首页> 外国专利> A computer-implemented method of improving security in authentication / authorization systems and their software products

A computer-implemented method of improving security in authentication / authorization systems and their software products

机译:一种提高认证/授权系统及其软件产品安全性的计算机实现方法

摘要

A computer implemented method to improve security in authentication / authorization systems, where a second server (200), in connection with a user's computing device (100), through a second specialized program (102) installed in said computing device is used to manage a status of the accounts that the user (100) has on a first server (300) and a status of the operations defined for a particular account, said account status and said operating status being configured, whenever the user (100) wants, as valid or invalid by the user (100) through the second specialized program (102) and stored in a memory of the second server (200), and said statement of account and said statement of operation by the user (100) once a pairing process with the second server (200) has been completed, said pairing process ensuring the privacy of the user (100), buy The method being: - receiving, by said first server (300), from the user (100) through a first specialized program (101) that includes a browser, a request to log into a service of said first server (300) , said request including the provision of identification information that validates the identity of the user (100) on the first server (300); - authenticating, by said first server (300), said user identification information (100) to authorize said service login request; - request, by the user (100) through the first specialized program (101), once the first server (300) authenticates the service login request, to perform an operation on the first server (300) associated with the requested service; - receiving, by the second server (200), from the first server (300), a request about an operation status associated with what said user (100) has established about said requested operation to help the first server (300) to authorize or reject the requested operation; - verify, by the second server (200), said state of operation previously established by the user (100) for said requested operation; and - in response to said operating state established as valid by the user (100), in addition, performing either an additional authentication factor mechanism, either by the second server (200) or by the first server (300), to strengthen the authorization of said requested operation, wherein said additional authentication factor mechanism includes performing a public / private key encryption process to demonstrate that the user (100) that requires the operation has the private key of a digital certificate or the use of a public / private key to generate a digital signature of an authentication token to show that the user (100) requiring the operation has the private key of a digital certificate.
机译:一种用于提高认证/授权系统中安全性的计算机实现的方法,其中通过安装在所述计算设备中的第二专用程序(102)与用户的计算设备(100)相连的第二服务器(200)用于管理计算机。用户(100)在第一服务器(300)上拥有的帐户的状态以及为特定帐户定义的操作的状态,只要用户(100)希望将所述帐户状态和所述操作状态配置为有效或由用户(100)通过第二专用程序(102)无效或存储在第二服务器(200)的存储器中,并且与用户(100)进行的一次对帐单和所述操作对帐单与第二服务器(200)已经完成,所述配对过程确保用户(100)的隐私,购买该方法是:-所述第一服务器(300)通过第一专用程序从用户(100)接收(101)包含浏览器,登录到所述第一服务器(300)的服务的请求,所述请求包括提供标识信息,所述标识信息在第一服务器(300)上验证用户(100)的身份; -由所述第一服务器(300)认证所述用户标识信息(100)以授权所述服务登录请求; -一旦第一服务器(300)认证了服务登录请求,则用户(100)通过第一专用程序(101)请求在与请求的服务相关联的第一服务器(300)上执行操作; -由第二服务器(200)从第一服务器(300)接收关于与所述用户(100)已经建立的,关于所述请求的操作的内容有关的操作状态的请求,以帮助第一服务器(300)授权或拒绝请求的操作; -由第二服务器(200)验证用户(100)先前为所述所请求的操作建立的所述操作状态; -响应于由用户(100)确定为有效的所述操作状态,另外,由第二服务器(200)或第一服务器(300)执行附加的认证因子机制,以增强授权关于所述请求的操作的信息,其中所述附加的认证因素机制包括执行公共/私有密钥加密过程,以证明要求该操作的用户(100)具有数字证书的私有密钥或使用公共/私有密钥来进行加密。生成认证令牌的数字签名,以表明需要进行操作的用户(100)具有数字证书的私钥。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号