User identity authentication system and authentication method thereof

A technology of user identity authentication and user authentication, applied in user identity/authority authentication, transmission systems, electrical components, etc., can solve problems such as reduced information security, irrational distribution of resources, and increased user complexity, and achieve safe and reliable access , reduce resource cost and complexity, and maximize benefits

Inactive Publication Date: 2013-01-02
WUXI CITY CLOUD COMPUTING CENT
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1) Unreasonable distribution of resources;
[0005] 2) Increased user complexity;
[0006] 3) Reduced information security;
[0007] 4) Increased management costs;
[0008] 5) Poor scalability, unable to be used by third parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity authentication system and authentication method thereof
  • User identity authentication system and authentication method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0034] A user identity authentication system provided in this embodiment, its schematic diagram is as follows figure 1 As shown, it includes a user authentication server, a Web server, a client, and a database; the Web server communicates with the client, the database, and the user authentication server respectively.

[0035] Wherein, the client includes at least one client.

[0036] An authentication method of a user identity authentication system provided in this embodiment, its flow chart is as follows figure 2 shown, including the following steps:

[0037] (1) The user accesses the Web server through the client;

[0038] The client includes a user authentication interface and an application access interface; the user selects the user authentication interface or the application access interface to enter the Web se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identity authentication system, belonging to the field of computers. The system comprises a server, a client and a databank, wherein the server respectively communicates with the client and the databank. Corresponding to the system, the invention discloses an authentication method of the user identity authentication system; the method comprises the following steps: (1) a user accesses to a Web server through the client; (2) the Web server queries user information through the databank; and (3) the user information queried in the databank is transmitted to a user authentication server to be authenticated, if the authentication is correct, the user is allowed to log in, relevant information of the user is displayed, and a unique and unrepeated authentication key is set up; or else input error is displayed. The system supports the lead-in of third-party user information and different authentication modes of the third-party, so that the situation that multiple systems use different user authentication systems is avoided, and thus the use complexity of users is reduced.

Description

technical field [0001] The invention relates to the field of computers, in particular to a user identity authentication system and an authentication method thereof. Background technique [0002] The rapid development of computer network and information technology has continuously improved the degree of enterprise informatization. In the process of enterprise informatization, many application systems have been built and put into daily office use, such as mail system, financial approval system, document management system, Call system, GIS system, etc. These application systems have become an important part of e-government, improving the management level and operating efficiency of enterprises. At the same time, most application systems have self-contained user management, authorization and authentication systems , the same user needs to use different accounts belonging to the system to access different application systems when entering different application systems. passwords...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 吕灼恒
Owner WUXI CITY CLOUD COMPUTING CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products