CN106899564A - A kind of login method and device - Google Patents

A kind of login method and device Download PDF

Info

Publication number
CN106899564A
CN106899564A CN201610516115.5A CN201610516115A CN106899564A CN 106899564 A CN106899564 A CN 106899564A CN 201610516115 A CN201610516115 A CN 201610516115A CN 106899564 A CN106899564 A CN 106899564A
Authority
CN
China
Prior art keywords
session control
identity
logging request
login
control information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610516115.5A
Other languages
Chinese (zh)
Other versions
CN106899564B (en
Inventor
齐飞飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610516115.5A priority Critical patent/CN106899564B/en
Publication of CN106899564A publication Critical patent/CN106899564A/en
Application granted granted Critical
Publication of CN106899564B publication Critical patent/CN106899564B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer And Data Communications (AREA)

Abstract

This application discloses a kind of login method and device, including:Receive logging request;According to logging request, session control identity is obtained;According to the session control identity, session control information is obtained;Login process is carried out according to session control information.By using the method disclosed in the present application and device, the pressure to user platform and wireless authentication platform can be reduced, so as to reduce server stress, support more concurrent logging requests.

Description

A kind of login method and device
Technical field
The application is related to field of computer technology, more particularly to the method and apparatus that a kind of use computer is logged in.
Background technology
With economic and science and technology development, internet, especially mobile Internet are more and more general in the life of modernization And, increasing user carries out various activities by internet, such as entertains, exchange, shopping, etc..In general, Yong Hushi These activities are carried out using various softwares, for example, being exchanged etc. by bitcom.These softwares generally require user Could be used after login, or can obtain more multi-functional after login.Accordingly, user will also tend to after login or automated log on again Using these softwares.
In general, during User logs in, (login account is also known as login identity mark according to User logs in account for server needs Know), repeatedly inquired about in user platform;Also need in wireless authentication platform to the binding between login account and user equipment Relation is repeatedly inquired about and judged.When occurring frequently, a large amount of, User logs in concentrated when, user platform and wireless authentication are flat Platform burden can increase, and be likely to result in server delay of response and even paralyse.For example, in annual evening in the Spring Festival, have a large number of users to assemble In log in bitcom in morning, Spring Festival blessing is sent mutually, and cause high login concurrent request;The capacity to be prepared is The login of 150w/s is concurrent.User logs in that is so a large amount of, concentrating can cause burden to server, in some instances it may even be possible to can cause service Device delay of response is even paralysed, so as to influence Consumer's Experience.
So as to, it is necessary to find a kind of to the server less login method of burden.
The content of the invention
In view of this, the invention provides the method and apparatus that a kind of use computer is logged in, it can be by making Login process is carried out with session control data, such that it is able to reduce the pressure to wireless authentication platform and user platform.Also, make The lookup and confirmation number of times carried out with session control data needs are less.So as to this method can reduce User logs in service The pressure of device.
The embodiment of the present application provides a kind of login method, including:
Receive logging request;
According to logging request, session control identity is obtained;
According to the session control identity, session control information is obtained;
Login process is carried out according to session control information.
Preferably, the acquisition session control identity, including:
Session control identity is obtained from the logging request.
Preferably, the acquisition session control identity, including:
Obtained from the logging request and log in identity, equipment identities mark;
Multiplexing key is obtained according to the login identity, equipment identities mark;
Session control identity is obtained according to the multiplexing key.
Preferably, it is described that session control identity is obtained according to the multiplexing key, including:
Obtained from database to be multiplexed key as the value of key.
Preferably, it is described according to session control identity, session control information is obtained, including:
The value with session control identity as key is obtained from database.
Preferably, it is described that login process is carried out according to session control information, including:
When the log-on message in the session control information is not sky, and the user profile bag in the session control information When the login identity for containing is identical with the login identity carried in the logging request, it is allowed to the login identity Log in.
Preferably, before the acquisition session control identity, also include:
Construction session control data, the session control data include session control identity and with the session control The corresponding session control information of identity, the session control information includes at least one in user profile, log-on message.
Preferably, according to historical log request or historical log request data construction session control data.
The embodiment of the present application also provides a kind of login method, including:
Generation logging request;
Lookup is stored in local session control identity;
The session control identity is carried and is sent to server in the logging request, so that the server The session control identity is obtained according to the logging request, and session control is obtained according to the session control identity Information processed, login process is carried out according to the session control information.
The embodiment of the present application also provides a kind of entering device, including:
Logging request reception device, receives logging request;
Session control identity acquisition device, according to logging request, obtains session control identity;
Session control information acquisition device, according to the session control identity, obtains session control information;
Login process apparatus, login process is carried out according to session control information.
Preferably, the session control identity acquisition device obtains session control identity mark from the logging request Know.
Preferably, also include:
Session control data structuring apparatus, before the acquisition session control identity, construct session control data, The session control data include that session control identity and session control corresponding with the session control identity are believed Breath, the session control information includes at least one in user profile, log-on message.
The embodiment of the present application also provides a kind of entering device, including:
Logging request generating means, generate logging request;
Device is searched in session control identity, and lookup is stored in local session control identity;
Session control identity dispensing device, the session control identity is carried and is sent out in the logging request Server is given, so that the server obtains the session control identity according to the logging request, and according to described Session control identity obtains session control information, and login process is carried out according to the session control information.
Login process is carried out by using session control data, the pressure to wireless authentication platform and user platform can be reduced Power.Also, the lookup and confirmation number of times carried out using session control data needs are less.So as to reduce User logs in service The pressure of device.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application, this Shen Schematic description and description please does not constitute the improper restriction to the application for explaining the application.In the accompanying drawings:
Fig. 1 is a kind of login mode schematic diagram in the prior art;
Fig. 2 is first embodiment login method schematic flow sheet;
Fig. 3 is first embodiment usage scenario schematic diagram;
Fig. 4 is generated and is preserved multiplexing key schematic flow sheets for the;
Fig. 5 is second embodiment login method schematic flow sheet.
Specific embodiment
To make the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and Corresponding accompanying drawing is clearly and completely described to technical scheme.Obviously, described embodiment is only the application one Section Example, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Go out the every other embodiment obtained under the premise of creative work, belong to the scope of the application protection.
Below in conjunction with accompanying drawing, the technical scheme that each embodiment of the application is provided is described in detail.
Embodiment 1
In the prior art, it can be carried out according to below scheme to exempt from close login.
When client is using the success of account (loginId) password login, server sets equipment where the client Standby mark (bound, and constructs a data input database, and wherein account refers to by equipment I d) and ID (userId) It is User logs in account, such as mailbox or cell-phone number, userId refers to unique mark of the user in database;
When client is logged on, the equipment I d and loginId of equipment where the client are sent to server;
Server searches corresponding userId according to loginId, if the server determine that the userId and client that find Hold the equipment I d for sending to there is binding relationship, then login successfully.
This login method is as shown in figure 1, login system, user platform, wireless authentication platform in figure are server A part.
Login system receives logging request, and the loginId in logging request is sent to user platform, by logging request In equipment I d send to wireless authentication platform;
User platform inquires about userId according to loginId, and userId is sent into wireless authentication platform;
Wireless authentication platform is judged with the presence or absence of binding relationship between userId and equipment I d, and will determine that result return is stepped on Recording system;
Login system decides whether using logining successfully according to the binding relationship judged result that wireless authentication platform is returned.
Above is one kind is existing to exempt from close login method.In the prior art, user platform is inquired about according to loginId UserId generally requires repeatedly to be inquired about, and wireless authentication platform judges to whether there is binding relationship between userId and equipment I d Also tend to needs repeatedly to be inquired about and judged, take a large amount of server resources, inefficiency.
The login method in the application is described below.
Session control (Session) data used herein are introduced first.
Session data are a data for key-value (key-value) structure, and wherein key (key) can be character string (String), key is the unique mark of Session data, i.e. session control identity (SessionId);Value (value) can It is the main information carrier of Session data, i.e. session control information to be an object (Object) (CacheSession).Facility information (DeviceInfo), user profile (userInfo) can be included in CacheSession, Client-side information (ClientInfo), log-on message (loginInfo).
Session data can be generated after account number cipher is logined successfully, wherein, SessionId can by random number, Temporal information and remaining relevant information are generated.After generation Session data, the SessionId can be sent by server Preserved to client;LoginInfo in CacheSession can be obtained by client upload, can be comprising login time etc. Information;ClientInfo can include the client identification and client release information of client upload, can also include client The digital signature at end;DeviceInfo can include the device identification of client upload, can also include device type information; UserInfo can include the account loginId of client upload, can also include the corresponding userId of the loginId.
The structure of Session data can be as shown in table 1.
Table 1
Session data can be saved in key-value (key-value) database, it is preferred that can be saved in Tair numbers According in storehouse.
The login process of the present embodiment is as shown in Figure 2.
S101:Server is received exempts from close logging request.
When user will be logged in by exempting from close login mode, can be sent by user end to server and exempt from close logging request.
S102:SessionId is obtained from logging request.
After server receives above-mentioned logging request, client upload can be directly obtained from logging request SessionId。
Certainly, if be provided with server for controlling whether to use the time-sharing multiplex of Session to switch, server can When time-sharing multiplex switch is to open, SessionId is obtained from logging request.
S103:According to SessionId, CacheSession is obtained from Tair.
After server gets SessionId, if it is determined that the SessionId for getting is not sky, then can be according to acquisition The SessionId for arriving, obtains CacheSession from Tair.
S104:Login process is carried out according to CacheSession.
After server gets CacheSession, if it is determined that the CacheSession for getting is not sky, and UserInfo, the loginInfo included in CacheSession are not sky, then can be carried out at login according to CacheSession Reason.
Specifically, it can assemble User logs according to CacheSession to carry out login process according to CacheSession As a result (UserLoginRes), including the loginId in userInfo carries out login process, when loginId is stepped on described When the login identity carried in record request is identical, it is allowed to which the login identity is logged in, and returns to login result.
In this flow, without being updated to Session data again, such that it is able to reduce amount of calculation, clothes are saved Business device resource.
Closed as time-sharing multiplex is switched, or SessionId is sky, or CacheSession is sky, or CacheSession In it is any in userInfo, loginInfo for including be sky, then logged in using original login process.It is original to log in stream What journey can be that the present embodiment the beginning part is mentioned existing exempts from close login method.
The present embodiment system composition can be as shown in figure 3, wherein:
Mobile terminal can be the mobile devices such as smart mobile phone, panel computer that user uses;
Mobile gateway is used to that the request of user to be authenticated and forwarded, and is the tie point of mobile terminal and server;
Login system is used to receive User logs in request, carries registering service, creates Session data;
User platform preserves the essential information data of user, and provides inquiry userId, verifies password, creates new user etc. Function;
User db is the database that user platform is used;
Limit of movement authority check system is one kind of wireless authentication platform, wherein saving user exempts from the relation of stepping on, and offer is exempted from Relation is stepped on to create and verify.
Limit of movement authority db is the database that Limit of movement authority check system is used.
Tair is a kind of distributed key-value cache database.
It is worth noting that, in the present embodiment, using the method by Session data entries as shown in Figure 2, using Family platform, user db, Limit of movement authority check system, Limit of movement authority db can't be used to, when can not be by Session data During login (when e.g., Session data are not yet generated), then can be used user platform, user db, Limit of movement authority check system, Limit of movement authority db, and logged in by original login process.Method by using being proposed in the present embodiment, can basis SessionId searches CacheSession from database, without being searched in user platform, wireless authentication platform, Nor need to judge to whether there is binding relationship between userId and equipment I d.Due to no longer needing to use inefficiency User platform, wireless authentication platform are searched and judged, to user platform, wireless authentication platform when reducing User logs in Pressure, so that, this method effectively reduces the pressure that server undertakes, and realization undertakes the effect of bigger parallel logging request Really.
In addition, server can be before User logs in, the generation Session carried in the historical log request according to user Data needed for data, generate Session data.Which is actually please according to the virtual login of historical log request generation Ask, user terminal need not be actually sent out logging request, Session data can be generated according to the virtual logging request.In user Actual log previous existence extends the Session data survival times into Session data, so can in user's actual log To use the login mode in the present embodiment and original login mode need not be used.
Embodiment 2
Proposed in embodiment 1 it is a kind of from logging request obtain client upload SessionId, and according to SessionId obtains CacheSession, the method that register is carried out finally according to the information in CacheSession.So And, SessionId is all necessarily included in not all logging request, such as client does not preserve SessionId and (e.g., loses Situations such as losing SessionId).To solve this problem, in the present embodiment, it is proposed that another login method.
In order to illustrate the present embodiment, the multiplex data used in the present embodiment is introduced first.
Multiplex data can be in generation after account number cipher is logined successfully, or the life when Session data are generated Into.SessionId when multiplex data is logined successfully comprising this time in the Session data that generate and generated according to equipment id Data, so that, in the case where equipment id is known, corresponding data can be generated according to equipment id, and according to this data search Corresponding SessionId.
For example, in the login scene of payment software, the multiplex data of generation can be a kind of key-value structures, can To be stored in Tair databases.Wherein key parts can be character string, can be loginId, money in logging request Bag device identification (walletTid), the corresponding key of wallet device identification (walletClientKey), quick device identification (mspTid), the corresponding key of quick device identification (mspClientKey) carries out Message-Digest Algorithm 5 (Message- Digest Algorithm 5, abbreviation MD5) after the character string that obtains.Value parts can be SessionId, can be in account The SessionId of the Session data generated after the success of number password login.
The key parts of multiplex data are referred to as multiplexing key, and the walletTid and mspTid used by generation multiplexing key are often Identical, is referred to as device identification (Tid), and walletClientKey and mspClientKey is also often identical, is referred to as Device identification key.
Fig. 4 illustrates a kind of generation of multiplex data and preserves flow.As shown in figure 4, after logining successfully, according to LoginId, Tid and device identification key obtain multiplexing key;Will multiplexing key, corresponding SessionId and multiplexing key and Corresponding relation between SessionId is cached into Tair;Terminate flow.
The structure of multiplex data can be as shown in table 2.
Table 2
Key Value
MD5(loginId,walletTid,walletClientKey,mspTid,mspClientKey) SessionId
According to the structure of multiplex data, corresponding SessionId can be obtained by being multiplexed key.
The flow of the present embodiment introduced below, as shown in Figure 5.
S201:Server is received exempts from close logging request.
When user will be logged in by exempting from close login mode, can be sent by user end to server and exempt from close logging request.
S202:LoginId, tid and device identification key are obtained from logging request, according to loginId, tid and equipment Mark key carries out MD5 computings, obtains multiplexing key.
Certainly, if be provided with server for controlling whether to use the time-sharing multiplex of Session to switch, server can When time-sharing multiplex switch is to open, loginId, tid and device identification key are obtained from logging request.
S203:Corresponding SessionId (S202) is obtained from Tair according to multiplexing key;After SessionId is obtained, The flow obtained after SessionId in the present embodiment flow and embodiment 1 is same or similar;
S204:According to SessionId, CacheSession is obtained from Tair.
After server gets SessionId, if it is determined that the SessionId for getting is not sky, then can be according to acquisition The SessionId for arriving, obtains CacheSession from Tair.
S205:Login process is carried out according to CacheSession.
After server gets CacheSession, if it is determined that the CacheSession for getting is not sky, and UserInfo, the loginInfo included in CacheSession are not sky, then can be carried out at login according to CacheSession Reason.
Specifically, it can assemble User logs according to CacheSession to carry out login process according to CacheSession As a result (UserLoginRes), including the loginId in userInfo carries out login process, when loginId is stepped on described When the login identity carried in record request is identical, it is allowed to which the login identity is logged in, and returns to login result.
Closed as time-sharing multiplex is switched, or SessionId is sky, or CacheSession is sky, or CacheSession In it is any in userInfo, loginInfo for including be sky, then logged in using original login process.It is original to log in stream What journey can be that the beginning part of embodiment 1 is mentioned existing exempts from close login method.
The present embodiment proposes a kind of login method when not existing SessionId in logging request, please according to logging in In asking other data come attempt find SessionId, after SessionId is found, situation is converted into the feelings in embodiment 1 Condition.
Embodiment 3
Embodiment of the present invention also proposed a kind of login method, including:
Generation logging request;
Lookup is stored in local session control identity;
The session control identity is carried and is sent to server in the logging request, so that the server The session control identity is obtained according to the logging request, and session control is obtained according to the session control identity Information processed, login process is carried out according to the session control information.
Server can carry out login process according to the method proposed in embodiment 1.
Embodiment 4
Embodiment of the present invention also proposed a kind of entering device, including:
Logging request reception device, receives logging request;
Session control identity acquisition device, according to logging request, obtains session control identity;
Session control information acquisition device, according to the session control identity, obtains session control information;
Login process apparatus, login process is carried out according to session control information.
The present embodiment receives logging request using logging request reception device, uses session control identity acquisition device Session control identity is obtained according to logging request, using session control information acquisition device according to the session control identity Mark obtains session control information, login process is carried out according to session control information using login process apparatus, such that it is able to make Login process is carried out with Session data, the pressure to user platform and wireless authentication platform is reduced, such that it is able to bear more Many parallel logging requests.
In one embodiment, the session control identity acquisition device obtains session from the logging request Control identity.
By using session control identity, SessionId can be directly obtained, and then obtain CacheSession, And login process is carried out with this.
In one embodiment, the entering device, also includes:
Session control data structuring apparatus, before the acquisition session control identity, construct session control data, The session control data include that session control identity and session control corresponding with the session control identity are believed Breath, the session control information includes at least one in user profile, log-on message.
By using session control data structuring apparatus, Session data, SessionId needed for can constructing and CacheSession, can also use it for login process.
Embodiment 5
Embodiment of the present invention also proposed a kind of entering device, including:
Logging request generating means, generate logging request;
Device is searched in session control identity, and lookup is stored in local session control identity;
Session control identity dispensing device, the session control identity is carried and is sent out in the logging request Server is given, so that the server obtains the session control identity according to the logging request, and according to described Session control identity obtains session control information, and login process is carried out according to the session control information.
Session control identity can be obtained using the session control identity acquisition device in embodiment 4 send dress Put the session control identity of transmission;And login process is carried out according to session control information using login process apparatus.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.And, the present invention can be used and wherein include the computer of computer usable program code at one or more The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) is produced The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram are described.It should be understood that every first-class during flow chart and/or block diagram can be realized by computer program instructions The combination of flow and/or square frame in journey and/or square frame and flow chart and/or block diagram.These computer programs can be provided The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced for reality by the instruction of computer or the computing device of other programmable data processing devices The device of the function of being specified in present one flow of flow chart or multiple one square frame of flow and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in can guide computer or other programmable data processing devices with spy In determining the computer-readable memory that mode works so that instruction of the storage in the computer-readable memory is produced and include finger Make the manufacture of device, the command device realize in one flow of flow chart or multiple one square frame of flow and/or block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented treatment, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes that one or more processors (CPU), input operation/output connect Mouth, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.
Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be by any method Or technology realizes information Store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, can be used to store the information that can be accessed by a computing device.Defined according to herein, calculated Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
Also, it should be noted that term " including ", "comprising" or its any other variant be intended to nonexcludability Comprising, so that process, method, commodity or equipment including a series of key elements are not only including those key elements, and including Other key elements being not expressly set out, or including being this process, method, commodity or the intrinsic key element of equipment. In the case of there is no more limitations, the key element limited by sentence "including a ...", it is not excluded that including the key element Also there is other identical element in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, the application can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Form.And, the application can be used to be can use in one or more computers for wherein including computer usable program code and deposited The shape of the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
Embodiments herein is the foregoing is only, the application is not limited to.For those skilled in the art For, the application can have various modifications and variations.It is all any modifications made within spirit herein and principle, equivalent Replace, improve etc., within the scope of should be included in claims hereof.

Claims (13)

1. a kind of login method, it is characterised in that including:
Receive logging request;
According to logging request, session control identity is obtained;
According to the session control identity, session control information is obtained;
Login process is carried out according to session control information.
2. the method for claim 1, it is characterised in that the acquisition session control identity, including:
Session control identity is obtained from the logging request.
3. the method for claim 1, it is characterised in that the acquisition session control identity, including:
Obtained from the logging request and log in identity, equipment identities mark;
Multiplexing key is obtained according to the login identity, equipment identities mark;
Session control identity is obtained according to the multiplexing key.
4. method as claimed in claim 3, it is characterised in that described that session control identity mark is obtained according to the multiplexing key Know, including:
Obtained from database to be multiplexed key as the value of key.
5. the method for claim 1, it is characterised in that described according to session control identity, obtains session control Information, including:
The value with session control identity as key is obtained from database.
6. the method for claim 1, it is characterised in that described that login process is carried out according to session control information, including:
When the log-on message in the session control information is not sky, and user profile in the session control information is included When login identity is identical with the login identity carried in the logging request, it is allowed to which the login identity is stepped on Record.
7. the method for claim 1, it is characterised in that before the acquisition session control identity, also include:
Construction session control data, the session control data include session control identity and with the session control identity Corresponding session control information is identified, the session control information includes at least one in user profile, log-on message.
8. method as claimed in claim 7, it is characterised in that according to historical log request or historical log request data construction Session control data.
9. a kind of login method, it is characterised in that including:
Generation logging request;
Lookup is stored in local session control identity;
By the session control identity carry be sent to server in the logging request so that the server according to The logging request obtains the session control identity, and obtains session control letter according to the session control identity Breath, login process is carried out according to the session control information.
10. a kind of entering device, it is characterised in that including:
Logging request reception device, receives logging request;
Session control identity acquisition device, according to logging request, obtains session control identity;
Session control information acquisition device, according to the session control identity, obtains session control information;
Login process apparatus, login process is carried out according to session control information.
11. devices as claimed in claim 10, it is characterised in that the session control identity acquisition device is stepped on from described Session control identity is obtained in record request.
12. devices as claimed in claim 10, it is characterised in that also include:
Session control data structuring apparatus, before the acquisition session control identity, construct session control data, described Session control data include session control identity and session control information corresponding with the session control identity, institute Stating session control information includes at least one in user profile, log-on message.
A kind of 13. entering devices, it is characterised in that including:
Logging request generating means, generate logging request;
Device is searched in session control identity, and lookup is stored in local session control identity;
Session control identity dispensing device, the session control identity is carried and is sent in the logging request Server, so that the server obtains the session control identity according to the logging request, and according to the session Control identity obtains session control information, and login process is carried out according to the session control information.
CN201610516115.5A 2016-07-01 2016-07-01 Login method and device Active CN106899564B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610516115.5A CN106899564B (en) 2016-07-01 2016-07-01 Login method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610516115.5A CN106899564B (en) 2016-07-01 2016-07-01 Login method and device

Publications (2)

Publication Number Publication Date
CN106899564A true CN106899564A (en) 2017-06-27
CN106899564B CN106899564B (en) 2020-05-19

Family

ID=59191525

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610516115.5A Active CN106899564B (en) 2016-07-01 2016-07-01 Login method and device

Country Status (1)

Country Link
CN (1) CN106899564B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483418A (en) * 2017-07-27 2017-12-15 阿里巴巴集团控股有限公司 Login process method, method for processing business, device and server
CN110523083A (en) * 2019-09-05 2019-12-03 网易(杭州)网络有限公司 Processing method, device and the server device of log-in events
CN111475843A (en) * 2020-04-08 2020-07-31 腾讯科技(深圳)有限公司 Data processing method and related device
CN112291182A (en) * 2019-07-23 2021-01-29 腾讯科技(深圳)有限公司 Method, device, electronic equipment and storage medium for keeping user account login state
CN114598489A (en) * 2020-11-20 2022-06-07 华为技术有限公司 Method for determining trust terminal and related device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100082826A1 (en) * 2008-10-01 2010-04-01 Avermedia Technologies, Inc. Network authorization method and application thereof
CN103532919A (en) * 2012-07-06 2014-01-22 腾讯科技(深圳)有限公司 Method and system for maintaining login state of user account
CN103856472A (en) * 2012-12-06 2014-06-11 阿里巴巴集团控股有限公司 Account login method and device
CN104104662A (en) * 2013-04-09 2014-10-15 华为技术有限公司 Method and device for processing session service connection
CN105141605A (en) * 2015-08-19 2015-12-09 金蝶软件(中国)有限公司 Session method, web server and browser
CN105338063A (en) * 2015-09-30 2016-02-17 北京奇虎科技有限公司 Multi-server user session sharing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100082826A1 (en) * 2008-10-01 2010-04-01 Avermedia Technologies, Inc. Network authorization method and application thereof
CN103532919A (en) * 2012-07-06 2014-01-22 腾讯科技(深圳)有限公司 Method and system for maintaining login state of user account
CN103856472A (en) * 2012-12-06 2014-06-11 阿里巴巴集团控股有限公司 Account login method and device
CN104104662A (en) * 2013-04-09 2014-10-15 华为技术有限公司 Method and device for processing session service connection
CN105141605A (en) * 2015-08-19 2015-12-09 金蝶软件(中国)有限公司 Session method, web server and browser
CN105338063A (en) * 2015-09-30 2016-02-17 北京奇虎科技有限公司 Multi-server user session sharing method and device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483418A (en) * 2017-07-27 2017-12-15 阿里巴巴集团控股有限公司 Login process method, method for processing business, device and server
CN112291182A (en) * 2019-07-23 2021-01-29 腾讯科技(深圳)有限公司 Method, device, electronic equipment and storage medium for keeping user account login state
CN112291182B (en) * 2019-07-23 2022-06-21 腾讯科技(深圳)有限公司 Method and device for keeping user account login state, electronic equipment and storage medium
CN110523083A (en) * 2019-09-05 2019-12-03 网易(杭州)网络有限公司 Processing method, device and the server device of log-in events
CN111475843A (en) * 2020-04-08 2020-07-31 腾讯科技(深圳)有限公司 Data processing method and related device
CN111475843B (en) * 2020-04-08 2023-03-14 腾讯科技(深圳)有限公司 Data processing method and related device
CN114598489A (en) * 2020-11-20 2022-06-07 华为技术有限公司 Method for determining trust terminal and related device
CN114598489B (en) * 2020-11-20 2023-07-11 华为技术有限公司 Method and related device for determining trust terminal

Also Published As

Publication number Publication date
CN106899564B (en) 2020-05-19

Similar Documents

Publication Publication Date Title
CN106170964B (en) User virtual identity based on different identity services
CN106375270B (en) Token generation and authentication method and authentication server
EP2633667B1 (en) System and method for on the fly protocol conversion in obtaining policy enforcement information
CN106899564A (en) A kind of login method and device
US8370908B2 (en) Decreasing login latency
EP3253026B1 (en) Cdn-based access control method and relevant device
US20120166518A1 (en) Providing state service for online application users
WO2019237594A1 (en) Session persistence method and apparatus, and computer device and storage medium
CN105868231A (en) Cache data updating method and device
US20200120039A1 (en) Systems and methods for controlling access to broker resources
US10992669B2 (en) Acquisition of a device fingerprint from an instance of a client application
CN110661829B (en) File downloading method and device, client and computer readable storage medium
CN104580364A (en) Resource sharing method and device
CN102143131B (en) User logout method and authentication server
CN104618388B (en) Fast registration login method and corresponding resetting server, information server
CN103841117A (en) JAAS login method and server based on Cookie mechanism
CN110233902B (en) Session processing method and device, electronic equipment and machine-readable storage medium
CN105184559B (en) A kind of payment system and method
CN105224541B (en) Uniqueness control method, information storage means and the device of data
US11062018B2 (en) Platform for generation of passwords and/or email addresses
US9948648B1 (en) System and method for enforcing access control to publicly-accessible web applications
US11700280B2 (en) Multi-tenant authentication framework
CN111147235A (en) Object access method and device, electronic equipment and machine-readable storage medium
CN108696509B (en) Access processing method and device for terminal
CN105472029A (en) Single sign-on method and system based on cache

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.