Role-based web remote authentication and authorization method and system thereof

A remote authentication and role technology, applied in the field of authentication and authorization, can solve the problem that users cannot access the resources of the server

Inactive Publication Date: 2012-05-16
CHINA STANDARD SOFTWARE
View PDF3 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even when the web authentication fails, the server can provide PAM authentication to access lower-level resources, whi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Role-based web remote authentication and authorization method and system thereof
  • Role-based web remote authentication and authorization method and system thereof
  • Role-based web remote authentication and authorization method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and beneficial effects of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0043] figure 1 It is an overall schematic diagram of Web authentication and authorization based on the present invention. The main process is that the user submits authentication information to the Web browser and encrypts the authentication information; the server obtains the user role according to the authentication information, and then authorizes, and the user obtains accessible resources. A list of functions to access resources.

[0044] The Web authentication process involved in the present invention is as follows: figure 2 As shown, the user enters the password through the web...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a role-based web remote authentication and authorization method and a system thereof. According to the authentication and authorization method, user authority is defined according to a user role; when the user requests remote access to resources of different levels, a mode in which the user needs to be authenticated is selected; when the user requests access to resources at a low level in the system, wherein the resources are non-sensitive ones, password authentication is only needed to be carried out; and when the user requests access to resources at a high level in the system, wherein the resources are sensitive one, a global unique identification code is used to carry out authentication. During the authentication process with utilization of the global unique identification code, collection on the global unique identification code is realized on a Web browser terminal by using a loading plug-in unit or control technology. According to the invention, because a grading authentication and authorization mode is employed, complexity of authentication and authorization of a user can be reduced and thus security of the authentication and authorization is enhanced; and cross-platform and cross-browser utilization can be realized, so that better user experience can be realized.

Description

technical field [0001] The invention relates to an authentication and authorization method and system, in particular to a remote authentication and authorization method and system combining role-based access control and Web-based. Background technique [0002] In order to ensure information security, there are identity authentication technology, access control technology, information encryption technology and digital signature technology. [0003] There are many kinds of identity authentication technologies, such as password-based (namely user name and password) authentication, X.509 certificate, smart card, global unique identification code and other authentication technologies. [0004] Access control is a method of explicitly granting or restricting access rights and scope through some means. Access control prevents the services provided by the system from being illegally used by controlling the scope, functions, and modules of user access. Access control mainly include...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 张建锋
Owner CHINA STANDARD SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products