CN104065616B - Single-point logging method and system - Google Patents

Single-point logging method and system Download PDF

Info

Publication number
CN104065616B
CN104065616B CN201310089647.1A CN201310089647A CN104065616B CN 104065616 B CN104065616 B CN 104065616B CN 201310089647 A CN201310089647 A CN 201310089647A CN 104065616 B CN104065616 B CN 104065616B
Authority
CN
China
Prior art keywords
application
middleware
logging
authentication
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310089647.1A
Other languages
Chinese (zh)
Other versions
CN104065616A (en
Inventor
路晓明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201310089647.1A priority Critical patent/CN104065616B/en
Publication of CN104065616A publication Critical patent/CN104065616A/en
Application granted granted Critical
Publication of CN104065616B publication Critical patent/CN104065616B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of single-point logging method and system, it is used to solve that the single-sign-on scheme of prior art offer is present the problems such as opening browser must be triggered by starting client carry out single-sign-on.Method includes:First application sends the logging request comprising the automated log on authorization message to the middleware being arranged in user terminal;Middleware receive logging request after, obtain with certificate server agreement shared key, and according to shared key and specify information, verify automated log on authorization message it is correct after, obtain logging on authentication;Logging on authentication is supplied to the first application by middleware;Logging on authentication is sent to application server by the first application;Wherein:Logging on authentication is used to characterize the certification that user terminal has successfully obtained certificate server.

Description

Single-point logging method and system
Technical field
The present invention relates to field of data service, more particularly to a kind of single-point logging method and system.
Background technology
" single-sign-on " is that a kind of business very common on current internet logs in form, and user can be allowed once to recognize Card, repeatedly logs in, to avoid user from repeatedly inputting password, so as to improve the experience that user uses business.Such as, when client When once accessing application server 1, because now client was also not logged on any application server, therefore can be directed into Logged in certificate server;According to the log-on message that client is provided, certificate server carries out identity effect, if passed through Effect, then can return to one authority of certification of client --- ticket;When client visits again other application server When, when such as accessing application server 2, this ticket will be taken, as itself by the authority of certification;Other application Server is received after the access request with tichket, and the ticket can be sent to certificate server carries out effect, is checked The legitimacy of ticket;If by verification, client can just access application server 2 in the case of without logging on .
The many web oriented applications of current single-sign-on scheme, that is, need to borrow the redirection mechanism and session pipe of browser Reason mechanism keeps the logging status of user and is transmitted between different business, and such scheme is difficult to support across client and browse The single-sign-on of device.Specifically, following two classes demands are that the such scheme that prior art is provided is implacable:
First kind demand:After user is logined successfully using client, certain service page is opened on a web browser, can be automatic Logined successfully with the user identity of client;
Equations of The Second Kind demand:After user is logined successfully using browser, certain local client is run, client can be automatic Login successfully.
For first kind demand, there is technology to propose the single-point of realization as shown in Figure 1 from client to browser at present Login scheme.The implementation process of the program mainly comprises the steps:
First, client is successfully logged onto certificate server, and recognized after the login for receiving user input is instructed Demonstrate,prove the certification authority of server feedback(Ticket as previously described);
Client after the access instruction application link that is provided of client is provided and is produced by user is detected, root According to the certification authority that certificate server feeds back, generate identity documents and construct the URL comprising the identity documents;
Client is by calling browser so that browser is according to the above-mentioned URL comprising identity documents for generating to application Server sends access request;
Then, the identity documents for being included in the request of application server request certificate server authentication-access;
Certificate server verifies to identity documents, and verifying client after Successful login, to application service Device feedback validation result;
Finally, the information of the page after login is sent to browser and is shown by application server according to the result.
Above-mentioned flow shown in Fig. 1 is primarily present both sides defect:
1st, opening browser must be triggered by starting client by user, without supporting user's manual unlocking browser Carry out single-sign-on;
2nd, previously described Equations of The Second Kind demand can not be met.
The content of the invention
The embodiment of the present invention provides a kind of single-point logging method and system, is used to solve the single-sign-on of prior art offer What scheme was present must trigger opening browser by starting client carries out single-sign-on, and does not support previously described The problem of Equations of The Second Kind demand.
The embodiment of the present invention uses following technical scheme:
A kind of single-point logging method, including:
The first application being arranged in user terminal obtains automated log on authorization message;And to being arranged at the user terminal In middleware send comprising the automated log on authorization message logging request;Wherein:Automated log on authorization message is by recognizing Card server is performed using shared key and specify information and calculates the operation of summary and generate;The middleware is stepped on described in receiving After record request, the shared key with certificate server agreement is obtained, and according to the shared key and the specified letter Breath, verify automated log on authorization message in the logging request it is correct after, obtain logging on authentication;Wherein:It is described log in Demonstrate,prove the certification that the certificate server has been successfully obtained for characterizing the user terminal;The middleware provides logging on authentication To the first application;Logging on authentication is sent to application server by the first application.
A kind of single-node login system, including the first application in user terminal and middleware are arranged at, wherein:
First application, for obtaining automated log on authorization message;And sent comprising described automatic to the middleware Log in the logging request of authorization message;And obtain the logging on authentication that the middleware is provided, and logging on authentication is sent to should Use server;Wherein:Automated log on authorization message is to perform calculating using shared key and specify information by certificate server to pluck The operation wanted and generate;
The middleware, it is described with what certificate server was arranged for after the logging request is received, obtaining Shared key, and according to the shared key and the specify information, the automated log on verified in the logging request is awarded After power information is correct, obtains logging on authentication and be supplied to first application;Wherein:The logging on authentication is used to characterize the use Family terminal has successfully obtained the certification of the certificate server.
The embodiment of the present invention has the beneficial effect that:
The single-sign-on mandate of the successful user terminal of certification can be supplied to believe with access authentication server by setting The middleware of breath, from regardless of whether user terminal is to access application server using browser or client, can be according in Between part obtain single-sign-on authorization message, successfully realize the single-sign-on of user terminal.This is just met above in background skill The Equations of The Second Kind demand mentioned in art, solve prior art offer single-sign-on scheme exist must be by starting client And triggering opening browser carries out single-sign-on, and the problem of previously described Equations of The Second Kind demand is not supported.
Brief description of the drawings
Fig. 1 is the single-sign-on scheme from client to browser of the prior art;
Fig. 2 is a kind of idiographic flow schematic diagram of single-point logging method provided in an embodiment of the present invention;
Fig. 3 is the system structure diagram for realizing embodiment 1 and embodiment 2;
Fig. 4 implements schematic flow sheet for embodiment 1;
Fig. 5 implements schematic flow sheet for embodiment 2.
Specific embodiment
Opening must be triggered by starting client in order to what the single-sign-on scheme for solving prior art offer was present Browser carries out single-sign-on, and does not support the problem of previously described Equations of The Second Kind demand, the embodiment of the invention provides one Plant new single-sign-on scheme.The program can be supplied to the successful user terminal of certification by setting with access authentication server Single-sign-on authorization message middleware, from regardless of whether user terminal is to access application service using browser or client Device, the single-sign-on authorization message that can be obtained according to middleware, successfully realizes the single-sign-on of user terminal.
Embodiments of the invention are illustrated below in conjunction with Figure of description, it will be appreciated that implementation described herein Example is merely to illustrate and explain the present invention, and is not intended to limit the invention.And in the case where not conflicting, the reality in this explanation The feature applied example and implement in row can be combined with each other.
First, the embodiment of the present invention provides a kind of single-point logging method as shown in Figure 2.The method mainly includes following steps Suddenly:
Step 21, the first application being arranged in user terminal obtains automated log on authorization message;
Different from prior art, in the embodiment of the present invention, the first application is somebody's turn to do certainly when being intended to access certain server, it is necessary to first obtain It is dynamic to log in authorization message.The automated log on authorization message is usually to use shared key and specify information to perform by certificate server Calculate the operation of summary and generate.First application can be, but not limited to obtain this by one of following two ways automatic Log in authorization message:
Mode one:First application from the memory space of user terminal, reading be pre-set in the memory space from It is dynamic to log in authorization message.Such as, this just can be stored in its memory space automatic when Default Value is carried out to user terminal Log in authorization message.
Mode two:First application sends service request to application server;And receive application server according to the business please Negate the automated log on authorization message of feedback.Wherein:The automated log on authorization message that application server feeds back according to the service request The process that implements can be as follows:
First, application server sends to certificate server and includes the application server after the service request is received Mark certification request;
Then, certificate server receives certification request, and judges that the mark of the application server included in certification request is It is no to be present in the logo collection for prestoring;Wherein:The logo collection is by allowing to be accessed for the mark structure of application server Into;
Finally, certificate server sends automated log on authorization message when judged result is to be to application server;Using The automated log on authorization message that server sends certificate server is transmitted to user terminal, so that first steps on automatically using acquisition Record authorization message.
Advantage using aforesaid way two is:Can control first application only possess access pre-set allow be interviewed The authority of the application server asked.Due to allowing of pre-setting, to be accessed for application server often legal for what is be verified Application server, therefore employing mode two can to a certain extent avoid first using the illegal application server of access The problems such as user profile for causing is revealed, so as to improve the legitimacy of whole single-sign-on scheme.
Step 22, the first application sends to the middleware being arranged in user terminal to be believed comprising the automated log on mandate for obtaining The logging request of breath;
Wherein:Middleware described here can be provided in software module, or software and hardware in user terminal The entity module being implemented in combination with.And the entity module may be disposed inside user terminal, it is also possible to be placed in outside user terminal.When When it is placed in user terminal outside, it may be coupled to user terminal and carries out information exchange with user terminal.
Step 23, after middleware receives the logging request, obtains the shared key with certificate server agreement;
Wherein:It is as follows that middleware acquisition implements flow with the one kind for the shared key that certificate server is arranged:
First, the middleware logging on authentication that middleware access authentication server sends;Wherein:Middleware logging on authentication is to recognize Card server authentication goes out what is correctly sent afterwards by the transmitted user authentication information of the second application in user terminal;
Then, middleware logging on authentication is sent to certificate server by middleware;
Finally, to receive certificate server shared close verify that the middleware logging on authentication correctly sends afterwards for middleware Key.Or, authentication proof server verify the middleware logging on authentication it is correct after, it is also possible to send shared close to the middleware Key generates information, and information is generated according to the shared key by the middleware, generates shared key.
Or, middleware directly according to the key schedule arranged with certificate server in advance can also generate this and be total to Enjoy key.
Step 24, middleware according to obtain the shared key and previously described specify information, checking logging request in Automated log on authorization message it is whether correct, when the result is the correct automated log on authorization message, perform step 25, it is no Flow can then be terminated;
Step 25, middleware obtains logging on authentication;
The logging on authentication is used to characterize the certification that user terminal has successfully obtained certificate server.
Such as, in a kind of concrete implementation mode of the method provided in an embodiment of the present invention, middleware and authentication service A shared key K and counter C can be set in device.After then middleware receives the logging request of the first application, can be with profit A random number R is generated at random with the counter(That is challenging value)The first application is returned to, R is sent to certification clothes by the first application Business device;Certificate server calculates summary H1 using shared key K and R, and returns to the as automated log on authorization message using H1 The H1 is returned to middleware by one application, the first application;Middleware using K verify H1, if verify K it is correct if, middleware Just use shared key K and C and other information(The particular content of other information described here can be found in embodiment hereinafter 1)Calculate summary H2, and using the H2 that generates as logging on authentication.
Additionally, the logging on authentication can also be the user for being supplied to by certificate server and successfully obtaining certificate server certification Terminal, and store in the user terminal.
Or, the logging on authentication can also be the single-sign-on authorization message generation that middleware is provided according to certificate server 's.Wherein:The single-sign-on authorization message characterizes the certification that user terminal has successfully obtained certificate server.For logging on authentication This kind of acquisition pattern, if middleware had just been obtained and deposited before the transmitted logging request of the first application is received Single-sign-on authorization message is stored up, then middleware is after the logging request is received, it is possible to directly from the memory space of itself Middle acquisition single-sign-on authorization message, and using it as logging on authentication.And if middleware is when the logging request is received, also Single-sign-on authorization message is not obtained, then middleware can send using the logging request as trigger condition to certificate server User authentication information(Generally username and password), and access authentication server verify user authentication information it is correct after carry The single-sign-on authorization message for supplying.
Logging on authentication is supplied to the first application by step 26, middleware;
Logging on authentication is sent to application server by step 27, the first application, and flow terminates.
In the embodiment of the present invention, the specify information utilized during certificate server generation automated log on authorization message can be The challenging value that first application sends.Under the scene, 21 the step of the above method before can further include following two Step:
Step one:Middleware generates challenging value at random after the login identity request that the first application sends is received;
Step 2:Middleware is responded to the identity that the first application sends the challenging value comprising generation, so that first The challenging value is sent using to certificate server.
In the embodiment of the present invention, above-mentioned first application can be browser, or the other application in addition to browser. Distinguished with prior art, using scheme provided in an embodiment of the present invention after, either what kind of application, its be intended to When logging in application server, all automated log on authorization message and logging request can be sent to the middleware, to obtain logging on authentication. This just meets Equations of The Second Kind demand stated in the background above, and the single-sign-on scheme for solving prior art offer is deposited The opening browser that must be triggered by starting client carry out single-sign-on, and do not support previously described Equations of The Second Kind The problem of demand.
In the embodiment of the present invention, the first application can be browser, and the second application can be answered for other of non-browser With;Or second application be browser, and first application for non-browser other application.Specifically, when the second application is to browse Device, and first application for non-browser client when, the Equations of The Second Kind demand described in background technology can be met.
Below by taking two specific embodiments as an example, describe in detail scheme provided in an embodiment of the present invention in practice should With.
Embodiment 1
Embodiment 1 is used for single-sign-on flow of the realization from client to browser, that is, realize that user steps on the client After recording successfully, certain service page is opened on a web browser, can be logined successfully with the user identity of client automatically.
For realizing the system structure diagram of embodiment 1 as shown in figure 3, including user terminal, application server and recognizing Card server.Wherein:Applied comprising multiple in user terminal, those applications include the application of browser and non-browser.Tool Body ground, the application of non-browser is indicated with " client " and " Web applications " in figure 3.
Based on the system shown in Fig. 3, detailed description below embodiment 1 implements flow.The flow is included such as Fig. 4 institutes The following step shown:
Step 41, after user terminal successfully passes the certification of certificate server, access authentication server is returned to user terminal The user key K for returning, and K is stored in the middleware being arranged in user terminal;
Specifically, user terminal can on a display screen show after the client operating instruction for receiving user input User authentication information inputting interface;Then, by the user authentication information of user input(Generally comprise username and password)Send It is authenticated to certificate server.After the user authentication information is confirmed as correctly by the verification of certificate server, use Family terminal is obtained with the K of certificate server feedback.
Step 42, after user terminal receives the application server access instruction in user input to browser, to application Server sends access request;
Such as, user terminal is after the application server domain name in receiving user input to browser, according to the domain name, Access request is sent to corresponding application server.
Browser is redirected to certificate server by step 43, application server;
Step 44, certificate server to browser return authentication page info, wherein:In the certification page information remove comprising It is displayed in outside the content in browser window, also comprising the script of browser local runtime(Such as javascript scripts);
Step 45, browser is triggered to be sent to local middleware listening port and stepped on by calling the javascript scripts Record identity request;
Whether step 46, middleware judges user terminal has successfully passed the certification of certificate server, and such as judged result is When, then middleware is responded to the identity that browser returns to user(Comprising ID and challenging value), and continue executing with step Rapid 47, otherwise, middleware returns to user terminal and is not logged in notification message to browser, and terminates the single-sign-on flow;
Usually, whether can be stored with according to itself K of certificate server transmission of middleware is judging user terminal The no certification for having successfully passed certificate server.
Additionally, above-mentioned challenging value can be, but not limited to be middleware generation a random number.
Optionally, some additional informations can also be included in the identity response of the user that middleware is returned to browser (Such as browser is sent to the system time of the user terminal of certificate server, the URL of browser institute accession page or some are solid Determine character string etc.).
Step 47, browser sends ID and the challenging value that middleware is returned to certificate server, automatic to ask Log in and authorize;
Step 48, in ID and the corresponding relation of user key that certificate server is stored from itself, it is determined that browsing The corresponding user key K of ID that device sends, and the challenging value and some other additional letter sent to browser using K Breath(Such as browser be sent to the system time of the user terminal of certificate server, the URL of browser institute accession page or some Fixed character string etc.)Summary is calculated, automated log on authorization message is generated, and the automated log on authorization message for generating is returned to Browser;
Step 49, browser is triggered and sends identity documents acquisition request to middleware by calling javascript scripts, Automated log on authorization message is carried in the request;
Step 410, middleware verifies the correctness of automated log on authorization message using the K for itself storing, if correctly, giving birth to Into logging on authentication;
Wherein:The logging on authentication of generation is supplied to the single-sign-on authorization message of user terminal comprising certificate server.
Such as, because K is the information that certificate server sends to the user terminal of success identity, therefore K can characterize use Family terminal can carry out single-sign-on, be supplied to the single-sign-on mandate of user terminal to believe so that K can be considered as certificate server Breath.Or, certificate server can also be after the certification to user terminal be successfully realized, there is provided some other information is used as single-point Log in authorization message.
Step 411, middleware returns to logging on authentication to browser;
Step 412, browser sends logging on authentication to certificate server, and certificate server is to verify logging on authentication correct Afterwards, identity documents are generated, and browser is redirected to application server;Browser when application server is redirected to, to Application server sends the above-mentioned identity documents that certificate server is supplied to browser;
Optionally, certificate server can also be when application server be redirected to by browser, the body that will directly generate Part voucher is sent to application server.
Step 413, application server inquires about the correctness of the identity documents of its acquisition to certificate server;
Step 414, application server inquiry obtain the identity documents it is correct after, returned to logining successfully to browser The information of the page after the login that user terminal is shown.
By above-mentioned steps, can be obtained and authentication storage server is supplied to due to being provided with one in the user terminal The middleware of the single-sign-on authorization message of the successful user terminal of certification, so that user is successfully realizing using using client After the certification of family terminal, subsequently when using browser access application server, it is possible to stepped on according to the single-point that middleware is stored Record authorization message, successfully realizes the single-sign-on of user terminal.
Embodiment 2
For realizing the system structure diagram of embodiment 2 still as shown in figure 3, including user terminal, application server And certificate server.
Based on the system shown in Fig. 3, detailed description below embodiment 2 implements flow.The flow is included such as Fig. 5 institutes The following step shown:
Step 51, user terminal receives the user authentication information of user input browser, and utilizes the user authentication information Access authentication server authentication;
Step 52, browser asks middleware logging on authentication to certificate server;
In embodiment 2, browser can be by the way of service request be sent to application server, please to certificate server Seek middleware logging on authentication.
Step 53, certificate server returns to middleware logging on authentication to browser;
If browser uses to the mode of application server transmission service request to ask middleware logging on authentication, Application server can send recognizing for the mark comprising the application server after the service request is received to certificate server Card request;
Certificate server is receiving the certification request, and judging the mark of the application server included in certification request is It is no to be present in the logo collection for prestoring;Wherein:The logo collection is by allowing to be accessed for the mark structure of application server Into;
When if the determination result is YES, then certificate server sends automated log on authorization message to application server;Wherein:Should Automated log on authorization message can be using the operation of user key and specify information execution calculating summary by certificate server Generation;
Application server receive certificate server transmission automated log on authorization message after, by the automated log on mandate Information and middleware logging on authentication are sent to user terminal so that the first application obtain automated log on authorization message and middleware with Card.
Middleware logging on authentication is sent to middleware by step 54, browser by local method call middleware;
Such as, when installing middleware in the user terminal, middleware can register locally applied agreement(Such as:sso://), Then the browser page in user terminal can assemble URL when middleware is called according to call parameters param(Such as sso:// param), and browser is redirected to the URL, then browser is according to locally applied agreement(Such as sso//)Note can just be found The middleware process of the volume agreement, and calls the process, so as to realize calling middleware.
Step 55, middleware sends certification request to certificate server, and middleware logging on authentication is carried in the certification request;
Step 56, certificate server checks the correctness of middleware logging on authentication;
Step 57, certificate server is responded, together after verifying that middleware logging on authentication is correct to middleware return authentication Shi Shuanfang consults the shared user key of generation, and the user key can serve as certificate server and be supplied to certification successfully described The single-sign-on authorization message of user terminal;
Step 58, client receive user input enable instruction after, by calling middleware acquisition of credentials interface, to Middleware sends the logging request of request logging on authentication;
If browser have also obtained automated log on authorization message, also be sent to for the automated log on authorization message by browser Middleware.
Step 59, middleware calculates generation logging on authentication and returns to client locally according to user key;
Optionally, if middleware receives the automated log on authorization message of browser transmission, middleware can be according to user Key and specify information, verify the automated log on authorization message it is correct after, regeneration logging on authentication simultaneously return to client.
Step 510, client sends certification request to application server, and stepping on for middleware return is carried in the certification request Record voucher;
Usually, in order that certificate server can identify the user that the logging on authentication is belonged to, what client sent ID can also be carried in the certification request.
Step 511, what is carried in the certification request that application server is sent to certificate server requests verification client steps on Voucher is recorded, and receives certificate server and verifying the notification message that the logging on authentication correctly sends afterwards;
Assuming that also carrying ID in certification request, then the ID can be also sent to certification by application server Server.Certificate server after ID and logging on authentication is received, in the ID and user key that prestore Corresponding relation in, search user key corresponding with the ID for receiving;And compare the user key that finds and Whether the user key parsed from logging on authentication is consistent;When comparative result is consistent, determine that the logging on authentication is correct, it is no Then determine that the logging on authentication is incorrect.
Step 512, application server is returned for characterizing the information for logining successfully to client.
The above-mentioned steps included by embodiment 2, user after the certification for successfully realizing user terminal using browser, after Continue when application server is accessed using client, it is possible to which, according to the single-sign-on authorization message that middleware is stored, success is real The single-sign-on of existing user terminal.This also just meets Equations of The Second Kind demand stated in the background above, so as to solve What the single-sign-on scheme that prior art is provided was present must trigger opening browser by starting client carries out single-point and steps on Record, and the problem for not supporting previously described Equations of The Second Kind demand.
What deserves to be explained is, the either middleware in embodiment 1 or embodiment 2, it can possess and is taken to certification Business device sends user authentication information, so that access authentication server is supplied to the single-sign-on mandate of the successful user terminal of certification The function of information.Therefore, even if browser(Or client)During to Middleware Request logging on authentication, middleware also there is no list Point logs in authorization message, and middleware can also be with browser(Or client)The message conduct for asking logging on authentication for sending Trigger condition, sends user authentication information, so that access authentication server is supplied to the successful user of certification to certificate server The single-sign-on authorization message of terminal, and based on the single-sign-on authorization message, to browser(Or client)There is provided log in Card.
For with previously described single-point logging method identical inventive concept, the embodiment of the present invention also provides a kind of single-point Login system, be used to solve the single-sign-on scheme presence of prior art offer must trigger opening by starting client Browser carries out single-sign-on, and does not support the problem of previously described Equations of The Second Kind demand.The system mainly includes being arranged at The first application and middleware in user terminal, wherein:The function of the first application and middleware is as follows:
First application, for obtaining automated log on authorization message;And awarded comprising the automated log on for obtaining to middleware transmission The logging request of power information;And the logging on authentication that middleware is provided is obtained, and logging on authentication is sent to application server;Its In:Automated log on authorization message is to be performed to calculate the operation of summary and give birth to using shared key and specify information by certificate server Into;
Middleware, for the shared key for after logging request is received, obtaining and certificate server is arranged, and According to shared key and specify information, verify automated log on authorization message in logging request it is correct after, obtain logging on authentication And it is supplied to the first application;Wherein:Logging on authentication is used to characterize the certification that user terminal has successfully obtained certificate server.
Optionally, the first application specifically can be used for:
From the memory space of user terminal, reading is pre-set at the automated log on mandate letter in the memory space Breath;Or
Service request is sent to application server;And obtain application server and automatic stepped on according to what the service request was fed back Record authorization message.
Wherein:Application server is specifically included according to the process that service request feeds back automated log on authorization message:
Application server sends the mark comprising the application server after service request is received to certificate server Certification request;
Certificate server receive certification request, and judge the application server included in certification request identify whether exist In the logo collection for prestoring;Wherein:The logo collection is constituted by allowing the mark for being accessed for application server;
Certificate server sends automated log on authorization message when judged result is to be to application server;
The automated log on authorization message that application server sends certificate server is transmitted to user terminal, so that first should With acquisition automated log on authorization message.
Optionally, first application that designates the information as being utilized during certificate server generation automated log on authorization message sends Challenging value.Under such a scenario, middleware can be also used for:Before automated log on authorization message is obtained, the is being received After the login identity request that one application sends, challenging value is generated at random;The identity comprising challenging value is sent to the first application Response;Then the first application is additionally operable to send challenging value to certificate server.
Optionally, the middleware provided in an embodiment of the present invention specifically can be used for:During access authentication server sends Between part logging on authentication, wherein:Middleware logging on authentication be certificate server verify by user terminal second application sent out What the user authentication information sent correctly sent afterwards;Middleware logging on authentication is sent to certificate server;And receive authentication service Device is verifying the shared key that middleware logging on authentication correctly sends afterwards;Or middleware is being verified according to authentication proof server The shared key generation information that logging on authentication correctly sends afterwards, generates shared key.Or, the middleware can specifically be used In:According to the key schedule arranged with certificate server in advance, shared key is generated.
Optionally, the first application can be browser, then the second application can be the other application of non-browser;Or second Using that can be browser, then the first application can be the other application of non-browser.Or first application and the second application it is equal It can be browser;Or first application and second application can be non-browser other application.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.And, the present invention can be used and wherein include the computer of computer usable program code at one or more Usable storage medium(Including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)The computer program of upper implementation is produced The form of product.
The present invention is with reference to method according to embodiments of the present invention, equipment(System)And the flow of computer program product Figure and/or block diagram are described.It should be understood that every first-class during flow chart and/or block diagram can be realized by computer program instructions The combination of flow and/or square frame in journey and/or square frame and flow chart and/or block diagram.These computer programs can be provided The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced for reality by the instruction of computer or the computing device of other programmable data processing devices The device of the function of being specified in present one flow of flow chart or multiple one square frame of flow and/or block diagram or multiple square frames.
These computer program instructions may be alternatively stored in can guide computer or other programmable data processing devices with spy In determining the computer-readable memory that mode works so that instruction of the storage in the computer-readable memory is produced and include finger Make the manufacture of device, the command device realize in one flow of flow chart or multiple one square frame of flow and/or block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented treatment, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
, but those skilled in the art once know basic creation although preferred embodiments of the present invention have been described Property concept, then can make other change and modification to these embodiments.So, appended claims are intended to be construed to include excellent Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out various changes and modification without deviating from essence of the invention to the present invention God and scope.So, if these modifications of the invention and modification belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising these changes and modification.

Claims (10)

1. a kind of single-point logging method, it is characterised in that including:
The first application being arranged in user terminal obtains automated log on authorization message, and to being arranged in the user terminal Middleware sends the logging request comprising the automated log on authorization message, wherein:Automated log on authorization message is taken by certification Business device is performed using shared key and specify information and calculates the operation of summary and generate, it is described designate the information as described first should With the challenging value for sending, before first application obtains automated log on authorization message, the middleware is receiving the first application After the login identity request of transmission, the challenging value is generated at random, the middleware sends to the first application and includes the challenge The identity response of value, so that the first application sends the challenging value to certificate server;
After the middleware receives the logging request, the shared key with certificate server agreement is obtained, and in basis The shared key and the specify information, verify automated log on authorization message in the logging request it is correct after, obtain Logging on authentication, wherein:The logging on authentication is used to characterize the certification that the user terminal has successfully obtained the certificate server;
Logging on authentication is supplied to the first application by the middleware;
Logging on authentication is sent to application server by the first application.
2. the method for claim 1, it is characterised in that the first application obtains automated log on authorization message, specifically includes:
From the memory space of the user terminal, reading is pre-set at the automated log in the memory space for first application Authorization message;Or
First application sends service request to application server;
Application server sends recognizing for the mark comprising the application server after the service request is received to certificate server Card request;
Certificate server receive certification request, and judge the application server included in certification request identify whether be present in it is pre- In the logo collection for first storing;Wherein:The logo collection is constituted by allowing the mark for being accessed for application server;
Certificate server sends automated log on authorization message when judged result is to be to application server;
The automated log on authorization message that application server sends certificate server is transmitted to the user terminal, so that first should With acquisition automated log on authorization message.
3. the method for claim 1, it is characterised in that the middleware obtains described common with certificate server agreement Key is enjoyed, is specifically included:
The middleware logging on authentication that the middleware access authentication server sends, wherein:The middleware logging on authentication is to recognize Card server authentication goes out what is correctly sent afterwards by the transmitted user authentication information of the second application in the user terminal;
The middleware logging on authentication is sent to certificate server by the middleware;And
Receive certificate server and verify the shared key that the middleware logging on authentication correctly sends afterwards;Or according to recognizing Card server is verifying the shared key generation information that the middleware logging on authentication correctly sends afterwards, generates described shared close Key.
4. method as claimed in claim 3, it is characterised in that the first application is browser, the second application is non-browser Other application;Or
Second application is browser, and the first application is the other application of non-browser.
5. the method for claim 1, it is characterised in that middleware obtains the shared key with certificate server agreement, Specifically include:
Middleware generates shared key according to the key schedule arranged with certificate server in advance.
6. a kind of single-node login system, it is characterised in that including the first application being arranged in user terminal and middleware, its In:
First application, for obtaining automated log on authorization message;And sent comprising the automated log on to the middleware The logging request of authorization message;And the logging on authentication that the middleware is provided is obtained, and logging on authentication is sent to using clothes Business device;Wherein:Automated log on authorization message is to use shared key and specify information to perform by certificate server to calculate summary Operate and generate, it is described to designate the information as the challenging value that first application sends;
The middleware, it is described shared with certificate server agreement for after the logging request is received, obtaining Key, and according to the shared key and the specify information, verify the automated log on mandate letter in the logging request After breath is correct, obtains logging on authentication and be supplied to first application;Wherein:The logging on authentication is used to characterize user's end End has successfully obtained the certification of the certificate server;
The middleware, is additionally operable to before automated log on authorization message is obtained, and is receiving the login identity that the first application sends After request, the challenging value is generated at random;The identity comprising the challenging value is sent to the described first application to respond;Then
First application is additionally operable to send the challenging value to certificate server.
7. system as claimed in claim 6, it is characterised in that first application specifically for:
From the memory space of the user terminal, reading is pre-set at the automated log on mandate letter in the memory space Breath;Or
Service request is sent to application server;And obtain the application server and automatic stepped on according to what the service request was fed back Record authorization message;
Wherein:The application server is specifically included according to the process that the service request feeds back automated log on authorization message:
Application server sends the mark comprising the application server after the service request is received to certificate server Certification request;Certificate server receive certification request, and judge the application server included in certification request identify whether deposit In being the logo collection for prestoring;Wherein:The logo collection is constituted by allowing the mark for being accessed for application server;Recognize Card server sends automated log on authorization message when judged result is to be to application server;Application server takes certification The automated log on authorization message that business device sends is transmitted to the user terminal, so that first application obtains automated log on mandate Information.
8. system as claimed in claim 6, it is characterised in that the middleware specifically for:
The middleware logging on authentication that access authentication server sends, wherein:The middleware logging on authentication is that certificate server is tested Demonstrate,prove out what is correctly sent afterwards by the transmitted user authentication information of the second application in the user terminal;
The middleware logging on authentication is sent to certificate server by the middleware;And
Receive certificate server and verify the shared key that the middleware logging on authentication correctly sends afterwards;Or according to recognizing Card server is verifying the shared key generation information that the middleware logging on authentication correctly sends afterwards, generates described shared close Key.
9. system as claimed in claim 8, it is characterised in that first application is browser, second application is non- The other application of browser;Or
Second application is browser, and first application is the other application of non-browser.
10. system as claimed in claim 6, it is characterised in that the middleware specifically for:According in advance with the certification The key schedule of server commitment, generates shared key.
CN201310089647.1A 2013-03-20 2013-03-20 Single-point logging method and system Active CN104065616B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310089647.1A CN104065616B (en) 2013-03-20 2013-03-20 Single-point logging method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310089647.1A CN104065616B (en) 2013-03-20 2013-03-20 Single-point logging method and system

Publications (2)

Publication Number Publication Date
CN104065616A CN104065616A (en) 2014-09-24
CN104065616B true CN104065616B (en) 2017-06-20

Family

ID=51553149

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310089647.1A Active CN104065616B (en) 2013-03-20 2013-03-20 Single-point logging method and system

Country Status (1)

Country Link
CN (1) CN104065616B (en)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105790945B (en) * 2014-12-22 2019-09-03 中国移动通信集团公司 A kind of authentication method, device and system realizing user's unique identities and authenticating
CN105812138B (en) * 2014-12-31 2019-05-28 华为技术有限公司 Processing method, device, user terminal and the login system of login
CN104753927B (en) * 2015-03-12 2018-09-04 新华三技术有限公司 A kind of method and apparatus of unified verification
CN106209726B (en) * 2015-04-30 2020-06-05 中兴通讯股份有限公司 Mobile application single sign-on method and device
CN106302606B (en) * 2015-06-08 2019-11-29 中国移动通信集团湖南有限公司 Across the application access method and device of one kind
US10178164B2 (en) 2015-08-31 2019-01-08 Visa International Service Association Secure binding of software application to communication device
CN106982228B (en) * 2017-05-08 2018-10-09 北京深思数盾科技股份有限公司 A kind of realization identity authentication method and system
CN107844712A (en) * 2017-11-03 2018-03-27 北京天融信网络安全技术有限公司 A kind of browser shares the method, apparatus and computer-readable medium of voucher
US10642967B2 (en) * 2017-11-28 2020-05-05 American Express Travel Related Services Company, Inc. Single sign-on solution using blockchain
CN108737398B (en) * 2018-05-09 2022-04-26 平安信托有限责任公司 Processing method and device of trust system, computer equipment and storage medium
CN110795720A (en) * 2018-08-03 2020-02-14 北京京东尚科信息技术有限公司 Information processing method, system, electronic device, and computer-readable medium
CN109246146B (en) * 2018-11-01 2020-10-13 北京京航计算通讯研究所 SAP ERP single sign-on method based on JAVA middleware integration mode
CN109492375B (en) * 2018-11-01 2021-07-16 北京京航计算通讯研究所 SAP ERP single sign-on system based on JAVA middleware integration mode
CN109388937B (en) * 2018-11-05 2022-07-12 用友网络科技股份有限公司 Single sign-on method and sign-on system for multi-factor identity authentication
CN109815674A (en) * 2018-12-28 2019-05-28 深圳竹云科技有限公司 A method of login process is automated based on image recognition
CN111353142A (en) * 2019-02-15 2020-06-30 鸿合科技股份有限公司 User information sharing method and device and electronic equipment
CN110032855A (en) * 2019-02-28 2019-07-19 招银云创(深圳)信息技术有限公司 Login method, device, computer equipment and the storage medium of application
CN110287682B (en) * 2019-07-01 2020-12-04 北京芯盾时代科技有限公司 Login method, device and system
CN110557259A (en) * 2019-08-15 2019-12-10 中国人民银行数字货币研究所 identity management method, device and system based on multiple identities
CN110704130A (en) * 2019-10-10 2020-01-17 深圳前海微众银行股份有限公司 Data processing method and device
CN112948802B (en) * 2020-04-28 2024-03-12 深圳市明源云科技有限公司 Single sign-on method, device, equipment and storage medium
CN111800378B (en) * 2020-05-21 2023-08-11 视联动力信息技术股份有限公司 Login authentication method, device, system and storage medium
CN112804201B (en) * 2020-12-30 2023-04-28 绿盟科技集团股份有限公司 Method and device for acquiring equipment information
CN113572763B (en) * 2021-07-22 2022-10-14 中国工商银行股份有限公司 Data processing method and device, electronic equipment and storage medium
CN113965380B (en) * 2021-10-21 2024-10-15 上海高顿教育科技有限公司 Single sign-on control method and device based on multiple background applications
CN114584353A (en) * 2022-02-23 2022-06-03 上海外服云信息技术有限公司 Single sign-on method for mobile terminal to access CAS
CN116032556B (en) * 2022-12-13 2024-08-16 支付宝(杭州)信息技术有限公司 Key negotiation method and device for applet application

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101510877A (en) * 2009-02-25 2009-08-19 中国网络通信集团公司 Single-point logging-on method and system, communication apparatus
CN102065141A (en) * 2010-12-27 2011-05-18 广州欢网科技有限责任公司 Method and system for realizing single sign-on of cross-application and browser
CN102082666A (en) * 2009-11-26 2011-06-01 中国移动通信集团公司 Single login system and method and service management system as well as single login intermediate system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101521660B (en) * 2008-02-27 2012-10-03 华为技术有限公司 Session initiation protocol registry method, certification and authorization method, system and equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101510877A (en) * 2009-02-25 2009-08-19 中国网络通信集团公司 Single-point logging-on method and system, communication apparatus
CN102082666A (en) * 2009-11-26 2011-06-01 中国移动通信集团公司 Single login system and method and service management system as well as single login intermediate system
CN102065141A (en) * 2010-12-27 2011-05-18 广州欢网科技有限责任公司 Method and system for realizing single sign-on of cross-application and browser

Also Published As

Publication number Publication date
CN104065616A (en) 2014-09-24

Similar Documents

Publication Publication Date Title
CN104065616B (en) Single-point logging method and system
US20240080311A1 (en) Managing security credentials
US10171241B2 (en) Step-up authentication for single sign-on
CN108369615B (en) Dynamically updating CAPTCHA challenges
CN108810021B (en) Query system and method for determining verification function
CN105007280B (en) A kind of application login method and device
US9021570B2 (en) System, control method therefor, service providing apparatus, relay apparatus and computer-readable medium
US8819795B2 (en) Presenting managed security credentials to network sites
CN105337949B (en) A kind of SSO authentication method, web server, authentication center and token verify center
US8782768B2 (en) Systems and methods for accessing a virtual desktop
KR102698459B1 (en) Method and system for authenticating transmission of security credentials to a device
JP6044299B2 (en) Data reference system and application authentication method
WO2014048749A1 (en) Inter-domain single sign-on
EP3709592A1 (en) Detecting web application vulnerabilities
US20180026968A1 (en) Managing security credentials
CN111062023B (en) Method and device for realizing single sign-on of multi-application system
CN106656952A (en) Authentication method, device and system for registration equipment
CN106790063A (en) A kind of method of isomery WEB system single-sign-ons
CN112738021A (en) Single sign-on method, terminal, application server, authentication server and medium
CN109388937A (en) A kind of single-point logging method and login system of multiple-factor authentication
CN110069909A (en) It is a kind of to exempt from the close method and device for logging in third party system
CN114385995A (en) Handle-based method for accessing identifier analysis micro-service to industrial Internet and identifier service system
CN113765655A (en) Access control method, device, equipment and storage medium
CN114745156A (en) Distributed single sign-on realization method and device, electronic equipment and storage medium
CN109688109A (en) The verification method and device of identifying code based on client-side information identification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant