Unified identity authentication interface and method based on Token

An identity authentication and interface technology, applied in the Internet field, can solve problems such as heavy load on the server side and inability to meet the requirements of multiple platforms

Inactive Publication Date: 2020-07-03
BEIJING UNIV OF TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The use of Cookie and Session session mode authentication cannot meet the requirements of mul

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unified identity authentication interface and method based on Token
  • Unified identity authentication interface and method based on Token
  • Unified identity authentication interface and method based on Token

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] This embodiment takes the multi-platform landing of the carrier-based aircraft pilot training support system as an application scenario, but is not limited thereto. The system structure diagram of the security system is roughly as follows figure 1 As shown, it contains multiple cross-platform systems, covering multiple web application systems and Android tablet APP. Because multiple system databases are not related to each other but the user group is fixed, unified identity authentication is required. The so-called identity authentication is the process of judging whether a user is a legitimate user.

[0026] Token-based identity authentication, obviously how to design Token (token) is the most important link in the entire identity authentication system, and the specific token composition includes multiple parts:

[0027] The first part is the pilot number (user name), login client type, and pilot type (user category). These user basic information are stored in JSON ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a Token-based unified identity authentication interface and a Token-based unified identity authentication method, which are used for solving the problem of identity authentication of a plurality of client unified interfaces. The method is based on three interfaces: an authentication service interface, which requests the interface to perform preliminary information query when a client is opened each time, and switches to different interfaces for operation according to an inspection condition; the Token generation interface is used for generating a token; and the Token verification interface is used for information verification of the token. According to the invention, login interfaces of multiple types of clients are unified, repeated authentication of a user withina certain period is ensured, and respective identity authentication validity periods of different types of clients can be self-defined. A large amount of user name, password and other information donot need to be stored at a client or a server. The problem of information storage of related sensitive users is solved, the problem of excessive occupation of memory resources of the server side due to Session authentication is also solved, and the server side does not need to consider whether the user logs in or not.

Description

technical field [0001] The invention belongs to the field of the Internet, and in particular relates to a multi-platform and multi-system unified login authentication method. Background technique [0002] Most of the current Internet applications are based on the stateless HTTP protocol. Every time a user sends a request, after the session connection data exchange is completed, the connection between the client and the server is closed. When the user sends a request again, a new one needs to be re-established. The session connection cannot store the logged-in user information. Most enterprises authenticate logged-in users by verifying individual user names and passwords to prevent illegal intruders from entering the system to ensure system security. This results in users needing to fill in the username and password again for verification every time they log in to the system. This traditional authentication mechanism will not only cause inconvenience for users to use the sys...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0807H04L63/083H04L67/02
Inventor 董玥肖创柏
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products