CN103684770A - Digital certificate authentication based service system agent access method and device - Google Patents
Digital certificate authentication based service system agent access method and device Download PDFInfo
- Publication number
- CN103684770A CN103684770A CN201210333276.2A CN201210333276A CN103684770A CN 103684770 A CN103684770 A CN 103684770A CN 201210333276 A CN201210333276 A CN 201210333276A CN 103684770 A CN103684770 A CN 103684770A
- Authority
- CN
- China
- Prior art keywords
- user
- operation system
- identification information
- information
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a digital certificate authentication based service system agent access method and device. The method comprises the following steps: performing digital certificate authentication to a user; if the authentication passes, obtaining identification information of the identified user; querying accessible service system information corresponding to the user identification information in a preconfigured database; storing the corresponding relation between the user identification information and the user accessible service system by the database; performing agent distribution to the service of the user accessible service system according to the user identification; displaying the accessible service system information corresponding to the user identification information in an agent manner; receiving an access request of any service system triggered by the user according to the agent service system information, and implementing the agency based access to the service system. When accessing the service system which cannot support the digital certificate authentication technology, the digital certificate authentication based service system agent access method only needs the digital certificate agent authentication and the service system agent access technology to authenticate the user digital certificate authentication by the service system without any modification to the service system, and finally realizes that the user accesses the service system.
Description
Technical field
The present invention relates to field of information security technology, be specifically related to a kind of operation system proxy access method and apparatus based on digital certificate authentication.
Background technology
Information security refers to that the data in hardware, software and the system thereof of information network are protected, and is not subject to the former of accidental or malice thereby suffers to destroy, change, reveals, and system is reliably normally operation continuously, and information service is not interrupted.Digital certificate authentication technology is in computer network, to confirm the process of operator's identity and the solution that produces, is a kind of effective ways of ensuring information security property.And the access of operation system based on digital certificate authentication technology makes user have more fail safe to the access of operation system.
At present, in prior art, digital certificate technique is widely used as high-intensity identity identifying technology.But, because the corresponding Interface realization function of api interface not providing with digital certificate system operation system itself, so, when needs adopt digital certificate technique to carry out authentication to visit operation system, often need the api interface providing according to digital certificate system self to transform this operation system.Especially the operation system of the runtime that makes the transition from the construction period is conducted interviews, when temporary needs is enabled digital certificate technique when carrying out authentication, do not possessed corresponding development ability.
Visible, prior art when the operation system access realizing based on digital certificate authentication, to the use of digital certificate technique implement difficulty large, use threshold too high.Even for the operation system that possesses development ability, operation system is carried out to interface transformation and also need the development time of growing, this makes operation system and digital certificate system be difficult to guarantee in conjunction with the access period of realizing the operation system access based on digital certificate authentication promptness long, that business is used, and then has limited to a certain extent digital certificate authentication technology in the application that realizes the operation system access based on digital certificate authentication.
Summary of the invention
For addressing the above problem, the invention provides a kind of operation system proxy access method and apparatus based on digital certificate authentication, so that when not supporting that the operation system of digital certificate authentication technology conducts interviews, without operation system being done to any transformation, by digital certificate authentication and operation system agent skill group, can realize the operation system proxy access based on digital certificate authentication.
In order to realize the object of the invention, the invention provides a kind of operation system proxy access method based on digital certificate authentication, described method comprises:
User is carried out to digital certificate authentication, if by authentication, obtain user's identification information;
In pre-configured database, inquire about described user's addressable operation system corresponding to identification information;
Described database is for preserving the corresponding relation between user's identification information and the operation system of this user-accessible;
Operation system to described user-accessible is acted on behalf of;
The operation system that shows described user-accessible with agent way;
Receive user according to the access request of arbitrary operation system of the operation system triggering of described shown user-accessible, realize the access to this arbitrary operation system.
Preferably, described user is carried out to digital certificate authentication, obtains the identification information of identifying user, be specially,
The customer digital certificate of Dui Bei certificate verification mechanism signature is verified, obtains user's identification information.
The addressable operation system corresponding to identification information of preferably, inquiring about described user comprises:
User's identification information is encrypted and is sent to pre-configured database;
In described pre-configured database, the addressable operation system that the identification information of inquiring user is corresponding.
Preferably, the described identification information by user is encrypted and is sent to the database setting in advance, and is specially:
By SSL SSL or Transport Layer Security TLS, encrypt user's identification information is encrypted and is sent to the database setting in advance.
Preferably, described in pre-configured database, the addressable operation system corresponding to identification information of inquiring about described user also comprises before:
The operation system of user's identification information and this user-accessible is saved in database.
Preferably, described take operation system that agent way shows described user-accessible as:
With agent way by the operation system of user-accessible described in user-defined interface display.
A kind of operation system proxy access device based on digital certificate authentication is also provided, and described device comprises:
Authentication module, for user is carried out to digital certificate authentication, if pass through, enters sign and obtains module;
Sign obtains module, for obtaining the identification information of identifying user;
First information enquiry module, for the database pre-configured, inquires about described user's addressable operation system corresponding to identification information;
Described database is for preserving the corresponding relation between user's identification information and the operation system of this user-accessible;
Proxy module, acts on behalf of for the operation system to described user-accessible;
Information display module, for showing the operation system of described user-accessible with agent way;
Operational Visit module, for receiving user according to the access request of arbitrary operation system of the operation system triggering of described shown user-accessible, realizes the access to arbitrary operation system.
Preferably, described first information enquiry module comprises:
Database configuration module, for being saved to database by user's identification information and its addressable operation system;
The second information inquiry module, at described database, inquires about described user's addressable operation system corresponding to identification information.
Preferably, described the second information inquiry module comprises:
Information encryption module, for encrypting user's identification information to be sent to pre-configured database;
The 3rd information inquiry module, at described pre-configured database, the addressable operation system that the identification information of inquiring user is corresponding.
Preferably, described information display module comprises:
Interface custom block, for user-defined interface;
Information display sub-module, for showing the operation system of described user-accessible by the interface display of described interface custom block definition with agent way.
Compared with prior art, beneficial effect of the present invention is as follows:
In the present invention, computer system is carried out digital certificate authentication to user, can guarantee the fail safe of user to business application system access, if the digital certificate authentication that this user carries out it by computer system, be that this user is secured user, computer system obtains and to be used for the user totem information of unique identification to user.Simultaneously, the pre-configured database of computer system, for preserving the corresponding relation between user totem information and its addressable operation system resource, according to user totem information, in this pre-configured database, inquire about the operation system information of this corresponding user-accessible, and the operation system of user-accessible is acted on behalf of, and then to user, showing its addressable operation system information with agent way, user, by triggering arbitrary operation system, realizes this operation system proxy access.The embodiment of the present invention is not carried out any transformation to operation system, and for operation system, do not need the special digital certificate authentication system application of supporting yet, but user is by the mode of access service System Agent, indirectly realized the operation system access based on Digital Certificate Security authentication.By this innovative technology, make user when not supporting that the business application system of digital certificate authentication technology conducts interviews, without any transformation, can realize user to the operation system proxy access based on digital certificate authentication, finally reach the object of access service system, make all kinds of operation systems enjoy all kinds of security services that digital certificate authentication system provides, and greatly improved the promotion efficiency of using digital certificate authentication technology access operation system.
Further, during addressable operation system information corresponding to inquiring user identification information, user totem information is sent to pre-configured database, can adopt the form of encryption, can guarantee safety issue can not occur in transmission information process, further guarantee the secure access of user to operation system.
Further, the operation system of acting on behalf of by the user-defined interface display addressable agent apparatus corresponding with user totem information is served, make it can only be shown to the addressable resource of trusted user, the investment that this has reduced gateway, has improved fail safe and visuality.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present application or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, the accompanying drawing the following describes is only some embodiment that record in the application, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the flow chart of the operation system proxy access method of the embodiment of the present invention one based on digital certificate authentication;
Fig. 2 is the flow chart of the operation system proxy access method of the embodiment of the present invention two based on digital certificate authentication;
Fig. 3 is the structure chart of the operation system proxy access device of the embodiment of the present invention three based on digital certificate authentication;
Fig. 4 is the first information enquiry module structure chart of the operation system proxy access device of the embodiment of the present invention three based on digital certificate authentication;
Fig. 5 is the second information inquiry modular structure figure of the operation system proxy access device of the embodiment of the present invention three based on digital certificate authentication;
Fig. 6 is the information display module structure chart of the operation system proxy access device of the embodiment of the present invention three based on digital certificate authentication.
Embodiment
In order to address the above problem, the embodiment of the present invention provides a kind of operation system proxy access method based on digital certificate authentication, below in conjunction with accompanying drawing, is elaborated.
Embodiment mono-,
With reference to figure 1, Fig. 1 is the operation system proxy access method flow diagram based on digital certificate authentication of the embodiment of the present invention one, and the present embodiment specifically can comprise:
In the present embodiment, user is by operation system agent apparatus, access realizes the access to operation system, before user's access service System Agent device, implement computer system of the present invention and need to carry out the authentication based on digital certificate technique to current accessed user, thereby judge whether active user is secured user, if this user is secured user, this user has passed through the authentication of computer system, computer system obtains this user's identification information, be used for this user of unique identification, so that in subsequent step, the use of computer system to this user's sign.
If user do not verify by the digital certificate of computer system, this user is non-security user, and computer system can not obtain the identification information for this user of unique identification, and then can not carry out operation below.
Each user is after having obtained the digital certificate that certificate verification mechanism issues, all obtained the user totem information for this user of unique identification, user, by utilizing the identification information of oneself to carry out the authentication by computer system, proves the secured user that this user is computer system.
In the present embodiment; the identification information that computer system obtains is used for identifying this user can be this user's digital certificate key; also can be other forms of identification information; the form of user totem information and the specific implementation that does not affect the embodiment of the present invention; therefore the present invention is not limited yet, and the form of other authentication informations also belongs to the scope of protection of the invention.
Computer system has received after user's identification information, if having passed through the identity security based on digital certificate technique that computer system carries out it, this user verifies, the user who at present operation system is conducted interviews is secured user, computer system, in the database generating in advance, inquires about according to the current user totem information that operation system is conducted interviews the addressable operation system information that this user totem information is corresponding.
In actual applications, can set in advance the secured user who allows each operation system of access, and be saved to the pre-configured database for inquiring about, namely, database has been preserved user totem information, addressable operation system agency and corresponding relation between the two.This database only need generate in advance before this step.
According to user's identification information, inquire after corresponding addressable operation system, by agent apparatus, operation system is acted on behalf of.
Described agent apparatus can be to have received to connect the signal of operation system, and this signal is conveyed to operation system, realizes the agency to operation system simultaneously.
Computer system is according to user's identification information Query Database, and the information of the acquisition addressable operation system corresponding with user totem information, in order to make active user select one or several operation system of access by agent apparatus, agent apparatus need to be shown to this user by the operation system of this user-accessible by agency's mode.
Concrete, computer system can show the operation system information of this user-accessible by the form at user-defined interface to user.Can be according to the actual requirements during User Defined display interface or the physical condition of interface display arrange, as the operation system information that agent apparatus is acted on behalf of is only shown to the user who is trusted, or with mode demonstration of list etc.
The access request of arbitrary operation system that step 106, reception user trigger according to the operation system of described shown user-accessible, realizes the access to this arbitrary operation system.
Computer system shows the operation system information of this user-accessible to the current user who wants access service System Agent device, user can trigger an addressable operation system according to own demand, and simultaneous computer system can realize the access based on agency of this user to the operation system of its triggering.
Concrete, user's access service System Agent device has two kinds of access modes, i.e. page access mode and client-access mode.
When user uses the web browser of standard in page access mode, operation system agent apparatus to be conducted interviews, user does not need to install any plug-in unit and control, directly accesses internal network.
When user conducts interviews to operation system agent apparatus in client-access mode, user initiates the TCP application of java or activeX control mode, does not need to set up three layer tunnel.In the present embodiment, computer system receives user totem information, and user totem information is carried out to safety verification, can guarantee the fail safe of user to business application system access.Simultaneously, set in advance for preserving the corresponding relation database between user totem information and its addressable operation system resource, according to user totem information, in database, inquire about and show the addressable operation system information of correspondence, and addressable operation system is acted on behalf of, by triggering arbitrary operation system, realize the access based on agency to this operation system.The present embodiment makes user when not supporting that the business application system of identity identifying technology conducts interviews, without any transformation, by digital certificate authentication and operation system proxy access technology, can realize user to the operation system access based on digital certificate authentication, make all kinds of operation systems enjoy all kinds of security services that identity authorization system provides, and greatly improved the promotion efficiency of using digital certificate authentication technology access operation system.
Due in the present embodiment, user totem information is transferred into server to carry out in data base querying process, the fail safe of data exists and threatens, so carry out the encrypted transmission of user authentication information by the safety encipher transmission means of embodiment bis-, can guarantee user's data transmission security.
Embodiment bis-,
With reference to figure 2, Fig. 2 is the operation system proxy access method flow diagram based on digital certificate authentication of the embodiment of the present invention two, and the present embodiment specifically can comprise:
Step 201, pre-configured for preserving the database of the corresponding relation between user totem information and its addressable operation system.
Computer system can set in advance the secured user who allows each operation system of access, computer system by secured user's user totem information with and addressable operation system information be saved to the pre-configured database for inquiring about, this database has been preserved user totem information, addressable operation system information and corresponding relation between the two.This database configuration process is that the present embodiment completes part in advance.
Step 202, user is carried out to digital certificate authentication, if by authentication, enter step 203;
Step 203, obtain user's identification information, and enter step 204.
In the present embodiment, user is by operation system agent apparatus, access realizes the access to operation system, before user's access service System Agent device, computer system need to verify whether this user is secured user by digital certificate, if by checking, this user is secured user, computer system is obtained user totem information corresponding to this user, so that in subsequent step, computer system is used this user's identification information.
Each user is after having obtained the digital certificate that certificate verification mechanism issues, all obtained the user totem information for this user of unique identification, user, by utilizing the identification information of oneself to carry out the authentication by computer system, proves the secured user that this user is computer system.
When if computer system is carried out digital certificate authentication to user, do not obtain this user's user totem information, also just illustrate that this user does not obtain the digital certificate that certificate verification mechanism issues in advance, this user does not belong to secured user, and this user is not by the authentication of digital certificate authentication system.
Step 204, by SSL SSL or Transport Layer Security TLS, encrypt user totem information is sent to database.
At user totem information, be transferred into before the database of preserving aforesaid user totem information, addressable operation system information and corresponding relation between the two inquires about, computer system is encrypted user totem information and transmission channel by SSL or TLS, and the user totem information after encrypting is transmitted to so far database, be used for carrying out the inquiry of addressable operation system information in database.
The mode that computer system is encrypted user totem information and transmission channel can be used the ssl protocol of standard, to set up safe lane, guarantees that user totem information is sent in database safely.
Step 205, in pre-configured database, the addressable operation system information that inquiring user identification information is corresponding.
First, computer system is carried out the authentication based on digital certificate to this user, if having passed through the identity security that computer system carries out it, this user verifies, the user who at present operation system is conducted interviews is secured user, and computer system obtains the user totem information for this user of unique identification.Then, computer system is transmitted this user's identification information is sent to for preserving the database of user totem information, addressable operation system information and corresponding relation between the two by safety encipher.Again, computer system is carried out secure decryption to the encrypted identification information that is sent to database.Finally, computer system, in pre-configured database, is inquired about addressable operation system information corresponding to this user according to current decrypted user totem information.
Step 206, by the user-defined interface display addressable operation system corresponding with described user totem information and by its agency.
Computer system is according to the user totem information Query Database for unique identification user, and the information of the acquisition addressable operation system corresponding with user totem information, in order to make active user can select access in its addressable operation system, computer system is shown to this user by the information of the operation system of this user-accessible, according to the difference of user's request, the display interface that can be self-defined be applicable to its demand, as only to open some the operation system resource of trusted user etc.
Due to digital certificate authentication system can not be directly and operation system communicate, so operation system will be acted on behalf of it by agent apparatus, user, by access agent device, finally reaches the object of access service system.
The access request of arbitrary operation system that step 207, reception user trigger according to described addressable operation system information, realizes the access to this arbitrary operation system.
Computer system shows the operation system information of being acted on behalf of of this user-accessible to the current user who wants access agent device, user can trigger its addressable operation system according to own demand, and simultaneous computer system can realize the access of the operation system that this user triggers.
In the present embodiment, except reaching user when not supporting that the business application system of identity identifying technology conducts interviews, without any transformation, only need by digital certificate proxy authentication and operation system proxy access technology, can realize user to outside the effect of the operation system access based on digital certificate authentication, also owing to having adopted safety encipher transmission means to carry out the encrypted transmission of user authentication information, further reduced user totem information be transferred into database carry out query script in the threat that exists of Information Security.
The embodiment of the present invention provides a kind of operation system proxy access device based on digital certificate authentication, below in conjunction with accompanying drawing, is elaborated.
Embodiment tri-,
With reference to figure 3, for the embodiment of the present invention provides a kind of structural representation of the operation system proxy access device based on digital certificate authentication, the present embodiment specifically can comprise:
Sign obtains module 302, for obtaining the identification information of identifying user;
First information enquiry module 303, for the database pre-configured, inquires about described user's addressable operation system corresponding to identification information;
With reference to figure 4, described first information enquiry module 303 comprises:
The second information inquiry module 402, at described database, inquires about described user's addressable operation system corresponding to identification information.
With reference to figure 5, described the second information inquiry module 402 comprises:
The 3rd information inquiry module 502, at described pre-configured database, the addressable operation system that the identification information of inquiring user is corresponding.
Described database is for preserving the corresponding relation between user's identification information and the operation system of this user-accessible;
Examine Fig. 6, described information display module 305 comprises:
In the present embodiment, user is after authenticating by Digital Certificate Security, computer system obtains and to be used for unique identification user's user totem information, simultaneously, pre-configured for preserving the corresponding relation database between user totem information and its addressable operation system resource, according to user authentication information, in database, inquire about and show corresponding addressable operation system information, by triggering arbitrary operation system, realizing the access to operation system.The present embodiment has guaranteed the fail safe of user to business application system access, make user when not supporting that the business application system of identity identifying technology conducts interviews simultaneously, without any transformation, only need to, by the System Agent access technique of digital certificate proxy authentication and business, can realize the access of the operation system of the safety certification based on customer digital certificate.
It should be noted that, in this article, relational terms such as the first and second grades is only used for an entity or operation to separate with another entity or operating space, and not necessarily requires or imply and between these entities or operation, have the relation of any this reality or sequentially.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thereby the process, method, article or the equipment that make to comprise a series of key elements not only comprise those key elements, but also comprise other key elements of clearly not listing, or be also included as the intrinsic key element of this process, method, article or equipment.The in the situation that of more restrictions not, the key element being limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment that comprises described key element and also have other identical element.
The operation system proxy access method and apparatus based on the digital certificate authentication above embodiment of the present invention being provided is described in detail, applied specific case herein principle of the present invention and execution mode are set forth, the explanation of above embodiment is just for helping to understand method of the present invention and core concept thereof; , for one of ordinary skill in the art, according to thought of the present invention, all will change in specific embodiments and applications, in sum, this description should not be construed as limitation of the present invention meanwhile.
Claims (10)
1. the operation system proxy access method based on digital certificate authentication, is characterized in that, described method comprises:
User is carried out to digital certificate authentication, if by authentication, obtain user's identification information;
In pre-configured database, inquire about described user's addressable operation system corresponding to identification information;
Described database is for preserving the corresponding relation between user's identification information and the operation system of this user-accessible;
Operation system to described user-accessible is acted on behalf of;
The operation system that shows described user-accessible with agent way;
Receive user according to the access request of arbitrary operation system of the operation system triggering of described shown user-accessible, realize the access to this arbitrary operation system.
2. method according to claim 1, is characterized in that, described user is carried out to digital certificate authentication, obtains the identification information of identifying user, be specially,
The customer digital certificate of Dui Bei certificate verification mechanism signature is verified, obtains user's identification information.
3. method according to claim 2, is characterized in that, the addressable operation system corresponding to identification information of inquiring about described user comprises:
User's identification information is encrypted and is sent to pre-configured database;
In described pre-configured database, the addressable operation system that the identification information of inquiring user is corresponding.
4. method according to claim 3, is characterized in that, the described identification information by user is encrypted and is sent to the database setting in advance, and is specially:
By SSL SSL or Transport Layer Security TLS, encrypt user's identification information is encrypted and is sent to the database setting in advance.
5. method according to claim 4, is characterized in that, described in pre-configured database, and the addressable operation system corresponding to identification information of inquiring about described user also comprises before:
The operation system of user's identification information and this user-accessible is saved in database.
6. method according to claim 5, is characterized in that, described take operation system that agent way shows described user-accessible as:
With agent way by the operation system of user-accessible described in user-defined interface display.
7. the operation system proxy access device based on digital certificate authentication, is characterized in that, described device comprises:
Authentication module, for user is carried out to digital certificate authentication, if pass through, enters sign and obtains module;
Sign obtains module, for obtaining the identification information of identifying user;
First information enquiry module, for the database pre-configured, inquires about described user's addressable operation system corresponding to identification information;
Described database is for preserving the corresponding relation between user's identification information and the operation system of this user-accessible;
Proxy module, acts on behalf of for the operation system to described user-accessible;
Information display module, for showing the operation system of described user-accessible with agent way;
Operational Visit module, for receiving user according to the access request of arbitrary operation system of the operation system triggering of described shown user-accessible, realizes the access to arbitrary operation system.
8. device according to claim 7, is characterized in that, described first information enquiry module comprises:
Database configuration module, for being saved to database by user's identification information and its addressable operation system;
The second information inquiry module, at described database, inquires about described user's addressable operation system corresponding to identification information.
9. device according to claim 8, is characterized in that, described the second information inquiry module comprises:
Information encryption module, for encrypting user's identification information to be sent to pre-configured database;
The 3rd information inquiry module, at described pre-configured database, the addressable operation system that the identification information of inquiring user is corresponding.
10. device according to claim 9, is characterized in that, described information display module comprises:
Interface custom block, for user-defined interface;
Information display sub-module, for showing the operation system of described user-accessible by the interface display of described interface custom block definition with agent way.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210333276.2A CN103684770A (en) | 2012-09-10 | 2012-09-10 | Digital certificate authentication based service system agent access method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210333276.2A CN103684770A (en) | 2012-09-10 | 2012-09-10 | Digital certificate authentication based service system agent access method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103684770A true CN103684770A (en) | 2014-03-26 |
Family
ID=50321168
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210333276.2A Pending CN103684770A (en) | 2012-09-10 | 2012-09-10 | Digital certificate authentication based service system agent access method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103684770A (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1477552A (en) * | 2003-06-12 | 2004-02-25 | 上海格尔软件股份有限公司 | Physical certificate cross-application intercommunication method in digital certificate identification system |
CN1556449A (en) * | 2004-01-08 | 2004-12-22 | 中国工商银行 | Device and method for proceeding encryption and identification of network bank data |
US20070181736A1 (en) * | 2000-05-01 | 2007-08-09 | Shaikh Mohammed N S | Method and apparatus for remote filing and recordation of documents |
CN101026481A (en) * | 2006-02-21 | 2007-08-29 | 华为技术有限公司 | Integrated user safety management method and device |
CN101064717A (en) * | 2006-04-26 | 2007-10-31 | 北京华科广通信息技术有限公司 | Safety protection system of information system or equipment and its working method |
CN101114367A (en) * | 2006-07-25 | 2008-01-30 | 阿里巴巴公司 | Data processing method and system relates to multi-system |
CN101145908A (en) * | 2006-09-14 | 2008-03-19 | 华为技术有限公司 | System, device and method for guaranteeing service network security |
CN101155030A (en) * | 2006-09-29 | 2008-04-02 | 维豪信息技术有限公司 | Network resource integration access method based on registration and authentication |
CN201270534Y (en) * | 2008-10-17 | 2009-07-08 | 曹学文 | Authentication system based on wireless multi-hop network technique |
CN101686129A (en) * | 2008-09-24 | 2010-03-31 | 北京创原天地科技有限公司 | Novel method for strong safety service and user resource management |
CN102271042A (en) * | 2011-08-25 | 2011-12-07 | 北京神州绿盟信息安全科技股份有限公司 | Certificate authorization method, system, universal serial bus (USB) Key equipment and server |
CN102420800A (en) * | 2010-09-28 | 2012-04-18 | 俞浩波 | Method, system and authentication terminal for accomplishing service by multi-factor identity authentication |
WO2012116543A1 (en) * | 2011-03-02 | 2012-09-07 | 中兴通讯股份有限公司 | Method and system for logging in online bank through mobile phone, and bank server |
-
2012
- 2012-09-10 CN CN201210333276.2A patent/CN103684770A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070181736A1 (en) * | 2000-05-01 | 2007-08-09 | Shaikh Mohammed N S | Method and apparatus for remote filing and recordation of documents |
CN1477552A (en) * | 2003-06-12 | 2004-02-25 | 上海格尔软件股份有限公司 | Physical certificate cross-application intercommunication method in digital certificate identification system |
CN1556449A (en) * | 2004-01-08 | 2004-12-22 | 中国工商银行 | Device and method for proceeding encryption and identification of network bank data |
CN101026481A (en) * | 2006-02-21 | 2007-08-29 | 华为技术有限公司 | Integrated user safety management method and device |
CN101064717A (en) * | 2006-04-26 | 2007-10-31 | 北京华科广通信息技术有限公司 | Safety protection system of information system or equipment and its working method |
CN101114367A (en) * | 2006-07-25 | 2008-01-30 | 阿里巴巴公司 | Data processing method and system relates to multi-system |
CN101145908A (en) * | 2006-09-14 | 2008-03-19 | 华为技术有限公司 | System, device and method for guaranteeing service network security |
CN101155030A (en) * | 2006-09-29 | 2008-04-02 | 维豪信息技术有限公司 | Network resource integration access method based on registration and authentication |
CN101686129A (en) * | 2008-09-24 | 2010-03-31 | 北京创原天地科技有限公司 | Novel method for strong safety service and user resource management |
CN201270534Y (en) * | 2008-10-17 | 2009-07-08 | 曹学文 | Authentication system based on wireless multi-hop network technique |
CN102420800A (en) * | 2010-09-28 | 2012-04-18 | 俞浩波 | Method, system and authentication terminal for accomplishing service by multi-factor identity authentication |
WO2012116543A1 (en) * | 2011-03-02 | 2012-09-07 | 中兴通讯股份有限公司 | Method and system for logging in online bank through mobile phone, and bank server |
CN102271042A (en) * | 2011-08-25 | 2011-12-07 | 北京神州绿盟信息安全科技股份有限公司 | Certificate authorization method, system, universal serial bus (USB) Key equipment and server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3661120B1 (en) | Method and apparatus for security authentication | |
CN102394887B (en) | OAuth protocol-based safety certificate method of open platform and system thereof | |
CN103248479A (en) | Cloud storage safety system, data protection method and data sharing method | |
CN101772024B (en) | User identification method, device and system | |
US10257171B2 (en) | Server public key pinning by URL | |
CN103297437A (en) | Safety server access method for mobile intelligent terminal | |
KR102299865B1 (en) | Method and system related to authentication of users for accessing data networks | |
CN101841525A (en) | Secure access method, system and client | |
CN102420836A (en) | Sign-on method and sign-on management system for service information system | |
CN104767731A (en) | Identity authentication protection method of Restful mobile transaction system | |
CN110381075B (en) | Block chain-based equipment identity authentication method and device | |
CN108809633B (en) | Identity authentication method, device and system | |
CN101588245A (en) | A kind of method of authentication, system and memory device | |
CN111131416A (en) | Business service providing method and device, storage medium and electronic device | |
CN103166977A (en) | Method, terminal, server and system for accessing website | |
CN104683306A (en) | Safe and controllable internet real-name certification mechanism | |
JP2023505471A (en) | Provisioning method and terminal equipment | |
CN106936588A (en) | A kind of trustship method, the apparatus and system of hardware controls lock | |
CN104486087A (en) | Digital signature method based on remote hardware security modules | |
GB2522445A (en) | Secure mobile wireless communications platform | |
CN107257344B (en) | Server access method and system | |
US10764260B2 (en) | Distributed processing of a product on the basis of centrally encrypted stored data | |
JP2013008140A (en) | Single sign-on system, single sign-on method and authentication server cooperation program | |
CN104735020A (en) | Method, device and system for acquiring sensitive data | |
KR102211033B1 (en) | Agency service system for accredited certification procedures |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140326 |