Automatic logion method based on IC card for server with multiple main domains

A server and authorization server technology, applied in the field of identity authentication and strengthening network security, to achieve the effects of ensuring irrelevance, reducing transplant costs, and increasing network burden

Inactive Publication Date: 2002-10-09
上海光华如新信息科技股份有限公司
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Due to the existence of these loopholes, hackers are very likely to first obtain the passwords of users authorized by the system, obtain system authorization, and then carry out further intrusions on the system, which will cause more problems and eventually lead to irreparable losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic logion method based on IC card for server with multiple main domains
  • Automatic logion method based on IC card for server with multiple main domains
  • Automatic logion method based on IC card for server with multiple main domains

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described through the following embodiments in conjunction with the accompanying drawings.

[0041] Described multi-main domain server automatic login method based on IC card is applied in an identity authentication system, and network environment is 100M Ethernet, and hardware equipment comprises HP server or other server, 100M Ethernet card, and operating platform is Chinese Windows NT Server4 .0+Service Pack6. Such as image 3 As shown, the authentication system includes a user management center 7, an IC card management center 6, a security information database 8, a client host 4 with client software 11 installed, an authorization server 9, a main domain server a1, a main domain server b2, a main domain server Domain server c3, the client host 4 is respectively connected with the primary domain server a1, primary domain server b2, and primary domain server c3, and the security information database 8 is respectively connected wit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An automatic login method for multi-maindomain server based on IC card is characterized by that the user can use IC card and PIN cipher to log in. Its advantages are no change of physical structure of network, no addition to network load, independency of application, and low cost of program transplantation.

Description

technical field [0001] The invention relates to identity authentication and a method for strengthening network security, in particular to an IC card-based automatic login method for multi-master domain servers. Background technique [0002] Authentication technology is an important aspect of information security theory and technology. Identity authentication is the first checkpoint in the security system. Before accessing the security system, the user must first be identified by the identity authentication system, and then the access monitor determines whether the user can access a certain resource based on the user's identity and authorization database. The authorization database is configured by the security administrator as required. The audit system records user requests and behaviors according to the audit settings, and the intrusion detection system checks whether there is any intrusion in real time or non-real time. Both access control a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F15/16G06F17/00G06K19/067
Inventor 张世永陈先国陈永岚
Owner 上海光华如新信息科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products