CN106506498A - A kind of inter-system data calls authorization and authentication method - Google Patents

A kind of inter-system data calls authorization and authentication method Download PDF

Info

Publication number
CN106506498A
CN106506498A CN201610975924.2A CN201610975924A CN106506498A CN 106506498 A CN106506498 A CN 106506498A CN 201610975924 A CN201610975924 A CN 201610975924A CN 106506498 A CN106506498 A CN 106506498A
Authority
CN
China
Prior art keywords
sign
data
token
inter
interim token
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610975924.2A
Other languages
Chinese (zh)
Other versions
CN106506498B (en
Inventor
范联伟
余保华
武永涛
徐圣吉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Sun Create Electronic Co Ltd
Original Assignee
Anhui Sun Create Electronic Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Sun Create Electronic Co Ltd filed Critical Anhui Sun Create Electronic Co Ltd
Priority to CN201610975924.2A priority Critical patent/CN106506498B/en
Publication of CN106506498A publication Critical patent/CN106506498A/en
Application granted granted Critical
Publication of CN106506498B publication Critical patent/CN106506498B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Abstract

The invention belongs to Data Interchange Technology and safety verification technical field, more particularly to a kind of inter-system data calls authorization and authentication method.The present invention generates SysKey by the first system first, and SysKey is sent into single-sign-on services system to obtain interim Token;SysKey and interim Token are sent to second system by single-sign-on services system again;Whether interim Token is sent to single-sign-on services system by second system effective to verify interim Token;The single-sign-on services system returns the result to second system;If interim Token is effectively, the data that the first system needs inquiry are back to the first system;Otherwise, being returned directly to the first system carries out data processing.The present invention ensures the safety of the first system and second system user profile during data call authorization identifying;Two systems are communicated by single-sign-on services system so that the data in two systems in the range of respective system administration authority, effectively prevent the phenomenon generation that data between two systems are reported to the leadship after accomplishing a task respectively.

Description

A kind of inter-system data calls authorization and authentication method
Technical field
The invention belongs to Data Interchange Technology and safety verification technical field, more particularly to a kind of inter-system data is called to be awarded Power authentication method.
Background technology
With the fast development of IT industries, the exploitation of software system not only only considers that demand functionally, client are also got over More to pay attention to the demand of the safety of user profile and data call, therefore the mandate of user and inter-system data are called Authorization identifying becomes particularly important, and as the safety of system is increasingly paid attention to by user, user is hidden for network data Private is also paid much attention to, while research staff is also designed with emphatically relation system safety problem.Therefore, for system login and data Call a much-talked-about topic for also becoming that IT industries are researched and developed emphatically in recent years.
Inter-system data of the prior art calls authorization and authentication method ensure to award in data call between two systems The safety of user profile in verification process is weighed, and reporting to the leadship after accomplishing a task easily occur in the data between system, therefore need a kind of energy of proposition badly Enough ensure that the inter-system data of the safety of user profile calls authorization and authentication method.
Content of the invention
The present invention is in order to overcome the above-mentioned deficiencies of the prior art, there is provided a kind of inter-system data calls authorization identifying side Method, this invention ensures that the safety of user profile during data call authorization identifying between two systems, and two are Data in system in the range of respective system administration authority, will not occur the phenomenon that data are reported to the leadship after accomplishing a task respectively.
For achieving the above object, following technical measures present invention employs:
A kind of inter-system data calls authorization and authentication method, comprises the following steps:
S1, the first system generate SysKey, and the SysKey is sent into single-sign-on services system, the single-sign-on Service system generates interim Token;
SysKey and interim Token are sent to second system by S2, the single-sign-on services system;
Interim Token is back to single-sign-on services system to verify whether interim Token has by S3, the second system Effect;
S4, the single-sign-on services system return the result to second system;
If the interim Token of S5 are effectively, the first system is needed the data of inquiry to be back to the first system by second system; If interim Token is invalid, information invalid for interim Token is returned to the first system by second system, after the first system is done again Continuous process.
Preferably, the first system produces interface by calling the Token of single-sign-on services system, and SysKey is sent Enter Token to produce interface to obtain interim Token.
Preferably, the single-sign-on services system is by calling the user list information interface of second system by SysKey And interim Token is sent to second system.
Preferably, the effective time length of the interim Token is 60 seconds, and is only capable of using once.
Further, if the first system and second system are 30 during inter-system data calls authorization identifying Any data interaction is not carried out in minute, then needs the authorization identifying for re-starting step S1 to step S5.
Further, if the first system did not entered in 30 minutes during inter-system data calls authorization identifying Any operation of row, needs to re-call single-sign-on interface and is verified.
The beneficial effects of the present invention is:
1), the present invention introduces single-sign-on services system between the first system and second system, while the first system With second system when data call authorization identifying is carried out, need to call the Token of single-sign-on services system to produce interface Interim Token is obtained, authorization identifying is carried out to data call by the certification to interim Token, therefore the present invention can be protected The safety of card the first system and second system user profile during data call authorization identifying;And two systems pass through Single-sign-on services system is being communicated so that the data in two systems are respectively in the scope of respective system administration authority Interior, effectively prevent the phenomenon generation that data between two systems are reported to the leadship after accomplishing a task.
Description of the drawings
Fig. 1 is the schematic diagram of data call process between the first system of the invention and second system.
Specific embodiment
Accompanying drawing in below in conjunction with the embodiment of the present invention, to the embodiment of the present invention in technical scheme carry out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiment.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
As shown in figure 1, a kind of inter-system data calls authorization and authentication method, comprise the following steps:
S1, the first system generate SysKey, and the SysKey is sent into single-sign-on services system, the single-sign-on Service system generates interim Token;
SysKey and interim Token are sent to second system by S2, the single-sign-on services system;
Interim Token is back to single-sign-on services system to verify whether interim Token has by S3, the second system Effect;
S4, the single-sign-on services system return the result to second system;
If the interim Token of S5 are effectively, the first system is needed the data of inquiry to be back to the first system by second system; If interim Token is invalid, information invalid for interim Token is returned to the first system by second system, after the first system is done again Continuous process.
The subsequent treatment done by the first system can point out user, the first system to call second system data call mandate Authentification failure, please re-operate.
The first system produces interface by calling the Token of single-sign-on services system, and SysKey is sent into Token Produce interface to obtain interim Token.
The single-sign-on services system and is faced SysKey by calling the user list information interface of second system When Token be sent to second system.
The effective time length of the interim Token is 60 seconds, and is only capable of using once, more than 60 seconds after interim Token Will fail.
During inter-system data calls authorization identifying if the first system and second system in 30 minutes not Any data interaction is carried out, then needs the authorization identifying for re-starting step S1 to step S5.
If the first system did not carry out any behaviour in 30 minutes during inter-system data calls authorization identifying Make, need to re-call single-sign-on interface and verified.
SysKey represents unique mark, with uniqueness;Interim Token is having temporarily for single-sign-on services system generation Effect bill, with ageing, interim Token refers to the token in computer identity certification.
Data when there is data to interact between the first system and second system, between the first system and second system Call and have to carry out authorization identifying, it is ensured that standardization and safety that inter-system data is called, carry out between two systems During data call, user conversation is not relied on.
Such as the first system needs second system timing acquisition business datum, then the first system needs first to generate SysKey, then SysKey is sent into single-sign-on services system to obtain interim Token, the single-sign-on services system will SysKey and interim Token are sent to second system, after second system receives SysKey and interim Token, will be interim Token is sent to single-sign-on services system come the information that whether effectively verifies interim Token and obtain the user, finally sentences The result of disconnected checking, if interim Token is effectively, user can arrive second system timing acquisition business datum;Otherwise, second is Information invalid for interim Token is returned to the first system by system, and the first system does subsequent treatment again.
The inter-system data of the present invention calls authorization and authentication method, introduces single-point between the first system and second system Log-in service system, while the first system and second system are when data call is carried out, needs to call single-sign-on services system Token produce interface obtaining interim Token, authorization identifying is carried out to data call by the certification to interim Token, Therefore the present invention ensure that the safety of the first system and second system user profile during data call authorization identifying; And two systems are communicated by single-sign-on services system so that the data in two systems are respectively in respective system In the range of administration authority, the phenomenon generation that data between two systems are reported to the leadship after accomplishing a task is effectively prevent.Present invention efficiently solves being The problems such as system is logged in and inter-system data calls safety, standardization.

Claims (6)

1. a kind of inter-system data calls authorization and authentication method, it is characterised in that comprise the following steps:
S1, the first system generate SysKey, and the SysKey is sent into single-sign-on services system, the single-sign-on services System generates interim Token;
SysKey and interim Token are sent to second system by S2, the single-sign-on services system;
Whether interim Token is back to single-sign-on services system by S3, the second system effective to verify interim Token;
S4, the single-sign-on services system return the result to second system;
If the interim Token of S5 are effectively, the first system is needed the data of inquiry to be back to the first system by second system;If facing When Token invalid, then information invalid for interim Token is returned to the first system by second system, and the first system does follow-up place again Reason.
2. a kind of inter-system data calls authorization and authentication method as claimed in claim 1, it is characterised in that:The first system Interface is produced by calling the Token of single-sign-on services system, SysKey is sent into Token and is produced interface to obtain temporarily Token.
3. a kind of inter-system data calls authorization and authentication method as claimed in claim 2, it is characterised in that:The single-sign-on Service system by calling the user list information interface of second system that SysKey and interim Token are sent to second is System.
4. a kind of inter-system data as described in claims 1 to 3 any one calls authorization and authentication method, it is characterised in that: The effective time length of the interim Token is 60 seconds, and is only capable of using once.
5. a kind of inter-system data calls authorization and authentication method as claimed in claim 1, it is characterised in that:In inter-system data If the first system did not carried out any data interaction with second system in 30 minutes during calling authorization identifying, then need Re-start the authorization identifying of step S1 to step S5.
6. a kind of inter-system data calls authorization and authentication method as claimed in claim 5, it is characterised in that:In inter-system data If the first system did not carried out any operation in 30 minutes during calling authorization identifying, need to re-call single-point and step on Record interface is verified.
CN201610975924.2A 2016-11-07 2016-11-07 Data call authorization authentication method between systems Active CN106506498B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610975924.2A CN106506498B (en) 2016-11-07 2016-11-07 Data call authorization authentication method between systems

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610975924.2A CN106506498B (en) 2016-11-07 2016-11-07 Data call authorization authentication method between systems

Publications (2)

Publication Number Publication Date
CN106506498A true CN106506498A (en) 2017-03-15
CN106506498B CN106506498B (en) 2020-07-28

Family

ID=58323673

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610975924.2A Active CN106506498B (en) 2016-11-07 2016-11-07 Data call authorization authentication method between systems

Country Status (1)

Country Link
CN (1) CN106506498B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114257583A (en) * 2021-12-22 2022-03-29 贵州东彩供应链科技有限公司 Safe downloading method for solving JWT authorization

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101483525A (en) * 2009-01-22 2009-07-15 中兴通讯股份有限公司 Implementing method for authentication center
WO2012098265A1 (en) * 2011-01-21 2012-07-26 Lionel Wolovitz Method and system for controlling access to networks and/or services
CN103581140A (en) * 2012-08-03 2014-02-12 腾讯科技(深圳)有限公司 Authorization control method, device and system and authorization request method and device
CN103716285A (en) * 2012-09-29 2014-04-09 西门子公司 Single sign on method, proxy server and single sign on system
CN104580184A (en) * 2014-12-29 2015-04-29 华中师范大学 Identity authentication method for mutual-trust application systems
CN105225072A (en) * 2015-11-05 2016-01-06 浪潮(北京)电子信息产业有限公司 A kind of access management method of multi-application system and system
CN105471579A (en) * 2014-09-10 2016-04-06 阿里巴巴集团控股有限公司 Trusted login method and device
CN105721412A (en) * 2015-06-24 2016-06-29 乐视云计算有限公司 Method and device for authenticating identity between multiple systems
US20160205108A1 (en) * 2015-01-13 2016-07-14 Oracle International Corporation Identity management and authentication system for resource access

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101483525A (en) * 2009-01-22 2009-07-15 中兴通讯股份有限公司 Implementing method for authentication center
WO2012098265A1 (en) * 2011-01-21 2012-07-26 Lionel Wolovitz Method and system for controlling access to networks and/or services
CN103581140A (en) * 2012-08-03 2014-02-12 腾讯科技(深圳)有限公司 Authorization control method, device and system and authorization request method and device
CN103716285A (en) * 2012-09-29 2014-04-09 西门子公司 Single sign on method, proxy server and single sign on system
CN105471579A (en) * 2014-09-10 2016-04-06 阿里巴巴集团控股有限公司 Trusted login method and device
CN104580184A (en) * 2014-12-29 2015-04-29 华中师范大学 Identity authentication method for mutual-trust application systems
US20160205108A1 (en) * 2015-01-13 2016-07-14 Oracle International Corporation Identity management and authentication system for resource access
CN105721412A (en) * 2015-06-24 2016-06-29 乐视云计算有限公司 Method and device for authenticating identity between multiple systems
CN105225072A (en) * 2015-11-05 2016-01-06 浪潮(北京)电子信息产业有限公司 A kind of access management method of multi-application system and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114257583A (en) * 2021-12-22 2022-03-29 贵州东彩供应链科技有限公司 Safe downloading method for solving JWT authorization

Also Published As

Publication number Publication date
CN106506498B (en) 2020-07-28

Similar Documents

Publication Publication Date Title
CN101183932B (en) Security identification system of wireless application service and login and entry method thereof
CN104539615B (en) Cascade connection authentication method based on CAS
CN108600203A (en) Secure Single Sign-on method based on Cookie and its unified certification service system
US20120260322A1 (en) Flexible authentication for online services with unreliable identity providers
CN101193027A (en) A single-point login system and method for integrated isomerous system
CN106529979A (en) Enterprise identity authentication method and system
CN104104672A (en) Method for establishing dynamic authorization code based on identity authentication
TW201014315A (en) User identity authentication method, system thereof and identifying code generating maintenance subsystem
CN1731723A (en) Electron/handset token dynamic password identification system
CN103188344A (en) Method for safely invoking REST API (representational state transfer, application programming interface)
CN109274505A (en) A kind of anonymous electronic voting method based on block chain technology
EP3225053B1 (en) Identity and phone number verification
CN107070894A (en) A kind of software integrating method based on enterprise's cloud service platform
CN104079413A (en) Enhancement type one-time dynamic password authentication method and system
CN107277015A (en) Unifying user authentication management method, system, storage medium and server
CN102377573A (en) Double-factor authentication method capable of securely updating password
CN102176712A (en) Identity authentication method and data card
CN101902329A (en) Method and device for single sign on
CN107634834A (en) A kind of trusted identity authentication method based on the more scenes in multiple terminals
CN101626291A (en) ECC algorithm-based identity authentication system and identity authentication method
CN103379093B (en) A kind of method and device for realizing account intercommunication
CN102404112A (en) Access authentication method for credible terminal
CN102510338B (en) System, device and method for security certificate for multi-organization interconnection system
CN103428698B (en) Mobile interchange participant's identity strong authentication method
CN104657860A (en) Mobile banking security authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant