CN103986734A - Authentication management method and authentication management system applicable to high-security service system - Google Patents

Authentication management method and authentication management system applicable to high-security service system Download PDF

Info

Publication number
CN103986734A
CN103986734A CN201410246121.4A CN201410246121A CN103986734A CN 103986734 A CN103986734 A CN 103986734A CN 201410246121 A CN201410246121 A CN 201410246121A CN 103986734 A CN103986734 A CN 103986734A
Authority
CN
China
Prior art keywords
authentication management
user
management system
operation system
function point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410246121.4A
Other languages
Chinese (zh)
Other versions
CN103986734B (en
Inventor
黄小鹏
范绍强
柳晓明
刘政伟
陈锦龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eastcompeace Technology Co Ltd
Original Assignee
Eastcompeace Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eastcompeace Technology Co Ltd filed Critical Eastcompeace Technology Co Ltd
Priority to CN201410246121.4A priority Critical patent/CN103986734B/en
Publication of CN103986734A publication Critical patent/CN103986734A/en
Application granted granted Critical
Publication of CN103986734B publication Critical patent/CN103986734B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention relates to an authentication management method applicable to a high-security service system. The authentication management method applicable to the high-security service system comprises the following steps: defining a communication protocol between communication interfaces of a service system and an authentication management system, and constructing a reading procedure; acquiring terminal information of user equipment accessed to the service system; verifying validity of the terminal information of the user equipment, returning the terminal information of the user equipment to the serve system if the terminal information of the user equipment is valid, otherwise denying access; sending user login information to the authentication management system by the service system; verifying validity of the user login information by the authentication management system, generating one unique session ID (identity), and sending the unique session ID to the service system; applying for a function point in the service system by a user, and sending the function point applied by the user and the unique session ID to the authentication management system by the service system; judging authority of the function point by the authentication management system, and returning a judging result whether the user can use the function point or not to the service system; logging off by the user, and deleting a communication and session ID by the authentication management system.

Description

A kind of authentication management method and system that is applicable to high security operation system
Technical field
The present invention relates to a kind of authentication management method and system, particularly relate to the authentication management method and system being applied in high safety service system.
Background technology
The height fast development that the development of information technology has changed people's life style, particularly Internet technology has thoroughly changed the mankind's the life mode of production.But the thing followed is that the fail safe of the miscellaneous service system service that information technology produces has also been subject to unprecedented challenge.For safer service is provided, each operation system all arranges authentication management system, log-on message to user is screened, but in prior art, this each operation system needs oneself to realize a set of user account management, and the user account between each operation system is all separate, be unfavorable for very much unified management, existing authentication management system is not carried out independently delineation of power to each operating function point, great majority have all just been used the authority that role goes control operation, can not accomplish the required dynamic distribution role-security according to user, the control of authority of each operation system has a set of strategy and the standard of oneself, be unfavorable for unified disposition and management.In addition, due to the independence of each operation system user account, can not accomplish the single-sign-on function between different business systems.In addition, the operation system requiring for high security, existing authentication management system has only been done single Role judgement of unique user to an operation, can not meet the senior authentication requesting of the polygonal look checking in safety, and existing authentication management system not to login system used such as terminal equipments such as computers, do examination and the restriction in safety, make this type of operation system in higher risk of attacks.Therefore, urgently develop a kind of authentication management system of integrating the high safety performance of a plurality of operation systems, make user can safety a plurality of operation systems of single-sign-on, operation system role can dynamic assignment, the information such as strategy are screened in the login of each operation system of high effective integration, for the operation system user of highly effective and safe provides authentication service.
Summary of the invention
Be applicable to the authentication management method of high security operation system: said method comprising the steps of: the communications protocol between definition operation system and authentication management system communication interface, and build the fetch program between operation system and authentication management system interface; The subscriber equipment end message of authentication management system acquisition access service system; The legitimacy of device end information described in authentication management system verification, if legal, is back to operation system by device end information, otherwise does not allow access; The device end information indicating user that operation system is sent according to authentication management system inputs user's logon information, and user login information is sent to authentication management system; The legitimacy of authentication management system verification user login information, and generate a unique session-id, and authentication management system sends to operation system by this unique session-id; User applies for function point in operation system, and operation system sends to authentication management system by function point and the unique session-id of this user's application; Step 7: the judgement of function point authority is carried out in the function point request that authentication management system sends over according to operation system in step 6 and unique session, and will whether have and use function point authority judged result to be back to operation system; User uses operation system to fulfil assignment and exits, and operation system sends unique session-id and exits request to authentication management system; Authentication management system is removed the communication of authentication management system and operation system and deletes conversational communication ID according to the unique session-id sending in step 8.
In step 2, also comprise: adopt the authoring program of authentication management system to carry out fetch equipment end message, this device end information is the unique identification of Authentication devices terminal legality; And high safety service system comprises the operation system that production environment is used, payment management platform.Device end information wherein comprises: IP address, MAC Address; Device end comprises: computer, panel computer, mobile communication equipment, personal entertainment electronic equipment.
Before step 2, also comprise, in authentication management system, register this device end information.
Before step 4, also comprise: user needs first in the checking of authentication management system registry, to become validated user.
In step 4, also comprise: authentication management system verifies user login information, and judge whether user has available operation system, if there is no available operation system, the user that prompting is canceled also exits; Otherwise allow this user access; And this user login information comprises: user name, password, brush subscriber card.
In step 5, also comprise: different operation systems is distinguished by system code, each operation system has a system code and corresponding system example, during user's registering service system, authentication management system end obtains the system code of user institute registering service system, whether the management end in authentication management system has the logon rights of this operation system according to this system code authentication of users, if user does not have logon rights, do not allow user to login, otherwise user's access authentication management system is carried out communication.
In step 6, also comprise: each operation independently is become to a function point, and authentication management system combination in any function point is also given a role function point combination permission, by role's dynamic assignment function point authority to user; In this way, role is managed dynamically; And each operation system has oneself independently a set of role and user role relation, and the logically rights management of each operation system is mutually independently.The function point of each operation system is associated with module, and the module of different business systems can be reused, and the function point of unified management modules.In addition, by each operation system being integrated to unified configuration and the management that realizes authorization policy and standard, and can also single-sign-on between different business systems.
In step 7, also comprise: when authentication management system judges function point authority, if user does not have enough authorities, need second user's weighting to carry out double authentication, the second user need to input username and password and brush subscriber card and be weighted checking judgement, the function point that user just can request for utilization after judgement has enough authorities.
The present invention also provides a kind of authentication management system that is applicable to high security operation system: it comprises: a plurality of communication interfaces, and authentication management system is carried out conversational communication by the plurality of communication interface and operation system; Read module: authentication management system is obtained the subscriber equipment end message of access service system by this read module; End message validity judgement module: authentication management system, by the legitimacy of device end information described in this end message validity judgement module verification, if legal, is back to operation system by device end information, otherwise do not allow access; Authentication of users log-on message legitimacy module: authentication management system is by the legitimacy of authentication of users log-on message legitimacy module verification user login information, and generate a unique session-id, and authentication management system sends to operation system by this unique session-id; Function point authority judge module: the judgement of function point authority is carried out in function point access request and unique session that authentication management systemic-function point authority judge module sends operation system, and will whether there is the function point of use authority judged result and be back to operation system; Exit and removing module: user uses operation system to fulfil assignment and exits, operation system sends unique session-id and exits request to authentication management system; The unique session-id that authentication management system exits and removing module sends according to operation system is removed the communication between authentication management system and operation system and is deleted conversational communication ID; In addition, operation system comprises: generate user login information module: the device end information indicating user that operation system is sent according to authentication management system inputs user's logon information, generate user login information and this user login information is sent to authentication management system; A plurality of function points, user can apply for the access of function point authority in operation system, operation system sends to authentication management system by function point and the unique session-id of this user's application.
With respect to prior art, the present invention has the following advantages:
Authentication management system of the present invention and method thereof can realize the independently many covers of a user account management operation system of authentication management system, in the case, even need to increase account newly, also without again getting back to each operation system, go to increase newly, delete also in like manner; Owing to can offering the communication management module interface of a unified standard of operation system, do integrated, the operations such as user's login, authority judgement are all incorporated in authentication management system of the present invention and are gone, so each operation system only need be in the service logic that focuses on oneself of paying close attention to; Each operation is independently become to a function point, then any number of function point authorities, gives a role by right discriminating system keeper, and by role assignments to user account, to realize role's dynamic management function; Each operation system has oneself independently a set of role and user role relation, and the logically rights management of each operation system is mutually independently; The function point of each operation system is associated with module (this module can be a concrete dynamic base or one group of reusable code collection), and the module of different business systems can be reused, function point that so can unified management modules; Each operation system is integrated, can accomplish unified configuration and management in authorization policy and standard, and can realize the single-sign-on function between different business systems; In addition, adopt username and password, add the login of brush subscriber card verification mode; In addition, checking will be logined the terminal equipment of use, if illegality equipment can accomplish to refuse its login, uses operation system; Use two role assignments to each function point, realize the senior authentication requestings such as double authentication.
figure of description
Fig. 1: the reciprocal process schematic diagram between authentication management system of the present invention and operation system interface structure and interface; Fig. 2: authentication management method flow diagram of the present invention.
embodiment:
Below in conjunction with Figure of description, technical scheme of the present invention is elaborated.High security operation system in the present invention includes but not limited to production environment operation system, the higher operation systems of demand for security such as financial transaction management platform.
With reference to Figure of description 1 and 2, authentication management system of the present invention comprises: a plurality of communication interfaces, and authentication management system is carried out conversational communication by the plurality of communication interface and operation system; Read module: authentication management system is obtained the subscriber equipment end message of access service system by this read module; End message validity judgement module: authentication management system, by the legitimacy of device end information described in this end message validity judgement module verification, if legal, is back to operation system by device end information, otherwise do not allow access; Authentication of users log-on message legitimacy module: authentication management system is by the legitimacy of authentication of users log-on message legitimacy module verification user login information, and generate a unique session-id, and authentication management system sends to operation system by this unique session-id; Function point authority judge module: the judgement of function point authority is carried out in function point access request and unique session that authentication management systemic-function point authority judge module sends over operation system, and will whether have and use function point authority judged result to be back to operation system; Exit and removing module: user uses operation system to fulfil assignment and exits, operation system sends unique session-id and exits request to authentication management system; The unique session-id that authentication management system exits and removing module sends according to operation system is removed the communication between authentication management system and operation system and is deleted conversational communication ID; In addition, operation system comprises: generate user login information module: the device end information indicating user that operation system is sent according to authentication management system inputs user's logon information, generate user login information and this user login information is sent to authentication management system; A plurality of function points, user can apply for function point in operation system, operation system sends to authentication management system by function point and the unique session-id of this user's application.
With reference to Figure of description 1 and 2, authentication management method of the present invention comprises the following steps:
Step 1: the communications protocol between definition operation system and authentication management system communication interface, and build the fetch program between operation system and authentication management system interface:
Communications protocol between operation system in defined declaration book Fig. 1 and the interface of authentication management system, builds the fetch program between operation system and authentication management system interface; As Fig. 1, between operation system and authentication management system interface, the send and receive of data goes to realize based on defined interface communication protocol in this step and by the fetch program, this process make each operation system and authentication management system separate, and the parameter in operation system and authentication management system communication transmits gives interface communication protocol and the fetch program has gone, the parameter acquiring described in subsequent step and sending all realizes based on this process;
Step 2: the subscriber equipment end message of authentication management system acquisition access service system:
For user side, access is the device end information according to subscriber terminal equipment to this method, and this device end information includes but not limited to the significant information of the unique information that can show equipment of the equipment such as IP address, MAC Address.As illustrated in fig. 1 and 2: when subscriber terminal equipment conducts interviews to authentication management system, authentication management system adopts the IP address of authoring program fetch equipment terminal and the unique identification of MAC Address generation device end of authentication management system, and this identifies the voucher as Authentication devices terminal legality;
Step 3: the legitimacy of device end information described in authentication management system verification:
The legitimacy of IP and mac-address authentication subscriber terminal equipment by device end, subscriber terminal equipment need become validated user terminal equipment in the checking of authentication management system registry, terminal IP and MAC that the authoring program fetch equipment terminal of authentication management system sends over, when if the end message of the end message of device end and the checking of authentication management system registry is not inconsistent, do not allow this operation system access; Otherwise return to Termination ID to operation system, do not allow its communication;
Step 4: input user logon information:
As illustrated in fig. 1 and 2: in this method, user needs first in the checking of authentication management system registry, to become validated user, when authentication management system judgment device end message legal, operation system receives after this judged result, operation system prompting user inputs user's logon information, and user login information is sent to authentication management system, authentication management system is verified user login information, and judge whether user has available operation system, if there is no available operation system, the user that prompting is canceled also exits; Otherwise allow this user access; And this user login information comprises but does not limit the use of in user name, password, brush subscriber card etc.
Step 5: the legitimacy of authentication management system verification user login information:
As illustrated in fig. 1 and 2: the legitimacy of authentication management system verification user login information, and generate a unique session-id, and authentication management system is tested this unique session-id is sent to operation system; Different operation systems is distinguished by system code, each operation system has a system code and corresponding system example, during user's registering service system, authentication management system end obtains the system code of user institute registering service system, whether the management end in authentication management system has the logon rights of this operation system according to this system code authentication of users, if user does not have logon rights, do not allow user to login, otherwise user's access authentication management system is carried out communication.
Step 6: user applies for function point in operation system:
User applies for function point in operation system, and operation system sends to authentication management system by function point and the unique session-id of this user's application; Each operation independently is become to a function point, and authentication management system combination in any function point is also given a role function point combination permission, by role's dynamic assignment function point authority to user; In this way, role is managed dynamically; In addition, each operation system has oneself independently a set of role and user role relation, and the logically rights management of each operation system is mutually independently; User is distributed by the user role under system example independently in the access rights of each operation system, truly accomplishes dynamic management role-security; In addition, the function point of each operation system is associated with module, the module of different business systems can be reused, and the function point of unified management modules, in addition, by each operation system being integrated to unified configuration and the management that realizes its authorization policy and standard, and can also single-sign-on between different business systems.
Step 7: function point authority judgement:
Function point access request and unique session-id that authentication management system sends according to operation system in step 6 carry out the judgement of function point authority, and will whether have the function point of use authority judged result and be back to operation system; As illustrated in fig. 1 and 2: when user logins authentication management system, authentication management system is verified according to information such as the username and password in the unique session-id obtaining and user's card numbers, then judge again whether user has available operation system, if there is no available operation system, point out inactive users and exit.Otherwise allow this user access; In addition, in order to improve coefficient of safety, when authentication management system judges function point authority, if user does not have enough authorities, need second user's weighting to carry out double authentication, need the second user to input username and password and brush subscriber card to be weighted checking judgement the function point that user just can request for utilization after judgement has enough authorities.
Step 8: exit:
User uses operation system to fulfil assignment and exits, and operation system sends unique session-id and exits request to authentication management system; As illustrated in fig. 1 and 2: when operation system registration authentication of users is used after function, user exits, user exits by communication interface module session id and function point parameter is returned to authentication management system, and session id is that authentication management system-kill operation system is with the voucher of authentication management system communication session.
Step 9: delete session:
Authentication management system is removed the communication between authentication management system and operation system and deletes conversational communication ID according to the unique session-id sending in step 8; As illustrated in fig. 1 and 2: authentication management system receives by communication interface module the conversational communication ID that operation system sends over, according to this session id, remove the communication of authentication management system and operation system.
The authentication management method and system adopting in the present invention provides the interface of a standard to do integrated to the operation system of access, the operations such as user's login, authority judgement are converted into system of the present invention to be completed, operation system only need be paid close attention to the service logic of oneself, realizes in logic the separate of operation system and control of authority; Adopt the mode of dynamic assignment role-security, a set of role and the user role relation of each operation system independence oneself, realize operation system authority separate in logic; Authentication management method and system is verified subscriber terminal equipment, and (is changed into: cooperation) brush subscriber card is verified login, has strengthened greatly the security performance of operation system; For financial payment operation system, double authentication is provided, meet high safety certification demand; Each operation system function point is associated with module, and between different system, module can be reused, and greatly reduces development cost and management cost; Authentication management method and system of the present invention is supported user's single-sign-on, realized a user account and managed the management mode of a plurality of operation systems, when improving the efficiency of management, also made up old a plurality of user account and managed the managing defect of a plurality of operation systems.

Claims (10)

1. an authentication management method that is applicable to high security operation system: it is characterized in that: said method comprising the steps of:
Step 1: the communications protocol between definition operation system and authentication management system communication interface, and build the fetch program between operation system and authentication management system interface;
Step 2: the subscriber equipment end message of authentication management system acquisition access service system;
Step 3: the legitimacy of device end information described in authentication management system verification, if legal, is back to operation system by device end information, otherwise does not allow access;
Step 4: the device end information indicating user that operation system is sent according to authentication management system inputs user's logon information, and user login information is sent to authentication management system;
Step 5: the legitimacy of authentication management system verification user login information, and generate a unique session-id, and authentication management system sends to operation system by this unique session-id;
Step 6: user applies for function point in operation system, operation system sends to authentication management system by function point and the unique session-id of this user's application;
Step 7: the function point request that authentication management system sends over according to operation system in step 6 and unique session-id carry out the judgement of function point authority, and will whether have and use function point authority judged result to be back to operation system;
Step 8: user uses operation system to fulfil assignment and exits, operation system sends unique session-id and exits request to authentication management system;
Step 9: authentication management system is removed the communication of authentication management system and operation system and deletes conversational communication ID according to the unique session-id sending in step 8.
2. method according to claim 1, is characterized in that: in step 2, also comprise: adopt the authoring program of authentication management system to carry out fetch equipment end message, this device end information is the unique identification of Authentication devices terminal legality; And high safety service system comprises the operation system that production environment is used, payment management platform.
3. method according to claim 1, is characterized in that: device end information wherein comprises: IP address, MAC Address; Device end comprises: computer, panel computer, mobile communication equipment, personal entertainment electronic equipment.
4. method according to claim 1, is characterized in that: before step 2, also comprise, register this device end information in authentication management system; Before step 4, also comprise: user needs first in the checking of authentication management system registry, to become validated user.
5. method according to claim 1, it is characterized in that: in step 4, also comprise: authentication management system is verified user login information, and judge whether user has available operation system, if there is no available operation system, the user that prompting is canceled also exits; Otherwise allow this user access; And this user login information comprises: user name, password, brush subscriber card.
6. method according to claim 1, it is characterized in that: in step 5, also comprise: different operation systems is distinguished by system code, each operation system has a system code and corresponding system example, during user's registering service system, authentication management system end obtains the system code of user institute registering service system, whether the management end in authentication management system has the logon rights of this operation system according to this system code authentication of users, if user does not have logon rights, do not allow user to login, otherwise user's access authentication management system is carried out communication.
7. method according to claim 1, it is characterized in that: in step 6, also comprise: each operation is independently become to a function point, authentication management system combination in any function point give a role function point combination permission, by role's dynamic assignment function point authority to user; In this way, role is managed dynamically; In addition, each operation system has oneself independently a set of role and user role relation, and the logically rights management of each operation system is mutually independently.
8. method according to claim 1, it is characterized in that: the function point of each operation system is associated with module, the module of different business systems can be reused, and the function point of unified management modules, each operation system is integrated its authorization policy and standard are done to unified configuration and management, can single-sign-on between different business systems.
9. method according to claim 1, it is characterized in that: in step 7, also comprise: when authentication management system judges function point authority, if user does not have enough authorities, need second user's weighting to carry out double authentication, need the second user to input username and password and brush subscriber card to be weighted checking judgement the function point that user just can request for utilization after judgement has enough authorities.
10. an authentication management system that is applicable to high security operation system, is characterized in that: this authentication management system comprises:
A plurality of communication interfaces, authentication management system is carried out conversational communication by the plurality of communication interface and operation system;
Read module: authentication management system is obtained the subscriber equipment end message of access service system by this read module;
End message validity judgement module: authentication management system, by the legitimacy of device end information described in this end message validity judgement module verification, if legal, is back to operation system by device end information, otherwise do not allow access;
Authentication of users log-on message legitimacy module: authentication management system is by the legitimacy of authentication of users log-on message legitimacy module verification user login information, and generate a unique session-id, and authentication management system sends to operation system by this unique session-id;
Function point authority judge module: the judgement of function point authority is carried out in user function point access request and unique session that authentication management systemic-function point authority judge module sends operation system, and will whether there is use function point authority judged result and be back to operation system;
Exit and removing module: user uses operation system to fulfil assignment and exits, operation system sends unique session-id and exits request to authentication management system; The unique session-id that authentication management system exits and removing module sends according to operation system is removed the communication between authentication management system and operation system and is deleted conversational communication ID;
In addition, operation system comprises: generate user login information module: the device end information indicating user that operation system is sent according to authentication management system inputs user's logon information, generate user login information and this user login information is sent to authentication management system;
A plurality of function points, user can apply for function point in operation system, operation system sends to authentication management system by function point and the unique session-id of this user's application.
CN201410246121.4A 2014-06-05 2014-06-05 Authentication management method and authentication management system applicable to high-security service system Active CN103986734B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410246121.4A CN103986734B (en) 2014-06-05 2014-06-05 Authentication management method and authentication management system applicable to high-security service system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410246121.4A CN103986734B (en) 2014-06-05 2014-06-05 Authentication management method and authentication management system applicable to high-security service system

Publications (2)

Publication Number Publication Date
CN103986734A true CN103986734A (en) 2014-08-13
CN103986734B CN103986734B (en) 2017-04-19

Family

ID=51278559

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410246121.4A Active CN103986734B (en) 2014-06-05 2014-06-05 Authentication management method and authentication management system applicable to high-security service system

Country Status (1)

Country Link
CN (1) CN103986734B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410640A (en) * 2014-12-03 2015-03-11 广东威创视讯科技股份有限公司 Authority control method and system for acquiring information under distributed type cooperative environment
CN104836816A (en) * 2015-06-04 2015-08-12 成都果豆数字娱乐有限公司 Mobile equipment data storage method
CN104935599A (en) * 2015-06-18 2015-09-23 北京京东尚科信息技术有限公司 Control and management method and system for universal right
CN107133505A (en) * 2017-03-30 2017-09-05 武汉斗鱼网络科技有限公司 A kind of right management method, method for authenticating and system
CN112364381A (en) * 2020-11-25 2021-02-12 广州三叠纪元智能科技有限公司 Authority management method, electronic box, server and storage medium
CN113742746A (en) * 2021-08-27 2021-12-03 北京航天云路有限公司 Combined authentication authority management system and method based on annotation realization
CN113958108A (en) * 2020-11-25 2022-01-21 广州三叠纪元智能科技有限公司 Electric box control method, electric box, server and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5668876A (en) * 1994-06-24 1997-09-16 Telefonaktiebolaget Lm Ericsson User authentication method and apparatus
CN102883264A (en) * 2012-09-19 2013-01-16 中国联合网络通信集团有限公司 Positioning service privacy authentication method, application terminal and service capacity open platform
CN102932385A (en) * 2011-08-09 2013-02-13 中兴通讯股份有限公司 Business processing method and device of ubiquitous terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5668876A (en) * 1994-06-24 1997-09-16 Telefonaktiebolaget Lm Ericsson User authentication method and apparatus
CN102932385A (en) * 2011-08-09 2013-02-13 中兴通讯股份有限公司 Business processing method and device of ubiquitous terminal
CN102883264A (en) * 2012-09-19 2013-01-16 中国联合网络通信集团有限公司 Positioning service privacy authentication method, application terminal and service capacity open platform

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410640A (en) * 2014-12-03 2015-03-11 广东威创视讯科技股份有限公司 Authority control method and system for acquiring information under distributed type cooperative environment
CN104410640B (en) * 2014-12-03 2019-04-16 广东威创视讯科技股份有限公司 A kind of authority control method and system of the acquisition of information under distributed cooperation environment
CN104836816A (en) * 2015-06-04 2015-08-12 成都果豆数字娱乐有限公司 Mobile equipment data storage method
CN104836816B (en) * 2015-06-04 2018-03-06 山西辰涵数字传媒股份有限公司 A kind of mobile device data storage method
CN104935599A (en) * 2015-06-18 2015-09-23 北京京东尚科信息技术有限公司 Control and management method and system for universal right
CN104935599B (en) * 2015-06-18 2018-10-16 北京京东尚科信息技术有限公司 A kind of general-purpose rights control management method and system
CN107133505A (en) * 2017-03-30 2017-09-05 武汉斗鱼网络科技有限公司 A kind of right management method, method for authenticating and system
CN107133505B (en) * 2017-03-30 2020-07-31 武汉斗鱼网络科技有限公司 Authority management method, authentication method and system
CN112364381A (en) * 2020-11-25 2021-02-12 广州三叠纪元智能科技有限公司 Authority management method, electronic box, server and storage medium
CN113958108A (en) * 2020-11-25 2022-01-21 广州三叠纪元智能科技有限公司 Electric box control method, electric box, server and storage medium
CN113742746A (en) * 2021-08-27 2021-12-03 北京航天云路有限公司 Combined authentication authority management system and method based on annotation realization

Also Published As

Publication number Publication date
CN103986734B (en) 2017-04-19

Similar Documents

Publication Publication Date Title
US8869253B2 (en) Electronic system for securing electronic services
CN103986734A (en) Authentication management method and authentication management system applicable to high-security service system
CN101515932B (en) Method and system for accessing Web service safely
CN101183932B (en) Security identification system of wireless application service and login and entry method thereof
CN102394887B (en) OAuth protocol-based safety certificate method of open platform and system thereof
US20080028453A1 (en) Identity and access management framework
CN106452772B (en) Terminal authentication method and device
CN107070667A (en) Identity identifying method, user equipment and server
CN106209912A (en) Access authorization methods, device and system
CN107862803A (en) Leased equipment unlocking method, Cloud Server, device end, equipment and system
CN103986584A (en) Double-factor identity verification method based on intelligent equipment
CN1731723A (en) Electron/handset token dynamic password identification system
CN103152179A (en) Uniform identity authentication method suitable for multiple application systems
CN104159225A (en) Wireless network based real-name registration system management method and system
CN101588352B (en) Method and system for ensuring security of operating environment
CN108881309A (en) Access method, device, electronic equipment and the readable storage medium storing program for executing of big data platform
CN101321068A (en) Method and apparatus for implementing dual-identity authentication
CN105162775A (en) Logging method and device of virtual machine
CN104717648A (en) Unified authentication method and device based on SIM card
CN107770192A (en) Identity authentication method and computer-readable recording medium in multisystem
CN105162774B (en) Virtual machine entry method, the virtual machine entry method and device for terminal
CN109040030A (en) Single-point logging method and system
CN105703910A (en) Dynamic password verifying method based on Wechat service number
CN102420808B (en) Method for realizing single signon on telecom on-line business hall
CN109962892A (en) A kind of authentication method and client, server logging in application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant