Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

School user system authentication method and system

An authentication method and user technology, applied in transmission systems, digital data authentication, data processing applications, etc., can solve problems such as inconvenient access to educational software for schools, difficulty in managing student accounts, and inability to share data

Active Publication Date: 2017-09-29
GREEN NET WORLD FUJIAN NETWORK TECH
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as the needs of schools increase, no single educational software vendor can address the needs of all schools
At the same time, when there are multiple companies customizing software for schools, each vendor will manage the school's teacher and student data, which poses a risk of third-party data leakage
In addition, after the school accesses the educational software of different manufacturers, it is not easy to manage the student account, which makes it inconvenient for the school to access the educational software
Furthermore, if multiple educational software manufacturers manage their own account systems, the data of each manufacturer cannot be shared, and the school cannot store all academic data in one database, nor can it easily analyze academic information through big data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • School user system authentication method and system
  • School user system authentication method and system
  • School user system authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0037] It should be noted that the execution subject of the method in this embodiment is a terminal, and the terminal may be a mobile phone, a tablet computer, a PDA, a notebook or a desktop computer, or other devices with similar functions. The embodiments are not limited.

[0038] Such as figure 1 Shown is a school user system authentication method of the present invention, including:

[0039] Step 101, establishing school organization relationship and educational software authorization key information;

[0040] Specifically, it can be realized by creating a table in the database. The school organization relationship includes but not limited to grade, class, teacher and student information, among which, teacher information includes but not ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a school user system authentication method and system. The method comprises the following steps: establishing school organization relationships and education software authorization secret key information; receiving a transmitted education software authorization secret key, and allocating an education software authorization code of a data authority owned by the secret key; receiving an organization relationship data acquisition request of an education software, and returning data of relevant organization relationships according to the education software authorization code carried by the request; if the education software authorization code has the authority to modify the organization relationships, automatically submitting a change request after the organization relationships change; receiving an authentication request for a user to log in to the education software, and verifying the authorization according to a user name, a password and the education software authorization code carried in the request; and recording authorization operation information that the user logs in to the education software. By adopting the system disclosed by the invention, education software providers can provide internet plus education related services for schools only by obtaining the education software authorization code and user authorization codes without maintaining a set of school organization relationship data.

Description

technical field [0001] The invention relates to the field of educational software authentication, in particular to a school user system authentication method and system. Background technique [0002] With the deepening of Internet + education, more and more companies customize software for schools, and each software comes with its own user system. However, as the needs of schools increase, no educational software vendor can address the needs of all schools. At the same time, when multiple companies customize software for schools, each vendor will manage the school's teacher and student data, which poses a risk of third-party data leakage. In addition, after the school accesses the educational software of different manufacturers, it is not easy to manage the student account, which makes it inconvenient for the school to access the educational software. Furthermore, if multiple educational software manufacturers manage their own account systems, the data of each manufacturer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/31G06Q10/06G06Q50/20
CPCG06F21/31G06Q10/06G06Q50/205H04L63/08
Inventor 张锡聪陈海疆
Owner GREEN NET WORLD FUJIAN NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products