Secure login method and system based on third-party authorization

A secure login, unique technology, applied in the field of information security to achieve the effect of improving security

Pending Publication Date: 2020-05-22
AEROSPACE INFORMATION
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention proposes a secure login method and system based on third-party authorization to solve the problem of how to securely implement third-party authorized login

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure login method and system based on third-party authorization
  • Secure login method and system based on third-party authorization
  • Secure login method and system based on third-party authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Exemplary embodiments of the present invention will now be described with reference to the accompanying drawings. However, the present invention can be implemented in many different forms and is not limited to the embodiments described herein. These embodiments are provided to disclose the present invention in detail and completely. Invention and fully convey the scope of the present invention to those skilled in the art. The terms in the exemplary embodiments shown in the drawings do not limit the present invention. In the drawings, the same units / elements use the same reference signs.

[0043] Unless otherwise specified, the terms (including scientific and technological terms) used herein have the usual meanings to those skilled in the art. In addition, it is understandable that the terms defined in commonly used dictionaries should be understood as having consistent meanings in the context of their related fields, and should not be understood as idealized or overly for...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure login method and system based on third-party authorization, and the method comprises: a server side of a calling party receiving an authentication request which is transmitted by a browser side and is provided with a unique identification code, and transmitting the unique identification code to a server side of a third party; the server of the third party acquiringuser information containing the unique identification code from the client of the third party, and determining the user information corresponding to the authentication request according to the uniqueidentification code; the server of the third party encrypting user information corresponding to the authentication request by using the unique identification code, acquiring encrypted user information and sending the encrypted user information to the server of the calling party; and the server of the calling party using the unique identification code to calculate a decryption key, using the decryption key to decrypt the encrypted user information, obtaining the user information corresponding to the authentication request, and allowing login operation. According to the invention, the user information is encrypted and decrypted in a symmetrical encryption mode, so that the security is greatly improved, and the authenticity and reliability of the user identity information are ensured.

Description

Technical field [0001] The present invention relates to the technical field of information security, and more specifically, to a secure login method and system based on third-party authorization. Background technique [0002] WeChat Auth2.0 authorized login is currently a popular scan code login method based on third-party authentication. Since there is no need to register an account on the application, it greatly simplifies the user authentication process and improves the user experience. After the WeChat user is authorized to log in to a third-party application that has access to WeChat Auth2.0, the third-party application can obtain the user credential token or user information returned by the user interface call, and the WeChat open platform authorization relationship interface call can be made through the token. Realize the scan code login of WeChat users and display WeChat personal information. [0003] However, scan code login based on third-party authentication also has ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/0876
Inventor 梁宵李孝猛耿方冯玉珠
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products