Security certification method and security certification system

A technology of security authentication and login authentication, applied in transmission systems, digital data authentication, computer security devices, etc., can solve the problem of insufficient log and behavior monitoring, lack of internal authorization management of third-party application systems, and lack of background cross-server sessions Sharing and other issues to achieve the effect of avoiding leakage and improving security

Inactive Publication Date: 2015-04-08
ZICT TECH CO LTD
View PDF5 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The 4A authentication implemented by the authentication system in the related technology is for the third-party application system. However, after the authentication passes and enters the third-party application system, the log and behavior monitoring of the third-party application system is not enough, and there is no Internal authorization management for third-party application systems
In addition, the SAML authentication service in related technologies supports cluster deployment, but does not support session sharing across servers in the background

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security certification method and security certification system
  • Security certification method and security certification system
  • Security certification method and security certification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0037] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0038] figure 2 A flow chart of a security authentication method according to an embodiment of the present invention is shown.

[0039] Such as figure 2 As shown, the security authentication met...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security certification method and a security certification system. The method includes: on receiving an access request from an application, acquiring preset single sign-on information in an address of the application; according to the preset single sign-on information, determining an application IP (internet protocol) and port information corresponding to the preset single sign-on information to allow the access to the application through the application IP and port information; during the access to the application, allowing security certification according to preset session data in a memory database. The security certification method and the security certification system have the advantages that service agency is achieved, the security of the system is better, and the system is imparted the functions of log auditing and permission controlling; session sharing is achieved so that the problem of non-uniformity in session information caused by the access to different servers is effectively avoided.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular, to a security authentication method and a security authentication system. Background technique [0002] In related technologies, SAML (Security Assertion Markup Language, Security Assertion Markup Language) is a standard based on XML (Extensible Markup Language, Extensible Markup Language), used for exchanging authentication between different security domains (Security Domain) and authorization data. The SAML standard defines an identity provider (Identity Provider) and a service provider (Service Provider), which constitute the different security domains mentioned above. In addition, SAML is a product of the Security Services Technical Committee of the Organization for the Advancement of Structured Information Standards. [0003] Such as figure 1 As shown, the principle of the security authentication system in the related art is introduced in detail below: [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815G06F21/41G06F21/51H04L63/168
Inventor 张兵
Owner ZICT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products