WEB single sign-on method completely transparent to user and application

A single sign-on, fully transparent technology, applied in the field of network security, can solve the problems of user impact, inability to support browsers and operating systems, etc.

Inactive Publication Date: 2013-07-03
KOAL SOFTWARE CO LTD
View PDF3 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Furthermore, in the case of installing the client or plug-in, it will have a certain impact on the user's use, and it cannot support all browsers and operating systems (such as safari on the ipad)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WEB single sign-on method completely transparent to user and application
  • WEB single sign-on method completely transparent to user and application
  • WEB single sign-on method completely transparent to user and application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0040] In order to realize SSO that is completely transparent to users and applications, and fully support all browsers and operating systems, the present invention designs a unique technical solution, the main principles of which are as follows:

[0041] (1) Intercept HTTP packets between users (browsers) and WEB applications through transparent bridge technology;

[0042] (2) Use page redirection technology to redirect users to the SSO server when they visit for the first time;

[0043] (3) After the SSO service completes the authentication, redirect the browser back to the WEB application, and set two security tokens, one ptoken for the SSO authentication service itself and the other atoken for the application;

[0044] (4) When the browser ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a WEB single sign-on method completely transparent to a user and an application. The method comprises the following steps that: 1, an HTTP (Hyper Text Transport Protocol) data packet between the user (a browser) and the WEB application is intercepted by a transparent bridge technology, 2, the user is redirected to an SSO (Single Sign-on) server by a page redirection technology during first access, 3, after SSO service is certified, the browser is redirected back to the WEB application and a security Token is set, and 4, when the browser accesses the application again, an SSO gateway inspects the security Token, and the access is passed if the security Token is valid. According to the WEB single sign-on method, the single sign-on of the WEB application can be achieved under the conditions that a client or plugin is not required to be installed and the application is not required to be modified, and a top-level domain can be crossed.

Description

technical field [0001] The invention relates to network security technology, in particular to a WEB single sign-on technology completely transparent to users and applications. Background technique [0002] Single sign-on (SSO) has a very clear demand in WEB applications, and the existing technologies are mainly divided into the following categories: [0003] (1) Simple use of cookies to implement between second-level domain names, usually used in multiple sub-sites of a certain website. [0004] (2) It is dominated by a certain website and integrated by other websites (or WEB applications). For example, the user name / password of Alipay can log in to multiple websites. [0005] (3) Fully peer-to-peer identity authentication implementation, such as OpenID. [0006] (4) Utilize client end or browser plug-in to realize. [0007] However, the above-mentioned technology has the following shortcomings in the actual use process: [0008] First of all, the above-mentioned soluti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 掌晓愚杨茂江谭武征应哲峰陈海雷
Owner KOAL SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products