CN109274685B - Multi-system login method and device, computer equipment and storage medium - Google Patents

Multi-system login method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN109274685B
CN109274685B CN201811302719.5A CN201811302719A CN109274685B CN 109274685 B CN109274685 B CN 109274685B CN 201811302719 A CN201811302719 A CN 201811302719A CN 109274685 B CN109274685 B CN 109274685B
Authority
CN
China
Prior art keywords
user
login
account
credential
user information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811302719.5A
Other languages
Chinese (zh)
Other versions
CN109274685A (en
Inventor
方思行
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Financial Technology Co Ltd Shanghai
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN201811302719.5A priority Critical patent/CN109274685B/en
Priority to PCT/CN2019/070885 priority patent/WO2020087778A1/en
Publication of CN109274685A publication Critical patent/CN109274685A/en
Application granted granted Critical
Publication of CN109274685B publication Critical patent/CN109274685B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application relates to the information security technology, in particular to a multi-system login method, a multi-system login device, a computer device and a storage medium. The method comprises the following steps: receiving a first login request from a first system; the first login request carries a first user account and a first account password; when the first user account and the first account password pass the verification, generating a user login certificate and issuing the user login certificate; determining user information associated with the first user account and first account password; storing the user login credentials and the user information in an associated manner; receiving a second login request from a second system; the second login request carries a user login credential; and verifying the user authority corresponding to the user information associated with the user login credential, and completing the login of the second system after the verification is passed. By adopting the method, the multi-system login efficiency can be improved.

Description

Multi-system login method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a multi-system method, apparatus, computer device, and storage medium.
Background
With the development of computer technology, more and more services can be realized and completed through computer equipment. For different services, it is usually necessary to log in the corresponding service system to perform corresponding operations. And the system login, authentication and authentication methods and the like of each business system are generally executed independently by each system.
In the traditional multi-system login, corresponding user accounts and account passwords are respectively input during login of different service systems, and the corresponding service systems can be logged in only after authentication is passed. Therefore, although a plurality of service systems can be logged in, when the number of the service systems to be logged in by a user is too many, the user needs to input a corresponding user name and a corresponding password to log in each service system, so that the operation is complicated, and the multi-system logging efficiency is low.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a multi-system login method, an apparatus, a computer device, and a storage medium, which can implement multi-system quick login.
A multi-system login method is applied to an authentication server, and comprises the following steps:
receiving a first login request from a first system; the first login request carries a first user account and a first account password;
when the first user account and the first account password pass the verification, generating a user login certificate and issuing the user login certificate;
determining user information associated with the first user account and first account password;
storing the user login credentials and the user information in an associated manner;
receiving a second login request from a second system; the second login request carries a user login credential;
and verifying the user authority corresponding to the user information associated with the user login credential, and completing the login of the second system after the verification is passed.
A multi-system login apparatus, the apparatus comprising:
the system comprises a receiving module, a first login module and a second login module, wherein the receiving module is used for receiving a first login request from a first system; the first login request carries a first user account and a first account password;
the generating module is used for generating and issuing a user login certificate after the first user account and the first account password pass the verification;
a determination module for determining user information associated with the first user account and first account password;
the associated storage module is used for storing the user login credentials and the user information in an associated manner;
the receiving module is further used for receiving a second login request from a second system; the second login request carries a user login credential;
and the verification module is used for verifying the user authority corresponding to the user information associated with the user login credential, and completing the login of the second system after the verification is passed.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
receiving a first login request from a first system; the first login request carries a first user account and a first account password;
when the first user account and the first account password pass the verification, generating a user login certificate and issuing the user login certificate;
determining user information associated with the first user account and first account password;
storing the user login credentials and the user information in an associated manner;
receiving a second login request from a second system; the second login request carries a user login credential;
and verifying the user authority corresponding to the user information associated with the user login credential, and completing the login of the second system after the verification is passed.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
receiving a first login request from a first system; the first login request carries a first user account and a first account password;
when the first user account and the first account password pass the verification, generating a user login certificate and issuing the user login certificate;
determining user information associated with the first user account and first account password;
storing the user login credentials and the user information in an associated manner;
receiving a second login request from a second system; the second login request carries a user login credential;
and verifying the user authority corresponding to the user information associated with the user login credential, and completing the login of the second system after the verification is passed.
According to the multi-system login method, the multi-system login device, the computer equipment and the storage medium, when the first system passes login verification, the authentication server generates and issues the user login credential. The authentication server stores the user information and the user login credentials in an associated mode, so that the user can log in through the user login credentials when logging in the second system. In this way, the authentication server only needs to verify the user authority corresponding to the user information associated with the user login credential, and after the verification is passed, the login of the second system can be completed. Therefore, the service system and the authentication server are independent, when a user needs to log in a plurality of different systems, the user does not need to input a user account and an account password when logging in each system, the user can log in the plurality of systems only through the user login credentials, the operation of logging in the plurality of systems is reduced on the premise of ensuring the safety of multi-system login, and the efficiency of multi-system login is greatly improved.
Drawings
FIG. 1 is a diagram illustrating an example of an application scenario for a multi-system login method;
FIG. 2 is a flow diagram that illustrates a method for multi-system login in one embodiment;
FIG. 3 is a timing diagram of a multi-system login method in one embodiment;
FIG. 4 is a block diagram of an embodiment of a multi-system login device;
FIG. 5 is a block diagram of an alternative embodiment of a multiple system login device;
FIG. 6 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The multi-system login method provided by the application can be applied to the application environment shown in fig. 1. Wherein the terminal 110 communicates with the service system 120 through a network. The business system 120 includes a plurality of systems, such as a first system 121 and a second system 122. The business system 120 and the authentication server 130 are connected through a network. The terminal 110 sends a first login request carrying a first user account and a first account password to the first system 121, and the first system 121 forwards the first login request to the authentication server 130. The authentication server 130 verifies the first user account and the first account password, generates a user login credential after the verification is passed, and issues the user login credential to the terminal 110. The terminal 110 sends a second login request carrying the login credentials of the user to the second system 122, and the second system 122 forwards the second login request to the authentication server 130. The authentication server 130 verifies the user information associated with the user login credentials, and completes the login of the second system after the verification is passed.
The terminal 110 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. The business system 120 may be implemented as a stand-alone server or a cluster of servers. The first system and the second system are used for distinguishing different service systems, and both the first system and the second system can be called as the service systems on the premise of not causing ambiguity. The authentication server 130 may be implemented as a stand-alone server or as a server cluster of multiple servers.
In one embodiment, as shown in fig. 2, a multi-system login method is provided, which is described by taking the method as an example applied to the authentication server 130 in fig. 1, and includes the following steps:
s202, receiving a first login request from a first system; the first login request carries a first user account and a first account password.
The first system is a service system, and may specifically be a first service server. The first login request is a login request triggered when the first service server is logged in through the user account. The authentication server is a server corresponding to a plurality of business systems and providing a service of verifying a user account registered in each system.
Specifically, a user can trigger a first login request for logging in a first system through a terminal, and the first system forwards the received first login request to an authentication server. The authentication server may receive a first login request from a first system over a network connection. The first login request carries a first user account and a first account password.
In one embodiment, a browser application is run on the terminal, and the terminal can enter a login interface corresponding to the first system through the browser application. The user inputs a first user account and a first account password in the login interface. And the terminal generates a login request according to the first user account and the first account password. The terminal can detect a trigger operation for triggering the sending of the login request, and when the trigger operation is detected, the terminal sends the login request to the first system.
The triggering operation is a preset operation acting on the login interface, and the login request is triggered and sent when the triggering operation is detected. The trigger operation may specifically be a touch operation, a cursor operation, a key operation, or a voice operation. The touch operation can be touch click operation, touch press operation or touch slide operation, and the touch operation can be single-point touch operation or multi-point touch operation; the cursor operation can be an operation of controlling a cursor to click or an operation of controlling the cursor to press; the key operation may be a virtual key operation or a physical key operation, etc.
And S204, when the first user account and the first account password pass the verification, generating a user login certificate and issuing the user login certificate.
The user login credentials are credentials for verifying the identity of the user, and specifically may be letters, numbers, Chinese characters or character strings. The authentication server receives login requests corresponding to different user accounts and generates different user login credentials. The user login credentials may be randomly generated, thus ensuring that a unique user login credential is generated each time the authentication server receives a first login request.
Specifically, after receiving a first login request carrying a first user account and a first account password, the authentication server performs comparison verification according to the stored user account and the corresponding account password. And when the first user account and the first account password pass the account verification, the authentication server randomly generates a corresponding user login certificate. And responding to the first login request, the authentication server issues the user login certificate to the first system, and the first system forwards the user login certificate to the terminal. And the terminal stores the received user login credentials in a cookie of the browser.
In one embodiment, when the user registers an account, the authentication server may store the user account, an account password, and user information (e.g., information such as a mobile phone number bound to the user account or a post-6-digit id card of the user) in an associated manner. After receiving the first login request, the authentication server can check the first login request according to the pre-stored user account and the pre-stored account password. And generating a user login certificate after the verification is passed.
S206, determining user information associated with the first user account and the first account password.
The user information is information related to the user identity, and specifically may be a mobile phone number of the user, a unique identity card number, the last six digits of the unique identity card number, a character string uniquely bound with the user, and the like. Specifically, when the user registers an account, the authentication server may associate the user account, the account password, and the user information, and store the user account, the account password, and the user information in the database. The authentication server may look up user information associated with the first user account and the first account password from a database.
It is understood that the user information is information that a user must input when registering a plurality of associated systems, and the input user information is the same for the same user when registering user accounts corresponding to a plurality of systems. In this way, the identity of the user can be verified conveniently according to the user information.
S208, storing the user login credentials and the user information in an associated manner.
Specifically, after generating the user login credential, the authentication server may obtain user information associated with the first user account, associate the user login credential with corresponding user information, and store the associated user login credential and user information in a key-value form in a Redis database (the Redis database is a key-value storage system). The Redis database may be configured in the authentication server, or may be configured in other associated servers.
S210, receiving a second login request from a second system; the second login request carries a user login credential.
The second system is a service system, and may specifically be a second service server. The second login request is a login request triggered when the user logs in the second service server through the user login credential. In particular, the authentication server may receive a second login request from a second system over the network connection. And the second login request carries a user login credential.
In one embodiment, a browser application is run on the terminal, and the terminal can enter a login interface corresponding to the second system through the browser application. When the user logs in the second system through the browser application, the terminal acquires user login credentials from a cookie (cache) of the browser. And the terminal sends a second login request carrying the login credentials of the user to the second system. The second system forwards the login request to the authentication server.
In one embodiment, the generating of the second login request comprises: the terminal receives a user login certificate issued by an authentication server; the terminal stores the user login credentials into a browser cache; the terminal receives a login instruction aiming at a second system, which is triggered by a user through a browser; the terminal searches a user login certificate from a browser cache according to the login instruction; and when the terminal finds the user login credentials, sending a second login request carrying the user login credentials to the authentication server.
In one embodiment, when a user successfully logs in a first system through a terminal by using a first user account, the user receives a user login certificate issued by an authentication server. The terminal may store the user login credentials in a browser cache. When a user logs in a second system through a browser, a terminal receives a login instruction aiming at the second system, which is triggered by the user through the browser, and searches a user login credential from a browser cache according to the login instruction. And when the user login credentials are found, generating a second login request according to the user login credentials. And the terminal sends the second login request to the second system, and the second system forwards the second login request to the authentication server.
In the above embodiment, when logging in the second system through the browser, the user does not need to input the corresponding user account and account password, the terminal only needs to search the user login credential, and the second system can be logged in through the user login credential, which is convenient and fast.
S212, verifying the user authority corresponding to the user information associated with the user login credential, and completing the login of the second system after the verification is passed.
Specifically, when receiving a second login request carrying user login credentials, the authentication server extracts the user login credentials from the second login request. The authentication server locally looks up the user login credentials. And after the user login credential is found, determining the user information associated with the user login credential.
Further, the authentication server can determine the user authority corresponding to the user information, and when the user authority corresponding to the user information is the access permission authority, the verification is passed, and the login of the second system is completed. And feeds back the information passing the verification to the second system. And the second system can allow the access of the terminal after receiving the information passing the verification.
In one embodiment, after the terminal successfully logs in the first system through the user account, the authentication server generates a user login credential, and stores the user login credential and the user information in a Redis database in an associated manner. At this point, the user login credentials in the Redis database may be considered valid. The user corresponding to the user information can directly log in the second system through the user login credentials (the logged-in user account is the second user account associated with the user information). Therefore, when the authentication server finds the user information corresponding to the user login credentials in the Redis database according to the user login credentials, the user authority corresponding to the user information can be considered as the allowed access authority.
In an embodiment, step S212 is to verify the user authority corresponding to the user information associated with the user login credential, and after the verification is passed, the step of completing the login of the second system specifically includes the following steps: determining user information associated with a user login credential carried by the second login request; searching a second user account and a second account password corresponding to a second system according to the user information; and when the second user account and the second account password are found, judging that the verification is passed and finishing the login of the second system.
In particular, the authentication server may look up user information associated with the user login credentials from a Redis database. And determining a second user account and a second account password corresponding to the user information according to the pre-stored user account and the associated user information. And the second user account and the second account password are used for logging in a second system. And when the authentication server finds the second user account and the second account password from the local, judging that the verification is passed, and feeding back the feedback information of passing authentication to the second service so as to complete the login of the second system.
It will be appreciated that the first system and the second system may both be referred to as business systems without causing ambiguity. The business systems are associated, and when a user logs in one business system of the associated business systems by using a user account and an account password, the business system can be called as a first business system. When the user logs in to other business system in the plurality of systems with the user login credentials, the other business system may be referred to as a second system. It will be appreciated that there may be a plurality of second systems and that the first and second systems are not unique.
According to the multi-system login method, after the first system passes login verification, the authentication server generates and issues a user login certificate. The authentication server stores the user information and the user login credentials in an associated mode, so that the user can log in through the user login credentials when logging in the second system. In this way, the authentication server only needs to verify the user authority corresponding to the user information associated with the user login credential, and after the verification is passed, the login of the second system can be completed. Therefore, the service system and the authentication server are independent, when a user needs to log in a plurality of different systems, the user does not need to input a user account and an account password when logging in each system, the user can log in the plurality of systems only through the user login credentials, the operation of logging in the plurality of systems is reduced on the premise of ensuring the safety of multi-system login, and the efficiency of multi-system login is greatly improved.
In one embodiment, before step S202, that is, before the step of receiving the first login request from the first system, the multi-system login method further includes a step of account registration, which includes: respectively receiving a first account registration request from a first system and a second account registration request from a second system; the first account registration request carries a first user account, a first account password and user information; the second account registration request carries a second user account, a second account password and user information; verifying the legality of the first user account, the first account password and the user information; after the verification is passed, performing associated storage on a first user account, a first account password and user information corresponding to the first system; verifying the legality of the second user account, the password of the second account and the user information; and after the verification is passed, performing associated storage on a second user account, a second account password and user information corresponding to the second system.
Specifically, before a user logs in any system in a multi-system, the user firstly has a user account of the system. Before a user logs in any system in the multiple systems for the first time, the user account of the system needs to be registered. When a user needs to register an account corresponding to any one of the multiple associated systems, the user can input a user account, an account password and user information in an account registration interface displayed by the terminal. And the terminal generates an account registration request according to the user account, the account password and the user information input by the user and sends the account registration request to a corresponding service system. And the service system forwards the account registration request to the authentication server.
It can be understood that, when the user registers an account corresponding to the first system, the user may input the first user account, the first account password, and the user information in an account registration interface provided by the first system and displayed by the terminal. And generating a first account registration request according to the first user account, the first account password and the user information through the terminal, and sending the first account registration request to the first system. The first system forwards the first account registration request to an authentication server.
When the user registers the account corresponding to the second system, the user can input a second user account, a second account password and user information in an account registration interface provided by the second system and displayed by the terminal. And generating a second account registration request according to the second user account, the second account password and the user information through the terminal, and sending the second account registration request to a second system. The second system forwards the second account registration request to the authentication server.
Further, after the authentication server receives a first account registration request and a second account registration request corresponding to the first service system and the second service system, the legitimacy of the corresponding first user account, the first account password and the user information is verified, and the legitimacy of the corresponding second user account, the second account password and the user information is verified.
Further, after the validity verification of the first user account, the first account password, and the user information passes, the authentication server may associate the first user account, the first account password, and the user information corresponding to the first system, and store the associated information in the storage medium. When the second user account, the second account password, and the user information pass the validity verification, the authentication server may associate the second user account, the second account password, and the user information corresponding to the second system, and store them in the storage medium.
It can be understood that, after receiving the first account registration request from the first system, the authentication server may verify the validity of the first user account, the first account password, and the user information, and after the verification is passed, perform associated storage on the first user account, the first account password, and the user information corresponding to the first system. And when the authentication server receives a second account registration request from the second system, the second user account, the second account password and the user information can be verified to be legal, and after the second user account, the second account password and the user information corresponding to the second system are subjected to associated storage after the second user account, the second account password and the user information pass the verification. The execution sequence of the verification step and the storage step of the first account registration request and the verification step and the storage step of the second account registration request is not limited, and the verification step and the storage step of the first account registration request can be executed before, simultaneously with or after the verification step and the storage step of the second account registration request.
In one embodiment, the authentication server may verify whether the first user account and/or the second user account are duplicated with an existing account, whether the first account password and/or the second account password meet preset requirements, whether the user information is wrong, and the like. Whether the account password meets the preset requirement or not, for example, whether the account password contains at least two of numbers, letters, characters and the like or not; or whether the digit of the account password reaches the preset digit or not. Whether the user information is wrong or not, for example, whether the digit of the user information reaches a preset digit or not, whether the user information is real or not, and the like.
In the above embodiment, in the account registration process, the authentication server may respectively store the first user account, the first account password, and the user information corresponding to the first system, and the second user account, the second account password, and the user information corresponding to the second system in an associated manner, so as to facilitate login verification when subsequently logging in the corresponding system.
In an embodiment, the step S202, that is, after the first user account and the first account password pass the verification, the step of generating and issuing the user login credential specifically includes the following steps: when the first user account and the first account password pass the verification, determining a system level corresponding to the first system; when the system level is the main system level, a user login certificate is randomly generated; and responding to the first login request, and feeding back user login credentials.
In one embodiment, when the first user account and the first account password pass the verification, the authentication server may feed back the feedback information that the verification passes to the first system. And. The authentication server may determine a system level to which the first system belongs. When the first system is the main system, the user login certificate can be generated and issued. Otherwise, only feedback information that the first user account and the first account password are verified is fed back.
In one embodiment, the authentication server may preset a system level corresponding to each service system. Wherein the system level includes a primary system level and a secondary system level, etc. A more detailed system level may also be established according to the service content corresponding to each service system, which is not limited herein. Furthermore, the authentication server may be preset, and only after logging in the service system at the host system level through the user account and the account password, the authentication server may generate a user login credential. That is, only after logging in the main service system, the user can avoid accessing other associated service systems, and if the auxiliary service system is logged in for the first time, the user still needs to input the user account and the account password to log in when logging in other associated systems.
It is understood that there may be one or more business systems at the primary system level; there may be one or more service systems at the secondary system level, and this embodiment is not limited herein.
In the embodiment, the authentication server generates the user login credentials only after verifying the login request which corresponds to the main system and carries the user account and the account password, so that the user can use a secret-free and fast login mode when logging in other systems, and the security of multi-system login is greatly improved.
In one embodiment, the multi-system login method further includes a step of clearing the user login credentials, and the step specifically includes: receiving a user login credential clearing instruction; the user login credential clearing instruction carries a user login credential to be cleared; searching a corresponding user login certificate from the local according to the user login certificate clearing instruction; and in response to the user login credential clearing instruction, deleting the found user login credential and the user information stored in association with the user login credential.
In particular, the user login credentials are valid. When the validity period of the user login credentials expires, the terminal can trigger a user login credential clearing instruction. The authentication server can receive a user login credential clearing instruction triggered by the terminal, wherein the user login credential clearing instruction carries a user login credential to be cleared. And the authentication server searches the corresponding user login credentials from the Redis database according to the user login credential clearing instruction. And after the user login credentials are found, deleting the found user login credentials and the user information stored in the Redis database and associated with the user login credentials.
In one embodiment, when the terminal starts to time after receiving the user login credential issued by the authentication server, and when the time period from the current time to the time when the time starts to time reaches the preset time length, the validity period of the user login credential can be judged to expire. At this time, the terminal may automatically trigger the user login credential clearing instruction.
In one embodiment, the triggering step of the user login credential clearing instruction comprises: the terminal monitors the user triggering operation; when the terminal does not detect the user triggering operation within a preset time period, acquiring a user login certificate to be cleared; the terminal triggers and sends a user login credential clearing instruction to the authentication server; the user login credential clearing instruction carries the user login credential to be cleared.
In one embodiment, the terminal can detect the trigger operation from the user in the browser interface at regular time or in real time. When the terminal does not detect the user triggering operation within the preset time period, the user login credentials can be searched from the browser cache, and the user login credentials are the user login credentials to be cleared. The terminal can automatically trigger the step of sending a user login credential clearing instruction to the authentication server, wherein the user login credential clearing instruction carries the user login credential to be cleared. Therefore, when the terminal does not detect the user triggering operation within the preset time period, the user login certificate clearing instruction is triggered, namely the user login certificate clearing instruction is triggered when the user does not use the service system, so that the safety of using the multiple systems is guaranteed.
In the embodiment, the corresponding user login credentials and the user information stored in association with the user login credentials can be deleted according to the user login credential clearing instruction, that is, when the next multi-system fast login is invalid, the security of the fast login of the multi-system can be effectively guaranteed through limited timeliness.
Referring to fig. 3, fig. 3 is a timing diagram of a multi-system login, in one embodiment, the multi-system login method is described as follows: firstly, a user can trigger a first login request for logging in a first system through a terminal, wherein the first login request carries a user account and an account password. The first system forwards the first login request to an authentication server. The authentication server verifies the user account and the account password, and generates a user login credential after the user account and the account password pass the verification. The authentication server feeds back the user login credentials to the first system, and the first system forwards the user login credentials to the terminal. And the user triggers a second login certificate for logging in the second system through the terminal, wherein the second login certificate carries the user login certificate. And the second system forwards the second login request to the authentication server, the authentication server searches the user information associated with the user login credential, and when the user information is found, the feedback information which passes the verification is returned. And the second system receives the feedback information and authorizes the terminal to access, and the user logs in successfully.
It should be understood that, although the steps in the flowchart of fig. 2 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in fig. 2 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 4, there is provided a multi-system login apparatus 400, comprising: a receiving module 401, a generating module 402, a determining module 403, an associated storing module 404 and a checking module 405, wherein:
a receiving module 401, configured to receive a first login request from a first system; the first login request carries a first user account and a first account password.
The generating module 402 is configured to generate and issue a user login credential after the first user account and the first account password pass verification.
A determining module 403 is configured to determine user information associated with the first user account and the first account password.
And an association storage module 404, configured to store the user login credentials and the user information in an association manner.
The receiving module 401 is further configured to receive a second login request from a second system; the second login request carries a user login credential.
The checking module 405 is configured to check a user right corresponding to the user information associated with the user login credential, and complete login of the second system after the user right passes the check.
In one embodiment, the receiving module 401 is further configured to receive a first account registration request from a first system and a second account registration request from a second system, respectively; the first account registration request carries a first user account, a first account password and user information; the second account registration request carries a second user account, a second account password and user information.
The checking module 405 is further configured to verify the validity of the first user account, the first account password, and the user information.
The association storage module 404 is further configured to, after the verification is passed, perform association storage on the first user account, the first account password, and the user information corresponding to the first system.
The checking module 405 is further configured to verify the validity of the second user account, the second account password, and the user information.
The association storage module 404 is further configured to perform association storage on a second user account, a second account password, and user information corresponding to the second system after the verification is passed.
In one embodiment, the generating module 402 is further configured to determine a system level corresponding to the first system after the first user account and the first account password pass verification; when the system level is the main system level, a user login certificate is randomly generated; and responding to the first login request, and feeding back user login credentials.
In one embodiment, the issued user login credentials are used for indicating the terminal to receive the user login credentials issued by the authentication server; the terminal stores the user login credentials into a browser cache; the terminal receives a login instruction aiming at a second system, which is triggered by a user through a browser; the terminal searches a user login certificate from a browser cache according to the login instruction; and when the terminal finds the user login credentials, sending a second login request carrying the user login credentials to the authentication server.
In one embodiment, the checking module 405 is further configured to determine user information associated with the user login credential carried by the second login request; searching a second user account and a second account password corresponding to a second system according to the user information; and when the second user account and the second account password are found, judging that the verification is passed and finishing the login of the second system.
In one embodiment, as shown in fig. 5, the multi-system login apparatus 400 further includes a search module 406 and a delete module 407.
The receiving module 401 is further configured to receive a user login credential clearing instruction; the user login credential clearing instruction carries the user login credential to be cleared.
The searching module 406 is configured to search the corresponding user login credential locally according to the user login credential clearing instruction.
And the deleting module 407 is configured to delete the found user login credential and the user information stored in association with the user login credential in response to the user login credential clearing instruction.
In one embodiment, the issued user login credentials are used for indicating the terminal to monitor the user trigger operation; when the terminal does not detect the user triggering operation within a preset time period, acquiring a user login certificate to be cleared; the terminal triggers and sends a user login credential clearing instruction to the authentication server; the user login credential clearing instruction carries the user login credential to be cleared.
According to the multi-system login device, after the first system passes login verification, the authentication server generates and issues a user login certificate. The authentication server stores the user information and the user login credentials in an associated mode, so that the user can log in through the user login credentials when logging in the second system. In this way, the authentication server only needs to verify the user authority corresponding to the user information associated with the user login credential, and after the verification is passed, the login of the second system can be completed. Therefore, the service system and the authentication server are independent, when a user needs to log in a plurality of different systems, the user does not need to input a user account and an account password when logging in each system, the user can log in the plurality of systems only through the user login credentials, the operation of logging in the plurality of systems is reduced on the premise of ensuring the safety of multi-system login, and the efficiency of multi-system login is greatly improved.
For specific limitations of the multi-system login apparatus, reference may be made to the above limitations of the multi-system login method, which is not described herein again. The modules in the multi-system login device can be wholly or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 6. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a multi-system login method.
Those skilled in the art will appreciate that the architecture shown in fig. 6 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, there is provided a computer device comprising a memory storing a computer program and a processor implementing the following steps when the processor executes the computer program: receiving a first login request from a first system; the first login request carries a first user account and a first account password; when the first user account and the first account password pass the verification, generating a user login certificate and issuing the user login certificate; determining user information associated with a first user account and a first account password; storing user login credentials and user information in an associated manner; receiving a second login request from a second system; the second login request carries a user login credential; and verifying the user authority corresponding to the user information associated with the user login credential, and completing the login of the second system after the verification is passed.
In one embodiment, the processor, when executing the computer program, further performs the steps of: respectively receiving a first account registration request from a first system and a second account registration request from a second system; the first account registration request carries a first user account, a first account password and user information; the second account registration request carries a second user account, a second account password and user information; verifying the legality of the first user account, the first account password and the user information; after the verification is passed, performing associated storage on a first user account, a first account password and user information corresponding to the first system; verifying the legality of the second user account, the password of the second account and the user information; and after the verification is passed, performing associated storage on a second user account, a second account password and user information corresponding to the second system.
In one embodiment, the processor, when executing the computer program, further performs the steps of: when the first user account and the first account password pass the verification, determining a system level corresponding to the first system; when the system level is the main system level, a user login certificate is randomly generated; and responding to the first login request, and feeding back user login credentials.
In one embodiment, the issued user login credentials are used for indicating the terminal to receive the user login credentials issued by the authentication server; the terminal stores the user login credentials into a browser cache; the terminal receives a login instruction aiming at a second system, which is triggered by a user through a browser; the terminal searches a user login certificate from a browser cache according to the login instruction; and when the terminal finds the user login credentials, sending a second login request carrying the user login credentials to the authentication server.
In one embodiment, the processor, when executing the computer program, further performs the steps of: determining user information associated with a user login credential carried by the second login request; searching a second user account and a second account password corresponding to a second system according to the user information; and when the second user account and the second account password are found, judging that the verification is passed and finishing the login of the second system.
In one embodiment, the processor, when executing the computer program, further performs the steps of: receiving a user login credential clearing instruction; the user login credential clearing instruction carries a user login credential to be cleared; searching a corresponding user login certificate from the local according to the user login certificate clearing instruction; and in response to the user login credential clearing instruction, deleting the found user login credential and the user information stored in association with the user login credential.
In one embodiment, the issued user login credentials are used for indicating the terminal to monitor the user trigger operation; when the terminal does not detect the user triggering operation within a preset time period, acquiring a user login certificate to be cleared; the terminal triggers and sends a user login credential clearing instruction to the authentication server; the user login credential clearing instruction carries the user login credential to be cleared.
And when the first system passes the login verification, the authentication server generates and issues a user login certificate. The authentication server stores the user information and the user login credentials in an associated mode, so that the user can log in through the user login credentials when logging in the second system. In this way, the authentication server only needs to verify the user authority corresponding to the user information associated with the user login credential, and after the verification is passed, the login of the second system can be completed. Therefore, the service system and the authentication server are independent, when a user needs to log in a plurality of different systems, the user does not need to input a user account and an account password when logging in each system, the user can log in the plurality of systems only through the user login credentials, the operation of logging in the plurality of systems is reduced on the premise of ensuring the safety of multi-system login, and the efficiency of multi-system login is greatly improved.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: receiving a first login request from a first system; the first login request carries a first user account and a first account password; when the first user account and the first account password pass the verification, generating a user login certificate and issuing the user login certificate; determining user information associated with a first user account and a first account password; storing user login credentials and user information in an associated manner; receiving a second login request from a second system; the second login request carries a user login credential; and verifying the user authority corresponding to the user information associated with the user login credential, and completing the login of the second system after the verification is passed.
In one embodiment, the processor, when executing the computer program, further performs the steps of: respectively receiving a first account registration request from a first system and a second account registration request from a second system; the first account registration request carries a first user account, a first account password and user information; the second account registration request carries a second user account, a second account password and user information; verifying the legality of the first user account, the first account password and the user information; after the verification is passed, performing associated storage on a first user account, a first account password and user information corresponding to the first system; verifying the legality of the second user account, the password of the second account and the user information; and after the verification is passed, performing associated storage on a second user account, a second account password and user information corresponding to the second system.
In one embodiment, the processor, when executing the computer program, further performs the steps of: when the first user account and the first account password pass the verification, determining a system level corresponding to the first system; when the system level is the main system level, a user login certificate is randomly generated; and responding to the first login request, and feeding back user login credentials.
In one embodiment, the issued user login credentials are used for indicating the terminal to receive the user login credentials issued by the authentication server; the terminal stores the user login credentials into a browser cache; the terminal receives a login instruction aiming at a second system, which is triggered by a user through a browser; the terminal searches a user login certificate from a browser cache according to the login instruction; and when the terminal finds the user login credentials, sending a second login request carrying the user login credentials to the authentication server.
In one embodiment, the processor, when executing the computer program, further performs the steps of: determining user information associated with a user login credential carried by the second login request; searching a second user account and a second account password corresponding to a second system according to the user information; and when the second user account and the second account password are found, judging that the verification is passed and finishing the login of the second system.
In one embodiment, the processor, when executing the computer program, further performs the steps of: receiving a user login credential clearing instruction; the user login credential clearing instruction carries a user login credential to be cleared; searching a corresponding user login certificate from the local according to the user login certificate clearing instruction; and in response to the user login credential clearing instruction, deleting the found user login credential and the user information stored in association with the user login credential.
In one embodiment, the issued user login credentials are used for indicating the terminal to monitor the user trigger operation; when the terminal does not detect the user triggering operation within a preset time period, acquiring a user login certificate to be cleared; the terminal triggers and sends a user login credential clearing instruction to the authentication server; the user login credential clearing instruction carries the user login credential to be cleared.
And the computer readable storage medium generates and issues a user login certificate by the authentication server after the first system passes the login verification. The authentication server stores the user information and the user login credentials in an associated mode, so that the user can log in through the user login credentials when logging in the second system. In this way, the authentication server only needs to verify the user authority corresponding to the user information associated with the user login credential, and after the verification is passed, the login of the second system can be completed. Therefore, the service system and the authentication server are independent, when a user needs to log in a plurality of different systems, the user does not need to input a user account and an account password when logging in each system, the user can log in the plurality of systems only through the user login credentials, the operation of logging in the plurality of systems is reduced on the premise of ensuring the safety of multi-system login, and the efficiency of multi-system login is greatly improved.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (14)

1. A multi-system login method is applied to an authentication server, and comprises the following steps:
receiving a first login request from a first system; the first login request carries a first user account and a first account password;
when the first user account and the first account password pass verification, determining a system level corresponding to the first system; when the first system level belongs to a main system level, responding to the first login request, generating a user login certificate and issuing the user login certificate;
determining user information associated with the first user account and first account password; the user information is information which is input by a user when registering a plurality of associated systems and is stored in a database in advance;
storing the user login credentials and the user information in an associated manner;
receiving a second login request from a second system; the second login request carries a user login credential; the second system is associated with the first system;
and checking the user authority corresponding to the user information associated with the user login credential, and when the user authority corresponding to the user information is the access permission authority, checking to pass and completing login of the second system so as to realize secret-free login of the second system associated with the first system after the first system belonging to the main system level is logged in.
2. The method of claim 1, further comprising:
respectively receiving a first account registration request from the first system and a second account registration request from the second system; the first account registration request carries a first user account, a first account password and user information; the second account registration request carries a second user account, a second account password and user information;
verifying the legality of the first user account, the first account password and the user information;
after the verification is passed, performing associated storage on a first user account, a first account password and user information corresponding to the first system;
verifying the legality of the second user account, the second account password and the user information;
and after the verification is passed, performing associated storage on a second user account, a second account password and user information corresponding to the second system.
3. The method of claim 1, wherein generating and issuing user login credentials in response to the first login request when the first system level belongs to a host system level comprises:
when the system level is a main system level, randomly generating a user login certificate;
and responding to the first login request, and feeding back the user login credentials.
4. The method of claim 1, wherein the step of generating the second login request comprises:
the terminal receives a user login certificate issued by the authentication server;
the terminal stores the user login credentials into a browser cache;
the terminal receives a login instruction aiming at the second system, which is triggered by a user through a browser;
the terminal searches a user login credential from the browser cache according to the login instruction;
and when the terminal finds the user login credentials, sending a second login request carrying the user login credentials to the authentication server.
5. The method according to claim 2, wherein the verifying the user right corresponding to the user information associated with the user login credential, and when the user right corresponding to the user information is an access permission right, the verifying is passed, and the login of the second system is completed, including:
determining user information associated with a user login credential carried by the second login request;
searching a second user account and a second account password corresponding to the second system according to the user information;
and when the second user account and the second account password are found, judging that the verification is passed and finishing the login of the second system.
6. The method according to any one of claims 1 to 5, further comprising:
receiving a user login credential clearing instruction; the user login credential clearing instruction carries a user login credential to be cleared;
searching a corresponding user login certificate from the local according to the user login certificate clearing instruction;
and in response to the user login credential clearing instruction, deleting the found user login credential and the user information stored in association with the user login credential.
7. The method of claim 6, wherein the step of triggering the user login credential clearing instruction comprises:
the terminal monitors the user triggering operation;
when the terminal does not detect the user trigger operation within a preset time period, acquiring a user login certificate to be cleared;
the terminal triggers a step of sending a user login credential clearing instruction to the authentication server; and the user login credential clearing instruction carries the user login credential to be cleared.
8. A multi-system login apparatus, the apparatus comprising:
the system comprises a receiving module, a first login module and a second login module, wherein the receiving module is used for receiving a first login request from a first system; the first login request carries a first user account and a first account password;
the generation module is used for determining the system level corresponding to the first system after the first user account and the first account password pass verification; when the first system level belongs to a main system level, responding to the first login request, generating a user login certificate and issuing the user login certificate;
a determination module for determining user information associated with the first user account and first account password; the user information is information which is input by a user when registering a plurality of associated systems and is stored in a database in advance;
the associated storage module is used for storing the user login credentials and the user information in an associated manner;
the receiving module is further used for receiving a second login request from a second system; the second login request carries a user login credential; the second system is associated with the first system;
and the verification module is used for verifying the user authority corresponding to the user information associated with the user login credentials, and when the user authority corresponding to the user information is the access permission authority, the verification is passed, and the login of the second system is completed, so that after the first system belonging to the main system level is logged in, the second system associated with the first system is logged in a secret-free manner.
9. The apparatus of claim 8, wherein the receiving module is further configured to receive a first account registration request from the first system and a second account registration request from the second system, respectively; the first account registration request carries a first user account, a first account password and user information; the second account registration request carries a second user account, a second account password and user information;
the verification module is also used for verifying the legality of the first user account, the first account password and the user information;
the association storage module is also used for performing association storage on a first user account, a first account password and user information corresponding to the first system after the verification is passed;
the verification module is also used for verifying the legality of the second user account, the second account password and the user information;
and the association storage module is also used for associating and storing a second user account, a second account password and user information corresponding to the second system after the verification is passed.
10. The apparatus of claim 8, wherein the generating module is further configured to randomly generate a user login credential when the system level is a master system level; and responding to the first login request, and feeding back the user login credentials.
11. The apparatus of claim 8, wherein the checking module is further configured to determine user information associated with user login credentials carried by the second login request; searching a second user account and a second account password corresponding to the second system according to the user information; and when the second user account and the second account password are found, judging that the verification is passed and finishing the login of the second system.
12. The apparatus according to any one of claims 8 to 11, wherein the apparatus further comprises a lookup module and a deletion module, wherein:
the receiving module is also used for receiving a user login credential clearing instruction; the user login credential clearing instruction carries a user login credential to be cleared;
the searching module is used for searching corresponding user login credentials from local according to the user login credential clearing instruction;
the deleting module is used for responding to the user login credential clearing instruction, and deleting the searched user login credential and the user information stored in association with the user login credential.
13. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
14. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN201811302719.5A 2018-11-02 2018-11-02 Multi-system login method and device, computer equipment and storage medium Active CN109274685B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811302719.5A CN109274685B (en) 2018-11-02 2018-11-02 Multi-system login method and device, computer equipment and storage medium
PCT/CN2019/070885 WO2020087778A1 (en) 2018-11-02 2019-01-08 Multiple system login method, apparatus, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811302719.5A CN109274685B (en) 2018-11-02 2018-11-02 Multi-system login method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109274685A CN109274685A (en) 2019-01-25
CN109274685B true CN109274685B (en) 2021-09-17

Family

ID=65192541

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811302719.5A Active CN109274685B (en) 2018-11-02 2018-11-02 Multi-system login method and device, computer equipment and storage medium

Country Status (2)

Country Link
CN (1) CN109274685B (en)
WO (1) WO2020087778A1 (en)

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639740B (en) * 2019-01-31 2022-02-22 平安科技(深圳)有限公司 Login state sharing method and device based on equipment ID
CN111200593A (en) * 2019-12-20 2020-05-26 北京你财富计算机科技有限公司 Application login method and device and electronic equipment
CN111291353B (en) * 2020-02-05 2023-03-21 深信服科技股份有限公司 Account number association method and device and computer storage medium
CN111552936B (en) * 2020-04-26 2022-10-14 国电南瑞科技股份有限公司 Cross-system access right control method and system based on scheduling mechanism level
CN111581071B (en) * 2020-05-09 2023-12-19 北京百度网讯科技有限公司 Data processing method, device, equipment and storage medium
CN113645263B (en) * 2020-05-11 2024-04-16 广州汽车集团股份有限公司 Account binding method and device
CN111651741B (en) * 2020-06-05 2024-05-07 腾讯科技(深圳)有限公司 User identity recognition method, device, computer equipment and storage medium
CN111865938B (en) * 2020-06-30 2023-04-07 上海东普信息科技有限公司 Login method and device
CN111814130B (en) * 2020-07-06 2024-03-26 新华智云科技有限公司 Single sign-on method and system
CN112087425B (en) * 2020-07-30 2022-11-29 浪潮通用软件有限公司 Login method, equipment and medium of ERP software system
CN111970282B (en) * 2020-08-19 2022-09-30 中国工商银行股份有限公司 Authentication method and device for heterogeneous module in system
CN112235246A (en) * 2020-09-14 2021-01-15 上海硬通网络科技有限公司 Cross-terminal account login method and device and electronic equipment
CN112115454B (en) * 2020-09-28 2023-09-05 中国银行股份有限公司 Single sign-on method, first server and electronic equipment
CN112272171A (en) * 2020-10-20 2021-01-26 侯亦兵 Mobile internet cross-platform user management method and device
CN113761490A (en) * 2020-10-22 2021-12-07 北京沃东天骏信息技术有限公司 Data processing method and device
CN113761511A (en) * 2020-11-17 2021-12-07 北京沃东天骏信息技术有限公司 Screen locking management method and device
CN112417401A (en) * 2020-11-26 2021-02-26 深圳创维-Rgb电子有限公司 Account verification method, device and system and computer readable storage medium
CN112491890A (en) * 2020-11-27 2021-03-12 中国农业银行股份有限公司 Access method and device
CN112769754B (en) * 2020-12-18 2023-10-24 中国平安财产保险股份有限公司 Client access method, device, equipment and storage medium
CN112968862A (en) * 2020-12-31 2021-06-15 南京联创互联网技术有限公司 Single sign-on method and device based on redis
CN112948814A (en) * 2021-03-19 2021-06-11 合肥京东方光电科技有限公司 Account password management method and device and storage medium
CN113568652A (en) * 2021-06-29 2021-10-29 深圳云之家网络有限公司 Application system processing method and device, computer equipment and storage medium
CN113568726B (en) * 2021-07-23 2024-03-26 中信银行股份有限公司 Multi-service system processing method, operation platform, electronic equipment and storage medium
CN113660229B (en) * 2021-07-30 2023-04-07 未鲲(上海)科技服务有限公司 Multi-system single sign-on method, device, equipment and medium based on RPA
CN113599833B (en) * 2021-08-03 2024-03-12 深圳市乐天堂科技有限公司 Account login method, account login device, computing equipment and storage medium
CN114095263A (en) * 2021-11-24 2022-02-25 上海派拉软件股份有限公司 Communication method, device and system
CN114430346B (en) * 2022-01-27 2023-09-05 亿咖通(湖北)技术有限公司 Login method and device and electronic equipment
CN114201778B (en) * 2022-02-18 2022-05-17 汇元银通(北京)在线支付技术有限公司 Authority authentication method, system, medium and equipment based on Redis
CN114567475A (en) * 2022-02-23 2022-05-31 平安国际智慧城市科技股份有限公司 Multi-system login method and device, electronic equipment and storage medium
CN114697074A (en) * 2022-02-23 2022-07-01 深圳爱捷云科技有限公司 Authority verification method, electronic device and storage medium
CN114697109A (en) * 2022-03-30 2022-07-01 中国银行股份有限公司 Login information processing method, first system, terminal and second system
CN114978702B (en) * 2022-05-24 2024-03-19 上海哔哩哔哩科技有限公司 Account management method, platform and system, computing device and readable storage medium
CN115086052B (en) * 2022-06-23 2023-07-18 全知科技(杭州)有限责任公司 Method for automatically analyzing account based on HTTP (hyper text transport protocol) traffic
CN115208664B (en) * 2022-07-15 2024-04-23 平安科技(深圳)有限公司 Method, device, equipment and storage medium for unified identification of multiple platform users
CN115242511B (en) * 2022-07-22 2024-04-12 成都中科大旗软件股份有限公司 Multi-environment application management platform and management method
CN117896393A (en) * 2022-10-13 2024-04-16 华为技术有限公司 Account synchronization method, device and system among devices and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355527A (en) * 2008-08-15 2009-01-28 深圳市中兴移动通信有限公司 Method for implementing single-point LOG striding domain name
CN101719238A (en) * 2009-11-30 2010-06-02 中国建设银行股份有限公司 Method and system for managing, authenticating and authorizing unified identities
CN102469075A (en) * 2010-11-09 2012-05-23 中科正阳信息安全技术有限公司 Integration authentication method based on WEB single sign on
CN102546570A (en) * 2010-12-31 2012-07-04 国际商业机器公司 Processing method and system for single sign-on
US8683562B2 (en) * 2011-02-03 2014-03-25 Imprivata, Inc. Secure authentication using one-time passwords

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8959608B2 (en) * 2012-12-26 2015-02-17 Cellco Partnership Single sign-on for a native application and a web application on a mobile device
CN105592003B (en) * 2014-10-22 2019-08-09 北京拓尔思信息技术股份有限公司 A kind of cross-domain single login method and system based on notice

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355527A (en) * 2008-08-15 2009-01-28 深圳市中兴移动通信有限公司 Method for implementing single-point LOG striding domain name
CN101719238A (en) * 2009-11-30 2010-06-02 中国建设银行股份有限公司 Method and system for managing, authenticating and authorizing unified identities
CN102469075A (en) * 2010-11-09 2012-05-23 中科正阳信息安全技术有限公司 Integration authentication method based on WEB single sign on
CN102546570A (en) * 2010-12-31 2012-07-04 国际商业机器公司 Processing method and system for single sign-on
US8683562B2 (en) * 2011-02-03 2014-03-25 Imprivata, Inc. Secure authentication using one-time passwords

Also Published As

Publication number Publication date
CN109274685A (en) 2019-01-25
WO2020087778A1 (en) 2020-05-07

Similar Documents

Publication Publication Date Title
CN109274685B (en) Multi-system login method and device, computer equipment and storage medium
US10700861B2 (en) System and method for generating a recovery key and managing credentials using a smart blockchain contract
CN107948204B (en) One-key login method and system, related equipment and computer readable storage medium
Lang et al. Security keys: Practical cryptographic second factors for the modern web
US9930040B2 (en) System and method for provisioning a security token
CN109325342B (en) Identity information management method, device, computer equipment and storage medium
CN105323253B (en) Identity verification method and device
JP6468013B2 (en) Authentication system, service providing apparatus, authentication apparatus, authentication method, and program
US10142308B1 (en) User authentication
CN108365958B (en) Account login verification method and device, computer equipment and storage medium
CN111241555B (en) Access method and device for simulating user login, computer equipment and storage medium
CN109684873B (en) Data access control method and device, computer equipment and storage medium
WO2019232868A1 (en) User information authentication method and apparatus, and computer device and storage medium
CN112632581A (en) User data processing method and device, computer equipment and storage medium
CN108073823B (en) Data processing method, device and system
CN110647540A (en) Business data query method and device, computer equipment and storage medium
CN111291345A (en) Voiceprint data processing method and device, computer equipment and storage medium
CN109286933B (en) Authentication method, device, system, computer equipment and storage medium
CN112187465B (en) Non-inductive login method, device, computer equipment and storage medium
CN113472774A (en) Account login-free method, system, device and computer readable storage medium
CN112860778A (en) Database management method, device, equipment and medium for desktop application program
CN107645474B (en) Method and device for logging in open platform
WO2021169469A1 (en) Voiceprint data processing method and apparatus, computer device, and storage medium
CN110597843A (en) Waybill query method and device, computer equipment and storage medium
US20210014211A1 (en) Secure account modification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1260668

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant