CN103986734B - Authentication management method and authentication management system applicable to high-security service system - Google Patents

Authentication management method and authentication management system applicable to high-security service system Download PDF

Info

Publication number
CN103986734B
CN103986734B CN201410246121.4A CN201410246121A CN103986734B CN 103986734 B CN103986734 B CN 103986734B CN 201410246121 A CN201410246121 A CN 201410246121A CN 103986734 B CN103986734 B CN 103986734B
Authority
CN
China
Prior art keywords
user
authentication management
management system
operation system
function point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410246121.4A
Other languages
Chinese (zh)
Other versions
CN103986734A (en
Inventor
黄小鹏
范绍强
柳晓明
刘政伟
陈锦龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eastcompeace Technology Co Ltd
Original Assignee
Eastcompeace Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eastcompeace Technology Co Ltd filed Critical Eastcompeace Technology Co Ltd
Priority to CN201410246121.4A priority Critical patent/CN103986734B/en
Publication of CN103986734A publication Critical patent/CN103986734A/en
Application granted granted Critical
Publication of CN103986734B publication Critical patent/CN103986734B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention relates to an authentication management method applicable to a high-security service system. The authentication management method applicable to the high-security service system comprises the following steps: defining a communication protocol between communication interfaces of a service system and an authentication management system, and constructing a reading procedure; acquiring terminal information of user equipment accessed to the service system; verifying validity of the terminal information of the user equipment, returning the terminal information of the user equipment to the serve system if the terminal information of the user equipment is valid, otherwise denying access; sending user login information to the authentication management system by the service system; verifying validity of the user login information by the authentication management system, generating one unique session ID (identity), and sending the unique session ID to the service system; applying for a function point in the service system by a user, and sending the function point applied by the user and the unique session ID to the authentication management system by the service system; judging authority of the function point by the authentication management system, and returning a judging result whether the user can use the function point or not to the service system; logging off by the user, and deleting a communication and session ID by the authentication management system.

Description

A kind of authentication management method and system suitable for high security operation system
Technical field
The present invention relates to a kind of authentication management method and system, the mirror being more particularly to applied in high safety operation system Power management method and system.
Background technology
The height that the development of information technology changes the life style of people, particularly Internet technology is fast-developing thoroughly Change the life mode of production of the mankind.But it follows that the peace of the miscellaneous service system service produced by information technology Full property also receives unprecedented challenge.In order to provide safer service, each operation system arranges authentication Management system, is screened to the log-on message of user, but this each operation system is required for oneself real in prior art Existing a set of user account management, and the user account between each operation system is all separate, is highly detrimental to unify pipe Reason, existing authentication management system does not carry out independent delineation of power to each operating function point, and great majority are all The authority that role goes control operation is used, it is impossible to accomplish dynamic distribution role-security, each business system according to needed for user The control of authority of system has a set of strategy and standard of oneself, is unfavorable for unified configuration with management.Further, since each business The independence of system user account, can not accomplish the single-sign-on function between different business systems.Additionally, for high security The operation system of requirement, existing authentication management system operates the single Role judgement for only having done unique user to one, it is impossible to full The senior authentication requesting of foot many role's checkings for security, and existing authentication management system is not to used by login system The terminal units such as computer do examination for security and restriction so that such operation system is in higher risk of attacks In.It would therefore be highly desirable to develop a kind of authentication management system of the high safety performance for integrating multiple operation systems so that user can pacify The multiple operation systems of full single-sign-on, operation system role can be with dynamically distributes, the login of high effective integration each operation system The information such as strategy are screened, the operation system user for highly effective and safe provides authentication service.
The content of the invention
A kind of authentication management method suitable for high security operation system:The method comprising the steps of:Define industry Communications protocol between business system and authentication management system communication interface, and build operation system and authentication management system interface it Between reading program;Authentication management system obtains the user equipment end message of access service system;Authentication management system is verified The legitimacy of the device end information, if legal, by device end information operation system is back to, and does not otherwise allow to visit Ask;Device end information alert user input user's logon information that operation system sends according to authentication management system, and will User login information is sent to authentication management system;Authentication management system verifies the legitimacy of user login information, and generates one Individual unique session-id, and the unique session-id is sent to operation system by authentication management system;User applies in operation system The function point and unique session-id of user's application are sent to authentication management system by function point, operation system;Step 7:Mirror The function point request and unique session that right management system is sended over according to operation system in step 6 carries out function point authority and sentences It is disconnected, and whether will have and be back to operation system using function point authority judged result;User is fulfiled assignment using operation system And exit, operation system sends unique session-id and exits request to authentication management system;Authentication management system is according to step 8 In the unique session-id that sends release the communication of authentication management system and operation system and delete conversational communication ID.
Also include in step 2:Device end information is read using the authoring program of authentication management system, the equipment end Client information is the unique mark for verifying device end legitimacy;And the business system that high safety operation system is used including production environment System, payment management platform.Device end information therein includes:IP address, MAC Address;Device end includes:Computer or shifting Dynamic communication apparatus.
Before step 2, also include, the device end information is registered in authentication management system.
Before step 4, also include:User needs first to become validated user in authentication management system registration checking.
Also include in step 4:Authentication management system is verified to user login information, and it is available to judge whether user has Operation system, if without available operation system, pointing out the user being canceled and exiting;The user is otherwise allowed to carry out Access;And the user login information includes:User name, password, brush subscriber card.
Also include in steps of 5:Different operation systems are distinguished by system code, and each operation system has one Individual system code and corresponding system example, during User logs in operation system, authentication management system end obtains user and is logged in Whether system code of operation system, have the business system in the management end of authentication management system according to system code checking user The logon rights of system, if user is not logged on authority, do not allow User logs in, otherwise user's access authentication management system to enter Row communication.
Also include in step 6:Each operation is independently become into a function point, authentication management system combination in any work( Can put and give a role function point combination permission, by role's dynamically distributes function point authority to user;By this side Formula, role is dynamically managed;And each operation system has oneself independent a set of role and user role relation, in logic The rights management of upper each operation system is independent mutually.The function point of each operation system is associated with module, different business The module of system can be reused, and be managed collectively the function point of modules.Additionally, being realized by the way that each operation system is integrated The unified configuration and management of authorization policy and standard, and can also single-sign-on between different business systems.
Also include in step 7:When authentication management system is judged function point authority, if user does not have enough authorities, Second user weighting is needed to carry out double certification, second user needs to be input into username and password and brush subscriber card is weighted and tests Card judges that user just can be with the function point of request for utilization after judging to have enough authorities.
The present invention also provides a kind of authentication management system suitable for high security operation system:It includes:Multiple communications Interface, authentication management system carries out conversational communication by the plurality of communication interface and operation system;Read module:Authentication management system System obtains the user equipment end message of access service system by the read module;End message validity judgement module:Mirror The legitimacy that right management system passes through the device end information described in end message validity judgement module verification, if legal, Then device end information is back to into operation system, does not otherwise allow to access;Checking user login information legitimacy module:Authentication The legitimacy that management system passes through checking user login information legitimacy module verification user login information, and generate one uniquely Session id, and the unique session-id is sent to operation system by authentication management system;Function point authority judge module:Authentication management The function point access request and unique session that systemic-function point authority judge module sends operation system carries out function point authority Judge, and will whether have and be back to operation system using function point authority judged result;Exit and removing module:User uses Operation system fulfils assignment and exits, and operation system sends unique session-id and exits request to authentication management system;Authentication Management system is exited and removing module releases authentication management system and business system according to the unique session-id that operation system sends Communication between system simultaneously deletes the unique session-id;In addition, operation system includes:Generate user login information module:Business system Device end information alert user input user's logon information that system sends according to authentication management system, generates User logs in letter The user login information is simultaneously sent to authentication management system by breath;Multiple function points, user can apply for work(in operation system Authority access can be put, the function point and unique session-id of user's application are sent to authentication management system by operation system.
Relative to prior art, the present invention has advantages below:
Authentication management system of the present invention and its method can realize a use of an independent authentication management system Operation system being covered the account management of family, in the case, even needing newly-increased account, without turning again to each business system more System goes to increase newly, deletes also in the same manner;Collect because the communication management module interface that can be supplied to one unified standard of operation system does Into, by User logs in, authority judge etc. operation be all incorporated into the present invention authentication management system in, so each operation system Only need to be in the service logic for focusing on oneself of concern;Each is operated independently becomes a function point, then by Right discriminating system manager gives a role any number of function point authorities, and distributes to user account by role, with reality The dynamic management function of existing role;Each operation system has oneself independent a set of role and user role relation, in logic The rights management of upper each operation system is independent mutually;The function point of each operation system is associated with module, and (module can Being a concrete dynamic base or one group of reusable code collection), the module of different business systems can be reused, so can be with The function point of unified management modules;Each operation system is integrated, authorization policy and the system in standard can be accomplished One configuration and management, and the single-sign-on function between different business systems can be realized;In addition, using username and password, Along with brush subscriber card verification mode is logged in;Additionally, checking will log in the terminal unit for using, if illegality equipment then can be with Accomplish that refusing its login uses operation system;Each function point is distributed to using double roles, realizes that the senior certification such as double certification will Ask.
Figure of description
Fig. 1:Interaction schematic diagram between authentication management system of the present invention and operation system interface structure and interface;Figure 2:Authentication management method flow diagram of the present invention.
Specific embodiment:
Technical scheme is described in detail below in conjunction with Figure of description.High security industry in the present invention Business system includes but is not limited to the higher operation system of demand for security such as production environment operation system, financial transaction management platform.
With reference to Figure of description 1 and 2, the authentication management system of the present invention includes:Multiple communication interfaces, authentication management system Conversational communication is carried out by the plurality of communication interface and operation system;Read module:Authentication management system passes through the read module Obtain the user equipment end message of access service system;End message validity judgement module:Authentication management system is by being somebody's turn to do The legitimacy of device end information described in end message validity judgement module verification, if legal, by device end information Operation system is back to, does not otherwise allow to access;Checking user login information legitimacy module:Authentication management system is by checking The legitimacy of user login information legitimacy module verification user login information, and a unique session-id is generated, and authenticate pipe The unique session-id is sent to operation system by reason system;Function point authority judge module:Authentication management system function point authority The function point access request and unique session that judge module sends over operation system carries out function point authority judgement, and will be It is no to be back to operation system with using function point authority judged result;Exit and removing module:User is complete using operation system Into operation and exit, operation system sends unique session-id and exits request to authentication management system;Authentication management system is moved back Go out and removing module releases logical between authentication management system and operation system according to the unique session-id that operation system sends Interrogate and delete the unique session-id;In addition, operation system includes:Generate user login information module:Operation system is according to authentication Device end information alert user input user's logon information that management system sends, generates user login information and uses this Family log-on message is sent to authentication management system;Multiple function points, user can apply for function point, business system in operation system Is united and the function point and unique session-id of user's application are sent to authentication management system.
With reference to Figure of description 1 and 2, the authentication management method of the present invention is comprised the following steps:
Step 1:The communications protocol between operation system and authentication management system communication interface is defined, and builds operation system With the reading program between authentication management system interface:
The communications protocol between the operation system and the interface of authentication management system in description Fig. 1 is defined, business is built Reading program between system and authentication management system interface;Such as Fig. 1, data between operation system and authentication management system interface Transmission be namely based on interface communication protocol defined in this step and go what is realized by reading program with receiving, this mistake Parameter during journey causes each operation system separate with authentication management system, and operation system is communicated with authentication management system Interface communication protocol is then given in transmission and reading program goes to complete, and the parameter acquiring and transmission described in subsequent step is all Realized based on this process;
Step 2:Authentication management system obtains the user equipment end message of access service system:
This method is for the device end information that user side access is according to subscriber terminal equipment, the device end packet Include but be not limited to the significant information of the unique information that can show that equipment of the equipment such as IP address, MAC Address.Such as Fig. 1 and 2 institutes Show:When subscriber terminal equipment conducts interviews to authentication management system, authentication management system adopts the mandate of authentication management system Program reads the unique mark that the IP address and MAC Address of device end generates device end, and this mark will be used as checking equipment The voucher of terminal legality;
Step 3:Authentication management system verifies the legitimacy of the device end information:
By the IP and the legitimacy of mac-address authentication subscriber terminal equipment of device end, subscriber terminal equipment need to be in mirror Right management system registration checking becomes validated user terminal unit, and the authoring program of authentication management system reads device end and sends Terminal IP for coming over and MAC, if the end message that the end message of device end registers checking with authentication management system is not inconsistent When, do not allow the operation system to access;Termination ID is otherwise returned to operation system, does not allow it to communicate;
Step 4:Input user's logon information:
As illustrated in fig. 1 and 2:User needs first to become validated user in authentication management system registration checking in this method, works as mirror Right management system judges that device end information is legal, and operation system is received after the judged result, and prompting user is defeated for operation system Access customer logon information, and user login information is sent to into authentication management system, authentication management system is to user login information Verify, and judge whether user has available operation system, if without available operation system, pointing out the use being canceled Family is simultaneously exited;The user is otherwise allowed to conduct interviews;And the user login information includes but is not exclusively for:User name, password, brush Subscriber card etc..
Step 5:Authentication management system verifies the legitimacy of user login information:
As illustrated in fig. 1 and 2:Authentication management system verifies the legitimacy of user login information, and generates a unique session ID, and authentication management system tests and for the unique session-id to be sent to operation system;Different operation systems is by system code Distinguish, each operation system has system code and corresponding system example, during User logs in operation system, authentication System code that management system end obtains user institute registering service system, authentication management system management end according to the system Whether code checking users have the logon rights of the operation system, if user is not logged on authority, do not allow User logs in, Otherwise user's access authentication management system is communicated.
Step 6:User applies for function point in operation system:
User applies for function point in operation system, function point and unique session-id that operation system applies for the user It is sent to authentication management system;Each operation is independently become into a function point, authentication management system combination in any function point And a role is given function point combination permission, by role's dynamically distributes function point authority to user;In this way, angle Color is dynamically managed;Additionally, each operation system has oneself independent a set of role and user role relation, logically The rights management of each operation system is independent mutually;User each operation system access rights by independent system reality User role distribution under example, truly accomplishes dynamic managerial roles's authority;In addition, the function point of each operation system is closed Module is linked to, the module of different business systems can be reused, and be managed collectively the function point of modules, additionally, by by respectively Individual operation system is integrated the unified configuration of realizing its authorization policy and standard and is managed, and between different business systems can also single-point step on Record.
Step 7:Function point authority judges:
The function point access request and unique session-id that authentication management system sends according to operation system in step 6 carries out work( Authority judgement can be put, and will whether be had and be back to operation system using function point authority judged result;As illustrated in fig. 1 and 2:With When family logs in authentication management system, username and password and user of the authentication management system in the unique session-id for obtaining The information such as card number verify, then judge whether user has available operation system again, if without available operation system, Prompting inactive users are simultaneously exited.The user is otherwise allowed to conduct interviews;In addition, in order to improve safety coefficient, authentication management system When judging function point authority, if user does not have enough authorities, need second user weighting to carry out double certification, then need the Two users carry out being input into username and password and brush subscriber card is weighted checking and judges, user after judging to have enough authorities Just can be with the function point of request for utilization.
Step 8:Exit:
User is fulfiled assignment using operation system and is exited, operation system to authentication management system send unique session-id with And exit request;As illustrated in fig. 1 and 2:After operation system registration checking user uses function, user exits, and user exits logical Cross communication interface module and session id and function point parameter are returned to authentication management system, session id is that authentication management system is deleted Except operation system is with the voucher of authentication management system conversational communication.
Step 9:Delete session:
Authentication management system according to the unique session-id that sends in step 8 release authentication management system and operation system it Between communication and delete the unique session-id;As illustrated in fig. 1 and 2:Authentication management system receives business by communication interface module The conversational communication ID that system is sended over, according to this session id the communication of authentication management system and operation system is released.
Authentication management method and system employed in the present invention provides the interface of a standard to the operation system for accessing Do integrated, the system that the operations such as User logs in, authority judgement are converted into the present invention is completed, operation system only need to be paid close attention to certainly Oneself service logic, realizes in logic the separate of operation system and control of authority;Using dynamically distributes role-security Mode, a set of role of each operation system independence oneself and user role relation, realize that in logic operation system authority is mutually only It is vertical;Authentication management method and system is verified to subscriber terminal equipment, and (is changed to:Coordinating) brush subscriber card carries out checking and steps on Record, greatly enhances the security performance of operation system;For financial payment operation system, there is provided double certification, Gao An is met Full certification demand;Each operation system function point is associated with module, and module can be reused between different system, greatly reduce development cost And management cost;The authentication management method and system of the present invention supports the single-sign-on of user, realizes a user account The management mode of multiple operation systems is managed, old multiple user account management is also compensate for while improving the efficiency of management multiple The management defect of operation system.

Claims (10)

1. a kind of authentication management method suitable for high security operation system:It is characterized in that:Methods described includes following step Suddenly:
Step 1:The communications protocol between operation system and authentication management system communication interface is defined, and builds operation system with mirror Reading program between right management system interface;
Step 2:Authentication management system obtains the user equipment end message of access service system;
Step 3:Authentication management system verifies the legitimacy of the device end information, if legal, by device end information Operation system is back to, does not otherwise allow to access;
Step 4:Operation system logs in letter according to the device end information alert user input user that authentication management system sends Breath, and user login information is sent to into authentication management system;
Step 5:Authentication management system verifies the legitimacy of user login information, and generates a unique session-id, and authenticates pipe The unique session-id is sent to operation system by reason system;
Step 6:User applies for function point in operation system, function point and unique session that operation system applies for the user ID is sent to authentication management system;
Step 7:The function point request and unique session-id that authentication management system is sended over according to operation system in step 6 is carried out Whether function point authority judges, and will have and be back to operation system using function point authority judged result;
Step 8:User is fulfiled assignment using operation system and is exited, and operation system to authentication management system sends unique session-id And exit request;
Step 9:Authentication management system releases authentication management system and business system according to the unique session-id sent in step 8 The communication of system simultaneously deletes unique session-id.
2. method according to claim 1, it is characterised in that:Also include in step 2:Using the mandate of authentication management system Reading device end information, the device end information is to verify the unique mark of device end legitimacy to program;And high safety The operation system that operation system is used including production environment, payment management platform.
3. method according to claim 1, it is characterised in that:Device end information therein includes:IP address, MAC Address; Device end includes:Computer or mobile communication equipment.
4. method according to claim 1, it is characterised in that:Before step 2, also include, note in authentication management system Volume the device end information;Before step 4, also include:User needs first to become legal use in authentication management system registration checking Family.
5. method according to claim 1, it is characterised in that:Also include in step 4:Authentication management system is to User logs in Information is verified, and judges whether user has available operation system, if without available operation system, pointing out to be canceled User and exit;The user is otherwise allowed to conduct interviews;And the user login information includes:User name, password, brush user Card.
6. method according to claim 1, it is characterised in that:Also include in steps of 5:Different operation systems is by being System code is distinguished, and each operation system has system code and corresponding system example, User logs in operation system When, system code that authentication management system end obtains user institute registering service system, authentication management system management end according to Whether system code checking user has the logon rights of the operation system, if user is not logged on authority, do not allow to use Family logs in, and otherwise user's access authentication management system is communicated.
7. method according to claim 1, it is characterised in that:Also include in step 6:Each operation is independently become into one Item function point, authentication management system combination in any function point simultaneously gives a role function point combination permission, by role's dynamic Distribution function point authority is to user;In this way, role is dynamically managed;Additionally, each operation system has oneself Independent a set of role and user role relation, the logically rights management of each operation system is independent mutually.
8. method according to claim 1, it is characterised in that:The function point of each operation system is associated with module, not of the same trade or business The module of business system can be reused, and be managed collectively the function point of modules, and each operation system is integrated its authority plan Omit and standard is done unified configuration and managed, then can be with single-sign-on between different business systems.
9. method according to claim 1, it is characterised in that:Also include in step 7:Authentication management system is weighed to function point When limit judges, if user does not have enough authorities, need second user weighting to carry out double certification, then need second user to carry out Simultaneously brush subscriber card is weighted checking judgement to input username and password, and user just can use after judging to have enough authorities The function point of application.
10. a kind of authentication management system suitable for high security operation system, it is characterised in that:The authentication management system bag Include:
Multiple communication interfaces, authentication management system carries out conversational communication by the plurality of communication interface and operation system;
Read module:Authentication management system obtains the user equipment end message of access service system by the read module;
End message validity judgement module:Authentication management system described in the end message validity judgement module verification by setting The legitimacy of standby end message, if legal, by device end information operation system is back to, and does not otherwise allow to access;
Checking user login information legitimacy module:Authentication management system is by verifying user login information legitimacy module verification The legitimacy of user login information, and a unique session-id is generated, and authentication management system is sent to the unique session-id Operation system;
Function point authority judge module:The user function that authentication management system function point authority judge module sends operation system Whether point access request and unique session-id carry out function point authority judgement, and will have and be returned using function point authority judged result It is back to operation system;
Exit and removing module:User is fulfiled assignment using operation system and is exited, and operation system to authentication management system sends Unique session-id and exit request;Unique session that authentication management system is exited and removing module sends according to operation system ID releases the communication between authentication management system and operation system and deletes unique session-id;
In addition, operation system includes:Generate user login information module:Operation system is according to setting that authentication management system sends Standby end message points out user input user's logon information, generates user login information and the user login information is sent to into mirror Right management system;
Multiple function points, user can apply for function point in operation system, operation system by the function point of user's application with And unique session-id is sent to authentication management system.
CN201410246121.4A 2014-06-05 2014-06-05 Authentication management method and authentication management system applicable to high-security service system Active CN103986734B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410246121.4A CN103986734B (en) 2014-06-05 2014-06-05 Authentication management method and authentication management system applicable to high-security service system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410246121.4A CN103986734B (en) 2014-06-05 2014-06-05 Authentication management method and authentication management system applicable to high-security service system

Publications (2)

Publication Number Publication Date
CN103986734A CN103986734A (en) 2014-08-13
CN103986734B true CN103986734B (en) 2017-04-19

Family

ID=51278559

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410246121.4A Active CN103986734B (en) 2014-06-05 2014-06-05 Authentication management method and authentication management system applicable to high-security service system

Country Status (1)

Country Link
CN (1) CN103986734B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104410640B (en) * 2014-12-03 2019-04-16 广东威创视讯科技股份有限公司 A kind of authority control method and system of the acquisition of information under distributed cooperation environment
CN104836816B (en) * 2015-06-04 2018-03-06 山西辰涵数字传媒股份有限公司 A kind of mobile device data storage method
CN104935599B (en) * 2015-06-18 2018-10-16 北京京东尚科信息技术有限公司 A kind of general-purpose rights control management method and system
CN107133505B (en) * 2017-03-30 2020-07-31 武汉斗鱼网络科技有限公司 Authority management method, authentication method and system
CN113958108A (en) * 2020-11-25 2022-01-21 广州三叠纪元智能科技有限公司 Electric box control method, electric box, server and storage medium
CN112364381A (en) * 2020-11-25 2021-02-12 广州三叠纪元智能科技有限公司 Authority management method, electronic box, server and storage medium
CN113742746A (en) * 2021-08-27 2021-12-03 北京航天云路有限公司 Combined authentication authority management system and method based on annotation realization

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5668876A (en) * 1994-06-24 1997-09-16 Telefonaktiebolaget Lm Ericsson User authentication method and apparatus
CN102883264A (en) * 2012-09-19 2013-01-16 中国联合网络通信集团有限公司 Positioning service privacy authentication method, application terminal and service capacity open platform
CN102932385A (en) * 2011-08-09 2013-02-13 中兴通讯股份有限公司 Business processing method and device of ubiquitous terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5668876A (en) * 1994-06-24 1997-09-16 Telefonaktiebolaget Lm Ericsson User authentication method and apparatus
CN102932385A (en) * 2011-08-09 2013-02-13 中兴通讯股份有限公司 Business processing method and device of ubiquitous terminal
CN102883264A (en) * 2012-09-19 2013-01-16 中国联合网络通信集团有限公司 Positioning service privacy authentication method, application terminal and service capacity open platform

Also Published As

Publication number Publication date
CN103986734A (en) 2014-08-13

Similar Documents

Publication Publication Date Title
CN103986734B (en) Authentication management method and authentication management system applicable to high-security service system
CN101515932B (en) Method and system for accessing Web service safely
CN101202753B (en) Method and device for accessing plug-in connector applied system by client terminal
CA2868896C (en) Secure mobile framework
CN102655494B (en) SAML (Security Assertion Markup Language)-based authentication platform designed in single log-in mode
CN101159557B (en) Single point logging method, device and system
US7788711B1 (en) Method and system for transferring identity assertion information between trusted partner sites in a network using artifacts
CN104158824B (en) Genuine cyber identification authentication method and system
CN107342992A (en) A kind of System right management method, apparatus and computer-readable recording medium
CN103986584A (en) Double-factor identity verification method based on intelligent equipment
CN108650212A (en) A kind of Internet of Things certification and access control method and Internet of Things security gateway system
CN102457509B (en) Cloud computing resources safety access method, Apparatus and system
US20070240202A1 (en) Authentication service for facilitating access to services
CN107172054A (en) A kind of purview certification method based on CAS, apparatus and system
CN107733861A (en) It is a kind of based on enterprise-level intranet and extranet environment without password login implementation method
CN110417820A (en) Processing method, device and the readable storage medium storing program for executing of single-node login system
CN100512107C (en) Security identification method
CN101321064A (en) Information system access control method and apparatus based on digital certificate technique
CN103152179A (en) Uniform identity authentication method suitable for multiple application systems
CN110149328A (en) Interface method for authenticating, device, equipment and computer readable storage medium
CN103856332A (en) Implementation method of one-to-multiple account mapping binding of convenient and rapid multi-screen multi-factor WEB identity authentication
CN112580006A (en) Access right control method and device of multi-cloud system and authentication server
CN105162775A (en) Logging method and device of virtual machine
US20070260875A1 (en) Method and apparatus for preferred business partner access in public wireless local area networks (LANS)
CN100365974C (en) Device and method for controlling computer access

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant