN112182606A (en) Access request processing method and device, electronic equipment and readable storage medium
US20180174150A1 (en) Systems and methods for processing a payment transaction authorization request
US8910260B2 (en) System and method for real time secure image based key generation using partial polygons assembled into a master composite image
CN108965335B (en) Method for preventing malicious access to login interface, electronic device and computer medium
CN111666541A (en) Copyright purchasing and using method and device, electronic equipment and readable storage medium
CN116628652A (en) Authentication method and device for financial system, electronic equipment and storage medium
CN111314343A (en) Account management method and device and readable storage medium
CN107707550B (en) Method, device and system for accessing virtual machine
CN113935008B (en) User authentication method, device, electronic equipment and computer readable storage medium
CN112182535A (en) Operation request processing method and device, electronic equipment and readable storage medium
WO2018066426A1 (en) Fake web page determination device, fake web page determination system, fake web page determination method, and fake web page determination program
CN111784355B (en) Transaction security verification method and device based on edge calculation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220919

Address after: 25 Financial Street, Xicheng District, Beijing 100033

Applicant after: CHINA CONSTRUCTION BANK Corp.

Address before: 12 / F, 15 / F, 99 Yincheng Road, Pudong New Area pilot Free Trade Zone, Shanghai, 200120

Applicant before: Jianxin Financial Science and Technology Co.,Ltd.