Unlock instant, AI-driven research and patent intelligence for your innovation.

System-integrated authentication method and system

An authentication method and system integration technology, applied in the authentication method and system field of system integration, can solve problems such as limitation and single authentication model

Active Publication Date: 2018-10-30
INSPUR BEIJING ELECTRONICS INFORMATION IND
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Keystone is an effective and convenient authentication system for the Openstack project, but its authentication model is relatively simple, and it is mainly designed for OpenStack business
When performing authentication management on other business systems, it appears relatively limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System-integrated authentication method and system
  • System-integrated authentication method and system
  • System-integrated authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The core of the present invention is to provide a system-integrated authentication method, which can complete public authentication during system integration; another object of the present invention is to provide a system-integrated authentication system.

[0059] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0060] Please refer to figure 1 , figure 1 It is a flow chart of the system i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and system for system integration. The method comprises the following steps of receiving authentication information sent by a user and judging whether the authentication information includes a token; if the authentication information does not include the token, utilizing a first authentication system to carry out user identity authentication according to the authentication information, and if passing the user identity authentication, generating the first token and a corresponding second token and returning the first token of the user; if the authentication information includes the token, utilizing the first authentication system to authenticate whether the token is the first token, if the token is the first token, generating the second token corresponding to the first token to complete authentication; and if the token is not the first token, utilizing a second authentication system to authenticate whether the token is the second token, if yes, generating the first token corresponding to the second token and returning the first token generated by the user to complete authentication. According to the method and the system, common authentication can be completed during system integration.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a system-integrated authentication method and system. Background technique [0002] With the rapid development of the Internet and informatization, various systems have emerged, and these systems have the property of sharing resources. With the rapid development of cloud computing, many systems have the need to integrate cloud computing platforms, which can quickly access business systems and apply for cloud resources conveniently. Openstack is a very stable cloud computing platform that has been widely used, so there is a need to integrate with Openstack. [0003] The first task of integration is the integration of authentication. Different systems have different services, and therefore have different authentication model requirements. Keystone is an effective and convenient authentication system for the Openstack project, but its authentication model is relatively simp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0807
Inventor 郭春庭
Owner INSPUR BEIJING ELECTRONICS INFORMATION IND