Unlock instant, AI-driven research and patent intelligence for your innovation.

Unified identity authentication method based on cloud environment

A technology of identity authentication and cloud environment, applied in transmission systems, electrical components, etc., can solve problems such as business and data security risks, complex operation and maintenance management, and reduced confidentiality level, so as to increase the security access verification mechanism and simplify operation and maintenance management , Improve the effect of user experience

Inactive Publication Date: 2017-10-10
CHINA PETROLEUM ENG & CONSTR +1
View PDF10 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In reality, most enterprises deploy independent login accounts and passwords for each application system. Due to the continuous growth of the number of applications, more problems are caused: 1) Poor user experience: users must remember different application systems User names and passwords, and used when logging in to each business system, the login operation must be repeated; 2) Operation and maintenance management is complex: IT management departments need to manage multiple sets of user names and passwords for all business systems, which brings great 3) Serious security risks: users use simple passwords in order to remember login names and passwords easily, which reduces the confidentiality level and brings great hidden dangers to the business and data security of enterprises; 4) Inconsistency of information: the accounts between the various systems are not unified, forming the phenomenon of isolated islands of information
However, SSO only solves one-time login of application software in B / S mode, and multi-application authorization
In the cloud environment, there are still C / S mode and mobile mode application software, and the SSO solution does not solve the application of these modes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified identity authentication method based on cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] A unified identity authentication method based on the cloud environment. The unified identity authentication center provides two authentication login methods, "redirection login method" and "password verification login method", and "redirection login method" is used for B / S mode applications. "Password verification login method" is used for C / S mode and mobile mode applications.

[0027] Step 1. In order to ensure the security of identity authentication, each business system needs to register with the unified identity authentication center, and provide the basic information of the relevant business system (system name, callback address, verification method, etc.);

[0028] Step 2: After successful registration, the unified identity authentication center will return Client_ID (unique identifier) ​​and Client_Secret (key) information;

[0029] The third step is to judge according to the verification method of registration, whether it is "redirection login method" or "pass...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a unified identity authentication method based on a cloud environment. The unified identity authentication method is mainly implemented through a network application interface technology, the problem of unified identity authentication of existing application software in various modes can be solved, and identity authentication can be authorized, so that the security of identity authentication is guaranteed. A unified identity authentication center provides two authentication login modes, namely a redirection login mode and a password verification login mode; the redirection login mode is used for applications in a B / S mode, and the password verification login mode is used for applications in a C / S mode or a mobile mode. By means of the method, unified identity authentication of a cross-platform, such as a desktop computer, a notebook computer and a smart phone, is truly achieved, the user experience is improved, a user only needs to remember a set of user name and password to have access to various modes of application software deployed in the cloud environment; operation and maintenance management are easy, and only the same unified identity authentication center needs to be maintained; meanwhile, a user security access verification mechanism is added, so that the safety of user information and the safety of an application systems are improved.

Description

technical field [0001] The invention relates to a unified identity authentication method based on cloud environment. Background technique [0002] With the continuous development of current Internet technology, especially the emergence of cloud technology, cloud technology is a hosting technology that realizes data calculation, storage, processing and sharing. Moreover, the cloud environment can carry various forms of application software in the enterprise, including C / S mode, B / S mode, and mobile mode (Native, Hybrid, Web) application software. , smartphones and other terminal devices. [0003] In reality, most enterprises deploy independent login accounts and passwords for each application system. Due to the continuous growth of the number of applications, more problems are caused: 1) Poor user experience: users must remember different application systems User names and passwords, and used when logging in to each business system, the login operation must be repeated; 2) ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0815H04L63/083H04L67/10
Inventor 宫成王鸿捷郭成华汤晓勇胡耀义杨茂吴靖寰李巧傅贺平
Owner CHINA PETROLEUM ENG & CONSTR