Method and system for switching third party landing and third party network and service server

A server and website technology, applied in the field of communication, can solve problems such as password synchronization, data destruction, and high third-party requirements, and achieve the effect of ensuring absolute security, avoiding transmission, and improving security

Active Publication Date: 2007-04-11
HUAWEI TECH CO LTD
View PDF0 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that at present, the account number and password are directly transmitted based on the hypertext transfer protocol (HTTP). Although it can be encrypted and transmitted through the password and transmitted through the security mechanism of the hypertext transfer protocol (HTTPS), it is imp...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for switching third party landing and third party network and service server
  • Method and system for switching third party landing and third party network and service server
  • Method and system for switching third party landing and third party network and service server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The basic idea of ​​the present invention is: when the portal website transfers to a third-party website, it adopts the encrypted KEY randomly generated based on the service server instead of carrying the user's key, so that when the portal website is transferred to the third-party website, both To ensure the security of network transmission, but also to ensure the relationship of trust between the portal and third-party websites.

[0034] FIG. 2 is a schematic diagram of a process for realizing transfer of third-party login authentication based on an IP network according to an embodiment of the present invention.

[0035] Steps 201-202, log in and visit the portal website through IE, the user enters the personal registration account number and password to log in the portal website, and the portal website returns to the post-login interface after the verification is successful. Management interface for maintenance operations.

[0036] When the user manages personal inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention provides a method for transferring third party landing based on IP network including: a door network station carries a ciphered KEY generated randomly by a service server to send a link request to a third party network station so as to avoid transmission of user ciphered codes and ensure absolute security of user codes, besides, since the third party network station calls back the Web server by copying the ciphered KEY to verify the cryptographic key so as to secure the absolute safety of shaking hands, since the door network station does not transfer user ciphered codes with the third party network station, which is not necessary to synchronize with the door station about codes, thus the requirement of complicated maintenance to synchronization on ciphered codes to the third party is reduced. This invention also provides a system for authenticating the transfer of third party landing based on the IP network and the third party network station and service servers.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method, system, third-party website, and service server for realizing transfer of third-party login authentication based on an IP network. Background technique [0002] With the development of the network, various websites that need to log in and register emerge in an endless stream. Users need to register user names and passwords in order to log in on these websites. This leads to a user gradually having more and more user names and passwords for authentication For some websites, password memory becomes a headache. Users often cannot log in to some websites or even log in to personal maintenance software that requires login verification because they forget their passwords. [0003] With the emergence of problems, the concept of portal websites is gradually proposed, such as unified management of other websites of individual users or software that requires login verifica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 沈庆春
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products