CN111859320A - Cross-system login-free method, device, equipment and readable storage medium - Google Patents

Cross-system login-free method, device, equipment and readable storage medium Download PDF

Info

Publication number
CN111859320A
CN111859320A CN202010575441.XA CN202010575441A CN111859320A CN 111859320 A CN111859320 A CN 111859320A CN 202010575441 A CN202010575441 A CN 202010575441A CN 111859320 A CN111859320 A CN 111859320A
Authority
CN
China
Prior art keywords
information
login
token
temporary
system server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010575441.XA
Other languages
Chinese (zh)
Inventor
林纯弟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN202010575441.XA priority Critical patent/CN111859320A/en
Publication of CN111859320A publication Critical patent/CN111859320A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a cross-system login-free method based on the same application program, which relates to the technical field of data security and comprises the following steps: when an access instruction to a second system is received, acquiring temporary identity information of a user at a first system server; sending the temporary identity information to a second system front end so that the second system front end sends the temporary identity information to a second system server through a corresponding information transmission interface; sending a login request sent by a second system server based on the temporary identity information to a first system server; receiving feedback information sent by a first system server side in response to the login request; when the feedback information is identified as the determined information, the feedback information is sent to a second system server so as to log in on a second system; and when the login success on the second system is detected, jumping to the page contained in the access instruction. The application also provides a device, computer equipment and a storage medium. The method and the device realize improvement of cross-system login-free convenience.

Description

Cross-system login-free method, device, equipment and readable storage medium
Technical Field
The present application relates to the field of data security technologies, and in particular, to a cross-system login-free method and apparatus based on the same application program, a computer device, and a computer-readable storage medium.
Background
In many applications, there are many applications that an applet can log in to another applet or system when using an application APP. When a user needs to jump to another applet or system, the user does not log in correspondingly or needs to input corresponding login information, but the login process is complicated, and a login-free mode without perception of the user between systems cannot be achieved.
If a cooperative relationship exists between the two systems, the scenes of respective login often appear for the user to carry out multiple login operations, the operation process is complicated, and the user experience is poor.
Therefore, a solution for making an imperceptible cross-system login for the same application is needed.
Disclosure of Invention
The application provides a cross-system login-free method and device based on the same application program, computer equipment and a storage medium, so that the cross-system login convenience is improved.
In a first aspect, the present application provides a cross-system login-free method based on the same application, where the method includes:
When an access instruction to a second system is received, acquiring temporary identity information of a user at a first system server;
sending the temporary identity information to the second system front end so that the second system front end sends the temporary identity information to a second system server through a corresponding information transmission interface;
sending a login request sent by the second system server based on the temporary identity information to the first system server;
receiving feedback information sent by the first system server in response to the login request;
when the feedback information is identified as the determined information, the feedback information is sent to the second system server so as to log in the second system;
and when the login on the second system is detected to be successful, jumping to a page contained in the access instruction.
In a second aspect, the present application further provides a cross-system login-free device based on the same application, where the device includes:
the information acquisition module is used for acquiring the temporary identity information of the user at the first system server when receiving an access instruction to the second system;
the first sending module is used for sending the temporary identity information to the second system front end so that the second system front end sends the temporary identity information to a second system server through a corresponding information transmission interface;
The second sending module is used for sending the login request sent by the second system server based on the temporary identity information to the first system server;
the information receiving module is used for receiving feedback information sent by the first system server end in response to the login request;
the system login module is used for sending the feedback information to the second system server to log in the second system when the feedback information is identified as the determination information;
and the instruction response module is used for jumping to a page contained in the access instruction when the login success on the second system is detected.
In a third aspect, the present application further provides a computer device comprising a memory and a processor; the memory is used for storing a computer program; the processor is used for executing the computer program and realizing the cross-system login-free method based on the same application program when the computer program is executed.
In a fourth aspect, the present application further provides a computer-readable storage medium storing a computer program, which when executed by a processor causes the processor to implement the cross-system login-free method based on the same application as described above.
The application discloses a cross-system login-free method, a device, computer equipment and a storage medium based on the same application program, when a first system is used and a second system is needed, the identity information of a user logging in the first system is obtained, specifically, data information is read in a service terminal of the first system to obtain temporary user information corresponding to the use of logging in the first system, the obtained temporary identity information is sent to a front terminal of the second system, so that the front terminal of the second system sends the identity information to the service terminal of the second system by using a corresponding data transmission interface, the service terminal of the second system obtains a corresponding login request according to the temporary identity information to send the login request to the service terminal of the first system for corresponding login verification, and finally, when feedback information sent by the service terminal of the first system is confirmed information, login on the second system is realized, so as to jump to the service page corresponding to the access instruction. When cross-system login is required in the same application program, the information interaction between the two systems is carried out to complete login verification on the other system, a user does not need to carry out cross-system login operation, and the login convenience is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flowchart illustrating a cross-system login-free method based on a unified application in an embodiment of the present application;
FIG. 2 is a flowchart illustrating steps of obtaining feedback information in response to a login request according to an embodiment of the present disclosure;
FIG. 3 is a flowchart illustrating steps of obtaining login information according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a data interaction framework of a cross-system login method according to an embodiment of the present application;
FIG. 5 is a schematic block diagram of a cross-system log-on-free device of the same application in one embodiment of the present application;
FIG. 6 is a block diagram showing a schematic configuration of a computer device according to an embodiment.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The flow diagrams depicted in the figures are merely illustrative and do not necessarily include all of the elements and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It is to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a flowchart illustrating a cross-system login-free method based on a unified application according to an embodiment of the present application.
Other systems can be embedded in a plurality of APP at present, and when the APP is used for carrying out corresponding business operation, the APP can enter another system through certain operation so as to realize the business requirement of convenience.
Specifically, the cross-system login-free method comprises the following steps:
step S101, when receiving an access instruction to the second system, obtaining the temporary identity information of the user at the first system server.
The first system and the second system can be opened by using the same application program, the first system is a currently used system, namely a program corresponding to the first system currently used by a user, and the second system is a system which needs to be accessed currently. In practice, the first system is interchangeable with the second system, and the second system can still be accessed while the first system is in use. The system comprises a system front end and a system server, wherein the operability modes and functions of the system front end and the system server are different, and due to the interaction independence between the systems, the front end of the system A can only transmit data through an API provided by the front end of the system B, but cannot directly call an interface of the system B server to perform corresponding operation.
When a first system is used for carrying out corresponding business operation, if a second system needs to be accessed to carry out other business, namely an access instruction to the second system is received when the first system is used for carrying out operation, the identity information of a user logging in the first system is obtained at the moment, namely the current temporary identity information of the user is obtained at a service end of the first system, and then whether the login-free business operation in the second system can be realized or not is determined through the obtained temporary identity information.
Compared with a user, the login-free system does not need any login operation, such as inputting login information, but the system automatically completes login.
In practical application, for example, a plurality of service systems embedded in an application program can be logged in by depending on the application program, and corresponding data interaction also exists between different service systems. When a user uses a certain service, i.e. a first system, if another service needs to be used in the service to complete the corresponding service, the user needs to access a corresponding second system. In order to use another service, a corresponding information login operation needs to be performed, so that corresponding temporary identity information is obtained in the first system at this time, where the temporary identity information includes a temporary token corresponding to the user, a user identifier of the user, and an equipment identifier of the used equipment, so as to complete a corresponding login according to the obtained identity information, thereby implementing an operation on a certain service.
In some embodiments, in order to ensure the security of login information when implementing login-free of the second system, the method includes, when acquiring the identity information of the user who logs in the first system: and accessing a first system server based on the first system front end to set the effective time of the identity information according to a preset rule so as to obtain the temporary identity information of the user.
Specifically, in order to ensure the security of login, when the identity information of the login user recorded in the first system is acquired, a certain information valid time is set for the identity information, the identity information can be used only when the identity information is verified within the time valid time, and when the time valid time is exceeded, the identity information is regarded as invalid information.
In addition, when the identity information of the user logging in the first system is acquired, besides a certain effective time set for the identity information, the security of logging in can be ensured according to the identification information of the equipment for realizing the logging in of the first system.
Step S102, the temporary identity information is sent to the second system front end, so that the second system front end sends the temporary identity information to a second system server through a corresponding information transmission interface;
after the temporary identity information of the user is acquired from the first system server, the acquired temporary identity information is sent to the second system front end, so that the second system front end sends the received temporary identity information to the second system server through the corresponding information transmission interface, and the second system server obtains a corresponding login request according to the received temporary identity information.
In practical application, after receiving the temporary identity information of the user acquired by the first system front end from the first system server, the temporary identity information is sent to the system front end of the second system needing to log in.
Step S103, sending the login request sent by the second system server based on the temporary identity information to the first system server.
After the temporary identity information is sent to the second system server through the corresponding data transmission channel, the second system server generates a corresponding login request according to the temporary identity information, so that the generated login request is sent to the first system server, corresponding verification is carried out on the first system, and whether login-free can be carried out on the second system is determined.
In practical application, after obtaining the temporary identity information corresponding to the user who logs in the first system, the temporary identity information is sent to the second system, and at this time, because the second system needs to log in for corresponding service processing and the like, the second system needs to complete corresponding login operation according to the obtained temporary identity information, and therefore after receiving the sent identity information, the second system sends out a corresponding login request for logging in the second system according to the temporary identity information.
Specifically, when the second system needs to log in, the login is completed by using the related identity information of the user, and when the user does not actively input the identity information, the identity information of the user of the first system who has completed the login is acquired for the login of the second system, so that when the corresponding identity information is received, the login request of the second system can be completed only by the verification of the first system because the identity information is sent by the first system.
And step S104, receiving feedback information sent by the first system server in response to the login request.
Because the login on the second system is completed by using the identity information of the user who logs in the first system, the login can be completed on the second system only by obtaining the authorization of the first system when the login is performed. Specifically, after the first system server receives the corresponding login request obtained by the second system server according to the received temporary identity information, the first system server first performs corresponding verification on the login request to obtain a corresponding verification result, that is, after receiving the login request fed back by the second system server according to the temporary identity information, the first system server responds to the login request to obtain corresponding feedback information.
In practical application, after receiving the temporary identity information, the second system server generates a login request containing corresponding authentication information, and then sends the login request to the first system server, so that the first system server performs corresponding authentication determination to finally determine whether to allow the user to log in the second system by using the identity information of the user. Specifically, when receiving the confirmation information fed back by the first system, it is determined that the login can be performed on the second system using the obtained identity information, and similarly, when receiving the negative information fed back by the first system, the login cannot be performed on the second system using the obtained identity information.
And step S105, when the feedback information is identified as confirmation information, sending the feedback information to the second system server so as to log in the second system.
After responding to the received login request, the first system server obtains a corresponding response result, and at the moment, feedback information obtained by responding to the login request is sent to the second system server, so that the second system server completes corresponding login operation after receiving the feedback information. Specifically, since it is determined that login-free can be implemented on the second system only when the feedback information is the confirmation information, when the obtained feedback information is recognized as the confirmation information, the feedback information is sent to the server of the second system, so that the second system can perform automatic login.
Specifically, after the first system server receives a login request sent by the second system server, the login request is correspondingly verified, and corresponding feedback information is fed back according to a verification result, wherein the feedback information comprises determination information and negative information, the determination information is information which can be logged in, and the negative information is information which cannot be logged in.
The login information is verified, and in order to better ensure the security of login, the verification is mainly performed on the relevant information of the user, including but not limited to the basic information of the user, and also including the device information used by the user. When the first system server side responds to the login request to obtain corresponding feedback information, the feedback information is fed back to the second system server side, so that the second system responds to the feedback information.
In practical application, after the feedback information sent by the first system server in response to the login request is sent to the second system server, in order to enable the second system to complete corresponding login operation timely and accurately, the login information stored in advance is obtained in the first system server, and meanwhile, the login information is also sent to the second system server, so that automatic login can be achieved on the second system. The login information may be the same as or different from the identity information, for example, the identity information is a name of the user, the login information may be the name of the user, or other login information associated with the user, such as a phone number or a mailbox, and when it is determined that login can be performed in the second system, the login information corresponding to the user information is obtained according to the user information included in the identity information.
And S106, jumping to a page contained in the access instruction when the login on the second system is detected to be successful.
And when the completion of the login of the second system is detected, jumping to a page contained in the access instruction, so that the user can operate on the corresponding page to meet different service requirements.
In addition, when the second system can automatically log in, the second system automatically jumps to the page contained in the access instruction when the log in is completed. And when the second system can not automatically log in, jumping to a log-in interface corresponding to the second system so that the user performs corresponding log-in operation, and only automatically jumping to a page contained in the access instruction after logging in is completed, so that the user can complete corresponding service operation.
In the cross-system login-free method based on the same application program, when a first system needs to be used and a second system needs to be used, acquiring identity information of a user logging in a first system, specifically reading data information in a first system server to obtain temporary user information corresponding to the user logging in the first system, then the obtained temporary identity information is sent to the second system front end, so that the second system front end sends the identity information to the second system server end by utilizing a corresponding data transmission interface, the second system server obtains a corresponding login request according to the temporary identity information to send the login request to the first system server for corresponding login verification, and finally when the feedback information sent by the first system server is determined to be confirmation information, and realizing login on the second system so as to jump to the service page corresponding to the access instruction. When cross-system login is required in the same application program, the information interaction between the two systems is carried out to complete login verification on the other system, a user does not need to carry out cross-system login operation, and the login convenience is improved.
Further, referring to fig. 2, fig. 2 is a schematic flowchart illustrating a step of obtaining feedback information in response to a login request in an embodiment of the present application.
Specifically, before receiving the feedback information sent by the first system server in response to the login request in step S104, the method includes:
step S201, obtaining a temporary token contained in the login request;
step S202, judging whether the temporary token is an effective token according to the data information contained in the temporary token to obtain a determination result;
step S203, corresponding feedback information is obtained according to the judgment result obtained by the judgment.
The login request is request information sent by the second system for login, and when the login request is sent by the server of the second system, the login request contains corresponding authentication information, so that the first system determines whether to allow the login-free operation to be completed on the second system. In order to ensure the security of account login, the login request needs to be correspondingly verified, so as to ensure that cross-system login-free under the condition of account security is realized.
Specifically, after receiving the login request sent by the second system, the login request is responded. And responding to the login request, and performing information verification to determine whether login-free can be performed on the second system. Specifically, a temporary token included in the received login request is acquired, and then whether the acquired temporary token is an effective token is judged according to data information included in the temporary token, and then corresponding feedback information is acquired according to a judgment determination result obtained by the judgment.
In practical application, when the obtained temporary token is determined to be an effective token, the currently obtained feedback information is determined information, that is, the login-free operation can be performed on the second system at this time; when the obtained temporary token is determined to be an invalid token, the currently obtained feedback information is negative information, that is, the login-free operation on the second system is not allowed at this time, and the user is required to perform a corresponding login operation by himself, such as inputting login information.
When determining that the login-free mode cannot be realized on the second system currently, namely the login-free mode fails, popping up a corresponding login interface when logging in the second system, so that a user inputs login information in a relevant area of the login interface to finish the login on the second system.
Further, when determining whether the temporary token is an effective token according to the data information included in the temporary token, the method includes: acquiring identification information corresponding to the temporary token; determining the correctness of the temporary token according to the identification information; when the temporary token is determined to be correct, determining whether the temporary token is within a valid time period to determine whether the temporary token is a valid token.
token means "token", and is a string of character strings generated by the server as an identifier for making a request. The temporary token is used for verifying the user information, has certain timeliness, and can respond to the request to which the temporary token belongs when the temporary token ensures the timeliness of the temporary token.
When determining whether the temporary token is an effective token, acquiring related aging information of the temporary token, such as identification information of the temporary token, wherein the identification information at least comprises an equipment identification and a user identification, then determining the correctness of the temporary token according to the obtained identification information of the temporary token, and further when determining that the temporary token is correct, receiving and determining whether the temporary token is in an effective time period, and further determining whether the obtained temporary token is an effective token.
In practical application, when the identity information of a user who logs in on a first system is acquired, corresponding valid time setting is performed on the acquired identity information, and when the valid time information is set, the corresponding valid time is the valid time capable of responding to a login request fed back by a second system, for example, the time corresponding to the valid time information is 1 minute, that is, after the identity information of the user who logs in on the first system is acquired, only a certain response is performed on the login request received within 1 minute, and the login request exceeding 1 minute is determined to be an invalid request.
Therefore, after the temporary token included in the login request is obtained, the correctness of the identification information is firstly determined according to the identification information corresponding to the temporary token, so that the use safety of the user to the account can be effectively ensured.
Because not all cases may be login-free in practical applications, for example, when a user uses a terminal device that is not conventionally used to log in an application program to perform a corresponding service operation, if the user wants to access the second system, because the user does not conventionally use the device, there may be a certain potential safety hazard if the user directly logs in the second system, and there may be a case that the user may not log in at the same time. Therefore, the identification information of the temporary token is obtained, the equipment identification and the user identification are correspondingly verified, and the login safety is ensured.
In addition, in order to further ensure the security of login, after the correctness of the identification information is determined, whether the temporary token is in the valid time period is also determined, and the login of the second system is ensured to be currently required by determining the timeliness of the temporary token. Specifically, when determining whether the temporary token is in the valid time token, for example, the corresponding valid time is 2 minutes, but the time when the login request is received exceeds 2 minutes, it is determined that the obtained temporary token is an invalid token, that is, the received login request is an invalid request.
In practical application, when the first system server performs login verification, the security and timeliness of the identity information are mainly judged, specifically, a temporary token included in the identity information is obtained, valid time information of the temporary token is read to determine whether the current time is within the valid time information, and meanwhile, identification information of equipment included in the identity information is also obtained to compare the obtained identification information of the equipment with identification information of the equipment stored in the first system. The login-free operation in the second system can be allowed only if the current time is within the valid time information and the obtained identification information of the device is the same as the stored identification information of the device to determine that the authentication is passed.
Further, in some embodiments, receiving feedback information sent by the first system server in response to the login request includes: when the temporary token is determined to be the effective token, receiving determination information sent by the first system server in response to the login request; and when the temporary token is determined to be an invalid token, receiving negative information sent by the first system server in response to the login request.
And when the obtained temporary token is correct, determining the current corresponding feedback information by determining the validity of the temporary token, wherein the obtained feedback information is determined to be the determination information only when the temporary token is the valid token, that is, the login-free operation can be performed on the second system, otherwise, the login-free operation cannot be performed on the second system, but the user is required to perform active login.
In some embodiments, referring to fig. 3, fig. 3 is a schematic flowchart illustrating a step of obtaining login information in an embodiment of the present application.
Specifically, when the feedback information is determination information, sending the feedback information to the second system, so that the second system logs in, the method includes:
step S301, receiving user information sent by the first system server when the feedback information is identified as the determination information;
step S302, obtaining login information corresponding to the user information and the second system in a corresponding user information base according to the user information;
step S303, sending the login information to the second system server, so that the second system logs in according to the login information.
And when the feedback information is identified and confirmed to be the determined information, receiving the user information sent by the first system server, then obtaining login information corresponding to the user information and the second system from a corresponding user information base according to the obtained user information, and further sending the obtained login information to the second system server so that the second system can complete automatic login according to the login information.
The user information is a unique identifier of the user, such as user identification card information, passport information, or other unique information, and may also be a telephone number subjected to real-name authentication.
In practical application, when a user logs in corresponding login information in different systems, the login information may be different, for example, some systems log in by using a mailbox, so that corresponding login information related to the user information is recorded and stored in a memory of a control system of an application program in advance, and for different login information related to corresponding systems, when a certain system needs to be automatically logged in, the corresponding user information is inquired in the memory to obtain correct login information capable of logging in the system.
In the cross-system login-free method for the same application program, in the same application program, when a second system is needed, the identity information of a user logging in the first system is acquired, the identity information is sent to the second system server by using the corresponding data transmission interface, the second system server obtains a corresponding login request according to the identity information, the login request is sent to the first system server for corresponding login verification, and then when the first system server feeds back prompt information of successful verification, automatic login of the second system is completed according to the related login information provided by the first system.
In the actual use process, when data interaction between the first system and the second system is performed, because different systems have respective corresponding back-end servers, the first system includes the first system front-end and the second system server, and the second system also includes the second system front-end and the second system server. However, when data interaction is performed, only the respective front ends of two different systems can perform data interaction, and the respective servers can perform data transmission, but for the respective systems, the front ends can perform certain data transmission with the servers.
Therefore, referring to fig. 4, fig. 4 is a schematic diagram of a data interaction framework of a cross-system login method according to an embodiment of the present application.
Specifically, when a user logs in across systems, the method comprises the following steps:
1. the user clicks an entrance of the front end of the second system at the front end of the first system, and then the user is ready to jump to a page of the front end of the second system;
2. the method comprises the steps that a first system front end obtains a current user temporary token from a first system server, and obtains a user identifier and a current device number (device identifier) of a current user;
3. the first system front end transmits the acquired data to the second system front end;
4. the second system front end transmits the acquired user temporary token, the user identification and the equipment number to a second system server through an interface request;
5. after the second system server obtains the corresponding parameters, the second system server requests the first system server through the interface, and the request at this time is a login request;
6. after receiving the parameters of the second system server, the first system server performs security verification on the temporary token (from the security perspective, the effective time of the temporary token is 2 minutes), the equipment number and the user identifier, and judges whether the user is triggered from the front end of the first system, so that the user is ensured to be a real user, and the risk of being swiped is avoided;
7. After the safety of the first system server is verified, the first system server informs the second system server that the user is a normal user without logging, and the user does not need to actively log in, and simultaneously returns the mobile phone number (login information) corresponding to the user to the second system server, so that the second system finishes automatic login.
By the mode, when the two systems cooperate, the information of the client sides of the two systems is intercommunicated and collected, login verification is carried out through the server sides of the two systems, the information is returned to the front end to inform the user that a login-free process is completed, and the user can operate between the two systems without perception without carrying out cross-system login operation. Therefore, the interaction capacity of the system is improved, the user experience is greatly improved, and the user can use the functions of the two systems across the system without obstacles.
Referring to fig. 5, fig. 5 is a schematic block diagram of a cross-system login-free device based on the same application program according to an embodiment of the present application, which is used for executing the cross-system login-free method based on the same application program.
As shown in fig. 5, the cross-system log-on-free device 500 based on the same application includes:
an information obtaining module 501, configured to obtain, at a first system server, temporary identity information of a user when receiving an access instruction to a second system;
A first sending module 502, configured to send the temporary identity information to the second system front end, so that the second system front end sends the temporary identity information to a second system server through a corresponding information transmission interface;
a second sending module 503, configured to send a login request, sent by the second system server based on the temporary identity information, to the first system server;
an information receiving module 504, configured to receive feedback information sent by the first system server in response to the login request;
a system login module 505, configured to send the feedback information to the second system server to log in on the second system when the feedback information is identified as the determination information;
and the instruction response module 506 is configured to jump to a page included in the access instruction when a successful login on the second system is detected.
Further, in an embodiment, the information obtaining module 501 is further specifically configured to:
and accessing a first system server based on the first system front end to set the effective time of the identity information according to a preset rule so as to obtain the temporary identity information of the user.
Further, in an embodiment, the cross-system login-free device 500 further includes a determination module 507, where the determination module 507 is specifically configured to:
obtaining a temporary token contained in the login request; judging whether the temporary token is an effective token according to the data information contained in the temporary token; and obtaining corresponding feedback information according to the judgment result obtained by the judgment.
Further, in an embodiment, the judgment determining module 507 is further specifically configured to:
acquiring identification information corresponding to the temporary token, wherein the identification information comprises an equipment identification and a user identification; determining the correctness of the temporary token according to the identification information; and when the temporary token is determined to be correct, determining whether the temporary token is in an effective time period corresponding to the effective time information, so as to determine whether the temporary token is an effective token.
Further, in an embodiment, the judgment determining module 507 is further specifically configured to:
when the temporary token is determined to be in the effective time period corresponding to the effective time information, determining the temporary token to be an effective token; and when the temporary token is determined not to be in the valid time period corresponding to the valid time information, determining the temporary token to be an invalid token.
Further, in an embodiment, the information receiving module 504 is further specifically configured to:
when the temporary token is determined to be the effective token, receiving determination information sent by the first system server in response to the login request; and when the temporary token is determined to be an invalid token, receiving negative information sent by the first system server in response to the login request.
Further, in an embodiment, the system login module 505 is further specifically configured to:
when the feedback information is identified as the determination information, receiving user information sent by the first system server; acquiring login information corresponding to the user information and the second system from a corresponding user information base according to the user information; and sending the login information to the second system server so that the second system logs in according to the login information.
It should be noted that, as will be clear to those skilled in the art, for convenience and brevity of description, the specific working processes of the apparatus and the modules described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The apparatus described above may be implemented in the form of a computer program which is executable on a computer device as shown in fig. 6.
Referring to fig. 6, fig. 6 is a block diagram illustrating a computer device according to an embodiment. The computer device may be a server.
Referring to fig. 6, the computer device includes a processor, a memory, and a network interface connected through a system bus, wherein the memory may include a nonvolatile storage medium and an internal memory.
The non-volatile storage medium may store an operating system and a computer program. The computer program includes program instructions that, when executed, cause a processor to perform any of a variety of cross-system login-free methods based on the same application.
The processor is used for providing calculation and control capability and supporting the operation of the whole computer equipment.
The internal memory provides an environment for the execution of a computer program on a non-volatile storage medium, which when executed by the processor causes the processor to perform any of a variety of cross-system log-on-free methods based on the same application.
The network interface is used for network communication, such as sending assigned tasks and the like. Those skilled in the art will appreciate that the architecture shown in fig. 6 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
It should be understood that the Processor may be a Central Processing Unit (CPU), and the Processor may be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Wherein, in one embodiment, the processor is configured to execute a computer program stored in the memory to implement the steps of:
when an access instruction to a second system is received, acquiring temporary identity information of a user at a first system server; sending the temporary identity information to the second system front end so that the second system front end sends the temporary identity information to a second system server through a corresponding information transmission interface; sending a login request sent by the second system server based on the temporary identity information to the first system server; receiving feedback information sent by the first system server in response to the login request; when the feedback information is identified as the determined information, the feedback information is sent to the second system server so as to log in the second system; and when the login on the second system is detected to be successful, jumping to a page contained in the access instruction.
In one embodiment, when implementing the obtaining of the temporary identity information of the user at the first system server, the processor is further configured to implement:
and accessing a first system server based on the first system front end to set the effective time of the identity information according to a preset rule so as to obtain the temporary identity information of the user.
In an embodiment, before implementing the receiving of the feedback information sent by the first system server in response to the login request, the processor is further configured to implement:
obtaining a temporary token contained in the login request; judging whether the temporary token is an effective token according to the data information contained in the temporary token; and obtaining corresponding feedback information according to the judgment result obtained by the judgment.
In one embodiment, when determining whether the temporary token is a valid token according to the data information included in the temporary token, the processor is further configured to:
acquiring identification information corresponding to the temporary token, wherein the identification information comprises an equipment identification and a user identification; determining the correctness of the temporary token according to the identification information; and when the temporary token is determined to be correct, determining whether the temporary token is in an effective time period corresponding to the effective time information, so as to determine whether the temporary token is an effective token.
In one embodiment, the processor, in implementing the determining whether the temporary token is a valid token, is further configured to implement:
when the temporary token is determined to be in the effective time period corresponding to the effective time information, determining the temporary token to be an effective token; and when the temporary token is determined not to be in the valid time period corresponding to the valid time information, determining the temporary token to be an invalid token.
In an embodiment, when implementing the receiving of the feedback information sent by the first system server in response to the login request, the processor is further configured to implement:
when the temporary token is determined to be the effective token, receiving determination information sent by the first system server in response to the login request; and when the temporary token is determined to be an invalid token, receiving negative information sent by the first system server in response to the login request.
In an embodiment, when the processor is configured to send the feedback information to the second system server to log in on the second system when the feedback information is identified as the determination information, the processor is further configured to:
When the feedback information is identified as the determination information, receiving user information sent by the first system server; acquiring login information corresponding to the user information and the second system from a corresponding user information base according to the user information; and sending the login information to the second system server so that the second system logs in according to the login information.
The embodiment of the application further provides a computer-readable storage medium, wherein a computer program is stored in the computer-readable storage medium, the computer program comprises program instructions, and the processor executes the program instructions to realize the cross-system login-free method based on the same application program, which is provided by the embodiment of the application.
The computer-readable storage medium may be an internal storage unit of the computer device described in the foregoing embodiment, for example, a hard disk or a memory of the computer device. The computer readable storage medium may also be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the computer device.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A cross-system login-free method based on the same application program is characterized by comprising the following steps:
when an access instruction to a second system is received, acquiring temporary identity information of a user at a first system server;
sending the temporary identity information to the second system front end so that the second system front end sends the temporary identity information to a second system server through a corresponding information transmission interface;
sending a login request sent by the second system server based on the temporary identity information to the first system server;
receiving feedback information sent by the first system server in response to the login request;
when the feedback information is identified as the determined information, the feedback information is sent to the second system server so as to log in the second system;
And when the login on the second system is detected to be successful, jumping to a page contained in the access instruction.
2. The cross-system login-free method according to claim 1, wherein the obtaining of the temporary identity information of the user at the first system server comprises:
and accessing a first system server based on the first system front end to set the effective time of the identity information according to a preset rule so as to obtain the temporary identity information of the user.
3. The cross-system login-free method according to claim 1, wherein before receiving the feedback information sent by the first system server in response to the login request, the method comprises:
obtaining a temporary token contained in the login request;
judging whether the temporary token is an effective token according to the data information contained in the temporary token;
and obtaining corresponding feedback information according to the judgment result obtained by the judgment.
4. The cross-system login-free method according to claim 3, wherein the step of judging whether the temporary token is a valid token according to data information contained in the temporary token comprises:
acquiring identification information corresponding to the temporary token, wherein the identification information comprises an equipment identification and a user identification;
Determining the correctness of the temporary token according to the identification information;
and when the temporary token is determined to be correct, determining whether the temporary token is in an effective time period corresponding to the effective time information, so as to determine whether the temporary token is an effective token.
5. The cross-system login-free method according to claim 4, wherein the determining whether the temporary token is a valid token comprises:
when the temporary token is determined to be in the effective time period corresponding to the effective time information, determining the temporary token to be an effective token;
and when the temporary token is determined not to be in the valid time period corresponding to the valid time information, determining the temporary token to be an invalid token.
6. The cross-system login-free method according to claim 5, wherein the receiving feedback information sent by the first system server in response to the login request comprises:
when the temporary token is determined to be the effective token, receiving determination information sent by the first system server in response to the login request;
and when the temporary token is determined to be an invalid token, receiving negative information sent by the first system server in response to the login request.
7. The cross-system login-free method according to any one of claims 1 to 6, wherein when the feedback information is identified as the determination information, the sending the feedback information to the second system server for login on the second system comprises:
when the feedback information is identified as the determination information, receiving user information sent by the first system server;
acquiring login information corresponding to the user information and the second system from a corresponding user information base according to the user information;
and sending the login information to the second system server so that the second system logs in according to the login information.
8. A cross-system login-free device based on the same application program is characterized in that the device comprises:
the information acquisition module is used for acquiring the temporary identity information of the user at the first system server when receiving an access instruction to the second system;
the first sending module is used for sending the temporary identity information to the second system front end so that the second system front end sends the temporary identity information to a second system server through a corresponding information transmission interface;
The second sending module is used for sending the login request sent by the second system server based on the temporary identity information to the first system server;
the information receiving module is used for receiving feedback information sent by the first system server end in response to the login request;
the system login module is used for sending the feedback information to the second system server to log in the second system when the feedback information is identified as the determination information;
and the instruction response module is used for jumping to a page contained in the access instruction when the login success on the second system is detected.
9. A computer device comprising a memory and a processor, the memory having stored therein computer-readable instructions that, when executed by the processor, cause the processor to perform the steps of the same application-based cross-system login-free method of any of claims 1-7.
10. A computer readable storage medium storing a computer program, wherein the computer readable instructions, when executed by the processors, cause one or more processors to perform the steps of the same application based cross-system log-on-free method of any of claims 1 to 7.
CN202010575441.XA 2020-06-22 2020-06-22 Cross-system login-free method, device, equipment and readable storage medium Pending CN111859320A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010575441.XA CN111859320A (en) 2020-06-22 2020-06-22 Cross-system login-free method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010575441.XA CN111859320A (en) 2020-06-22 2020-06-22 Cross-system login-free method, device, equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN111859320A true CN111859320A (en) 2020-10-30

Family

ID=72988023

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010575441.XA Pending CN111859320A (en) 2020-06-22 2020-06-22 Cross-system login-free method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN111859320A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112615876A (en) * 2020-12-24 2021-04-06 上海八彦图信息科技有限公司 Method and device for live broadcasting in conference
CN113568762A (en) * 2021-07-19 2021-10-29 远光软件股份有限公司 Cross-system access method, equipment and computer readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112615876A (en) * 2020-12-24 2021-04-06 上海八彦图信息科技有限公司 Method and device for live broadcasting in conference
CN113568762A (en) * 2021-07-19 2021-10-29 远光软件股份有限公司 Cross-system access method, equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
DE102005040073B4 (en) Computer Security System
CN100583114C (en) System and method for remote security enablement
CN103139182B (en) A kind of method that user of permission accesses, client, server and system
CN107528858B (en) Login method, device and equipment based on webpage and storage medium
CN111176794B (en) Container management method, device and readable storage medium
CN102301378A (en) Thin client-server system, thin client terminal, data management method, and computer readable recording medium
CN109005159B (en) Data processing method for terminal access system server and authentication server
CN111355723B (en) Single sign-on method, device, equipment and readable storage medium
CN105516133A (en) User identity verification method, server and client
CN110784450A (en) Single sign-on method and device based on browser
CN107820702B (en) Management and control method, device and electronic equipment
CN105162775A (en) Logging method and device of virtual machine
CN108960839B (en) Payment method and device
CN106953738A (en) Risk control method and device
CN105763565B (en) Account logon method, device and game system
CN104184709A (en) Verification method, device, server, service data center and system
CN111859320A (en) Cross-system login-free method, device, equipment and readable storage medium
CA2960162A1 (en) Verification method and apparatus
CN105162774A (en) Virtual machine login method and device used for terminal
CN110990798B (en) Application program permission configuration method and device, electronic equipment and storage medium
CN103975567A (en) Dual-factor authentication method and virtual machine device
CN112448956A (en) Authority processing method and device of short message verification code and computer equipment
CN112187465A (en) Non-inductive login method and device, computer equipment and storage medium
CN109829321B (en) Method, device, equipment and storage medium for authenticating identity
CN104252676A (en) System and method for using real-time communication and digital certificate to authenticate Internet bank account identity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination