System client authorization authentication method based on B/S framework

A system client, S architecture technology, applied in the field of client authorization and authentication based on B/S architecture, to avoid potential security risks, reduce costs, and reduce the probability of installation authority

Active Publication Date: 2016-07-06
江苏中天互联科技有限公司
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the continuous development of these authorization technologies, such as SQL injection, phishing and other ha

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System client authorization authentication method based on B/S framework

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0028] The present invention will be further described in detail below through examples. The following examples are for explaining the present invention and the present invention is not limited to the following examples.

[0029] As shown in the figure, a method for client authorization and authentication based on a B / S architecture system of the present invention includes the following steps:

[0030] 1 Client terminal installation.

[0031] When the client terminal is installed on the host, the user can only obtain and install the client terminal software by using the unique key to authenticate and authorize the identity. When installing the client terminal, the user applies to the server for a unique key. After the server is approved, the unique key is sent to the client terminal in the installation key verification database. The key authentication time is 24 hours, and the authentication time limit is exceeded. If the software installation fails, you need to apply for a new auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system client authorization authentication method based on a B/S framework. A user needs to apply a unique secret key to authenticate an authorization identity and further to complete the installation of a client, client software obtains a unique physical address MAC address of a host, the unique physical address MAC address is encrypted by MD5 and sent to a server end after being connected with an SALT randomly generated by the system, the user submits a computer terminal authentication application, after verification is passed, the SALT randomly generated by the system is stored in a database, and a Hash value of the MAC address and the SALT is added into an authentication passing list, and the client accesses the authentication. According to the invention, the terminal authorization authentication technology is combined in the B/S framework, various problems of terminal identity authentication by utilizing the mac address through a browser in the B/S framework are effectively solved, the safety problem is also solved, phishing and data interception are avoided, and the probability of illegal users to obtain terminal installation authority is lowered.

Description

technical field [0001] The invention relates to a method for authorization and authentication, in particular to a method for authorization and authentication of a system client based on a B / S architecture. Background technique [0002] The most commonly used method of user authorization under the existing B / S architecture is to implement electronic documents of the digital certificate type in the Activex control, which contains the identity information of the applicant, the public key of one of the secret key pairs, digital signatures and The validity period of the certificate, etc. In the authentication process, the digital signature is used as the user's identity to determine whether the user is legal. Digital certificates have always been considered the most secure pass in the network, because digital certificates are often certified and managed by a third party. But because of this, service providers also bear the risk of uncontrollable security while increasing costs....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L29/06
CPCH04L9/0643H04L63/0869H04L63/0876
Inventor 雷耀山申海元时宗胜孙哲
Owner 江苏中天互联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products