Smart password key authentication based cross-platform heterogeneous system login method

An intelligent password key and heterogeneous system technology, applied in the field of cross-platform heterogeneous system login based on intelligent password key authentication, can solve the problem of inconsistent user identity information content and data format, lack of integrity of data security, easy forgetting of passwords or leaks etc.

Inactive Publication Date: 2017-12-22
SHANDONG INSPUR GENESOFT INFORMATION TECH CO LTD
View PDF3 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. Enterprise employees have to memorize a large number of account passwords during the access process of the application system, and the passwords are easily forgotten or leaked, which brings losses to the enterprise
[0005] 2. There are more and more ways to obtain enterprise information, but there is a lack of a platform for comprehensive display of this information
[0006] 3. The user identity information content and data format of each application system are not uniform, there is no unified user identity information, information sharing cannot be carried out, and interconnection cannot be realized
[0007] 4. Data security lacks integrity, cannot ensure that the file is the real original, whether it has been tampered with unintentionally or maliciously, whether it is consistent with the original data in terms of content and length, lacks the authenticity and non-repudiation of the data source, and sends After Fang sent the document, he could deny that he had sent the document, but he could not confirm the source of the document. It was indeed the sender himself, and it was not forged by others.
[0008] 5. However, with the increasing openness of closed systems, more and more information security issues are also emerging

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Smart password key authentication based cross-platform heterogeneous system login method
  • Smart password key authentication based cross-platform heterogeneous system login method
  • Smart password key authentication based cross-platform heterogeneous system login method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] Such as figure 1 As shown, the method is based on a unified authentication service platform of smart cryptographic keys, with the goal of business system integration, based on smart cryptographic key authentication and PKI technology, and through unified authentication and access control of user identities, various Single sign-on of business systems and integration of information resources, the specific contents include:

[0060] 1. User Management

[0061] Including user information management, user smart password key information, authorized application system, etc. When users access the platform and various application systems, they all use the same credentials (that is, including the user certificate and its hardware protection password PIN), and use digital signature technology to perform identity authentication on the platform to prove the authenticity of their identity;

[0062] 1. User registration

[0063] 1) The user completes the user registration on the plat...

Embodiment 2

[0124] The method calls the verification service deployed by the unified authentication service platform (CACS) through any one of the following two verification methods, realizes security authentication, and can directly jump to the service platform of the business system:

[0125] 1. The first verification method (POST)

[0126] 1. NET platform implementation

[0127]1) It is necessary to add the Process smart password key SysInfoPage.aspx file and the corresponding Process smart password key SysInfoPage.aspx.cs file to the solution of the business system. In the function, add the processing that your application system needs to do after legal login, and jump to the main interface.

[0128] 2) Refer to excerpts of web.config use cases:

[0129]

[0130]

[0131] 2. JAVA platform implementation

[0132] 1) Add the Process smart password key SysInfoPage.jsp page in the business system, and add the following JAR package references in the LIB folder:

[0133] axis.jar;...

Embodiment 3

[0143] Deployment instructions for the unified authentication service platform:

[0144] 1. Put the CACS folder of the unified authentication service platform and the .CS file inside into the App_Code folder;

[0145] 2. Put the CACS website folder under the WEBPAGE / EXTERNAL folder;

[0146] 3. Modify the Web.Config file

[0147] 1) Add under the configuration section under the configuration section

[0148] 2) Under the configuration section Add two lines under the configuration section:

[0149]

[0150]

[0151] 4. Add the isneedCA(bool) field in the user table

[0152] The user uses a browser to open the login interface, and the login address is http: / / [IP address] / WebPage / External / CACS / Login.aspx

[0153] Enter the user name and password to log in. After successful login, the system will open the CACS main interface.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a smart password key authentication based cross-platform heterogeneous system login method. The method is to provide a uniform authentication service platform for a multi-service system user by utilizing a smart password key, a digital signature and a digital certificate authentication mechanism based on a PKI theoretical system and to perform uniform authentication of the user identity and access control through integrating service systems and content, thereby realizing single-point login and integration of information resources of each service system. An enterprise employee, as long as remembering a command, can log in multiple heterogeneous systems in the access process of an application system; uniform user identity information is provided, so information sharing can be carried out even the user identity information content and data format of each application system are non-uniform, and interconnection and mutual communication are realized; after the smart password key authentication is encrypted, the data transmitted by the user are guaranteed to be the original text without being tampered maliciously; and the identity of the user can be confirmed.

Description

technical field [0001] The invention relates to the technical field of system security, in particular to a cross-platform heterogeneous system login method based on intelligent password key authentication. Background technique [0002] In the current information age, people have higher and higher requirements for the authenticity, accuracy, and timeliness of information, and put forward higher requirements for the way to obtain information. With the development of computer information technology, people can obtain information more conveniently and quickly. People usually obtain information through computer systems, which puts forward higher requirements for computer information systems, not only authenticity, accuracy and timeliness, but also higher and higher requirements for security. [0003] Within the enterprise, the rapid development of computer network and information technology has continuously improved the degree of enterprise informatization. In the process of ente...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0825H04L9/3226H04L9/3247H04L9/3263H04L9/3297H04L63/0815H04L63/0823H04L63/083
Inventor 王健尹飞
Owner SHANDONG INSPUR GENESOFT INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products