Uniform identity security authentication method capable of supporting multiple systems

A security authentication and multi-system technology, applied in the field of unified identity security authentication that supports multiple systems, can solve problems such as password theft, management chaos, token forgery, etc., to ensure account system and information security, convenient operation and use, avoid The effect of wasting resources

Inactive Publication Date: 2017-01-04
GLOBALTOUR GROUP LTD
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, there are many kinds of website platforms and various systems, and the methods of system user authentication are also different. However, most of the current mainstream system account authentication methods rely on a single user name and password (password) for system login, which will lead to After the password is stolen or cracked, the identity of the user cannot be confirmed before the information is transmitted, and there are certain risks and potential safety hazards
[0003] At the same time, among the various systems that have a relationship, most systems tend to work independently, lacking a unified user identity authentication function between multiple systems and multiple accounts, resulting in different security authentication systems and levels for each system, and management is relatively messy , the use of multiple identity authentications often leads to repeated waste of resources
[0004] In addition, there are also some systems that use mobile phone token authentication. This authentication method also has the risk and loopholes of being forged by hackers and causing the token to be forged.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Uniform identity security authentication method capable of supporting multiple systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The embodiments of the present invention will be described in detail below. It should be emphasized that the following description is only exemplary, and is not intended to limit the scope of the present invention and its application.

[0041] Refer to figure 1 In an embodiment, a unified identity security authentication method supporting multiple systems includes the following steps:

[0042] S1. The user's mobile phone initiates an authorization request with the mobile phone number as the unique identification mark to the system server;

[0043] S2. The system server sends an access permission security link to the user's mobile phone;

[0044] S3. After the user's mobile phone accesses the access permission security link, the system server obtains the MAC address of the user's mobile phone;

[0045] S4. The system side server submits user information to the authentication server, generates a user name and password, records the MAC address of the user's mobile phone, configure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a uniform identity security authentication method capable of supporting multiple systems. The method carries out security authentication control on multiple processes / procedures in various verification ways such as an access token, a mobile phone OTP token and an MAC address so as to ensure that an identity authentication process is perfectly secure and guarantee the security of accounts and information of the systems. Furthermore, based on the authentication method disclosed by the invention, simultaneous arrangement and application of the multiple systems are supported through a technological interface and a platform, so that secure system authentication is enhanced, and the system accounts are managed and standardized in a unified manner; the management efficiency is improved, and waste of resources is avoided. The invention provides a uniform identity authentication method which is secure and reliable, convenient to operate and use and capable of supporting the multiple systems to various types of systems and websites, particularly e-commerce type platforms relating to transaction, payment and settlement, so that the method has very practical significance and value for the security of the system accounts and construction and management of an account member system.

Description

Technical field [0001] The invention relates to the safety authentication and management of accounts, in particular to a unified identity safety authentication method supporting multiple systems. Background technique [0002] At present, there are many types of website platforms and systems, and the methods of system user authentication are also different. However, most of the current mainstream system account authentication methods rely on a single user name and password (password) for system login, which will lead to After the password is stolen or cracked, the user's identity cannot be confirmed before the information is transmitted, and there are certain risks and security risks. [0003] At the same time, most of the systems that have an association relationship tend to be independent, lacking a unified user identity authentication function between multiple systems and multiple accounts, resulting in different security authentication systems and levels before each system, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0823H04L63/0876
Inventor 张卫平
Owner GLOBALTOUR GROUP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products