Single-point login system and single-point login method
A single sign-on and login authentication technology, applied in the field of information security, can solve problems such as timeliness limitations, information loss, and increased security risks, and achieve cross-authentication, direct cross-authentication, and convenient deployment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0032] Combined Public Key Algorithm (Combined Pubic Key, CPK) is an identity-based public key algorithm, and its key management center generates corresponding private key calculation parameters (private key calculation base) and public key calculation parameters (public key calculation base); According to the identification provided by the first user, use the private key calculation parameters to calculate the private key of the first user, and provide the generated private key to the first user; and publish the public key calculation parameters so that the second user After the identification of the first user is obtained, the public key of the first user may be calculated by using the public key calculation parameters according to the identification of the first user.
[0033] On the basis of proposing the CPK algorithm, a CPK chip is also provided. The CPK chip has a CPK algorithm functional unit and a verification protocol unit, which are specifically implemented in the ap...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com