CN108462671A - A kind of authentication protection method and system based on reverse proxy - Google Patents

A kind of authentication protection method and system based on reverse proxy Download PDF

Info

Publication number
CN108462671A
CN108462671A CN201710090438.7A CN201710090438A CN108462671A CN 108462671 A CN108462671 A CN 108462671A CN 201710090438 A CN201710090438 A CN 201710090438A CN 108462671 A CN108462671 A CN 108462671A
Authority
CN
China
Prior art keywords
user
authentication
request
authentication token
reverse proxy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710090438.7A
Other languages
Chinese (zh)
Inventor
周义龙
李光曦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Education Technology (shanghai) Ltd By Share Ltd
Original Assignee
Shanghai Education Technology (shanghai) Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Education Technology (shanghai) Ltd By Share Ltd filed Critical Shanghai Education Technology (shanghai) Ltd By Share Ltd
Priority to CN201710090438.7A priority Critical patent/CN108462671A/en
Publication of CN108462671A publication Critical patent/CN108462671A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Abstract

The application provides a kind of authentication protection method and system based on reverse proxy, wherein the method includes:The accessing page request that user sends is received, the authentication token of the user is carried in the accessing page request;When the authentication token is legal, the accessing page request is forwarded to the background server that the accessing page request is directed toward;Wherein, the background server is directed to the accessing page request, obtains page resource corresponding with the accessing page request;The page resource is transmitted to the user.Authentication protection method and system provided by the present application based on reverse proxy, can avoid modifying to goal systems and secondary development, to improve the intensity of certification protection.

Description

A kind of authentication protection method and system based on reverse proxy
Technical field
This application involves Internet technical field, more particularly to a kind of authentication protection method based on reverse proxy and it is System.
Background technology
User's additional input one in unauthorized login process, is usually required to test except account number cipher in anti-locking system Code is demonstrate,proved to be protected.
Currently, in the prior art can be simultaneously or after user account, cryptographic check to identifying code input or verification process It carries out, that is, needs to modify or secondary development to protection goal systems.
Although the prior art has used multiple-factor certification, but it needs modification to goal systems or secondary development that can cause The deployment of Verification System, use cost increase;On the one hand, it can not partly modify or the system of secondary development, it is impossible into The autonomous protection of row, can only be allowed to expose, it is easy to cause security risk;On the other hand, attacker can be not over recognizing When card, still possess limited permission contact target system, execute some system commands including logging in or giving password for change, If there are security breaches for system at this time, it will cause attacker that can complete intrusion behavior.
It should be noted that above to the introduction of technical background be intended merely to it is convenient to the technical solution of the application carry out it is clear, Complete explanation, and facilitate the understanding of those skilled in the art and illustrate.Cannot merely because these schemes the application's Background technology part is expounded and thinks that above-mentioned technical proposal is known to those skilled in the art.
Invention content
The application embodiment is designed to provide a kind of authentication protection method and system based on reverse proxy, can It avoids modifying to goal systems and secondary development, to improve the intensity of certification protection.
To achieve the above object, on the one hand the application provides a kind of authentication protection method based on reverse proxy, the side Method includes:The accessing page request that user sends is received, the authentication token of the user is carried in the accessing page request;When When the authentication token is legal, the accessing page request is forwarded to the background server that the accessing page request is directed toward; Wherein, the background server is directed to the accessing page request, obtains page resource corresponding with the accessing page request; The page resource is transmitted to the user.
Further, the method further includes:When the authentication token is illegal, refuse the page that the user sends Access request.
Further, it includes following at least one that the authentication token is illegal:Authentication token is in outside the term of validity;Certification Token does not allow to access the background server;Authentication token occurs logging in regional jump;There is beaching accommodation jump in authentication token Jump.
Further, the authentication token generates in the following manner:Receive the recognizing for the default page that user submits Card request, and whether verify the certification request legal;When the certification request is legal, issued to the user for accessing The authentication token of the default page.
Further, the method further includes:In response to the certification request, authentication request is sent to user;It connects The verification information for the authentication request that user sends is received, and judges whether the verification information is correct;If correct, Whether legal verify the certification request.
Further, after issuing the authentication token for accessing the default page to the user, the method Further include:By the user information of the user and it is presented in the authentication token write-in Database Unit of the user.
Further, verifying the whether legal step of the certification request includes:It verifies and carries in the certification request Whether occasional password or one-time password are correct;Verify the occasional password or one-time password carried in the certification request Whether in the term of validity;Verify the occasional password carried in the certification request or one-time password whether with active user It is corresponding;If above-mentioned verification result is to be, judge that the certification request is legal.
Further, the method further includes:No matter the authentication token is legal or illegal, sends out the user The accessing page request come is recorded into system log.
To achieve the above object, on the other hand the application also provides a kind of authentication protection system based on reverse proxy, institute The system of stating includes authentication subsystem, reverse proxy module, background server, wherein:The authentication subsystem receives user and sends Accessing page request, the authentication token of the user is carried in the accessing page request;The reverse proxy module is in institute State authentication token it is legal when, the accessing page request is forwarded to the background server that the accessing page request is directed toward;Institute It states background server and is directed to the accessing page request, obtain page resource corresponding with the accessing page request;It is described anti- The page resource is transmitted to the user to proxy module.
Further, the system also includes log units, and the log unit is for no matter the authentication token to be legal Or it is illegal, record the accessing page request that the user sends.
The present invention is preposition by authentication subsystem, and risk is solved in such a way that pre-authentication adds reverse proxy.Recognize in advance Card will check the authentication state of user when user accesses goal systems.It, will be into if user has passed through certification The process for entering reverse proxy forwards the request of user to goal systems and returns to the implementing result of goal systems to user.If User not yet passes certification, then user is guided to carry out authentication.In the whole process, goal systems is without modifying or two Secondary exploitation, to ensure that the safety of goal systems.
With reference to following description and accompanying drawings, the particular implementation of the application is disclosed in detail, specifies the original of the application Reason can be in a manner of adopted.It should be understood that presently filed embodiment is not so limited in range.In appended power In the range of the spirit and terms that profit requires, presently filed embodiment includes many changes, modifications and is equal.
The feature for describing and/or showing for a kind of embodiment can be in a manner of same or similar one or more It is used in a other embodiment, it is combined with the feature in other embodiment, or substitute the feature in other embodiment.
It should be emphasized that term "comprises/comprising" refers to the presence of feature, one integral piece, step or component when being used herein, but simultaneously It is not excluded for the presence or additional of one or more other features, one integral piece, step or component.
Description of the drawings
Included attached drawing is used for providing being further understood from the application embodiment, and which constitute the one of specification The principle of the application for illustrating presently filed embodiment, and with verbal description is come together to illustrate in part.It should be evident that The accompanying drawings in the following description is only some embodiments of the application, for those of ordinary skill in the art, is not being paid Under the premise of going out creative labor, other drawings may also be obtained based on these drawings.In the accompanying drawings:
Fig. 1 is a kind of flow chart for authentication protection method based on reverse proxy that the application embodiment provides;
Fig. 2 is a kind of structural schematic diagram for authentication protection system based on reverse proxy that the application embodiment provides.
Specific implementation mode
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality The attached drawing in mode is applied, the technical solution in the application embodiment is clearly and completely described, it is clear that described Embodiment is only a part of embodiment of the application, rather than whole embodiments.Based on the embodiment party in the application Formula, all other embodiment obtained by those of ordinary skill in the art without making creative efforts, is all answered When the range for belonging to the application protection.
Referring to Fig. 1, the application embodiment provides a kind of authentication protection method based on reverse proxy, the method packet Include following steps.
S1:The accessing page request that user sends is received, the certification that the user is carried in the accessing page request enables Board.
In the present embodiment, user can carry out page access according to default page address.The default page address It can be the character string according to fixed format write.For example, the default page address can be uniform resource locator (Uniform Resource Locator, URL).The set form can limit default page address component part and Each component part puts in order.For example, may include protocol-identifier, server identification and money in the default page address Source identifies.Wherein, the representative character of protocol-identifier Data Transport Protocol such as can be http, https, ftp.The service Device mark can be the title of server or the IP address of server.The resource identification can be in the page to be visited The number that the store name of resource in the server is either assigned in the server.
In the present embodiment, it in the accessing page request may include above-mentioned default page address.In this implementation In mode, the accessing page request can be the message (message) write according to preset format.It is visited in the page It asks in request, may include the field of preset quantity, each field can fill different contents.For example, the page is visited Ask that in request may include source IP field, destination IP field and page address field etc..Wherein, source IP field can fill hair Send the IP address of the client of the accessing page request, the destination IP field that can fill the page access to be received and ask The IP address for the server asked can fill the corresponding page address of the page to be visited in the page address field.
In the present embodiment, receive the accessing page request can be authentication subsystem, and the page access is asked The authentication token of the user can be carried in asking.The authentication token can be used for accessing the page.
S2:When the authentication token is legal, the accessing page request is forwarded to the accessing page request and is directed toward Background server;Wherein, the background server is directed to the accessing page request, obtains and the accessing page request pair The page resource answered.
In the present embodiment, authentication subsystem can verify the authentication token.When the authentication token closes When method, reverse proxy process can be entered.The reverse proxy process can be asked the page access by reverse proxy module It asks and is forwarded to the background server that the accessing page request is directed toward.Wherein, the use can be run in the background server The goal systems that family desires access to.When the background server receives the accessing page request that forwarding comes, it can be directed to described Accessing page request obtains page resource corresponding with the accessing page request.The page resource for example can be the page The information such as picture, video, word, the link of middle load.
S3:The page resource is transmitted to the user.
In the present embodiment, after background server gets the page resource, the page resource can be sent out Give reverse proxy module.Then the page resource can be transmitted to user by the reverse proxy module.In this way, user and backstage Not directly into row data communication between server, but by reverse proxy module carry out data forwarding, in this way, user just without Method is modified to the goal systems run in background server or secondary development.
In one embodiment of the application, when the authentication token is illegal, show that user does not have accession page Permission, at this point it is possible to directly refuse the accessing page request that the user sends, after avoiding user from further accessing Platform server.
In one embodiment of the application, when judging whether token is legal, it can be determined that whether authentication token, which is in, has In the effect phase, whether authentication token allows to access the background server, authentication token occur logging in area jump, certification enables Whether board there is beaching accommodation jump.Wherein, if there is following at least one situation, it can think that authentication token does not conform to Method:Authentication token is in outside the term of validity;Authentication token does not allow to access the background server;Authentication token occurs logging in area Jump;Or there is beaching accommodation jump in authentication token.
In the present embodiment, the authentication token can be presented to user in response to the certification request of user in advance 's.Specifically, the certification request for the default page of user's submission can be received, and verifies whether the certification request closes Method.Specifically, verify the certification request it is whether legal when, can verify the occasional password carried in the certification request or Whether the occasional password or one-time password that whether one-time password correct, is carried in the certification request are in the term of validity Whether the occasional password or one-time password carried in interior, the described certification request be corresponding with active user.If above-mentioned verification Result is to be, then can be determined that the certification request is legal.When the certification request is legal, can be issued to the user Authentication token for accessing the default page.
In the present embodiment, the identity of user can also be verified when user has submitted certification request.If the certification Do not have to include the identity information of user in request, then can send authentication request to user in response to the certification request. After user receives authentication request, relevant authentication information can be provided, such as ID card No., hand can be provided Machine number, preset password etc..It, can be in this way, after receiving the verification information for the authentication request sent of user Judge whether the verification information is correct.If correct, whether legal the certification request can be further verified.
In the present embodiment, after issuing the authentication token for accessing the default page to the user, also It by the user information of the user and can be presented in the authentication token write-in Database Unit of the user, so as to When user subsequently carries out page access, the information preserved in Database Unit is called to be verified.
In the present embodiment, no matter the authentication token is legal or illegal, can send the user Accessing page request is recorded into system log, and the behavior accessed is attempted each time so as to record user.
Referring to Fig. 2, the application embodiment also provides a kind of authentication protection system based on reverse proxy, the system Including authentication subsystem 100, reverse proxy module 200, background server 300, wherein:
The authentication subsystem 100 receives the accessing page request that user sends, and institute is carried in the accessing page request State the authentication token of user;
The accessing page request is forwarded to described by the reverse proxy module 200 when the authentication token is legal The background server 300 that accessing page request is directed toward;
The background server 300 is directed to the accessing page request, obtains page corresponding with the accessing page request Face resource;
The page resource is transmitted to the user by the reverse proxy module 200.
In one embodiment of the application, the system also includes log unit 400, the log unit 400 is used for No matter the authentication token is legal or illegal, records the accessing page request that the user sends.
In the present embodiment, the authentication protection system can use independent a set of user's checking system, can also Existing subscriber's system is multiplexed using modes such as such as ldap protocol, Restful Api, with shielded background server Concrete application can be associated with.
In the entire system, shielded background server does not perceive the presence of the authentication protection system especially.Depending on Work level of the authentication protection system in OSI is different, and background server may have complete unaware (when the certification When protection system works in 3 layers of network layer), only connection status perception is (when the authentication protection system works in 4 layers of transport layer When) or can perceive the state of request difference one of (when the authentication protection system works in 7 layers of application layer).
The present invention is preposition by authentication subsystem, and risk is solved in such a way that pre-authentication adds reverse proxy.Recognize in advance Card will check the authentication state of user when user accesses goal systems.It, will be into if user has passed through certification The process for entering reverse proxy forwards the request of user to goal systems and returns to the implementing result of goal systems to user.If User not yet passes certification, then user is guided to carry out authentication.In the whole process, goal systems is without modifying or two Secondary exploitation, to ensure that the safety of goal systems.
Those skilled in the art are supplied to the purpose described to the description of the various embodiments of the application above.It is not It is intended to exhaustive or is not intended to and limits the invention to single disclosed embodiment.As described above, the application's is various It substitutes and variation will be apparent for above-mentioned technology one of ordinary skill in the art.Therefore, although specifically begging for Some alternative embodiments are discussed, but other embodiment will be apparent or those skilled in the art are opposite It is easy to obtain.The application is intended to be included in all replacements, modification and the variation of the present invention that this has been crossed by discussion, and falls Other embodiment in the spirit and scope of above-mentioned application.

Claims (10)

1. a kind of authentication protection method based on reverse proxy, which is characterized in that the method includes:
The accessing page request that user sends is received, the authentication token of the user is carried in the accessing page request;
When the authentication token is legal, the accessing page request is forwarded to the backstage that the accessing page request is directed toward and is taken Business device;Wherein, the background server is directed to the accessing page request, obtains the page corresponding with the accessing page request Resource;
The page resource is transmitted to the user.
2. the authentication protection method according to claim 1 based on reverse proxy, which is characterized in that the method is also wrapped It includes:
When the authentication token is illegal, refuse the accessing page request that the user sends.
3. the authentication protection method according to claim 2 based on reverse proxy, which is characterized in that the authentication token is not Legal includes following at least one:
Authentication token is in outside the term of validity;
Authentication token does not allow to access the background server;
Authentication token occurs logging in regional jump;
There is beaching accommodation jump in authentication token.
4. the authentication protection method according to claim 1 based on reverse proxy, which is characterized in that the authentication token is pressed It is generated according to following manner:
The certification request for the default page that user submits is received, and whether verify the certification request legal;
When the certification request is legal, the authentication token for accessing the default page is issued to the user.
5. the authentication protection method according to claim 4 based on reverse proxy, which is characterized in that the method is also wrapped It includes:
In response to the certification request, authentication request is sent to user;
The verification information for the authentication request that user sends is received, and judges whether the verification information is correct;
If correct, whether legal the certification request is verified.
6. the authentication protection method according to claim 4 based on reverse proxy, which is characterized in that issued to the user After the authentication token for accessing the default page, the method further includes hair:
By the user information of the user and it is presented in the authentication token write-in Database Unit of the user.
7. the authentication protection method according to claim 4 based on reverse proxy, which is characterized in that verify the certification and ask The no legal step of Seeking Truth includes:
It verifies the occasional password carried in the certification request or whether one-time password is correct;
The occasional password carried in the certification request or one-time password are verified whether in the term of validity;
It verifies the occasional password carried in the certification request or whether one-time password is corresponding with active user;
If above-mentioned verification result is to be, judge that the certification request is legal.
8. the authentication protection method according to claim 1 based on reverse proxy, which is characterized in that the method is also wrapped It includes:
No matter the authentication token is legal or illegal, records the accessing page request that the user sends to system day In will.
9. a kind of authentication protection system based on reverse proxy, which is characterized in that the system comprises authentication subsystem, reversed generations Module, background server are managed, wherein:
The authentication subsystem receives the accessing page request that user sends, and carries the user's in the accessing page request Authentication token;
The reverse proxy module is forwarded to the page access when the authentication token is legal, by the accessing page request Ask the background server being directed toward;
The background server is directed to the accessing page request, obtains page resource corresponding with the accessing page request;
The page resource is transmitted to the user by the reverse proxy module.
10. the authentication protection system according to claim 9 based on reverse proxy, which is characterized in that the system is also wrapped Log unit is included, the log unit is used for no matter the authentication token to be legal or illegal, records the user and send Accessing page request.
CN201710090438.7A 2017-02-20 2017-02-20 A kind of authentication protection method and system based on reverse proxy Pending CN108462671A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710090438.7A CN108462671A (en) 2017-02-20 2017-02-20 A kind of authentication protection method and system based on reverse proxy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710090438.7A CN108462671A (en) 2017-02-20 2017-02-20 A kind of authentication protection method and system based on reverse proxy

Publications (1)

Publication Number Publication Date
CN108462671A true CN108462671A (en) 2018-08-28

Family

ID=63221991

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710090438.7A Pending CN108462671A (en) 2017-02-20 2017-02-20 A kind of authentication protection method and system based on reverse proxy

Country Status (1)

Country Link
CN (1) CN108462671A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109379336A (en) * 2018-09-18 2019-02-22 中汇信息技术(上海)有限公司 A kind of uniform authentication method, distributed system and computer readable storage medium
CN109587140A (en) * 2018-12-06 2019-04-05 四川长虹电器股份有限公司 Implementation method based on openresty dynamic password proxy gateway
CN110601832A (en) * 2019-09-27 2019-12-20 中煤航测遥感集团有限公司 Data access method and device
CN113938327A (en) * 2021-12-17 2022-01-14 亿次网联(杭州)科技有限公司 VPN service access method and access system, electronic device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277297A (en) * 2007-03-26 2008-10-01 华为技术有限公司 Conversation control system and method
CN102984169A (en) * 2012-12-11 2013-03-20 中广核工程有限公司 Single sign-on method, equipment and system
CN103178969A (en) * 2013-04-16 2013-06-26 河南有线电视网络集团有限公司 Service authentication method and system
CN104618404A (en) * 2015-03-10 2015-05-13 网神信息技术(北京)股份有限公司 Processing method, device and system for preventing network attack to Web server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277297A (en) * 2007-03-26 2008-10-01 华为技术有限公司 Conversation control system and method
CN102984169A (en) * 2012-12-11 2013-03-20 中广核工程有限公司 Single sign-on method, equipment and system
CN103178969A (en) * 2013-04-16 2013-06-26 河南有线电视网络集团有限公司 Service authentication method and system
CN104618404A (en) * 2015-03-10 2015-05-13 网神信息技术(北京)股份有限公司 Processing method, device and system for preventing network attack to Web server

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109379336A (en) * 2018-09-18 2019-02-22 中汇信息技术(上海)有限公司 A kind of uniform authentication method, distributed system and computer readable storage medium
CN109379336B (en) * 2018-09-18 2021-07-09 中汇信息技术(上海)有限公司 Unified authentication method, distributed system and computer readable storage medium
CN109587140A (en) * 2018-12-06 2019-04-05 四川长虹电器股份有限公司 Implementation method based on openresty dynamic password proxy gateway
CN109587140B (en) * 2018-12-06 2021-11-30 四川长虹电器股份有限公司 Implementation method of dynamic password proxy gateway based on openness
CN110601832A (en) * 2019-09-27 2019-12-20 中煤航测遥感集团有限公司 Data access method and device
CN113938327A (en) * 2021-12-17 2022-01-14 亿次网联(杭州)科技有限公司 VPN service access method and access system, electronic device and storage medium
CN113938327B (en) * 2021-12-17 2022-05-24 亿次网联(杭州)科技有限公司 VPN service access method and access system, electronic device and storage medium

Similar Documents

Publication Publication Date Title
CN108684041B (en) System and method for login authentication
US9374369B2 (en) Multi-factor authentication and comprehensive login system for client-server networks
CN101331731B (en) Method, apparatus and program products for custom authentication of a principal in a federation by an identity provider
CN103685267B (en) Data access method and device
CN101090319B (en) Computer readable recording medium storing control program, communication system and computer data signal embedded in carrier wave
CN106209749A (en) Single-point logging method and the processing method and processing device of device, relevant device and application
US20090300168A1 (en) Device-specific identity
CN107122674B (en) Access method of oracle database applied to operation and maintenance auditing system
CN103780580B (en) Method, server and system for providing capability access strategy
CN111355713B (en) Proxy access method, device, proxy gateway and readable storage medium
CN103179134A (en) Single sign on method and system based on Cookie and application server thereof
CN103384198B (en) A kind of authenticating user identification method of servicing based on mailbox and system
CN105229987A (en) The initiatively mobile authentication of associating
CN104734849A (en) Method and system for conducting authentication on third-party application
US9059987B1 (en) Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network
CN112468481A (en) Single-page and multi-page web application identity integrated authentication method based on CAS
CN107528865A (en) The method for down loading and system of file
CN108462671A (en) A kind of authentication protection method and system based on reverse proxy
CN105721412A (en) Method and device for authenticating identity between multiple systems
CN106209727B (en) Session access method and device
CN112532599A (en) Dynamic authentication method, device, electronic equipment and storage medium
CN103971059B (en) Cookie local storage and usage method
CN106161475A (en) The implementation method of subscription authentication and device
CN102143131A (en) User logout method and authentication server
CN112600674A (en) User security authentication method and device for front-end and back-end separation system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180828