CN107659412A - A kind of method of dynamical assemble certification chain - Google Patents
A kind of method of dynamical assemble certification chain Download PDFInfo
- Publication number
- CN107659412A CN107659412A CN201710983015.8A CN201710983015A CN107659412A CN 107659412 A CN107659412 A CN 107659412A CN 201710983015 A CN201710983015 A CN 201710983015A CN 107659412 A CN107659412 A CN 107659412A
- Authority
- CN
- China
- Prior art keywords
- authentication
- certification chain
- certification
- different
- chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention is applied to identity security field, there is provided a kind of method of dynamical assemble certification chain, methods described comprise the steps:Authentication method management configuration, including authenticating party religious name, method are realized, method parameter;Logical relation between certification chain information configuration, including certification chain title, the authentication method selection included, each authentication method;Different dynamic authentication chains is distributed into different service applications;Authentication is carried out using dynamic authentication.The method of the dynamical assemble certification chain of the present invention, it is easier authentication method extension, verification process configuration is more flexible, meets different business systems demand, reduces the maintenance cost of authentication procedures.
Description
Technical field
The invention belongs to identity security field, more particularly to a kind of method of dynamical assemble certification chain.
Background technology
During real application systems use, different application systems is different to safety requirements, therefore different
Application system has the demand of self-defined verification process to adapt to its safety requirements.Current authentication method is by application system
Internal fixed flow and logic realization dual factor anthentication, this system authentication method compare immobilization, add new certification
Method cost is very high, secondly identifying procedure immobilization, and adjustment verification process needs, to that could complete using system upgrade, to change into
Ben Taigao.
The content of the invention
The purpose of the embodiment of the present invention is to provide a kind of method of dynamical assemble certification chain, it is intended to solves in the prior art
The solidification of existing authentication method in systems, adds that new authentication method cost is very high, and identifying procedure solidifies in addition, adjusts certification
Process needs, to that could be completed using system upgrade, the problem of variable cost is too high be present.
The embodiment of the present invention is achieved in that a kind of method of dynamical assemble certification chain, and methods described includes following steps
Suddenly:
Authentication method management configuration;
Certification chain information configuration;
Different dynamic authentication chains is distributed into different service applications;
Authentication is carried out using dynamic authentication.
In the method for dynamical assemble certification chain of the present invention, the authentication method includes authenticating party religious name, method
Realize, method parameter.
In the method for dynamical assemble certification chain of the present invention, the certification chain information includes certification chain title, bag
The authentication method contained selects, the logical relation between each authentication method.
The method of the dynamical assemble certification chain of the present invention, by the configuration of dynamic authentication chain, realizes different application systems
Different authentication method, the business demand of different authentication logic, the configuration of dynamic authentication chain in addition also achieves a variety of different
The logical operation of authentication method in a different order, different is combined;The method of the dynamical assemble certification chain of the present invention
It is easier authentication method extension, verification process configuration is more flexible, and different dynamic authentication chains is distributed into different industry
Business application, meets different business systems demand, while reduce the variable cost of authentication procedures.
Brief description of the drawings
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the method validation process chart of the dynamical assemble certification chain of the present invention.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
Abbreviation and Key Term definition
Dual factor anthentication:User identity is confirmed using a variety of identity identifying methods.
Authentication mode:Under dual factor anthentication scene, the combination of different authentication method.
Certification chain:A variety of authentication method combinations, include authentication method, execution sequence, decision logic.
In a kind of method of dynamical assemble certification chain of the present invention, comprise the steps:
Authentication method management configuration, including authenticating party religious name, method are realized, method parameter;
Patrolling between certification chain information configuration, including certification chain title, the authentication method selection included, each authentication method
The relation of collecting;
Different dynamic authentication chains is distributed into different service applications;
Authentication is carried out using dynamic authentication.
Specifically, the authentication processing flow chart shown in reference picture 1, after starting verification process, obtains application authorization chain first,
If the certification chain through judging to obtain correctly if perform authentication method, if subsequent authentication method after certification success, then continue
Authentication procedure is performed, authentication result is judged if not, identifying procedure terminates;If first time certification is unsuccessful,
Follow-up configuration is if certification is terminated, then identifying procedure terminates, if do not terminated, continues to return to execution authentication procedure.
By the dynamic management configuration of authentication method, different authentication method, the different authentication of different application systems are met
The business demand of logic, by configuring certification chain information, a variety of different authentication methods are realized according to different order, different
Logical operation is combined, and need to add new authentication method relative to the solidification of existing authentication method, or identifying procedure consolidates
Change the authentication mode, it is necessary to application system upgrade, facilitate the extension of authentication method, verification process configuration is flexible, by difference
Dynamic authentication chain distribute to different service applications, meet the demand of different business systems, while reduce authentication
The variable cost of process.
Although being disclosed by above example to the present invention, protection scope of the present invention is not limited thereto,
Under conditions of without departing from present inventive concept, any modification for being made within the spirit and principles of the invention, equivalent substitution
With improve etc. will fall into the present invention claims in.
Claims (3)
- A kind of 1. method of dynamical assemble certification chain, it is characterised in that methods described comprises the steps:Authentication method management configuration;Certification chain information configuration;Different dynamic authentication chains is distributed into different service applications;Authentication is carried out using dynamic authentication.
- 2. the method for dynamical assemble certification chain according to claim 1, it is characterised in that the authentication method includes certification Method name, method are realized, method parameter.
- 3. the method for dynamical assemble certification chain according to claim 1, it is characterised in that the certification chain information includes recognizing Logical relation between card chain title, the authentication method selection included, each authentication method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710983015.8A CN107659412A (en) | 2017-10-18 | 2017-10-18 | A kind of method of dynamical assemble certification chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710983015.8A CN107659412A (en) | 2017-10-18 | 2017-10-18 | A kind of method of dynamical assemble certification chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107659412A true CN107659412A (en) | 2018-02-02 |
Family
ID=61118593
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710983015.8A Pending CN107659412A (en) | 2017-10-18 | 2017-10-18 | A kind of method of dynamical assemble certification chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107659412A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109474630A (en) * | 2018-12-28 | 2019-03-15 | 深圳竹云科技有限公司 | A kind of OAuth agreement authorization method based on dynamic authentication |
CN109492381A (en) * | 2018-09-26 | 2019-03-19 | 深圳竹云科技有限公司 | A kind of JAAS extensible authentication method based on database |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101087342A (en) * | 2006-06-07 | 2007-12-12 | 佳能株式会社 | Data processing apparatus and method |
CN101183943A (en) * | 2007-12-04 | 2008-05-21 | 中兴通讯股份有限公司 | User authentication method |
CN102510337A (en) * | 2011-12-15 | 2012-06-20 | 复旦大学 | Quantitative risk and income self-adaptive dynamic multiple-factor authentication method |
US20140052981A1 (en) * | 2012-08-14 | 2014-02-20 | Verizon Patent And Licensing Inc. | Centralized key management |
CN105229657A (en) * | 2013-05-20 | 2016-01-06 | 三星电子株式会社 | Use the method and apparatus of electronic installation |
-
2017
- 2017-10-18 CN CN201710983015.8A patent/CN107659412A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101087342A (en) * | 2006-06-07 | 2007-12-12 | 佳能株式会社 | Data processing apparatus and method |
CN101183943A (en) * | 2007-12-04 | 2008-05-21 | 中兴通讯股份有限公司 | User authentication method |
CN102510337A (en) * | 2011-12-15 | 2012-06-20 | 复旦大学 | Quantitative risk and income self-adaptive dynamic multiple-factor authentication method |
US20140052981A1 (en) * | 2012-08-14 | 2014-02-20 | Verizon Patent And Licensing Inc. | Centralized key management |
CN105229657A (en) * | 2013-05-20 | 2016-01-06 | 三星电子株式会社 | Use the method and apparatus of electronic installation |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109492381A (en) * | 2018-09-26 | 2019-03-19 | 深圳竹云科技有限公司 | A kind of JAAS extensible authentication method based on database |
CN109474630A (en) * | 2018-12-28 | 2019-03-15 | 深圳竹云科技有限公司 | A kind of OAuth agreement authorization method based on dynamic authentication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170161721A1 (en) | Method and system for opening account based on euicc | |
CN104765999B (en) | Method, terminal and server for processing user resource information | |
CN103428696A (en) | Virtual SIM card achieving method and system and relevant device | |
IL175255A0 (en) | Method for the authentication of applications | |
CN107689870A (en) | Client method for authenticating and system | |
CN107113613B (en) | Server, mobile terminal, network real-name authentication system and method | |
GB0306864D0 (en) | Service provisioning in a communication system | |
CN107888603A (en) | A kind of registration of Internet of Things smart machine, authentication method and Internet of Things | |
CN103685192A (en) | Method and device for limiting calling launched by third-party application | |
CN105262733A (en) | Fingerprint authentication method, cloud server, fingerprint identification method and terminal | |
CN104902465A (en) | Long-distance card-writing method and system for opening an account with the real-name system | |
CN103905194A (en) | Identity traceability authentication method and system | |
CN107659412A (en) | A kind of method of dynamical assemble certification chain | |
CN113112266A (en) | Multi-card processing method and system based on 5G message and block chain | |
CN106452767A (en) | Identity authentication public key management system based access authentication method | |
CN108470452A (en) | A kind of vehicle information management method, system and storage medium based on image recognition | |
CN104580191A (en) | Offline control method and system for smart home | |
CN105469791A (en) | Method and device for processing service | |
CN104239838A (en) | Anti-fake verification method for color two-dimensional code with digital watermark | |
CN105553942A (en) | Method and system of applying jump | |
CN108791188B (en) | Vehicle control method, device and system | |
CN112801253A (en) | Multi-scene one-code communication control method and platform based on block chain | |
CN111865602B (en) | Intelligent energy service system heterogeneous terminal multiparty authentication method and system | |
CN104052754A (en) | ID verification method and system for third-party App | |
CN110719292B (en) | Connection authentication method and system for edge computing equipment and central cloud platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180202 |
|
RJ01 | Rejection of invention patent application after publication |