[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN111953711A - Communication authentication method based on security authentication mechanism - Google Patents

Communication authentication method based on security authentication mechanism Download PDF

Info

Publication number
CN111953711A
CN111953711A CN202010872948.1A CN202010872948A CN111953711A CN 111953711 A CN111953711 A CN 111953711A CN 202010872948 A CN202010872948 A CN 202010872948A CN 111953711 A CN111953711 A CN 111953711A
Authority
CN
China
Prior art keywords
user
application
mobile terminal
network
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010872948.1A
Other languages
Chinese (zh)
Inventor
赵建杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010872948.1A priority Critical patent/CN111953711A/en
Publication of CN111953711A publication Critical patent/CN111953711A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a communication authentication method based on a security authentication mechanism, and relates to the field of communication authentication. A communication authentication method based on a security authentication mechanism comprises the following steps: receiving an access request of the mobile terminal through the server, and forwarding the access request to the network application; the server forwards the access request to the single sign-on application and associates a plurality of network applications through the single sign-on application; the single sign-on application establishes the same user ID for a plurality of associated network applications according to the access request, and the single sign-on application establishes a user key of the user ID for each network application respectively. The invention meets the requirements of mobile office work and solves the problems of low efficiency and low safety of the mobile office work.

Description

Communication authentication method based on security authentication mechanism
Technical Field
The invention relates to the field of communication authentication, in particular to a communication authentication method based on a security authentication mechanism.
Background
In order to solve the problem that the perception of users is affected due to the fact that systems of all websites are relatively independent and each website has an independent page image style and a password authentication system, related technologies build a unified certificate center in a website group to complete Single Sign-On (SSO) technology recognition of all business websites. SSO realizes a unified identity authentication system of all external websites, and a client can enjoy the service of the whole network only by logging in at one point without multiple authentications.
In an enterprise, a user may typically have access to one or more different systems and applications. Each of these systems and applications may utilize different access control policies and require different credentials. This may require users to manage many different credentials for the systems and applications they often use, which results in password fatigue, wasted time entering and re-entering credentials, and additional IT resources for recovering and/or resetting lost credentials. Single sign-on (SSO) can provide a user with access to multiple systems and applications after an initial login (log-in). For example, when a user logs into their work computer, the user may then also have access to one or more other systems and applications.
Due to office security requirements, current SSO solutions are typically implemented using local area network based office area computers. Therefore, in the mobile office field, users cannot access network-based services at any time through mobile phones and tablets. Also, SSO can provide a single sign-on to several of a user's web applications while still requiring the user to manually log into other systems or applications, thus reducing the efficiency of mobile terminal access. There is a need for a communication authentication method that can improve the efficiency and security of mobile office work.
Disclosure of Invention
The invention aims to provide a communication authentication method based on a security authentication mechanism, which can improve the efficiency and the security of mobile office work.
The embodiment of the invention is realized by the following steps:
the embodiment of the application provides a communication authentication method based on a safety authentication mechanism, which comprises the following steps: receiving an access request of a mobile terminal through a server, and forwarding the access request to a network application; the server forwards the access request to a single sign-on application, and associates a plurality of network applications through the single sign-on application; the single sign-on application establishes the same user ID for a plurality of associated network applications according to the access request, the single sign-on application establishes a user key of the user ID for each network application, and returns the user ID and the user key to the mobile terminal through the server, and the mobile terminal packages the access request through the user ID and the user key to generate a repeat request and sends the repeat request to the server; and the server forwards the repeated request to a plurality of associated network applications, and each network application acquires the user ID and the user key through the repeated request and successfully logs in the mobile terminal after passing the verification.
In some embodiments of the present invention, the server obtains the user ID through the repeat request, updates the user keys of the plurality of associated network applications and the respective network applications according to the user ID, and forwards the updated user ID and the updated user key to the plurality of associated network applications, and returns the updated user ID and the updated user key to the mobile terminal.
In some embodiments of the present invention, the single sign-on application establishes a different user key for each of the network applications.
In some embodiments of the present invention, the mobile terminal generates the repeat request by packaging one or more user keys.
In some embodiments of the present invention, the access request includes identity authentication information of the mobile terminal.
In some embodiments of the present invention, the authentication information includes any one or more of a TCP/IP protocol, an SSL protocol, a device public key, a device private key, a session key, and a digital signature.
In some embodiments of the present invention, the user ID is generated according to the identity authentication information.
In some embodiments of the present invention, the user key of each of the network applications is generated according to the identity authentication information.
In some embodiments of the present invention, the user key of each of the network applications is generated by using different hash algorithms according to the device public key, the device private key, or the session key.
In some embodiments of the invention, the single sign-on application is a Javascript application.
Compared with the prior art, the embodiment of the invention has at least the following advantages or beneficial effects:
a communication authentication method based on a security authentication mechanism comprises the following steps: receiving an access request of a mobile terminal through a server, and forwarding the access request to a network application; the server forwards the access request to a single sign-on application, and associates a plurality of network applications through the single sign-on application; the single sign-on application establishes the same user ID for a plurality of related network applications according to the access request, the single sign-on application establishes a user key of the user ID for each network application, and returns the user ID and the user key to the mobile terminal through the server, and the mobile terminal packages the user ID and the user key to generate a repeat request and sends the repeat request to the server; and the server forwards the repeated request to a plurality of associated network applications, and each network application acquires the user ID and the user key through the repeated request and successfully logs in the mobile terminal after passing the verification.
The embodiment of the invention receives the access request of the mobile terminal through the server, thereby facilitating people to remotely send the access request of the network application through a mobile phone or other mobile terminals at any time and meeting the requirements of mobile office; the server forwards the access request to the network application, so that the mobile terminal can access the network application; the server forwards the access request to the single sign-on application, and associates a plurality of network applications through the single sign-on application, so that the access right of the mobile terminal to the plurality of network applications can be conveniently set; the single sign-on application establishes the same user ID for a plurality of associated network applications according to an access request sent by the mobile terminal, the single sign-on application establishes a user key of the user ID for each network application respectively, and returns the user ID and the user key to the mobile terminal through the server, so that the mobile terminal takes the user ID and the user key as a certificate for accessing the associated network applications again, the efficiency of accessing the plurality of network applications by the mobile terminal is improved, and high-efficiency office work is facilitated; the mobile terminal generates a repeat request by packaging the user ID and the user key and sends the repeat request to the server, so that the user ID and the user key are used as the credentials of the accessed network application, the access rights of the associated network applications are further acquired, and the safety of mobile office is improved; the server directly forwards the repeated request to the associated network applications without verifying whether the mobile terminal has the authority of different network applications, so that the problems of access failure and time delay of the mobile terminal are solved; and each network application acquires the user ID and the user key through repeated requests, and the mobile terminal is successfully logged in after verification is passed, so that the communication safety of mobile office is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a flowchart illustrating a communication authentication method based on a security authentication mechanism according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that, in this document, the term "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion, so that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but also other elements not expressly listed or inherent to such process, method, article, or apparatus.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the individual features of the embodiments can be combined with one another without conflict.
Examples
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating a communication authentication method based on a security authentication mechanism according to an embodiment of the present disclosure. The communication authentication method based on the security authentication mechanism comprises the following steps: receiving an access request of a mobile terminal through a server, and forwarding the access request to the network application; the server forwards the access request to a single sign-on application, and associates a plurality of network applications through the single sign-on application; the single sign-on application establishes the same user ID for a plurality of related network applications according to the access request, the single sign-on application establishes a user key of the user ID for each network application, and returns the user ID and the user key to the mobile terminal through the server, and the mobile terminal packages the user ID and the user key to generate a repeat request and sends the repeat request to the server; and the server forwards the repeated request to a plurality of associated network applications, and each network application acquires the user ID and the user key through the repeated request and successfully logs in the mobile terminal after passing the verification.
In detail, the server receives an access request of the mobile terminal through network communication and forwards the access request to the network application. Optionally, the number of the network applications is multiple, and the server analyzes the network application to be accessed according to the access request, so as to forward the access request to the network application. The network application can log in the client by verifying the information of the access request.
In detail, the server forwards the access request to the single sign-on application, and associates a plurality of network applications through the single sign-on application. The server forwards the access request to the single sign-on application, so that the single sign-on application acquires the network application accessed by the client according to the access request. The single sign-on application is configured to associate a plurality of web applications, wherein each web application may associate a plurality of other web applications. Optionally, the plurality of network applications may be associated with other network applications according to the network application accessed by the client. Optionally, the single sign-on application associates multiple network applications, and the sequence of the two steps of forwarding the access request to the single sign-on application by the server can be exchanged, so that the single sign-on application associates the multiple network applications in advance, and is convenient to set access permissions of the associated network applications according to different networks accessed by the mobile terminal, so that different security permissions are established according to different mobile terminals, and the office safety is further improved. Optionally, the single sign-on application divides the plurality of web applications into a plurality of groups and associates with each other, wherein the single sign-on application may represent each group of web applications by a different label. Optionally, after the mobile terminal successfully logs into the web application, the server may forward the access request to the single-sign-on client application, such that the single-sign-on application establishes the user ID and the user key based on the plurality of access applications associated with the mobile terminal successfully accessing the web application.
In detail, the single sign-on application establishes the same user ID for a plurality of associated network applications according to the access request, so that the single sign-on application establishes the user ID according to the access request of the client. In detail, the single sign-on application establishes a user key of a user ID for each network application, respectively, where the user ID matches with the user key of each network application, and the user keys of the network applications may be set to be the same or different. The server returns the user ID and the user key to the mobile terminal, so that the user ID is used as identity authentication of the mobile terminal accessing the network application, and the user ID is used as access credentials for accessing the associated different network applications. Optionally, the single sign-on application searches for the network application that the mobile terminal has accessed through the user ID, so as to determine whether the network application that the mobile terminal currently accesses is associated with the network application that has accessed, where the network application that is currently accessed is obtained through an access request sent by the mobile terminal. Optionally, the server obtains login permissions of all the network applications through the single sign-on application, so that the client logs in each network application according to the user ID and the user key of the client. Optionally, the user ID and the user key that are established by the single sign-on application for the client are respectively registered through each network application, so as to obtain the login permission of each network application, wherein the registration can be performed according to the user ID and the user key, and the registration can also be performed through a newly-established account. Optionally, the single sign-on application or the network application judges whether the mobile terminal has the authority of the currently accessed network application according to the user key, so as to verify the access authority of the client.
In detail, the mobile terminal packages a user ID and a user key to generate a repeat request, and transmits the repeat request to the server. The server obtains the network application to be accessed by the mobile terminal through repeated requests. And acquiring the user ID and the user key through repeated requests, thereby acquiring one or more network applications associated with the network applications accessed by the user through the user ID.
In detail, the server forwards the repeat request to a plurality of associated network applications, and each network application acquires the user ID and the user key through the repeat request and provides the mobile terminal with successful login after verification passes. Optionally, the server parses the network application to be accessed according to the repeat request, so as to forward the repeat request to the network application. Optionally, the server obtains the user ID according to the repeated request, so as to obtain the network application that the mobile terminal has accessed according to the user ID, and further obtain the associated multiple network applications through the single sign-on application, and forward the associated multiple network applications to the mobile terminal, so that the mobile terminal can log in each network application successfully. And each network application authenticates the client through the user ID and the user key, so that the client logs in after the authentication is passed.
In some embodiments of the present invention, the server obtains the user ID through the repeat request, updates the user keys of the plurality of associated network applications and the respective network applications according to the user ID, and forwards the updated user ID and the updated user key to the plurality of associated network applications, and returns the updated user ID and the updated user key to the mobile terminal.
Optionally, the server stores and updates the web applications accessed by the different clients according to the user IDs by using the access database. Optionally, the server stores, through an association database, the user IDs of the different clients and the plurality of network applications associated with the accessed network applications, and updates the plurality of network applications associated in the association database according to the different network applications accessed by the mobile terminal each time. The server can search a plurality of associated network applications according to the user ID of the mobile terminal by using the association database, so that the repeated request is forwarded to each network application. Alternatively, the server stores and updates the user key based on the user ID using a key database, wherein the updated user key is obtained by each network application. And, the server returns the updated user ID and user key to the mobile terminal.
In some embodiments of the present invention, the single sign-on application establishes a different user key for each of the network applications. In detail, the mobile terminal accesses each network application through different user keys, and the login efficiency of the network application is further improved. Optionally, the server sends the user key to the corresponding network application.
In some embodiments of the present invention, the mobile terminal generates the repeat request by packaging one or more user keys. In detail, the mobile terminal generates a repeat request by packaging one or more user keys, so as to obtain the simultaneous access rights of one or more network applications by using the one or more user keys. Optionally, the repeated requests are respectively sent to a plurality of associated network applications, so that the network applications are logged in by a user by judging whether the network applications are matched with each user key, thereby avoiding a user key error caused by the operation of the mobile terminal and further preventing the problem that the network applications cannot access.
In some embodiments of the present invention, the access request includes identity authentication information of the mobile terminal. Through the identity authentication information of the mobile terminal, the server can conveniently authenticate whether the source of the mobile terminal is safe or not, and the communication safety of mobile office is further improved.
In some embodiments of the present invention, the authentication information includes any one or more of a TCP/IP protocol, an SSL protocol, a device public key, a device private key, a session key, and a digital signature.
In some embodiments of the present invention, the user ID is generated according to the identity authentication information. The user ID is generated according to the identity authentication information in the access request, so that the server can conveniently verify the identity of the mobile terminal, wherein the identity authentication information can be a digital signature or an equipment public key.
In some embodiments of the present invention, the user key of each of the network applications is generated according to the identity authentication information.
In some embodiments of the present invention, the user key of each of the network applications is generated by using different hash algorithms according to the device public key, the device private key, or the session key. The identity authentication information is subjected to the Hash algorithm to obtain the Hash value as the user key, so that the safety of mobile office is enhanced.
In some embodiments of the invention, the single sign-on application is a Javascript application.
It will be appreciated that the flow chart shown in fig. 1 is merely illustrative, and that the communication authentication method based on the secure authentication mechanism may also include more or fewer steps than shown in fig. 1, or have a different sequence of steps than shown in fig. 1. The components shown in fig. 1 may be implemented in hardware, software, or a combination thereof.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned database or storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
To sum up, a communication authentication method based on a security authentication mechanism provided in an embodiment of the present application:
the embodiment of the invention receives the access request of the mobile terminal through the server, thereby facilitating people to remotely send the access request of the network application through a mobile phone or other mobile terminals at any time and meeting the requirements of mobile office; the server forwards the access request to the network application, so that the mobile terminal can access the network application; the server forwards the access request to the single sign-on application, and associates a plurality of network applications through the single sign-on application, so that the access right of the mobile terminal to the plurality of network applications can be conveniently set; the single sign-on application establishes the same user ID for a plurality of associated network applications according to an access request sent by the mobile terminal, the single sign-on application establishes a user key of the user ID for each network application respectively, and returns the user ID and the user key to the mobile terminal through the server, so that the mobile terminal takes the user ID and the user key as a certificate for accessing the associated network applications again, the efficiency of accessing the plurality of network applications by the mobile terminal is improved, and high-efficiency office work is facilitated; the mobile terminal generates a repeat request by packaging the user ID and the user key and sends the repeat request to the server, so that the user ID and the user key are used as the credentials of the accessed network application, the access rights of the associated network applications are further acquired, and the safety of mobile office is improved; the server directly forwards the repeated request to the associated network applications without verifying whether the mobile terminal has the authority of different network applications, so that the problems of access failure and time delay of the mobile terminal are solved; and each network application acquires the user ID and the user key through repeated requests, and the mobile terminal is successfully logged in after verification is passed, so that the communication safety of mobile office is improved.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. A communication authentication method based on a security authentication mechanism is characterized by comprising the following steps:
receiving an access request of a mobile terminal through a server, and forwarding the access request to a network application;
the server forwards the access request to a single sign-on application, and associates a plurality of network applications through the single sign-on application;
the single sign-on application establishes the same user ID for a plurality of associated network applications according to the access request, establishes a user key of the user ID for each network application, and returns the user ID and the user key to the mobile terminal through the server;
the mobile terminal generates a repeat request through the user ID and the user key and sends the repeat request to the server;
and the server forwards the repeated request to a plurality of associated network applications, and each network application acquires the user ID and the user key through the repeated request and successfully logs in the mobile terminal after verification passes.
2. The communication authentication method based on the security authentication mechanism according to claim 1,
the server obtains the user ID through the repeated request, updates the associated network applications and the user keys of the network applications according to the user ID, and forwards the network applications to the associated network applications, and returns the updated user ID and the updated user keys to the mobile terminal.
3. The communication authentication method based on the security authentication mechanism as claimed in claim 1, wherein the single sign-on application establishes a different user key for each network application.
4. The communication authentication method based on the security authentication mechanism as claimed in claim 3, wherein the mobile terminal generates the repeat request by packaging one or more user keys.
5. The communication authentication method based on the security authentication mechanism as claimed in claim 1, wherein the access request contains identity authentication information of the mobile terminal.
6. The communication authentication method based on the security authentication mechanism as claimed in claim 5, wherein the identity authentication information comprises any one or more of TCP/IP protocol, SSL protocol, device public key, device private key, session key and digital signature.
7. The communication authentication method based on the secure authentication mechanism according to claim 5, wherein the user ID is generated based on the identity authentication information.
8. The communication authentication method based on the security authentication mechanism as claimed in claim 5, wherein the user key of each network application is generated according to the identity authentication information.
9. The communication authentication method based on the security authentication mechanism as claimed in claim 8, wherein the user key of each network application is generated by using different hash algorithms according to the device public key, the device private key or the session key.
10. The communication authentication method based on the security authentication mechanism as claimed in any one of claims 1 to 9, wherein the single sign-on application is a Javascript application.
CN202010872948.1A 2020-08-26 2020-08-26 Communication authentication method based on security authentication mechanism Pending CN111953711A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010872948.1A CN111953711A (en) 2020-08-26 2020-08-26 Communication authentication method based on security authentication mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010872948.1A CN111953711A (en) 2020-08-26 2020-08-26 Communication authentication method based on security authentication mechanism

Publications (1)

Publication Number Publication Date
CN111953711A true CN111953711A (en) 2020-11-17

Family

ID=73367470

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010872948.1A Pending CN111953711A (en) 2020-08-26 2020-08-26 Communication authentication method based on security authentication mechanism

Country Status (1)

Country Link
CN (1) CN111953711A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112769826A (en) * 2021-01-08 2021-05-07 深信服科技股份有限公司 Information processing method, device, equipment and storage medium
CN115913609A (en) * 2022-09-08 2023-04-04 西安热工研究院有限公司 A Bill Authentication Drift Method Based on National Secret Algorithm

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350717A (en) * 2007-07-18 2009-01-21 中国移动通信集团公司 A method and system for logging into a third-party server through instant messaging software
CN102868704A (en) * 2012-10-11 2013-01-09 北京新媒传信科技有限公司 Method and system for single sign on
CN108040072A (en) * 2018-01-22 2018-05-15 公安部交通管理科学研究所 The system and method for mobile Internet APP single-sign-ons under distributed network
CN109413032A (en) * 2018-09-03 2019-03-01 中国平安人寿保险股份有限公司 A kind of single-point logging method, computer readable storage medium and gateway

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350717A (en) * 2007-07-18 2009-01-21 中国移动通信集团公司 A method and system for logging into a third-party server through instant messaging software
CN102868704A (en) * 2012-10-11 2013-01-09 北京新媒传信科技有限公司 Method and system for single sign on
CN108040072A (en) * 2018-01-22 2018-05-15 公安部交通管理科学研究所 The system and method for mobile Internet APP single-sign-ons under distributed network
CN109413032A (en) * 2018-09-03 2019-03-01 中国平安人寿保险股份有限公司 A kind of single-point logging method, computer readable storage medium and gateway

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112769826A (en) * 2021-01-08 2021-05-07 深信服科技股份有限公司 Information processing method, device, equipment and storage medium
CN115913609A (en) * 2022-09-08 2023-04-04 西安热工研究院有限公司 A Bill Authentication Drift Method Based on National Secret Algorithm

Similar Documents

Publication Publication Date Title
US10721238B2 (en) Parameter based key derivation
EP3108612B1 (en) Fingerprint based authentication for single sign on
EP3694185B1 (en) Method for facilitating federated single sign-on (sso) for internal web applications
US9794227B2 (en) Automatic detection of authentication methods by a gateway
JP5694344B2 (en) Authentication using cloud authentication
US9240886B1 (en) Authentication adaptation
US9692757B1 (en) Enhanced authentication for secure communications
EP2761487B1 (en) Parameter based key derivation
US9805185B2 (en) Disposition engine for single sign on (SSO) requests
CN112468481B (en) Single-page and multi-page web application identity integrated authentication method based on CAS
US20210084020A1 (en) System and method for identity and authorization management
CN111786969A (en) Single sign-on method, device and system
US7428748B2 (en) Method and system for authentication in a business intelligence system
CN111818088A (en) Authorization mode management method and device, computer equipment and readable storage medium
US10931662B1 (en) Methods for ephemeral authentication screening and devices thereof
CN111953711A (en) Communication authentication method based on security authentication mechanism
US20190182242A1 (en) Authentication in integrated system environment
US7631344B2 (en) Distributed authentication framework stack
CN116647345A (en) Method and device for generating permission token, storage medium and computer equipment
CN105812138A (en) Logging-in processing method, processing device, user terminal, and logging-in system
US20130061302A1 (en) Method and Apparatus for the Protection of Computer System Account Credentials
Emadinia et al. An updateable token-based schema for authentication and access management in clouds
CN108924104A (en) A kind of method of E-Government encryption and decryption
US20250106208A1 (en) Establishing trust for an api call from a client to a target service using a relay gateway
NL2021222B1 (en) Method for secure encrypted digital services

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201117

RJ01 Rejection of invention patent application after publication