Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Single sign-on tamper-proofing method and device, computer equipment and storage medium

A single sign-on, anti-tampering technology, applied in the field of computer security, can solve problems such as misjudging login information

Active Publication Date: 2019-09-20
PING AN TECH (SHENZHEN) CO LTD
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Therefore, there is a problem. SESSION (session control) refers to the time elapsed from the user terminal registering into the system to logging out of the system. If necessary, there is a certain operating space; Login time, the system will look for the label corresponding to the user ID in the CAS.JAR package according to the user ID. After verifying that the login time matches the time associated with the label, the CAS.JAR package may be misjudged during the login process. The login information allows illegal users to bypass the login process of entering account numbers and passwords through the single sign-on method of CAS, so there are hidden dangers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Single sign-on tamper-proofing method and device, computer equipment and storage medium
  • Single sign-on tamper-proofing method and device, computer equipment and storage medium
  • Single sign-on tamper-proofing method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0043] The dynamic early-warning method provided by the present invention is executed by the server, and the explanation of this scheme is combined with the server to make a specific explanation.

[0044] Reference attached figure 1 , is a schematic flow chart of the single sign-on tamper-pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a single sign-on tamper-proofing method and device, computer equipment and a storage medium. The method comprises the following steps: obtaining first login information of a user logging in a server, associating the first login information with a first tag, generating a private key and a public key which are bound with each other, packaging and encrypting the first tag in the public key, and storing the public key in a session library of the server, thereby realizing the encryption of the tag, and preventing an illegal person from inputting the tag into the session library and directly entering the server; sending the private key to a pre-associated terminal device; obtaining a to-be-verified private key input by the user through the terminal equipment; judging whether the to-be-verified private key is the same as a private key or not, if yes, searching whether a public key corresponding to the private key exists in a session library, if yes, decrypting the public key by the private key to obtain a first label, and obtaining first login information corresponding to the first label to log in a server again through the first login information, thereby realizing single sign-on of a user.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a single sign-on anti-tampering method, device, computer equipment and storage medium. Background technique [0002] CAS (Central Authentication Service, Central Authentication Service). At present, the login of the business system realizes single sign-on through CAS authentication. The login process is as follows: the central system provides a unified CAS.JAR package for login, and access During the process of the target address, the CAS.JAR package will intercept the access of the user terminal by default. When the user completes the account password login, it will allow access to the target address. After the login is completed, the user’s login information is recorded by the CAS.JAR package and stored as a label. To the session, and the next time the user does not need to enter the account password, the login information includes the user ID, login time and login password. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/06H04L63/0815H04L63/20
Inventor 祝伟
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products