Method and device for single sign on
A single sign-on, application system technology, applied in user identity/authority verification, electrical components, transmission systems, etc., to solve problems such as user login failures
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] exist figure 2 In the shown Kerberos scheme, in order to avoid replay attacks, the requirements for time verification are relatively strict. Therefore, the Kerberos scheme requires clock synchronization between the SSO initiator 210 and the SSO server 230 . In other words, in figure 1 In the environment shown, the user terminal 110 that may be the SSO initiator and each application system 120 need to be synchronized with the clock of the SSO server. This point is usually difficult to achieve in practical applications. Therefore, it is necessary to propose an SSO solution that does not require clock synchronization.
[0029] A simple and effective solution to avoid clock synchronization is to enable the SSO initiator to obtain the system time T of the SSO server sso , and the SSO initiator calculates T sso with local time T init time offset ΔT between them, and then use this calculated time offset ΔT to correct the timestamp T in the access request to the SSO rece...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 