Supercharge Your Innovation With Domain-Expert AI Agents!

Security authentication method and related equipment

A security authentication and authentication request technology, applied in the field of communication, can solve the security risk of token leakage, and achieve the effects of high reliability, improved security, and risk avoidance

Active Publication Date: 2021-03-12
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a security authentication method and related equipment, which can solve the problem of security risks caused by token leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method and related equipment
  • Security authentication method and related equipment
  • Security authentication method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical solutions of the present application will be clearly described below with reference to the accompanying drawings in the present application.

[0035] The terms used in the following embodiments of the present application are only for the purpose of describing specific embodiments, and are not intended to limit the present application. As used in the specification and appended claims of this application, the singular expressions "a", "an", "said", "above", "the" and "this" are intended to also Plural expressions are included unless the context clearly indicates otherwise. It should also be understood that although the terms first, second, etc. may be used in the following embodiments to describe a certain type of object, the object should not be limited to these terms. These terms are only used to distinguish specific objects of that class. For example, the terms first, second, etc. may be used in the following embodiments to describe the browser fingerpr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of communication, and discloses a security authentication method and related equipment, and the security authentication method comprises the steps: enabling a first browser fingerprint, a user name and a password to be transmitted to an authentication server together when a first client receives a login instruction from the authentication server, and receiving a token from the authentication server. When a second client carries the token and requests authentication of the authentication server with the second browser fingerprint, the authenticationserver determines whether the token is leaked from the first client by detecting whether the second browser fingerprint is the same as the first browser fingerprint. Because more information is contained in the browser fingerprint, the reliability of the authentication mode is higher, and the risk caused by token leakage can be avoided.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a security authentication method and related equipment. Background technique [0002] Single sign-on (single sign-on, SSO) means that in multiple mutually trusted applications, users only need to log in once to access all applications. [0003] For example, a website that supports single sign-on includes web applications such as online business hall, online shopping mall, point shopping mall, and Portal. Correspondingly, such as figure 1 As shown, the exemplary network architecture of the single sign-on system includes a client, a server supporting the above-mentioned applications, and an SSO server for login and token authentication. combine figure 1 , a single sign-on implementation process includes: when a user visits an online business hall, the client sends an access request to the online business hall server, and when the online business hall server d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0807H04L63/0815
Inventor 罗杰
Owner HUAWEI CLOUD COMPUTING TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More