Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

68results about How to "Login security" patented technology

System and method for login authentication

The invention provides a system and a method for login authentication. The method comprises the steps of: sending login request information by a login end, wherein the login request information comprises a user name; receiving the login request information by an authentication end, after confirming that the login end is a blockchain user, initiating blockchain identity authentication for the loginend; performing second authentication on the login end by the authentication end after the blockchain identity authentication is passed; acquiring user identity information of the login end by the authentication end, and acquiring user identification and a certification organization public key from a blockchain; and verifying the user identity information by using the user identification and thecertification organization public key by the authentication end. The system and the method of the invention have the beneficial effects that: the identification stored in the blockchain can not be tampered, thereby improving security and reducing IT maintenance cost of an enterprise; the second authentication is performed after the identity authentication is passed, thereby greatly improving enterprise level Wi-Fi security; and verification is based on the user identity information, the user does not need to input a Wi-Fi login key, thereby effectively preventing a stealing behavior of a Wi-Fiall-purpose key app.
Owner:上海邑游网络科技有限公司

Method, device and system for performing authentication and authority management on user, and medium

The invention provides a method, device and system for performing authentication and authority management on a user using a container management cluster, and a medium. The method comprises the following steps: a registration step: sending a registration request to the container management cluster, and storing a service account and authentication information created by the container management cluster for the user; a login step: responding to a login request, taking out authentication information of the user, and authenticating whether the user successfully logs in according to the authentication information by the container management cluster; an authorization step: after determining that the user has successfully logged in, creating one or more items for an authorization request of the user, storing a namespace created by the container management cluster, and sending the service account and space of the user to the container management cluster for authorization; and an authenticationstep: responding to an operation request, taking out namespaces in one-to-one correspondence with items in the operation request, and authenticating the operation request by the container management cluster based on an authorization result of the service account and the namespaces.
Owner:UCLOUD TECH CO LTD

Cross-equipment and cross-application identity authentication method based on data image coding

The invention relates to a cross-equipment and cross-application identity authentication method based on data image coding. Identity authentication condition information is provided by equipment B, but an actual authentication process is finished on equipment A; the identity authentication condition information provided by the equipment B comprises actually authenticated server addresses and publisher identity information capable of being verified; the identity authentication condition information is coded in a data to image mode and displayed on the equipment B in an image form finally; identity authentication condition image information on the equipment B is scanned by the equipment A, identity authentication condition data are restored through image decoding, the identity of a publisher is verified, and identity information is obtained from a user and sent to an authentication server; the identity of the user is verified by the authentication server and fed back to the equipment B, and the equipment B allows or refuses the process that the user logs in according to a feedback result; after finishing operation, the user can log out through the equipment B or the equipment A. It is guaranteed that authentication information of the identity of the user cannot be leaked or hijacked.
Owner:江苏先安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products