Single-point login system and single-point login method

A single sign-on and login authentication technology, applied in the field of information security, can solve problems such as timeliness limitations, information loss, and increased security risks, and achieve cross-authentication, direct cross-authentication, and convenient deployment

Active Publication Date: 2011-01-05
BEIJING E HENXEN AUTHENTICATION TECH +1
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Regardless of using session sharing technology or recording authentication information through cookies, there are problems that are not easy to save and easy to lose
In addition, the session method not only consumes resources, but also has a time limit. Once it times out, all information will be lost; and cookies can only be applied to user browsers that accept cookies, which also has considerable limitations.
The above methods are essentially indirect authentication and login through the process of trust transfer, and any behavior of extending the trust chain will increase security risks, and it is difficult to achieve single sign-on between C / S applications and B / S applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Single-point login system and single-point login method
  • Single-point login system and single-point login method
  • Single-point login system and single-point login method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] Combined Public Key Algorithm (Combined Pubic Key, CPK) is an identity-based public key algorithm, and its key management center generates corresponding private key calculation parameters (private key calculation base) and public key calculation parameters (public key calculation base); According to the identification provided by the first user, use the private key calculation parameters to calculate the private key of the first user, and provide the generated private key to the first user; and publish the public key calculation parameters so that the second user After the identification of the first user is obtained, the public key of the first user may be calculated by using the public key calculation parameters according to the identification of the first user.

[0033] On the basis of proposing the CPK algorithm, a CPK chip is also provided. The CPK chip has a CPK algorithm functional unit and a verification protocol unit, which are specifically implemented in the ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information safety and relates to an authentication technology based on identifications, in particular to a single-point login system and a single-point login method which can be used for realizing safe single-point login among a plurality of application systems. The single-point login system comprises user key equipment and a login authenticating module which is arranged at the server end, wherein an identification private key or a composite private key is stored in the user key equipment; seed public key sets are stored in the server end and the user end; the user key equipment carries out interactive authentication with the login authenticating module at the server end when accessing a server; and the user key equipment is reformed so as to maintain an opening state after a PIN (Personal Identification Number) is input once, and the authentication work is automatically finished between the server end and the client end when the user accesses other application systems, therefore, the ideal effect of single-point login is achieved.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to an identification-based authentication technology, in particular to a single sign-on system and a single sign-on method, which can be used to realize secure single sign-on between multiple application systems. Background technique [0002] In consideration of security, more and more information systems begin to use dynamic passwords and login systems based on PKI certificates. Using the above system to implement access control is much safer than the common username and password method, but there are still many inconveniences for network users and system administrators: users have to do identity authentication every time they log in to a system, and system administrators have to do identity authentication. Separate security policies should be formulated for each application system, and users in each system need to be individually authorized to limit their access to unau...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 赵建国李维刚
Owner BEIJING E HENXEN AUTHENTICATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products