CN112182535A - Operation request processing method and device, electronic equipment and readable storage medium - Google Patents
Operation request processing method and device, electronic equipment and readable storage medium Download PDFInfo
- Publication number
- CN112182535A CN112182535A CN202011015166.2A CN202011015166A CN112182535A CN 112182535 A CN112182535 A CN 112182535A CN 202011015166 A CN202011015166 A CN 202011015166A CN 112182535 A CN112182535 A CN 112182535A
- Authority
- CN
- China
- Prior art keywords
- authentication
- user
- operation request
- authentication result
- login
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title abstract description 9
- 238000012545 processing Methods 0.000 claims abstract description 36
- 238000000034 method Methods 0.000 claims abstract description 35
- 230000001815 facial effect Effects 0.000 claims description 32
- 238000012795 verification Methods 0.000 claims description 22
- 238000013475 authorization Methods 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims description 4
- 230000006870 function Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 238000005034 decoration Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000011022 operating instruction Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 235000019800 disodium phosphate Nutrition 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012559 user support system Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The embodiment of the application provides an operation request processing method and device, electronic equipment and a readable storage medium. The method comprises the following steps: when an operation request sent by a user through a browser is detected, acquiring an authentication mode corresponding to the operation request; authenticating the user based on the authentication mode to obtain an authentication result; and processing the operation request based on the authentication result. Based on the scheme, the authority authentication of the operation request of the user can be realized through the browser, complicated authority setting in the financial system can be responded, the authority does not need to be applied, and the processing efficiency is higher.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for processing an operation request, an electronic device, and a readable storage medium.
Background
Browsers are application programs used to retrieve, present, and deliver Web information resources. A Web information Resource is tagged by a Uniform Resource Identifier (URI), which is a Web page, a picture, a piece of video, or any content presented on the Web. The user can browse the information associated with each other through a browser by means of Hyperlinks (Hyperlinks).
With the development of technology, browsers are not only information browsing tools, but also gradually become some transaction processing tools, such as making an online purchase, booking an air ticket, completing a workflow, and the like.
When a browser user uses a browser to perform certain operations, the operations may have certain security level requirements, currently, a system pre-manufactured authorization system is mainly adopted to limit an account number of the user, the user obtains corresponding authorization information through permission approval, and the system determines whether the user can perform related operations to browse related contents. However, the business process in the financial field is duplicated, the authority setting is complicated, the application needs to be submitted for the authorization of new authority, the auditing period is long, and the business is not favorable for quick development.
Disclosure of Invention
The present application aims to solve at least one of the above technical drawbacks. The technical scheme adopted by the application is as follows:
in a first aspect, an embodiment of the present application provides a method for processing an operation request, where the method includes:
when an operation request sent by a user through a browser is detected, acquiring an authentication mode corresponding to the operation request;
authenticating the user based on the authentication mode to obtain an authentication result;
and processing the operation request based on the authentication result.
Optionally, processing the operation request based on the authentication result includes:
if the authentication result is that the authentication is passed, authorizing the operation request;
and if the authentication result is that the authentication is not passed, refusing the authorization of the operation request.
Optionally, if the authentication method corresponding to the operation request is face recognition authentication, authenticating the user based on the authentication method to obtain an authentication result, including:
acquiring a facial image of a user, and performing identity identification verification based on the facial image;
and if the identity identification passes the verification, determining that the authentication result of the user is authentication passing.
Optionally, capturing a facial image of the user, comprising:
and calling a camera through the browser to acquire a facial image of the user.
Optionally, the identity authentication is performed based on the facial image pair, including:
and through a preset face recognition module, performing identity recognition verification based on the face image pair.
Optionally, if the authentication manner corresponding to the operation request is login authentication, authenticating the user based on the authentication manner to obtain an authentication result, including:
acquiring login information of a user, and performing login authentication based on the login information;
and if the login authentication is passed, determining that the authentication result of the user is passed.
Optionally, obtaining login information of the user includes:
and displaying the login interface, and acquiring login information submitted by the user on the login interface.
In a second aspect, an embodiment of the present application provides an apparatus for processing an operation request, where the apparatus includes:
the authentication mode acquisition module is used for acquiring an authentication mode corresponding to an operation request when the operation request sent by a user through a browser is detected;
the authentication module is used for authenticating the user based on the authentication mode to obtain an authentication result;
and the request processing module is used for processing the operation request based on the authentication result.
Optionally, the request processing module is specifically configured to:
if the authentication result is that the authentication is passed, authorizing the operation request;
and if the authentication result is that the authentication is not passed, refusing the authorization of the operation request.
Optionally, if the authentication manner corresponding to the operation request is face identification authentication, the authentication module is specifically configured to:
acquiring a facial image of a user, and performing identity identification verification based on the facial image;
and if the identity identification passes the verification, determining that the authentication result of the user is authentication passing.
Optionally, the authentication module is specifically configured to, when acquiring a facial image of a user:
and calling a camera through the browser to acquire a facial image of the user.
Optionally, the authentication module, when performing the identification verification based on the facial image pair, is specifically configured to:
and through a preset face recognition module, performing identity recognition verification based on the face image pair.
Optionally, if the authentication manner corresponding to the operation request is login authentication, the authentication module is specifically configured to:
acquiring login information of a user, and performing login authentication based on the login information;
and if the login authentication is passed, determining that the authentication result of the user is passed.
Optionally, when obtaining the login information of the user, the authentication module is specifically configured to:
and displaying the login interface, and acquiring login information submitted by the user on the login interface.
In a third aspect, an embodiment of the present application provides an electronic device, including: a processor and a memory;
a memory for storing operating instructions;
the processor is used for executing the processing method of the operation request shown in any implementation mode of the first aspect of the application by calling the operation instruction.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a method for processing an operation request shown in any implementation manner of the first aspect of the present application.
The technical scheme provided by the embodiment of the application has the following beneficial effects:
according to the scheme provided by the embodiment of the application, when the operation request sent by the user through the browser is detected, the authentication mode corresponding to the operation request is obtained, the user is authenticated based on the authentication mode to obtain the authentication result, and the operation request is processed based on the authentication result. Based on the scheme, the authority authentication of the operation request of the user can be realized through the browser, complicated authority setting in the financial system can be responded, the authority does not need to be applied, and the processing efficiency is higher.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flowchart of a method for processing an operation request according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an operation request processing apparatus according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 1 shows a schematic flowchart of a method for processing an operation request according to an embodiment of the present application, and as shown in fig. 1, the method mainly includes:
step S110: when an operation request sent by a user through a browser is detected, acquiring an authentication mode corresponding to the operation request;
step S120: authenticating the user based on the authentication mode to obtain an authentication result;
step S130: and processing the operation request based on the authentication result.
The browser in the embodiment of the application can be a safe browser developed based on the safety requirement of a financial system, and the management of the authority of the user operation request can be realized through the browser.
In the embodiment of the application, because each step operation in the business process has certain safety requirements when the user transacts the financial business, the corresponding authentication mode can be respectively preset for each operation request in the business process.
In the embodiment of the application, the authentication result can be obtained by authenticating the user, and the authority management is performed on the operation request according to the authentication result.
According to the method provided by the embodiment of the application, when the operation request sent by the user through the browser is detected, the authentication mode corresponding to the operation request is obtained, the user is authenticated based on the authentication mode to obtain the authentication result, and the operation request is processed based on the authentication result. Based on the scheme, the authority authentication of the operation request of the user can be realized through the browser, complicated authority setting in the financial system can be responded, the authority does not need to be applied, and the processing efficiency is higher.
In an optional manner of the embodiment of the present application, processing the operation request based on the authentication result includes:
if the authentication result is that the authentication is passed, authorizing the operation request;
and if the authentication result is that the authentication is not passed, refusing the authorization of the operation request.
In the embodiment of the application, if the authentication result of the user authentication is that the authentication is passed, the operation request can be authorized to be executed.
In the embodiment of the application, if the authentication result of the user authentication is that the authentication fails, the operation request can be authorized to be refused to be executed.
In an optional manner of the embodiment of the application, if the authentication manner corresponding to the operation request is face identification authentication, authenticating the user based on the authentication manner to obtain an authentication result includes:
acquiring a facial image of a user, and performing identity identification verification based on the facial image;
and if the identity identification passes the verification, determining that the authentication result of the user is authentication passing.
In the embodiment of the application, some authentication modes of the operation request can be configured as face recognition authentication.
Specifically, a facial image of the user may be captured and identity verification may be performed based on the facial image of the user. If the identity identification passes the verification, the user can be considered to have the authority of the operation request, and the authentication result of the user can be determined to be that the authentication passes.
In an optional mode of the embodiment of the present application, acquiring a facial image of a user includes:
and calling a camera through the browser to acquire a facial image of the user.
In the embodiment of the application, the browser can call the camera of the terminal equipment to collect the facial image of the user, and a basis is provided for face recognition.
In an optional mode of the embodiment of the present application, performing identification verification based on a facial image pair includes:
and through a preset face recognition module, performing identity recognition verification based on the face image pair.
In the embodiment of the application, the browser can preset a facial recognition module for processing the facial image so as to realize identity recognition and verification.
In an optional manner of the embodiment of the application, if the authentication manner corresponding to the operation request is login authentication, authenticating the user based on the authentication manner to obtain an authentication result, including:
acquiring login information of a user, and performing login authentication based on the login information;
and if the login authentication is passed, determining that the authentication result of the user is passed.
In the embodiment of the application, some authentication modes of the operation request can be configured as login authentication.
Specifically, the user model may be login-authenticated to verify whether the authority of the user supports the operation corresponding to the execution operation request.
In an optional manner of the embodiment of the present application, obtaining login information of a user includes:
and displaying the login interface, and acquiring login information submitted by the user on the login interface.
In the embodiment of the application, the browser can display the login interface, and the user can enter login information on the login interface.
Based on the same principle as the method shown in fig. 1, fig. 2 shows a schematic structural diagram of an operation request processing apparatus provided in an embodiment of the present application, and as shown in fig. 2, the operation request processing apparatus 20 may include:
an authentication mode obtaining module 210, configured to obtain, when an operation request sent by a user through a browser is detected, an authentication mode corresponding to the operation request;
the authentication module 220 is configured to authenticate the user based on an authentication manner to obtain an authentication result;
and a request processing module 230, configured to process the operation request based on the authentication result.
According to the device provided by the embodiment of the application, when the operation request sent by the user through the browser is detected, the authentication mode corresponding to the operation request is obtained, the user is authenticated based on the authentication mode to obtain the authentication result, and the operation request is processed based on the authentication result. Based on the scheme, the authority authentication of the operation request of the user can be realized through the browser, complicated authority setting in the financial system can be responded, the authority does not need to be applied, and the processing efficiency is higher.
Optionally, the request processing module is specifically configured to:
if the authentication result is that the authentication is passed, authorizing the operation request;
and if the authentication result is that the authentication is not passed, refusing the authorization of the operation request.
Optionally, if the authentication manner corresponding to the operation request is face identification authentication, the authentication module is specifically configured to:
acquiring a facial image of a user, and performing identity identification verification based on the facial image;
and if the identity identification passes the verification, determining that the authentication result of the user is authentication passing.
Optionally, the authentication module is specifically configured to, when acquiring a facial image of a user:
and calling a camera through the browser to acquire a facial image of the user.
Optionally, the authentication module, when performing the identification verification based on the facial image pair, is specifically configured to:
and through a preset face recognition module, performing identity recognition verification based on the face image pair.
Optionally, if the authentication manner corresponding to the operation request is login authentication, the authentication module is specifically configured to:
acquiring login information of a user, and performing login authentication based on the login information;
and if the login authentication is passed, determining that the authentication result of the user is passed.
Optionally, when obtaining the login information of the user, the authentication module is specifically configured to:
and displaying the login interface, and acquiring login information submitted by the user on the login interface.
It is to be understood that the above modules of the processing apparatus of the operation request in the present embodiment have functions of implementing the corresponding steps of the processing method of the operation request in the embodiment shown in fig. 1. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above. The modules can be software and/or hardware, and each module can be implemented independently or by integrating a plurality of modules. For the functional description of each module of the processing apparatus for the operation request, reference may be specifically made to the corresponding description of the processing method for the operation request in the embodiment shown in fig. 1, and details are not repeated here.
The embodiment of the application provides an electronic device, which comprises a processor and a memory;
a memory for storing operating instructions;
and the processor is used for executing the processing method of the operation request provided by any embodiment of the application by calling the operation instruction.
As an example, fig. 3 shows a schematic structural diagram of an electronic device to which an embodiment of the present application is applicable, and as shown in fig. 3, the electronic device 2000 includes: a processor 2001 and a memory 2003. Wherein the processor 2001 is coupled to a memory 2003, such as via a bus 2002. Optionally, the electronic device 2000 may also include a transceiver 2004. It should be noted that the transceiver 2004 is not limited to one in practical applications, and the structure of the electronic device 2000 is not limited to the embodiment of the present application.
The processor 2001 is applied to the embodiment of the present application to implement the method shown in the above method embodiment. The transceiver 2004 may include a receiver and a transmitter, and the transceiver 2004 is applied to the embodiments of the present application to implement the functions of the electronic device of the embodiments of the present application to communicate with other devices when executed.
The Processor 2001 may be a CPU (Central Processing Unit), general Processor, DSP (Digital Signal Processor), ASIC (Application Specific Integrated Circuit), FPGA (Field Programmable Gate Array) or other Programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 2001 may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs and microprocessors, and the like.
The Memory 2003 may be a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these.
Optionally, the memory 2003 is used for storing application program code for performing the disclosed aspects, and is controlled in execution by the processor 2001. The processor 2001 is configured to execute the application program code stored in the memory 2003 to implement the processing method of the operation request provided in any embodiment of the present application.
The electronic device provided by the embodiment of the application is applicable to any embodiment of the method, and is not described herein again.
Compared with the prior art, when an operation request sent by a user through a browser is detected, an authentication mode corresponding to the operation request is obtained, the user is authenticated based on the authentication mode to obtain an authentication result, and the operation request is processed based on the authentication result. Based on the scheme, the authority authentication of the operation request of the user can be realized through the browser, complicated authority setting in the financial system can be responded, the authority does not need to be applied, and the processing efficiency is higher.
The embodiment of the present application provides a computer-readable storage medium, which stores a computer program thereon, and when the program is executed by a processor, the program implements the processing method of the operation request shown in the above method embodiment.
The computer-readable storage medium provided in the embodiments of the present application is applicable to any of the embodiments of the foregoing method, and is not described herein again.
Compared with the prior art, when an operation request sent by a user through a browser is detected, an authentication mode corresponding to the operation request is obtained, the user is authenticated based on the authentication mode to obtain an authentication result, and the operation request is processed based on the authentication result. Based on the scheme, the authority authentication of the operation request of the user can be realized through the browser, complicated authority setting in the financial system can be responded, the authority does not need to be applied, and the processing efficiency is higher.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.
Claims (10)
1. A method for processing operation requests is characterized by comprising the following steps:
when an operation request sent by a user through a browser is detected, acquiring an authentication mode corresponding to the operation request;
authenticating the user based on the authentication mode to obtain an authentication result;
and processing the operation request based on the authentication result.
2. The method of claim 1, wherein processing the operation request based on the authentication result comprises:
if the authentication result is that the authentication is passed, authorizing the operation request;
and if the authentication result is that the authentication is not passed, refusing the authorization of the operation request.
3. The method according to claim 1, wherein if an authentication method corresponding to the operation request is face recognition authentication, the authenticating the user based on the authentication method to obtain an authentication result includes:
acquiring a facial image of a user, and performing identity recognition verification based on the facial image;
and if the identity identification passes the verification, determining that the authentication result of the user is authentication passing.
4. The method of claim 3, wherein the capturing of the facial image of the user comprises:
and calling a camera through the browser to acquire a facial image of the user.
5. The method of claim 3, wherein said performing identification verification based on said facial image comprises:
and through a preset facial recognition module, performing identity recognition verification based on the facial image.
6. The method according to claim 1, wherein if the authentication method corresponding to the operation request is login authentication, the authenticating the user based on the authentication method to obtain the authentication result comprises:
acquiring login information of the user, and performing login authentication based on the login information;
and if the login authentication is passed, determining that the authentication result of the user is passed.
7. The method of claim 6, wherein the obtaining login information of the user comprises:
and displaying a login interface, and acquiring login information submitted by the user on the login interface.
8. An apparatus for processing an operation request, comprising:
the authentication mode acquisition module is used for acquiring an authentication mode corresponding to an operation request sent by a user through a browser when the operation request is detected;
the authentication module is used for authenticating the user based on the authentication mode to obtain an authentication result;
and the request processing module is used for processing the operation request based on the authentication result.
9. An electronic device comprising a processor and a memory;
the memory is used for storing operation instructions;
the processor is used for executing the method of any one of claims 1-7 by calling the operation instruction.
10. A computer-readable storage medium, characterized in that the storage medium has stored thereon a computer program which, when being executed by a processor, carries out the method of any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011015166.2A CN112182535A (en) | 2020-09-24 | 2020-09-24 | Operation request processing method and device, electronic equipment and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011015166.2A CN112182535A (en) | 2020-09-24 | 2020-09-24 | Operation request processing method and device, electronic equipment and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112182535A true CN112182535A (en) | 2021-01-05 |
Family
ID=73956195
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011015166.2A Pending CN112182535A (en) | 2020-09-24 | 2020-09-24 | Operation request processing method and device, electronic equipment and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112182535A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170289146A1 (en) * | 2016-04-04 | 2017-10-05 | Nhn Entertainment Corporation | Authentication method with enhanced security based on eye recognition and authentication system thereof |
US20180091490A1 (en) * | 2016-09-23 | 2018-03-29 | Apple Inc. | Authentication framework for a client of a remote database |
CN108667761A (en) * | 2017-03-27 | 2018-10-16 | 上海格尔软件股份有限公司 | A method of protecting single-sign-on using safe socket character layer conversation |
CN108900561A (en) * | 2018-09-28 | 2018-11-27 | 北京芯盾时代科技有限公司 | The method, apparatus and system of single-sign-on |
CN110071932A (en) * | 2019-04-29 | 2019-07-30 | 云深互联(北京)科技有限公司 | A kind of security access system and method |
CN111193710A (en) * | 2019-11-29 | 2020-05-22 | 云深互联(北京)科技有限公司 | Multi-application login method and device based on browser |
-
2020
- 2020-09-24 CN CN202011015166.2A patent/CN112182535A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170289146A1 (en) * | 2016-04-04 | 2017-10-05 | Nhn Entertainment Corporation | Authentication method with enhanced security based on eye recognition and authentication system thereof |
US20180091490A1 (en) * | 2016-09-23 | 2018-03-29 | Apple Inc. | Authentication framework for a client of a remote database |
CN108667761A (en) * | 2017-03-27 | 2018-10-16 | 上海格尔软件股份有限公司 | A method of protecting single-sign-on using safe socket character layer conversation |
CN108900561A (en) * | 2018-09-28 | 2018-11-27 | 北京芯盾时代科技有限公司 | The method, apparatus and system of single-sign-on |
CN110071932A (en) * | 2019-04-29 | 2019-07-30 | 云深互联(北京)科技有限公司 | A kind of security access system and method |
CN111193710A (en) * | 2019-11-29 | 2020-05-22 | 云深互联(北京)科技有限公司 | Multi-application login method and device based on browser |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200162457A1 (en) | System for electronic authentication with live user determination | |
CN109389723B (en) | Visitor management method and device using face recognition and computer equipment | |
EP2929479B1 (en) | Method and apparatus of account login | |
US11057372B1 (en) | System and method for authenticating a user to provide a web service | |
CN111030812A (en) | Token verification method, device, storage medium and server | |
CN110011957B (en) | Security authentication method and device for enterprise account, electronic equipment and storage medium | |
CN114556356B (en) | User authentication framework | |
US11663306B2 (en) | System and method for confirming a person's identity | |
TWM539667U (en) | System of online credentials application for network transaction via carrier | |
CN111104653B (en) | User operation processing method and device, electronic equipment and readable storage medium | |
CN103975567A (en) | Dual-factor authentication method and virtual machine device | |
CN111464555A (en) | File signing confirmation method based on client screen video, service server, authentication server and client | |
CN111585987B (en) | Identity authentication method and device, electronic equipment and computer readable storage medium | |
CN112182606A (en) | Access request processing method and device, electronic equipment and readable storage medium | |
US20180174150A1 (en) | Systems and methods for processing a payment transaction authorization request | |
US8910260B2 (en) | System and method for real time secure image based key generation using partial polygons assembled into a master composite image | |
CN108965335B (en) | Method for preventing malicious access to login interface, electronic device and computer medium | |
CN111666541A (en) | Copyright purchasing and using method and device, electronic equipment and readable storage medium | |
CN116628652A (en) | Authentication method and device for financial system, electronic equipment and storage medium | |
CN111314343A (en) | Account management method and device and readable storage medium | |
CN107707550B (en) | Method, device and system for accessing virtual machine | |
CN113935008B (en) | User authentication method, device, electronic equipment and computer readable storage medium | |
CN112182535A (en) | Operation request processing method and device, electronic equipment and readable storage medium | |
WO2018066426A1 (en) | Fake web page determination device, fake web page determination system, fake web page determination method, and fake web page determination program | |
CN111784355B (en) | Transaction security verification method and device based on edge calculation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220919 Address after: 25 Financial Street, Xicheng District, Beijing 100033 Applicant after: CHINA CONSTRUCTION BANK Corp. Address before: 12 / F, 15 / F, 99 Yincheng Road, Pudong New Area pilot Free Trade Zone, Shanghai, 200120 Applicant before: Jianxin Financial Science and Technology Co.,Ltd. |