Identity authorization login method and device, electronic equipment and storage medium

A login method and identity technology, applied in the field of network security, can solve the problems of unguaranteed security, hidden dangers of user security information, and low degree of trust, and achieve the effect of ensuring non-tampering and authenticity and improving trustworthiness.

Active Publication Date: 2020-06-30
登录(北京)科技有限公司
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method brings great hidden dangers to user security information
In addition, the third-party central proxy platform is responsible for the interaction o

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authorization login method and device, electronic equipment and storage medium
  • Identity authorization login method and device, electronic equipment and storage medium
  • Identity authorization login method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0044] In order to facilitate the understanding of the identity authorization login method provided by this application, the system used by it is introduced below. see figure 1 , which shows an architecture diagram of an identity authorization login system provided by an embodiment of the present application, as shown in figure 1As shown, including clients, password managers, blockchain networks, application or website server nodes, application or website servers, and distributed databases...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authorization login method and device, electronic equipment and a computer readable storage medium. The method comprises the steps of obtaining a random character string and an identifier of an application or a website from a server of the application or the website, generating a public key and a private key, and obtaining account information used for logging inthe application or the website from a password manager based on the identifier; generating a login request transaction through the password manager and broadcasting the login request transaction to ablockchain network, so that a blockchain node corresponding to the application or website in the blockchain network sends the login request transaction to the server for verification, wherein the login request transaction comprises the random character string, the identifier, the public key and the account information; and login permission information is received through the blockchain network, and the server is accessed by using a login token in the login permission information. According to the identity authorization login method provided by the invention, the security of identity authorization login is improved.

Description

technical field [0001] The present application relates to the technical field of network security, and more specifically, to an identity authorization login method and device, an electronic device, and a computer-readable storage medium. Background technique [0002] With the rapid development of the Internet, the number of information applications or websites also increases rapidly. In order to solve the difficult problem of user network identity management, various network identity management methods have emerged. Current network identity management storage methods include text recording tools, but files are easily lost; browsers automatically save passwords, making it difficult to migrate identity information between different browsers; online user network identity management tools are facing attacks from cloud servers Dangerous; hardware password managers are cumbersome to operate; software password managers are safer and easier to operate than the above network identit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L63/083H04L63/0838H04L63/0846
Inventor 刘文印麦超
Owner 登录(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products