Single sign-on method, server and client
A single sign-on, server-side technology, applied in the field of communication, can solve problems such as not using national secret algorithms, achieve the effect of improving user experience and protecting data security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0050] Example one
[0051] This embodiment provides a processing flow of a single sign-on method such as figure 1 As shown, in this embodiment, the server receives the application request initiated by the client, establishes a two-way connection, and extracts the user identity; according to the user identity, it searches the database for the user list of the single sign-on information that has been bound Whether there is a login application resource requested by the user in it;
[0052] The processing steps are as follows:
[0053] Step 11. Determine that the application resource requested to log in by the user of the client received by the server is in the list of bound single sign-on information recorded in the database;
[0054] Step 12. Using the first secret key, the SM4 algorithm is used to encrypt the user's single sign-on information to form the first ciphertext;
[0055] Specifically, in this embodiment, a random number is used to generate a 32-bit symmetric key as the first...
Example Embodiment
[0063] Example two
[0064] This embodiment provides a processing flow of a single sign-on method such as figure 2 As shown, in this embodiment, the client-side processing steps are as follows:
[0065] Step 21: Receive the application resources and the single sign-on ciphertext sent by the server; specifically, in this embodiment, the application resources and the single sign-on ciphertext sent by the server are received to form the login homepage;
[0066] Step 22: Using the Browser Helper Object (BHO), the control uses the private key of the user certificate to decrypt the single sign-on ciphertext, obtain the single sign-on information, and cache it;
[0067] In this embodiment, the BHO control is used to decrypt the single sign-on ciphertext using the private key of the user certificate, obtain the single sign-on information, and cache it according to the agreed format; click to log in to the homepage application resource;
[0068] Step 23: The BHO control matches the cached sing...
Example Embodiment
[0073] Example three
[0074] This embodiment provides a single sign-on server 30, and its specific implementation structure is as follows image 3 As shown, it can specifically include the following modules:
[0075] Determining module 31: it is used to determine that the application resource requested to log in by the user of the client, received by the server, exists in the list of bound single sign-on information recorded in the database;
[0076] The first ciphertext module 32: it is used to use the first secret key to encrypt the user's single sign-on information using the SM4 algorithm to form the first ciphertext;
[0077] The second ciphertext module 33: it is used to encrypt the first secret key and then use the second secret key to form a second ciphertext;
[0078] The splicing module 34: it is used to splice the first ciphertext and the second ciphertext, and use the SM3 algorithm to process the spliced ciphertext to form a single sign-on ciphertext;
[0079] Sending modu...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap