CN104270391A - Method and device for processing access request - Google Patents
Method and device for processing access request Download PDFInfo
- Publication number
- CN104270391A CN104270391A CN201410575265.4A CN201410575265A CN104270391A CN 104270391 A CN104270391 A CN 104270391A CN 201410575265 A CN201410575265 A CN 201410575265A CN 104270391 A CN104270391 A CN 104270391A
- Authority
- CN
- China
- Prior art keywords
- application system
- user
- authentication information
- equations
- mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention provides a method and a device for processing an access request. The method comprises the following steps: after a client side receives a request that a user visits a first application system, the request of visiting the first application system is sent to the first application system, the first application system sends first class of authentication information to an authentication server, and the authentication server allows the user to visit the first application system under the situation that the user is determined to log in a second application system according to the first authentication information, wherein the first application system is different from the second application system. Visibly, if the user logs in the second application system, the user is allowed to visit the first application system without repeatedly inputting a user name, a password and other verification information, so that the use of the user is facilitated.
Description
Technical field
The application relates to network information field, particularly relates to a kind of processing method and device of access request.
Background technology
New technology and the new lifestyle change consumption habit of people, has expedited the emergence of multiple e-commerce platform.The consideration such as user, transaction data safety and technical protection for convenience, large e-commerce platform should have oneself real-time deal communication software, and its main body is instant communication client.
In prior art, user can direct accessed web page by clicking network address in instant communication client, namely when user clicks network address in instant communication client, accessed webpage by browser-presented to user, but this displaying is only limitted to the displaying towards public users, user as need log in, then also need input authentication information in the webpage of browser, log in, visible, said process is not user-friendly.
Application content
The embodiment of the present application provides a kind of processing method and device of access request, after object is to solve and jumps to browser from instant communication client, and the problem of the inconvenient user operation caused because needing user's repeated authentication to log in.
To achieve these goals, the embodiment of the present application provides following technical scheme:
A processing method for access request, comprising:
Authentication server receives first kind authentication information, described first kind authentication information is sent after the request receiving access first application system that described client sends by the first application system, and the request of described access first application system is sent by described client by user;
When determining that described user has logged in the second application system according to described first kind authentication information, described authentication server allows described user to access described first application system, and described first application system is different from described second application system.
Alternatively, described first kind authentication information at least comprises the mark of described user;
Described authentication server determines that described user has logged in the second application system and specifically comprised:
Described queries pre-recorded, whether the difference of the mark that whether there is described user in the user list that logs in described second application system and the request time of described first kind authentication information and the timestamp recorded in preset range, if so, then determine that user has logged in the second application system.
Alternatively, before described authentication server receives first kind authentication information, also comprise:
Described authentication server receives the Equations of The Second Kind authentication information that client sends, described Equations of The Second Kind authentication information sends after described client receives the instruction of described second application system of access that user sends, and described Equations of The Second Kind authentication information at least comprises the mark of described user;
When determining that described Equations of The Second Kind authentication information is legal, the mark of described user is added in the user list logging in described second application system by described authentication server, and record the timestamp that this logs in described second application system, otherwise described authentication server is redirected to the login interface of described second application system.
Alternatively, described authentication server is determined that described Equations of The Second Kind authentication information is legal and is specifically comprised:
The user name that described in described queries, Equations of The Second Kind authentication information comprises and password whether respectively with the information match of described user that stored in described second client server, if, then determine that described Equations of The Second Kind authentication information is legal, described second client server is for storing the information of the registered user of described second application system, and the information of the registered user of the first application system is stored in first user server.
Alternatively, also comprise:
When verifying that described Equations of The Second Kind authentication information is legal, described authentication server sends address that carry in described Equations of The Second Kind authentication information, resource to be visited to described second application system.
Alternatively, also comprise:
Described authentication server receives the mark of described user and the mark of client of described second application system transmission;
Determining that the mark of described user is present in the information of described second application system register user, and when being interposed between in preset range between described user this time logged in and last login time, described authentication server judges that whether resource to be visited is legal;
If legal, then jump to the address of described resource to be visited, if illegal, then jump to the homepage of described second application system, and show logging status.
A processing unit for access request, comprising:
Receiver module, for receiving first kind authentication information, described first kind authentication information is sent after the request receiving access first application system that described client sends by the first application system, and the request of described access first application system is sent by described client by user;
First processing module, for when determining that described user has logged in the second application system according to described first kind authentication information, allow described user to access described first application system, described first application system is different from described second application system.
Alternatively, described first processing module also for:
Inquire about the mark that whether there is described user in user list that is pre-recorded, that log in described second application system and the difference of the request time of described first kind authentication information and the timestamp recorded whether in preset range, if so, then determine that user has logged in the second application system.
Alternatively, also comprise:
Second processing module, for before reception first kind authentication information, receive the Equations of The Second Kind authentication information that client sends, described Equations of The Second Kind authentication information sends after described client receives the instruction of described second application system of access that user sends, and described Equations of The Second Kind authentication information at least comprises the mark of described user; When determining that described Equations of The Second Kind authentication information is legal, the mark of described user is added in the user list logging in described second application system, and record the timestamp that this logs in described second application system, otherwise described authentication server is redirected to the login interface of described second application system.
Alternatively, described second processing module also for: inquire about user name that described Equations of The Second Kind authentication information comprises and password whether respectively with the information match of described user that stored in described second client server, if, then determine that described Equations of The Second Kind authentication information is legal, described second client server is for storing the information of the registered user of described second application system, and the information of the registered user of the first application system is stored in first user server.
Alternatively, described second processing module also for:
When verifying that described Equations of The Second Kind authentication information is legal, send address that carry in described Equations of The Second Kind authentication information, resource to be visited to described second application system.
Alternatively, also comprise:
3rd processing module, for receiving the mark of described user and the mark of client of described second application system transmission; Determining that the mark of described user is present in the information of described second application system register user, and, when being interposed between in preset range between described user this time logged in and last login time, judge that whether resource to be visited is legal; If legal, then jump to the address of described resource to be visited, if illegal, then jump to the homepage of described second application system, and show logging status.
The processing method of access request described in the embodiment of the present application and device, receive after user accesses the request of the first application system in client, the request of access first application system is sent to the first application system, first application system sends first kind authentication information to authentication server, when determining that described user has logged in the second application system according to described first kind authentication information, authentication server allows described user to access described first application system, wherein, described first application system is different from described second application system.Visible, if user has signed in the second application system, be then allowed to access first application system, and repeated to input the authorization information such as user name and password again without the need to user, thus user-friendly.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present application or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the application, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic diagram of the embodiment of the present application application scenarios;
The flow chart of Fig. 2 a kind of processing method of access request disclosed in the embodiment of the present application;
Fig. 3 is the flow chart of the processing method of the embodiment of the present application another access request disclosed;
The structural representation of Fig. 4 a kind of processing unit of access request disclosed in the embodiment of the present application.
Embodiment
The embodiment of the present application can be applied in system as shown in Figure 1, and described system comprises instant communication client, authentication server, the first application system and stores the first user server of information of registered user of the first application system and the second client server of the information of the registered user of the second application system and storage the second application system.Such as, the first application system can be the website platform of financial sector, and the second application system can be the Net silver platform of financial sector.
Below in conjunction with the accompanying drawing in the embodiment of the present application, be clearly and completely described the technical scheme in the embodiment of the present application, obviously, described embodiment is only some embodiments of the present application, instead of whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not making the every other embodiment obtained under creative work prerequisite, all belong to the scope of the application's protection.
The embodiment of the present application provides a kind of processing method of access request, as shown in Figure 2, comprising:
S201: authentication server receives first kind authentication information;
Wherein, described first kind authentication information is sent after the request receiving access first application system that described client sends by the first application system, and the request of described access first application system is sent by described client by user;
S202: when determining that described user has logged in the second application system according to described first kind authentication information, described authentication server allows described user to access described first application system.
Wherein, described first application system is different from described second application system.
In prior art, after jumping to browser from instant communication client, user needs to input on webpage after user name and password usually could log-on webpage, although visible user's access of instant communicating client, still needs to log in after jumping to webpage.
Or, although without the need to logging in when jumping to the webpage of the first application system from instant communication client, still need after jumping to the webpage of the second application system to log in, visible, the mode that existing instant communication client jumps to browser is too loaded down with trivial details, not user-friendly.
And the method described in the present embodiment, as long as user has logged in the second application system, namely by the checking of the second application system, the first application system directly can be signed in, without the need to through again verifying, therefore, it is possible to simplify processes flow process, user-friendly.
The processing method of the embodiment of the present application another access request disclosed, as shown in Figure 3, comprises the following steps:
S301: client receives the instruction of described second application system of access that user sends;
S302: client sends Equations of The Second Kind authentication information to authentication server, described Equations of The Second Kind authentication information comprises the mark of described user, user name and password;
S303: the user name that described in queries, Equations of The Second Kind authentication information comprises and password whether respectively with the information match of described user that stored in described second client server, if so, perform S304, if not, perform S310;
S304: the mark of described user is added in the user list logging in described second application system by authentication server, and the timestamp recording that this logs in described second application system;
S305: authentication server sends address that carry in described Equations of The Second Kind authentication information, resource to be visited to described second application system;
S306: authentication server receives the mark of described user and the mark of client of described second application system transmission;
S307: authentication server judges whether the mark of described user is present in the information of described second application system register user, and whether the interval of this time logged in of described user and last login time is in preset range, if be, perform S308, if not, perform S311;
This step is the process of the secondary checking in request access second application system process.
S308: described authentication server judges that whether resource to be visited is legal, if so, performs S309, if not, performs S310;
S309: described authentication server jumps to the address of described resource to be visited;
S310: described authentication server jumps to the homepage of described second application system, and shows logging status;
S311: authentication server is redirected to the login interface of described second application system;
S312: client receives the instruction of described first application system of access that user sends;
S313: client sends first kind authentication information to authentication server, and described first kind authentication information comprises the mark of described user;
S314: queries pre-recorded, whether the difference of the mark that whether there is described user in the user list that logs in described second application system and the request time of described first kind authentication information and the timestamp recorded in preset range, if, perform S315, if not, S317 is performed;
S315: authentication server determines that user has logged in the second application system;
S316: authentication server allows described user to access described first application system;
In this step, the first implementation allowing described user to access described first application system can be: verify that whether resource to be visited is legal, if legal, then jump to the address of described resource to be visited, if illegal, then jump to the homepage of described first application system, and show logging status;
S317: authentication server is redirected to the login interface of described first application system.
In the present embodiment, access user in the process of the second application system, need the process through secondary checking, safer, and the process of same checking is " transparent " for user, on the basis ensureing fail safe, does not affect the experience of user; Access in the process of the first application system user, only need verify whether whether user logs in the second application system, if, user is then allowed to access the first application system, therefore, visible, for different application systems, only need through unified checking, without the need to requiring that user carries out repeat logon, thus user-friendly.
With said method embodiment accordingly, the embodiment of the present application also discloses a kind of processing unit of access request, as shown in Figure 4, comprising:
Receiver module 401, for receiving first kind authentication information, described first kind authentication information is sent after the request receiving access first application system that described client sends by the first application system, and the request of described access first application system is sent by described client by user;
First processing module 402, for when determining that described user has logged in the second application system according to described first kind authentication information, allow described user to access described first application system, described first application system is different from described second application system.
Wherein, in the present embodiment, alternatively, described first processing module can also be used for:
Inquire about the mark that whether there is described user in user list that is pre-recorded, that log in described second application system and the difference of the request time of described first kind authentication information and the timestamp recorded whether in preset range, if so, then determine that user has logged in the second application system.
Alternatively, the device in the present embodiment can also comprise: the second processing module 403 and the 3rd processing module 404, wherein:
Second processing module 403, for before reception first kind authentication information, receive the Equations of The Second Kind authentication information that client sends, described Equations of The Second Kind authentication information sends after described client receives the instruction of described second application system of access that user sends, and described Equations of The Second Kind authentication information at least comprises the mark of described user; When determining that described Equations of The Second Kind authentication information is legal, the mark of described user is added in the user list logging in described second application system, and record the timestamp that this logs in described second application system, otherwise described authentication server is redirected to the login interface of described second application system.
Further, described second processing module can also be used for: inquire about user name that described Equations of The Second Kind authentication information comprises and password whether respectively with the information match of described user that stored in described second client server, if, then determine that described Equations of The Second Kind authentication information is legal, described second client server is for storing the information of the registered user of described second application system, and the information of the registered user of the first application system is stored in first user server; And, when verifying that described Equations of The Second Kind authentication information is legal, send address that carry in described Equations of The Second Kind authentication information, resource to be visited to described second application system.
3rd processing module 404, for receiving the mark of described user and the mark of client of described second application system transmission; Determining that the mark of described user is present in the information of described second application system register user, and, when being interposed between in preset range between described user this time logged in and last login time, judge that whether resource to be visited is legal; If legal, then jump to the address of described resource to be visited, if illegal, then jump to the homepage of described second application system, and show logging status.
Device described in the present embodiment, as long as user has logged in the second application system, namely by the checking of the second application system, can directly sign in the first application system, without the need to through again verifying, therefore, it is possible to simplify processes flow process, user-friendly, and, access user in the process of the second application system, need the process through secondary checking, safer, and, the process of same checking is " transparent " for user, on the basis ensureing fail safe, does not affect the experience of user.
If the function described in the embodiment of the present application method using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computing equipment read/write memory medium.Based on such understanding, the part of the part that the embodiment of the present application contributes to prior art or this technical scheme can embody with the form of software product, this software product is stored in a storage medium, comprising some instructions in order to make a computing equipment (can be personal computer, server, mobile computing device or the network equipment etc.) perform all or part of step of method described in each embodiment of the application.And aforesaid storage medium comprises: USB flash disk, portable hard drive, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. various can be program code stored medium.
In this specification, each embodiment adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiment, between each embodiment same or similar part mutually see.
To the above-mentioned explanation of the disclosed embodiments, professional and technical personnel in the field are realized or uses the application.To be apparent for those skilled in the art to the multiple amendment of these embodiments, General Principle as defined herein when not departing from the spirit or scope of the application, can realize in other embodiments.Therefore, the application can not be restricted to these embodiments shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty.
Claims (12)
1. a processing method for access request, is characterized in that, comprising:
Authentication server receives first kind authentication information, described first kind authentication information is sent after the request receiving access first application system that described client sends by the first application system, and the request of described access first application system is sent by described client by user;
When determining that described user has logged in the second application system according to described first kind authentication information, described authentication server allows described user to access described first application system, and described first application system is different from described second application system.
2. method according to claim 1, is characterized in that, described first kind authentication information at least comprises the mark of described user;
Described authentication server determines that described user has logged in the second application system and specifically comprised:
Described queries pre-recorded, whether the difference of the mark that whether there is described user in the user list that logs in described second application system and the request time of described first kind authentication information and the timestamp recorded in preset range, if so, then determine that user has logged in the second application system.
3. method according to claim 1 and 2, is characterized in that, before described authentication server receives first kind authentication information, also comprises:
Described authentication server receives the Equations of The Second Kind authentication information that client sends, described Equations of The Second Kind authentication information sends after described client receives the instruction of described second application system of access that user sends, and described Equations of The Second Kind authentication information at least comprises the mark of described user;
When determining that described Equations of The Second Kind authentication information is legal, the mark of described user is added in the user list logging in described second application system by described authentication server, and record the timestamp that this logs in described second application system, otherwise described authentication server is redirected to the login interface of described second application system.
4. method according to claim 3, is characterized in that, described authentication server is determined that described Equations of The Second Kind authentication information is legal and specifically comprised:
The user name that described in described queries, Equations of The Second Kind authentication information comprises and password whether respectively with the information match of described user that stored in described second client server, if, then determine that described Equations of The Second Kind authentication information is legal, described second client server is for storing the information of the registered user of described second application system, and the information of the registered user of the first application system is stored in first user server.
5. method according to claim 3, is characterized in that, also comprises:
When verifying that described Equations of The Second Kind authentication information is legal, described authentication server sends address that carry in described Equations of The Second Kind authentication information, resource to be visited to described second application system.
6. method according to claim 5, is characterized in that, also comprises:
Described authentication server receives the mark of described user and the mark of client of described second application system transmission;
Determining that the mark of described user is present in the information of described second application system register user, and when being interposed between in preset range between described user this time logged in and last login time, described authentication server judges that whether resource to be visited is legal;
If legal, then jump to the address of described resource to be visited, if illegal, then jump to the homepage of described second application system, and show logging status.
7. a processing unit for access request, is characterized in that, comprising:
Receiver module, for receiving first kind authentication information, described first kind authentication information is sent after the request receiving access first application system that described client sends by the first application system, and the request of described access first application system is sent by described client by user;
First processing module, for when determining that described user has logged in the second application system according to described first kind authentication information, allow described user to access described first application system, described first application system is different from described second application system.
8. device according to claim 7, is characterized in that, described first processing module also for:
Inquire about the mark that whether there is described user in user list that is pre-recorded, that log in described second application system and the difference of the request time of described first kind authentication information and the timestamp recorded whether in preset range, if so, then determine that user has logged in the second application system.
9. the device according to claim 7 or 8, is characterized in that, also comprises:
Second processing module, for before reception first kind authentication information, receive the Equations of The Second Kind authentication information that client sends, described Equations of The Second Kind authentication information sends after described client receives the instruction of described second application system of access that user sends, and described Equations of The Second Kind authentication information at least comprises the mark of described user; When determining that described Equations of The Second Kind authentication information is legal, the mark of described user is added in the user list logging in described second application system, and record the timestamp that this logs in described second application system, otherwise described authentication server is redirected to the login interface of described second application system.
10. device according to claim 9, it is characterized in that, described second processing module also for: inquire about user name that described Equations of The Second Kind authentication information comprises and password whether respectively with the information match of described user that stored in described second client server, if, then determine that described Equations of The Second Kind authentication information is legal, described second client server is for storing the information of the registered user of described second application system, and the information of the registered user of the first application system is stored in first user server.
11. devices according to claim 9, is characterized in that, described second processing module also for:
When verifying that described Equations of The Second Kind authentication information is legal, send address that carry in described Equations of The Second Kind authentication information, resource to be visited to described second application system.
12. devices according to claim 11, is characterized in that, also comprise:
3rd processing module, for receiving the mark of described user and the mark of client of described second application system transmission; Determining that the mark of described user is present in the information of described second application system register user, and, when being interposed between in preset range between described user this time logged in and last login time, judge that whether resource to be visited is legal; If legal, then jump to the address of described resource to be visited, if illegal, then jump to the homepage of described second application system, and show logging status.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410575265.4A CN104270391B (en) | 2014-10-24 | 2014-10-24 | A kind of processing method and processing device of access request |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410575265.4A CN104270391B (en) | 2014-10-24 | 2014-10-24 | A kind of processing method and processing device of access request |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104270391A true CN104270391A (en) | 2015-01-07 |
CN104270391B CN104270391B (en) | 2018-10-19 |
Family
ID=52161881
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410575265.4A Active CN104270391B (en) | 2014-10-24 | 2014-10-24 | A kind of processing method and processing device of access request |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104270391B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105871786A (en) * | 2015-01-22 | 2016-08-17 | 阿里巴巴集团控股有限公司 | User information authentication method, device and system |
CN107645486A (en) * | 2016-12-28 | 2018-01-30 | 平安科技(深圳)有限公司 | Login authentication method and device |
CN110213260A (en) * | 2019-05-29 | 2019-09-06 | 北京中亦安图科技股份有限公司 | User ID authentication method and device |
CN111259368A (en) * | 2019-11-07 | 2020-06-09 | 深圳市远行科技股份有限公司 | Method and equipment for logging in system |
CN111327573A (en) * | 2018-12-14 | 2020-06-23 | 英业达科技有限公司 | Device and method for maintaining log-in state record to transfer data |
CN113407927A (en) * | 2021-07-02 | 2021-09-17 | 北京海泰方圆科技股份有限公司 | Login method, device, equipment and medium |
CN114357397A (en) * | 2021-12-28 | 2022-04-15 | 北京骑胜科技有限公司 | Method and system for logging in system by user |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1835438A (en) * | 2006-03-22 | 2006-09-20 | 阿里巴巴公司 | Method of realizing single time accession between systems and system thereof |
CN1897526A (en) * | 2000-04-03 | 2007-01-17 | 卡纳尔技术股份有限公司 | Authentication of data transmitted in a digital transmission system |
CN1897523A (en) * | 2006-06-26 | 2007-01-17 | 北京金山软件有限公司 | System and method for realizing single-point login |
CN101075875A (en) * | 2007-06-14 | 2007-11-21 | 中国电信股份有限公司 | Method and system for realizing monopoint login between gate and system |
CN101127603A (en) * | 2007-08-16 | 2008-02-20 | 中兴通讯股份有限公司 | A method for single point login of portal website and IMS client |
CN101262377A (en) * | 2008-04-25 | 2008-09-10 | 北京工业大学 | Integration management architecture for user identity information and its method |
CN101420416A (en) * | 2007-10-22 | 2009-04-29 | 中国移动通信集团公司 | Identity management platform, service server, login system and federation method |
CN102123166A (en) * | 2010-12-31 | 2011-07-13 | 百度在线网络技术(北京)有限公司 | Equipment and method for accessing target network application on the basis of instant messaging client |
EP2552049A1 (en) * | 2010-08-23 | 2013-01-30 | ZTE Corporation | Authentication method, apparatus and system |
-
2014
- 2014-10-24 CN CN201410575265.4A patent/CN104270391B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1897526A (en) * | 2000-04-03 | 2007-01-17 | 卡纳尔技术股份有限公司 | Authentication of data transmitted in a digital transmission system |
CN1835438A (en) * | 2006-03-22 | 2006-09-20 | 阿里巴巴公司 | Method of realizing single time accession between systems and system thereof |
CN1897523A (en) * | 2006-06-26 | 2007-01-17 | 北京金山软件有限公司 | System and method for realizing single-point login |
CN101075875A (en) * | 2007-06-14 | 2007-11-21 | 中国电信股份有限公司 | Method and system for realizing monopoint login between gate and system |
CN101127603A (en) * | 2007-08-16 | 2008-02-20 | 中兴通讯股份有限公司 | A method for single point login of portal website and IMS client |
CN101420416A (en) * | 2007-10-22 | 2009-04-29 | 中国移动通信集团公司 | Identity management platform, service server, login system and federation method |
CN101262377A (en) * | 2008-04-25 | 2008-09-10 | 北京工业大学 | Integration management architecture for user identity information and its method |
EP2552049A1 (en) * | 2010-08-23 | 2013-01-30 | ZTE Corporation | Authentication method, apparatus and system |
CN102123166A (en) * | 2010-12-31 | 2011-07-13 | 百度在线网络技术(北京)有限公司 | Equipment and method for accessing target network application on the basis of instant messaging client |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105871786A (en) * | 2015-01-22 | 2016-08-17 | 阿里巴巴集团控股有限公司 | User information authentication method, device and system |
CN105871786B (en) * | 2015-01-22 | 2019-06-04 | 阿里巴巴集团控股有限公司 | A kind of verification method of user information, device and system |
CN107645486A (en) * | 2016-12-28 | 2018-01-30 | 平安科技(深圳)有限公司 | Login authentication method and device |
CN111327573A (en) * | 2018-12-14 | 2020-06-23 | 英业达科技有限公司 | Device and method for maintaining log-in state record to transfer data |
CN111327573B (en) * | 2018-12-14 | 2022-12-02 | 英业达科技有限公司 | Device and method for maintaining log-in state record to transfer data |
CN110213260A (en) * | 2019-05-29 | 2019-09-06 | 北京中亦安图科技股份有限公司 | User ID authentication method and device |
CN111259368A (en) * | 2019-11-07 | 2020-06-09 | 深圳市远行科技股份有限公司 | Method and equipment for logging in system |
CN113407927A (en) * | 2021-07-02 | 2021-09-17 | 北京海泰方圆科技股份有限公司 | Login method, device, equipment and medium |
CN113407927B (en) * | 2021-07-02 | 2021-12-24 | 北京海泰方圆科技股份有限公司 | Login method, device, equipment and medium |
CN114357397A (en) * | 2021-12-28 | 2022-04-15 | 北京骑胜科技有限公司 | Method and system for logging in system by user |
Also Published As
Publication number | Publication date |
---|---|
CN104270391B (en) | 2018-10-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104270391A (en) | Method and device for processing access request | |
JP7027475B2 (en) | Decentralized, decentralized data aggregation | |
US9363256B2 (en) | User authentication in separate authentication channels | |
CN104113551B (en) | A kind of platform authorization method, platform service end and applications client and system | |
CN101764819A (en) | methods and systems for detecting man-in-the-browser attacks | |
US9313230B1 (en) | Policy approval layer | |
CN102664874B (en) | A kind of method and system for secure logging in | |
CN104580364A (en) | Resource sharing method and device | |
CN107852412A (en) | For phishing and the system and method for brand protection | |
CN109583199A (en) | A kind of access auditing method, system, equipment and the medium of storage management system | |
CN104580075A (en) | User login validation method, device and system | |
EP3474210A1 (en) | User account controls for online transactions | |
WO2017088677A1 (en) | User key storage method and server | |
CN106656455A (en) | Website access method and device | |
CN104580112A (en) | Service authentication method and system, and server | |
CN104980420B (en) | A kind of method for processing business, device, terminal and server | |
US20150067772A1 (en) | Apparatus, method and computer-readable storage medium for providing notification of login from new device | |
CN105827406A (en) | Identity verification method, identity verification device, and identity verification system | |
US11349825B1 (en) | Secured automatic user log-in at website via personal electronic device | |
CN105659523A (en) | Re-programmable secure cryptographic device | |
CN106487752A (en) | A kind of method and apparatus for authentication-access safety | |
WO2017162041A1 (en) | Method and device for page display | |
CN107766708A (en) | Nullify method, terminal and the computer-readable recording medium of account Entered state | |
US11201888B2 (en) | Methods and systems for discovering network security gaps | |
CN104468794A (en) | Login simulating method and device for website |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |