Unlock instant, AI-driven research and patent intelligence for your innovation.

Single sign-on authentication method, equipment and system

An authentication method and single sign-on technology, applied in the field of equipment and systems, SSO authentication methods, can solve problems such as weak security, high risk, user information leakage, etc., to improve security and avoid leakage.

Inactive Publication Date: 2015-11-25
XIAN ZHONGXING NEW SOFTWARE
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in view of the easy loss of the user's mobile terminal device, if the security of the authentication server's legality verification strategy is not strong, it will be impossible to identify whether the account is used by a real user, resulting in leakage of user information, which is extremely dangerous. Big

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Single sign-on authentication method, equipment and system
  • Single sign-on authentication method, equipment and system
  • Single sign-on authentication method, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In the embodiment of the present invention, the authentication client obtains the terminal location information, and sends an authentication request including the basic user information and terminal location information to the authentication server; the authentication server verifies the basic user information, and after the verification is successful , generating a user identity credential according to the basic user information and the terminal location information, and returning the user identity credential to the authentication client.

[0041] Further, when the authentication server returns the user identity certificate to the authentication client, it also returns an authentication success message;

[0042] Still further, the user identity credential returned by the authentication server to the authentication client is used for subsequent SSO authentication of the user.

[0043] figure 1 It is a schematic flow diagram of an SSO authentication method according to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed is a single sign-on (SSO) authentication method. The method comprises: an authentication client acquires terminal location information and sends an authentication request comprising user basic information and the terminal location information (101); and the authentication client receives a user identity credential (102), the user identity credential being used for implementing SSO authentication when the authentication client logs in again. Also disclosed are an SSO authentication system and device, and a computer storage medium.

Description

technical field [0001] The invention relates to technologies related to single sign-on (Single Sign-On, SSO) in mobile Internet, and in particular to an SSO authentication method, device and system. Background technique [0002] Single sign-on refers to the same user who accesses protected resources in different applications on the same server. The user only needs to enter the user name and password once for identity authentication, and then can seamlessly access all authorized resources without multiple times. Perform login authentication. [0003] The proposal and wide application of single sign-on technology has greatly improved user experience and improved the efficiency of business systems. It has become the preferred account authentication and authorization scheme for mainstream large-scale Internet and enterprises. Extremely high requirements, security is one of the biggest hidden dangers, especially in the mobile Internet. [0004] Assume the following scenario: mu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W4/02
CPCH04L9/32
Inventor 段恺
Owner XIAN ZHONGXING NEW SOFTWARE