Unlock instant, AI-driven research and patent intelligence for your innovation.

A method for authorization and authentication of inter-system data transfer

A technology of data invocation and authentication method, applied in the field of data exchange technology and security verification, can solve the problems of data transaction crossover, inability to guarantee user information security, etc., and achieve the effect of avoiding data crossover and ensuring security.

Active Publication Date: 2020-07-28
ANHUI SUN CREATE ELECTRONICS
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The data call authorization and authentication method between systems in the prior art cannot guarantee the security of user information during the data call authorization and authentication process between two systems, and the data between the systems is prone to overlap. Therefore, it is urgent to propose a method that can guarantee user information. The secure inter-system data call authorization authentication method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for authorization and authentication of inter-system data transfer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0021] Such as figure 1 As shown, an intersystem data transfer authorization authentication method includes the following steps:

[0022] S1. The first system generates a SysKey, and sends the SysKey to a single sign-on service system, and the single sign-on service system generates a temporary Token;

[0023] S2. The single sign-on service system transmits the SysKey and the temporary Token to the second system;

[0024] S3. The second system returns the te...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of data exchange technology and security verification technology, and particularly relates to an intersystem data calling authorization and authentication method. The intersystem data calling authorization and authentication method comprises the following steps: firstly, SysKey is generated by a first system, and the SysKey is sent into a single-point login service system to obtain a temporary Token; the single-point login service system transmits the SysKey and the temporary Token to a second system; the second system transmits the temporary Token to the single-point login service system to verify whether the temporary Token is valid; the single-point login service system returns a verification result to the second system; if the temporary Token is valid, data to be inquired by the first system are returned to the first system; and otherwise, the temporary Token is directly returned to the first system to perform data processing. By adoption of the intersystem data calling authorization and authentication method provided by the invention, the security of user information in a data calling authorization and authentication process of the first system and the second system is guaranteed; and the two systems communicate through the single-point login service system, so the data in the two systems are respectively located within the respective system administration authority, and thus the data cross phenomenon between the two systems is effectively avoided.

Description

technical field [0001] The invention belongs to the field of data exchange technology and safety verification technology, and in particular relates to an authorization authentication method for inter-system data call. Background technique [0002] With the rapid development of the IT industry, the development of software systems not only considers functional requirements, customers also pay more and more attention to the security requirements of user information and data calls, so user authorization and authorization authentication of data calls between systems It has become particularly important, because the security of the system is more and more valued by users, and users also attach great importance to the privacy of network data. At the same time, R&D personnel also focus on designing related system security issues. Therefore, system login and data call have also become a hot topic that the IT industry has focused on research and development in recent years. [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L63/0815
Inventor 范联伟余保华武永涛徐圣吉
Owner ANHUI SUN CREATE ELECTRONICS
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More