A method for realizing single sign-on assets based on two-dimensional code identity authentication

An identity authentication and single sign-on technology, applied in transmission systems, electrical components, etc., can solve security risks, asset account, password management and other issues, and achieve the effect of ensuring asset security

Active Publication Date: 2021-07-02
THE FIRST RES INST OF MIN OF PUBLIC SECURITY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The second granularity: the 4A platform can take over the assets in the enterprise, but does not manage the asset account and password, and requires the user to manually enter the asset account and password when logging in;
[0007] For the first type of takeover granularity, the user does not need to enter any asset account number or password, and can directly log in to the asset with one click, which brings certain security risks while being convenient to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for realizing single sign-on assets based on two-dimensional code identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The present invention will be further described below in conjunction with the accompanying drawings. It should be noted that this embodiment is based on the technical solution, and provides detailed implementation and specific operation process, but the protection scope of the present invention is not limited to the present invention. Example.

[0021] This embodiment provides a method for realizing single sign-on assets based on the two-dimensional code identity authentication method, such as figure 1 shown, including the following steps:

[0022] S1. Ordinary users select assets within the scope of authority on the login portal of 4A on the web, and click Login;

[0023] S2, 4A background judges whether the login account and asset password of the asset selected in step S1 have been taken over by 4A; if it has been taken over, the user is prohibited from directly logging in to the asset, and the background database queries the user and the asset to be logged in infor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for realizing a single sign-on asset based on a two-dimensional code identity authentication method, which includes the following steps: an ordinary user selects an asset within the scope of authority at the login portal of the 4A on the Web terminal, and clicks to log in; the 4A background judges the asset login Whether the account number and asset password have been taken over by 4A, if it has been taken over, a login QR code will be generated, otherwise the user will enter the account password to log in; the background database will query the login status of the logged-in user in the 4A on the palm, and if it has been logged in, it will directly send a message to the user's palm 4A, otherwise the user is prompted to log in to the handheld 4A; the user logs in to the handheld 4A and scans the QR code; the handheld 4A sends a confirmation message to the web terminal 4A, and the web terminal 4A logs in the asset after receiving it. The present invention can conduct in-depth security verification for the situation where the 4A platform assets completely take over the account password. By converting the asset information into the form of a two-dimensional code, the user can realize the secondary authentication of the user's identity by means of the palm 4A code scanning authentication, ensuring the assets Security, personnel identity legality.

Description

technical field [0001] The invention relates to the technical field of computer network information security, in particular to a method for realizing single sign-on assets based on a two-dimensional code identity authentication method. Background technique [0002] The 4A platform is divided into a management portal and a login portal. The management portal is mainly for administrators of the 4A platform, including account administrators, authorized administrators, audit administrators, and business administrators. These administrators mainly manage people, things, and things in the enterprise through the 4A management portal, such as user accounts, asset life cycle management, user operation authorization management, which assets users can access, audit after users access assets, User login platform authentication configuration, etc. The login portal is mainly for ordinary users. After the administrator completes the configuration and management of the management portal, o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/18
Inventor 范殿梁徐常星邢更力胡志昂赵添刁逢博
Owner THE FIRST RES INST OF MIN OF PUBLIC SECURITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products