Unlock instant, AI-driven research and patent intelligence for your innovation.

Internet identity authentication management method

An identity authentication and management method technology, applied in the field of Internet identity authentication management, can solve the problems of password authentication, such as security, users forgetting passwords, brute force cracking, etc., to ensure security, facilitate access control, and simplify operations.

Inactive Publication Date: 2020-04-14
UNICLOUD (NANJING) DIGITAL TECH CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The existing identity authentication has the following defects: 1. Password authentication has security risks, users may forget their passwords, and be stolen by others during network transmission and cracked violently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] This solution uses Kong for identity authentication, authority control, and request forwarding, combined with SpringBoot framework, Redis cache, and mysql database to design and implement a microservice system.

[0023] Password authentication method:

[0024] When a user accesses and logs in to the system, the request will first be sent to the gateway. The gateway performs different processing according to different requests of users. The gateway is set with a black and white list for different interception and release processing. When it is identified as a login operation, the request is forwarded; the authentication service first judges whether secondary authentication is required based on the user's needs, and if necessary, verifies the mobile phone verification code. The identity consistency of the information entered by the user and the user information of the user service is judged. When the authentication is passed, the token (token)-userInfo is stored on Redi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an Internet identity authentication management method, and the scheme mainly integrates identity authentication, authority control, Redis cache and a gateway plug-in for application. According to the scheme, the identity authentication is realized, and the security of user information is guaranteed mainly through two modes of password encryption and secondary authentication;through the validity period, the scene classification and the aksk of the permission size, the data permission access range is ensured when different crowds call, and the data security and the influence range during leakage are ensured to the maximum extent.

Description

technical field [0001] The invention relates to the technical field of Internet user identity authentication methods. Background technique [0002] With the popularization of the Internet, there are more and more online systems in various fields. The scale of Internet users continues to grow. In a complex environment, effective and rapid management of system users, effective identity authentication, and protection of user security are the primary issues to be solved by all systems. How to manage multi-platform users in a unified way, support users to authenticate in multiple ways, and bring users a convenient and safe online experience is the focus of every enterprise. In the cloud environment, there may be cross-domain problems in service access, and the identity authentication method of each service may be different. If it is not managed uniformly, there may be incompatibility. An identity federation is proposed. After single sign-on, the trust domain Data access is a pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L9/3228H04L63/0815H04L63/083H04L63/10H04L63/12H04L63/1466
Inventor 张旭
Owner UNICLOUD (NANJING) DIGITAL TECH CO LTD