CN109962919A - System access method and network system - Google Patents

System access method and network system Download PDF

Info

Publication number
CN109962919A
CN109962919A CN201910248791.2A CN201910248791A CN109962919A CN 109962919 A CN109962919 A CN 109962919A CN 201910248791 A CN201910248791 A CN 201910248791A CN 109962919 A CN109962919 A CN 109962919A
Authority
CN
China
Prior art keywords
node
user
access
information
case
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910248791.2A
Other languages
Chinese (zh)
Inventor
高博雅
杨市伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201910248791.2A priority Critical patent/CN109962919A/en
Publication of CN109962919A publication Critical patent/CN109962919A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the present application discloses system access method and network system.One specific embodiment of this method includes: to jump to second node if detecting from the first node of current accessed in the case where user successfully logs in first node with the first system permission, judges whether second node is destination node;If it is determined that second node is destination node, then in the case where user does not input the verification information for logging in second node, the access to second node is realized.This embodiment provides a kind of safety and convenient and fast system access method, can contribute to the operating process for reducing user, is conducive to improve access efficiency.

Description

System access method and network system
Technical field
The invention relates to field of computer technology more particularly to system access method and network systems.
Background technique
In the prior art, for information security the considerations of, for multi-node system, (node generally corresponding one is set It is standby), usually require that the password of setting will meet certain complexity, and have the function of that access time limit and permission can be arranged. The safety of equipment itself can be substantially improved in coming into operation for these functions.But when user accesses or manage setting for different nodes When standby, it usually needs carry out the verifying of password.That is user when carrying out node switching, often to input it is corresponding correctly log in it is close Code can realize access.This makes troubles to the operation and management of user.
Summary of the invention
The embodiment of the present application provides system access method and network system.
In a first aspect, the embodiment of the present application provides a kind of system access method, comprising: in user with the first system permission In the case that success logs in first node, second node is jumped to if detecting from the first node of current accessed, judges the Whether two nodes are destination node;If it is determined that second node is destination node, is not then inputted in user and log in testing for second node In the case where demonstrate,proving information, the access to second node is realized.
In some embodiments, this method further include: if it is determined that second node is not destination node, then the is carried out to user The login authentication of two nodes, and in the case where login authentication passes through, realize the access to second node.
In some embodiments, destination node is that network address and the network address of first node are located in phase same network segment Node.
In some embodiments, in the case where determining second node is destination node, second is jumped to from first node It include to be used to indicate first node and/or the authentication result for characterizing the first system permission in the jump information of node Identification information.
In some embodiments, however, it is determined that second node is destination node, then does not input in user and log in second node In the case where verification information, the access to second node is realized, comprising: if it is determined that second node is destination node, then to second Node send authorization requests information, and if authorization requests information be verified and pass through, do not input login second node in user Verification information in the case where, realize access to second node.
In some embodiments, authorization requests information is sent to second node, comprised at least one of the following: by authorization requests Information is written in the access address of second node;Or authorization requests information is transferred to second using security assertion markup language Node;Or the buffer area by authorization requests information preservation between first node and second node.
In some embodiments, authorization requests information includes the logon account information of first node;And authorization requests letter Breath, which is verified, to be passed through, comprising: the logon account information of first node and the logon account information of second node are identical.
In some embodiments, it does not input the verification information of login second node in user, realizes the visit to second node In the case where asking, this method further include: setting user accesses the access duration and/or access authority of second node.
Second aspect, the embodiment of the present application provide a kind of network system, comprising: detection module is configured in user In the case where successfully logging in first node with the first system permission, second is jumped to if detecting from the first node of current accessed Node then judges whether second node is destination node;Communication module, be configured to if it is determined that second node be destination node, Then in the case where user does not input the verification information for logging in second node, the access to second node is realized.
In some embodiments, which further includes authentication module, is configured to if it is determined that second node is not mesh Node is marked, then carries out the login authentication of second node to user, and in the case where login authentication passes through, is realized to second node Access.
System access method provided by the embodiments of the present application and network system are successfully logged in user with the first system permission In the case where first node, if detecting, the slave first node of the currently accessed node of the user jumps to second node, can To judge whether second node is destination node.If it is determined that second node is destination node, then login the is not inputted in the user In the case where the verification information of two nodes, the access to second node may be implemented.That is, it is not necessary to which user input is stepped on Record the verification information of second node, so that it may it be allowed to access second node.This embodiment provide it is a kind of safety and just Prompt system access method can contribute to the operating process for reducing user, be conducive to improve access efficiency.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is the flow chart of one embodiment of system access method provided by the present application;
Fig. 2 is the flow chart of another embodiment of system access method provided by the present application;
Fig. 3 is the structural schematic diagram of one embodiment of network system provided by the present application.
Specific embodiment
To make those skilled in the art better understand the technical solution of the application, with reference to the accompanying drawing and specific embodiment party Formula elaborates to the application.
The various schemes and feature of the application are described herein with reference to attached drawing.
By the description of the preferred form with reference to the accompanying drawings to the embodiment for being given as non-limiting example, the application's These and other characteristic will become apparent.
It is also understood that although the application is described referring to some specific examples, those skilled in the art Member realizes many other equivalents of the application in which can determine, they have feature as claimed in claim and therefore all In the protection scope defined by whereby.
When read in conjunction with the accompanying drawings, in view of following detailed description, above and other aspect, the feature and advantage of the application will become It is more readily apparent.
The specific embodiment of the application is described hereinafter with reference to attached drawing;It will be appreciated, however, that the embodiment invented is only Various ways implementation can be used in the example of the application.Known and/or duplicate function and structure is simultaneously not described in detail with basis True intention is distinguished in the operation of the history of user, and unnecessary or extra details is avoided to make the application smudgy.Cause This, the specific structural and functional details invented herein are not intended to restriction, but as just the base of claim Plinth and representative basis are used to that those skilled in the art to be instructed diversely to use this Shen with substantially any appropriate detailed construction Please.
This specification can be used phrase " in one embodiment ", " in another embodiment ", " in another embodiment In " or " in other embodiments ", it can be referred to one or more of the identical or different embodiment according to the application.
Referring to Figure 1, it illustrates the processes 100 of one embodiment of system access method provided by the present application.This is System access method can be applied to various network systems.It here may include various electronic equipments in network system, it such as can be with Including but not limited to smart phone, tablet computer, desktop computer, printer and server etc..The system access method It may comprise steps of:
Step 101, it in the case where user successfully logs in first node with the first system permission, is visited if detecting from current The first node asked jumps to second node, then judges whether second node is destination node.
In the prior art, for the security consideration of system, it will usually different system permissions be arranged, as administrator weighs Limit, normal user permission etc..And under different system permissions, general user can operation content difference to system.Such as After administrator right login system, various operations, such as modification configuration parameter can be carried out to system.In another example commonly to use After the permission login system of family, only the accessible configuration parameter for checking system, is modified without can be carried out.It can effectively keep away in this way Exempt from user misoperation.
In the present embodiment, user can be logged in the first system permission and access first node.Wherein, first node can To be any node in system.And each node has unique network address, as IP (Internet Protocol, mutually Networking protocol) address.Herein, node can refer to network node.Network node generally refers to a computer or other equipment There is independent address with one and be connected with the network for sending or receive data function.Node can be work station, client, network User or personal computer, the equipment that can also be server, printer and other network connections.Each Gong Zuo Zhan ﹑ service Device, terminal device, the network equipment, that is, the equipment for possessing oneself only network address is all network node.Here node can also To be network port etc..It is understood that the network address of the network port be usually fixed it is constant, and with the network port electricity The equipment of connection is usually replaceable.
Here the first system permission is not intended to limit in this application, as long as may be implemented under the first system permission System access method in the embodiment of the present application.As an example, the first system permission can be highest system permission (such as root (root) permission).
In the present embodiment, in the case where user successfully logs in first node with the first system permission, if detect from The first node of current accessed jumps to second node, then may determine that whether the second node is destination node.Wherein, target Node can be for characterize can be with the node of first node combined authorization management.Here combined authorization management typically refers to When user is to log in any node in combined authorization management node set not less than certain system permission, so that it may access joint Other nodes in empowerment management node set log in the verification information of respective nodes without inputting.Herein, however, it is determined that Second node is destination node, then can continue to execute step 102.
In the present embodiment, destination node (combined authorization management node) can be set according to the actual demand of user It sets.And can judge whether second node is destination node in several ways.
As an example, second node can be matched in pre-set combined authorization management node set.If There is the node to match with the second node in combined authorization management node set, it can be said that the bright second node is target Node.Wherein, the storage location of combined authorization management node set is not intended to limit in this application.
Optionally, destination node can also be that the network address of network address and first node is located at the section in phase same network segment Point.That is, destination node is located in phase same network segment with first node.At this point it is possible to by the network address of second node with The network address of first node is compared, to judge whether second node is destination node.
It should be noted that network address generally comprises four, such as * * * .***.***.***.In order to guarantee the peace of system Quan Xing, phase same network segment here generally refer to the identical network address of front three, such as network address * * * .***.***.A and network Address * * * .***.***.B is located in identical network segment.In application scenes, in order to meet the use need of different user It asks, expands the scope of application of method, phase same network segment here can also be configured according to user demand.As an example, identical Network segment may also mean that first identical network address etc..
It is understood that above-mentioned second node can be the different nodes belonged in same system from first node.Example If the two is respectively the different server in same cabinet.In another example the two is respectively the different function website in same application, If first node can be shopping website, and second node can be paying website.In some embodiments, above-mentioned second node Different systems can also be belonging respectively to from first node.Such as the two is respectively different video playback class application.In another example First node can be ticket, plane ticket booking website, and second node can be hotel reservation website.
Step 102, however, it is determined that second node is destination node, then does not input the verification information of login second node in user In the case where, realize the access to second node.
In the present embodiment, however, it is determined that second node is destination node, then does not input in user and log in testing for second node In the case where demonstrate,proving information, the access to second node can be realized.That is, determining that second node is destination node In the case of, second node can be jumped directly to from the currently accessed first node of user, i.e. user can be from first node Second node is directly accessed, the verification information of second node is logged in without inputting.The operation stream of user can be reduced in this way Journey helps to improve the access efficiency of user, improves user experience.
In some optional implementations, in order to guarantee the safety of system, determining that second node is destination node In the case where, it from the jump information that first node jumps to second node, may include the mark for being used to indicate first node Know information, and/or the identification information of the authentication result (whether authentication authorization and accounting passes through) for characterizing the first system permission.As showing Example, identification information can be the network address of first node, or the character etc. for indicating first node.Wherein, mark letter The position ceased in jump information is not intended to limit in this application, can such as be located at the suffix of jump information.
In this way in jump procedure, second node is available to arrive above-mentioned identification information.And then can to identification information into Row verifying, to determine whether to receive the access of above-mentioned user.If such as identification information be first node network address, second Node can know that this jumps movement from first node.Since the two is combined authorization management node, the second section Point can determine the jump information from trusted node.Therefore in the case where not carrying out login authentication, it can receive user's Access.In another example second node can know the system permission if identification information characterization the first system purview certification passes through Through being certified, and certification passes through.That is, this jump movement it is secure and trusted.It, can therefore in the case where not carrying out login authentication To receive the access of user.
It is understood that directly adding above-mentioned identification information in jump information, it can avoid or reduce in system and believe The process that breath (between first node and second node) is received and dispatched repeatedly.Facilitate to simplify process flow in this way, it is possible to reduce use Family waiting time, further increase access efficiency.
In addition, in above-mentioned sign-on access and jump procedure, it usually needs by DNS (Domain Name System, Domain name analysis system) processing.In this way in jump procedure, DNS can be parsed out first node (i.e. source) and second node The network address of (i.e. destination).Therefore it is alternatively possible to which above-mentioned identification information is directly written in jump information by DNS. In addition, as an example, can also be verified by DNS for identification information.It, can be in this way, in the case where being verified The access address (such as URL (Uniform Resource Locator, uniform resource locator)) of second node is sent to use Family.
It optionally,, can also be in the case where determining second node is destination node in order to guarantee the safety of system Second node sends authorization requests information, so that second node allows without login authentication, so that it may operation of accepting the interview.This Sample one does not input the verification information for logging in second node in user if authorization requests information is verified by second node In the case where, so that it may realize the access to second node.
Herein, authorization requests information can be sent to second node using various ways, such as may include (but it is unlimited In) it is at least one below: in the access address that second node can be written in authorization requests information (such as suffix);Or it can adopt Authorization requests information is transmitted with security assertion markup language (SAML, Security Assertion Markup Language) To second node;Or can also by buffer area of the authorization requests information preservation between first node and second node (DMZ, demilitarized zone)。
It should be noted that the content of above-mentioned authorization requests information does not limit equally herein, such as may include (but not It is limited to) the logon account information of above-mentioned identification information and/or first node.Above-mentioned retouch may refer to for the verifying of identification information It states, details are not described herein.And the verifying for logon account information, it can be by the logon account information of first node and the second section The logon account information of point is compared, to judge whether the two is identical.Judge whether first node has with second node Identical logon account information.If the two is identical, due to being verified when logging in first node, second node is not needed Repeated authentication can determine that authorization requests Information Authentication passes through at this time.
In the prior art, in order to guarantee the safety of system, it will usually be respectively provided on each node for logging in pipe The account name and password (i.e. account information) of reason.User can modify these account informations according to demand.But password is answered Miscellaneous degree usually has following requirement: Password Length is at least nine characters;Code content includes the group of at least three kinds characters It closes;It cannot be the dictionary words such as any language, slang, dialect, jargon;It should not be based on personal information;The effective time of password is not More than three months, and cannot be overlapped with password recently three times.
In application scenes, in order to further guarantee the safety of system, is not inputted in user and log in the second section In the case where realizing the access to second node, the access that the user accesses second node can also be arranged in the verification information of point Duration and/or access authority.Such as access duration was no more than 60 minutes.Access authority can be only limitted to check that fundamental system is believed It ceases (such as SDR (Session Detail Record, session detail record) etc.), and cannot modify.
System access method provided by the embodiments of the present application successfully logs in first node in user with the first system permission In the case of, if detecting, the slave first node of the currently accessed node of the user jumps to second node, may determine that second Whether node is destination node.If it is determined that second node is destination node, is not then inputted in the user and log in testing for second node In the case where demonstrate,proving information, the access to second node can be realized.That is, it is not necessary to which the user, which inputs, logs in the second section The verification information of point, so that it may it be allowed to access second node.This embodiment provides a kind of safety and convenient and fast system Access method can contribute to the operating process for reducing user, be conducive to improve access efficiency.
It is understood that not needing since above-mentioned first node can be any node in system in system In be separately provided one for management system node or peripheral hardware one be used for management system electronic equipment.In this way, helping Exploitation, management cost in the system of reduction.And it can be with the utilization rate of lifting system.
With continued reference to Fig. 2, it illustrates the processes 200 of another embodiment of system access method provided by the present application. The system access method may comprise steps of:
Step 201, it in the case where user successfully logs in first node with the first system permission, is visited if detecting from current The first node asked jumps to second node, then judges whether second node is destination node.It specifically may refer to Fig. 1 embodiment Step 101 in associated description, details are not described herein again.Herein, however, it is determined that second node is destination node, then can continue Execute step 202.If it is determined that second node is not destination node, then step 203 can be executed.
Step 202, however, it is determined that second node is destination node, then does not input the verification information of login second node in user In the case where, realize the access to second node.It specifically may refer to the associated description in the step 102 of Fig. 1 embodiment, herein It repeats no more.
Step 203, however, it is determined that second node is not destination node, then the login authentication of second node is carried out to user, and In the case where login authentication passes through, the access to second node is realized.
In the present embodiment, however, it is determined that above-mentioned second node is not destination node, and illustrating the second node not is to combine to award The node in management node set is weighed, i.e., cannot be accessed using mode in step 202 to second node.At this time in order to guarantee The safety of system can carry out authentication to the user of access second node.The login for carrying out second node to user is tested Card.And in the case where the user login validation passes through, the access to second node may be implemented.
As an example, in the case where determining second node not is destination node, it can be by the login page of second node It is presented to the user.Or prompt information can also be sent to user, to prompt user to carry out login authentication.Herein, prompt letter The form of expression of breath is not intended to limit, such as may include (but being not limited to) text information and/or voice messaging.
System access method provided by the embodiments of the present application, further enriches and perfect step process.It in this way can be more Full border service condition is filled it up with, the scope of application of method is expanded.
Referring to Fig. 3, as the realization to method shown in above-mentioned each figure, present invention also provides a kind of network systems One embodiment.The network system embodiment is corresponding with embodiment of the method shown in the various embodiments described above.
As shown in figure 3, the network system 300 of the present embodiment may include: detection module 301, be configured to user with In the case that the first system permission successfully logs in first node, the second section is jumped to if detecting from the first node of current accessed Point then judges whether second node is destination node;Communication module 302, be configured to if it is determined that second node be destination node, Then in the case where user does not input the verification information for logging in second node, the access to second node is realized.
In some optional implementations, which can also include authentication module (being not shown in Fig. 3), It is configured to if it is determined that second node is not destination node, then carries out the login authentication of second node to user, and tested in login In the case that card passes through, the access to second node is realized.
Optionally, destination node can be located at the section in phase same network segment for the network address of network address and first node Point.
In some embodiments, in the case where determining second node is destination node, second is jumped to from first node In the jump information of node, it may include and be used to indicate first node and/or the certification knot for characterizing the first system permission The identification information of fruit.
Optionally, communication module 302 can be further configured to if it is determined that second node is destination node, then to second Node send authorization requests information, and if authorization requests information be verified and pass through, do not input login second node in user Verification information in the case where, realize access to second node.
In some embodiments, authorization requests information is sent to second node, may include following at least one: will authorizes Solicited message is written in the access address of second node;Or authorization requests information is transferred to using security assertion markup language Second node;Or the buffer area by authorization requests information preservation between first node and second node.
Further, authorization requests information may include the logon account information of first node;And authorization requests information Be verified and pass through, may include: first node logon account information it is identical as the logon account information of second node.
In application scenes, which can also include setup module (being not shown in Fig. 3), be configured The access duration and/or access authority of second node are accessed at setting user.
It is understood that in the method that all modules recorded in the network system 300 and reference Fig. 1 and Fig. 2 are described Each step is corresponding.This is equally applicable to above with respect to the beneficial effect of the operation of method description, feature and generation as a result, Network system 300 and module wherein included, details are not described herein.
Since the network system that the present embodiment is introduced is net corresponding to the system access method in the embodiment of the present application Network system, so, based on the system access method in the embodiment of the present application, those skilled in the art can understand the application reality The specific embodiment of network system and its various change form in example are applied, so no longer detailed for the network system herein It introduces.As long as those skilled in the art implement the network system of the system access method in the embodiment of the present application, this Shen is belonged to The range that please be protect.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processing module of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices with A machine is generated, so that generating use by the instruction that the processing module of computer or other programmable data processing devices executes In the function that realization is specified in one box or multiple boxes of one process or multiple processes and/or block diagrams of flow chart Device.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, The manufacture of device is enabled, which realizes in a side of one process or multiple processes and/or block diagrams of flow chart The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing devices, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one process or multiple processes and/or block diagrams of flow chart One box or multiple boxes in specify function the step of.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from foregoing invention design, it is carried out by above-mentioned technical characteristic or its equivalent feature Any combination and the other technical solutions formed.Such as features described above has similar function with (but being not limited to) disclosed herein Can technical characteristic replaced mutually and the technical solution that is formed.

Claims (10)

1. a kind of system access method, comprising:
In the case where user successfully logs in first node with the first system permission, if detecting the first node from current accessed Second node is jumped to, then judges whether the second node is destination node;
If it is determined that the second node is destination node, is not then inputted in the user and log in the verification information of the second node In the case where, realize the access to the second node.
2. according to the method described in claim 1, further include:
If it is determined that the second node is not destination node, then the login authentication of the second node is carried out to the user, and In the case where login authentication passes through, the access to the second node is realized.
3. according to the method described in claim 1, the destination node is the network address of network address and the first node Node in phase same network segment.
4. according to the method described in claim 1, determine the second node be destination node in the case where, from described first Node jumps in the jump information of the second node, includes to be used to indicate the first node and/or for characterizing State the identification information of the authentication result of the first system permission.
5. according to the method described in claim 1, it is described if it is determined that the second node be destination node, then the user not In the case that input logs in the verification information of the second node, the access to the second node is realized, comprising:
If it is determined that the second node is destination node, then authorization requests information is sent to the second node, and if described Authorization requests information, which is verified, to be passed through, then in the case where the user does not input the verification information for logging in the second node, Realize the access to the second node.
6. according to the method described in claim 5, it is described to the second node send authorization requests information, including it is following at least It is a kind of:
Authorization requests information is written in the access address of the second node;Or
Authorization requests information is transferred to by the second node using security assertion markup language;Or
By buffer area of the authorization requests information preservation between the first node and the second node.
7. according to the method described in claim 5, the authorization requests information includes the logon account information of the first node; And
The authorization requests information, which is verified, to be passed through, comprising:
The logon account information of the first node and the logon account information of the second node are identical.
8. one of -7 the method according to claim 1 does not input the verification information for logging in the second node in the user, In the case where realizing the access to the second node, the method also includes:
Access duration and/or access authority that the user accesses the second node are set.
9. a kind of network system, comprising:
Detection module is configured in the case where user successfully logs in first node with the first system permission, if detect from The first node of current accessed jumps to second node, then judges whether the second node is destination node;
Communication module, be configured to if it is determined that the second node be destination node, then do not inputted described in login in the user In the case where the verification information of second node, the access to the second node is realized.
10. network system according to claim 9 further includes authentication module, it is configured to if it is determined that the second node It is not destination node, then carries out the login authentication of the second node to the user, and in the case where login authentication passes through, Realize the access to the second node.
CN201910248791.2A 2019-03-29 2019-03-29 System access method and network system Pending CN109962919A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910248791.2A CN109962919A (en) 2019-03-29 2019-03-29 System access method and network system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910248791.2A CN109962919A (en) 2019-03-29 2019-03-29 System access method and network system

Publications (1)

Publication Number Publication Date
CN109962919A true CN109962919A (en) 2019-07-02

Family

ID=67025188

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910248791.2A Pending CN109962919A (en) 2019-03-29 2019-03-29 System access method and network system

Country Status (1)

Country Link
CN (1) CN109962919A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119195A (en) * 2006-08-01 2008-02-06 华为技术有限公司 Method and system for remote access authorization and identification
CN104348777A (en) * 2013-07-24 2015-02-11 腾讯科技(深圳)有限公司 Method and system for controlling access of mobile terminal to third party server
US20170193216A1 (en) * 2013-08-10 2017-07-06 James B. Lucas Password generation system and process
CN107359996A (en) * 2016-05-09 2017-11-17 阿里巴巴集团控股有限公司 Automatic logging method and device between more websites
CN109409043A (en) * 2018-09-03 2019-03-01 中国平安人寿保险股份有限公司 Login method, terminal device and the medium of application system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101119195A (en) * 2006-08-01 2008-02-06 华为技术有限公司 Method and system for remote access authorization and identification
CN104348777A (en) * 2013-07-24 2015-02-11 腾讯科技(深圳)有限公司 Method and system for controlling access of mobile terminal to third party server
US20170193216A1 (en) * 2013-08-10 2017-07-06 James B. Lucas Password generation system and process
CN107359996A (en) * 2016-05-09 2017-11-17 阿里巴巴集团控股有限公司 Automatic logging method and device between more websites
CN109409043A (en) * 2018-09-03 2019-03-01 中国平安人寿保险股份有限公司 Login method, terminal device and the medium of application system

Similar Documents

Publication Publication Date Title
US9864852B2 (en) Approaches for providing multi-factor authentication credentials
US10362026B2 (en) Providing multi-factor authentication credentials via device notifications
CN104378376B (en) Single-point logging method, certificate server and browser based on SOA
CN104113551B (en) A kind of platform authorization method, platform service end and applications client and system
Li et al. Analysing the Security of Google’s implementation of OpenID Connect
US9380052B2 (en) System and method for biometric protocol standards
CN104113549B (en) A kind of platform authorization method, platform service end and applications client and system
US10574697B1 (en) Providing a honeypot environment in response to incorrect credentials
CN107172054A (en) A kind of purview certification method based on CAS, apparatus and system
US11599623B2 (en) Global identity for use in a hybrid cloud network architecture
US9934310B2 (en) Determining repeat website users via browser uniqueness tracking
CN104753677B (en) Password hierarchical control method and system
US9059987B1 (en) Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network
US10841297B2 (en) Providing multi-factor authentication credentials via device notifications
CN107770192A (en) Identity authentication method and computer-readable recording medium in multisystem
CN110839087A (en) Interface calling method and device, electronic equipment and computer readable storage medium
US20150067772A1 (en) Apparatus, method and computer-readable storage medium for providing notification of login from new device
WO2019011187A1 (en) Method, device, and apparatus for loss reporting, removing loss report, and service management of electronic account
CN110069909A (en) It is a kind of to exempt from the close method and device for logging in third party system
CN112583834A (en) Method and device for single sign-on through gateway
CN110166471A (en) A kind of portal authentication method and device
US11374915B1 (en) Security challenge bypass
Wang et al. A framework for formal analysis of privacy on SSO protocols
EP3329650B1 (en) Providing multi-factor authentication credentials via device notifications
CN110177096A (en) Client certificate method, apparatus, medium and calculating equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190702