Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security authentication method for WEB service

A WEB service and security authentication technology, applied in the security authentication field of WEB service interface application, can solve the problems of cumbersome use, and achieve the effect of strengthening authentication security

Active Publication Date: 2011-04-06
GOSUNCN TECH GRP
View PDF2 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the setting of the account number and password generally only sets a dozen digits at most, too long will cause cumbersome use, and generally a very simple password is set, which gives people an opportunity to use guessing methods. crack a bunch of codes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method for WEB service
  • Security authentication method for WEB service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The present invention will be further described below in conjunction with the accompanying drawings.

[0025] Please refer to the attached figure 1 , the WEBSERVICE interface exists as a server-side mode, and it is distributed with a login interface, a logout interface and several service interfaces. The application program that calls this WEBSERVICE interface exists in the form of a client, and various business functions are realized by calling the WEBSERVICE interface. All WEBSERVICE interfaces adopt a security authentication mechanism. The identity authentication mechanisms of the login interface, logout interface, and business interface are slightly different. Before calling the business interface, the client must first call the login interface to obtain the identity certificate. When the client exits the program, Call the logout interface to log out the identity certificate.

[0026] It can be implemented as follows:

[0027] 1. First, you need to determine an a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of software security authentication, and particularly relates to a security authentication method for WEB service interface application. In the security authentication method for WEB service, the hardware comprises a server provided with WEB service interfaces and a client for calling the WEB service interfaces, wherein the WEB service interfaces comprise a login interface, a cancellation interface and a plurality of service interfaces. The method is characterized in that: a bidirectional asymmetrical encryption algorithm for encrypting account, password and hardware ID of the client is adopted between the client and the server, and the encrypted account, password and hardware ID are used as identity certificates in a random code mode; before calling the service interface, the client calls the login interface to acquire the identity certificates; and when the program exits, the client calls the cancellation interface to cancel the identity certificates. The method promotes the security of the WEB service interface, and has very positive significance for enterprise-level distributed application.

Description

technical field [0001] The invention belongs to the technical field of software security certification, and in particular relates to a security certification method for WEB service interface applications. technical background [0002] With the development of software technology, application software has developed from stand-alone application to distributed application. Since WEB service (WEBSERVICE) is relatively simple to develop and easy to use, it has become the choice of more and more distributed software. At present, a large number of distributed applications use WEB service (WEBSERVICE) as the technical basis to realize distributed computing and application. [0003] However, with the increase of applications, security issues have become more prominent. When the current WEB service (WEBSERVICE) is applied, in order to ensure that it is not illegally invoked, the user authentication mechanism will be adopted. The general authentication method adopts the security authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 舒海燕王振勇宋保军刘双广
Owner GOSUNCN TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products