Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An identity-enhanced authentication and authentication method and device

An authentication and identity technology, which is applied in the field of identity strengthening authentication and authentication methods and devices, can solve problems such as hidden dangers of information security, and achieve the effects of strong deployment compatibility, convenient security management, and improved security management efficiency

Active Publication Date: 2019-05-21
杭州恩牛网络技术有限公司
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a method and device for identity strengthening authentication and authentication to address the problem of potential information security risks in accessing enterprise business systems using the account and password login method in the prior art. By deploying a security gateway at the access entrance of the target website, The security authentication certificate is deployed on the PC client, and the security website verification certificate and certificate identity authority identification are adopted to realize the access authority control of the employee client identity to the target business system without changing the network structure and business system code of the enterprise , effectively make up for the lack of authentication and other security aspects of traditional login based on username / password, and effectively improve enterprise information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity-enhanced authentication and authentication method and device
  • An identity-enhanced authentication and authentication method and device
  • An identity-enhanced authentication and authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0058] It should be noted that the order of the steps in each embodiment of the present invention can be adjusted, and it is not necessary to perform the steps in the following order.

[0059] figure 1 It is a schematic flowchart of Embodiment 1 of an identity-enhanced authentication and authentication method in an embodiment of the present inven...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-enhanced authentication and authentication method and device, and the method comprises the steps: deploying a security gateway at an access entrance of a target website, and obtaining an access request of the target website through encrypted communication; Utilizing the security gateway to carry out identity information and authority verification on a requesterapplying for access; Recording the access request behavior, and formatting and outputting a behavior rule; Legality judgment is conducted on the content requested to be accessed, an alarm is given toillegal content, and access is terminated. A security gateway is deployed at an access entrance of a target website; a security authentication certificate is deployed on the PC client; A mode of verifying a certificate and a certificate identity permission identifier by using a security website is adopted; Under the condition that an enterprise does not change a network structure and a service system code, the access authority of the employee client side identity to the target service system is controlled, the defects of authentication and other safety aspects of traditional login based on a user name / password mode are effectively overcome, and the enterprise information safety is effectively improved.

Description

technical field [0001] The invention relates to the technical field of enterprise information security, in particular to a method and device for identity strengthening authentication and authentication. Background technique [0002] Traditional business systems based on account and password login authentication have great security risks. Due to weak passwords set by individual employees, unintentional loss of passwords, and hacker attacks, the data of the target business system may face potential security risks. On the other hand, ordinary password-based login systems have no effective auditing methods, and employee behavior operations have great risks in the operation of such systems, and if business systems are directly exposed to the Internet, there is also a great risk of hacker attacks. Contents of the invention [0003] The purpose of the present invention is to provide a method and device for identity strengthening authentication and authentication to address the pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 黄瀚
Owner 杭州恩牛网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products