CN104468589A - Method and system for achieving lightweight-level conversation - Google Patents
Method and system for achieving lightweight-level conversation Download PDFInfo
- Publication number
- CN104468589A CN104468589A CN201410769193.7A CN201410769193A CN104468589A CN 104468589 A CN104468589 A CN 104468589A CN 201410769193 A CN201410769193 A CN 201410769193A CN 104468589 A CN104468589 A CN 104468589A
- Authority
- CN
- China
- Prior art keywords
- access
- time
- login authentication
- authentication information
- log
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention provides a method and system for achieving a lightweight-level conversation. The method comprises the steps that an access timestamp and identity recognizing information are provided for a logged-in access end to be stored by the access end; the logging-in information of the access end is stored, wherein the logging-in information comprises the access timestamp and the identity recognizing information; when an access request of the access end is received, the logging-in verifying information sent by the current access end is received, wherein the logging-in verifying information comprises the access timestamp and the identity recognizing information stored by the current access end; the logging-in verifying information and the logging-in information are matched; if the logging-in verifying information and the logging-in information are matched successfully, the access timestamp is calculated according to a preset rule so that the time legality of the current access end can be judged; if the time of the current access end is legal, the current access end is recognized to be the logged-in state; the identity and time legality are judged through a client side and the timestamp of the system, achieving is easy, the occupied resource is few, and the access efficiency of a service end is effectively improved.
Description
Technical field
The present invention relates to network communication field, particularly relate to a kind of implementation method and system of lightweight session.
Background technology
Session (session): in computer major term, Session (session) refers to that a terminal use and interactive system carry out the time interval communicated, and is often referred to institute's elapsed time logging off from the registration system that enters to cancellation.Specific to the Session (session) in Web refer to be exactly user when browsing some websites, from enter website to browser close process during this period of time, namely user browses the time that this website spends; For server, meeting and a large amount of user terminals conversate alternately, a large amount of resources will inevitably be taken, how a kind of same each user terminal conversational mode spending resource less is provided, thus shared resource can be greatly reduced under the session radix of flood tide, promote session efficiency, become the technical problem that current industry is urgently to be resolved hurrily.
Summary of the invention
The shortcoming of prior art in view of the above, the object of the present invention is to provide a kind of implementation method and system of lightweight session, and solving session efficiency in above-mentioned prior art has technical problem to be hoisted.
For realizing above-mentioned target and other related objectives, the invention provides a kind of implementation method of lightweight session, comprising: provide access time stamp and identity identification information to preserve for access end to listed access end; Preserve the log-on message of described access end, described log-on message comprises: described access time stamp and described identity identification information; When receiving the access request of an access end, receive the login authentication information that current accessed end is sent, described login authentication information comprises: the access time stamp that current accessed end is preserved and identity identification information; Described login authentication information is mated with described log-on message; When matching, described access time stamp is calculated by preset rules with the time legitimacy judging current accessed end; When legal, current accessed end is identified as logging status.
Optionally, described identity identification information comprises: access end IP and Session ID; Described described login authentication information to be mated with described log-on message, comprising: the IP in described login authentication information is matched with the access end IP in log-on message, the Session ID in described login authentication information is matched with the Session ID in log-on message, the access time stamp in described login authentication information is matched with the access time stamp in log-on message in one or more combinations.
Optionally, the implementation method of described lightweight session, also comprises: when described matching result is for unmatch or when described time validity judgement is illegal, return to the interface that described current accessed end logs in again.
Optionally, described login authentication information also comprises: time offset; Described stamp the described access time calculates by preset rules with the time legitimacy judging current accessed end, comprising: described access time stamp is added described time offset and deducts current time acquisition result of calculation when judging legitimacy; When described result of calculation is not more than preset time threshold, it is described legal to be judged as.
Optionally, the implementation method of described lightweight session, also comprises: what log in before being identified as the access end of logging status described in returning to accesses content.
For realizing above-mentioned target and other related objectives, the invention provides a kind of service end for realizing lightweight session, comprising: information generating module, preserve for access end for providing access time stamp and identity identification information to listed access end; Information preserves module, and for preserving the log-on message of described access end, described log-on message comprises: described access time stamp and described identity identification information; Information receiving module, for when receiving the access request of an access end, receive the login authentication information that current accessed end is sent, described login authentication information comprises: the access time stamp that current accessed end is preserved and identity identification information; Identities match module, for mating described login authentication information with described log-on message; When matching, rise time validity judgement instruction; Time validity judgement module, for when receiving described time and distribution decision instruction, calculates described access time stamp with the time legitimacy judging current accessed end by preset rules; When legal, current accessed end is identified as logging status.
Optionally, described identity identification information comprises: access end IP and Session ID; Described matching module described login authentication information is mated with described log-on message, comprising: the IP in described login authentication information is matched with the access end IP in log-on message, the Session ID in described login authentication information is matched with the Session ID in log-on message, the access time stamp in described login authentication information is stabbed one or more combinations in matching with the access time in log-on message.
Optionally, the described matching result of described matching module be to unmatch or the judgement of described time validity judgement module is illegal time, return to the interface that described current accessed end logs in again.
Optionally, described login authentication information also comprises: time offset; Being calculated by preset rules with the time legitimacy judging current accessed end by described access time stamp of described time validity judgement module, comprising: described access time stamp is added described time offset and deducts current time acquisition result of calculation when judging legitimacy; When described result of calculation is not more than preset time threshold, it is described legal to be judged as.
Optionally, the described service end for realizing lightweight session, comprising: content returns module, for accessing content of logging in before being identified as the access end of logging status described in returning to.
For realizing above-mentioned target and other related objectives, the invention provides a kind of access end for realizing lightweight session, comprise: information preserves module, for preserving access time stamp and identity identification information, wherein, described access time stamp and identity identification information are that the external equipment of being accessed by described access end provided; Access request module, for sending login authentication information when again accessing described external equipment to the other side, described login authentication information comprises: the access time stamp of described preservation and identity identification information; Wherein, described login authentication information is used for mating for the log-on message with described preservation; When matching, described access time stamp is used for calculating for by preset rules with the time legitimacy judging described access end; When legal, described access end is the state having logged in described external equipment.
As mentioned above, the invention provides a kind of implementation method and system of lightweight session, comprising: provide access time stamp and identity identification information to preserve for access end to listed access end; Preserve the log-on message of described access end, described log-on message comprises: described access time stamp and described identity identification information; When receiving the access request of an access end, receive the login authentication information that current accessed end is sent, described login authentication information comprises: the access time stamp that current accessed end is preserved and identity identification information; Described login authentication information is mated with described log-on message; When matching, described access time stamp is calculated by preset rules with the time legitimacy judging current accessed end; When legal, current accessed end is identified as logging status; Thus utilize timestamp auxiliary judgment identity and the time legitimacy of access end and system, realize simple, take resource few, effectively promote service end access efficiency.
Accompanying drawing explanation
Fig. 1 is shown as the schematic flow sheet of the implementation method of the lightweight session in one embodiment of the invention.
Fig. 2 is shown as the structural representation of the service end for realizing lightweight session in one embodiment of the invention.
Fig. 3 is shown as the structural representation of the access end for realizing lightweight session in one embodiment of the invention.
Element numbers explanation
1 service end
11 information generating module
12 service end information preserve module
13 information receiving modules
14 identities match modules
15 time validity judgement modules
2,3 access ends
31 access end information preserve module
32 access request modules
S1 ~ S6 method step
Embodiment
Below by way of specific instantiation, embodiments of the present invention are described, those skilled in the art the content disclosed by this specification can understand other advantages of the present invention and effect easily.The present invention can also be implemented or be applied by embodiments different in addition, and the every details in this specification also can based on different viewpoints and application, carries out various modification or change not deviating under spirit of the present invention.It should be noted that, when not conflicting, the embodiment in the application and the feature in embodiment can combine mutually.
As shown in Figure 1, the invention provides a kind of implementation method of lightweight session, be applied in the environment of internet, described session (session) Session refers to that a terminal use and interactive system carry out the time interval communicated, and is often referred to institute's elapsed time logging off from the registration system that enters to cancellation.And if necessary, may certain operating space be also had.
Specific to the Session in Web refer to be exactly user when browsing some websites, from enter website to closedown this website process during this period of time, namely user browses the time that this website spends.Therefore from above-mentioned definition, we can see, Session is actually a specific concept of time.Session example is lightweight, so-called lightweight: refer to his establishment and delete the webpage etc. not needing to consume access end that too many resource can be user and provided by instrument access services ends such as browsers.
Described method comprises:
Step S1: provide access time stamp and identity identification information to preserve for access end to listed access end.
In one embodiment, described supplier such as can be service end, generates stamp of described access time, and obtain described identity identification information when described access end logs in or after logging in; Wherein, timestamp is the mark that service end made especially according to the access time of access end; In e-commerce transaction file, the time is very important information.In contract in writing, the date of file signature is the same with signature is all very important key contents [2] preventing file to be forged and distort; Digital Time-stamp service (DTS:digital time stamp service) is one of online secure service in electronic commerce project, can provide the safeguard protection of the date and time information of e-file; Timestamp (time-stamp) is a voucher document formed after encryption, and it comprises three parts: the summary (digest) of the file that (1) need add timestamp; (2) DTS receives the date and time of file; (3) digital signature of DTS.In general, the process that timestamp produces is: first the file Hash coding encrypting needing to add timestamp is formed summary by user, then this summary is sent to DTS, DTS again to this file encryption (digital signature), then sends user back to after adding the date and time information receiving document.
In one embodiment, described identity identification information can comprise: access end IP and Session ID (Session ID)
Step S2: the log-on message of preserving described access end, described log-on message comprises: described access time stamp and described identity identification information.
In one embodiment, preserve information at access end, also preserve in service end and comprise the log-on message of correspondence or identical information, for follow-up again access time comparison and checking.
Step S3: when receiving the access request of an access end, receive the login authentication information that current accessed end is sent, described login authentication information comprises: the access time stamp that current accessed end is preserved and identity identification information.
Step S4: described login authentication information is mated with described log-on message.
In one embodiment, described in brought forward, described identity identification information comprises: access end IP and Session ID; Described described login authentication information to be mated with described log-on message, comprise: the IP in described login authentication information is matched with the access end IP in log-on message, the Session ID in described login authentication information is matched with the Session ID in log-on message, the access time stamp in described login authentication information is stabbed one or more combinations in matching with the access time in log-on message, safest mode is three kinds and all mates, and certainly can change according to the actual requirements.
Step S5: when matching, calculates described access time stamp with the time legitimacy judging current accessed end by preset rules; When legal, current accessed end is identified as logging status.
In one embodiment, described login authentication information also comprises: time offset, described time offset can such as access end current time and preserve access time stamp between time migration, also can be self-defining time migration; Described stamp the described access time calculates by preset rules with the time legitimacy judging current accessed end, comprising: described access time stamp is added described time offset and deducts current time acquisition result of calculation when judging legitimacy; When described result of calculation is not more than preset time threshold, it is described legal to be judged as, specifically, visible following formula: access time stamp+time offset-current time <=A, A such as in 1 ~ 10 scope, can be preferably 2.
In one embodiment, when described matching result is for unmatch or when described time validity judgement is illegal, step S6 is entered: return to the interface that described current accessed end logs in again.
In one embodiment, optionally, described method also can comprise: what log in before being identified as the access end of logging status described in returning to accesses content; Concrete, the webpage etc. accessed content such as accessing before logged in before described, the application of the present invention's performance be before listed access end when again logging in, utilize the stamp of access time formerly, posterior time offset and present system time to judge whether login-timeout; If overtime, then user is allowed again to log in; If time-out, then do not show access end again by the webpage etc. provided before.
With reference to the similar principles of said method, the present invention can be provided for the system realizing lightweight session; Repeat no more about the ins and outs repeated with said method in the embodiment of system below, when not conflicting, the technical characteristic in above-described embodiment all can be applicable in following embodiment.
As shown in Figure 2, the invention provides a kind of embodiment of the service end 1 for realizing lightweight session, comprising: information generating module 11, preserve for access end 2 for providing access time stamp and identity identification information to listed access end 2; Service end information preserves module 12 (such as comprising database), and for preserving the log-on message of described access end 2, described log-on message comprises: described access time stamp and described identity identification information; Information receiving module 13 (such as comprising wired/wireless communication module), for when receiving the access request of an access end 2, receive the login authentication information that current accessed end 2 is sent, described login authentication information comprises: the access time stamp that current accessed end 2 is preserved and identity identification information; Identities match module 14, for mating described login authentication information with described log-on message; When matching, rise time validity judgement instruction; Time validity judgement module 15, for when receiving described time and distribution decision instruction, calculates described access time stamp with the time legitimacy judging current accessed end 2 by preset rules; When legal, current accessed end 2 is identified as logging status.
Optionally, described identity identification information comprises: access end 2IP and Session ID; Described matching module described login authentication information is mated with described log-on message, comprising: the IP in described login authentication information is matched with the access end 2IP in log-on message, the Session ID in described login authentication information is matched with the Session ID in log-on message, the access time stamp in described login authentication information is stabbed one or more combinations in matching with the access time in log-on message.
Optionally, the described matching result of described matching module be to unmatch or the judgement of described time validity judgement module 15 is illegal time, return to the interface that described current accessed end 2 logs in again.
Optionally, described login authentication information also comprises: time offset; Being calculated by preset rules with the time legitimacy judging current accessed end 2 by described access time stamp of described time validity judgement module 15, comprising: described access time stamp is added described time offset and deducts current time acquisition result of calculation when judging legitimacy; When described result of calculation is not more than preset time threshold, it is described legal to be judged as.
Optionally, the described service end 1 for realizing lightweight session, comprising: content returns module, described in returning to, be identified as accessing content of access end 2 login before of logging status.
It should be noted that, described service end 1 is such as the software of server or server group, hardware system or software and hardware combining system.
As shown in Figure 3, the invention provides a kind of embodiment of the access end 3 for realizing lightweight session, comprise: access end information preserves module 31, for preserving access time stamp and identity identification information, wherein, described access time stamp and identity identification information are that the external equipment of being accessed by described access end 3 provided; Access request module 32, for sending login authentication information when again accessing described external equipment to the other side, described login authentication information comprises: the access time stamp of described preservation and identity identification information; Wherein, described login authentication information is used for mating for the log-on message with described preservation; When matching, described access time stamp is used for calculating for by preset rules with the time legitimacy judging described access end 3; When legal, described access end 3 is the state having logged in described external equipment.In one embodiment, described access end 3 can be such as the software of the terminal of computer, mobile phone, panel computer or other connecting Internets, hardware system or software and hardware combining system.
It should be noted that, in one embodiment, described access end 2 together can use with construction system with described service end 1, or carries out alternately with its external equipment respectively.
In sum, the invention provides a kind of implementation method and system of lightweight session, comprising: provide access time stamp and identity identification information to preserve for access end to listed access end; Preserve the log-on message of described access end, described log-on message comprises: described access time stamp and described identity identification information; When receiving the access request of an access end, receive the login authentication information that current accessed end is sent, described login authentication information comprises: the access time stamp that current accessed end is preserved and identity identification information; Described login authentication information is mated with described log-on message; When matching, described access time stamp is calculated by preset rules with the time legitimacy judging current accessed end; When legal, current accessed end is identified as logging status; Thus utilize timestamp auxiliary judgment identity and the time legitimacy of access end and system, realize simple, take resource few, effectively promote service end access efficiency.
Above-described embodiment is illustrative principle of the present invention and effect thereof only, but not for limiting the present invention.Any person skilled in the art scholar all without prejudice under spirit of the present invention and category, can modify above-described embodiment or changes.Therefore, such as have in bent technical field usually know the knowledgeable do not depart from complete under disclosed spirit and technological thought all equivalence modify or change, must be contained by claim of the present invention.
Claims (11)
1. an implementation method for lightweight session, is characterized in that, comprising:
Access time stamp and identity identification information is provided to preserve for access end to listed access end;
Preserve the log-on message of described access end, described log-on message comprises: described access time stamp and described identity identification information;
When receiving the access request of an access end, receive the login authentication information that current accessed end is sent, described login authentication information comprises: the access time stamp that current accessed end is preserved and identity identification information;
Described login authentication information is mated with described log-on message;
When matching, described access time stamp is calculated by preset rules with the time legitimacy judging current accessed end;
When legal, current accessed end is identified as logging status.
2. the implementation method of lightweight session according to claim 1, is characterized in that, described identity identification information comprises: access end IP and Session ID; Described described login authentication information to be mated with described log-on message, comprising: the IP in described login authentication information is matched with the access end IP in log-on message, the Session ID in described login authentication information is matched with the Session ID in log-on message, the access time stamp in described login authentication information is matched with the access time stamp in log-on message in one or more combinations.
3. the implementation method of lightweight session according to claim 1, is characterized in that, also comprise: when described matching result is for unmatch or when described time validity judgement is illegal, return to the interface that described current accessed end logs in again.
4. the implementation method of lightweight session according to claim 1, is characterized in that, described login authentication information also comprises: time offset; Described stamp the described access time calculates by preset rules with the time legitimacy judging current accessed end, comprising: described access time stamp is added described time offset and deducts current time acquisition result of calculation when judging legitimacy; When described result of calculation is not more than preset time threshold, judge that the time of described current accessed end is legal.
5. the implementation method of lightweight session according to claim 1, is characterized in that, also comprise: what log in before being identified as the access end of logging status described in returning to accesses content.
6. for realizing a service end for lightweight session, it is characterized in that, comprising:
Information generating module, stabs for providing the access time to listed access end and identity identification information is preserved for access end;
Information preserves module, and for preserving the log-on message of described access end, described log-on message comprises: described access time stamp and described identity identification information;
Information receiving module, for when receiving the access request of an access end, receive the login authentication information that current accessed end is sent, described login authentication information comprises: the access time stamp that current accessed end is preserved and identity identification information;
Identities match module, for mating described login authentication information with described log-on message; When matching, rise time validity judgement instruction;
Time validity judgement module, for when receiving described time and distribution decision instruction, calculates described access time stamp with the time legitimacy judging current accessed end by preset rules; When legal, current accessed end is identified as logging status.
7. the service end for realizing lightweight session according to claim 6, is characterized in that, described identity identification information comprises: access end IP and Session ID; Described matching module described login authentication information is mated with described log-on message, comprising: the IP in described login authentication information is matched with the access end IP in log-on message, the Session ID in described login authentication information is matched with the Session ID in log-on message, the access time stamp in described login authentication information is stabbed one or more combinations in matching with the access time in log-on message.
8. the service end for realizing lightweight session according to claim 6, it is characterized in that, the described matching result of described matching module be to unmatch or the judgement of described time validity judgement module is illegal time, return to the interface that described current accessed end logs in again.
9. the service end for realizing lightweight session according to claim 6, is characterized in that, described login authentication information also comprises: time offset; Being calculated by preset rules with the time legitimacy judging current accessed end by described access time stamp of described time validity judgement module, comprising: described access time stamp is added described time offset and deducts current time acquisition result of calculation when judging legitimacy; When described result of calculation is not more than preset time threshold, judge that the time of described current accessed end is legal.
10. the service end for realizing lightweight session according to claim 6, is characterized in that, comprising: content returns module, for accessing content of logging in before being identified as the access end of logging status described in returning to.
11. 1 kinds for realizing the access end of lightweight session, is characterized in that, comprising:
Information preserves module, and for preserving access time stamp and identity identification information, wherein, described access time stamp and identity identification information are that the external equipment of being accessed by described access end provided;
Access request module, for sending login authentication information when again accessing described external equipment to the other side, described login authentication information comprises: the access time stamp of described preservation and identity identification information;
Wherein, described login authentication information is used for mating for the log-on message with described preservation; When matching, described access time stamp is used for calculating for by preset rules with the time legitimacy judging described access end; When legal, described access end is the state having logged in described external equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410769193.7A CN104468589A (en) | 2014-12-12 | 2014-12-12 | Method and system for achieving lightweight-level conversation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410769193.7A CN104468589A (en) | 2014-12-12 | 2014-12-12 | Method and system for achieving lightweight-level conversation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104468589A true CN104468589A (en) | 2015-03-25 |
Family
ID=52913961
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410769193.7A Pending CN104468589A (en) | 2014-12-12 | 2014-12-12 | Method and system for achieving lightweight-level conversation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104468589A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357694A (en) * | 2016-11-10 | 2017-01-25 | 天脉聚源(北京)传媒科技有限公司 | Method and device for processing access request |
CN109117618A (en) * | 2018-08-14 | 2019-01-01 | 海南新软软件有限公司 | A kind of secure log control method, apparatus and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101202753A (en) * | 2007-11-29 | 2008-06-18 | 中国电信股份有限公司 | Method and device for accessing plug-in connector applied system by client terminal |
CN101420416A (en) * | 2007-10-22 | 2009-04-29 | 中国移动通信集团公司 | Identity management platform, service server, login system and federation method |
CN102045329A (en) * | 2009-10-22 | 2011-05-04 | 中国移动通信集团公司 | Single point login method, login initiating terminal, target terminal and verification center |
CN102868702A (en) * | 2012-09-28 | 2013-01-09 | 用友软件股份有限公司 | System login device and system login method |
CN103139200A (en) * | 2013-01-06 | 2013-06-05 | 深圳市元征科技股份有限公司 | Single sign-on method of web service |
WO2014048749A1 (en) * | 2012-09-29 | 2014-04-03 | Siemens Aktiengesellschaft | Inter-domain single sign-on |
-
2014
- 2014-12-12 CN CN201410769193.7A patent/CN104468589A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101420416A (en) * | 2007-10-22 | 2009-04-29 | 中国移动通信集团公司 | Identity management platform, service server, login system and federation method |
CN101202753A (en) * | 2007-11-29 | 2008-06-18 | 中国电信股份有限公司 | Method and device for accessing plug-in connector applied system by client terminal |
CN102045329A (en) * | 2009-10-22 | 2011-05-04 | 中国移动通信集团公司 | Single point login method, login initiating terminal, target terminal and verification center |
CN102868702A (en) * | 2012-09-28 | 2013-01-09 | 用友软件股份有限公司 | System login device and system login method |
WO2014048749A1 (en) * | 2012-09-29 | 2014-04-03 | Siemens Aktiengesellschaft | Inter-domain single sign-on |
CN103139200A (en) * | 2013-01-06 | 2013-06-05 | 深圳市元征科技股份有限公司 | Single sign-on method of web service |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357694A (en) * | 2016-11-10 | 2017-01-25 | 天脉聚源(北京)传媒科技有限公司 | Method and device for processing access request |
CN109117618A (en) * | 2018-08-14 | 2019-01-01 | 海南新软软件有限公司 | A kind of secure log control method, apparatus and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9053306B2 (en) | Authentication system, authentication server, service providing server, authentication method, and computer-readable recording medium | |
CN102065141B (en) | Method and system for realizing single sign-on of cross-application and browser | |
US8984621B2 (en) | Techniques for secure access management in virtual environments | |
US20180219862A1 (en) | Actively federated mobile authentication | |
US9294479B1 (en) | Client-side authentication | |
CN108537046A (en) | A kind of online contract signature system and method based on block chain technology | |
CN106341429A (en) | Authentication method capable of protecting safety of server data | |
CN103944900A (en) | Cross-station request attack defense method and device based on encryption | |
CN104618334A (en) | Method and system for generating and verifying dynamic two-dimensional code | |
CN102682009A (en) | Method and system for logging in webpage | |
CN102546648A (en) | Resource access authorization method | |
WO2013156531A1 (en) | Secure password-based authentication for cloud computing services | |
CN110933092A (en) | JWT (just-in-one wt) based single sign-on realization method and device | |
CN104967597A (en) | Third-party application message authentication method and system based on secure channel | |
US12028347B2 (en) | System and method for enabling a user to obtain authenticated access to an application using a biometric combination lock | |
CN102624687A (en) | Networking program user authentication method based on mobile terminal | |
US12026247B2 (en) | System and method for enabling a user to create an account on an application or login into the application without having the user reveal their identity | |
JP2022546073A (en) | Connecting web publisher inventory to programmatic exchanges without third party cookies | |
CN103368831B (en) | A kind of anonymous instant communicating system identified based on frequent visitor | |
CN103379093B (en) | A kind of method and device for realizing account intercommunication | |
CN114024904B (en) | Access control method, device, equipment and storage medium | |
CN104468589A (en) | Method and system for achieving lightweight-level conversation | |
CN109495458A (en) | A kind of method, system and the associated component of data transmission | |
CN117527400A (en) | Login authentication method and device, electronic equipment and storage medium | |
CN102882686A (en) | Authentication method and authentication device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150325 |