CN101296196B - Authentication method and authentication device - Google Patents

Authentication method and authentication device Download PDF

Info

Publication number
CN101296196B
CN101296196B CN 200810124820 CN200810124820A CN101296196B CN 101296196 B CN101296196 B CN 101296196B CN 200810124820 CN200810124820 CN 200810124820 CN 200810124820 A CN200810124820 A CN 200810124820A CN 101296196 B CN101296196 B CN 101296196B
Authority
CN
China
Prior art keywords
authenticating unit
authentication
auc
authenticating
subelement
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN 200810124820
Other languages
Chinese (zh)
Other versions
CN101296196A (en
Inventor
于长青
李训耕
刘晓聪
李斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN 200810124820 priority Critical patent/CN101296196B/en
Publication of CN101296196A publication Critical patent/CN101296196A/en
Application granted granted Critical
Publication of CN101296196B publication Critical patent/CN101296196B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses an authentication method and an authentication device, wherein, the authentication method comprises the steps that an authentication center receives an authentication request from an application module, and the authentication request is routed to a corresponding authentication unit; the authentication unit carries out authentication operation indicated in the authentication request. By utilizing the authentication method and the authentication device of the invention, the flexibility and the extendibility of the authentication operation can be realized, thus greatly improving the developing efficiency.

Description

A kind of method for authenticating and authentication device
Technical field
The present invention relates to the instant messaging field, particularly a kind of method for authenticating and authentication device.
Background technology
The network instant communication instrument develops into today, is accepted by most netizen, and has become the requisite Software tool of user, not only in amusement and recreation at ordinary times, and in user's work, is used widely.Simultaneously the user is to the ease for use of IM (instant messaging) software, stability, and aspects such as fail safe have proposed higher requirement.
Utilize IM software, the user can realize and various contact person between session link up, these sessions are linked up based on certain relationship chain or scene, and to require be that secure and trusted is appointed.Therefore needing can be according to the security needs of reality etc.; The session that under different scene, produces for the user is provided with different authorities or ability; As be the authority that the session under some scene distributes voice and video; And be the authority that the session under some scene distributes plain text to chat, thereby satisfy the multi-faceted demand of user under different scenes; Equally also needing to provide the different operation authority for different users, thereby is reached for the purpose that the user provides personalized service, as distributing more operation and processing authority for the IM user who becomes VIP.
In order to satisfy above demand, just need carry out effective configuration and management to the authentication mechanism of IM software.
In the prior art, the operational processes of authentication is accomplished by each application module, so just causes the plurality of applications module all can have the identical authentication logic of a cover, has caused the waste of program resource.As at present in IM software; Control panel module and good friend's list block all need judges whether to have the authority of audio frequency and video chat; Promptly all need carry out authentication, so just need in control panel module and good friend's list block, all add the authentication logic of audio frequency and video user's audio frequency and video authority.
When needs increase a new authentication authority, also possibly in a plurality of application modules, all add the corresponding authentication logic, cause the maintainability of code poor.
As when having increased a new recreation; Possibly in control panel, judge and show whether local IM user has registered this recreation; Possibly also need in buddy list, judge simultaneously and show whether the good friend contact person has registered this recreation; Though the object of authentication is different in this case, all need in control panel and buddy list, add authentication and whether register the logic of this recreation.
Summary of the invention
The embodiment of the invention provides a kind of method for authenticating and authentication device, to improve the flexibility and the extensibility of authentication operations.
The method for authenticating that the embodiment of the invention provides comprises:
AUC stores the mapping relations of authenticating unit interface and permission ID, and said authenticating unit has at least one identification number, is used for identifying respectively the accessible permission ID of said authenticating unit, and each authenticating unit is responsible for carrying out at least one authentication operations;
AUC receives the authentication request from application module;
Said AUC is according to the permission ID that comprises in the authentication request, with and go up the authenticating unit interface of storage and the mapping relations of permission ID, search the authenticating unit corresponding with said authentication request; Said authentication request is routed to said authenticating unit;
Said authenticating unit is carried out the authentication operations of indicating in the said authentication request.
The authentication device that the embodiment of the invention provides comprises: AUC and at least one authenticating unit, wherein,
Said AUC is used to receive the authentication request from external application module, and authentication request is routed to corresponding authenticating unit;
Said authenticating unit is used for carrying out the authentication operations that said authentication request is indicated;
Wherein, said AUC comprises:
First subelement is used to receive the authentication request from external application module, and said authentication request is sent to second subelement;
Said second subelement is used to receive the authentication request from said first subelement, and inquires about the authenticating unit interface stored in the 3rd subelement and the mapping relations table of permission ID, obtains the authenticating unit corresponding with authentication request; And this authentication request is routed to said authenticating unit through the 4th subelement;
Said the 3rd subelement is used to store it and is articulated in authenticating unit interface and the mapping relations table of permission ID in the said AUC;
Said the 4th subelement is used for said authentication request is forwarded to the authenticating unit that said second subelement inquires;
Wherein, said authenticating unit has at least one identification number, is used for identifying respectively the accessible permission ID of said authenticating unit, and each authenticating unit is responsible for carrying out at least one authentication operations.
Method for authenticating and authentication device that the utilization embodiment of the invention provides; All detach the authentication operations that was distributed to originally in each application module in the authenticating unit; Each authenticating unit is responsible for carrying out at least one authentication operations, to accomplish the authentication at least one authority, ability or identity.AUC is responsible for the management to each authenticating unit, and authentication request is routed to different authenticating unit.When the authentication management that need to increase new authority, ability or identity, only needing increases the corresponding authentication unit, when certain authentication operations no longer needs, only needs the corresponding authenticating unit of deletion to get final product like this.Such authentication operations has great flexibility and extensibility, has improved development efficiency.
Description of drawings
Fig. 1 is the method for authenticating flow chart in the first embodiment of the invention.
Fig. 2 is the method for authenticating flow chart in the second embodiment of the invention.
Fig. 3 is the sketch map of the authentication device in the third embodiment of the invention.
Embodiment
For making the object of the invention, technical scheme and advantage clearer, the present invention is made further detailed description below in conjunction with accompanying drawing.
In embodiments of the present invention; Original authentication operations that is dispersed in each module is detached in the authenticating unit from each module respectively; Be that each authenticating unit is accomplished the judgement at least one authority, ability or identity through at least one cover decision logic, to realize at least one authentication operations.
AUC is responsible for the management to each authenticating unit, and promptly AUC does not carry out concrete authentication operations.AUC according to the type of authentication request, is routed to corresponding authenticating unit with authentication request after receiving the authentication request of a certain application module, and after authenticating unit is accomplished the corresponding authentication operation, authenticating result is returned to application module.
When the authentication management that need to increase new authority, ability or identity, only needing increases the corresponding authentication unit, can effectively realize the flexibility and the extensibility of authentication operations by the way, has improved development efficiency greatly like this.
Fig. 1 is the method for authenticating flow chart in the first embodiment of the invention.As shown in Figure 1, this method for authenticating specifically may further comprise the steps:
Step 101: AUC receives the authentication request from external application module.
Each authenticating unit all has a unique GUID in the whole world, as the corresponding permission ID of this authenticating unit.This GUID can be that authenticating unit generates automatically, can be its distribution by AUC also, also can obtain through other modes.Registration has each the authenticating unit interface that articulates with it and the mapping relations table of permission ID in the AUC.
When external application module needs certain authority of authentication, ability or identity, can send authentication request to AUC, wherein comprise corresponding permission ID in the authentication request at least, need inform promptly this authentication request of AUC is to which kind of authority.Also need comprise in the authentication request can be by the necessary parameter of concrete authentication of corresponding authenticating unit identification, like the contact person's of correspondence IM account number.
Here external application module can be the interface that need get access to AUC to the process that AUC sends authentication request, calls the interface function of search access right ability, wherein with the permission ID of the correspondence parameter as interface function.
Step 102: the authenticating unit interface of preservation on it and the mapping relations table of permission ID are inquired about according to the permission ID in the authentication request by AUC, and this authentication request is routed in the authenticating unit corresponding with this permission ID.
Step 103: authenticating unit is accomplished authentication, and authenticating result is returned to AUC according to the concrete necessary parameter of authentication in the authentication request.
Step 104: AUC returns to external application module with the authenticating result that receives.
Wherein, in reality realized, corresponding authority ability can be inquired about through calling unified authenticating unit interface function by AUC, thereby completing steps 102 is to step 104.
After external application module receives the authenticating result that AUC returns; Can show or carry out the adjustment of operational capacity accordingly according to this authenticating result, as according to the corresponding authentication result; The session window administration module can be on session window the authority that has of reality; And the authority that does not have is set to not show, though perhaps show the authority do not have, it is unavailable or the like that corresponding action button is set to.
In practical application; According to the needs of business, possibly need to increase authentication operations to a kind of identity, authority or ability, can generate the authenticating unit of a correspondence this moment; To realize logic determines, then this authenticating unit is articulated to AUC to this newly-increased authentication operations.
Fig. 2 is the method for authenticating flow chart in the second embodiment of the invention.As shown in Figure 2, this method for authenticating specifically may further comprise the steps:
Step 201: the authenticating unit initialization, accomplish articulating of authenticating unit and AUC.
Load its pairing authority during the authenticating unit initialization, and accomplish and the articulating of AUC from registration through carrying out to AUC.
Authenticating unit can through with AUC accomplish articulating of authenticating unit from the registration interface function, the mapping relations table of registering authenticating unit interface and permission ID like this in the AUC will increase the mapping relations of this authenticating unit interface and its permission ID.
Here it should be noted that; Be not after each user logins IM software; The capital is carried out the initialization of authenticating unit and is articulated action automatically, as long as on the client terminal at this IM software place, accomplished the action that articulates of authenticating unit before, and the follow-up cancellation operation of also not carrying out authenticating unit; So just can skip this step, directly execution in step 202.
Step 202: AUC receives the authentication request from external application module.
When external application module needs certain authority of authentication, ability or identity, can send authentication request to AUC, wherein comprise corresponding permission ID in the authentication request at least, need inform promptly this authentication request of AUC is to which kind of authority.Also need comprise in the authentication request can be by the necessary parameter of concrete authentication of corresponding authenticating unit identification, like the contact person's of correspondence IM account number.
Here external application module can be the interface that need get access to AUC to the process that AUC sends authentication request, calls the interface function of search access right ability, wherein with the permission ID of the correspondence parameter as interface function.
Step 203: the authenticating unit interface of preservation on it and the mapping relations table of permission ID are inquired about according to the permission ID in the authentication request by AUC, and this authentication request is routed in the authenticating unit corresponding with this permission ID.
Step 204: authenticating unit is accomplished authentication, and authenticating result is returned to AUC according to the concrete necessary parameter of authentication in the authentication request.
Step 205: AUC returns to external application module with the authenticating result that receives.
Wherein, in reality realized, corresponding authority ability can be inquired about through calling unified authenticating unit interface function by AUC, thereby completing steps 203 is to step 205.
External application module can show or carry out the adjustment of operational capacity according to this authenticating result after receiving the authenticating result that AUC returns accordingly.Obviously, this step is an optional step.
In practical application, according to business demand or under different pattern scenes, also possibly need certain authenticating unit of deletion, just need nullify this authenticating unit this moment from AUC.
The process of nullifying can be that authenticating unit is sent de-registration request to AUC, wherein comprises corresponding permission ID in the de-registration request at least, and which kind of authentication request what inform promptly that AUC need delete is.Corresponding permission ID mapping table is deleted according to this de-registration request by AUC from the mapping relations table of setting up.
Authenticating unit can be the cancellation interface function that authenticating unit is called AUC to the process that AUC sends de-registration request, and the permission ID that wherein will nullify is as the parameter of interface function.
In the method for authenticating of the embodiment of the invention, each authenticating unit has unique GUID, as permission ID in addition; In reality, some authenticating unit possibly can be handled plural authority simultaneously, like read right and write permission; This moment can be with this plural authentication as an authority so; For it distributes a GUID, as permission ID, as distributing a permission ID respectively for read right and write permission.Also can be to distribute plural GUID for this authenticating unit, each GUID be as a permission ID, and in the mapping relations table of in AUC, setting up like this, an authenticating unit interface can corresponding two permission ID.
In the method for authenticating of the embodiment of the invention, AUC is started according to relevant startup configuration file by the assembly management module in the IM software, and this moment, the user was in logging status.Here the user logins the process of IM client and can be: the user imports number of the account and password in the login panel of IM client; Through sending the protocol command of checking number of the account and password validity with the protocol channel of IM server; IM server authentication account number and password effectively after, the user both can successfully login the IM client.
Fig. 3 is the sketch map of the authentication device in the third embodiment of the invention.Shown in Figure 3, this authentication device comprises AUC 300 and at least one authenticating unit 400.
AUC 300 is used to receive the authentication request from external application module, and authentication request is routed in the corresponding authenticating unit 400, and receives the authenticating result from authenticating unit 400, and authenticating result is returned to external application module.Authenticating unit 400 is used for carrying out at least one authentication operations, and returns authenticating result through AUC 300.
Wherein, AUC 300 comprises the first transmitting-receiving subelement 301, route subelement 302, storing sub-units 303, the second transmitting-receiving subelement 304.Authenticating unit 400 comprises the 3rd transmitting-receiving subelement 401 and authentication execution subelement 402.
Wherein, The first transmitting-receiving subelement 301; Be used for the information interaction between AUC 300 and the external application module, be specially the reception authentication request, and authentication request is sent to route subelement 302; And from the second transmitting-receiving subelement 304, receive authenticating result, it is returned to external application module.
Route subelement 302 is used to receive the authentication request from the first transmitting-receiving subelement 301, and the authenticating unit interface of storage in the inquiry storing sub-units 303 and the mapping relations table of permission ID, obtains the authenticating unit corresponding with authentication request 400; And with this authentication request through second the transmitting-receiving subelement 304 be routed to authenticating unit 400.
Storing sub-units 303 is used to store it and is articulated in authenticating unit interface and the mapping relations table of permission ID in this AUC 300.
The second transmitting-receiving subelement 304; Be used for the information interaction between AUC 300 and the authenticating unit 400; Be specially authentication request is forwarded in the authenticating unit 400 that route subelement 302 inquired; And receive authenticating result from authenticating unit 400, send it to the first transmitting-receiving subelement 301.
The 3rd transmitting-receiving subelement 401 is used to realize the information interaction between AUC 300 and the authenticating unit 400, is specially the authentication request that reception comes through AUC's 300 routes, and it is transmitted to authentication execution subelement 402; And receive the authenticating result of carrying out subelement 402 from authentication, it is returned to AUC 300.
Authentication is carried out subelement 402, is used for carrying out the authentication operations to an authority, ability or identity according to certain decision logic, and authenticating result is returned to the 3rd transmitting-receiving subelement 401.
The method for authenticating and the authentication device that utilize the embodiment of the invention to provide all are drawn into the authentication operations of each module in the system in the authentication device, need not to carry out concrete authentication operations between each module again, have improved the utilance of program resource like this.When needing to introduce a kind of new authentication mechanism, during to certain authority, ability or authenticating identity management, only need the corresponding authenticating unit that increases in addition, be articulated in the AUC, AUC carries out unified management with regard to it to it like this.Can effectively realize the flexibility and the extensibility of authentication operations in this way.
The description of the above embodiment of the present invention is all based on the authentication operations in the IM software; This obviously identical functions is abstracted into an independent functional module; And can also be generalized in other operations of other softwares through the method that an administrative center manages these functions; And do not limit and authentication operations and IM software, can be generalized to like this method in the authentication operations of E-mail address.
In addition, the embodiment of the invention also provides a kind of computer software, to realize authentication operations.Wherein comprise computer program code in the computer software, when these program codes run on computer, can carry out the one or more steps among the method for authenticating embodiment of the present invention, and one or more parts and function among the authentication device embodiment.For example, when a certain section computer program code runs in the computer, can realize the function of some authenticating unit or AUC.
Computer software can be stored in the computer-readable medium, like read only memory ROM, random access memory ram or flash memory etc.It is understandable that these program codes can be loaded in the computer via the appropriate data network, and these be loaded into that program code in the computer can be replaced or the update calculation machine on existing program code.
In sum, more than being merely preferred embodiment of the present invention, is not to be used to limit protection scope of the present invention.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a method for authenticating is characterized in that, comprising:
AUC stores the mapping relations of authenticating unit interface and permission ID, and said authenticating unit has at least one identification number, is used for identifying respectively the accessible permission ID of said authenticating unit, and each authenticating unit is responsible for carrying out at least one authentication operations;
AUC receives the authentication request from application module;
Said AUC is according to the permission ID that comprises in the authentication request, with and go up the authenticating unit interface of storage and the mapping relations of permission ID, search the authenticating unit corresponding with said authentication request; Said authentication request is routed to said authenticating unit;
Said authenticating unit is carried out the authentication operations of indicating in the said authentication request.
2. the method for claim 1 is characterized in that, further comprises:
Said authenticating unit returns to said AUC with authenticating result;
Said AUC receives the authenticating result from said authenticating unit, and authenticating result is returned to said application module.
3. the method for claim 1 is characterized in that,
Said authentication request comprises permission ID and the concrete necessary parameter of authentication;
Said authenticating unit is carried out the authentication operations of indicating in the said authentication request according to the necessary parameter of said concrete authentication that comprises in the said authentication request.
4. the method for claim 1 is characterized in that, before said AUC is routed to said authentication request said authenticating unit, further comprises:
Said authenticating unit is articulated in the said AUC.
5. method as claimed in claim 4 is characterized in that, after said authenticating unit was articulated to said AUC, said AUC added the mapping relations of said authenticating unit interface and permission ID in its stored mapping relation table.
6. the method for claim 1 is characterized in that, further comprises:
Said authenticating unit is sent de-registration request to said AUC, and wherein said de-registration request comprises its corresponding permission ID;
The mapping relations of said authenticating unit and permission ID are deleted according to said de-registration request by said AUC from the mapping relations table of setting up.
7. an authentication device is characterized in that, comprising: AUC and at least one authenticating unit, wherein,
Said AUC is used to receive the authentication request from external application module, and said authentication request is routed to corresponding authenticating unit;
Said authenticating unit is used for carrying out the authentication operations that said authentication request is indicated;
Wherein, said AUC comprises:
First subelement is used to receive the authentication request from external application module, and said authentication request is sent to second subelement;
Said second subelement is used to receive the authentication request from said first subelement, and inquires about the authenticating unit interface stored in the 3rd subelement and the mapping relations table of permission ID, obtains the authenticating unit corresponding with authentication request; And this authentication request is routed to said authenticating unit through the 4th subelement;
Said the 3rd subelement is used to store it and is articulated in authenticating unit interface and the mapping relations table of permission ID in the said AUC;
Said the 4th subelement is used for said authentication request is forwarded to the authenticating unit that said second subelement inquires;
Wherein, said authenticating unit has at least one identification number, is used for identifying respectively the accessible permission ID of said authenticating unit, and each authenticating unit is responsible for carrying out at least one authentication operations.
8. device as claimed in claim 7 is characterized in that, said authenticating unit comprises:
The 5th subelement is used to receive the authentication request from said AUC, and it is transmitted to the 6th subelement;
Said the 6th subelement is used for carrying out the authentication operations that said authentication request is indicated according to certain decision logic.
9. device as claimed in claim 8 is characterized in that, said the 6th subelement is further used authenticating result is returned to said the 5th subelement;
Said the 5th subelement is further used for receiving the authenticating result from said the 6th subelement, and it is returned to said AUC.
10. device as claimed in claim 9 is characterized in that, said the 4th subelement is further used for receiving the authenticating result from said authenticating unit, and said authenticating result is sent to said first subelement;
Said first subelement is further used for receiving authenticating result from said second subelement, and it is returned to said external application module.
CN 200810124820 2008-06-13 2008-06-13 Authentication method and authentication device Active CN101296196B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 200810124820 CN101296196B (en) 2008-06-13 2008-06-13 Authentication method and authentication device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 200810124820 CN101296196B (en) 2008-06-13 2008-06-13 Authentication method and authentication device

Publications (2)

Publication Number Publication Date
CN101296196A CN101296196A (en) 2008-10-29
CN101296196B true CN101296196B (en) 2012-12-12

Family

ID=40066213

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 200810124820 Active CN101296196B (en) 2008-06-13 2008-06-13 Authentication method and authentication device

Country Status (1)

Country Link
CN (1) CN101296196B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108876281A (en) * 2018-04-25 2018-11-23 盈东科技(北京)有限公司 A kind of project management system and device
CN109740328B (en) * 2019-01-08 2021-07-02 广州虎牙信息科技有限公司 Authority identification method and device, computer equipment and storage medium
CN111787094B (en) * 2020-06-29 2022-01-28 腾讯科技(深圳)有限公司 Data processing method, device, storage medium and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1567894A (en) * 2003-06-17 2005-01-19 华为技术有限公司 Method of route inquiry under condition of wireless local area network and mobile network intercommunication
CN1913439A (en) * 2006-09-08 2007-02-14 华为技术有限公司 Authentication method and method for transmitting successful authentication information
CN1933650A (en) * 2005-09-12 2007-03-21 北京三星通信技术研究有限公司 CDMA2000 unified authentication platform service access method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1567894A (en) * 2003-06-17 2005-01-19 华为技术有限公司 Method of route inquiry under condition of wireless local area network and mobile network intercommunication
CN1933650A (en) * 2005-09-12 2007-03-21 北京三星通信技术研究有限公司 CDMA2000 unified authentication platform service access method and system
CN1913439A (en) * 2006-09-08 2007-02-14 华为技术有限公司 Authentication method and method for transmitting successful authentication information

Also Published As

Publication number Publication date
CN101296196A (en) 2008-10-29

Similar Documents

Publication Publication Date Title
US10063547B2 (en) Authorization authentication method and apparatus
CN100484125C (en) Answering method to address inquire and appts. thereof
CN1852094B (en) Method and system for protecting account of network business user
JP4833995B2 (en) Mobile online game system and communication method between mobile game terminals
CN101714996B (en) Authentication system and method based on peer-to-peer computing network
KR101113738B1 (en) Internet connecting method for mobile communication terminal
CN100369027C (en) Method and system for facilitating instant messaging transactions between disparate service providers
JP5309496B2 (en) Authentication system and authentication method
CN102368764A (en) Method for carrying out communication through multiple points of presence, system and client thereof
EA012640B1 (en) Arrangement for using erp-system on, preferably, mobile devices
CN110602216A (en) Method and device for using single account by multiple terminals, cloud server and storage medium
TW200928777A (en) Data processing method and apparatus based on cluster
CN104917605A (en) Key negotiation method and device during terminal device switching
CN108022100A (en) A kind of cross-certification system and method based on block chain technology
CN101378329B (en) Distributed business operation support system and method for implementing distributed business
CN108377499A (en) A kind of method for network access, routing device and terminal
CN101296196B (en) Authentication method and authentication device
KR20110103461A (en) Method and system for authentication of network nodes of a peer-to-peer network
CN103108316B (en) Air card-writing authentication method, device and system
CN115150830B (en) Method and system for guaranteeing terminal public network access when 5G private network access authentication fails
CN100440872C (en) Method for realizing message-switching in distributed environment and its device
JP2003318939A (en) Communication system and control method thereof
CN102299871B (en) Communication method and gateway equipment
CN104918221A (en) Terminal peripheral login, logout and standby processing method and system
CN104753774A (en) Distributed enterprise integrated access gateway

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant