CN104270391A - Method and device for processing access request - Google Patents

Method and device for processing access request Download PDF

Info

Publication number
CN104270391A
CN104270391A CN201410575265.4A CN201410575265A CN104270391A CN 104270391 A CN104270391 A CN 104270391A CN 201410575265 A CN201410575265 A CN 201410575265A CN 104270391 A CN104270391 A CN 104270391A
Authority
CN
China
Prior art keywords
application system
user
authentication information
equations
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410575265.4A
Other languages
Chinese (zh)
Other versions
CN104270391B (en
Inventor
王伟
任文涛
赵金鑫
包辰明
胡立强
廖继逢
张舜华
何小锋
郭友德
李观钊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN201410575265.4A priority Critical patent/CN104270391B/en
Publication of CN104270391A publication Critical patent/CN104270391A/en
Application granted granted Critical
Publication of CN104270391B publication Critical patent/CN104270391B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

The embodiment of the invention provides a method and a device for processing an access request. The method comprises the following steps: after a client side receives a request that a user visits a first application system, the request of visiting the first application system is sent to the first application system, the first application system sends first class of authentication information to an authentication server, and the authentication server allows the user to visit the first application system under the situation that the user is determined to log in a second application system according to the first authentication information, wherein the first application system is different from the second application system. Visibly, if the user logs in the second application system, the user is allowed to visit the first application system without repeatedly inputting a user name, a password and other verification information, so that the use of the user is facilitated.

Description

A kind of processing method of access request and device
Technical field
The application relates to network information field, particularly relates to a kind of processing method and device of access request.
Background technology
New technology and the new lifestyle change consumption habit of people, has expedited the emergence of multiple e-commerce platform.The consideration such as user, transaction data safety and technical protection for convenience, large e-commerce platform should have oneself real-time deal communication software, and its main body is instant communication client.
In prior art, user can direct accessed web page by clicking network address in instant communication client, namely when user clicks network address in instant communication client, accessed webpage by browser-presented to user, but this displaying is only limitted to the displaying towards public users, user as need log in, then also need input authentication information in the webpage of browser, log in, visible, said process is not user-friendly.
Application content
The embodiment of the present application provides a kind of processing method and device of access request, after object is to solve and jumps to browser from instant communication client, and the problem of the inconvenient user operation caused because needing user's repeated authentication to log in.
To achieve these goals, the embodiment of the present application provides following technical scheme:
A processing method for access request, comprising:
Authentication server receives first kind authentication information, described first kind authentication information is sent after the request receiving access first application system that described client sends by the first application system, and the request of described access first application system is sent by described client by user;
When determining that described user has logged in the second application system according to described first kind authentication information, described authentication server allows described user to access described first application system, and described first application system is different from described second application system.
Alternatively, described first kind authentication information at least comprises the mark of described user;
Described authentication server determines that described user has logged in the second application system and specifically comprised:
Described queries pre-recorded, whether the difference of the mark that whether there is described user in the user list that logs in described second application system and the request time of described first kind authentication information and the timestamp recorded in preset range, if so, then determine that user has logged in the second application system.
Alternatively, before described authentication server receives first kind authentication information, also comprise:
Described authentication server receives the Equations of The Second Kind authentication information that client sends, described Equations of The Second Kind authentication information sends after described client receives the instruction of described second application system of access that user sends, and described Equations of The Second Kind authentication information at least comprises the mark of described user;
When determining that described Equations of The Second Kind authentication information is legal, the mark of described user is added in the user list logging in described second application system by described authentication server, and record the timestamp that this logs in described second application system, otherwise described authentication server is redirected to the login interface of described second application system.
Alternatively, described authentication server is determined that described Equations of The Second Kind authentication information is legal and is specifically comprised:
The user name that described in described queries, Equations of The Second Kind authentication information comprises and password whether respectively with the information match of described user that stored in described second client server, if, then determine that described Equations of The Second Kind authentication information is legal, described second client server is for storing the information of the registered user of described second application system, and the information of the registered user of the first application system is stored in first user server.
Alternatively, also comprise:
When verifying that described Equations of The Second Kind authentication information is legal, described authentication server sends address that carry in described Equations of The Second Kind authentication information, resource to be visited to described second application system.
Alternatively, also comprise:
Described authentication server receives the mark of described user and the mark of client of described second application system transmission;
Determining that the mark of described user is present in the information of described second application system register user, and when being interposed between in preset range between described user this time logged in and last login time, described authentication server judges that whether resource to be visited is legal;
If legal, then jump to the address of described resource to be visited, if illegal, then jump to the homepage of described second application system, and show logging status.
A processing unit for access request, comprising:
Receiver module, for receiving first kind authentication information, described first kind authentication information is sent after the request receiving access first application system that described client sends by the first application system, and the request of described access first application system is sent by described client by user;
First processing module, for when determining that described user has logged in the second application system according to described first kind authentication information, allow described user to access described first application system, described first application system is different from described second application system.
Alternatively, described first processing module also for:
Inquire about the mark that whether there is described user in user list that is pre-recorded, that log in described second application system and the difference of the request time of described first kind authentication information and the timestamp recorded whether in preset range, if so, then determine that user has logged in the second application system.
Alternatively, also comprise:
Second processing module, for before reception first kind authentication information, receive the Equations of The Second Kind authentication information that client sends, described Equations of The Second Kind authentication information sends after described client receives the instruction of described second application system of access that user sends, and described Equations of The Second Kind authentication information at least comprises the mark of described user; When determining that described Equations of The Second Kind authentication information is legal, the mark of described user is added in the user list logging in described second application system, and record the timestamp that this logs in described second application system, otherwise described authentication server is redirected to the login interface of described second application system.
Alternatively, described second processing module also for: inquire about user name that described Equations of The Second Kind authentication information comprises and password whether respectively with the information match of described user that stored in described second client server, if, then determine that described Equations of The Second Kind authentication information is legal, described second client server is for storing the information of the registered user of described second application system, and the information of the registered user of the first application system is stored in first user server.
Alternatively, described second processing module also for:
When verifying that described Equations of The Second Kind authentication information is legal, send address that carry in described Equations of The Second Kind authentication information, resource to be visited to described second application system.
Alternatively, also comprise:
3rd processing module, for receiving the mark of described user and the mark of client of described second application system transmission; Determining that the mark of described user is present in the information of described second application system register user, and, when being interposed between in preset range between described user this time logged in and last login time, judge that whether resource to be visited is legal; If legal, then jump to the address of described resource to be visited, if illegal, then jump to the homepage of described second application system, and show logging status.
The processing method of access request described in the embodiment of the present application and device, receive after user accesses the request of the first application system in client, the request of access first application system is sent to the first application system, first application system sends first kind authentication information to authentication server, when determining that described user has logged in the second application system according to described first kind authentication information, authentication server allows described user to access described first application system, wherein, described first application system is different from described second application system.Visible, if user has signed in the second application system, be then allowed to access first application system, and repeated to input the authorization information such as user name and password again without the need to user, thus user-friendly.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present application or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the application, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic diagram of the embodiment of the present application application scenarios;
The flow chart of Fig. 2 a kind of processing method of access request disclosed in the embodiment of the present application;
Fig. 3 is the flow chart of the processing method of the embodiment of the present application another access request disclosed;
The structural representation of Fig. 4 a kind of processing unit of access request disclosed in the embodiment of the present application.
Embodiment
The embodiment of the present application can be applied in system as shown in Figure 1, and described system comprises instant communication client, authentication server, the first application system and stores the first user server of information of registered user of the first application system and the second client server of the information of the registered user of the second application system and storage the second application system.Such as, the first application system can be the website platform of financial sector, and the second application system can be the Net silver platform of financial sector.
Below in conjunction with the accompanying drawing in the embodiment of the present application, be clearly and completely described the technical scheme in the embodiment of the present application, obviously, described embodiment is only some embodiments of the present application, instead of whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not making the every other embodiment obtained under creative work prerequisite, all belong to the scope of the application's protection.
The embodiment of the present application provides a kind of processing method of access request, as shown in Figure 2, comprising:
S201: authentication server receives first kind authentication information;
Wherein, described first kind authentication information is sent after the request receiving access first application system that described client sends by the first application system, and the request of described access first application system is sent by described client by user;
S202: when determining that described user has logged in the second application system according to described first kind authentication information, described authentication server allows described user to access described first application system.
Wherein, described first application system is different from described second application system.
In prior art, after jumping to browser from instant communication client, user needs to input on webpage after user name and password usually could log-on webpage, although visible user's access of instant communicating client, still needs to log in after jumping to webpage.
Or, although without the need to logging in when jumping to the webpage of the first application system from instant communication client, still need after jumping to the webpage of the second application system to log in, visible, the mode that existing instant communication client jumps to browser is too loaded down with trivial details, not user-friendly.
And the method described in the present embodiment, as long as user has logged in the second application system, namely by the checking of the second application system, the first application system directly can be signed in, without the need to through again verifying, therefore, it is possible to simplify processes flow process, user-friendly.
The processing method of the embodiment of the present application another access request disclosed, as shown in Figure 3, comprises the following steps:
S301: client receives the instruction of described second application system of access that user sends;
S302: client sends Equations of The Second Kind authentication information to authentication server, described Equations of The Second Kind authentication information comprises the mark of described user, user name and password;
S303: the user name that described in queries, Equations of The Second Kind authentication information comprises and password whether respectively with the information match of described user that stored in described second client server, if so, perform S304, if not, perform S310;
S304: the mark of described user is added in the user list logging in described second application system by authentication server, and the timestamp recording that this logs in described second application system;
S305: authentication server sends address that carry in described Equations of The Second Kind authentication information, resource to be visited to described second application system;
S306: authentication server receives the mark of described user and the mark of client of described second application system transmission;
S307: authentication server judges whether the mark of described user is present in the information of described second application system register user, and whether the interval of this time logged in of described user and last login time is in preset range, if be, perform S308, if not, perform S311;
This step is the process of the secondary checking in request access second application system process.
S308: described authentication server judges that whether resource to be visited is legal, if so, performs S309, if not, performs S310;
S309: described authentication server jumps to the address of described resource to be visited;
S310: described authentication server jumps to the homepage of described second application system, and shows logging status;
S311: authentication server is redirected to the login interface of described second application system;
S312: client receives the instruction of described first application system of access that user sends;
S313: client sends first kind authentication information to authentication server, and described first kind authentication information comprises the mark of described user;
S314: queries pre-recorded, whether the difference of the mark that whether there is described user in the user list that logs in described second application system and the request time of described first kind authentication information and the timestamp recorded in preset range, if, perform S315, if not, S317 is performed;
S315: authentication server determines that user has logged in the second application system;
S316: authentication server allows described user to access described first application system;
In this step, the first implementation allowing described user to access described first application system can be: verify that whether resource to be visited is legal, if legal, then jump to the address of described resource to be visited, if illegal, then jump to the homepage of described first application system, and show logging status;
S317: authentication server is redirected to the login interface of described first application system.
In the present embodiment, access user in the process of the second application system, need the process through secondary checking, safer, and the process of same checking is " transparent " for user, on the basis ensureing fail safe, does not affect the experience of user; Access in the process of the first application system user, only need verify whether whether user logs in the second application system, if, user is then allowed to access the first application system, therefore, visible, for different application systems, only need through unified checking, without the need to requiring that user carries out repeat logon, thus user-friendly.
With said method embodiment accordingly, the embodiment of the present application also discloses a kind of processing unit of access request, as shown in Figure 4, comprising:
Receiver module 401, for receiving first kind authentication information, described first kind authentication information is sent after the request receiving access first application system that described client sends by the first application system, and the request of described access first application system is sent by described client by user;
First processing module 402, for when determining that described user has logged in the second application system according to described first kind authentication information, allow described user to access described first application system, described first application system is different from described second application system.
Wherein, in the present embodiment, alternatively, described first processing module can also be used for:
Inquire about the mark that whether there is described user in user list that is pre-recorded, that log in described second application system and the difference of the request time of described first kind authentication information and the timestamp recorded whether in preset range, if so, then determine that user has logged in the second application system.
Alternatively, the device in the present embodiment can also comprise: the second processing module 403 and the 3rd processing module 404, wherein:
Second processing module 403, for before reception first kind authentication information, receive the Equations of The Second Kind authentication information that client sends, described Equations of The Second Kind authentication information sends after described client receives the instruction of described second application system of access that user sends, and described Equations of The Second Kind authentication information at least comprises the mark of described user; When determining that described Equations of The Second Kind authentication information is legal, the mark of described user is added in the user list logging in described second application system, and record the timestamp that this logs in described second application system, otherwise described authentication server is redirected to the login interface of described second application system.
Further, described second processing module can also be used for: inquire about user name that described Equations of The Second Kind authentication information comprises and password whether respectively with the information match of described user that stored in described second client server, if, then determine that described Equations of The Second Kind authentication information is legal, described second client server is for storing the information of the registered user of described second application system, and the information of the registered user of the first application system is stored in first user server; And, when verifying that described Equations of The Second Kind authentication information is legal, send address that carry in described Equations of The Second Kind authentication information, resource to be visited to described second application system.
3rd processing module 404, for receiving the mark of described user and the mark of client of described second application system transmission; Determining that the mark of described user is present in the information of described second application system register user, and, when being interposed between in preset range between described user this time logged in and last login time, judge that whether resource to be visited is legal; If legal, then jump to the address of described resource to be visited, if illegal, then jump to the homepage of described second application system, and show logging status.
Device described in the present embodiment, as long as user has logged in the second application system, namely by the checking of the second application system, can directly sign in the first application system, without the need to through again verifying, therefore, it is possible to simplify processes flow process, user-friendly, and, access user in the process of the second application system, need the process through secondary checking, safer, and, the process of same checking is " transparent " for user, on the basis ensureing fail safe, does not affect the experience of user.
If the function described in the embodiment of the present application method using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computing equipment read/write memory medium.Based on such understanding, the part of the part that the embodiment of the present application contributes to prior art or this technical scheme can embody with the form of software product, this software product is stored in a storage medium, comprising some instructions in order to make a computing equipment (can be personal computer, server, mobile computing device or the network equipment etc.) perform all or part of step of method described in each embodiment of the application.And aforesaid storage medium comprises: USB flash disk, portable hard drive, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. various can be program code stored medium.
In this specification, each embodiment adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiment, between each embodiment same or similar part mutually see.
To the above-mentioned explanation of the disclosed embodiments, professional and technical personnel in the field are realized or uses the application.To be apparent for those skilled in the art to the multiple amendment of these embodiments, General Principle as defined herein when not departing from the spirit or scope of the application, can realize in other embodiments.Therefore, the application can not be restricted to these embodiments shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty.

Claims (12)

1. a processing method for access request, is characterized in that, comprising:
Authentication server receives first kind authentication information, described first kind authentication information is sent after the request receiving access first application system that described client sends by the first application system, and the request of described access first application system is sent by described client by user;
When determining that described user has logged in the second application system according to described first kind authentication information, described authentication server allows described user to access described first application system, and described first application system is different from described second application system.
2. method according to claim 1, is characterized in that, described first kind authentication information at least comprises the mark of described user;
Described authentication server determines that described user has logged in the second application system and specifically comprised:
Described queries pre-recorded, whether the difference of the mark that whether there is described user in the user list that logs in described second application system and the request time of described first kind authentication information and the timestamp recorded in preset range, if so, then determine that user has logged in the second application system.
3. method according to claim 1 and 2, is characterized in that, before described authentication server receives first kind authentication information, also comprises:
Described authentication server receives the Equations of The Second Kind authentication information that client sends, described Equations of The Second Kind authentication information sends after described client receives the instruction of described second application system of access that user sends, and described Equations of The Second Kind authentication information at least comprises the mark of described user;
When determining that described Equations of The Second Kind authentication information is legal, the mark of described user is added in the user list logging in described second application system by described authentication server, and record the timestamp that this logs in described second application system, otherwise described authentication server is redirected to the login interface of described second application system.
4. method according to claim 3, is characterized in that, described authentication server is determined that described Equations of The Second Kind authentication information is legal and specifically comprised:
The user name that described in described queries, Equations of The Second Kind authentication information comprises and password whether respectively with the information match of described user that stored in described second client server, if, then determine that described Equations of The Second Kind authentication information is legal, described second client server is for storing the information of the registered user of described second application system, and the information of the registered user of the first application system is stored in first user server.
5. method according to claim 3, is characterized in that, also comprises:
When verifying that described Equations of The Second Kind authentication information is legal, described authentication server sends address that carry in described Equations of The Second Kind authentication information, resource to be visited to described second application system.
6. method according to claim 5, is characterized in that, also comprises:
Described authentication server receives the mark of described user and the mark of client of described second application system transmission;
Determining that the mark of described user is present in the information of described second application system register user, and when being interposed between in preset range between described user this time logged in and last login time, described authentication server judges that whether resource to be visited is legal;
If legal, then jump to the address of described resource to be visited, if illegal, then jump to the homepage of described second application system, and show logging status.
7. a processing unit for access request, is characterized in that, comprising:
Receiver module, for receiving first kind authentication information, described first kind authentication information is sent after the request receiving access first application system that described client sends by the first application system, and the request of described access first application system is sent by described client by user;
First processing module, for when determining that described user has logged in the second application system according to described first kind authentication information, allow described user to access described first application system, described first application system is different from described second application system.
8. device according to claim 7, is characterized in that, described first processing module also for:
Inquire about the mark that whether there is described user in user list that is pre-recorded, that log in described second application system and the difference of the request time of described first kind authentication information and the timestamp recorded whether in preset range, if so, then determine that user has logged in the second application system.
9. the device according to claim 7 or 8, is characterized in that, also comprises:
Second processing module, for before reception first kind authentication information, receive the Equations of The Second Kind authentication information that client sends, described Equations of The Second Kind authentication information sends after described client receives the instruction of described second application system of access that user sends, and described Equations of The Second Kind authentication information at least comprises the mark of described user; When determining that described Equations of The Second Kind authentication information is legal, the mark of described user is added in the user list logging in described second application system, and record the timestamp that this logs in described second application system, otherwise described authentication server is redirected to the login interface of described second application system.
10. device according to claim 9, it is characterized in that, described second processing module also for: inquire about user name that described Equations of The Second Kind authentication information comprises and password whether respectively with the information match of described user that stored in described second client server, if, then determine that described Equations of The Second Kind authentication information is legal, described second client server is for storing the information of the registered user of described second application system, and the information of the registered user of the first application system is stored in first user server.
11. devices according to claim 9, is characterized in that, described second processing module also for:
When verifying that described Equations of The Second Kind authentication information is legal, send address that carry in described Equations of The Second Kind authentication information, resource to be visited to described second application system.
12. devices according to claim 11, is characterized in that, also comprise:
3rd processing module, for receiving the mark of described user and the mark of client of described second application system transmission; Determining that the mark of described user is present in the information of described second application system register user, and, when being interposed between in preset range between described user this time logged in and last login time, judge that whether resource to be visited is legal; If legal, then jump to the address of described resource to be visited, if illegal, then jump to the homepage of described second application system, and show logging status.
CN201410575265.4A 2014-10-24 2014-10-24 A kind of processing method and processing device of access request Active CN104270391B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410575265.4A CN104270391B (en) 2014-10-24 2014-10-24 A kind of processing method and processing device of access request

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410575265.4A CN104270391B (en) 2014-10-24 2014-10-24 A kind of processing method and processing device of access request

Publications (2)

Publication Number Publication Date
CN104270391A true CN104270391A (en) 2015-01-07
CN104270391B CN104270391B (en) 2018-10-19

Family

ID=52161881

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410575265.4A Active CN104270391B (en) 2014-10-24 2014-10-24 A kind of processing method and processing device of access request

Country Status (1)

Country Link
CN (1) CN104270391B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871786A (en) * 2015-01-22 2016-08-17 阿里巴巴集团控股有限公司 User information authentication method, device and system
CN107645486A (en) * 2016-12-28 2018-01-30 平安科技(深圳)有限公司 Login authentication method and device
CN110213260A (en) * 2019-05-29 2019-09-06 北京中亦安图科技股份有限公司 User ID authentication method and device
CN111259368A (en) * 2019-11-07 2020-06-09 深圳市远行科技股份有限公司 Method and equipment for logging in system
CN111327573A (en) * 2018-12-14 2020-06-23 英业达科技有限公司 Device and method for maintaining log-in state record to transfer data
CN113407927A (en) * 2021-07-02 2021-09-17 北京海泰方圆科技股份有限公司 Login method, device, equipment and medium
CN114357397A (en) * 2021-12-28 2022-04-15 北京骑胜科技有限公司 Method and system for logging in system by user

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1835438A (en) * 2006-03-22 2006-09-20 阿里巴巴公司 Method of realizing single time accession between systems and system thereof
CN1897526A (en) * 2000-04-03 2007-01-17 卡纳尔技术股份有限公司 Authentication of data transmitted in a digital transmission system
CN1897523A (en) * 2006-06-26 2007-01-17 北京金山软件有限公司 System and method for realizing single-point login
CN101075875A (en) * 2007-06-14 2007-11-21 中国电信股份有限公司 Method and system for realizing monopoint login between gate and system
CN101127603A (en) * 2007-08-16 2008-02-20 中兴通讯股份有限公司 A method for single point login of portal website and IMS client
CN101262377A (en) * 2008-04-25 2008-09-10 北京工业大学 Integration management architecture for user identity information and its method
CN101420416A (en) * 2007-10-22 2009-04-29 中国移动通信集团公司 Identity management platform, service server, login system and federation method
CN102123166A (en) * 2010-12-31 2011-07-13 百度在线网络技术(北京)有限公司 Equipment and method for accessing target network application on the basis of instant messaging client
EP2552049A1 (en) * 2010-08-23 2013-01-30 ZTE Corporation Authentication method, apparatus and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1897526A (en) * 2000-04-03 2007-01-17 卡纳尔技术股份有限公司 Authentication of data transmitted in a digital transmission system
CN1835438A (en) * 2006-03-22 2006-09-20 阿里巴巴公司 Method of realizing single time accession between systems and system thereof
CN1897523A (en) * 2006-06-26 2007-01-17 北京金山软件有限公司 System and method for realizing single-point login
CN101075875A (en) * 2007-06-14 2007-11-21 中国电信股份有限公司 Method and system for realizing monopoint login between gate and system
CN101127603A (en) * 2007-08-16 2008-02-20 中兴通讯股份有限公司 A method for single point login of portal website and IMS client
CN101420416A (en) * 2007-10-22 2009-04-29 中国移动通信集团公司 Identity management platform, service server, login system and federation method
CN101262377A (en) * 2008-04-25 2008-09-10 北京工业大学 Integration management architecture for user identity information and its method
EP2552049A1 (en) * 2010-08-23 2013-01-30 ZTE Corporation Authentication method, apparatus and system
CN102123166A (en) * 2010-12-31 2011-07-13 百度在线网络技术(北京)有限公司 Equipment and method for accessing target network application on the basis of instant messaging client

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871786A (en) * 2015-01-22 2016-08-17 阿里巴巴集团控股有限公司 User information authentication method, device and system
CN105871786B (en) * 2015-01-22 2019-06-04 阿里巴巴集团控股有限公司 A kind of verification method of user information, device and system
CN107645486A (en) * 2016-12-28 2018-01-30 平安科技(深圳)有限公司 Login authentication method and device
CN111327573A (en) * 2018-12-14 2020-06-23 英业达科技有限公司 Device and method for maintaining log-in state record to transfer data
CN111327573B (en) * 2018-12-14 2022-12-02 英业达科技有限公司 Device and method for maintaining log-in state record to transfer data
CN110213260A (en) * 2019-05-29 2019-09-06 北京中亦安图科技股份有限公司 User ID authentication method and device
CN111259368A (en) * 2019-11-07 2020-06-09 深圳市远行科技股份有限公司 Method and equipment for logging in system
CN113407927A (en) * 2021-07-02 2021-09-17 北京海泰方圆科技股份有限公司 Login method, device, equipment and medium
CN113407927B (en) * 2021-07-02 2021-12-24 北京海泰方圆科技股份有限公司 Login method, device, equipment and medium
CN114357397A (en) * 2021-12-28 2022-04-15 北京骑胜科技有限公司 Method and system for logging in system by user

Also Published As

Publication number Publication date
CN104270391B (en) 2018-10-19

Similar Documents

Publication Publication Date Title
CN104270391A (en) Method and device for processing access request
JP7027475B2 (en) Decentralized, decentralized data aggregation
US9363256B2 (en) User authentication in separate authentication channels
CN101764819A (en) methods and systems for detecting man-in-the-browser attacks
US9313230B1 (en) Policy approval layer
CN102664874B (en) A kind of method and system for secure logging in
CN104580364A (en) Resource sharing method and device
CN101296087A (en) Method and system for preventing cross-site attack
CN107852412A (en) For phishing and the system and method for brand protection
CN104580075A (en) User login validation method, device and system
WO2017088677A1 (en) User key storage method and server
CN109583199A (en) A kind of access auditing method, system, equipment and the medium of storage management system
CN106656455A (en) Website access method and device
CN104580112A (en) Service authentication method and system, and server
CN104660487A (en) Community information processing method and device
CN104980420B (en) A kind of method for processing business, device, terminal and server
US20150067772A1 (en) Apparatus, method and computer-readable storage medium for providing notification of login from new device
CN105827406A (en) Identity verification method, identity verification device, and identity verification system
US11349825B1 (en) Secured automatic user log-in at website via personal electronic device
CN105659523A (en) Re-programmable secure cryptographic device
WO2017162041A1 (en) Method and device for page display
CN107766708A (en) Nullify method, terminal and the computer-readable recording medium of account Entered state
US11201888B2 (en) Methods and systems for discovering network security gaps
CN104468794A (en) Login simulating method and device for website
CN106534210A (en) Logging-in method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant