Unified authentication method for simulation identity

An authentication method and identity technology, applied in transmission systems, electrical components, etc., can solve problems such as the inability to quickly determine the responsible person, the inability to track users, the lack of user identification and authentication mechanisms, etc., and achieve the effect of improving the ability to guarantee services

Inactive Publication Date: 2017-05-03
星际空间(天津)科技发展有限公司
View PDF2 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Existing application systems or business systems independently use their own identification and authentication systems, making interoperability difficult
User identification is combined with specific application services. Various authentication systems can only operate independently. Users must perform multiple different authentications when accessing different network resources. There is a lack of a global and unified user identification and authentication mechanism.
[0006] 2. Existing various identity authentication systems can only verify whether users have access to network resources, but cannot track various behaviors of users
Under the existing security mechanism, when a network security incident occurs, various tracking systems can only locate the source address that caused the incident and cannot quickly determine the corresponding responsible person

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified authentication method for simulation identity
  • Unified authentication method for simulation identity
  • Unified authentication method for simulation identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] figure 1 A schematic flow chart of the unified authentication method for simulated identity provided in this embodiment, as shown in figure 1 As shown, a unified authentication method for simulated identity, the method includes the following steps:

[0086] Step 1, unified processing of multi-source systems: transform the interfaces of application systems and / or business systems on multiple different platforms with unified functions to form a unified login authentication method;

[0087] Step 2, system integration: centrally manage all application systems and / or business systems after functional transformation, and provide a unified login platform for visiting users;

[0088] Step 3, unified authentication of user identity: the unified authentication platform conducts unified user authentication for all application systems and / or business systems.

[0089] Such as figure 2 A unified authentication method for simulating identity is shown, wherein, the specific steps ...

Embodiment 2

[0136] Figure 9 A schematic flow chart of the unified authentication method for simulated identity provided in this embodiment, as shown in Figure 9 As shown, a unified authentication method for simulated identity, the method includes the following steps:

[0137] Step 1, unified processing of multi-source systems: transform the interfaces of application systems and / or business systems on multiple different platforms with unified functions to form a unified login authentication method;

[0138] Step 2, system integration: centrally manage all application systems and / or business systems after functional transformation, and provide a unified login platform for visiting users;

[0139] Step 3, unified authentication of user identity: the unified authentication platform conducts unified user authentication for all application systems and / or business systems;

[0140] Step 4, multi-user system login processing: When multiple users log in to the system at the same time, the unif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a unified authentication method for a simulation identity, and belongs to the technical field of computer application. The unified authentication method is characterized by comprising the steps of 1, multi-source system unified processing, 2, system integration and 3, unified authentication for the user identity. The advantages are that the method in the embodiment of the invention adopts a corresponding means of identity authentication and a means of performing unified processing on systems with different architectures so as to enable a user to log in a plurality of related systems to perform business processing by only a single user name and a single password when the user logs in the associated systems. Unified management, authority setting and the like are performed on the user. The unified authentication method lays a foundation for construction of an information service system through standardized administration of an information-based means, the safeguard service ability is improved in continuous promotion for the information-based infrastructure construction, a platform support is provided for comprehensively promoting the information construction, and a foundation is laid for the timeliness and the integrity of information resources.

Description

technical field [0001] The present invention relates to the field of computer application technology, specifically a method that all users only need to log in to a unified website when logging in to related business systems, and only need to perform a single user name and password to log in to multiple related business systems Do business. A unified authentication method of simulated identity for unified management of user and authority management. Background technique [0002] The identity mark is a symbol for the user to indicate his identity to the network service provider, and identity authentication is used to verify the legitimacy and validity of the user's identity mark. Before users access network resources, they should first be identified by the identity authentication system. The identity authentication server determines whether the user can access a certain network resource according to the user's identity and authorization database. It can be said that the iden...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/0815
Inventor 李建平毛继国周安王贺朋李卓梁唐辉王力
Owner 星际空间(天津)科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products