Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cross-trust-domain identity authentication method

An identity authentication and trust domain technology, applied in user identity/authority verification, electrical components, transmission systems, etc., can solve the problems of inconvenient subnet information sharing and interaction, information barriers, etc., and achieve the effect of simplifying the development process of identity authentication

Active Publication Date: 2015-02-25
成都卫士通信息安全技术有限公司
View PDF4 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, in the large network environment of government affairs, business and other groups, there are many times when different networks use different trust systems, such as different CAs and different business systems. When exc

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-trust-domain identity authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The invention is based on:

[0019] 1. PKI's digital signature technology realizes the signature of identity tokens, ensures the validity of identity tokens, and provides the basis for cross-domain authentication.

[0020] 2. The XML language specification realizes the encapsulation of identity tokens and realizes cross-platform, cross-language, and extensible tokens.

[0021] 3. WebService technology to realize cross-software and hardware platforms and cross-language identity token verification services.

[0022] 4. OPENID technology realizes the standardization of identity authentication protocols.

[0023] 5. COM technology, realizing the token interface call of the Window platform.

[0024] 6. The FireFox plug-in technology realizes the calling of the token interface of the Linux platform.

[0025] An identity authentication method across trust domains, including: identity token issuing service and token verification service of identity authentication server; ide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cross-trust-domain identity authentication method. An identity authentication service module and an authentication terminal module are involved in the method. The identity authentication service module provides an issuing service and a verification service for an identity token, the issuing service of the identity token includes the steps of accepting the application for the identity token, packaging the identity token and issuing the identity token, and the verification service of the identity token includes the steps of verifying the identity token based on a challenge, returning user application system information depending on a valid token and excluding identity tokens of non-valid users through synchronization with an LDAP or a CRL. The authentication terminal module comprises an identity token application module and a client side password module. The identity token application module is in charge of identity token application and maintenance, and the client side password module provides a client side certification and password operation. A user can have access to a whole network through identity authentication at one place, and the trust problem existing in the prior is solved.

Description

technical field [0001] The invention relates to the technical field of identity authentication in an information network, in particular to an identity authentication method across trust domains, which realizes access within a trust domain or across trust domains through an identity authentication token. Background technique [0002] At present, in the large network environment of government affairs and business groups, there are many times when different networks use different trust systems, such as different CAs and different business systems. The mechanism requires multiple authentications in each subnet, and there is a large information barrier, which is inconvenient for information sharing and interaction between subnets. Contents of the invention [0003] In order to overcome the above-mentioned shortcomings of the prior art, the present invention provides a cross-trust domain identity authentication method, which realizes one-site authentication and whole-network acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 方鸣睿汪仕兵杨宇秦凯刘小华邢朝阳原蓓蓓吴荣政
Owner 成都卫士通信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products