Multi-stage authentication method and multi-stage authentication system

A multi-level authentication and access credential technology, applied in the field of network security, can solve problems such as impersonation login, failure to log in, efficiency and stability reduction, etc., and achieve the effect of improving security

Active Publication Date: 2008-12-31
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If an attack such as modifying the local cookie value is encountered, the application of Cookie-based SSO may fail to log in or be logged in by an impersonator; if a malicious person hijacks the domain name system (Domain Name System, hereinafter referred to as: DNS) server When browsing the browser, the cookie will be sent to other servers, so that user information will be stolen; malicious people can steal user login information by hijacking data packets or using cracking algorithms or finding call interfaces to call algorithm interfaces externally; Use SSO for unified login. When a new system is connected or compatible with an old system, a major adjustment to the login function module is required, resulting in reduced efficiency and stability, and cannot be flexibly expanded.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-stage authentication method and multi-stage authentication system
  • Multi-stage authentication method and multi-stage authentication system
  • Multi-stage authentication method and multi-stage authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] figure 1 It is a flow chart of the first embodiment of the multi-level authentication method of the present invention. Such as figure 1 As shown, the method includes:

[0021] Step 101, perform a first multi-level verification on the received resource access request, and return the access credential index and corresponding address information after the verification is successful;

[0022] This multi-level verification is to verify the legal identity of the user corresponding to the user login information carried in the resource access request, that is, to determine whether the user has successfully logged in, and the verification process is a step-by-step verification. The verification process may be as follows: the login authentication server performs the first multi-level verification on the received resource access request. No successful login; if the verification is successful, it means that the user has successfully logged in, and the access credential index and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system of multilevel certification. The method of the invention comprises the steps that: first multilevel calibration is carried out to a received resource access request, and an access voucher index and relevant address information are sent back after the calibration is successful; according to the received access voucher index, second multilevel calibration is carried out and resource data corresponding to the address information is sent back after the calibration is successful. The system comprises a first calibration module and a second calibration module; the first calibration module is used for carrying out the first multilevel calibration to the received resource access request and sending back the access voucher index and the relevant address information after the successful calibration is completed; the second calibration module is used for carrying out the second multilevel calibration according to the received access voucher index and sending back the resource data corresponding to the relevant address information after the successful calibration is completed. The invention has the advantages of safe authentication method, flexible expansion and single sign-on and unified service.

Description

technical field [0001] The invention relates to network security technology, in particular to a multi-level authentication method and a multi-level authentication system. Background technique [0002] With the continuous development of the Internet and enterprise informatization, the identity authentication technology for realizing unified authentication and single sign-on (Single Sign On, hereinafter referred to as: SSO) is also developing rapidly. [0003] There are mainly three identity authentication methods in the prior art. One is a unified identity authentication method based on the transport layer. In this method, the user first logs in with a unified account at various application systems, and then all the application systems send a verification request to the unified identity authentication server, and after receiving a response message, the application system decides whether to provide services to the user. However, this method does not have the function of sing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 彭佳
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products