Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Inter-system subscriber identity authentication system and method

A user identity and verification system technology, applied in user identity/authority verification, transmission systems, electrical components, etc., can solve problems such as unfavorable work efficiency, increase user operations, and user session expiration, so as to reduce login verification operations and secure the system. safety effect

Inactive Publication Date: 2010-02-17
HONG FU JIN PRECISION IND (SHENZHEN) CO LTD +1
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, when a user operates one of the systems for a long time and does not operate other logged-in systems within a certain period of time, these systems that have been idle for a long time will have user sessions expire and need to log in again to use normally.
While so many user authentication processes ensure the security of system information, they increase user operations, which brings considerable inconvenience to users and is not conducive to the improvement of work efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Inter-system subscriber identity authentication system and method
  • Inter-system subscriber identity authentication system and method
  • Inter-system subscriber identity authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] refer to figure 1 Shown is an implementation environment diagram of a preferred embodiment of the cross-system user identity verification system of the present invention. The cross-system user identity verification system 10 runs in an application server 1 and is used to realize cross-system user identity verification. The application server 1 is connected to a plurality of application systems through a network 3, such as a warehouse management system 4, a purchasing system 5, and an invoice system 6, etc. The multiple application systems may run on the same web server, or may run on different web servers, figure 1 shown in , running on a different web server. The network 2 can be an enterprise intranet or the Internet.

[0013] The application server 1 is also connected with at least one client computer 2, which provides a user interface for logging into the above-mentioned multiple application systems.

[0014] refer to figure 2 As shown, it is a functional bloc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an inter-system subscriber identity authentication system, comprising an association module, a scanning module, an acquisition module, a searching module, an extracting module and a logging-in module; the association module is used for associating a plurality of application systems; the scanning module is used for scanning and judging, when a user opens an application system, whether Cookie files of other application systems associated with the application system exist in a client computer; the acquisition module is used for acquiring Session markers in the Cookie fileswhen the Cookie files exist; the searching module is used for searching for Session files in the network servers of application systems according to the Session markers; the extracting module is usedfor extracting user basic information stored in the Session files; and the logging-in module is used for automatically logging in the application system according to the extracted user basic information. The invention also provides an inter-system subscriber identity authentication method. The invention can simultaneously guarantee system security and reduce user operation.

Description

technical field [0001] The invention relates to a user identity verification system and method, in particular to a cross-system user identity verification system and method. Background technique [0002] With the scale and integration of network application systems, users are exposed to more and more application systems in their daily work, such as warehouse management systems, procurement systems, and invoice systems. These systems may run independently on different web servers for each other, however, these systems often need to be used together at the same time. For the sake of information security, every time a user logs in to a system, the user identity must be verified. [0003] In the traditional approach, when each application system is opened, the user needs to enter the account number and password one by one to log in to each application system. Moreover, when the user operates one of the systems for a long time and does not operate other logged-in systems within...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 常小军
Owner HONG FU JIN PRECISION IND (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products