Method of client authorization and authentication based on b/s architecture system

A system client, S architecture technology, applied in the field of client authorization and authentication based on B/S architecture, to avoid potential security risks, avoid phishing, and reduce the probability of installation permissions

Active Publication Date: 2018-10-23
江苏中天互联科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the continuous development of these authorization technologies, such as SQL injection, phishing and other hacker technologies, simply using a single user authorization and identification method can no longer meet the needs of users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of client authorization and authentication based on b/s architecture system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be described in further detail below through examples, and the following examples are explanations of the present invention and the present invention is not limited to the following examples.

[0029] As shown in the figure, a method for client authorization and authentication based on B / S architecture system of the present invention comprises the following steps:

[0030] 1 Client terminal installation.

[0031] When installing the client terminal on the host, the user can obtain and install the client terminal software only by using the unique key to authenticate the authorized identity. When installing a client terminal, the user applies for a unique key to the server. After the server passes the verification, it sends the unique key to the client terminal in the installation key verification database. The key authentication time is 24 hours. If the software installation fails, you need to re-apply for a new authorization key. The key must...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system client authorization authentication method based on a B / S framework. A user needs to apply a unique secret key to authenticate an authorization identity and further to complete the installation of a client, client software obtains a unique physical address MAC address of a host, the unique physical address MAC address is encrypted by MD5 and sent to a server end after being connected with an SALT randomly generated by the system, the user submits a computer terminal authentication application, after verification is passed, the SALT randomly generated by the system is stored in a database, and a Hash value of the MAC address and the SALT is added into an authentication passing list, and the client accesses the authentication. According to the invention, the terminal authorization authentication technology is combined in the B / S framework, various problems of terminal identity authentication by utilizing the mac address through a browser in the B / S framework are effectively solved, the safety problem is also solved, phishing and data interception are avoided, and the probability of illegal users to obtain terminal installation authority is lowered.

Description

technical field [0001] The invention relates to a method for authorization and authentication, in particular to a method for authorization and authentication of a system client based on a B / S architecture. Background technique [0002] The most commonly used method of user authorization under the existing B / S architecture is to implement electronic documents of the digital certificate type in the Activex control, which contains the identity information of the applicant, the public key of one of the secret key pairs, digital signatures and The validity period of the certificate, etc. In the authentication process, the digital signature is used as the user's identity to determine whether the user is legal. Digital certificates have always been considered the most secure pass in the network, because digital certificates are often certified and managed by a third party. But because of this, service providers also bear the risk of uncontrollable security while increasing costs....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L29/06
CPCH04L9/0643H04L63/0869H04L63/0876
Inventor 雷耀山申海元时宗胜孙哲
Owner 江苏中天互联科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products