CN100574193C - Method, system and third party website, service server that the switching third party lands - Google Patents

Method, system and third party website, service server that the switching third party lands Download PDF

Info

Publication number
CN100574193C
CN100574193C CNB200610137614XA CN200610137614A CN100574193C CN 100574193 C CN100574193 C CN 100574193C CN B200610137614X A CNB200610137614X A CN B200610137614XA CN 200610137614 A CN200610137614 A CN 200610137614A CN 100574193 C CN100574193 C CN 100574193C
Authority
CN
China
Prior art keywords
website
party
service server
request
party website
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CNB200610137614XA
Other languages
Chinese (zh)
Other versions
CN1946022A (en
Inventor
沈庆春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNB200610137614XA priority Critical patent/CN100574193C/en
Publication of CN1946022A publication Critical patent/CN1946022A/en
Application granted granted Critical
Publication of CN100574193C publication Critical patent/CN100574193C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention provides the method that a kind of IP based network switching third party lands, its key is, carry the encryption KEY that service server generates at random by portal website and send linking request, avoided the transmission of user cipher, thereby guaranteed the being perfectly safe property of user cipher to the third party website.Have again,, thereby guaranteed the being perfectly safe property of shaking hands again because the third party website is carried out key authentication by copying encrypted KEY readjustment Web server by Web server.Use the present invention, owing to do not transmit user cipher between portal website and the third party website, make the third party website need not to carry out the processing of mechanism such as cryptosync with portal website, when improving fail safe greatly, reduced of the requirement of third party website for complex maintenance such as cryptosync mechanism.The present invention also provides a kind of IP based network to realize system and the third party website and the service server of switching third party debarkation authentication simultaneously.

Description

Method, system and third party website, service server that the switching third party lands
Technical field
The present invention relates to communication technical field, be meant a kind of method, system and third party website, service server of IP based network realization switching third party debarkation authentication especially.
Background technology
Along with networks development, various needs land the website of registration and emerge in an endless stream, the user is in these websites, need registered user name and password so that land, so just cause, a user has the website of increasing needs input username and password authentication gradually, and the memory of password becomes the problem of a headache, and the user often can't land some website even can't land the individual maintenance software that need land checking because forget Password.
Along with the appearance of problem, the notion of portal website is proposed gradually, for example by portal website to other websites of personal user or need land the software unified management of checking.
Figure 1 shows that the schematic flow sheet of existing IP based network realization switching third party debarkation authentication.
Step 101~102, the user inputs door website user name and password, lands portal website by browser, returns after portal website is proved to be successful it and lands rear interface, so far lands success.
If the user wishes to land other third party websites (Web), for example certain CRBT website is provided with download etc., and then the user only need click this third party website, and this moment, portal website carried out following operation.
Step 103 is not being re-entered under the username and password situation in order to make the user, can directly land the third party website.Usually portal website adopts HTTP: //IP:Port? account number=? ﹠amp; Password=? mode is that number of the account and password are sent to the third party website with user name.
Step 104, third party website are resolved the request receive, obtain account number, password wherein and verify, if authentication verification is passed through, then return success message, and return the page after the third party website is landed; If error message is then returned in authentication identification.
Hypothesis is landed success in the present embodiment.
Step 105, portal website lands the website, back with the third party who receives and returns to browser, and the user sees the third party website after the click.
So far, after the user signs in to portal website,, can directly sign in to the third party website not needing to input once more under the situation of number of the account and password.As seen, be based on the HTTP(Hypertext Transport Protocol) mode at present and directly carry out the transmission of account number and password, though can transmit by the password encryption transmission and by the security mechanism of hypertext transfer protocol secure (HTTPS), but can't avoid the hacker to issue the third party website in this HTTP request of network interception and forgery, thereby make the hacker easyly to land the third party website, destroy data with certain user identity.And password needs synchronously the third party to be required height.Account number and password are transmitted by portal website, and authentication need be carried out based on this account number and password in the third party website, and can not require to re-enter by the user simultaneously, therefore need preserve identical account number and password in portal website simultaneously with the third party website, when the user after password is revised by portal website, also need to carry out real-time update to the third party website synchronously.
Summary of the invention
The purpose of the embodiment of the invention is to provide a kind of IP based network to realize method, system and third party website, the service server of switching third party debarkation authentication, to guarantee to realize transferring the third party website under the situation that user cipher is perfectly safe.
The embodiment of the invention provides a kind of IP based network to realize the method for switching third party debarkation authentication, and this method comprises:
What portal website received self terminal lands third party's web site requests, obtains encryption key KEY from service server WebServer, sends linking request to the third party website, comprises encryption key and described terminal iidentification in this request;
The third party website sends the checking request according to the linking request that receives to described service server, comprise the encryption key and the described terminal iidentification that receive in this request, the third party website receive service server feedback be proved to be successful information after, the interface after the login is returned to terminal by portal website;
Described terminal logs on the third party website by portal website's switching.
The embodiment of the invention also provides a kind of IP based network to realize the system of switching third party debarkation authentication, comprises terminal, portal website, service server and third party website, wherein,
Described portal website is used for landing third party's web site requests according to what come self terminal, obtains encryption key KEY from service server Web Server, sends the linking request that comprises encryption key and terminal iidentification to the third party website; The interface from after the login of third party website that receives is transmitted to terminal;
Described third party website, be used for sending to service server and comprise the encryption key that receives and the checking request of described terminal iidentification according to the linking request that receives, receive service server feedback be proved to be successful information after, the interface after the login is returned to portal website;
Described service server is used for according to the checking request that receives encryption key and described terminal iidentification being verified, and returns the checking result for the third party website;
Described terminal is used to land portal website, or logs on the third party website by portal website's switching.
The embodiment of the invention also provides a kind of third party the website, comprises interface unit and main control unit, wherein, described interface unit, the request that is used for receiving sends main control unit to; Send corresponding information according to the notice that receives;
Described main control unit, be used to determine that the request that receives is after the linking request that comprises encryption key and terminal iidentification from portal website, the notification interface unit sends the checking request to service server, comprises the encryption key and the terminal iidentification that receive in this request; Determine the request that receives be from service server be proved to be successful information after, the interface after the notification interface unit will be logined sends portal website to.
The embodiment of the invention also provides a kind of service server, comprises interface unit and main control unit, wherein, described interface unit, the request that is used for receiving sends main control unit to; Send corresponding information according to the notice that receives;
Described main control unit is used to determine that the request that receives is the single sign-on authentication SSO request that comprises terminal iidentification from portal website, generates encryption key, and the notification interface unit returns described encryption key to portal website; After determining to receive the checking request that comprises encryption key and described terminal iidentification, described encryption key and terminal iidentification are verified that the notification interface unit returns authorization information for the third party website from the third party website.
The embodiment of the invention is carried the encryption KEY that service server generates at random by portal website and is sent linking request to the third party website, has avoided the transmission of user cipher, thereby has guaranteed the being perfectly safe property of user cipher.Have again,, thereby guaranteed the being perfectly safe property of shaking hands again because the third party website is carried out key authentication by copying encrypted KEY readjustment Web server by Web server.
Use the present invention, the third party website need not to carry out cryptosync with portal website and handles, and when improving fail safe greatly, has reduced the requirement of third party website for complex maintenance such as cryptosync mechanism.
Description of drawings
Fig. 1 is the schematic flow sheet that Figure 1 shows that existing IP based network realization switching third party debarkation authentication;
Fig. 2 is the schematic flow sheet that the IP based network of one embodiment of the invention is realized switching third party debarkation authentication.
Fig. 3 is the system block diagram that the IP based network of one embodiment of the invention is realized switching third party debarkation authentication;
Fig. 4 is the third party website of one embodiment of the invention;
Fig. 5 is the service server of one embodiment of the invention.
Embodiment
Basic ideas of the present invention are: when portal website switching third party website, the encryption KEY that generates at random based on service server is carried in employing, and no longer carry user's key, thereby when being transferred to the third party website, the safety of Network Transmission can be guaranteed, the trusting relationship between portal website and the third party website can be guaranteed again.
Figure 2 shows that the schematic flow sheet of the IP based network realization switching third party debarkation authentication of one embodiment of the invention.
Step 201~202, land visit portal website by IE, the user inputs individual's registration account number and password lands portal website, return after portal website is proved to be successful it and land rear interface, so far land success, the user can by portal website provide land after the personal management interface carry out attended operation.
When the user manages personal information, there are other integrated management pages to need link, for example exist CRBT to manage the link of self-service maintenance.When the user needs working service, then click the link menus that third party website such as CRBT is managed self-service maintenance, this moment, portal website carried out following operation.
Step 203, portal website sends single sign-on authentication (SSO) request to service server (Web server), comprises the account number of the above-mentioned terminal of login user in this request.
Step 204~205, service server generates character string at random according to the request that receives, and with the character string and the corresponding preservation of above-mentioned terminal account number that generates at random, and the character string after will encrypting returns to portal website.
Step 206, portal website obtains the character string after the encryption that service server returns, and the character string after will encrypting is as the key (KEY) after encrypting (key after following will the encryption abbreviates as and encrypts KEY), afterwards, portal website by network to the third party website, for example CRBT is managed self-service maintaining web, sends the HTTP linking request, comprises in this linking request to encrypt the authentication information that KEY, terminal account number and third party website provide for portal website.This third party website comprises for the authentication information that portal website provides: checking account number and password that the third party website provides for portal website.
Step 207, the third party website receive above-mentioned linking request and check out include encrypt KEY after, whether legal according to the authentication information checking portal website that provides for portal website, after confirming that portal website is legal, utilize the request of http authentication readjustment to send the checking request to service server, comprise the encryption KEY that duplicates again, the terminal account number that receives in this checking request, and the authentication information that provides for the third party website of service server.And the service server in this step is the Web server address of the prior appointment that has configured.Above-mentioned service server comprises for the authentication information that the third party website provides: checking account number and password that service server provides for the third party website.
Step 208~209, after service server is resolved the above-mentioned checking request that receives, whether legal according to the authentication information checking third party website that provides for the third party website, after confirming that the third party website is legal, again the encryption KEY and the described terminal account number that receive are verified.
Service server is encrypted the process that KEY and terminal account number verify and is comprised receiving:
After service server receives and encrypts KEY and terminal account number, be decrypted encrypting KEY, obtain the character string after the deciphering, corresponding relation between the terminal account number of judging the character string after this deciphering and receiving, whether consistent with the corresponding relation of character string of having preserved and terminal account number, if it is consistent, return the information of being proved to be successful then for the third party website, otherwise show authentication failed, return authentication failed information for the third party website.
Above-mentioned to the process of encrypting the KEY deciphering actual be with step 204 in inverse process that character string is encrypted, this encryption and decryption process can be used existing any encryption and decryption mode.
Step 210, third party website receive feedback be proved to be successful information after, with the login after the interface return to portal website.
Step 211, the interface after portal website will login is transmitted to the user browser on the terminal.
So far, user terminal has successfully logged on the third party website by IE.
As seen, because encryption KEY that Web server institute generates at random carries to third party website transmission linking request in portal website, avoided the transmission of user cipher, thereby guaranteed the being perfectly safe property of user cipher.The third party website is carried out key authentication by copying encrypted KEY readjustment Web server by Web server, has guaranteed the being perfectly safe property of shaking hands again.
Have again, owing to do not transmit user cipher between portal website and the third party website, make the third party website need not to carry out the processing of mechanism such as cryptosync, when improving fail safe greatly, reduced to of the requirement of third party website for complex maintenance such as cryptosync mechanism with portal website.
In the above-mentioned steps 206, this linking request that portal website sends to the third party website is to realize by self-service management URL(uniform resource locator) (URL, the Uniform ResourceLocator) interface that the third party website is called by portal website.The explanation of relevant this interface is referring to table 1:
Table 1
Figure C20061013761400111
To send the checking request to service server be to realize by the KEY authentication interface of third party website readjustment service server in third party's website use http authentication readjustment request in the above-mentioned steps 207, and the explanation of relevant this interface is referring to table 2:
Table 2
Figure C20061013761400121
It is emphasized that: for preventing malicious attack, the checking that initiate the third party website must arrive the service server of designated domain name or IP address and be verified, can not resolve the IP address or the domain name of the non-appointment that initiation application side provides.
More than be to realize preferred embodiment of the present invention, certainly, the implementation that simplification also can be arranged, such as, in above-mentioned steps 206, can not comprise the authentication information that the third party website provides for portal website, and/or, the authentication information that service server provides for the third party website in above-mentioned steps 207, do not comprised, though can realize the object of the invention equally like this, fail safe is bad.
Be that example describes more than with the terminal account number, in actual applications can also be for the newly-generated indications of terminal is not limited to necessarily use the terminal account number, visible so long as can show the terminal iidentification of terminal and get final product.
The present invention also provides a kind of IP based network to realize the system of switching third party debarkation authentication, referring to Fig. 3, comprises terminal 310, portal website 320, service server 330 and third party website 340, wherein,
Portal website 320 is used for landing third party's web site requests according to what come self terminal 310, obtains encryption key (KEY) from service server (Web Server) 330, sends the linking request that comprises encryption key and terminal iidentification to third party website 340; The interface from after the login of third party website 340 that receives is transmitted to terminal 310; This terminal iidentification can be the terminal account number, or is the newly-generated identifier of terminal;
Third party website 340 is used for sending to service server 330 according to the linking request that receives and comprises the encryption key that receives and the checking request of terminal iidentification, receive service server 330 feedback be proved to be successful information after, the interface after the login is returned to portal website 320;
Service server 330 is used for encryption key and terminal iidentification being verified, and being returned the checking result to third party's net 340 stations according to the checking request that receives;
Terminal 310 is used to land portal website 320, or logs on third party website 340 by portal website's 320 switchings.
Portal website 320 can also comprise in the linking request that third party website 340 sends: the authentication information that third party website 340 provides for portal website 320; At this moment, after third party website 340 receives described linking request, earlier according to the authentication information checking portal website that provides for portal website 320 320 legal after, send the checking request to service server 330 again.
Third party website 340 further comprises in the checking request that service server 330 sends: the authentication information that service server 330 provides for third party website 340; At this moment, after service server 330 receives described checking request, also be used for according to the authentication information checking third party website that provides for third party website 340 340 legal after, again the encryption key and the terminal iidentification that receive are verified.
The present invention also provides a kind of third party the website, referring to Fig. 4, comprises interface unit 341 and main control unit 342, wherein,
Interface unit 341, the request that is used for receiving sends main control unit 342 to; Send corresponding information according to the notice that receives;
Main control unit 342, be used to determine that the request that receives is after the linking request that comprises encryption key and terminal iidentification from portal website, notification interface unit 341 sends the checking request to service server, comprises encryption key and the terminal iidentification that receives in this checking request; Determine the request that receives be from service server be proved to be successful information after, the interface after notification interface unit 341 will be logined sends portal website to.
Also comprise in the linking request that main control unit 342 receives: the authentication information that the third party website provides for portal website from portal website; At this moment, main control unit 342 also be used for according to the authentication information checking portal website that provides for portal website legal after, reinform interface unit 341 and send the checking request to service server.
In addition, main control unit 342 notification interface unit 341 can also comprise in the checking request that service server sends: the authentication information that service server provides for described third party website.
The present invention also provides a kind of service server, referring to Fig. 5, comprises interface unit 331 and main control unit 332, wherein,
The request that interface unit 331 is used for receiving sends main control unit 332 to, sends corresponding information according to the notice that receives;
Main control unit 332 is used to determine that the request that receives is the single sign-on authentication SSO request that comprises terminal iidentification from portal website, generates encryption key, and notification interface unit 331 returns described encryption key to portal website; After determining to receive the checking request that comprises encryption key and terminal iidentification, described encryption key and terminal iidentification are verified that notification interface unit 331 returns authorization information for the third party website.
Can also comprise in the checking request that main control unit 332 receives: the authentication information that service server provides for described third party website from the third party website; At this moment, main control unit 332 is verified described encryption key and terminal iidentification after also being used for verifying that according to the authentication information that provides for the third party website described third party website is legal again.
The above is preferred embodiment of the present invention only, is not to be used to limit protection scope of the present invention.All any modifications of being done within the spirit and principles in the present invention, be equal to replacement, improvement etc., all be included in protection scope of the present invention.

Claims (16)

1, a kind of IP based network is realized the method for switching third party debarkation authentication, it is characterized in that this method comprises:
What portal website received self terminal lands third party's web site requests, obtains encryption key KEY from service server WebServer, sends linking request to the third party website, comprises encryption key and described terminal iidentification in this linking request;
The third party website sends the checking request according to the linking request that receives to described service server, comprise the encryption key and the described terminal iidentification that receive in this request, the third party website receive service server feedback be proved to be successful information after, the interface after the login is returned to terminal by portal website;
Described terminal logs on the third party website by portal website's switching.
2, method according to claim 1 is characterized in that, described portal website obtains encryption key from service server process comprises:
Portal website sends single sign-on authentication SSO request to service server; Comprise described terminal iidentification in this request;
Service server generates character string at random according to the request that receives, and with the corresponding preservation with described terminal iidentification of character string that generates at random, and will return to portal website after this character string encryption;
Portal website obtains the character string after the described encryption, and the character string after this is encrypted is as encryption key.
3, method according to claim 2 is characterized in that, service server comprises the process that receives encryption key and described terminal iidentification and verify:
After service server receives encryption key and described terminal iidentification, encryption key is decrypted, obtain the character string after the deciphering, character string after this deciphering is verified, if checking is passed through, return the information of being proved to be successful for the third party website, otherwise return authentication failed information for the third party website.
4, method according to claim 1 is characterized in that,
Described portal website also comprises in the linking request that the third party website sends: the authentication information that the third party website provides for described portal website;
After described third party website receives described linking request, further comprise: verify according to the authentication information that provides for portal website whether described portal website legal, confirm that described portal website is legal after, send the checking request to service server again.
5, method according to claim 4 is characterized in that, described third party website comprises for the authentication information that described portal website provides: checking account number and password that the third party website provides for described portal website.
6, according to claim 1 or 4 described methods, it is characterized in that,
Described third party website further comprises in the checking request that service server sends: the authentication information that service server provides for described third party website;
After described service server receives described checking request, further comprise: verify according to the authentication information that provides for described third party website whether described third party website is legal, after confirming that described third party website is legal, again the encryption key and the described terminal iidentification that receive are verified.
7, method according to claim 6 is characterized in that, described service server comprises for the authentication information that described third party website provides: checking account number and password that service server provides for described third party website.
8, method according to claim 1 is characterized in that, described terminal iidentification comprises the terminal account number, or is included as the newly-generated identifier of described terminal.
9, a kind of IP based network is realized the system of switching third party debarkation authentication, comprises terminal, portal website, service server and third party website, it is characterized in that,
Described portal website is used for landing third party's web site requests according to what come self terminal, obtains encryption key KEY from service server Web Server, sends the linking request that comprises encryption key and terminal iidentification to the third party website; The interface from after the login of third party website that receives is transmitted to terminal;
Described third party website, be used for sending to service server and comprise the encryption key that receives and the checking request of described terminal iidentification according to the linking request that receives, receive service server feedback be proved to be successful information after, the interface after the login is returned to portal website;
Described service server is used for according to the checking request that receives encryption key and described terminal iidentification being verified, and returns the checking result for the third party website;
Described terminal is used to land portal website, or logs on the third party website by portal website's switching.
10, system according to claim 9 is characterized in that,
Described portal website also comprises in the linking request that the third party website sends: the authentication information that the third party website provides for described portal website;
After described third party website receives described linking request, after the authentication information that also being used for basis provides for portal website verifies that described portal website is legal, send the checking request to service server again.
11, according to claim 9 or 10 described systems, it is characterized in that,
Described third party website further comprises in the checking request that service server sends: the authentication information that service server provides for described third party website;
After described service server receives described checking request, after the authentication information that also being used for basis provides for described third party website verifies that described third party website is legal, again the encryption key and the described terminal iidentification that receive are verified.
12, a kind of third party website is characterized in that, comprises interface unit and main control unit, wherein,
Described interface unit, the request that is used for receiving sends main control unit to; Send corresponding information according to the notice that receives;
Described main control unit, be used to determine that the request that receives is after the linking request that comprises encryption key and terminal iidentification from portal website, the notification interface unit sends the checking request to service server, comprises the encryption key and the terminal iidentification that receive in this request; Determine the request that receives be from service server be proved to be successful information after, the interface after the notification interface unit will be logined sends portal website to.
13, third party according to claim 12 website is characterized in that,
Also comprise in the linking request that described main control unit receives: the authentication information that the third party website provides for described portal website from portal website;
Described main control unit after the authentication information that also being used for basis provides for portal website verifies that described portal website is legal, reinforms interface unit and sends the checking request to service server.
According to claim 12 or 13 described third party websites, it is characterized in that 14, described main control unit notification interface unit further comprises: the authentication information that service server provides for described third party website in the checking request that service server sends.
15, a kind of service server is characterized in that, comprises interface unit and main control unit, wherein,
Described interface unit, the request that is used for receiving sends main control unit to; Send corresponding information according to the notice that receives;
Described main control unit is used to determine that the request that receives is the single sign-on authentication SSO request that comprises terminal iidentification from portal website, generates encryption key, and the notification interface unit returns described encryption key to portal website; After determining to receive the checking request that comprises encryption key and described terminal iidentification, described encryption key and terminal iidentification are verified that the notification interface unit returns authorization information for the third party website from the third party website.
16, service server according to claim 15 is characterized in that,
Also comprise in the checking request that described main control unit receives: the authentication information that service server provides for described third party website from the third party website;
Described main control unit after the authentication information that also being used for basis provides for the third party website verifies that described third party website is legal, is verified described encryption key and terminal iidentification again.
CNB200610137614XA 2006-10-31 2006-10-31 Method, system and third party website, service server that the switching third party lands Active CN100574193C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB200610137614XA CN100574193C (en) 2006-10-31 2006-10-31 Method, system and third party website, service server that the switching third party lands

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB200610137614XA CN100574193C (en) 2006-10-31 2006-10-31 Method, system and third party website, service server that the switching third party lands

Publications (2)

Publication Number Publication Date
CN1946022A CN1946022A (en) 2007-04-11
CN100574193C true CN100574193C (en) 2009-12-23

Family

ID=38045246

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB200610137614XA Active CN100574193C (en) 2006-10-31 2006-10-31 Method, system and third party website, service server that the switching third party lands

Country Status (1)

Country Link
CN (1) CN100574193C (en)

Families Citing this family (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101350717B (en) * 2007-07-18 2011-04-27 中国移动通信集团公司 Method and system for logging on third party server through instant communication software
CN101127603B (en) * 2007-08-16 2010-08-04 中兴通讯股份有限公司 A method for single point login of portal website and IMS client
CN101159557B (en) * 2007-11-21 2010-09-29 华为技术有限公司 Single point logging method, device and system
CN101499904A (en) * 2008-02-01 2009-08-05 华为技术有限公司 Method, apparatus and system for safe interface call
CN101478396B (en) * 2008-12-04 2011-06-15 黄希 Uni-directional cross-domain identity verification based on low correlation of private cipher key and application thereof
CN101510888B (en) * 2009-03-19 2011-11-09 阿里巴巴集团控股有限公司 Method, device and system for improving data security for SaaS application
CN101610502B (en) * 2009-07-23 2011-01-26 江苏鸿信系统集成有限公司 Method for mobile information integration based on different business systems of mobile application portal
CN102082775A (en) * 2009-11-27 2011-06-01 中国移动通信集团公司 Method, device and system for managing subscriber identity
CN101964791B (en) * 2010-09-27 2014-08-20 北京神州泰岳软件股份有限公司 Communication authenticating system and method of client and WEB application
CN102457546B (en) * 2010-10-27 2014-12-31 中兴通讯股份有限公司 Method, device and system for logging in netty Web application server by single point
CN102638441A (en) * 2011-02-15 2012-08-15 中兴通讯股份有限公司 Method and system for realizing single sign on (SSO) in IP multimedia subsystem (IMS) network
CN102685153B (en) * 2011-03-07 2017-07-14 腾讯科技(深圳)有限公司 Resource platform opens the method and resource platform of third party's service
CN102739708B (en) 2011-04-07 2015-02-04 腾讯科技(深圳)有限公司 System and method for accessing third party application based on cloud platform
CN102882903B (en) 2011-07-12 2017-07-28 腾讯科技(深圳)有限公司 A kind of many website application message acquisition methods and system
CN103036851B (en) * 2011-09-30 2016-05-11 腾讯科技(深圳)有限公司 Use processing method, system and the server of sharing account number login third party website
JP5485246B2 (en) * 2011-11-05 2014-05-07 京セラドキュメントソリューションズ株式会社 Image forming apparatus
WO2013075661A1 (en) * 2011-11-23 2013-05-30 腾讯科技(深圳)有限公司 Login and open platform identifying method, open platform and system
CN102821085B (en) * 2011-11-23 2015-12-02 腾讯科技(深圳)有限公司 Third party authorizes login method, open platform and system
CN102404336B (en) * 2011-12-12 2014-08-13 北京像素软件科技股份有限公司 Cross-regional transfer method of users in online games
CN103179099B (en) * 2011-12-23 2016-04-06 北京新媒传信科技有限公司 A kind ofly access the uniform authentication method of open website platform and a kind of website platform
CN103297937A (en) * 2012-03-01 2013-09-11 盛大计算机(上海)有限公司 Method, system and device for achieving short message notification
CN103067381B (en) * 2012-12-26 2015-11-25 百度在线网络技术(北京)有限公司 Usage platform side's account logs in the mthods, systems and devices of third party's service
CN103501230B (en) * 2013-09-29 2017-04-12 北大医疗信息技术有限公司 data authentication system and data authentication method
CN104580184B (en) * 2014-12-29 2017-12-22 华中师范大学 Identity identifying method between mutual trust application system
CN106549905A (en) * 2015-09-16 2017-03-29 北京国双科技有限公司 Data capture method, system, client and server
CN105472015A (en) * 2015-12-22 2016-04-06 广州华多网络科技有限公司 Method and device for accessing cloud platform to third-party application
US20190034547A1 (en) * 2016-01-26 2019-01-31 Gum Cheol KIM Internet portal system and method of use therefor
CN108337212A (en) * 2017-01-19 2018-07-27 中国移动通信有限公司研究院 A kind of terminal trustship method, terminal, server and system
CN107370761B (en) * 2017-08-31 2020-12-01 中国航空工业集团公司沈阳飞机设计研究所 LCA system security and secrecy management method
CN108197480A (en) * 2017-12-12 2018-06-22 泰康保险集团股份有限公司 Access control method, device and computer readable storage medium
CN108111518B (en) * 2017-12-28 2021-02-02 北京天诚安信科技股份有限公司 Single sign-on method and system based on secure password proxy server
CN110290150A (en) * 2019-07-17 2019-09-27 秒针信息技术有限公司 A kind of login validation method and login authentication device of Virtual Private Network VPN
CN112738030B (en) * 2020-12-16 2021-09-14 重庆扬成大数据科技有限公司 Data acquisition and sharing working method for agricultural technicians through big data analysis
CN112671786B (en) * 2020-12-29 2022-06-28 科来网络技术股份有限公司 System and method for safe login based on third party authentication

Also Published As

Publication number Publication date
CN1946022A (en) 2007-04-11

Similar Documents

Publication Publication Date Title
CN100574193C (en) Method, system and third party website, service server that the switching third party lands
CN101207485B (en) System and method of unification identification safety authentication for users
CN101009561B (en) System and method for IMX session control and authentication
CN102651739B (en) Login validation method, system and IM server
CN101350717B (en) Method and system for logging on third party server through instant communication software
US7360079B2 (en) System and method for processing digital documents utilizing secure communications over a network
CN104767731B (en) A kind of Restful move transactions system identity certification means of defence
US20040199768A1 (en) System and method for enabling enterprise application security
CN101651666A (en) Method and device for identity authentication and single sign-on based on virtual private network
JP5602165B2 (en) Method and apparatus for protecting network communications
EP3161994A1 (en) Method of mutual verification between a client and a server
CN110933078B (en) H5 unregistered user session tracking method
KR20060100920A (en) Trusted third party authentication for web services
CN103944900A (en) Cross-station request attack defense method and device based on encryption
CN103986584A (en) Double-factor identity verification method based on intelligent equipment
EP2979420B1 (en) Network system comprising a security management server and a home network, and method for including a device in the network system
JP2007293760A (en) Single sign-on cooperation method and system using individual authentication
CN102209046A (en) Network resource integration system and method
CN104683306A (en) Safe and controllable internet real-name certification mechanism
CN1842993A (en) Providing credentials
CN101222335A (en) Cascade connection authentication method and device between application systems
CN102811225A (en) Method and switch for security socket layer (SSL) intermediate agent to access web resource
KR20070109040A (en) System and method for secure web service using double enforcement of user authentication
WO2007078037A1 (en) Web page protection method employing security appliance and set-top box having the security appliance built therein
CN102208980A (en) Communication method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant