Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity combination method

A technology of identity federation and identity management, which is applied in the field of identity federation of mapping relationships, and can solve problems such as limiting the scope of SPs

Active Publication Date: 2011-08-17
CHINA MOBILE COMM GRP CO LTD +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The .NET Passport technology mainly has the following defects: a unified user account must be used between the authentication server and the Service Provider (SP) service, which limits the scope of the SP

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity combination method
  • Identity combination method
  • Identity combination method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] Such as figure 1 As shown, it is a flow chart of Embodiment 1 of the identity federation method of the present invention, including the following steps:

[0027] Step 101, the user terminal logs in to the SP device;

[0028] Step 102, the SP device sends a redirection request to the user terminal, and the redirection request carries the address information of the identity management device, the SP identifier and user identity information;

[0029] Step 103, the user terminal connects to the identity management device according to the redirection request, and sends the SP identification and user identity information to the identity management device;

[0030] Step 104, the identity management device saves the mapping relationship between the login identity of the user terminal logging into the identity management device, the user identity information and the service provider identifier.

[0031] This embodiment realizes that after the user logs in to the SP device, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identification joint method and comprises user terminal login service provider equipment which sends a redirection request to the user terminal, wherein, the redirection request carries identification management equipment address information, a service provider mark and user identification information; the user terminal connects the identification management equipment and sends the service provider mark and the user identification information to the identification management equipment according to the redirection request; and the identification management equipmentpreserves the mapping relationship among the login identification of the user terminal login identification management equipment, the user identification information and the service provider mark. The invention realizes the establishment of the mapping relationship between the user identification on a plurality of SPs and the identification on the identification management equipment; by using themapping relationship, when the user logins the identification management equipment or a SP and then accesses other SPs, the identification management equipment can inquire and obtain the identification information of the user on other SPs, thereby realizing united login.

Description

technical field [0001] The invention relates to communication technology, in particular to an identity association method for establishing mapping relationships among multiple identities of users. Background technique [0002] With the development of information technology and network technology, various application services are constantly popularized on the Internet, and users need to log in to many different application systems every day. Different systems require users to follow certain security policies for security reasons, the most common ones are requiring input of user name and key. With the increasing number of users who need to log in to the system, users have to repeatedly input their user names and passwords in the corresponding systems every day, which is extremely inconvenient and also increases the possibility of errors. [0003] On the other hand, with the development of Web service technology and the continuous improvement of the integration of various Web-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F17/30
Inventor 刘利军魏冰杨放春赵耀刘宝义苏森邹华
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products