Movatterモバイル変換


[0]ホーム

URL:


CN107454077A - A kind of single-point logging method based on IKI ID authentications - Google Patents

A kind of single-point logging method based on IKI ID authentications
Download PDF

Info

Publication number
CN107454077A
CN107454077ACN201710648422.3ACN201710648422ACN107454077ACN 107454077 ACN107454077 ACN 107454077ACN 201710648422 ACN201710648422 ACN 201710648422ACN 107454077 ACN107454077 ACN 107454077A
Authority
CN
China
Prior art keywords
mark
entity
public key
user
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710648422.3A
Other languages
Chinese (zh)
Other versions
CN107454077B (en
Inventor
李庄
欧阳震诤
杨艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Erdos Dimanson Cryptography Technology Co ltd
Original Assignee
Beijing Dimansen Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dimansen Technology Co LtdfiledCriticalBeijing Dimansen Technology Co Ltd
Priority to CN201710648422.3ApriorityCriticalpatent/CN107454077B/en
Publication of CN107454077ApublicationCriticalpatent/CN107454077A/en
Application grantedgrantedCritical
Publication of CN107454077BpublicationCriticalpatent/CN107454077B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Classifications

Landscapes

Abstract

The present invention relates to a kind of single-point logging method based on IKI ID authentications, comprise the following steps:Access request is sent, random number r is produced, service end is sent collectively to together with mark;Mark is verified, by rear, generation random number R, and be combined with r(R||r), signed with private key, generation signed data Sig1;Send R, mark, Sig1;Checking mark, verifies Sig1, confirms identity legitimacy after being verified;Utilize private key pair(R||r)Signed, generate signed data Sig2, Sig2 is sent to server end;Sig2 is verified, identity legitimacy is confirmed after being verified, checks single-sign-on mapping table, finds out the account of mark binding, User Token is produced, is directed to application system;User Token is received, obtains the login account of user, the state of user is set to login, returns to the page that request accesses, completes to access.Beneficial effects of the present invention:The security of single-node login system is improved, gives a kind of identity identifying method of high intensity.

Description

A kind of single-point logging method based on IKI ID authentications
Technical field
The present invention relates to field of information security technology, it particularly relates to a kind of single-point logging method.
Background technology
With the fast development of information technology and network technology, the application system of enterprises is more and more.Such as manpowerResource management system, financial system, OA systems, CRM system etc..Because these systems are independent mutually, user makesWith must be logged in before each application system according to corresponding system identity, for this, user must remember each systemUsername and password, this brings many troubles to user.In particular with increasing for system, the possibility of error will increaseAdd, the possibility illegally intercepted and captured and destroyed can also increase, and security will be reduced accordingly.It is directed to such case, single-pointLog in concept to arise at the historic moment, and be constantly applied in enterprise application system.
Single-sign-on is a kind of unified certification and licensing scheme, refers to the same use for accessing the locked resource in different applicationFamily, it is only necessary to log in once, i.e., by the safety verification in an application after, visit again the locked resource in other applicationWhen, it is no longer necessary to login authentication again.Single-sign-on can improve the operating efficiency of system, reduce the error probability of system.
Along with single-sign-on field research deepen continuously and Web service and application Integrating it is persistently overheating,There are a variety of single-sign-on solutions at present.Such as the WebSphere single-sign-on solutions of IBM Corporation, SUN companiesSun Java System Access Manager, Microsoft .Net Passport and NetegritySiteMinder, BEA WebLogic, and some products based on SAML, such as OPENSAML and SourceID etc..ButIt is that existing product also has some shortcomings in the security of single-sign-on, most variations in the communication process between serverSensitive information is transmitted using plaintext version, these information are easy to be stolen, and cause important information to reveal.In addition, communicatingMost variations are not also signed to key message in journey, easily by spoof attack.
The problem of in correlation technique, effective solution is not yet proposed at present.
The content of the invention
For the above-mentioned technical problem in correlation technique, the present invention proposes a kind of single-sign-on based on IKI ID authenticationsMethod, it can solve the problem that above technical problem.
To realize above-mentioned technical purpose, the technical proposal of the invention is realized in this way:
A kind of single-point logging method based on IKI ID authentications, comprises the following steps:
S1 user terminals send access request to server, produce random number r, and service end is sent collectively to together with user terminal mark;
S2 server ends are verified to user terminal mark, and by rear, server end produces random number R, and random with user terminalNumber r is combined, for (R | | r), signed with server end private key, generation signed data Sig1;
Random number R, server end mark, signed data Sig1 are sent to user terminal by S3 server ends;
S4 user terminal authentication servers end is identified, and the public key verifications signed data in server identification is utilized after being verifiedSig1, it is verified rear confirmed service device end identity legitimacy;
S5 user terminals are signed using private key to random number (R | | r), generate signed data Sig2, signed data Sig2 is sent outIt is sent to server end;
S6 server by utilizing user terminal public key verifications signed data Sig2, user terminal identity legitimacy is confirmed after being verified;
S7 server end login authentications equipment checks user's single-sign-on mapping table, finds out user mark in corresponding application systemThe account bound on system, User Token is produced, is re-introduced into application system;
S8 application systems receive the User Token of unified form, login account of the user in the system are obtained, by user at thisThe state of system is set to login, returns to the page that user asks to access, completes access of the user to the application system.
Further, administrative center is identified by IKI and produces the server end mark, user terminal mark, private key and public affairsKey.
Further, the production stage of the server end mark, user terminal mark, private key and public key is:
S101IKI marks administrative center IMC discloses parameter:Public key matrix PKMS, identify administrative center public key PKIDorg, ECC songsLine, basic point G;Wherein public key matrix PKMS is mark administrative center private key SKIDorgTo public key matrix pkm, mark administrative center markKnow IDorgEtc. the signature of parameter;
S102 entities produce entity ID and relevant parameter:Secret value xID, secret value public key PKx are produced using entity security equipment=xID*G, unsymmetrical key is randomly generated to SK using ECC algorithmh、PKh
The partial parameters that S103 encryptions need to upload:Use mark administrative center public key PKIDorgTo secret value public key PKx and at randomUnsymmetrical key public key PKhEncryption:E(PKIDorg,PKx||PKh);
S104 uploads entity ID, E (PKIDorg,PKx||PKh) and mark validity date extremely mark administrative center IMC;Wherein identifyValidity date is to be necessary to determine whether to upload according to application;
S105 marks administrative center carries out entity ID duplicate checkings, produces entity part private key:IMC determines that entity ID combination marks are effectiveAfter the uniqueness of phase, using PKMS and entity ID, the mark term of validity, entity ID public keys PK is calculatedID, utilize private key matrix skmWith entity ID, mark term of validity computational entity ID private keys SKID, entity encryption key SKE and part signature is obtained after SKE is convertedPrivate key SKS1;
S106 mark administrative center IMC assembling marks:Use mark management organization private key SKIDorgDecrypt E (PKIDorg,PKx||PKh) obtain PKx and PKh, composite entity ID public signature keys:PKS=SKS1*G+PKx;Calculate decryption public key PKE=SKE*G, use SKIDTo (PKS | | PKE | | the effective date | | the Expiration Date | | IDorg| | ID) signature, identified
S107 issues mark and entity key:IMC utilizes PKhSKE is encrypted to obtain E (PKh, SKE), by E (PKh,SKE)With markIt is sent to entity;
S108 entities receive mark and key, combined signature private key:Utilize SKhTo E (PKh, SKE) it is decrypted to obtain SKE, willSKE obtains part signature private key SKS1 after entering line translation, by SKS1 and secret value xID, securely held SKS and SKE.
Further, it is specific to the verification step of server end mark and user terminal mark in step S2 and S4For:
S201 uses public key matrix and entity ID computational entities mark public key;
S202 is using public key verifications mark is identified, if checking is correct, mark effectively gives by otherwise identifying invalid obstructedCross;
The public key that S203 is obtained in mark after being verified is verified to signed data.
Beneficial effects of the present invention:The present invention realizes user terminal and server using IKI safety means as carrier, by markThe two-way authentication at end, the security of single-node login system is improved, give a kind of identity identifying method of high intensity.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to institute in embodimentThe accompanying drawing needed to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the present inventionExample, for those of ordinary skill in the art, on the premise of not paying creative work, can also be obtained according to these accompanying drawingsObtain other accompanying drawings.
Fig. 1 is the system being related in the single-point logging method based on IKI ID authentications described according to embodiments of the present inventionOrganization Chart;
Fig. 2 is generation mark and key in the single-point logging method based on IKI ID authentications described according to embodiments of the present inventionFlow chart
Fig. 3 is the system principle being related in the single-point logging method based on IKI ID authentications described according to embodiments of the present inventionFigure;Fig. 4 is the flow that mark is verified in the single-point logging method based on IKI ID authentications described according to embodiments of the present inventionFigure;
Fig. 5 is the flow chart of the single-point logging method based on IKI ID authentications described according to embodiments of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, completeSite preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based onEmbodiment in the present invention, the every other embodiment that those of ordinary skill in the art are obtained, belong to what the present invention protectedScope.
As shown in figure 5, a kind of single-point logging method based on IKI ID authentications described according to embodiments of the present invention, bagInclude following steps:
S1 user terminals send access request to server, produce random number r, and service end is sent collectively to together with user terminal mark;
S2 server ends are verified to user terminal mark, and by rear, server end produces random number R, and random with user terminalNumber r is combined, for (R | | r), signed with server end private key, generation signed data Sig1;
Random number R, server end mark, signed data Sig1 are sent to user terminal by S3 server ends;
S4 user terminal authentication servers end is identified, and the public key verifications signed data in server identification is utilized after being verifiedSig1, it is verified rear confirmed service device end identity legitimacy;
S5 user terminals are signed using private key to random number (R | | r), generate signed data Sig2, signed data Sig2 is sent outIt is sent to server end;
S6 server by utilizing user terminal public key verifications signed data Sig2, user terminal identity legitimacy is confirmed after being verified;
S7 server end login authentications equipment checks user's single-sign-on mapping table, finds out user mark in corresponding application systemThe account bound on system, User Token is produced, is re-introduced into application system;
S8 application systems receive the User Token of unified form, login account of the user in the system are obtained, by user at thisThe state of system is set to login, returns to the page that user asks to access, completes access of the user to the application system.
In one particular embodiment of the present invention, administrative center is identified by IKI and produces the server end mark, useFamily end mark, private key and public key.
In one particular embodiment of the present invention, server end mark, user terminal mark, private key and public keyProduction stage is:
S101IKI marks administrative center IMC discloses parameter:Public key matrix PKMS, identify administrative center public key PKIDorg, ECC songsLine, basic point G;Wherein public key matrix PKMS is mark administrative center private key SKIDorgTo public key matrix pkm, mark administrative center markKnow IDorgEtc. the signature of parameter;
S102 entities produce entity ID and relevant parameter:Secret value xID, secret value public key PKx are produced using entity security equipment=xID*G, unsymmetrical key is randomly generated to SK using ECC algorithmh、PKh
The partial parameters that S103 encryptions need to upload:Use mark administrative center public key PKIDorgTo secret value public key PKx and at randomUnsymmetrical key public key PKhEncryption:E(PKIDorg,PKx||PKh);
S104 uploads entity ID, E (PKIDorg,PKx||PKh) and mark validity date extremely mark administrative center IMC;Wherein identifyValidity date is to be necessary to determine whether to upload according to application;
S105 marks administrative center carries out entity ID duplicate checkings, produces entity part private key:IMC determines that entity ID combination marks are effectiveAfter the uniqueness of phase, using PKMS and entity ID, the mark term of validity, entity ID public keys PK is calculatedID, utilize private key matrix skmWith entity ID, mark term of validity computational entity ID private keys SKID, entity encryption key SKE and part signature is obtained after SKE is convertedPrivate key SKS1;
S106 mark administrative center IMC assembling marks:Use mark management organization private key SKIDorgDecrypt E (PKIDorg,PKx||PKh) obtain PKx and PKh, composite entity ID public signature keys:PKS=SKS1*G+PKx;Decryption public key PKE=SKE*G is calculated, is usedSKIDTo (PKS | | PKE | | the effective date | | the Expiration Date | | IDorg| | ID) signature, identified
S107 issues mark and entity key:IMC utilizes PKhSKE is encrypted to obtain E (PKh, SKE), by E (PKh,SKE)With markIt is sent to entity;
S108 entities receive mark and key, combined signature private key:Utilize SKhTo E (PKh, SKE) it is decrypted to obtain SKE, willSKE obtains part signature private key SKS1 after entering line translation, by SKS1 and secret value xID, securely held SKS and SKE.
In one particular embodiment of the present invention, in step S2 and S4, to server end mark and user terminalThe verification step of mark is specially:
S201 uses public key matrix and entity ID computational entities mark public key;
S202 is using public key verifications mark is identified, if checking is correct, mark effectively gives by otherwise identifying invalid obstructedCross;
The public key that S203 is obtained in mark after being verified is verified to signed data.
In order to facilitate understand the present invention above-mentioned technical proposal, below by way of in specifically used mode to the present invention it is above-mentionedTechnical scheme is described in detail.
As shown in figure 1, it is the system involved by a kind of single-point logging method based on IKI ID authentications of the present inventionOrganization Chart, single-node login system framework include user security equipment and are arranged at safety means and the login authentication of server endPrivate key, user's mark and the public key matrix of user, server side security equipment are stored with equipment, wherein user end security equipmentIn be stored with the private key, server identification and public key matrix of server.The user security equipment is the USB- for including IKI chipsKEY or IC-card, server side security equipment are the server password machine comprising PCIe cipher cards or signature sign test server.UserAll include IKI algorithm units in end and server side security equipment, be responsible for reading in user terminal and server side security equipmentMark, the checking mark flow for authenticating ID such as legitimacy and private key signature, public key sign test name.
As shown in Fig. 2 used first according to each based on IKI chip identifications authentication center in above-mentioned single-node login system frameworkThe entity identities (can customize, using name, organization etc., need to ensure its uniqueness) at family produce key and mark for it,Comprise the following steps that:
S101IKI marks administrative center IMC discloses parameter:Public key matrix PKMS, identify administrative center public key PKIDorg, ECC songsLine, basic point G;Wherein public key matrix PKMS is mark administrative center private key SKIDorgTo public key matrix pkm, mark administrative center markKnow IDorgEtc. the signature of parameter;
S102 entities produce entity ID and relevant parameter:Secret value xID, secret value public key PKx are produced using entity security equipment=xID*G, unsymmetrical key is randomly generated to SK using ECC algorithmh、PKh
The partial parameters that S103 encryptions need to upload:Use mark administrative center public key PKIDorgTo secret value public key PKx and at randomUnsymmetrical key public key PKhEncryption:E(PKIDorg,PKx||PKh);
S104 uploads entity ID, E (PKIDorg,PKx||PKh) and mark validity date extremely mark administrative center IMC;Wherein identifyValidity date is to be necessary to determine whether to upload according to application;
S105 marks administrative center carries out entity ID duplicate checkings, produces entity part private key:IMC determines that entity ID combination marks are effectiveAfter the uniqueness of phase, using PKMS and entity ID, the mark term of validity, entity ID public keys PK is calculatedID, utilize private key matrix skmWith entity ID, mark term of validity computational entity ID private keys SKID, entity encryption key SKE and part signature is obtained after SKE is convertedPrivate key SKS1;
S106 mark administrative center IMC assembling marks:Use mark management organization private key SKIDorgDecrypt E (PKIDorg,PKx||PKh) obtain PKx and PKh, composite entity ID public signature keys:PKS=SKS1*G+PKx;Decryption public key PKE=SKE*G is calculated, is usedSKIDTo (PKS | | PKE | | the effective date | | the Expiration Date | | IDorg| | ID) signature, identified
S107 issues mark and entity key:IMC utilizes PKhSKE is encrypted to obtain E (PKh, SKE), by E (PKh,SKE)With markIt is sent to entity;
S108 entities receive mark and key, combined signature private key:Utilize SKhTo E (PKh, SKE) it is decrypted to obtain SKE, willSKE obtains part signature private key SKS1 after entering line translation, by SKS1 and secret value xID, securely held SKS and SKE.
As shown in Figures 3 and 5, based on above-mentioned single-node login system, user is by user security equipment and user's logging device phaseEven, the login page of server is accessed by user's logging device, prompts user to input PIN code and opens user security equipment, it is defeatedAfter entering PIN code, user security equipment is opened, and now carries out step, realizes single-point logging method of the present invention, toolBody is:
S1 user terminals send access request to server, produce random number r, and service end is sent collectively to together with user terminal mark;
S2 server ends are verified to user terminal mark, and by rear, server end produces random number R, and random with user terminalNumber r are combined (R | | r), are signed with server end private key, generation signed data Sig1;
Random number R, server end mark, signed data Sig1 are sent to user terminal by S3 server ends;
S4 user terminal authentication servers end is identified, and the public key verifications signed data in server identification is utilized after being verifiedSig1, it is verified rear confirmed service device end identity legitimacy;
S5 user terminals are signed using private key to random number (R | | r), generate signed data Sig2, signed data Sig2 is sent outIt is sent to server end;
S6 server by utilizing user terminal public key verifications signed data Sig2, user terminal identity legitimacy is confirmed after being verified;
S7 server end login authentications equipment checks user's single-sign-on mapping table, finds out user mark in corresponding application systemThe account bound on system, User Token is produced, is re-introduced into application system;
S8 application systems receive the User Token of unified form, login account of the user in the system are obtained, by user at thisThe state of system is set to login, returns to the page that user asks to access, completes access of the user to the application system.
In above-mentioned single-point logging method, the verification step to server end mark and user terminal mark is:
S201 uses public key matrix and entity ID computational entities mark public key;
S202 is using public key verifications mark is identified, if checking is correct, mark effectively gives by otherwise identifying invalid obstructedCross;The public key that S203 is obtained in mark after being verified is verified to signed data.
In one particular embodiment of the present invention, the parameter public key matrix PKMS announced when known mark management organization,Now, entity A knows entity B entity ID, markThen the corresponding verification step to server end mark and user terminal mark is specially:
1st, public key matrix PKMS and entity B entity ID are utilizedBComputational entity B mark public keys { PKID}B
2nd, checking mark validity:With entity B mark public key { PKID}BVerify the mark of entity BIf checking is correct, mark is effectively led toCross, otherwise identify and invalid do not pass through;
3rd, the public key obtained after being verified in mark is verified to signed data.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present inventionGod any modification, equivalent substitution and improvements made etc., should be included in the scope of the protection with principle.

Claims (4)

CN201710648422.3A2017-08-012017-08-01Single sign-on method based on IKI identification authenticationActiveCN107454077B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201710648422.3ACN107454077B (en)2017-08-012017-08-01Single sign-on method based on IKI identification authentication

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201710648422.3ACN107454077B (en)2017-08-012017-08-01Single sign-on method based on IKI identification authentication

Publications (2)

Publication NumberPublication Date
CN107454077Atrue CN107454077A (en)2017-12-08
CN107454077B CN107454077B (en)2020-05-19

Family

ID=60490685

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201710648422.3AActiveCN107454077B (en)2017-08-012017-08-01Single sign-on method based on IKI identification authentication

Country Status (1)

CountryLink
CN (1)CN107454077B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109510822A (en)*2018-11-082019-03-22蓝信移动(北京)科技有限公司Obtain the method and system of public and private key
CN110235410A (en)*2017-02-142019-09-13科因普拉格株式会社Replace the method for the login of user using the block chain database of the agreement based on UTXO and by the certification based on PKI and utilizes its server
CN110287685A (en)*2019-06-282019-09-27浪潮云信息技术有限公司KEY authentication method and system based on domestic CPU, operating system and database
CN110321682A (en)*2019-07-082019-10-11国网电子商务有限公司A kind of unified identity authentication method and device based on UAF and IBC
CN110336820A (en)*2019-07-092019-10-15中国联合网络通信集团有限公司 Single sign-out method, apparatus, device, storage medium and system
CN110505207A (en)*2019-07-192019-11-26苏州浪潮智能科技有限公司A kind of single sign-on realization method based on ukey certification
CN110661783A (en)*2019-08-282020-01-07视联动力信息技术股份有限公司Terminal registration method, device and storage medium
CN111698225A (en)*2020-05-282020-09-22国家电网有限公司Application service authentication encryption method suitable for power dispatching control system
CN112039674A (en)*2020-08-062020-12-04珠海格力电器股份有限公司Central control system access and signature identification generation method and device and storage medium
CN112887331A (en)*2021-02-262021-06-01政采云有限公司Bidirectional authentication method, device and equipment between different single sign-on systems
CN116389007A (en)*2023-04-122023-07-04烟台云朵软件有限公司 A code scanning authentication method and system based on PKI system

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102238484A (en)*2010-04-222011-11-09中兴通讯股份有限公司Method and system for group-based authentication in machine to machine communication systems
CN102710605A (en)*2012-05-082012-10-03重庆大学Information security management and control method under cloud manufacturing environment
CN102739687A (en)*2012-07-092012-10-17广州杰赛科技股份有限公司Application service network access method and system based on identifier
CN104378210A (en)*2014-11-262015-02-25成都卫士通信息安全技术有限公司Cross-trust-domain identity authentication method
US20150256530A1 (en)*2014-03-102015-09-10Fujitsu LimitedCommunication terminal and secure log-in method
US20160036793A1 (en)*2013-03-152016-02-04Fujian Landi Commercial Equipment Co., Ltd.Key downloading method, management method, downloading management method, device and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102238484A (en)*2010-04-222011-11-09中兴通讯股份有限公司Method and system for group-based authentication in machine to machine communication systems
CN102710605A (en)*2012-05-082012-10-03重庆大学Information security management and control method under cloud manufacturing environment
CN102739687A (en)*2012-07-092012-10-17广州杰赛科技股份有限公司Application service network access method and system based on identifier
US20160036793A1 (en)*2013-03-152016-02-04Fujian Landi Commercial Equipment Co., Ltd.Key downloading method, management method, downloading management method, device and system
US20150256530A1 (en)*2014-03-102015-09-10Fujitsu LimitedCommunication terminal and secure log-in method
CN104378210A (en)*2014-11-262015-02-25成都卫士通信息安全技术有限公司Cross-trust-domain identity authentication method

Cited By (14)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110235410B (en)*2017-02-142022-05-10科因普拉格株式会社Method for substituting user's login by PKI-based authentication using blockchain database of UTXO-based protocol and server using the same
CN110235410A (en)*2017-02-142019-09-13科因普拉格株式会社Replace the method for the login of user using the block chain database of the agreement based on UTXO and by the certification based on PKI and utilizes its server
CN109510822A (en)*2018-11-082019-03-22蓝信移动(北京)科技有限公司Obtain the method and system of public and private key
CN110287685A (en)*2019-06-282019-09-27浪潮云信息技术有限公司KEY authentication method and system based on domestic CPU, operating system and database
CN110321682A (en)*2019-07-082019-10-11国网电子商务有限公司A kind of unified identity authentication method and device based on UAF and IBC
CN110336820A (en)*2019-07-092019-10-15中国联合网络通信集团有限公司 Single sign-out method, apparatus, device, storage medium and system
CN110505207A (en)*2019-07-192019-11-26苏州浪潮智能科技有限公司A kind of single sign-on realization method based on ukey certification
CN110661783A (en)*2019-08-282020-01-07视联动力信息技术股份有限公司Terminal registration method, device and storage medium
CN110661783B (en)*2019-08-282022-04-26视联动力信息技术股份有限公司 A terminal registration method, device and storage medium
CN111698225A (en)*2020-05-282020-09-22国家电网有限公司Application service authentication encryption method suitable for power dispatching control system
CN112039674A (en)*2020-08-062020-12-04珠海格力电器股份有限公司Central control system access and signature identification generation method and device and storage medium
CN112887331A (en)*2021-02-262021-06-01政采云有限公司Bidirectional authentication method, device and equipment between different single sign-on systems
CN112887331B (en)*2021-02-262022-07-08政采云有限公司 A two-way authentication method, device and equipment between different single sign-on systems
CN116389007A (en)*2023-04-122023-07-04烟台云朵软件有限公司 A code scanning authentication method and system based on PKI system

Also Published As

Publication numberPublication date
CN107454077B (en)2020-05-19

Similar Documents

PublicationPublication DateTitle
CN107454077A (en)A kind of single-point logging method based on IKI ID authentications
KR100962399B1 (en) Anonymous public key infrastructure provision method and service provision method using same
CN104601593B (en)The method that anti-tracking in network electronic authentication procedures is realized based on challenge mode
CN103780618B (en) A Cross-Heterogeneous Domain Identity Authentication and Session Key Agreement Method Based on Access Authorization Ticket
US8112787B2 (en)System and method for securing a credential via user and server verification
US8219808B2 (en)Session-based public key infrastructure
CN1889432B (en) Password remote authentication method based on smart card, smart card, server and system
CN103699920B (en)RF identification mutual authentication method based on elliptic curve
CN109450843B (en) A blockchain-based SSL certificate management method and system
US20110213959A1 (en)Methods, apparatuses, system and related computer program product for privacy-enhanced identity management
CN102577301A (en) Method and apparatus for trusted authentication and login
TW201426383A (en)System and method for identifying users
CN105072110A (en)Two-factor remote identity authentication method based on smart card
CN1925393A (en)Point-to-point network identity authenticating method
Alzuwaini et al.An Efficient Mechanism to Prevent the Phishing Attacks.
WO2008020991A2 (en)Notarized federated identity management
KR102157695B1 (en)Method for Establishing Anonymous Digital Identity
KR20090017839A (en) Electronic signature wireless authentication service system and method using mobile terminal
CN119583157A (en) Device access method, device, authentication server and storage medium
CN106789977A (en)A kind of method and system that handset token is realized based on Secret splitting
EP2359525B1 (en)Method for enabling limitation of service access
CN101471775B (en)Authentication method for MS and BS of WiMAX system
CN115865520B (en)Authentication and access control method with privacy protection in mobile cloud service environment
CN116800491A (en) Secure cross-service platform identity authentication method based on digital certificates
CN110855444A (en) A pure software CAVA identity authentication method based on trusted third party

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant
TR01Transfer of patent right
TR01Transfer of patent right

Effective date of registration:20221111

Address after:017010 No. 1, No. 4, Dongwei Second Road North, Ordos, Inner Mongolia Autonomous Region (the fifth floor of the original Huatai Automobile Factory office building)

Patentee after:Erdos Dimanson Cryptography Technology Co.,Ltd.

Address before:100012 unit 402, building 1, yard 5, Laiguangying West Road, Wangjing Chengying center, Chaoyang District, Beijing

Patentee before:BEIJING DIMANSEN TECHNOLOGY Co.,Ltd.


[8]ページ先頭

©2009-2025 Movatter.jp