Cookie-based secure single sign-on method and unified authentication service system thereof
An authentication service and single sign-on technology, which is applied in the computer field, can solve problems such as increased difficulty of system integration, different ways of site connection, low security, stability and usability, to facilitate system integration, improve security, and stability sex high effect
Active Publication Date: 2018-09-28
SICHUAN CHANGHONG ELECTRIC CO LTD
8 Cites 31 Cited by
AI-Extracted Technical Summary
Problems solved by technology
View more
Abstract
The invention discloses a Cookie single sign-on method, which comprises the following steps: a user sends a login request to a service server through a client browser; the service server is redirectedto a unified authentication service system according to the login request, and the unified authentication service system judges whether the service server carries a request certificate correspondingto the login request; the unified authentication service system writes the user credential into the Cookie and simultaneously splices the user credential to a redirected address; and the user credential is redirected to a user request page through the service server to execute the login request. The invention also discloses a unified authentication service system of the Cookie-based single sign-on, comprising a parameter analyzing module, an account checking module, a Cookie authentication module, a user credential generating module and a return module. The Cookie single sign-on method and theunified authentication service system in the invention realize the single sign-on core function, effectively solve the problems of cross-domain, distributed deployment, style distinction of application sites and the like, and improve the security of user authentication.
Application Domain
Transmission
Technology Topic
Service systemUser authentication +4
Image
Examples
- Experimental program(1)
Example Embodiment
PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
Similar technology patents
Foodstuff monitoring method and device
Owner:XIAOMI INC
Method, device and system for carrying out service access control on third-party application
Owner:ALIBABA GRP HLDG LTD
Multifunctional carry-on power supply
Owner:NANKAI UNIV
Cloud data security protection method
Owner:INSPUR GROUP CO LTD
Classification and recommendation of technical efficacy words
- less invasive
- improve security
Handheld volumetric ultrasound scanning device
ActiveUS20090024039A1less invasiveless risk
Owner:U SYST
Surgical instrument holder
InactiveUS7294104B2great versatilityless invasive
Owner:TYCO HEALTHCARE GRP LP
Intelligent equipment management method and system
InactiveCN108270733Asimple functionless invasive
Owner:SUNING COM CO LTD