Authentication and access method and authentication system

An access method and authentication information technology, applied in transmission systems, electrical components, etc., can solve the problems of low efficiency, cumbersome authentication access configuration, low authentication integration of authentication service system, etc., and achieve the effect of improving the overall integration.

Inactive Publication Date: 2013-04-03
CHINA CONSTRUCTION BANK
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in order to ensure the security of report data, general banks will adopt different levels of identity authentication schemes for different application services. end, each time it needs to be manually configured on the application server and report server, so tha

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication and access method and authentication system
  • Authentication and access method and authentication system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0017] In order to make the objectives, technical solutions and advantages of the embodiments of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0018] reference figure 1 , Illustrates a schematic diagram of an authentication access method according to an embodiment of the present invention. Specifically, the authentication access method includes:

[0019] S101, log in to the first server through the user name,

[0020] S102: After passing the authentication of the first server, generate an authentication identifier, where the authentication identifier is associated with the time of logging in to the first server;

[0021] S103. Write the user name and the authentication identifier into the database of the first server and the database of one or more second server connected to the first server;

[0022] S104: If the second server is accessed according to the user name through the first server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication and access method. The authentication and access method includes logging on a first server through a user name, generating an authentication mark related to time of logging on the first server after passing authentication, writing the user name and the authentication mark into a database of the first server and databases of one or a plurality of second servers connected with the first server, starting access modules configured at the second servers to read authentication marks from the databases of the second servers according to the user name if the second servers are accessed by the first server according to the user name, comparing the read authentication marks with the authentication mark read from the database of the first server, and being allowed to continue to access the second servers if comparison result is consistent. The invention further provides a corresponding authentication system. By the method and the system, single-point logging on between the two types of servers is achieved, and accordingly integrated authentication efficiency of the authentication system is improved on the whole.

Description

technical field [0001] The invention relates to the field of data security, in particular to an authentication access method and an authentication system. Background technique [0002] With the continuous development of information security technology and the continuous improvement of people's awareness of identity security authentication, it has become a trend to adopt different security authentication schemes for different levels or levels of business or operations. For example, in the financial industry, for applications with different risk levels, different levels of user identity authentication schemes are required, that is, for the same user, it is necessary to repeatedly perform identity authentication access processing between different application services Operation, authentication efficiency is extremely low. [0003] For example, in order to improve the report display efficiency, a certain bank A has established an application server for centralized display of re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 欧万翔孙浩叶坤林朱志林廷懋
Owner CHINA CONSTRUCTION BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products