Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Offline verification method for single sign on

A verification method and single sign-on technology, applied to electrical components, transmission systems, etc., can solve problems such as high service costs and delays, and achieve the effect of convenient service response

Active Publication Date: 2012-10-17
SOUTH CHINA NORMAL UNIVERSITY +1
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method requires multiple copies, and there is a certain delay in information synchronization; in addition, the service cost is high, and corresponding local servers need to be set up in different regions; and it has certain regional limitations, if it is a local partial copy , just copy part of the information, then only this part of the users can log in on this server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Offline verification method for single sign on
  • Offline verification method for single sign on
  • Offline verification method for single sign on

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] An off-line verification method for single sign-on, which is applied to an identity authentication system, and the identity authentication system includes a login authentication server, a login authentication root server, and an access authentication server. The premise of the offline verification of the method of the present invention is that the user has passed the first login authentication and has the corresponding credentials for service requests. Requested login root credentials, see figure 1 , the verification of the subsequent service request in the method of the present invention comprises the following steps:

[0025] The client sends service request information including login root credentials to the application server;

[0026] The application server sends the corresponding login root credentials in the service request information to the access authentication server;

[0027] The access authentication server verifies the login root credential, generates th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an offline verification method for single sign on. The method is applied to an identity authentication system. The system comprises a login authentication server, a login authentication root server and an access authentication server. After a client side accesses to the login authentication server for the first time, passes login verification and acquires a login root certificate for the next service request, the subsequent service requests are not required to be interacted with the login authentication server and are only required to access and authenticate with the access authentication server, so that the offline verification method for single sign on is realized, and a user is enabled to continuously request services under the condition that the login authentication server crashes.

Description

technical field [0001] The invention relates to a verification method for single sign-on, in particular to an offline verification method for single sign-on. Background technique [0002] Single Sign On (SSO): referred to as SSO, is one of the more popular enterprise business integration solutions. The definition of SSO is that in multiple application systems, users only need to log in once to access all mutually trusted application systems, avoiding the performance loss caused by verifying their identity every time a user requests a service. In order to realize single sign-on, all application systems share an identity authentication system. The identity authentication system compares the user's login information with the user information database, and performs login authentication for the user; after the authentication is successful, the identity authentication system generates a unified authentication mark ( ticket), returned to the user, and then every time the user requ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
Inventor 赵淦森巴钟杰李子柳李惊生
Owner SOUTH CHINA NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products