CN109962919A - System access method and network system - Google Patents
System access method and network system Download PDFInfo
- Publication number
- CN109962919A CN109962919A CN201910248791.2A CN201910248791A CN109962919A CN 109962919 A CN109962919 A CN 109962919A CN 201910248791 A CN201910248791 A CN 201910248791A CN 109962919 A CN109962919 A CN 109962919A
- Authority
- CN
- China
- Prior art keywords
- node
- user
- access
- information
- case
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the present application discloses system access method and network system.One specific embodiment of this method includes: to jump to second node if detecting from the first node of current accessed in the case where user successfully logs in first node with the first system permission, judges whether second node is destination node;If it is determined that second node is destination node, then in the case where user does not input the verification information for logging in second node, the access to second node is realized.This embodiment provides a kind of safety and convenient and fast system access method, can contribute to the operating process for reducing user, is conducive to improve access efficiency.
Description
Technical field
The invention relates to field of computer technology more particularly to system access method and network systems.
Background technique
In the prior art, for information security the considerations of, for multi-node system, (node generally corresponding one is set
It is standby), usually require that the password of setting will meet certain complexity, and have the function of that access time limit and permission can be arranged.
The safety of equipment itself can be substantially improved in coming into operation for these functions.But when user accesses or manage setting for different nodes
When standby, it usually needs carry out the verifying of password.That is user when carrying out node switching, often to input it is corresponding correctly log in it is close
Code can realize access.This makes troubles to the operation and management of user.
Summary of the invention
The embodiment of the present application provides system access method and network system.
In a first aspect, the embodiment of the present application provides a kind of system access method, comprising: in user with the first system permission
In the case that success logs in first node, second node is jumped to if detecting from the first node of current accessed, judges the
Whether two nodes are destination node;If it is determined that second node is destination node, is not then inputted in user and log in testing for second node
In the case where demonstrate,proving information, the access to second node is realized.
In some embodiments, this method further include: if it is determined that second node is not destination node, then the is carried out to user
The login authentication of two nodes, and in the case where login authentication passes through, realize the access to second node.
In some embodiments, destination node is that network address and the network address of first node are located in phase same network segment
Node.
In some embodiments, in the case where determining second node is destination node, second is jumped to from first node
It include to be used to indicate first node and/or the authentication result for characterizing the first system permission in the jump information of node
Identification information.
In some embodiments, however, it is determined that second node is destination node, then does not input in user and log in second node
In the case where verification information, the access to second node is realized, comprising: if it is determined that second node is destination node, then to second
Node send authorization requests information, and if authorization requests information be verified and pass through, do not input login second node in user
Verification information in the case where, realize access to second node.
In some embodiments, authorization requests information is sent to second node, comprised at least one of the following: by authorization requests
Information is written in the access address of second node;Or authorization requests information is transferred to second using security assertion markup language
Node;Or the buffer area by authorization requests information preservation between first node and second node.
In some embodiments, authorization requests information includes the logon account information of first node;And authorization requests letter
Breath, which is verified, to be passed through, comprising: the logon account information of first node and the logon account information of second node are identical.
In some embodiments, it does not input the verification information of login second node in user, realizes the visit to second node
In the case where asking, this method further include: setting user accesses the access duration and/or access authority of second node.
Second aspect, the embodiment of the present application provide a kind of network system, comprising: detection module is configured in user
In the case where successfully logging in first node with the first system permission, second is jumped to if detecting from the first node of current accessed
Node then judges whether second node is destination node;Communication module, be configured to if it is determined that second node be destination node,
Then in the case where user does not input the verification information for logging in second node, the access to second node is realized.
In some embodiments, which further includes authentication module, is configured to if it is determined that second node is not mesh
Node is marked, then carries out the login authentication of second node to user, and in the case where login authentication passes through, is realized to second node
Access.
System access method provided by the embodiments of the present application and network system are successfully logged in user with the first system permission
In the case where first node, if detecting, the slave first node of the currently accessed node of the user jumps to second node, can
To judge whether second node is destination node.If it is determined that second node is destination node, then login the is not inputted in the user
In the case where the verification information of two nodes, the access to second node may be implemented.That is, it is not necessary to which user input is stepped on
Record the verification information of second node, so that it may it be allowed to access second node.This embodiment provide it is a kind of safety and just
Prompt system access method can contribute to the operating process for reducing user, be conducive to improve access efficiency.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 is the flow chart of one embodiment of system access method provided by the present application;
Fig. 2 is the flow chart of another embodiment of system access method provided by the present application;
Fig. 3 is the structural schematic diagram of one embodiment of network system provided by the present application.
Specific embodiment
To make those skilled in the art better understand the technical solution of the application, with reference to the accompanying drawing and specific embodiment party
Formula elaborates to the application.
The various schemes and feature of the application are described herein with reference to attached drawing.
By the description of the preferred form with reference to the accompanying drawings to the embodiment for being given as non-limiting example, the application's
These and other characteristic will become apparent.
It is also understood that although the application is described referring to some specific examples, those skilled in the art
Member realizes many other equivalents of the application in which can determine, they have feature as claimed in claim and therefore all
In the protection scope defined by whereby.
When read in conjunction with the accompanying drawings, in view of following detailed description, above and other aspect, the feature and advantage of the application will become
It is more readily apparent.
The specific embodiment of the application is described hereinafter with reference to attached drawing;It will be appreciated, however, that the embodiment invented is only
Various ways implementation can be used in the example of the application.Known and/or duplicate function and structure is simultaneously not described in detail with basis
True intention is distinguished in the operation of the history of user, and unnecessary or extra details is avoided to make the application smudgy.Cause
This, the specific structural and functional details invented herein are not intended to restriction, but as just the base of claim
Plinth and representative basis are used to that those skilled in the art to be instructed diversely to use this Shen with substantially any appropriate detailed construction
Please.
This specification can be used phrase " in one embodiment ", " in another embodiment ", " in another embodiment
In " or " in other embodiments ", it can be referred to one or more of the identical or different embodiment according to the application.
Referring to Figure 1, it illustrates the processes 100 of one embodiment of system access method provided by the present application.This is
System access method can be applied to various network systems.It here may include various electronic equipments in network system, it such as can be with
Including but not limited to smart phone, tablet computer, desktop computer, printer and server etc..The system access method
It may comprise steps of:
Step 101, it in the case where user successfully logs in first node with the first system permission, is visited if detecting from current
The first node asked jumps to second node, then judges whether second node is destination node.
In the prior art, for the security consideration of system, it will usually different system permissions be arranged, as administrator weighs
Limit, normal user permission etc..And under different system permissions, general user can operation content difference to system.Such as
After administrator right login system, various operations, such as modification configuration parameter can be carried out to system.In another example commonly to use
After the permission login system of family, only the accessible configuration parameter for checking system, is modified without can be carried out.It can effectively keep away in this way
Exempt from user misoperation.
In the present embodiment, user can be logged in the first system permission and access first node.Wherein, first node can
To be any node in system.And each node has unique network address, as IP (Internet Protocol, mutually
Networking protocol) address.Herein, node can refer to network node.Network node generally refers to a computer or other equipment
There is independent address with one and be connected with the network for sending or receive data function.Node can be work station, client, network
User or personal computer, the equipment that can also be server, printer and other network connections.Each Gong Zuo Zhan ﹑ service
Device, terminal device, the network equipment, that is, the equipment for possessing oneself only network address is all network node.Here node can also
To be network port etc..It is understood that the network address of the network port be usually fixed it is constant, and with the network port electricity
The equipment of connection is usually replaceable.
Here the first system permission is not intended to limit in this application, as long as may be implemented under the first system permission
System access method in the embodiment of the present application.As an example, the first system permission can be highest system permission (such as root
(root) permission).
In the present embodiment, in the case where user successfully logs in first node with the first system permission, if detect from
The first node of current accessed jumps to second node, then may determine that whether the second node is destination node.Wherein, target
Node can be for characterize can be with the node of first node combined authorization management.Here combined authorization management typically refers to
When user is to log in any node in combined authorization management node set not less than certain system permission, so that it may access joint
Other nodes in empowerment management node set log in the verification information of respective nodes without inputting.Herein, however, it is determined that
Second node is destination node, then can continue to execute step 102.
In the present embodiment, destination node (combined authorization management node) can be set according to the actual demand of user
It sets.And can judge whether second node is destination node in several ways.
As an example, second node can be matched in pre-set combined authorization management node set.If
There is the node to match with the second node in combined authorization management node set, it can be said that the bright second node is target
Node.Wherein, the storage location of combined authorization management node set is not intended to limit in this application.
Optionally, destination node can also be that the network address of network address and first node is located at the section in phase same network segment
Point.That is, destination node is located in phase same network segment with first node.At this point it is possible to by the network address of second node with
The network address of first node is compared, to judge whether second node is destination node.
It should be noted that network address generally comprises four, such as * * * .***.***.***.In order to guarantee the peace of system
Quan Xing, phase same network segment here generally refer to the identical network address of front three, such as network address * * * .***.***.A and network
Address * * * .***.***.B is located in identical network segment.In application scenes, in order to meet the use need of different user
It asks, expands the scope of application of method, phase same network segment here can also be configured according to user demand.As an example, identical
Network segment may also mean that first identical network address etc..
It is understood that above-mentioned second node can be the different nodes belonged in same system from first node.Example
If the two is respectively the different server in same cabinet.In another example the two is respectively the different function website in same application,
If first node can be shopping website, and second node can be paying website.In some embodiments, above-mentioned second node
Different systems can also be belonging respectively to from first node.Such as the two is respectively different video playback class application.In another example
First node can be ticket, plane ticket booking website, and second node can be hotel reservation website.
Step 102, however, it is determined that second node is destination node, then does not input the verification information of login second node in user
In the case where, realize the access to second node.
In the present embodiment, however, it is determined that second node is destination node, then does not input in user and log in testing for second node
In the case where demonstrate,proving information, the access to second node can be realized.That is, determining that second node is destination node
In the case of, second node can be jumped directly to from the currently accessed first node of user, i.e. user can be from first node
Second node is directly accessed, the verification information of second node is logged in without inputting.The operation stream of user can be reduced in this way
Journey helps to improve the access efficiency of user, improves user experience.
In some optional implementations, in order to guarantee the safety of system, determining that second node is destination node
In the case where, it from the jump information that first node jumps to second node, may include the mark for being used to indicate first node
Know information, and/or the identification information of the authentication result (whether authentication authorization and accounting passes through) for characterizing the first system permission.As showing
Example, identification information can be the network address of first node, or the character etc. for indicating first node.Wherein, mark letter
The position ceased in jump information is not intended to limit in this application, can such as be located at the suffix of jump information.
In this way in jump procedure, second node is available to arrive above-mentioned identification information.And then can to identification information into
Row verifying, to determine whether to receive the access of above-mentioned user.If such as identification information be first node network address, second
Node can know that this jumps movement from first node.Since the two is combined authorization management node, the second section
Point can determine the jump information from trusted node.Therefore in the case where not carrying out login authentication, it can receive user's
Access.In another example second node can know the system permission if identification information characterization the first system purview certification passes through
Through being certified, and certification passes through.That is, this jump movement it is secure and trusted.It, can therefore in the case where not carrying out login authentication
To receive the access of user.
It is understood that directly adding above-mentioned identification information in jump information, it can avoid or reduce in system and believe
The process that breath (between first node and second node) is received and dispatched repeatedly.Facilitate to simplify process flow in this way, it is possible to reduce use
Family waiting time, further increase access efficiency.
In addition, in above-mentioned sign-on access and jump procedure, it usually needs by DNS (Domain Name System,
Domain name analysis system) processing.In this way in jump procedure, DNS can be parsed out first node (i.e. source) and second node
The network address of (i.e. destination).Therefore it is alternatively possible to which above-mentioned identification information is directly written in jump information by DNS.
In addition, as an example, can also be verified by DNS for identification information.It, can be in this way, in the case where being verified
The access address (such as URL (Uniform Resource Locator, uniform resource locator)) of second node is sent to use
Family.
It optionally,, can also be in the case where determining second node is destination node in order to guarantee the safety of system
Second node sends authorization requests information, so that second node allows without login authentication, so that it may operation of accepting the interview.This
Sample one does not input the verification information for logging in second node in user if authorization requests information is verified by second node
In the case where, so that it may realize the access to second node.
Herein, authorization requests information can be sent to second node using various ways, such as may include (but it is unlimited
In) it is at least one below: in the access address that second node can be written in authorization requests information (such as suffix);Or it can adopt
Authorization requests information is transmitted with security assertion markup language (SAML, Security Assertion Markup Language)
To second node;Or can also by buffer area of the authorization requests information preservation between first node and second node (DMZ,
demilitarized zone)。
It should be noted that the content of above-mentioned authorization requests information does not limit equally herein, such as may include (but not
It is limited to) the logon account information of above-mentioned identification information and/or first node.Above-mentioned retouch may refer to for the verifying of identification information
It states, details are not described herein.And the verifying for logon account information, it can be by the logon account information of first node and the second section
The logon account information of point is compared, to judge whether the two is identical.Judge whether first node has with second node
Identical logon account information.If the two is identical, due to being verified when logging in first node, second node is not needed
Repeated authentication can determine that authorization requests Information Authentication passes through at this time.
In the prior art, in order to guarantee the safety of system, it will usually be respectively provided on each node for logging in pipe
The account name and password (i.e. account information) of reason.User can modify these account informations according to demand.But password is answered
Miscellaneous degree usually has following requirement: Password Length is at least nine characters;Code content includes the group of at least three kinds characters
It closes;It cannot be the dictionary words such as any language, slang, dialect, jargon;It should not be based on personal information;The effective time of password is not
More than three months, and cannot be overlapped with password recently three times.
In application scenes, in order to further guarantee the safety of system, is not inputted in user and log in the second section
In the case where realizing the access to second node, the access that the user accesses second node can also be arranged in the verification information of point
Duration and/or access authority.Such as access duration was no more than 60 minutes.Access authority can be only limitted to check that fundamental system is believed
It ceases (such as SDR (Session Detail Record, session detail record) etc.), and cannot modify.
System access method provided by the embodiments of the present application successfully logs in first node in user with the first system permission
In the case of, if detecting, the slave first node of the currently accessed node of the user jumps to second node, may determine that second
Whether node is destination node.If it is determined that second node is destination node, is not then inputted in the user and log in testing for second node
In the case where demonstrate,proving information, the access to second node can be realized.That is, it is not necessary to which the user, which inputs, logs in the second section
The verification information of point, so that it may it be allowed to access second node.This embodiment provides a kind of safety and convenient and fast system
Access method can contribute to the operating process for reducing user, be conducive to improve access efficiency.
It is understood that not needing since above-mentioned first node can be any node in system in system
In be separately provided one for management system node or peripheral hardware one be used for management system electronic equipment.In this way, helping
Exploitation, management cost in the system of reduction.And it can be with the utilization rate of lifting system.
With continued reference to Fig. 2, it illustrates the processes 200 of another embodiment of system access method provided by the present application.
The system access method may comprise steps of:
Step 201, it in the case where user successfully logs in first node with the first system permission, is visited if detecting from current
The first node asked jumps to second node, then judges whether second node is destination node.It specifically may refer to Fig. 1 embodiment
Step 101 in associated description, details are not described herein again.Herein, however, it is determined that second node is destination node, then can continue
Execute step 202.If it is determined that second node is not destination node, then step 203 can be executed.
Step 202, however, it is determined that second node is destination node, then does not input the verification information of login second node in user
In the case where, realize the access to second node.It specifically may refer to the associated description in the step 102 of Fig. 1 embodiment, herein
It repeats no more.
Step 203, however, it is determined that second node is not destination node, then the login authentication of second node is carried out to user, and
In the case where login authentication passes through, the access to second node is realized.
In the present embodiment, however, it is determined that above-mentioned second node is not destination node, and illustrating the second node not is to combine to award
The node in management node set is weighed, i.e., cannot be accessed using mode in step 202 to second node.At this time in order to guarantee
The safety of system can carry out authentication to the user of access second node.The login for carrying out second node to user is tested
Card.And in the case where the user login validation passes through, the access to second node may be implemented.
As an example, in the case where determining second node not is destination node, it can be by the login page of second node
It is presented to the user.Or prompt information can also be sent to user, to prompt user to carry out login authentication.Herein, prompt letter
The form of expression of breath is not intended to limit, such as may include (but being not limited to) text information and/or voice messaging.
System access method provided by the embodiments of the present application, further enriches and perfect step process.It in this way can be more
Full border service condition is filled it up with, the scope of application of method is expanded.
Referring to Fig. 3, as the realization to method shown in above-mentioned each figure, present invention also provides a kind of network systems
One embodiment.The network system embodiment is corresponding with embodiment of the method shown in the various embodiments described above.
As shown in figure 3, the network system 300 of the present embodiment may include: detection module 301, be configured to user with
In the case that the first system permission successfully logs in first node, the second section is jumped to if detecting from the first node of current accessed
Point then judges whether second node is destination node;Communication module 302, be configured to if it is determined that second node be destination node,
Then in the case where user does not input the verification information for logging in second node, the access to second node is realized.
In some optional implementations, which can also include authentication module (being not shown in Fig. 3),
It is configured to if it is determined that second node is not destination node, then carries out the login authentication of second node to user, and tested in login
In the case that card passes through, the access to second node is realized.
Optionally, destination node can be located at the section in phase same network segment for the network address of network address and first node
Point.
In some embodiments, in the case where determining second node is destination node, second is jumped to from first node
In the jump information of node, it may include and be used to indicate first node and/or the certification knot for characterizing the first system permission
The identification information of fruit.
Optionally, communication module 302 can be further configured to if it is determined that second node is destination node, then to second
Node send authorization requests information, and if authorization requests information be verified and pass through, do not input login second node in user
Verification information in the case where, realize access to second node.
In some embodiments, authorization requests information is sent to second node, may include following at least one: will authorizes
Solicited message is written in the access address of second node;Or authorization requests information is transferred to using security assertion markup language
Second node;Or the buffer area by authorization requests information preservation between first node and second node.
Further, authorization requests information may include the logon account information of first node;And authorization requests information
Be verified and pass through, may include: first node logon account information it is identical as the logon account information of second node.
In application scenes, which can also include setup module (being not shown in Fig. 3), be configured
The access duration and/or access authority of second node are accessed at setting user.
It is understood that in the method that all modules recorded in the network system 300 and reference Fig. 1 and Fig. 2 are described
Each step is corresponding.This is equally applicable to above with respect to the beneficial effect of the operation of method description, feature and generation as a result,
Network system 300 and module wherein included, details are not described herein.
Since the network system that the present embodiment is introduced is net corresponding to the system access method in the embodiment of the present application
Network system, so, based on the system access method in the embodiment of the present application, those skilled in the art can understand the application reality
The specific embodiment of network system and its various change form in example are applied, so no longer detailed for the network system herein
It introduces.As long as those skilled in the art implement the network system of the system access method in the embodiment of the present application, this Shen is belonged to
The range that please be protect.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processing module of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices with
A machine is generated, so that generating use by the instruction that the processing module of computer or other programmable data processing devices executes
In the function that realization is specified in one box or multiple boxes of one process or multiple processes and/or block diagrams of flow chart
Device.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
The manufacture of device is enabled, which realizes in a side of one process or multiple processes and/or block diagrams of flow chart
The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing devices, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one process or multiple processes and/or block diagrams of flow chart
One box or multiple boxes in specify function the step of.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art
Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from foregoing invention design, it is carried out by above-mentioned technical characteristic or its equivalent feature
Any combination and the other technical solutions formed.Such as features described above has similar function with (but being not limited to) disclosed herein
Can technical characteristic replaced mutually and the technical solution that is formed.
Claims (10)
1. a kind of system access method, comprising:
In the case where user successfully logs in first node with the first system permission, if detecting the first node from current accessed
Second node is jumped to, then judges whether the second node is destination node;
If it is determined that the second node is destination node, is not then inputted in the user and log in the verification information of the second node
In the case where, realize the access to the second node.
2. according to the method described in claim 1, further include:
If it is determined that the second node is not destination node, then the login authentication of the second node is carried out to the user, and
In the case where login authentication passes through, the access to the second node is realized.
3. according to the method described in claim 1, the destination node is the network address of network address and the first node
Node in phase same network segment.
4. according to the method described in claim 1, determine the second node be destination node in the case where, from described first
Node jumps in the jump information of the second node, includes to be used to indicate the first node and/or for characterizing
State the identification information of the authentication result of the first system permission.
5. according to the method described in claim 1, it is described if it is determined that the second node be destination node, then the user not
In the case that input logs in the verification information of the second node, the access to the second node is realized, comprising:
If it is determined that the second node is destination node, then authorization requests information is sent to the second node, and if described
Authorization requests information, which is verified, to be passed through, then in the case where the user does not input the verification information for logging in the second node,
Realize the access to the second node.
6. according to the method described in claim 5, it is described to the second node send authorization requests information, including it is following at least
It is a kind of:
Authorization requests information is written in the access address of the second node;Or
Authorization requests information is transferred to by the second node using security assertion markup language;Or
By buffer area of the authorization requests information preservation between the first node and the second node.
7. according to the method described in claim 5, the authorization requests information includes the logon account information of the first node;
And
The authorization requests information, which is verified, to be passed through, comprising:
The logon account information of the first node and the logon account information of the second node are identical.
8. one of -7 the method according to claim 1 does not input the verification information for logging in the second node in the user,
In the case where realizing the access to the second node, the method also includes:
Access duration and/or access authority that the user accesses the second node are set.
9. a kind of network system, comprising:
Detection module is configured in the case where user successfully logs in first node with the first system permission, if detect from
The first node of current accessed jumps to second node, then judges whether the second node is destination node;
Communication module, be configured to if it is determined that the second node be destination node, then do not inputted described in login in the user
In the case where the verification information of second node, the access to the second node is realized.
10. network system according to claim 9 further includes authentication module, it is configured to if it is determined that the second node
It is not destination node, then carries out the login authentication of the second node to the user, and in the case where login authentication passes through,
Realize the access to the second node.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910248791.2A CN109962919A (en) | 2019-03-29 | 2019-03-29 | System access method and network system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910248791.2A CN109962919A (en) | 2019-03-29 | 2019-03-29 | System access method and network system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109962919A true CN109962919A (en) | 2019-07-02 |
Family
ID=67025188
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910248791.2A Pending CN109962919A (en) | 2019-03-29 | 2019-03-29 | System access method and network system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109962919A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101119195A (en) * | 2006-08-01 | 2008-02-06 | 华为技术有限公司 | Method and system for remote access authorization and identification |
CN104348777A (en) * | 2013-07-24 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Method and system for controlling access of mobile terminal to third party server |
US20170193216A1 (en) * | 2013-08-10 | 2017-07-06 | James B. Lucas | Password generation system and process |
CN107359996A (en) * | 2016-05-09 | 2017-11-17 | 阿里巴巴集团控股有限公司 | Automatic logging method and device between more websites |
CN109409043A (en) * | 2018-09-03 | 2019-03-01 | 中国平安人寿保险股份有限公司 | Login method, terminal device and the medium of application system |
-
2019
- 2019-03-29 CN CN201910248791.2A patent/CN109962919A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101119195A (en) * | 2006-08-01 | 2008-02-06 | 华为技术有限公司 | Method and system for remote access authorization and identification |
CN104348777A (en) * | 2013-07-24 | 2015-02-11 | 腾讯科技(深圳)有限公司 | Method and system for controlling access of mobile terminal to third party server |
US20170193216A1 (en) * | 2013-08-10 | 2017-07-06 | James B. Lucas | Password generation system and process |
CN107359996A (en) * | 2016-05-09 | 2017-11-17 | 阿里巴巴集团控股有限公司 | Automatic logging method and device between more websites |
CN109409043A (en) * | 2018-09-03 | 2019-03-01 | 中国平安人寿保险股份有限公司 | Login method, terminal device and the medium of application system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9864852B2 (en) | Approaches for providing multi-factor authentication credentials | |
US10362026B2 (en) | Providing multi-factor authentication credentials via device notifications | |
CN104378376B (en) | Single-point logging method, certificate server and browser based on SOA | |
CN104113551B (en) | A kind of platform authorization method, platform service end and applications client and system | |
Li et al. | Analysing the Security of Google’s implementation of OpenID Connect | |
US9380052B2 (en) | System and method for biometric protocol standards | |
CN104113549B (en) | A kind of platform authorization method, platform service end and applications client and system | |
US10574697B1 (en) | Providing a honeypot environment in response to incorrect credentials | |
CN107172054A (en) | A kind of purview certification method based on CAS, apparatus and system | |
US11599623B2 (en) | Global identity for use in a hybrid cloud network architecture | |
US9934310B2 (en) | Determining repeat website users via browser uniqueness tracking | |
CN104753677B (en) | Password hierarchical control method and system | |
US9059987B1 (en) | Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network | |
US10841297B2 (en) | Providing multi-factor authentication credentials via device notifications | |
CN107770192A (en) | Identity authentication method and computer-readable recording medium in multisystem | |
CN110839087A (en) | Interface calling method and device, electronic equipment and computer readable storage medium | |
US20150067772A1 (en) | Apparatus, method and computer-readable storage medium for providing notification of login from new device | |
WO2019011187A1 (en) | Method, device, and apparatus for loss reporting, removing loss report, and service management of electronic account | |
CN110069909A (en) | It is a kind of to exempt from the close method and device for logging in third party system | |
CN112583834A (en) | Method and device for single sign-on through gateway | |
CN110166471A (en) | A kind of portal authentication method and device | |
US11374915B1 (en) | Security challenge bypass | |
Wang et al. | A framework for formal analysis of privacy on SSO protocols | |
EP3329650B1 (en) | Providing multi-factor authentication credentials via device notifications | |
CN110177096A (en) | Client certificate method, apparatus, medium and calculating equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190702 |