Authentication method and device

An authentication method and authentication device technology, applied in the field of information security, can solve problems such as limited protocols, exposure of mail services, and poor user experience, and achieve the effects of preventing brute force cracking, reducing security risks, and improving user experience.

Active Publication Date: 2017-11-24
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the closed nature of Microsoft's commercial products, it is difficult for the client software Outlook to integrate with the single sign-on service and the two-stage authentication service based on Microsoft's OWA mail server, and it is difficult for Outlook to access the SSO service; this has the following problems: a) The user needs to enter the account number and password every time they log in to the system, and the user experience is poor; b) The mail service is exposed to the external network environment. When hackers understand the system login protocol, they will use brute force to scan the company's internal accounts for weak passwords , leading to intranet security vulnerabilities
Although Microsoft has also launched the Microsoft commercial single sign-on solution, the protocol supported by the Microsoft commercial single sign-on solution is limited and cannot meet the complex internal information requirements of the enterprise. For example, the Microsoft commercial single sign-on solution may not support the two-stage authentication required by users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device
  • Authentication method and device
  • Authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0052] Enterprise-level SSO is one of the commonly used business integration solutions for enterprises. Users want to connect Outlook to SSO services. However, due to the closed nature of Microsoft's commercial products, it is difficult for Outlook to access SSO services based on Microsoft's OWA mail server. This has the following problems: Problems: a) The user needs to enter the accoun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method and a device. The method comprises the following steps: intercepting a first authentication request sent to an account authentication server by a business application server, wherein the first authentication request comprises an account and the authentication information; acquiring the target authentication information corresponding to the account from the third-party server; and responding to the first authentication request according to the authentication information and the target authentication information. The technical scheme disclosed by the invention can realize the account authentication based on the third party, and the risk of password leakage is lowered.

Description

technical field [0001] The present disclosure relates to the technical field of information security, in particular to an authentication method and device. Background technique [0002] Single sign-on (SSO, Single Sign On) means that in an environment where multiple application systems coexist, users only need to log in once to access all mutually trusted application systems. The fields involved in SSO can be roughly divided into three types: SSO between social websites, departmental SSO, and enterprise-level SSO. Among them, SSO between social websites mainly involves the openness of account information, and whether it can be successfully implemented mainly depends on various Whether website account management follows the same standard protocol; department-level SSO is relatively simple, and is suitable for scenarios involving few systems, which can be implemented by technicians through programming; enterprise-level SSO involves many systems, including client / server (C / S) ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L63/0281H04L63/0815H04L63/083
Inventor 徐会生王树圆赵铁壮汪仲伟邱钺浮强
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products