CN103986734B - Authentication management method and authentication management system applicable to high-security service system - Google Patents
Authentication management method and authentication management system applicable to high-security service system Download PDFInfo
- Publication number
- CN103986734B CN103986734B CN201410246121.4A CN201410246121A CN103986734B CN 103986734 B CN103986734 B CN 103986734B CN 201410246121 A CN201410246121 A CN 201410246121A CN 103986734 B CN103986734 B CN 103986734B
- Authority
- CN
- China
- Prior art keywords
- user
- authentication management
- management system
- operation system
- function point
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Computer And Data Communications (AREA)
Abstract
The invention relates to an authentication management method applicable to a high-security service system. The authentication management method applicable to the high-security service system comprises the following steps: defining a communication protocol between communication interfaces of a service system and an authentication management system, and constructing a reading procedure; acquiring terminal information of user equipment accessed to the service system; verifying validity of the terminal information of the user equipment, returning the terminal information of the user equipment to the serve system if the terminal information of the user equipment is valid, otherwise denying access; sending user login information to the authentication management system by the service system; verifying validity of the user login information by the authentication management system, generating one unique session ID (identity), and sending the unique session ID to the service system; applying for a function point in the service system by a user, and sending the function point applied by the user and the unique session ID to the authentication management system by the service system; judging authority of the function point by the authentication management system, and returning a judging result whether the user can use the function point or not to the service system; logging off by the user, and deleting a communication and session ID by the authentication management system.
Description
Technical field
The present invention relates to a kind of authentication management method and system, the mirror being more particularly to applied in high safety operation system
Power management method and system.
Background technology
The height that the development of information technology changes the life style of people, particularly Internet technology is fast-developing thoroughly
Change the life mode of production of the mankind.But it follows that the peace of the miscellaneous service system service produced by information technology
Full property also receives unprecedented challenge.In order to provide safer service, each operation system arranges authentication
Management system, is screened to the log-on message of user, but this each operation system is required for oneself real in prior art
Existing a set of user account management, and the user account between each operation system is all separate, is highly detrimental to unify pipe
Reason, existing authentication management system does not carry out independent delineation of power to each operating function point, and great majority are all
The authority that role goes control operation is used, it is impossible to accomplish dynamic distribution role-security, each business system according to needed for user
The control of authority of system has a set of strategy and standard of oneself, is unfavorable for unified configuration with management.Further, since each business
The independence of system user account, can not accomplish the single-sign-on function between different business systems.Additionally, for high security
The operation system of requirement, existing authentication management system operates the single Role judgement for only having done unique user to one, it is impossible to full
The senior authentication requesting of foot many role's checkings for security, and existing authentication management system is not to used by login system
The terminal units such as computer do examination for security and restriction so that such operation system is in higher risk of attacks
In.It would therefore be highly desirable to develop a kind of authentication management system of the high safety performance for integrating multiple operation systems so that user can pacify
The multiple operation systems of full single-sign-on, operation system role can be with dynamically distributes, the login of high effective integration each operation system
The information such as strategy are screened, the operation system user for highly effective and safe provides authentication service.
The content of the invention
A kind of authentication management method suitable for high security operation system:The method comprising the steps of:Define industry
Communications protocol between business system and authentication management system communication interface, and build operation system and authentication management system interface it
Between reading program;Authentication management system obtains the user equipment end message of access service system;Authentication management system is verified
The legitimacy of the device end information, if legal, by device end information operation system is back to, and does not otherwise allow to visit
Ask;Device end information alert user input user's logon information that operation system sends according to authentication management system, and will
User login information is sent to authentication management system;Authentication management system verifies the legitimacy of user login information, and generates one
Individual unique session-id, and the unique session-id is sent to operation system by authentication management system;User applies in operation system
The function point and unique session-id of user's application are sent to authentication management system by function point, operation system;Step 7:Mirror
The function point request and unique session that right management system is sended over according to operation system in step 6 carries out function point authority and sentences
It is disconnected, and whether will have and be back to operation system using function point authority judged result;User is fulfiled assignment using operation system
And exit, operation system sends unique session-id and exits request to authentication management system;Authentication management system is according to step 8
In the unique session-id that sends release the communication of authentication management system and operation system and delete conversational communication ID.
Also include in step 2:Device end information is read using the authoring program of authentication management system, the equipment end
Client information is the unique mark for verifying device end legitimacy;And the business system that high safety operation system is used including production environment
System, payment management platform.Device end information therein includes:IP address, MAC Address;Device end includes:Computer or shifting
Dynamic communication apparatus.
Before step 2, also include, the device end information is registered in authentication management system.
Before step 4, also include:User needs first to become validated user in authentication management system registration checking.
Also include in step 4:Authentication management system is verified to user login information, and it is available to judge whether user has
Operation system, if without available operation system, pointing out the user being canceled and exiting;The user is otherwise allowed to carry out
Access;And the user login information includes:User name, password, brush subscriber card.
Also include in steps of 5:Different operation systems are distinguished by system code, and each operation system has one
Individual system code and corresponding system example, during User logs in operation system, authentication management system end obtains user and is logged in
Whether system code of operation system, have the business system in the management end of authentication management system according to system code checking user
The logon rights of system, if user is not logged on authority, do not allow User logs in, otherwise user's access authentication management system to enter
Row communication.
Also include in step 6:Each operation is independently become into a function point, authentication management system combination in any work(
Can put and give a role function point combination permission, by role's dynamically distributes function point authority to user;By this side
Formula, role is dynamically managed;And each operation system has oneself independent a set of role and user role relation, in logic
The rights management of upper each operation system is independent mutually.The function point of each operation system is associated with module, different business
The module of system can be reused, and be managed collectively the function point of modules.Additionally, being realized by the way that each operation system is integrated
The unified configuration and management of authorization policy and standard, and can also single-sign-on between different business systems.
Also include in step 7:When authentication management system is judged function point authority, if user does not have enough authorities,
Second user weighting is needed to carry out double certification, second user needs to be input into username and password and brush subscriber card is weighted and tests
Card judges that user just can be with the function point of request for utilization after judging to have enough authorities.
The present invention also provides a kind of authentication management system suitable for high security operation system:It includes:Multiple communications
Interface, authentication management system carries out conversational communication by the plurality of communication interface and operation system;Read module:Authentication management system
System obtains the user equipment end message of access service system by the read module;End message validity judgement module:Mirror
The legitimacy that right management system passes through the device end information described in end message validity judgement module verification, if legal,
Then device end information is back to into operation system, does not otherwise allow to access;Checking user login information legitimacy module:Authentication
The legitimacy that management system passes through checking user login information legitimacy module verification user login information, and generate one uniquely
Session id, and the unique session-id is sent to operation system by authentication management system;Function point authority judge module:Authentication management
The function point access request and unique session that systemic-function point authority judge module sends operation system carries out function point authority
Judge, and will whether have and be back to operation system using function point authority judged result;Exit and removing module:User uses
Operation system fulfils assignment and exits, and operation system sends unique session-id and exits request to authentication management system;Authentication
Management system is exited and removing module releases authentication management system and business system according to the unique session-id that operation system sends
Communication between system simultaneously deletes the unique session-id;In addition, operation system includes:Generate user login information module:Business system
Device end information alert user input user's logon information that system sends according to authentication management system, generates User logs in letter
The user login information is simultaneously sent to authentication management system by breath;Multiple function points, user can apply for work(in operation system
Authority access can be put, the function point and unique session-id of user's application are sent to authentication management system by operation system.
Relative to prior art, the present invention has advantages below:
Authentication management system of the present invention and its method can realize a use of an independent authentication management system
Operation system being covered the account management of family, in the case, even needing newly-increased account, without turning again to each business system more
System goes to increase newly, deletes also in the same manner;Collect because the communication management module interface that can be supplied to one unified standard of operation system does
Into, by User logs in, authority judge etc. operation be all incorporated into the present invention authentication management system in, so each operation system
Only need to be in the service logic for focusing on oneself of concern;Each is operated independently becomes a function point, then by
Right discriminating system manager gives a role any number of function point authorities, and distributes to user account by role, with reality
The dynamic management function of existing role;Each operation system has oneself independent a set of role and user role relation, in logic
The rights management of upper each operation system is independent mutually;The function point of each operation system is associated with module, and (module can
Being a concrete dynamic base or one group of reusable code collection), the module of different business systems can be reused, so can be with
The function point of unified management modules;Each operation system is integrated, authorization policy and the system in standard can be accomplished
One configuration and management, and the single-sign-on function between different business systems can be realized;In addition, using username and password,
Along with brush subscriber card verification mode is logged in;Additionally, checking will log in the terminal unit for using, if illegality equipment then can be with
Accomplish that refusing its login uses operation system;Each function point is distributed to using double roles, realizes that the senior certification such as double certification will
Ask.
Figure of description
Fig. 1:Interaction schematic diagram between authentication management system of the present invention and operation system interface structure and interface;Figure
2:Authentication management method flow diagram of the present invention.
Specific embodiment:
Technical scheme is described in detail below in conjunction with Figure of description.High security industry in the present invention
Business system includes but is not limited to the higher operation system of demand for security such as production environment operation system, financial transaction management platform.
With reference to Figure of description 1 and 2, the authentication management system of the present invention includes:Multiple communication interfaces, authentication management system
Conversational communication is carried out by the plurality of communication interface and operation system;Read module:Authentication management system passes through the read module
Obtain the user equipment end message of access service system;End message validity judgement module:Authentication management system is by being somebody's turn to do
The legitimacy of device end information described in end message validity judgement module verification, if legal, by device end information
Operation system is back to, does not otherwise allow to access;Checking user login information legitimacy module:Authentication management system is by checking
The legitimacy of user login information legitimacy module verification user login information, and a unique session-id is generated, and authenticate pipe
The unique session-id is sent to operation system by reason system;Function point authority judge module:Authentication management system function point authority
The function point access request and unique session that judge module sends over operation system carries out function point authority judgement, and will be
It is no to be back to operation system with using function point authority judged result;Exit and removing module:User is complete using operation system
Into operation and exit, operation system sends unique session-id and exits request to authentication management system;Authentication management system is moved back
Go out and removing module releases logical between authentication management system and operation system according to the unique session-id that operation system sends
Interrogate and delete the unique session-id;In addition, operation system includes:Generate user login information module:Operation system is according to authentication
Device end information alert user input user's logon information that management system sends, generates user login information and uses this
Family log-on message is sent to authentication management system;Multiple function points, user can apply for function point, business system in operation system
Is united and the function point and unique session-id of user's application are sent to authentication management system.
With reference to Figure of description 1 and 2, the authentication management method of the present invention is comprised the following steps:
Step 1:The communications protocol between operation system and authentication management system communication interface is defined, and builds operation system
With the reading program between authentication management system interface:
The communications protocol between the operation system and the interface of authentication management system in description Fig. 1 is defined, business is built
Reading program between system and authentication management system interface;Such as Fig. 1, data between operation system and authentication management system interface
Transmission be namely based on interface communication protocol defined in this step and go what is realized by reading program with receiving, this mistake
Parameter during journey causes each operation system separate with authentication management system, and operation system is communicated with authentication management system
Interface communication protocol is then given in transmission and reading program goes to complete, and the parameter acquiring and transmission described in subsequent step is all
Realized based on this process;
Step 2:Authentication management system obtains the user equipment end message of access service system:
This method is for the device end information that user side access is according to subscriber terminal equipment, the device end packet
Include but be not limited to the significant information of the unique information that can show that equipment of the equipment such as IP address, MAC Address.Such as Fig. 1 and 2 institutes
Show:When subscriber terminal equipment conducts interviews to authentication management system, authentication management system adopts the mandate of authentication management system
Program reads the unique mark that the IP address and MAC Address of device end generates device end, and this mark will be used as checking equipment
The voucher of terminal legality;
Step 3:Authentication management system verifies the legitimacy of the device end information:
By the IP and the legitimacy of mac-address authentication subscriber terminal equipment of device end, subscriber terminal equipment need to be in mirror
Right management system registration checking becomes validated user terminal unit, and the authoring program of authentication management system reads device end and sends
Terminal IP for coming over and MAC, if the end message that the end message of device end registers checking with authentication management system is not inconsistent
When, do not allow the operation system to access;Termination ID is otherwise returned to operation system, does not allow it to communicate;
Step 4:Input user's logon information:
As illustrated in fig. 1 and 2:User needs first to become validated user in authentication management system registration checking in this method, works as mirror
Right management system judges that device end information is legal, and operation system is received after the judged result, and prompting user is defeated for operation system
Access customer logon information, and user login information is sent to into authentication management system, authentication management system is to user login information
Verify, and judge whether user has available operation system, if without available operation system, pointing out the use being canceled
Family is simultaneously exited;The user is otherwise allowed to conduct interviews;And the user login information includes but is not exclusively for:User name, password, brush
Subscriber card etc..
Step 5:Authentication management system verifies the legitimacy of user login information:
As illustrated in fig. 1 and 2:Authentication management system verifies the legitimacy of user login information, and generates a unique session
ID, and authentication management system tests and for the unique session-id to be sent to operation system;Different operation systems is by system code
Distinguish, each operation system has system code and corresponding system example, during User logs in operation system, authentication
System code that management system end obtains user institute registering service system, authentication management system management end according to the system
Whether code checking users have the logon rights of the operation system, if user is not logged on authority, do not allow User logs in,
Otherwise user's access authentication management system is communicated.
Step 6:User applies for function point in operation system:
User applies for function point in operation system, function point and unique session-id that operation system applies for the user
It is sent to authentication management system;Each operation is independently become into a function point, authentication management system combination in any function point
And a role is given function point combination permission, by role's dynamically distributes function point authority to user;In this way, angle
Color is dynamically managed;Additionally, each operation system has oneself independent a set of role and user role relation, logically
The rights management of each operation system is independent mutually;User each operation system access rights by independent system reality
User role distribution under example, truly accomplishes dynamic managerial roles's authority;In addition, the function point of each operation system is closed
Module is linked to, the module of different business systems can be reused, and be managed collectively the function point of modules, additionally, by by respectively
Individual operation system is integrated the unified configuration of realizing its authorization policy and standard and is managed, and between different business systems can also single-point step on
Record.
Step 7:Function point authority judges:
The function point access request and unique session-id that authentication management system sends according to operation system in step 6 carries out work(
Authority judgement can be put, and will whether be had and be back to operation system using function point authority judged result;As illustrated in fig. 1 and 2:With
When family logs in authentication management system, username and password and user of the authentication management system in the unique session-id for obtaining
The information such as card number verify, then judge whether user has available operation system again, if without available operation system,
Prompting inactive users are simultaneously exited.The user is otherwise allowed to conduct interviews;In addition, in order to improve safety coefficient, authentication management system
When judging function point authority, if user does not have enough authorities, need second user weighting to carry out double certification, then need the
Two users carry out being input into username and password and brush subscriber card is weighted checking and judges, user after judging to have enough authorities
Just can be with the function point of request for utilization.
Step 8:Exit:
User is fulfiled assignment using operation system and is exited, operation system to authentication management system send unique session-id with
And exit request;As illustrated in fig. 1 and 2:After operation system registration checking user uses function, user exits, and user exits logical
Cross communication interface module and session id and function point parameter are returned to authentication management system, session id is that authentication management system is deleted
Except operation system is with the voucher of authentication management system conversational communication.
Step 9:Delete session:
Authentication management system according to the unique session-id that sends in step 8 release authentication management system and operation system it
Between communication and delete the unique session-id;As illustrated in fig. 1 and 2:Authentication management system receives business by communication interface module
The conversational communication ID that system is sended over, according to this session id the communication of authentication management system and operation system is released.
Authentication management method and system employed in the present invention provides the interface of a standard to the operation system for accessing
Do integrated, the system that the operations such as User logs in, authority judgement are converted into the present invention is completed, operation system only need to be paid close attention to certainly
Oneself service logic, realizes in logic the separate of operation system and control of authority;Using dynamically distributes role-security
Mode, a set of role of each operation system independence oneself and user role relation, realize that in logic operation system authority is mutually only
It is vertical;Authentication management method and system is verified to subscriber terminal equipment, and (is changed to:Coordinating) brush subscriber card carries out checking and steps on
Record, greatly enhances the security performance of operation system;For financial payment operation system, there is provided double certification, Gao An is met
Full certification demand;Each operation system function point is associated with module, and module can be reused between different system, greatly reduce development cost
And management cost;The authentication management method and system of the present invention supports the single-sign-on of user, realizes a user account
The management mode of multiple operation systems is managed, old multiple user account management is also compensate for while improving the efficiency of management multiple
The management defect of operation system.
Claims (10)
1. a kind of authentication management method suitable for high security operation system:It is characterized in that:Methods described includes following step
Suddenly:
Step 1:The communications protocol between operation system and authentication management system communication interface is defined, and builds operation system with mirror
Reading program between right management system interface;
Step 2:Authentication management system obtains the user equipment end message of access service system;
Step 3:Authentication management system verifies the legitimacy of the device end information, if legal, by device end information
Operation system is back to, does not otherwise allow to access;
Step 4:Operation system logs in letter according to the device end information alert user input user that authentication management system sends
Breath, and user login information is sent to into authentication management system;
Step 5:Authentication management system verifies the legitimacy of user login information, and generates a unique session-id, and authenticates pipe
The unique session-id is sent to operation system by reason system;
Step 6:User applies for function point in operation system, function point and unique session that operation system applies for the user
ID is sent to authentication management system;
Step 7:The function point request and unique session-id that authentication management system is sended over according to operation system in step 6 is carried out
Whether function point authority judges, and will have and be back to operation system using function point authority judged result;
Step 8:User is fulfiled assignment using operation system and is exited, and operation system to authentication management system sends unique session-id
And exit request;
Step 9:Authentication management system releases authentication management system and business system according to the unique session-id sent in step 8
The communication of system simultaneously deletes unique session-id.
2. method according to claim 1, it is characterised in that:Also include in step 2:Using the mandate of authentication management system
Reading device end information, the device end information is to verify the unique mark of device end legitimacy to program;And high safety
The operation system that operation system is used including production environment, payment management platform.
3. method according to claim 1, it is characterised in that:Device end information therein includes:IP address, MAC Address;
Device end includes:Computer or mobile communication equipment.
4. method according to claim 1, it is characterised in that:Before step 2, also include, note in authentication management system
Volume the device end information;Before step 4, also include:User needs first to become legal use in authentication management system registration checking
Family.
5. method according to claim 1, it is characterised in that:Also include in step 4:Authentication management system is to User logs in
Information is verified, and judges whether user has available operation system, if without available operation system, pointing out to be canceled
User and exit;The user is otherwise allowed to conduct interviews;And the user login information includes:User name, password, brush user
Card.
6. method according to claim 1, it is characterised in that:Also include in steps of 5:Different operation systems is by being
System code is distinguished, and each operation system has system code and corresponding system example, User logs in operation system
When, system code that authentication management system end obtains user institute registering service system, authentication management system management end according to
Whether system code checking user has the logon rights of the operation system, if user is not logged on authority, do not allow to use
Family logs in, and otherwise user's access authentication management system is communicated.
7. method according to claim 1, it is characterised in that:Also include in step 6:Each operation is independently become into one
Item function point, authentication management system combination in any function point simultaneously gives a role function point combination permission, by role's dynamic
Distribution function point authority is to user;In this way, role is dynamically managed;Additionally, each operation system has oneself
Independent a set of role and user role relation, the logically rights management of each operation system is independent mutually.
8. method according to claim 1, it is characterised in that:The function point of each operation system is associated with module, not of the same trade or business
The module of business system can be reused, and be managed collectively the function point of modules, and each operation system is integrated its authority plan
Omit and standard is done unified configuration and managed, then can be with single-sign-on between different business systems.
9. method according to claim 1, it is characterised in that:Also include in step 7:Authentication management system is weighed to function point
When limit judges, if user does not have enough authorities, need second user weighting to carry out double certification, then need second user to carry out
Simultaneously brush subscriber card is weighted checking judgement to input username and password, and user just can use after judging to have enough authorities
The function point of application.
10. a kind of authentication management system suitable for high security operation system, it is characterised in that:The authentication management system bag
Include:
Multiple communication interfaces, authentication management system carries out conversational communication by the plurality of communication interface and operation system;
Read module:Authentication management system obtains the user equipment end message of access service system by the read module;
End message validity judgement module:Authentication management system described in the end message validity judgement module verification by setting
The legitimacy of standby end message, if legal, by device end information operation system is back to, and does not otherwise allow to access;
Checking user login information legitimacy module:Authentication management system is by verifying user login information legitimacy module verification
The legitimacy of user login information, and a unique session-id is generated, and authentication management system is sent to the unique session-id
Operation system;
Function point authority judge module:The user function that authentication management system function point authority judge module sends operation system
Whether point access request and unique session-id carry out function point authority judgement, and will have and be returned using function point authority judged result
It is back to operation system;
Exit and removing module:User is fulfiled assignment using operation system and is exited, and operation system to authentication management system sends
Unique session-id and exit request;Unique session that authentication management system is exited and removing module sends according to operation system
ID releases the communication between authentication management system and operation system and deletes unique session-id;
In addition, operation system includes:Generate user login information module:Operation system is according to setting that authentication management system sends
Standby end message points out user input user's logon information, generates user login information and the user login information is sent to into mirror
Right management system;
Multiple function points, user can apply for function point in operation system, operation system by the function point of user's application with
And unique session-id is sent to authentication management system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410246121.4A CN103986734B (en) | 2014-06-05 | 2014-06-05 | Authentication management method and authentication management system applicable to high-security service system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410246121.4A CN103986734B (en) | 2014-06-05 | 2014-06-05 | Authentication management method and authentication management system applicable to high-security service system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103986734A CN103986734A (en) | 2014-08-13 |
CN103986734B true CN103986734B (en) | 2017-04-19 |
Family
ID=51278559
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410246121.4A Active CN103986734B (en) | 2014-06-05 | 2014-06-05 | Authentication management method and authentication management system applicable to high-security service system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103986734B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104410640B (en) * | 2014-12-03 | 2019-04-16 | 广东威创视讯科技股份有限公司 | A kind of authority control method and system of the acquisition of information under distributed cooperation environment |
CN104836816B (en) * | 2015-06-04 | 2018-03-06 | 山西辰涵数字传媒股份有限公司 | A kind of mobile device data storage method |
CN104935599B (en) * | 2015-06-18 | 2018-10-16 | 北京京东尚科信息技术有限公司 | A kind of general-purpose rights control management method and system |
CN107133505B (en) * | 2017-03-30 | 2020-07-31 | 武汉斗鱼网络科技有限公司 | Authority management method, authentication method and system |
CN113958108A (en) * | 2020-11-25 | 2022-01-21 | 广州三叠纪元智能科技有限公司 | Electric box control method, electric box, server and storage medium |
CN112364381A (en) * | 2020-11-25 | 2021-02-12 | 广州三叠纪元智能科技有限公司 | Authority management method, electronic box, server and storage medium |
CN113742746A (en) * | 2021-08-27 | 2021-12-03 | 北京航天云路有限公司 | Combined authentication authority management system and method based on annotation realization |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5668876A (en) * | 1994-06-24 | 1997-09-16 | Telefonaktiebolaget Lm Ericsson | User authentication method and apparatus |
CN102883264A (en) * | 2012-09-19 | 2013-01-16 | 中国联合网络通信集团有限公司 | Positioning service privacy authentication method, application terminal and service capacity open platform |
CN102932385A (en) * | 2011-08-09 | 2013-02-13 | 中兴通讯股份有限公司 | Business processing method and device of ubiquitous terminal |
-
2014
- 2014-06-05 CN CN201410246121.4A patent/CN103986734B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5668876A (en) * | 1994-06-24 | 1997-09-16 | Telefonaktiebolaget Lm Ericsson | User authentication method and apparatus |
CN102932385A (en) * | 2011-08-09 | 2013-02-13 | 中兴通讯股份有限公司 | Business processing method and device of ubiquitous terminal |
CN102883264A (en) * | 2012-09-19 | 2013-01-16 | 中国联合网络通信集团有限公司 | Positioning service privacy authentication method, application terminal and service capacity open platform |
Also Published As
Publication number | Publication date |
---|---|
CN103986734A (en) | 2014-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103986734B (en) | Authentication management method and authentication management system applicable to high-security service system | |
CN101515932B (en) | Method and system for accessing Web service safely | |
CN101202753B (en) | Method and device for accessing plug-in connector applied system by client terminal | |
CA2868896C (en) | Secure mobile framework | |
CN102655494B (en) | SAML (Security Assertion Markup Language)-based authentication platform designed in single log-in mode | |
CN101159557B (en) | Single point logging method, device and system | |
US7788711B1 (en) | Method and system for transferring identity assertion information between trusted partner sites in a network using artifacts | |
CN104158824B (en) | Genuine cyber identification authentication method and system | |
CN107342992A (en) | A kind of System right management method, apparatus and computer-readable recording medium | |
CN103986584A (en) | Double-factor identity verification method based on intelligent equipment | |
CN108650212A (en) | A kind of Internet of Things certification and access control method and Internet of Things security gateway system | |
CN102457509B (en) | Cloud computing resources safety access method, Apparatus and system | |
US20070240202A1 (en) | Authentication service for facilitating access to services | |
CN107172054A (en) | A kind of purview certification method based on CAS, apparatus and system | |
CN107733861A (en) | It is a kind of based on enterprise-level intranet and extranet environment without password login implementation method | |
CN110417820A (en) | Processing method, device and the readable storage medium storing program for executing of single-node login system | |
CN100512107C (en) | Security identification method | |
CN101321064A (en) | Information system access control method and apparatus based on digital certificate technique | |
CN103152179A (en) | Uniform identity authentication method suitable for multiple application systems | |
CN110149328A (en) | Interface method for authenticating, device, equipment and computer readable storage medium | |
CN103856332A (en) | Implementation method of one-to-multiple account mapping binding of convenient and rapid multi-screen multi-factor WEB identity authentication | |
CN112580006A (en) | Access right control method and device of multi-cloud system and authentication server | |
CN105162775A (en) | Logging method and device of virtual machine | |
US20070260875A1 (en) | Method and apparatus for preferred business partner access in public wireless local area networks (LANS) | |
CN100365974C (en) | Device and method for controlling computer access |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |