Identity management system and identity authentication system
An identity management and identity technology, applied in the field of information processing, can solve problems such as limiting the scope of SPs, potential security risks, and unusable services.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] like figure 1 As shown, it is a schematic structural diagram of an embodiment of the identity authentication system of the present invention. This embodiment includes a user terminal 1 , an identity management system 2 and an SP device 3 . The user terminal 1 is used to send a login request and use services provided by the identity management system 2 and the SP device 3 . The identity management system 2 is used to manage the mapping relationship of multiple identities of the user, query the mapping relationship of multiple identities of the user according to the SP identification and the user identification, and obtain the user identity corresponding to the SP identification among the identities of the user identification. The SP device 3 is used to inquire about the identity of the user from the identity management system 2 according to the SP identifier and the user identifier when receiving the login request of the user terminal 1, and make the user log in with th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 