Unified identity authentication method based on cloud environment
A technology of identity authentication and cloud environment, applied in transmission systems, electrical components, etc., can solve problems such as business and data security risks, complex operation and maintenance management, and reduced confidentiality level, so as to increase the security access verification mechanism and simplify operation and maintenance management , Improve the effect of user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] A unified identity authentication method based on the cloud environment. The unified identity authentication center provides two authentication login methods, "redirection login method" and "password verification login method", and "redirection login method" is used for B / S mode applications. "Password verification login method" is used for C / S mode and mobile mode applications.
[0027] Step 1. In order to ensure the security of identity authentication, each business system needs to register with the unified identity authentication center, and provide the basic information of the relevant business system (system name, callback address, verification method, etc.);
[0028] Step 2: After successful registration, the unified identity authentication center will return Client_ID (unique identifier) and Client_Secret (key) information;
[0029] The third step is to judge according to the verification method of registration, whether it is "redirection login method" or "pass...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
