Single sign-on authentication method, equipment and system
An authentication method and single sign-on technology, applied in the field of equipment and systems, SSO authentication methods, can solve problems such as weak security, high risk, user information leakage, etc., to improve security and avoid leakage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] In the embodiment of the present invention, the authentication client obtains the terminal location information, and sends an authentication request including the basic user information and terminal location information to the authentication server; the authentication server verifies the basic user information, and after the verification is successful , generating a user identity credential according to the basic user information and the terminal location information, and returning the user identity credential to the authentication client.
[0041] Further, when the authentication server returns the user identity certificate to the authentication client, it also returns an authentication success message;
[0042] Still further, the user identity credential returned by the authentication server to the authentication client is used for subsequent SSO authentication of the user.
[0043] figure 1 It is a schematic flow diagram of an SSO authentication method according to ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 