Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verification method, device, computer equipment and storage medium for single sign-on

A computer equipment, single sign-on technology, applied in secure communication devices, digital transmission systems, digital data authentication, etc., can solve problems such as poor server stability

Active Publication Date: 2022-03-18
PING AN TECH (SHENZHEN) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a verification method, device, computer equipment and storage medium for single sign-on, aiming to solve the technical problems that the pirates easily steal the token and log in to the server, and the server is poorly stable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method, device, computer equipment and storage medium for single sign-on
  • Verification method, device, computer equipment and storage medium for single sign-on
  • Verification method, device, computer equipment and storage medium for single sign-on

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0052] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0053] The present invention takes the server as the execution subject, and the verification method of the above-mentioned single sign-on is applied to the server.

[0054] Reference attached figure 1 , is a schematic flow chart of the verification method for single sign-on proposed by the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a single sign-on verification method based on security monitoring, a device, a computer device and a storage medium. The method includes receiving a login request sent by the computer device; obtaining data information of the computer device; generating token information according to the data information, And obtain the first server data when token information is generated, the first server data includes the first time value required to generate token information, and the first cpu usage rate when token information is generated; encrypt token information to obtain encrypted token information; judge whether the first server data meets the first data requirements; if so, then use the encrypted token information as the key of the encrypted token information to store the token information in the cache storehouse; retrieve the token information from the cache storehouse by encrypting the token information, The corresponding login information can be found according to the token information, and the computer equipment can be logged in according to the login information, so as to solve the problems of easy theft of token and poor server stability.

Description

technical field [0001] The invention relates to the field of security monitoring, in particular to a verification method, device, computer equipment and storage medium for single sign-on. Background technique [0002] When the user operates the computer and enters the server through single sign-on, the server uses cookie (to identify the user's identity) to authenticate the login. [0003] The specific process of single sign-on is: the computer generates a unique token (word) and establishes an association relationship with the user's login information. Subsequent users log in to the server by operating the computer, the computer generates the token and searches the server for the login information corresponding to the token, and then the login information can be queried, and the server verifies the login information to realize the user's single sign-on. [0004] Disadvantages: 1. The token is easy to be stolen, and the server immediately searches for the corresponding logi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06F21/41
CPCH04L63/0815H04L63/0807G06F21/41
Inventor 张迪
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products