Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method, authentication device and authentication equipment

An authentication method and target technology, applied in the computer field, can solve problems such as the inability to realize multi-domain login authentication, cookies cannot be shared, etc., and achieve the effect of realizing multi-domain login authentication

Active Publication Date: 2021-09-24
广西三方大供应链技术服务有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, cookies can only be used under one domain name, cookies cannot be shared by new domain names and old domain names, and multi-domain login authentication cannot be realized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, authentication device and authentication equipment
  • Authentication method, authentication device and authentication equipment
  • Authentication method, authentication device and authentication equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0061] At present, with the rapid development of information technology, enterprises have deployed a large number of application systems, such as financial systems, customer relationship management systems, human resource management systems, enterprise resource management systems, enterprise mailboxes and so on. These application systems are often interrelated in business but the authentication mechanisms are independent of each other. With the expansion of the number of application...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an authentication method, an authentication device and authentication equipment. The method comprises the following steps: a client can obtain a target token in a first access request; and if the target token is valid, sending a second access request to the server. The server can generate a second cookie corresponding to the second domain name in response to the second access request, wherein the second cookie comprises the target token. The client receives the second cookie from the server, establishes a first session connection with the server based on the first cookie, and establishes a second session connection with the server based on the second cookie. The first cookie and the second cookie share the target token to realize multi-domain name login authentication. The invention relates to a block chain technology, for example, a first cookie and a second cookie can be written into a block chain so as to be used for establishing session connection and other scenes.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to an authentication method, an authentication device, an authentication device, and a computer-readable storage medium. Background technique [0002] In the early stage of enterprise development, there were few application systems in the enterprise, and each application system had its own login system. It was very convenient for users to log in with identity authentication information. However, with the development of the enterprise, the number of application systems in the enterprise increases, and users need to log in multiple times when operating different application systems, and the identity authentication information of each application system may be different, which is very inconvenient for users. Therefore, a single sign-on (Single Sign On, SSO) is introduced, so that the user can obtain the access authority of the application system associated with the logi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L29/12H04L9/32G06F21/41
CPCH04L63/0807G06F21/41H04L67/141H04L9/3213H04L61/4511
Inventor 沈加文
Owner 广西三方大供应链技术服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products