CN108462671A - A kind of authentication protection method and system based on reverse proxy - Google Patents
A kind of authentication protection method and system based on reverse proxy Download PDFInfo
- Publication number
- CN108462671A CN108462671A CN201710090438.7A CN201710090438A CN108462671A CN 108462671 A CN108462671 A CN 108462671A CN 201710090438 A CN201710090438 A CN 201710090438A CN 108462671 A CN108462671 A CN 108462671A
- Authority
- CN
- China
- Prior art keywords
- user
- authentication
- request
- authentication token
- reverse proxy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
Abstract
The application provides a kind of authentication protection method and system based on reverse proxy, wherein the method includes:The accessing page request that user sends is received, the authentication token of the user is carried in the accessing page request;When the authentication token is legal, the accessing page request is forwarded to the background server that the accessing page request is directed toward;Wherein, the background server is directed to the accessing page request, obtains page resource corresponding with the accessing page request;The page resource is transmitted to the user.Authentication protection method and system provided by the present application based on reverse proxy, can avoid modifying to goal systems and secondary development, to improve the intensity of certification protection.
Description
Technical field
This application involves Internet technical field, more particularly to a kind of authentication protection method based on reverse proxy and it is
System.
Background technology
User's additional input one in unauthorized login process, is usually required to test except account number cipher in anti-locking system
Code is demonstrate,proved to be protected.
Currently, in the prior art can be simultaneously or after user account, cryptographic check to identifying code input or verification process
It carries out, that is, needs to modify or secondary development to protection goal systems.
Although the prior art has used multiple-factor certification, but it needs modification to goal systems or secondary development that can cause
The deployment of Verification System, use cost increase;On the one hand, it can not partly modify or the system of secondary development, it is impossible into
The autonomous protection of row, can only be allowed to expose, it is easy to cause security risk;On the other hand, attacker can be not over recognizing
When card, still possess limited permission contact target system, execute some system commands including logging in or giving password for change,
If there are security breaches for system at this time, it will cause attacker that can complete intrusion behavior.
It should be noted that above to the introduction of technical background be intended merely to it is convenient to the technical solution of the application carry out it is clear,
Complete explanation, and facilitate the understanding of those skilled in the art and illustrate.Cannot merely because these schemes the application's
Background technology part is expounded and thinks that above-mentioned technical proposal is known to those skilled in the art.
Invention content
The application embodiment is designed to provide a kind of authentication protection method and system based on reverse proxy, can
It avoids modifying to goal systems and secondary development, to improve the intensity of certification protection.
To achieve the above object, on the one hand the application provides a kind of authentication protection method based on reverse proxy, the side
Method includes:The accessing page request that user sends is received, the authentication token of the user is carried in the accessing page request;When
When the authentication token is legal, the accessing page request is forwarded to the background server that the accessing page request is directed toward;
Wherein, the background server is directed to the accessing page request, obtains page resource corresponding with the accessing page request;
The page resource is transmitted to the user.
Further, the method further includes:When the authentication token is illegal, refuse the page that the user sends
Access request.
Further, it includes following at least one that the authentication token is illegal:Authentication token is in outside the term of validity;Certification
Token does not allow to access the background server;Authentication token occurs logging in regional jump;There is beaching accommodation jump in authentication token
Jump.
Further, the authentication token generates in the following manner:Receive the recognizing for the default page that user submits
Card request, and whether verify the certification request legal;When the certification request is legal, issued to the user for accessing
The authentication token of the default page.
Further, the method further includes:In response to the certification request, authentication request is sent to user;It connects
The verification information for the authentication request that user sends is received, and judges whether the verification information is correct;If correct,
Whether legal verify the certification request.
Further, after issuing the authentication token for accessing the default page to the user, the method
Further include:By the user information of the user and it is presented in the authentication token write-in Database Unit of the user.
Further, verifying the whether legal step of the certification request includes:It verifies and carries in the certification request
Whether occasional password or one-time password are correct;Verify the occasional password or one-time password carried in the certification request
Whether in the term of validity;Verify the occasional password carried in the certification request or one-time password whether with active user
It is corresponding;If above-mentioned verification result is to be, judge that the certification request is legal.
Further, the method further includes:No matter the authentication token is legal or illegal, sends out the user
The accessing page request come is recorded into system log.
To achieve the above object, on the other hand the application also provides a kind of authentication protection system based on reverse proxy, institute
The system of stating includes authentication subsystem, reverse proxy module, background server, wherein:The authentication subsystem receives user and sends
Accessing page request, the authentication token of the user is carried in the accessing page request;The reverse proxy module is in institute
State authentication token it is legal when, the accessing page request is forwarded to the background server that the accessing page request is directed toward;Institute
It states background server and is directed to the accessing page request, obtain page resource corresponding with the accessing page request;It is described anti-
The page resource is transmitted to the user to proxy module.
Further, the system also includes log units, and the log unit is for no matter the authentication token to be legal
Or it is illegal, record the accessing page request that the user sends.
The present invention is preposition by authentication subsystem, and risk is solved in such a way that pre-authentication adds reverse proxy.Recognize in advance
Card will check the authentication state of user when user accesses goal systems.It, will be into if user has passed through certification
The process for entering reverse proxy forwards the request of user to goal systems and returns to the implementing result of goal systems to user.If
User not yet passes certification, then user is guided to carry out authentication.In the whole process, goal systems is without modifying or two
Secondary exploitation, to ensure that the safety of goal systems.
With reference to following description and accompanying drawings, the particular implementation of the application is disclosed in detail, specifies the original of the application
Reason can be in a manner of adopted.It should be understood that presently filed embodiment is not so limited in range.In appended power
In the range of the spirit and terms that profit requires, presently filed embodiment includes many changes, modifications and is equal.
The feature for describing and/or showing for a kind of embodiment can be in a manner of same or similar one or more
It is used in a other embodiment, it is combined with the feature in other embodiment, or substitute the feature in other embodiment.
It should be emphasized that term "comprises/comprising" refers to the presence of feature, one integral piece, step or component when being used herein, but simultaneously
It is not excluded for the presence or additional of one or more other features, one integral piece, step or component.
Description of the drawings
Included attached drawing is used for providing being further understood from the application embodiment, and which constitute the one of specification
The principle of the application for illustrating presently filed embodiment, and with verbal description is come together to illustrate in part.It should be evident that
The accompanying drawings in the following description is only some embodiments of the application, for those of ordinary skill in the art, is not being paid
Under the premise of going out creative labor, other drawings may also be obtained based on these drawings.In the accompanying drawings:
Fig. 1 is a kind of flow chart for authentication protection method based on reverse proxy that the application embodiment provides;
Fig. 2 is a kind of structural schematic diagram for authentication protection system based on reverse proxy that the application embodiment provides.
Specific implementation mode
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality
The attached drawing in mode is applied, the technical solution in the application embodiment is clearly and completely described, it is clear that described
Embodiment is only a part of embodiment of the application, rather than whole embodiments.Based on the embodiment party in the application
Formula, all other embodiment obtained by those of ordinary skill in the art without making creative efforts, is all answered
When the range for belonging to the application protection.
Referring to Fig. 1, the application embodiment provides a kind of authentication protection method based on reverse proxy, the method packet
Include following steps.
S1:The accessing page request that user sends is received, the certification that the user is carried in the accessing page request enables
Board.
In the present embodiment, user can carry out page access according to default page address.The default page address
It can be the character string according to fixed format write.For example, the default page address can be uniform resource locator
(Uniform Resource Locator, URL).The set form can limit default page address component part and
Each component part puts in order.For example, may include protocol-identifier, server identification and money in the default page address
Source identifies.Wherein, the representative character of protocol-identifier Data Transport Protocol such as can be http, https, ftp.The service
Device mark can be the title of server or the IP address of server.The resource identification can be in the page to be visited
The number that the store name of resource in the server is either assigned in the server.
In the present embodiment, it in the accessing page request may include above-mentioned default page address.In this implementation
In mode, the accessing page request can be the message (message) write according to preset format.It is visited in the page
It asks in request, may include the field of preset quantity, each field can fill different contents.For example, the page is visited
Ask that in request may include source IP field, destination IP field and page address field etc..Wherein, source IP field can fill hair
Send the IP address of the client of the accessing page request, the destination IP field that can fill the page access to be received and ask
The IP address for the server asked can fill the corresponding page address of the page to be visited in the page address field.
In the present embodiment, receive the accessing page request can be authentication subsystem, and the page access is asked
The authentication token of the user can be carried in asking.The authentication token can be used for accessing the page.
S2:When the authentication token is legal, the accessing page request is forwarded to the accessing page request and is directed toward
Background server;Wherein, the background server is directed to the accessing page request, obtains and the accessing page request pair
The page resource answered.
In the present embodiment, authentication subsystem can verify the authentication token.When the authentication token closes
When method, reverse proxy process can be entered.The reverse proxy process can be asked the page access by reverse proxy module
It asks and is forwarded to the background server that the accessing page request is directed toward.Wherein, the use can be run in the background server
The goal systems that family desires access to.When the background server receives the accessing page request that forwarding comes, it can be directed to described
Accessing page request obtains page resource corresponding with the accessing page request.The page resource for example can be the page
The information such as picture, video, word, the link of middle load.
S3:The page resource is transmitted to the user.
In the present embodiment, after background server gets the page resource, the page resource can be sent out
Give reverse proxy module.Then the page resource can be transmitted to user by the reverse proxy module.In this way, user and backstage
Not directly into row data communication between server, but by reverse proxy module carry out data forwarding, in this way, user just without
Method is modified to the goal systems run in background server or secondary development.
In one embodiment of the application, when the authentication token is illegal, show that user does not have accession page
Permission, at this point it is possible to directly refuse the accessing page request that the user sends, after avoiding user from further accessing
Platform server.
In one embodiment of the application, when judging whether token is legal, it can be determined that whether authentication token, which is in, has
In the effect phase, whether authentication token allows to access the background server, authentication token occur logging in area jump, certification enables
Whether board there is beaching accommodation jump.Wherein, if there is following at least one situation, it can think that authentication token does not conform to
Method:Authentication token is in outside the term of validity;Authentication token does not allow to access the background server;Authentication token occurs logging in area
Jump;Or there is beaching accommodation jump in authentication token.
In the present embodiment, the authentication token can be presented to user in response to the certification request of user in advance
's.Specifically, the certification request for the default page of user's submission can be received, and verifies whether the certification request closes
Method.Specifically, verify the certification request it is whether legal when, can verify the occasional password carried in the certification request or
Whether the occasional password or one-time password that whether one-time password correct, is carried in the certification request are in the term of validity
Whether the occasional password or one-time password carried in interior, the described certification request be corresponding with active user.If above-mentioned verification
Result is to be, then can be determined that the certification request is legal.When the certification request is legal, can be issued to the user
Authentication token for accessing the default page.
In the present embodiment, the identity of user can also be verified when user has submitted certification request.If the certification
Do not have to include the identity information of user in request, then can send authentication request to user in response to the certification request.
After user receives authentication request, relevant authentication information can be provided, such as ID card No., hand can be provided
Machine number, preset password etc..It, can be in this way, after receiving the verification information for the authentication request sent of user
Judge whether the verification information is correct.If correct, whether legal the certification request can be further verified.
In the present embodiment, after issuing the authentication token for accessing the default page to the user, also
It by the user information of the user and can be presented in the authentication token write-in Database Unit of the user, so as to
When user subsequently carries out page access, the information preserved in Database Unit is called to be verified.
In the present embodiment, no matter the authentication token is legal or illegal, can send the user
Accessing page request is recorded into system log, and the behavior accessed is attempted each time so as to record user.
Referring to Fig. 2, the application embodiment also provides a kind of authentication protection system based on reverse proxy, the system
Including authentication subsystem 100, reverse proxy module 200, background server 300, wherein:
The authentication subsystem 100 receives the accessing page request that user sends, and institute is carried in the accessing page request
State the authentication token of user;
The accessing page request is forwarded to described by the reverse proxy module 200 when the authentication token is legal
The background server 300 that accessing page request is directed toward;
The background server 300 is directed to the accessing page request, obtains page corresponding with the accessing page request
Face resource;
The page resource is transmitted to the user by the reverse proxy module 200.
In one embodiment of the application, the system also includes log unit 400, the log unit 400 is used for
No matter the authentication token is legal or illegal, records the accessing page request that the user sends.
In the present embodiment, the authentication protection system can use independent a set of user's checking system, can also
Existing subscriber's system is multiplexed using modes such as such as ldap protocol, Restful Api, with shielded background server
Concrete application can be associated with.
In the entire system, shielded background server does not perceive the presence of the authentication protection system especially.Depending on
Work level of the authentication protection system in OSI is different, and background server may have complete unaware (when the certification
When protection system works in 3 layers of network layer), only connection status perception is (when the authentication protection system works in 4 layers of transport layer
When) or can perceive the state of request difference one of (when the authentication protection system works in 7 layers of application layer).
The present invention is preposition by authentication subsystem, and risk is solved in such a way that pre-authentication adds reverse proxy.Recognize in advance
Card will check the authentication state of user when user accesses goal systems.It, will be into if user has passed through certification
The process for entering reverse proxy forwards the request of user to goal systems and returns to the implementing result of goal systems to user.If
User not yet passes certification, then user is guided to carry out authentication.In the whole process, goal systems is without modifying or two
Secondary exploitation, to ensure that the safety of goal systems.
Those skilled in the art are supplied to the purpose described to the description of the various embodiments of the application above.It is not
It is intended to exhaustive or is not intended to and limits the invention to single disclosed embodiment.As described above, the application's is various
It substitutes and variation will be apparent for above-mentioned technology one of ordinary skill in the art.Therefore, although specifically begging for
Some alternative embodiments are discussed, but other embodiment will be apparent or those skilled in the art are opposite
It is easy to obtain.The application is intended to be included in all replacements, modification and the variation of the present invention that this has been crossed by discussion, and falls
Other embodiment in the spirit and scope of above-mentioned application.
Claims (10)
1. a kind of authentication protection method based on reverse proxy, which is characterized in that the method includes:
The accessing page request that user sends is received, the authentication token of the user is carried in the accessing page request;
When the authentication token is legal, the accessing page request is forwarded to the backstage that the accessing page request is directed toward and is taken
Business device;Wherein, the background server is directed to the accessing page request, obtains the page corresponding with the accessing page request
Resource;
The page resource is transmitted to the user.
2. the authentication protection method according to claim 1 based on reverse proxy, which is characterized in that the method is also wrapped
It includes:
When the authentication token is illegal, refuse the accessing page request that the user sends.
3. the authentication protection method according to claim 2 based on reverse proxy, which is characterized in that the authentication token is not
Legal includes following at least one:
Authentication token is in outside the term of validity;
Authentication token does not allow to access the background server;
Authentication token occurs logging in regional jump;
There is beaching accommodation jump in authentication token.
4. the authentication protection method according to claim 1 based on reverse proxy, which is characterized in that the authentication token is pressed
It is generated according to following manner:
The certification request for the default page that user submits is received, and whether verify the certification request legal;
When the certification request is legal, the authentication token for accessing the default page is issued to the user.
5. the authentication protection method according to claim 4 based on reverse proxy, which is characterized in that the method is also wrapped
It includes:
In response to the certification request, authentication request is sent to user;
The verification information for the authentication request that user sends is received, and judges whether the verification information is correct;
If correct, whether legal the certification request is verified.
6. the authentication protection method according to claim 4 based on reverse proxy, which is characterized in that issued to the user
After the authentication token for accessing the default page, the method further includes hair:
By the user information of the user and it is presented in the authentication token write-in Database Unit of the user.
7. the authentication protection method according to claim 4 based on reverse proxy, which is characterized in that verify the certification and ask
The no legal step of Seeking Truth includes:
It verifies the occasional password carried in the certification request or whether one-time password is correct;
The occasional password carried in the certification request or one-time password are verified whether in the term of validity;
It verifies the occasional password carried in the certification request or whether one-time password is corresponding with active user;
If above-mentioned verification result is to be, judge that the certification request is legal.
8. the authentication protection method according to claim 1 based on reverse proxy, which is characterized in that the method is also wrapped
It includes:
No matter the authentication token is legal or illegal, records the accessing page request that the user sends to system day
In will.
9. a kind of authentication protection system based on reverse proxy, which is characterized in that the system comprises authentication subsystem, reversed generations
Module, background server are managed, wherein:
The authentication subsystem receives the accessing page request that user sends, and carries the user's in the accessing page request
Authentication token;
The reverse proxy module is forwarded to the page access when the authentication token is legal, by the accessing page request
Ask the background server being directed toward;
The background server is directed to the accessing page request, obtains page resource corresponding with the accessing page request;
The page resource is transmitted to the user by the reverse proxy module.
10. the authentication protection system according to claim 9 based on reverse proxy, which is characterized in that the system is also wrapped
Log unit is included, the log unit is used for no matter the authentication token to be legal or illegal, records the user and send
Accessing page request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710090438.7A CN108462671A (en) | 2017-02-20 | 2017-02-20 | A kind of authentication protection method and system based on reverse proxy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710090438.7A CN108462671A (en) | 2017-02-20 | 2017-02-20 | A kind of authentication protection method and system based on reverse proxy |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108462671A true CN108462671A (en) | 2018-08-28 |
Family
ID=63221991
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710090438.7A Pending CN108462671A (en) | 2017-02-20 | 2017-02-20 | A kind of authentication protection method and system based on reverse proxy |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108462671A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109379336A (en) * | 2018-09-18 | 2019-02-22 | 中汇信息技术(上海)有限公司 | A kind of uniform authentication method, distributed system and computer readable storage medium |
CN109587140A (en) * | 2018-12-06 | 2019-04-05 | 四川长虹电器股份有限公司 | Implementation method based on openresty dynamic password proxy gateway |
CN110601832A (en) * | 2019-09-27 | 2019-12-20 | 中煤航测遥感集团有限公司 | Data access method and device |
CN113938327A (en) * | 2021-12-17 | 2022-01-14 | 亿次网联(杭州)科技有限公司 | VPN service access method and access system, electronic device and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101277297A (en) * | 2007-03-26 | 2008-10-01 | 华为技术有限公司 | Conversation control system and method |
CN102984169A (en) * | 2012-12-11 | 2013-03-20 | 中广核工程有限公司 | Single sign-on method, equipment and system |
CN103178969A (en) * | 2013-04-16 | 2013-06-26 | 河南有线电视网络集团有限公司 | Service authentication method and system |
CN104618404A (en) * | 2015-03-10 | 2015-05-13 | 网神信息技术(北京)股份有限公司 | Processing method, device and system for preventing network attack to Web server |
-
2017
- 2017-02-20 CN CN201710090438.7A patent/CN108462671A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101277297A (en) * | 2007-03-26 | 2008-10-01 | 华为技术有限公司 | Conversation control system and method |
CN102984169A (en) * | 2012-12-11 | 2013-03-20 | 中广核工程有限公司 | Single sign-on method, equipment and system |
CN103178969A (en) * | 2013-04-16 | 2013-06-26 | 河南有线电视网络集团有限公司 | Service authentication method and system |
CN104618404A (en) * | 2015-03-10 | 2015-05-13 | 网神信息技术(北京)股份有限公司 | Processing method, device and system for preventing network attack to Web server |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109379336A (en) * | 2018-09-18 | 2019-02-22 | 中汇信息技术(上海)有限公司 | A kind of uniform authentication method, distributed system and computer readable storage medium |
CN109379336B (en) * | 2018-09-18 | 2021-07-09 | 中汇信息技术(上海)有限公司 | Unified authentication method, distributed system and computer readable storage medium |
CN109587140A (en) * | 2018-12-06 | 2019-04-05 | 四川长虹电器股份有限公司 | Implementation method based on openresty dynamic password proxy gateway |
CN109587140B (en) * | 2018-12-06 | 2021-11-30 | 四川长虹电器股份有限公司 | Implementation method of dynamic password proxy gateway based on openness |
CN110601832A (en) * | 2019-09-27 | 2019-12-20 | 中煤航测遥感集团有限公司 | Data access method and device |
CN113938327A (en) * | 2021-12-17 | 2022-01-14 | 亿次网联(杭州)科技有限公司 | VPN service access method and access system, electronic device and storage medium |
CN113938327B (en) * | 2021-12-17 | 2022-05-24 | 亿次网联(杭州)科技有限公司 | VPN service access method and access system, electronic device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108684041B (en) | System and method for login authentication | |
US9374369B2 (en) | Multi-factor authentication and comprehensive login system for client-server networks | |
CN101331731B (en) | Method, apparatus and program products for custom authentication of a principal in a federation by an identity provider | |
CN103685267B (en) | Data access method and device | |
CN101090319B (en) | Computer readable recording medium storing control program, communication system and computer data signal embedded in carrier wave | |
CN106209749A (en) | Single-point logging method and the processing method and processing device of device, relevant device and application | |
US20090300168A1 (en) | Device-specific identity | |
CN107122674B (en) | Access method of oracle database applied to operation and maintenance auditing system | |
CN103780580B (en) | Method, server and system for providing capability access strategy | |
CN111355713B (en) | Proxy access method, device, proxy gateway and readable storage medium | |
CN103179134A (en) | Single sign on method and system based on Cookie and application server thereof | |
CN103384198B (en) | A kind of authenticating user identification method of servicing based on mailbox and system | |
CN105229987A (en) | The initiatively mobile authentication of associating | |
CN104734849A (en) | Method and system for conducting authentication on third-party application | |
US9059987B1 (en) | Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network | |
CN112468481A (en) | Single-page and multi-page web application identity integrated authentication method based on CAS | |
CN107528865A (en) | The method for down loading and system of file | |
CN108462671A (en) | A kind of authentication protection method and system based on reverse proxy | |
CN105721412A (en) | Method and device for authenticating identity between multiple systems | |
CN106209727B (en) | Session access method and device | |
CN112532599A (en) | Dynamic authentication method, device, electronic equipment and storage medium | |
CN103971059B (en) | Cookie local storage and usage method | |
CN106161475A (en) | The implementation method of subscription authentication and device | |
CN102143131A (en) | User logout method and authentication server | |
CN112600674A (en) | User security authentication method and device for front-end and back-end separation system and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180828 |