A single-system multi-platform authentication method

An identity verification method and multi-platform technology, which is applied in the field of single-system multi-platform identity verification, can solve problems such as failure to identify user login failure behavior, session failure process, failure to synchronize system content, etc., to improve efficiency and security, and reduce risks Effect

Active Publication Date: 2020-04-17
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0034] The biggest problem among the above four basic authentication methods is that identity authentication can only be maintained from the level of data encryption and sessions, but the system content between different platforms cannot be synchronized
Secondly, it is impossible to identify whether the user's login failure behavior and session failure process are caused by wrong operations or attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A single-system multi-platform authentication method
  • A single-system multi-platform authentication method
  • A single-system multi-platform authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] The technical solution of the present invention will be further described below in conjunction with the accompanying drawings.

[0080] like figure 1 As shown, a single-system multi-platform authentication method includes the following steps:

[0081] S1. The server obtains the user name and user password used by the client computer to log in, and then accesses the database to find out whether the user exists. If it exists, it provides the user with a ciphertext, otherwise it prompts an error and requires the client computer to log in again; figure 2 As shown, it specifically includes the following sub-steps:

[0082] S11, the server obtains the user name and user password used when the client logs in, accesses the database to find out whether the user exists, if it exists, executes step S12, otherwise prompts an error and requires the client to log in again;

[0083] S12, extracting the client object from the database, extracting the token field, if the token field ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a single-system multi-platform identity verification method, comprising the following steps: S1, the server obtains the user name and user password used by the client to log in; S2, the server receives the access request and cipher text sent by the client; S3, the server Verify the ciphertext, enter step S4 after the verification is successful, and execute the first adjustment scheme if the verification is unsuccessful; S4, the server parses the ciphertext, and determines whether there is an error in the current operation according to the protocol content of each client, if there is no error, then enter step S5, Otherwise, execute the second adjustment scheme; S5, the server returns a receipt allowing the client to access the restricted resource, and re-encrypts the message. The identity verification method of the present invention does not leave customer information on the server, adopts encryption method to circulate, modify characters, use crawler engine to hit the library or use expired ciphertext to generate attack warning, which can effectively reduce the risk of using cache and using session session. Induced session fixation attack risk.

Description

technical field [0001] The invention belongs to the technical field of identity verification, in particular to a single-system multi-platform identity verification method. Background technique [0002] There are four authentication methods in the Web: Basic, Form, Digest, SSL: [0003] 1. Basic (proposed by HTTP 1.0) [0004] After the client requests a certain resource, the server will send a 401 (unauthorized) response with Realm information in the response indicating that Basic authentication is used. [0005] After the browser receives this response, a box will pop up to enter the user name and password. Click Cancel to cancel the authentication, and click OK to submit the user name and password to the server. The way to submit is to add in the HTTP header: [0006] WWW-Authorization: Basic XXXXXXXX [0007] Basic is followed by the BASE64 encoding of the username and password. In client programming, this content is constructed as: [0008] String cre=userName+":"...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/083H04L63/10
Inventor 余景寰唐雪飞李源李贞昊
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products