Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Multi-application identity authentication system and method

An identity authentication and multi-application technology, applied in the system field of multi-application identity authentication, can solve problems such as easy confusion or forgetting, stolen passwords, cumbersome processes, etc., and achieve the effects of ensuring identity security, simplifying identity authentication, and reducing burdens

Active Publication Date: 2020-01-31
北京思源理想控股集团有限公司
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When users log in, they need to enter their user names and passwords every time, which is a cumbersome process; and for users who log in to different applications with different passwords, they need to memorize multiple user names and passwords, which is easy to confuse or forget; Risk of theft, less security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-application identity authentication system and method
  • Multi-application identity authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] The present invention provides a multi-application identity authentication system, such as figure 1 As shown, it includes the client, the application, and the proxy service center. The client establishes a connection with the application through the proxy service center.

[0037] The proxy service center includes a proxy key generation module, a proxy key storage module, a control module, and an encryption and decryption module. The proxy key generation module is used to generate the proxy public key and private key pair; the proxy key storage module is used to store the proxy public key and private key pair; the control module is used to communicate with the client and the application terminal according to the preset communication protocol ; The encryption and decryption module is used for encryption and decryption of communication data. The proxy service center can be a proxy server, or a software development kit (SDK) for realizing the same function.

[0038] The c...

Embodiment 2

[0042] The present invention provides a method for multi-application identity authentication, such as figure 2 shown, including the following steps:

[0043] Step 1: The client generates a client public key and a private key pair and stores them in the client; the proxy service center generates a proxy public key and a private key pair and stores them in the proxy service center;

[0044] The client in step 2 receives the proxy public key sent by the proxy service center;

[0045] The client in step 3 requests to log in to a certain application end, encrypts the information packet containing the client public key and application end information with the agent public key, and sends it to the agent service center;

[0046] Step 4: The proxy service center uses the proxy private key to decrypt the information package, and sends the client public key to the corresponding application end;

[0047] Step 5: The application side verifies the client public key;

[0048]When the cli...

Embodiment 3

[0053] The present invention provides another method for multi-application identity authentication, which includes the following steps:

[0054] Step 1: The client generates a client public key and a private key pair, which are stored in the client, and the proxy service center generates a proxy public key and a private key pair, which are stored in the proxy service center;

[0055] The client described in step 2 sends the client public key to the agency service center;

[0056] The client in step 3 requests to log in to a certain application end, encrypts the information packet containing the client public key and application end information with the client private key, and sends it to the agency service center;

[0057] Step 4: The proxy service center uses the client public key to decrypt the information packet, and uses the proxy private key to encrypt the client public key and sends it to the application side;

[0058] In step 5, the application side uses the proxy publ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multi-application identity authentication system and method. The multi-application identity authentication system comprises a client, an application terminal and a proxy service center, wherein the client establishes connection with the application terminal through the proxy service center; the client and the proxy service center respectively generate a public key pair anda private key pair; the client receives the proxy public key sent by the proxy service center; the client requests to log in a certain application terminal, encrypts the information packet by adopting the proxy public key, and sends the information packet to the proxy service center; the proxy service center decrypts the information packet by adopting the proxy private key, and sends the client public key to the corresponding application terminal; and the application terminal verifies the client public key and returns the authorization information to the client through the proxy service center according to a verification result. According to the multi-application identity authentication system, the standard specifications of the client, the proxy service center and the application terminal are formulated through the preset protocol, and the security mechanism is designed, so that the identity authentication of the client is simplified, and the security in the data transmission processis ensured.

Description

technical field [0001] The invention belongs to the communication field, and in particular relates to a system and method for multi-application identity authentication. Background technique [0002] In the prior art, different applications and software have different user systems. When users log in, they need to enter their user names and passwords every time, which is a cumbersome process; and for users who log in to different applications with different passwords, they need to memorize multiple user names and passwords, which is easy to confuse or forget; Risk of being stolen, low security. Contents of the invention [0003] In order to overcome the problems of the prior art, the present invention provides a method of establishing the corresponding relationship between the user client secret key and the user identity on the application side, and the application side obtains the user client secret key through the proxy service center to verify the user identity and reali...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0442H04L63/06H04L63/08H04L9/3247H04L9/3297
Inventor 郭拉
Owner 北京思源理想控股集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products