Unlock instant, AI-driven research and patent intelligence for your innovation.

Multi-system security unified authentication system and method based on jwt

An authentication method and authentication system technology, which is applied in the jwt-based multi-system security unified authentication method and system field, can solve problems such as hidden safety hazards and system damage, and achieve the effects of reducing difficulty in use, reducing operation and maintenance costs, and avoiding security risks

Pending Publication Date: 2022-06-24
济南超级计算技术研究院
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above scheme has security risks. For example, if the user requests a token and the token is hijacked, due to the stateless nature of the token, the client’s account logout, logout and other operations cannot cause the token to become invalid. Then criminals You can use this token to carry out illegal operations such as information theft and destroy the company's system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-system security unified authentication system and method based on jwt
  • Multi-system security unified authentication system and method based on jwt
  • Multi-system security unified authentication system and method based on jwt

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] The overall idea of ​​the present invention is as follows: Aiming at the problems that there are multiple software systems in the enterprise, the authentication systems between the systems are independent, and the switching and login are complicated, a jwt-based multi-system security unified authentication method is proposed, in order to solve the security problem of jwt stateless token , to achieve unified login authentication for the security of multiple software systems, including:

[0038] 1) The issuance and verification of jwt is carried out by the token certification center;

[0039] 2) Use the ocelot gateway for routing and forwarding, follow the oauth2 standard, and connect to the token authentication center to realize real-time authentication of jwt;

[0040] 3) The accessed application system distributes the response menu according to the user information and permission information carried in the jwt;

[0041] 4) When the user logs out or logs out, the brows...

Embodiment 2

[0053] like image 3 As shown, this embodiment provides a jwt-based multi-system security unified authentication method, including the following steps:

[0054] Receive the access request from the client, judge the access request, and determine whether the request header of the access request contains a token. If it contains a token, send the token to the authentication center for verification. After the verification is passed, the verification result is returned, and the access request is returned. Forward to the corresponding application interface to realize the user's login, otherwise, forward the access request to the client login interface.

[0055] The technical advantage of the above solution is that it realizes the unified authentication of multiple systems, reduces the difficulty of using the user, and reduces the operation and maintenance cost of the enterprise maintaining the login authentication of each system.

[0056] The sending of the token to the certificatio...

Embodiment 3

[0064] This embodiment provides a computer-readable storage medium on which a computer program is stored, and when the program is executed by a processor, implements the steps in the above-mentioned jwt-based multi-system security unified authentication method.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of security authentication, and provides a jwt-based multi-system security unified authentication system and method, and the system comprises a client, a gateway, and an authentication center. The gateway is used for receiving an access request of a client, judging the access request, judging whether a request header of the access request contains a token or not, if the request header of the access request contains the token, sending the token to the authentication center for verification, after the verification is passed, the authentication center is used for returning a verification result to the gateway, and after the gateway receives the verification result, the authentication center sends the verification result to the client. And forwarding the access request to a corresponding application interface to realize login of the user, otherwise, forwarding the access request to a client login interface. Compared with a traditional enterprise independent authentication multi-system, the use difficulty of a user is reduced, and the operation and maintenance cost of the enterprise for maintaining login authentication of each system is reduced.

Description

technical field [0001] The invention belongs to the technical field of security authentication, in particular to a JWT-based multi-system security unified authentication method and system. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] At present, the heavy and repetitive tasks of enterprises that require a lot of manpower to solve can already be assisted by programs. However, due to different departments, different needs and different goals at the beginning of program design, it is inevitable that many applications will be active in the company. In the architecture, for system users, each application has its own account and password authority management system, which undoubtedly requires energy to obtain identification and memory, and the operation is also very inconvenient. [0004] In order to solve this problem, the existing technolo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L12/66H04L67/63H04L69/22
CPCH04L63/10H04L69/22H04L12/66
Inventor 王嘉祥高昌兴郭猛潘景山
Owner 济南超级计算技术研究院