A device authority authentication method based on web browser

A web browser, authority authentication technology, applied in the direction of digital data authentication, etc., can solve the problem of inability to judge the uniqueness of the device, and achieve the effect of strengthening specificity and diversity, and increasing security.

Active Publication Date: 2022-06-03
SHANDONG SYNTHESIS ELECTRONICS TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to provide a device authority authentication method based on a web browser. Based on the customized http protocol, it can limit the use of web applications in the bound device, and solve the problem that the existing password and token authentication methods cannot be judged. The problem of device uniqueness, restricting the use of devices for web applications, and being able to control the use of web applications, availability, and permissions of the bound devices through the cloud

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A device authority authentication method based on web browser
  • A device authority authentication method based on web browser
  • A device authority authentication method based on web browser

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

The authentication key is stored in the result and stored in the authentication server.

In the installation process, the authentication client prompts the user to perform user password authentication, which can prevent the authentication client from arbitrarily

Install to avoid unnecessary losses for users.

[0047] During the installation process of the authentication client, the number of authorized devices can be controlled, enabled or

Disable the use of the device and the effective time control of device use, verify changes in portrait information, etc.

As shown in Figure 3, the concrete process that browser obtains authentication is:

S06), the user logs in the web application in the browser of the authentication device by using the password, and the authentication server checks

After the verification is passed, the user login information userToken is returned to complete the user password login;

[0050] S07), the authentication device browser carries a userToken t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a web browser-based device authority authentication method, which can correspond applications with users and devices one by one, increase information security, complete automatic extraction of information and separate display of data through human faces, and enhance data security and the specificity and diversity of authority assignments. This method can flexibly carry out the recovery operation of cloud authorization and authentication authority, and is convenient to control the status and number of access devices. This method is used to isolate sensitive data from conventional data to increase data security, supplement the insufficient security verification of password login, and increase the security of data and account passwords.

Description

A web browser-based device authority authentication method technical field The present invention relates to a kind of device authority authentication method based on web browser, for web browser side application binding Unique device and display specific data through the face. Background technique [0002] With the continuous upgrading of the modern network bandwidth, the application of the browser-based web method is more and more widely. However, the web application cannot be used in the way of using the authorization code in the installation like the software, and the authorization cannot be used in the specified device. and some sensitive data have security risks. The current HTTP authentication methods are mainly through password authentication and token authentication. To ensure the identity of the user to log in, but the uniqueness of the device cannot be judged, so that the web application cannot be specified for use in a certain device. This will result in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/32G06F21/44
CPCG06F21/32G06F21/44
Inventor 祖丕国张传锋朱锦雷
Owner SHANDONG SYNTHESIS ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products