Secure cross-domain login method, system and server

A login method, application server technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., and can solve problems such as demanding third-party applications

Active Publication Date: 2021-02-05
CHINA UNIONPAY
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method requires users of third-party applications to register in this system, which is more demanding for third-party applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure cross-domain login method, system and server
  • Secure cross-domain login method, system and server
  • Secure cross-domain login method, system and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051]Hereinafter, exemplary embodiments of the present disclosure will be described in more detail with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be implemented in various forms and should not be limited by the embodiments set forth herein. On the contrary, these embodiments are provided to enable a more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0052]In the present invention, it should be understood that terms such as "including" or "having" are intended to indicate the existence of the features, numbers, steps, actions, components, parts, or combinations thereof disclosed in this specification, and are not intended to exclude one Or the possibility of the existence of multiple other features, numbers, steps, behaviors, components, parts or combinations th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a safe cross-domain login method and system and a server. The method comprises the steps that a first application server receives a login request which is sent by a first application client and is used for requesting to log in a target webpage provided by a second application server, and obtains user identity information corresponding to the first application client according to the login request, thereby generating a request message according to the user identity information and sending the request message to a second application server; the second application server generates a temporary trust token based on the request message and sends the temporary trust token to the first application client; the first application client sends a skip request carrying the temporary trust token to a target webpage provided by a second application server; and the second application server verifies the temporary trust token and carries out login crediting on the first application client after the temporary trust token passes the verification. By means of the method, non-inductive cross-site access can be achieved without secondary login, better internet experience is provided for users, the jump link is protected based on the temporary trust token, and the method is safer.

Description

Technical field[0001]The invention belongs to the field of communication technology, and specifically relates to a secure cross-domain login method, system and server.Background technique[0002]This section is intended to provide background or context for the embodiments of the invention stated in the claims. The description here is not recognized as prior art just because it is included in this section.[0003]With the rapid development of Internet technology, the number of application software and websites is also increasing, and most applications or websites often require registration and login before they can use related services. Between certain applications, such as social applications, shopping applications, game applications, internal business systems, etc., users only need to log in to one application website to access other application websites due to business integration requirements. This is also called It is a cross-system login authentication.[0004]At present, there is a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L63/0807H04L63/0815H04L9/3213H04L9/3228H04L63/0838H04L9/0863H04L9/088H04L9/3247
Inventor 胡小舟王荣海汤茂安魏柯宁林英觉
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products