Unlock instant, AI-driven research and patent intelligence for your innovation.

A single sign-on method based on iki logo authentication

A single sign-on and identification authentication technology, applied in the field of information security, can solve the problems of key information signature, information easy to be stolen, important information leakage, etc., and achieve the effect of improving security

Active Publication Date: 2020-05-19
鄂尔多斯市迪曼森密码科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing products still have some deficiencies in the security of single sign-on. During the communication process between servers, most schemes transmit sensitive information in clear text, which is easy to be stolen, resulting in the leakage of important information
In addition, most schemes do not sign the key information during the communication process, which is vulnerable to masquerading attacks
[0005] For the problems in related technologies, no effective solutions have been proposed yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A single sign-on method based on iki logo authentication
  • A single sign-on method based on iki logo authentication
  • A single sign-on method based on iki logo authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0038] Such as Figure 5 As shown, a single sign-on method based on IKI identification authentication according to an embodiment of the present invention includes the following steps:

[0039] S1 The client sends an access request to the server, generates a random number r, and sends it to the server together with the client ID;

[0040] S2 The server verifies the client ID. After passing the verification, the server generates a random number R and combines it with the client random number r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a single sign on method based on IKI identifier authentication. The single sign on method comprises the following steps that an access request is transmitted, and a random number r is generated to be transmitted to a server side together with the identifier; the identifier is verified, a random number R is generated after passing of verification and combined with r (R||r), signing with a private key is performed and signature data Sig1 are generated; R, the identifier and Sig1 are transmitted; the identifier is verified, Sig1 are verified and the identity validity is confirmed after passing of verification; signing (R||r) with the private key, signature data Sig2 are generated and Sig2 are transmitted to the server side; Sig2 are verified, the identity validity is confirmed after passing of verification, a single sign on mapping table is checked, the bound account number of the identifier is found and a user token is generated to direct to an application system; and the user token is received, the sign on account number of the user is obtained, the state of the user is set as sign on and accessing is completed by returning to the page of the access request. The beneficial effects of the single sign on method based on IKI identifier authentication are that the security of the single sign on system can be enhanced and the high-intensity identity authentication method is given.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a single sign-on method. Background technique [0002] With the rapid development of information technology and network technology, there are more and more application systems in enterprises. Such as human resource management system, financial system, OA system, customer relationship management system, etc. Because these systems are independent of each other, users must log in according to the corresponding system identity before using each application system. Therefore, users must remember the user name and password of each system, which brings a lot of trouble to users. Especially with the increase of the system, the possibility of error will increase, the possibility of illegal interception and destruction will also increase, and the security will decrease accordingly. Aiming at this situation, the concept of single sign-on came into being, and has been ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3249H04L9/3273H04L63/0807H04L63/0815H04L63/0869
Inventor 李庄欧阳震诤杨艳
Owner 鄂尔多斯市迪曼森密码科技有限公司