CN115834213A - Identity authentication method, device, equipment and storage medium - Google Patents

Identity authentication method, device, equipment and storage medium Download PDF

Info

Publication number
CN115834213A
CN115834213A CN202211486301.0A CN202211486301A CN115834213A CN 115834213 A CN115834213 A CN 115834213A CN 202211486301 A CN202211486301 A CN 202211486301A CN 115834213 A CN115834213 A CN 115834213A
Authority
CN
China
Prior art keywords
authentication
authentication information
user
request
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211486301.0A
Other languages
Chinese (zh)
Inventor
刘显珂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Leshi Zhixin Electronic Technology Tianjin Co Ltd
Original Assignee
Leshi Zhixin Electronic Technology Tianjin Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leshi Zhixin Electronic Technology Tianjin Co Ltd filed Critical Leshi Zhixin Electronic Technology Tianjin Co Ltd
Priority to CN202211486301.0A priority Critical patent/CN115834213A/en
Publication of CN115834213A publication Critical patent/CN115834213A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the disclosure provides an identity authentication method, an identity authentication device, identity authentication equipment and a storage medium. The method comprises the following steps: the authentication APP running on the target device calls a RESTful API and sends an authentication request to an authentication server, wherein the authentication request comprises: the authentication information input by the user through the debugging equipment or the authentication information stored in the authentication information table; and the authentication server receives the authentication request and performs identity authentication according to the authentication request. In this way, identity authentication can be realized without inputting authentication information through webpage interaction by a user, and identity authentication efficiency is greatly improved.

Description

Identity authentication method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of network security technologies, and in particular, to an identity authentication method, apparatus, device, and storage medium.
Background
For many organizations such as schools and companies, the identity of the user who is connected to the internet is required to be authenticated due to security and cost problems, and a password is a common method. As an electronic device without traffic for a long time, such as 24 hours, the user accesses the external Internet, such as opening a browser to input a website, or automatically pops up an identity authentication page when connecting a Wi-Fi, and after the user inputs a correct account number and a password, an authentication server passes the verification and redirects to the website input by the user.
For desktop computers and notebook computers, a keyboard and a mouse are provided, and the input is convenient, but for electronic equipment such as set-top boxes and televisions, the input equipment is a remote controller, users need to perform webpage interaction on an identity authentication page through a soft keyboard of the remote controller to input account numbers and passwords, and when the account numbers and the passwords are some special characters, the operation can be completed for many times. Thus, the authentication process is too time consuming.
Disclosure of Invention
The present disclosure provides an identity authentication method, apparatus, device and storage medium, which can realize identity authentication without requiring a user to input authentication information through web page interaction, and greatly improve identity authentication efficiency.
In a first aspect, an embodiment of the present disclosure provides an identity authentication method, where the method includes:
the authentication APP running on the target device calls a RESTful API and sends an authentication request to an authentication server, wherein the authentication request comprises: the authentication information input by the user through the debugging equipment or the authentication information stored in the authentication information table;
and the authentication server receives the authentication request and performs identity authentication according to the authentication request.
In some implementations of the first aspect, the step of inputting the authentication information input by the user through the commissioning device includes:
and the debugging equipment calls the authentication script and sends the authentication information input by the user in the command line to the authentication APP.
In some implementations of the first aspect, before the debugging device invokes the authentication script and sends the authentication information input by the user in the command line to the authentication APP, the method further includes:
and the debugging equipment calls the authentication script and establishes communication connection with the target equipment according to the IP address or the equipment name of the target equipment input by the user in the command line.
In some implementations of the first aspect, in a case that the authentication information is input by the user through the commissioning device, the method further includes:
the authentication server sends an authentication result to the target equipment;
the target equipment receives the authentication result and sends the authentication result to the debugging equipment;
the debugging equipment receives the authentication result and displays the authentication result on the command line.
In some implementations of the first aspect, the method further comprises:
the authentication APP calls a RESTful API and sends a logout request to an authentication server;
and the authentication server receives the logout request and logs out the login state of the target equipment according to the logout request.
In some implementations of the first aspect, the step of storing the authentication information stored in the authentication information table includes:
the authentication APP acquires authentication information input by a user on an identity authentication page;
and if the authentication server determines that the identity authentication is passed according to an authentication request which is sent by the target equipment and comprises authentication information input by the user on the identity authentication page, the authentication APP stores the acquired authentication information into an authentication information table.
In some implementations of the first aspect, the step of storing the authentication information stored in the authentication information table includes:
the authentication APP receives authentication information input by a user on an authentication information acquisition interface of the APP, and stores the received authentication information into an authentication information table.
In a second aspect, an embodiment of the present disclosure provides an identity authentication apparatus, including:
a sending module, configured to invoke a RESTful API by an authentication APP running on a target device, and send an authentication request to an authentication server, where the authentication request includes: the authentication information input by the user through the debugging equipment or the authentication information stored in the authentication information table;
and the receiving module is used for receiving the authentication request by the authentication server and carrying out identity authentication according to the authentication request.
In a third aspect, an embodiment of the present disclosure provides an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method as described above.
In a fourth aspect, embodiments of the present disclosure provide a non-transitory computer readable storage medium having stored thereon computer instructions for causing a computer to perform a method as described above.
In an embodiment of the present disclosure, an authentication APP running on a target device calls a RESTful API, and sends an authentication request to an authentication server, where the authentication request includes: the authentication information input by the user through the debugging equipment or the authentication information stored in the authentication information table; correspondingly, the authentication server receives the authentication request and carries out identity authentication according to the authentication request. Therefore, identity authentication can be realized without inputting authentication information through webpage interaction by a user, and identity authentication efficiency is greatly improved.
It should be understood that the statements herein reciting aspects are not intended to limit the critical or essential features of the embodiments of the present disclosure, nor are they intended to limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. The accompanying drawings are included to provide a further understanding of the present disclosure, and are not intended to limit the disclosure thereto, and the same or similar reference numerals will be used to indicate the same or similar elements, where:
FIG. 1 illustrates a schematic diagram of an exemplary operating environment in which embodiments of the present disclosure can be implemented;
fig. 2 shows a flowchart of an identity authentication method provided by an embodiment of the present disclosure;
fig. 3 shows a structure diagram of an identity authentication device provided by an embodiment of the present disclosure;
FIG. 4 sets forth a block diagram of an exemplary electronic device capable of implementing embodiments of the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions of the embodiments of the present disclosure will be described clearly and completely below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are some, but not all embodiments of the present disclosure. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
In view of the problems occurring in the background art, embodiments of the present disclosure provide an identity authentication method, apparatus, device, and storage medium. Specifically, an authentication APP running on the target device calls a RESTful API, and sends an authentication request to the authentication server, where the authentication request includes: the authentication information input by the user through the debugging equipment or the authentication information stored in the authentication information table; correspondingly, the authentication server receives the authentication request and carries out identity authentication according to the authentication request. Therefore, identity authentication can be realized without inputting authentication information through webpage interaction by a user, and identity authentication efficiency is greatly improved.
The identity authentication method, apparatus, device and storage medium provided by the embodiments of the present disclosure are described in detail with reference to the accompanying drawings.
Fig. 1 shows a schematic diagram of an exemplary operating environment in which embodiments of the invention can be implemented, and as shown in fig. 1, a commissioning environment 100 may include a commissioning device, a target device, and an authentication server.
The debugging equipment can be convenient input equipment such as a mobile phone, a tablet computer, a notebook computer, a palm computer or a personal computer; the target equipment can be equipment with inconvenient input, such as a set top box, a television and the like; the authentication server is used for identity authentication of the internal internet user.
As an example, in identity authentication, an authentication APP running on a target device may call a RESTful API, sending an authentication request to an authentication server, where the authentication request includes: the authentication information input by the user through the debugging equipment or the authentication information of the user pre-stored in the authentication information table; correspondingly, the authentication server receives the authentication request and performs identity authentication according to the authentication request, and a user does not need to interactively input authentication information through a webpage, so that the identity authentication efficiency is greatly improved.
The identity authentication method provided by the embodiment of the present invention will be described in detail below, wherein the identity authentication method can be applied to the above-mentioned operating environment 100.
Fig. 2 shows a flowchart of an identity authentication method provided by an embodiment of the present disclosure, and as shown in fig. 2, the identity authentication method 200 may include the following steps:
s210, the authentication APP running on the target device calls a RESTful API and sends an authentication request to the authentication server.
Wherein the authentication request comprises: authentication information input by a user through the debugging equipment or authentication information stored in the authentication information table. Illustratively, the authentication information may be a user account and a password.
In some embodiments, the step of inputting the authentication information input by the user through the commissioning device comprises:
and the debugging equipment calls the authentication script and sends the authentication information input by the user in the command line to the authentication APP. That is, the user can directly input the authentication information in the command line of the debugging device, and the subsequent identity authentication can be realized without webpage interaction.
It should be noted that, before the debugging device calls the authentication script and sends the authentication information input by the user in the command line to the authentication APP, the debugging device may call the authentication script to quickly establish a communication connection with the target device according to the IP address or device name of the target device input by the user in the command line.
In some embodiments, the storing of the authentication information stored in the authentication information table may include:
and the authentication APP of the target equipment acquires the authentication information input by the user on the identity authentication page. Illustratively, the authentication page may pop up automatically when accessing the internet or connecting to Wi-Fi.
If the authentication server determines that the identity authentication is passed according to the authentication request which is sent by the target device and comprises the authentication information input by the user on the identity authentication page, the authentication APP can store the acquired authentication information into the authentication information table.
In this way, can automatically acquire the authentication information that the user input on the authentication page through the authentication APP to in time will be able to pass through authentication information storage to the authentication information table of authentication, be convenient for follow-up when authentication, call RESTful API by the authentication APP and directly send to the authentication server, and then need not the webpage interaction and can realize subsequent authentication.
Further, the storing of the authentication information stored in the authentication information table may further include:
the authentication APP receives authentication information input by a user on an authentication information acquisition interface of the APP, and stores the received authentication information into an authentication information table.
In this way, the user can input authentication information on the authentication information acquisition interface of the authentication APP in advance, so that the subsequent RESTful API is called by the authentication APP to be directly sent to the authentication server during identity authentication, and further the subsequent identity authentication can be realized without webpage interaction.
S220, the authentication server receives the authentication request and carries out identity authentication according to the authentication request.
In some embodiments, the authentication server may search the authentication information in the authentication request in the database, and if the authentication information is found, the identity authentication is passed, and at this time, the target device logs in successfully; if the target equipment is not found, the identity authentication is not passed, and the target equipment fails to log in.
In an embodiment of the present disclosure, an authentication APP running on a target device calls a RESTful API, and sends an authentication request to an authentication server, where the authentication request includes: the authentication information input by the user through the debugging equipment or the authentication information stored in the authentication information table; correspondingly, the authentication server receives the authentication request and carries out identity authentication according to the authentication request. Therefore, identity authentication can be realized without inputting authentication information through webpage interaction by a user, and identity authentication efficiency is greatly improved.
In some embodiments, referring to S210, in the case that the authentication information is input by the user through the debugging device, the authentication server may send the authentication result to the target device, the target device receives the authentication result and sends the authentication result to the debugging device, and the debugging device receives the authentication result and displays the authentication result in the command line, so that the user can timely perceive whether the identity authentication passes or not.
In some embodiments, upon login and logoff, the authentication APP may call the RESTful API, sending a logoff request to the authentication server. Referring to S210, the debugging device may invoke a logout script, send a logout command input by the user on the command line to the authentication APP, the authentication APP responds to the logout command, and invoke a RESTful API to send a logout request to the authentication server. The authentication server receives the logout request and logs out the login state of the target equipment according to the logout request.
In this way, the user can directly input a logout command in the command line of the debugging device, and subsequent login and logout can be realized without webpage interaction.
The identity authentication method provided by the embodiment of the disclosure is described in detail below by taking authentication information as input of a user through a debugging device and an operating system of a target device as an android system as examples, and specifically as follows:
when identity authentication is carried out, debugging equipment calls an authentication script, communication connection with target equipment is quickly established according to an IP address or equipment name of the target equipment input by a user in a command line, and authentication information input by the user in the command line is sent to Id-Auth.apk (namely authentication APP) in an Intent form;
at the moment, id-Auth.apk calls RESTful API, an authentication request including authentication information is sent to an authentication Server, the RESTful API of the Id-Auth Server analyzes the authentication request, and the authentication information in the authentication request is sent to the Id-Auth Server;
and the Id-Auth Server performs identity authentication according to the authentication information, returns an authentication result and is displayed by the debugging equipment in a command line.
In addition, when logging in and logging out, the debugging equipment can call a logging-out script and send a logging-out command input by a user in a command line to the authentication APP in an Intent form;
at the moment, the Id-Auth.apk calls RESTful API to send a logout request to the authentication Server, the RESTful API of the Id-Auth Server analyzes the logout request, and the analyzed content is sent to the Id-Auth Server;
and the Id-Auth Server logs out the login state of the target equipment according to the analysis content, returns a logout result and is displayed by the debugging equipment in a command line.
It is noted that while for simplicity of explanation, the foregoing method embodiments have been described as a series of acts or combination of acts, it will be appreciated by those skilled in the art that the present disclosure is not limited by the order of acts, as some steps may, in accordance with the present disclosure, occur in other orders and concurrently. Further, those skilled in the art should also appreciate that the embodiments described in the specification are exemplary embodiments and that acts and modules referred to are not necessarily required by the disclosure.
The above is a description of embodiments of the method, and the embodiments of the apparatus are further described below.
Fig. 3 shows a block diagram of an identity authentication apparatus provided in an embodiment of the present disclosure, and as shown in fig. 3, the identity authentication apparatus 300 may include:
a sending module 310, configured to invoke a RESTful API by an authentication APP running on a target device, and send an authentication request to an authentication server, where the authentication request includes: authentication information input by a user through the debugging equipment or authentication information stored in the authentication information table.
And a receiving module 320, configured to receive the authentication request by the authentication server, and perform identity authentication according to the authentication request.
In some embodiments, the step of inputting the authentication information input by the user through the commissioning device comprises:
and the debugging equipment calls the authentication script and sends the authentication information input by the user in the command line to the authentication APP.
In some embodiments, before the debugging device calls the authentication script and sends the authentication information input by the user in the command line to the authentication APP, the debugging device calls the authentication script and establishes communication connection with the target device according to the IP address or the device name of the target device input by the user in the command line.
In some embodiments, the sending module 310 is further configured to, in a case that the authentication information is input by the user through the debugging device, send the authentication result to the target device by the authentication server;
the receiving module 320 is further configured to receive the authentication result and send the authentication result to the debugging device; the debugging equipment receives the authentication result and displays the authentication result on the command line.
In some embodiments, the sending module 310 is further configured to invoke a RESTful API by the authentication APP, sending a logoff request to the authentication server.
The receiving module 320 is further configured to receive a logout request by the authentication server, and log out the login state of the target device according to the logout request.
In some embodiments, the storing of the authentication information stored in the authentication information table comprises:
the authentication APP acquires authentication information input by a user on an identity authentication page;
and if the authentication server determines that the identity authentication is passed according to an authentication request which is sent by the target equipment and comprises authentication information input by the user on the identity authentication page, the authentication APP stores the acquired authentication information into an authentication information table.
In some embodiments, the storing of the authentication information stored in the authentication information table comprises:
the authentication APP receives authentication information input by a user on an authentication information acquisition interface of the APP, and stores the received authentication information into an authentication information table.
It can be understood that, for brevity, details of each module/unit in the identity authentication apparatus 300 shown in fig. 3 are not repeated herein, and the modules/units have functions of implementing each step in the identity authentication method 200 shown in fig. 2, and can achieve corresponding technical effects.
FIG. 4 illustrates a block diagram of an electronic device that may be used to implement embodiments of the present disclosure. Electronic device 400 is intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device 400 may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 4, the electronic device 400 may include a computing unit 401 that may perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 402 or a computer program loaded from a storage unit 408 into a Random Access Memory (RAM) 403. In the RAM403, various programs and data required for the operation of the electronic device 400 can also be stored. The computing unit 401, ROM402, and RAM403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
A number of components in the electronic device 400 are connected to the I/O interface 405, including: an input unit 406 such as a keyboard, a mouse, or the like; an output unit 407 such as various types of displays, speakers, and the like; a storage unit 408 such as a magnetic disk, optical disk, or the like; and a communication unit 409 such as a network card, modem, wireless communication transceiver, etc. The communication unit 409 allows the electronic device 400 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
Computing unit 401 may be a variety of general and/or special purpose processing components with processing and computing capabilities. Some examples of the computing unit 401 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The computing unit 401 performs the various methods and processes described above, such as the method 200. For example, in some embodiments, the method 200 may be implemented as a computer program product, including a computer program, tangibly embodied in a computer-readable medium, such as the storage unit 408. In some embodiments, part or all of the computer program may be loaded and/or installed onto the device 400 via the ROM402 and/or the communication unit 409. When the computer program is loaded into RAM403 and executed by computing unit 401, one or more steps of method 200 described above may be performed. Alternatively, in other embodiments, the computing unit 401 may be configured to perform the method 200 by any other suitable means (e.g., by means of firmware).
The various embodiments described herein above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program code, when executed by the processor or controller, causes the functions/acts specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a computer-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a computer-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
It should be noted that the present disclosure also provides a non-transitory computer readable storage medium storing computer instructions, where the computer instructions are used to enable a computer to execute the method 200 and achieve the corresponding technical effects achieved by the embodiment of the present disclosure executing the method, and for brevity, no further description is provided here.
Additionally, the present disclosure also provides a computer program product comprising a computer program which, when executed by a processor, implements the method 200.
To provide for interaction with a user, the above-described embodiments may be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The embodiments described above may be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user may interact with an implementation of the systems and techniques described herein), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server with a combined blockchain.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel or sequentially or in different orders, and are not limited herein as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (10)

1. An identity authentication method, the method comprising:
an authentication APP running on the target device calls a RESTful API and sends an authentication request to an authentication server, wherein the authentication request comprises: the authentication information input by the user through the debugging equipment or the authentication information stored in the authentication information table;
and the authentication server receives the authentication request and performs identity authentication according to the authentication request.
2. The method of claim 1, wherein the step of inputting the authentication information by the user via the commissioning device comprises:
and the debugging equipment calls an authentication script and sends authentication information input by a user in a command line to the authentication APP.
3. The method of claim 2, wherein before the debugging device invokes an authentication script to send authentication information entered by a user at a command line to the authentication APP, the method further comprises:
and the debugging equipment calls an authentication script and establishes communication connection with the target equipment according to the IP address or equipment name of the target equipment input by the user in the command line.
4. The method of claim 2, wherein if the authentication information is input by a user through the commissioning device, the method further comprises:
the authentication server sends an authentication result to the target equipment;
the target device receives the authentication result and sends the authentication result to the debugging device;
and the debugging equipment receives the authentication result and displays the authentication result on the command line.
5. The method of claim 4, further comprising:
the authentication APP calls the RESTful API and sends a logout request to the authentication server;
and the authentication server receives the logout request and logs out the login state of the target equipment according to the logout request.
6. The method according to claim 1, wherein the step of storing the authentication information stored in the authentication information table comprises:
the authentication APP acquires authentication information input by a user on an identity authentication page;
and if the authentication server determines that the identity authentication is passed according to an authentication request which is sent by the target equipment and comprises authentication information input by the user on the identity authentication page, the authentication APP stores the acquired authentication information into the authentication information table.
7. The method according to claim 1, wherein the step of storing the authentication information stored in the authentication information table comprises:
the authentication APP receives authentication information input by a user on an authentication information acquisition interface of the authentication APP, and stores the received authentication information in the authentication information table.
8. An identity authentication apparatus, the apparatus comprising:
a sending module, configured to invoke a RESTful API by an authentication APP running on a target device, and send an authentication request to an authentication server, where the authentication request includes: the authentication information input by the user through the debugging equipment or the authentication information stored in the authentication information table;
and the receiving module is used for receiving the authentication request by the authentication server and carrying out identity authentication according to the authentication request.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-7.
10. A non-transitory computer readable storage medium having stored thereon computer instructions for causing a computer to perform the method of any one of claims 1-7.
CN202211486301.0A 2022-11-24 2022-11-24 Identity authentication method, device, equipment and storage medium Pending CN115834213A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211486301.0A CN115834213A (en) 2022-11-24 2022-11-24 Identity authentication method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211486301.0A CN115834213A (en) 2022-11-24 2022-11-24 Identity authentication method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115834213A true CN115834213A (en) 2023-03-21

Family

ID=85531400

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211486301.0A Pending CN115834213A (en) 2022-11-24 2022-11-24 Identity authentication method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115834213A (en)

Similar Documents

Publication Publication Date Title
US11368447B2 (en) Oauth2 SAML token service
US20130326587A1 (en) Techniques for auto-authentication
CN113900834B (en) Data processing method, device, equipment and storage medium based on Internet of things technology
US20180357404A1 (en) Information processing method and apparatus, and electronic device
CN113572763B (en) Data processing method and device, electronic equipment and storage medium
CN113946816A (en) Cloud service-based authentication method and device, electronic equipment and storage medium
CN114186206A (en) Login method and device based on small program, electronic equipment and storage medium
CN113515462A (en) Method, device, equipment and storage medium for testing
CN113132400A (en) Business processing method, device, computer system and storage medium
CN107203714B (en) Configuration method and device of data verification file
WO2014194755A1 (en) Method and apparatus for accessing a chat room
CN115834213A (en) Identity authentication method, device, equipment and storage medium
US20140365924A1 (en) Method and apparatus for accessing a chat room
CN112131092A (en) Page debugging method and device
CN114374703B (en) Cloud mobile phone information acquisition method, device, equipment and storage medium
CN113839944B (en) Method, device, electronic equipment and medium for coping with network attack
CN115016955A (en) Method and device for sharing information among multiple applications
CN115062304A (en) Risk identification method and device, electronic equipment and readable storage medium
CN114116373A (en) Network request monitoring method and device, electronic equipment and storage medium
CN109302446B (en) Cross-platform access method and device, electronic equipment and storage medium
CN107872381B (en) Prompting method and device
KR101951913B1 (en) System and service method for web virtualization
CN112527802B (en) Soft link method and device based on key value database
US20230362153A1 (en) Multi-platform authentication
CN114785691B (en) Network security control method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination