CN114422191A - Authentication method, authentication device, electronic equipment and storage medium - Google Patents

Authentication method, authentication device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114422191A
CN114422191A CN202111583116.9A CN202111583116A CN114422191A CN 114422191 A CN114422191 A CN 114422191A CN 202111583116 A CN202111583116 A CN 202111583116A CN 114422191 A CN114422191 A CN 114422191A
Authority
CN
China
Prior art keywords
real
authentication
name authentication
name
task
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111583116.9A
Other languages
Chinese (zh)
Inventor
徐冬冬
杨传信
吴保青
刘桥
王健
徐锐
槐正
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111583116.9A priority Critical patent/CN114422191A/en
Publication of CN114422191A publication Critical patent/CN114422191A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application discloses an authentication method, an authentication device, electronic equipment and a storage medium. The method comprises the following steps: acquiring a real-name authentication task; determining whether the system state of an authentication service system for performing real-name authentication is an abnormal state; caching the real-name authentication task under the condition that the system state of the authentication service system is determined to be an abnormal state; and under the condition that the system state of the authentication service system is recovered to be a normal state, performing real-name authentication processing on the cached real-name authentication task based on the authentication service system. The embodiment of the application realizes the system disaster tolerance of real-name system comparison service by simultaneously being compatible with synchronous and asynchronous business processes and introducing the message queue decoupling system, can avoid business interruption caused by system faults and has lower cost.

Description

Authentication method, authentication device, electronic equipment and storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to an authentication method and apparatus, an electronic device, and a storage medium.
Background
With the development of internet technology, more and more business processes realize online handling through the internet technology. As traffic grows, the stability of the system also faces significant challenges. Through logistics trader delivery number card order, express delivery deliverer uses real-name system authentication instrument, when accomplishing the real-name system authentication of the network access user, if real-name authentication rear-end service breaks down, the authentication can not be accomplished, express delivery person delivery efficiency is influenced, and very big negative effect is produced to whole business. A set of disaster recovery systems is needed to avoid service interruption due to system failure.
In the existing general disaster recovery scheme, the migration and transfer of traffic are realized by establishing a plurality of copies and switching domain name resolution. This approach has a higher cost, increasing the cost of the business party.
Disclosure of Invention
The application provides an authentication method, an authentication device, an electronic device and a storage medium, which are used for solving the problem that cost of a business party is increased due to multiple disaster recovery schemes in the prior art.
In order to solve the above problem, the embodiments of the present application are implemented as follows:
in a first aspect, an embodiment of the present application provides an authentication method, including:
acquiring a real-name authentication task;
determining whether the system state of an authentication service system for performing real-name authentication is an abnormal state;
caching the real-name authentication task under the condition that the system state of the authentication service system is determined to be an abnormal state;
and under the condition that the system state of the authentication service system is recovered to be a normal state, performing real-name authentication processing on the cached real-name authentication task based on the authentication service system.
Optionally, after determining whether the system state of the authentication service system performing real-name authentication is an abnormal state, the method further includes:
and under the condition that the system state of the authentication service system is determined to be a normal state, performing real-name authentication processing on the real-name authentication task based on the authentication service system.
Optionally, the caching the real-name authentication task includes:
and caching the real-name authentication task into a real-name authentication message queue.
Optionally, the performing, based on the authentication service system, real-name authentication processing on the cached real-name authentication task includes:
calling a real-name authentication task cached in the real-name authentication message queue based on the authentication service system;
and performing real-name authentication processing on the called real-name authentication task based on the authentication service system.
Optionally, after the performing, by the authentication service system, real-name authentication processing on the cached real-name authentication task, the method further includes:
under the condition that the real-name authentication task fails to pass authentication, returning authentication request information to a terminal corresponding to the real-name authentication task;
acquiring real-name authentication information returned by the terminal based on the authentication request information;
generating a secondary real-name authentication task according to the real-name authentication information;
and calling the authentication service system to perform secondary real-name authentication processing on the secondary real-name authentication task.
In a second aspect, an embodiment of the present application provides an authentication apparatus, including:
the real-name authentication task acquisition module is used for acquiring a real-name authentication task;
the authentication system state determining module is used for determining whether the system state of the authentication service system for performing real-name authentication is an abnormal state;
the real-name authentication task caching module is used for caching the real-name authentication task under the condition that the system state of the authentication service system is determined to be an abnormal state;
and the real-name authentication task authentication module is used for performing real-name authentication processing on the cached real-name authentication task based on the authentication service system under the condition that the system state of the authentication service system is recovered to be a normal state.
Optionally, the apparatus further comprises:
and the real-name authentication processing module is used for performing real-name authentication processing on the real-name authentication task based on the authentication service system under the condition that the system state of the authentication service system is determined to be a normal state.
Optionally, the real-name authentication task caching module includes:
and the real-name authentication task caching unit is used for caching the real-name authentication task into a real-name authentication message queue.
Optionally, the real-name authentication task authentication module includes:
the real-name authentication task calling unit is used for calling the real-name authentication task cached in the real-name authentication message queue based on the authentication service system;
and the real-name authentication task authentication unit is used for carrying out real-name authentication processing on the called real-name authentication task based on the authentication service system.
Optionally, the apparatus further comprises:
the authentication request information returning module is used for returning authentication request information to a terminal corresponding to the real-name authentication task under the condition that the real-name authentication task fails to authenticate;
the real-name authentication information acquisition module is used for acquiring real-name authentication information returned by the terminal based on the authentication request information;
the real-name authentication task generating module is used for generating a secondary real-name authentication task according to the real-name authentication information;
and the real-name authentication secondary processing module is used for calling the authentication service system to carry out secondary real-name authentication processing on the secondary real-name authentication task.
In a third aspect, an embodiment of the present application provides an electronic device, including:
a processor, a memory and a computer program stored on the memory and executable on the processor, the processor implementing the authentication method of any of the above when executing the program.
In a fourth aspect, the present application provides a readable storage medium, and when executed by a processor of an electronic device, the instructions in the storage medium enable the electronic device to perform any one of the authentication methods described above.
Compared with the prior art, the method has the following advantages:
the embodiment of the application provides an authentication method, an authentication device, electronic equipment and a storage medium, wherein whether a system state of an authentication service system for performing real-name authentication is an abnormal state or not is determined by acquiring a real-name authentication task, the real-name authentication task is cached under the condition that the system state of the authentication service system is determined to be the abnormal state, and the cached real-name authentication task is subjected to real-name authentication processing based on the authentication service system under the condition that the system state of the authentication service system is recovered to be a normal state. The embodiment of the application realizes the system disaster tolerance of real-name system comparison service by simultaneously being compatible with synchronous and asynchronous business processes and introducing the message queue decoupling system, avoids business interruption caused by system faults, and has lower cost compared with a plurality of disaster tolerance schemes.
Drawings
Fig. 1 is a flowchart illustrating steps of an authentication method according to an embodiment of the present disclosure;
fig. 2 is a schematic diagram of an authentication process according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an authentication apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
Example one
Referring to fig. 1, a flowchart illustrating steps of an authentication method provided in an embodiment of the present application is shown, and as shown in fig. 1, the authentication method may include the following steps:
step 101: and acquiring a real-name authentication task.
The embodiment of the application can be applied to a scene of asynchronous authentication real-name authentication task when the authentication service system is in an abnormal state.
The real-name authentication task is a task that needs real-name authentication, and in this example, the real-name authentication task may be: the real-name authentication task of the user accessing the network, the real-name authentication task of the order distributor when receiving the order, and the like, specifically, the specific type of the real-name authentication task may be determined according to the business requirement, which is not limited in this embodiment.
In the normal operation process of the system, the real-name authentication task can be acquired.
After the real-name authentication task is acquired, step 102 is performed.
Step 102: and determining whether the system state of the authentication service system performing real-name authentication is an abnormal state.
The authentication service system refers to a system for performing an authentication process on a real-name authentication task at a backend, that is, the authentication service system can be used to perform the real-name authentication process.
After the real-name authentication task is acquired, it can be determined whether the system state of the authentication service system performing real-name authentication is an abnormal state. Specifically, an abnormality detection program may be set in the system in advance, and the system state of the authentication service system may be detected in real time by the abnormality detection program.
Of course, in practical application, the system state of the authentication service system may also be detected in other manners, such as by using a third-party anomaly detection tool, and specifically, the detection manner of the system state may be determined according to business requirements, which is not limited in this embodiment.
After the system state of the authentication service system is determined to be a normal state, the real-name authentication processing can be performed on the real-name authentication task based on the authentication service system, that is, a conventional real-name authentication process is performed.
After determining that the system state of the authentication service system is an abnormal state, step 103 is performed.
Step 103: and caching the real-name authentication task under the condition that the system state of the authentication service system is determined to be an abnormal state.
After the system state of the authentication service system is determined to be an abnormal state, the real-name authentication task is not executed, but the acquired real-name authentication task is cached, specifically, the real-name authentication task can be cached in the real-name authentication message queue, so that the real-name authentication task is subjected to real-name authentication processing by the authentication service system after the authentication service system is restored to a normal state.
Of course, not limited to this, in specific implementation, the acquired real-name authentication task may be cached to other devices
After caching the real-name authentication task, step 104 is performed.
Step 104: and under the condition that the system state of the authentication service system is recovered to be a normal state, performing real-name authentication processing on the cached real-name authentication task based on the authentication service system.
After caching the real-name authentication task, the system state of the authentication service system may be waited for to be restored to a normal state.
After the system state of the authentication service system is restored to the normal state, the real-name authentication processing may be performed on the cached real-name authentication task based on the authentication service system, and specifically, the real-name authentication task cached in the real-name authentication message queue may be invoked based on the authentication service system to perform the real-name authentication processing on the real-name authentication task.
In a specific implementation, a first-in first-out policy may be used to invoke and authenticate the real-name authentication task in the real-name authentication message queue, or a first-in last-out policy may be used to invoke and authenticate the real-name authentication task in the real-name authentication message queue.
The scheme provided by the embodiment of the application can be compatible with synchronous and asynchronous business processes at the same time, and introduces the message queue decoupling system, thereby realizing system disaster tolerance of real-name system comparison service and avoiding the problem of business interruption caused by system faults.
In this example, after the real-name authentication process is performed on the real-name authentication task, if the real-name authentication fails, a message that the authentication fails may be returned to the user side, so that the user fills in the information to be authenticated to perform the secondary real-name authentication, which may be described in detail in conjunction with the following specific implementation manner.
In a specific implementation manner of the present application, after the step 104, the method may further include:
step S1: and returning authentication request information to a terminal corresponding to the real-name authentication task under the condition that the real-name authentication task fails in authentication.
In this embodiment, after the real-name authentication processing is performed on the real-name authentication task by the authentication service system, a real-name authentication result corresponding to the real-name authentication task may be obtained.
When the real-name authentication result is the result that the real-name authentication passes, the real-name authentication result can be returned to the user, so that the user can directly access the network or perform the operation of order receiving and the like in the subsequent process.
When the real-name authentication result is that the real-name authentication fails, authentication request information may be returned to the terminal corresponding to the real-name authentication task, where the authentication request information may be used to instruct the terminal to perform secondary real-name authentication, that is, instruct the terminal user to fill in the relevant real-name authentication information again.
After the authentication request information is returned to the terminal corresponding to the real-name authentication task, step S2 is executed.
Step S2: and acquiring real-name authentication information returned by the terminal based on the authentication request information.
After the authentication request information is returned to the terminal corresponding to the real-name authentication task, if the terminal user does not need to perform real-name authentication any more, the real-name authentication information may not be filled in, and then the authentication service system may discard the real-name authentication task.
If the terminal user needs to perform real-name authentication again, the relevant real-name authentication information can be filled in, and after the filling in is completed, the filled-in real-name authentication information can be sent to the authentication system by the terminal user. The authentication system can receive real-name authentication information returned by the terminal.
After acquiring the real-name authentication information returned by the terminal based on the authentication request information, step S3 is executed.
Step S3: and generating a secondary real-name authentication task according to the real-name authentication information.
After the system acquires the real-name authentication information returned by the terminal based on the authentication request information, the system can generate a secondary real-name authentication task according to the real-name authentication information.
After the second real-name authentication task is generated from the real-name authentication information, step S4 is executed.
Step S4: and calling the authentication service system to perform secondary real-name authentication processing on the secondary real-name authentication task.
After the second real-name authentication task is generated according to the real-name authentication information, the authentication service system can be called to perform second real-name authentication processing on the second real-name authentication task.
The scheme provided by the embodiment of the application can solve the problem that when the real-name system authentication system breaks down, a courier can smoothly complete real-name system authentication and carry out subsequent business processes such as order dispatching.
The above-described execution flow can be described in detail with reference to fig. 2 as follows.
Referring to fig. 2, a schematic diagram of an authentication process provided in an embodiment of the present application is shown.
As shown in fig. 2, the disaster recovery process in the prior art is as follows: when the real-name system backend service system (i.e. the authentication service system in this embodiment) fails, the real-name system client process is interrupted, and cannot continue to accept the service.
The authentication procedure of this embodiment may include:
step a, judging the health state of a real-name system back-end service system, starting a disaster recovery flow if the system is abnormal, and then step b;
step b, after the real-name authentication task is obtained, an authentication file (namely a real-name authentication task file) collected by the real-name client can be saved, and the step c is executed;
step c, after the authentication file is collected, the authentication file can be stored in a message queue, and the step d is executed;
step d, returning to the real-name comparison pair of the real-name client;
and e, the real-name system back-end service system monitors the message queue, processes the comparison and identifies tasks.
In the real-name authentication process provided in this embodiment, when the real-name backend service system fails, the service system access layer may send the comparison and task service to the message queue, and after the real-name backend service system recovers to normal, the authentication and comparison task is reprocessed, so that the real-name client may normally accept the service during this period, and may not be affected by the failure of the real-name backend service system.
The authentication method provided by the embodiment of the application determines whether the system state of the authentication service system performing real-name authentication is an abnormal state or not by acquiring the real-name authentication task, caches the real-name authentication task under the condition that the system state of the authentication service system is determined to be the abnormal state, and performs real-name authentication processing on the cached real-name authentication task based on the authentication service system under the condition that the system state of the authentication service system is recovered to be the normal state. The embodiment of the application realizes the system disaster tolerance of real-name system comparison service by simultaneously being compatible with synchronous and asynchronous business processes and introducing the message queue decoupling system, avoids business interruption caused by system faults, and has lower cost compared with a plurality of disaster tolerance schemes.
Example two
Referring to fig. 3, which shows a schematic structural diagram of an authentication apparatus provided in an embodiment of the present application, as shown in fig. 3, the authentication apparatus 300 may include the following modules:
a real-name authentication task obtaining module 310, configured to obtain a real-name authentication task;
an authentication system state determination module 320, configured to determine whether a system state of an authentication service system performing real-name authentication is an abnormal state;
the real-name authentication task caching module 330 is configured to cache the real-name authentication task when it is determined that the system state of the authentication service system is an abnormal state;
and the real-name authentication task authentication module 340 is configured to perform real-name authentication processing on the cached real-name authentication task based on the authentication service system when the system state of the authentication service system is restored to a normal state.
Optionally, the apparatus further comprises:
and the real-name authentication processing module is used for performing real-name authentication processing on the real-name authentication task based on the authentication service system under the condition that the system state of the authentication service system is determined to be a normal state.
Optionally, the real-name authentication task caching module includes:
and the real-name authentication task caching unit is used for caching the real-name authentication task into a real-name authentication message queue.
Optionally, the real-name authentication task authentication module includes:
the real-name authentication task calling unit is used for calling the real-name authentication task cached in the real-name authentication message queue based on the authentication service system;
and the real-name authentication task authentication unit is used for carrying out real-name authentication processing on the called real-name authentication task based on the authentication service system.
Optionally, the apparatus further comprises:
the authentication request information returning module is used for returning authentication request information to a terminal corresponding to the real-name authentication task under the condition that the real-name authentication task fails to authenticate;
the real-name authentication information acquisition module is used for acquiring real-name authentication information returned by the terminal based on the authentication request information;
the real-name authentication task generating module is used for generating a secondary real-name authentication task according to the real-name authentication information;
and the real-name authentication secondary processing module is used for calling the authentication service system to carry out secondary real-name authentication processing on the secondary real-name authentication task.
The authentication device provided by the embodiment of the application determines whether the system state of the authentication service system performing real-name authentication is an abnormal state or not by acquiring the real-name authentication task, caches the real-name authentication task when determining that the system state of the authentication service system is the abnormal state, and performs real-name authentication processing on the cached real-name authentication task based on the authentication service system when the system state of the authentication service system is restored to a normal state. The embodiment of the application realizes the system disaster tolerance of real-name system comparison service by simultaneously being compatible with synchronous and asynchronous business processes and introducing the message queue decoupling system, avoids business interruption caused by system faults, and has lower cost compared with a plurality of disaster tolerance schemes.
While, for purposes of simplicity of explanation, the foregoing method embodiments have been described as a series of acts or combination of acts, it will be appreciated by those skilled in the art that the present application is not limited by the order of acts or acts described, as some steps may occur in other orders or concurrently with other steps in accordance with the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
EXAMPLE III
An embodiment of the present application provides an electronic device, including: a processor, a memory and a computer program stored on the memory and executable on the processor, the processor implementing the authentication method of any of the above when executing the program.
Referring to fig. 4, which shows a schematic structural diagram of an electronic device provided in an embodiment of the present application, as shown in fig. 4, an electronic device 400 includes a Central Processing Unit (CPU)401, which can perform various appropriate actions and processes according to computer program instructions stored in a Read Only Memory (ROM)402 or computer program instructions loaded from a storage unit 408 into a Random Access Memory (RAM) 403. In the RAM 303, various programs and data necessary for the operation of the electronic apparatus 400 can also be stored. The CPU401, ROM402, and RAM 403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
A number of components in the electronic device 400 are connected to the I/O interface 405, including: an input unit 406 such as a keyboard, a mouse, a microphone, and the like; an output unit 407 such as various types of displays, speakers, and the like; a storage unit 408 such as a magnetic disk, optical disk, or the like; and a communication unit 409 such as a network card, modem, wireless communication transceiver, etc. The communication unit 409 allows the electronic device 400 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The various processes and processes described above may be performed by processing unit 401. For example, the methods of any of the above embodiments may be implemented as a computer software program tangibly embodied on a computer-readable medium, such as storage unit 408. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 400 via the ROM402 and/or the communication unit 409. When loaded into RAM 403 and executed by CPU401, may perform one or more of the actions of the methods described above.
Example four
Embodiments of the present application further provide a readable storage medium, where instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform any one of the authentication methods described above.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above detailed description is provided for an authentication method, an authentication device, an electronic device and a storage medium, and specific examples are applied herein to explain the principles and embodiments of the present application, and the descriptions of the above embodiments are only used to help understand the method and the core ideas of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (12)

1. An authentication method, comprising:
acquiring a real-name authentication task;
determining whether the system state of an authentication service system for performing real-name authentication is an abnormal state;
caching the real-name authentication task under the condition that the system state of the authentication service system is determined to be an abnormal state;
and under the condition that the system state of the authentication service system is recovered to be a normal state, performing real-name authentication processing on the cached real-name authentication task based on the authentication service system.
2. The method according to claim 1, wherein after determining whether the system state of the authentication service system performing real-name authentication is an abnormal state, the method further comprises:
and under the condition that the system state of the authentication service system is determined to be a normal state, performing real-name authentication processing on the real-name authentication task based on the authentication service system.
3. The method of claim 1, wherein caching the real-name authentication task comprises:
and caching the real-name authentication task into a real-name authentication message queue.
4. The method according to claim 3, wherein the performing real-name authentication processing on the cached real-name authentication task based on the authentication service system comprises:
calling a real-name authentication task cached in the real-name authentication message queue based on the authentication service system;
and performing real-name authentication processing on the called real-name authentication task based on the authentication service system.
5. The method according to claim 1, further comprising, after the performing real-name authentication processing on the cached real-name authentication task based on the authentication service system, the steps of:
under the condition that the real-name authentication task fails to pass authentication, returning authentication request information to a terminal corresponding to the real-name authentication task;
acquiring real-name authentication information returned by the terminal based on the authentication request information;
generating a secondary real-name authentication task according to the real-name authentication information;
and calling the authentication service system to perform secondary real-name authentication processing on the secondary real-name authentication task.
6. An authentication apparatus, comprising:
the real-name authentication task acquisition module is used for acquiring a real-name authentication task;
the authentication system state determining module is used for determining whether the system state of the authentication service system for performing real-name authentication is an abnormal state;
the real-name authentication task caching module is used for caching the real-name authentication task under the condition that the system state of the authentication service system is determined to be an abnormal state;
and the real-name authentication task authentication module is used for performing real-name authentication processing on the cached real-name authentication task based on the authentication service system under the condition that the system state of the authentication service system is recovered to be a normal state.
7. The apparatus of claim 6, further comprising:
and the real-name authentication processing module is used for performing real-name authentication processing on the real-name authentication task based on the authentication service system under the condition that the system state of the authentication service system is determined to be a normal state.
8. The apparatus of claim 6, wherein the real-name authentication task caching module comprises:
and the real-name authentication task caching unit is used for caching the real-name authentication task into a real-name authentication message queue.
9. The apparatus of claim 8, wherein the real-name authentication task authentication module comprises:
the real-name authentication task calling unit is used for calling the real-name authentication task cached in the real-name authentication message queue based on the authentication service system;
and the real-name authentication task authentication unit is used for carrying out real-name authentication processing on the called real-name authentication task based on the authentication service system.
10. The apparatus of claim 6, further comprising:
the authentication request information returning module is used for returning authentication request information to a terminal corresponding to the real-name authentication task under the condition that the real-name authentication task fails to authenticate;
the real-name authentication information acquisition module is used for acquiring real-name authentication information returned by the terminal based on the authentication request information;
the real-name authentication task generating module is used for generating a secondary real-name authentication task according to the real-name authentication information;
and the real-name authentication secondary processing module is used for calling the authentication service system to carry out secondary real-name authentication processing on the secondary real-name authentication task.
11. An electronic device, comprising:
a processor, a memory and a computer program stored on the memory and executable on the processor, the processor implementing the authentication method of any one of claims 1-5 when executing the program.
12. A readable storage medium, wherein instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the authentication method of any one of claims 1-5.
CN202111583116.9A 2021-12-22 2021-12-22 Authentication method, authentication device, electronic equipment and storage medium Pending CN114422191A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111583116.9A CN114422191A (en) 2021-12-22 2021-12-22 Authentication method, authentication device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111583116.9A CN114422191A (en) 2021-12-22 2021-12-22 Authentication method, authentication device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114422191A true CN114422191A (en) 2022-04-29

Family

ID=81268342

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111583116.9A Pending CN114422191A (en) 2021-12-22 2021-12-22 Authentication method, authentication device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114422191A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1620017A (en) * 2003-11-18 2005-05-25 华为技术有限公司 Charging buffer storage system of broad band network cut-in service device and its method
JP2007148876A (en) * 2005-11-29 2007-06-14 Shimadzu Corp Network type analysis system
US20090293096A1 (en) * 2008-05-20 2009-11-26 Samsung Electronics Co., Ltd. Method and system for electronic device authentication
CN103874044A (en) * 2012-12-17 2014-06-18 中兴通讯股份有限公司 Abnormal billing processing method and abnormal billing processing system
CN110768844A (en) * 2019-10-31 2020-02-07 杭州迪普科技股份有限公司 Authentication server switching method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1620017A (en) * 2003-11-18 2005-05-25 华为技术有限公司 Charging buffer storage system of broad band network cut-in service device and its method
JP2007148876A (en) * 2005-11-29 2007-06-14 Shimadzu Corp Network type analysis system
US20090293096A1 (en) * 2008-05-20 2009-11-26 Samsung Electronics Co., Ltd. Method and system for electronic device authentication
CN103874044A (en) * 2012-12-17 2014-06-18 中兴通讯股份有限公司 Abnormal billing processing method and abnormal billing processing system
CN110768844A (en) * 2019-10-31 2020-02-07 杭州迪普科技股份有限公司 Authentication server switching method and device

Similar Documents

Publication Publication Date Title
CN112150141A (en) Block chain consensus method, device and system
US9264414B2 (en) Retry and snapshot enabled cross-platform synchronized communication queue
CN112118315A (en) Data processing system, method, device, electronic equipment and storage medium
CN111400777B (en) Network storage system, user authentication method, device and equipment
CN110650216B (en) Cloud service request method and device
EP3841499B1 (en) Methods, apparatus, system and computer storage mediums for generating information identification codes
CN107682442B (en) Web connection method and device
US20200097355A1 (en) Method and apparatus for outputting information
CN110851290A (en) Data synchronization method and device, electronic equipment and storage medium
CN112738294B (en) Domain name resolution method and device based on block chain, electronic equipment and storage medium
CN112486956A (en) Data access method and device and electronic equipment
CN107635221A (en) A kind of car-mounted terminal identifying processing method and device
CN112380072A (en) Multi-data center access method and system
CN111507714B (en) Verification method, verification device, server and storage medium
CN111327588A (en) Network access security detection method, system, terminal and readable storage medium
CN113014640A (en) Request processing method and device, electronic equipment and storage medium
CN110855655B (en) Information verification method, device, equipment and storage medium
CN107241451A (en) Interference method, apparatus and system are distorted based on content distributing network
CN111698301A (en) Service management method, device and storage medium for ensuring service continuation
CN114422191A (en) Authentication method, authentication device, electronic equipment and storage medium
JP6199844B2 (en) Suspicious part estimation device and suspected part estimation method
CN116414628A (en) Transaction request processing method and device in new and old system switching process
CN106357549B (en) Method, apparatus, system and the load balancer that high concurrent shunts in clustered deploy(ment)
CN107766232B (en) Plug-in management method and device
CN111429326B (en) Method and device for mutual assistance by using blockchain network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination