Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing single sign-on assets based on two-dimensional code identity authentication

A technology of identity authentication and single sign-on, applied in electrical components, transmission systems, etc., can solve problems such as security risks, asset account, password management, etc., and achieve the effect of ensuring asset security

Active Publication Date: 2019-04-05
THE FIRST RES INST OF MIN OF PUBLIC SECURITY
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The second granularity: the 4A platform can take over the assets in the enterprise, but does not manage the asset account and password, and requires the user to manually enter the asset account and password when logging in;
[0007] For the first type of takeover granularity, the user does not need to enter any asset account number or password, and can directly log in to the asset with one click, which brings certain security risks while being convenient to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing single sign-on assets based on two-dimensional code identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that this embodiment is based on the technical solution and provides detailed implementation and specific operation procedures, but the scope of protection of the present invention is not limited to this Examples.

[0021] This embodiment provides a method for realizing single sign-on assets based on a QR code identity authentication method, such as figure 1 As shown, including the following steps:

[0022] S1. Ordinary users select assets within the scope of authority on the login portal of the web terminal 4A, and click to log in;

[0023] S2, 4A The background determines whether the login account and asset password of the asset selected in step S1 have been taken over by 4A; if it has been taken over, the user is prohibited from directly logging in to the asset, and the background database queries the user and the asset to be logged in. Information, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing single sign-on assets based on two-dimensional code identity authentication, which includes the following steps: an ordinary user selects an asset withinthe permission scope at the login portal of a WEB 4A, and clicks on the login; a 4A background judges whether the login account and asset password of the asset have been taken over by 4A, a login two-dimensional code is generated if the login account and asset password of the asset have been taken over by 4A, otherwise, the user logs in by inputting an account and a password; a background database queries the login status of the login user on a palm 4A, a message is directly sent to the palm 4A of the user if the user has logged in, otherwise, the user is reminded to log into the palm 4A; theuser logs into the palm 4A and scans a two-dimensional code; and the palm 4A sends a confirmation message to the Web 4A, and the Web 4A logs into the asset after receiving the confirmation message. Thorough security verification can be conducted for the situation in which the accounts and passwords of assets are completely taken over by a 4A platform. By transforming the asset information into atwo-dimensional code form, second authentication of user identity can be realized by code scanning authentication with the aid of a palm 4A. The security of assets and the legitimacy of personnel identity are ensured.

Description

Technical field [0001] The invention relates to the technical field of computer network information security, in particular to a method for realizing single sign-on assets based on a two-dimensional code identity authentication method. Background technique [0002] The 4A platform is divided into a management portal and a login portal. The management portal is mainly for the administrators of the 4A platform, including account administrators, authorized administrators, audit administrators, and business administrators. These administrators mainly use the 4A management portal to manage people, things, and things in the enterprise, such as the life cycle management of user accounts, assets, user operation authorization management, that is, which assets users can access, audits after users access assets, User login platform authentication mode configuration, etc. The login portal is mainly for ordinary users. After the administrator completes the configuration and management of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/18
Inventor 范殿梁徐常星邢更力胡志昂赵添刁逢博
Owner THE FIRST RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products