Based on saas authentication method

An identity authentication and user technology, applied in the field of network security, can solve the problems of network authentication equipment incompatibility cost, many hardware equipment restrictions, etc., to solve security problems, improve efficiency, and reduce costs.

Active Publication Date: 2018-11-30
广州中国科学院计算机网络信息中心 +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a SaaS-based identity authentication method in view of the technical problems of the existing identity authentication system with many restrictions on hardware equipment, incompatibility of various network authentication devices, and high cost.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Based on saas authentication method
  • Based on saas authentication method
  • Based on saas authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to further illustrate the technical means adopted by the present invention and the achieved effects, the technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings and preferred embodiments.

[0017] like figure 1 as shown, figure 1 It is a flow chart of a SaaS-based identity authentication method according to an embodiment of the present invention, including the following steps:

[0018] Step S101: Analyze the identity authentication request sent by each user when accessing the portal website obtained by using the standard Portal protocol, and obtain the network parameters of the user; wherein, the network parameters include the IP address of the user's access network controller and MAC address of the access point of the user terminal equipment;

[0019] In this step, the identity authentication request sent by each user when accessing the portal is obtained by using the Portal pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a SaaS-based identity authentication method, comprising the following steps: analyzing an identity authentication request which is acquired through a standard Portal protocol and sent by each user while accessing to a portal site, thereby obtaining a network parameter of the user; according to the network parameter of the user, acquiring account information bound with a user terminal device; sending the account information to a billing system, and acquiring authority information of the user from the billing system; if the authority information is an authorized state, judging that identity authentication of the user is successful, and returning back notification information of success of authentication to the user. By the technical scheme, the method provided by the invention realizes unified authentication for multiple identity authentication requests from different network authentication devices, solves a technical problem of incompatibility between different identity authentication systems and different network authentication devices, improves efficiency of identity authentication, and reduces cost of identity authentication.

Description

technical field [0001] The invention relates to the field of network security, in particular to a SaaS-based identity authentication method. Background technique [0002] With the explosive growth of the mobile Internet, people are increasingly inseparable from mobile terminal devices such as mobile phones and Pads. Users are more and more attached to the network, and the usage time is getting longer and longer. People's demand for wireless networks is also getting higher and higher. Wireless network is a network realized by wireless communication technology. The biggest difference from wired technology is that wireless technology is used to replace network cables. Mainstream wireless networks are divided into wireless networks (such as 4G, 3G) and wireless local area networks ( WiFi) in two ways. To a certain extent, the wireless network throws away the network cables that the wired network must rely on, so that users can move freely within the reachable range of the sign...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0876H04L63/0892H04L67/02
Inventor 徐佳吴双力沈烁张正顺
Owner 广州中国科学院计算机网络信息中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products