Password-less login realization method based on enterprise-level intranet and extranet environment

An implementation method, the technology of internal and external networks, applied in the field of convenient login of LAN users, can solve problems such as doubtful security, unfavorable promotion and access, cumbersome memory of account passwords, etc., and achieve good scalability effect

Inactive Publication Date: 2018-02-23
SICHUAN ZHONGDIAN AOSTAR INFORMATION TECHNOLOGIES CO LTD
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to provide a passwordless login implementation method based on the enterprise-level internal and external network environment, which is used to solve the existing problem of cumbersome account and password memory in the combination of user name and password, the login process requires manual input, and is easy to be hacked. Interception or hijacking, doubtful security, at the same time, it is not conducive to promotion and access issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password-less login realization method based on enterprise-level intranet and extranet environment
  • Password-less login realization method based on enterprise-level intranet and extranet environment
  • Password-less login realization method based on enterprise-level intranet and extranet environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] At first, before explaining the solution method that the present invention adopts, the terms or concepts involved in the present invention are explained as follows:

[0054] Secretless login: Secretless login refers to a login method that is different from the traditional login method and based on a specific application scenario. It does not need to use an account password to complete login authentication. It does not specifically refer to a certain login implementation. .

[0055] Two-dimensional code: Two-dimensional code is also called QR Code, and the full name of QR is Quick Response. It is a very popular coding method on mobile devices in recent years. It can store more information than the traditional Bar Code More data types: such as: characters, numbers, Japanese, Chinese, etc.

[0056] SSO: Single Sign-on single sign-on.

[0057] SSL: (Secure Sockets Layer) protocol, and its successor TLS (TransportLayer Security) protocol, is a security protocol that provid...

Embodiment 2

[0085] combined with figure 2 As shown, a passwordless login implementation method based on an enterprise-level internal and external network environment is to use a mobile electronic device with the function of scanning a two-dimensional code to scan the two-dimensional code to obtain the data information of the specified enterprise intranet, including as Communication mobile electronic devices with code-scanning functions that are convenient for users to access on the mobile terminal, information extranet and information intranet for wireless communication with the electronic devices:

[0086]The information extranet includes a secure interactive platform communicating with electronic devices including https, and an extranet identity authority authentication module for exchanging data with the secure interactive platform; and

[0087] The information intranet includes a database for storing user information, and an intranet identity authentication authority service module f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a password-less login realization method based on enterprise-level intranet and extranet environment. The method specifically comprises the following steps: step S100, scanningQR code through an APP by using any communication electronic equipment with code-scanning function; step S200, logging in the QR code and acquiring the information in the QR code, sending the information to a mobile interaction platform of the enterprise through a national encryption algorithm SM4 data encryption way; step S300, judging whether the QR code scanned in the step S100 is the directlylinked intranet authentication service or extranet authentication service, and then performing the routing strategy matching; step S310, requesting an extranet permission platform to perform the authentication if the QR code is the extranet authentication service; and accessing an intranet database through an isolating device SQL penetrating way if the QR code is the intranet authentication service; and accomplishing the authentication service. By using the QR code identification login, a problem that the intranet login of the traditional enterprise performs the authentication by inputting the account and password is avoided, the security is improved, and meanwhile, the non-technical measure leakages of request interception, hijacking and like are avoided.

Description

technical field [0001] The present invention relates to the field of convenient login methods for local area network users, in particular to the field of passwordless login methods for enterprise-level intranets or local area network applications. Background technique [0002] With the development of national informatization construction and the Internet, the information system construction of large Chinese enterprises has also begun to learn useful experience from the Internet. Most sites require users to log in to browse. For users, each site has to remember an account password, which is very troublesome; although the 4A or IAM system in the enterprise has been used as a unified authentication comprehensive solution for domestic enterprises, it has solved the problem of enterprise authentication. The problem of multiple systems and multiple accounts on the intranet has achieved unified identity authentication and authorization, but users still need to use account passwords...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/0815H04L63/0823H04L63/0861H04L63/10H04L67/02H04L69/162
Inventor 杨德胜彭永勇张晓韬张捷郭晶曾强何林王先兵
Owner SICHUAN ZHONGDIAN AOSTAR INFORMATION TECHNOLOGIES CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products