CN105429978A - Data access methods and system, and equipment - Google Patents

Data access methods and system, and equipment Download PDF

Info

Publication number
CN105429978A
CN105429978A CN201510781737.6A CN201510781737A CN105429978A CN 105429978 A CN105429978 A CN 105429978A CN 201510781737 A CN201510781737 A CN 201510781737A CN 105429978 A CN105429978 A CN 105429978A
Authority
CN
China
Prior art keywords
server
application platform
authentication information
access
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510781737.6A
Other languages
Chinese (zh)
Other versions
CN105429978B (en
Inventor
张舜华
王伟
赵金鑫
何小锋
包辰明
李响
梁可尊
刘威
谢潇宇
王力
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN201510781737.6A priority Critical patent/CN105429978B/en
Publication of CN105429978A publication Critical patent/CN105429978A/en
Application granted granted Critical
Publication of CN105429978B publication Critical patent/CN105429978B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Abstract

The invention provides data access methods and system, and equipment. The method comprises the steps that an application platform acquires authentication information from a server of a first system; and the application platform accesses data on a server of a second system according to acquired authentication information. According to the method, a server of a certain system different from open systems can be used as an authorized server for generating authentication information, so that the authorized server and a resource server play their own role separately when the open system does not need establishing an authorized server alone, and the hardware cost is lowered.

Description

Data access method, equipment and system
Technical field
The present invention relates to the communications field, specifically, relate to data access method, equipment and system.
Background technology
Along with the development of the Internet, internet system is more and more huger, data volume also increases fast, participate in the construction of system in order to third-party application can be allowed, enrich system application, such as each large internet system such as micro-letter, Sina's microblogging all supports that OAuth2.0 (open mandate) agreement is to set up the ecological chain system of oneself.This OAuth2.0 agreement is an open standard (allowing the third-party application various information that calling party stores in service provider there under the prerequisite of subscriber authorisation).
But, in the prior art, support that the open the Internet system of OAuth2.0 needs to set up two servers, namely for the authorization server of producing authentication information and the Resource Server for storage resources, therefore, for the hardware and software cost that the early development needs of the internet system supporting OAuth2.0 are higher.
Summary of the invention
For solving the problems of the technologies described above, the invention provides a kind of data access method, equipment and system.
On the one hand, embodiments of the present invention provide a kind of data access method, and described method comprises:
Application platform obtains authentication information from the server of the first system;
Described application platform accesses the data on the server of second system by the authentication information got.
Correspondingly, embodiment of the present invention provides a kind of application platform, and described application platform comprises:
Acquisition module, obtains authentication information for the server from the first system;
Access modules, the data on the server of the authentication information access second system got by described acquisition module.
On the other hand, embodiment of the present invention provides a kind of data access method, and described method comprises:
The server producing authentication information of the first system and authorization information;
The authentication information of generation is sent to application platform and the authorization information of generation is sent to the server of second system so that described application platform accesses the data on the server of described second system by described authentication information by the server of described the first system.
Another aspect, embodiment of the present invention provides a kind of data access method, and described method comprises:
The server of second system receives the authorization information of the server transmission of the first system and the access request of application platform transmission;
The server of described second system parses authentication information from described access request;
The server of described second system carries out verification process according to described authentication information and described authorization information to described application platform;
If be verified, then the server of described second system sends the data corresponding with described access request to described application platform.
Again on the one hand, embodiment of the present invention provides a kind of data access system, and described system comprises: application platform as above, is positioned at the server of the first system, and, be positioned at the server of second system; Wherein,
The server of described the first system comprises:
Generation module, for producing authentication information and authorization information,
Sending module, the authentication information for being generated by described generation module sends to described application platform and the authorization information that described generation module generates is sent to the server of described second system so that described application platform accesses the data on the server of described second system by described authentication information;
The server of described second system comprises:
Receiver module, the authorization information that the server for receiving described the first system sends and the access request that described application platform sends,
Parsing module, parses authentication information in the access request that receives from described receiver module,
Authentication module, the authorization information received for the authentication information that parses according to described parsing module and described receiver module carries out verification process to described application platform,
Sending module, for when described authentication module is defined as being verified, sends the data corresponding with described access request to described application platform.
Implement data access method provided by the invention, equipment and system, can by making the server of certain system being different from open system as the authorization server for producing authentication information, thus realize ensure that authorization server is separated with the role of Resource Server when open system is without the need to setting up separately an authorization server, reduce hardware cost.
Accompanying drawing explanation
Fig. 1 is the flow chart of a kind of data access method according to embodiment of the present invention;
Fig. 2 shows a kind of execution mode of the treatment S 110 shown in Fig. 1;
Fig. 3 is the flow chart of the another kind of data access method according to embodiment of the present invention;
Fig. 4 shows a kind of execution mode of the treatment S 210 shown in Fig. 3;
Fig. 5 is the flow chart of another data access method according to embodiment of the present invention;
Fig. 6 is the flow chart of another data access method according to embodiment of the present invention;
Fig. 7 is the Organization Chart of the data access system according to embodiment of the present invention;
Fig. 8 shows the structural representation of the application platform 100 shown in Fig. 7;
Fig. 9 shows the structural representation of the acquisition module 110 shown in Fig. 8;
Figure 10 shows the structural representation of the server 200 shown in Fig. 7;
Figure 11 shows the structural representation of the generation module 210 shown in Figure 10;
Figure 12 shows the structural representation of the server 300 shown in Fig. 7.
Embodiment
For making the object of embodiments of the invention, technical scheme and advantage clearly, below in conjunction with accompanying drawing, the present invention is described in further detail.
Fig. 1 is the flow chart of a kind of data access method according to embodiment of the present invention, and see Fig. 1, the method comprises:
S110: application platform obtains authentication information from the server of the first system.Wherein, preferably, described second system can be a kind of existing system.
S120: application platform accesses the data on the server of second system (a kind of open system) by the authentication information got.
Wherein, in embodiments of the present invention, described authentication information can be such as the cipher-text information of access token or access token.
As shown in Figure 2, in embodiments of the present invention, above-mentioned treatment S 110 can realize in the following manner:
S111: described application platform calls the login page of described the first system, so that the server of described the first system receives the log-on message of user by described login page and judges the licensing status of described application platform according to described log-on message.
S112: described application platform receives the server of described the first system at the authentication information determining to generate and send after the licensing status of described application platform is authorize.
Fig. 3 is the flow chart of the another kind of data access method according to embodiment of the present invention.See Fig. 3, the method comprises:
S210: the server producing authentication information of the first system and authorization information.Wherein, preferably, described second system can be a kind of existing system.
S220: the authentication information of generation is sent to application platform and the authorization information of generation is sent to the server of second system so that described application platform accesses the data on the server of described second system by described authentication information by the server of described the first system.
As shown in Figure 4, in embodiments of the present invention, above-mentioned treatment S 210 can realize in the following manner:
S211: the log-on message of the server receives user of described the first system.
S212: according to the log-on message received, the server of described the first system verifies whether described user authorizes described application platform to access the data of described user on the server of described 3rd system at least partially, if, then perform S213, otherwise, return treatment S 211.
S213: the server producing authentication information of described the first system and authorization information.
In embodiments of the present invention, the server of described the first system can generate access token, using described access token as described authentication information and described authorization information; Or, be encrypted by access token described in the double secret key of described application platform, using the cipher-text information of described access token as described authentication information, using the cleartext information of described access token as described authorization information, and described key is sent to the server of described second system.
Fig. 5 is the flow chart of another data access method according to embodiment of the present invention.See Fig. 5, the method comprises:
S310: the server of second system receives the authorization information of the server transmission of the first system and the access request of application platform transmission.Wherein, preferably, described second system can be a kind of existing system.
S320: the server of described second system parses authentication information from described access request.
S330: the server of described second system carries out verification process according to described authentication information and described authorization information to described application platform, if be verified, then performs S340, if authentication failed, then performs S350.
S340: the server of described second system sends the data corresponding with described access request to described application platform, returns treatment S 310.
S350: the server identification current accessed of second system is that falseness is accessed and adjusts the false access times of described application platform.
S360: the server of described second system judges whether the false access times after adjusting are greater than or equal to predetermined threshold, if so, then perform S370, if not, then return treatment S 310.
S370: the server of described second system shields described application platform, returns treatment S 310.
Certainly, embodiments of the present invention are not limited thereto, and when the result of above-mentioned treatment S 330 is authentication failed, can also directly refuses the access of described application platform and point out corresponding information then to return treatment S 310.
Below for described the first system for the handling process of application market to data access method of the present invention buying described application platform is specifically described.As shown in Figure 6, the method comprises:
S410: application platform (a kind of third-party application) calls the login page of the first system (can be such as the application market for buying described application platform) after user initiates register.
S420: the server of the first system receives the log-on message (comprising the information such as user name and password) of user by this login page, judge whether described user buys described application platform (in embodiments of the present invention according to the log-on message of user, as long as user have purchased a certain system and is namely defaulted as its data stored on service provider of this system access of this subscriber authorisation), if, then perform S430, otherwise, return S410.
In embodiments of the present invention, the server of the first system can directly judge whether to authorize according to the log-on message of user and without the need to all needing user to carry out Authorized operation before each producing authentication information.
S430: the server of described the first system generates access token, is encrypted, using the cipher-text information of access token as authentication information, using the cleartext information of access token as authorization information by this access token of double secret key of application platform.
Wherein, in embodiments of the present invention, user such as can be carried out the identifier of the session logged in as access token by the server of described the first system.
S440: authentication information is sent to application platform by the server of described the first system, sends to the server of second system (a kind of open system) by authorization information and described key.
S450: described application platform has the access request of described authentication information to the server transmit band of described second system.
Wherein, in embodiments of the present invention, described authentication information such as can be deposited as cookie (being stored in the data on user local terminal) by described application platform, and this cookie can be carried when accessing the server of described second system, to this, need to ensure that described application platform, the first system and second system have identical second level domain space and cross-domain name can not send the problem of cookie to overcome.
S460: the server of described second system parses authentication information from described access request, carries out verification process according to described authentication information and authorization information to described application platform, if be verified, then performs S470, if authentication failed, then perform S480.
Wherein, described verification process specifically can realize in the following manner: described in the server by utilizing of described second system, double secret key authentication information is decrypted, and is mated by the authentication information after deciphering with authorization information, if the match is successful, then be verified, if it fails to match, then authentication failed.
S470: the server of described second system sends the data corresponding with described access request to described application platform, returns S410.
S480: the server identification current accessed of second system is that falseness is accessed and adjusts the false access times of described application platform.
S490: the server of second system judges whether the false access times after adjusting are more than or equal to predetermined threshold, if so, then perform S500, otherwise, return S410.
S500: the server of described second system shields described application platform, returns S410.
Fig. 7 is the Organization Chart of the data access system according to embodiment of the present invention.See Fig. 7, described system comprises: application platform (a kind of third-party application) 100, be positioned at the server 200 of the first system, and be positioned at the server 300 of second system, wherein, described second system is a kind of open system supporting open standard, preferably, described the first system can be a kind of existing system, particularly:
Application platform 100, for performing following operation: obtain authentication information from server 200; By the data on the authentication information access services device 300 that gets.
In embodiments of the present invention, operational example such as the client-side in application platform 100 that above-mentioned application platform 100 will perform performs.
Server 200, for performing following operation: producing authentication information and authorization information; The authentication information of generation is sent to application platform 100 and the authorization information of generation is sent to 300 so that described application platform 100 accesses the data on described server 300 by described authentication information.
Server 300, for performing following operation: the authorization information that reception server 200 sends and the access request that application platform 100 sends; Authentication information is parsed from described access request; According to described authentication information and described authorization information, verification process is carried out to described application platform 100; If be verified, then send the data corresponding with described access request to described application platform 100.
Fig. 8 shows the structural representation of the application platform 100 shown in Fig. 7, and see Fig. 8, application platform 100 comprises: acquisition module 110 and access modules 120, particularly:
Acquisition module 110, for obtaining authentication information from described server 200.
Access modules 120, the authentication information for being got by described acquisition module 110 accesses the data on described server 300.
In embodiments of the present invention, above-mentioned acquisition module 110 and access modules 120 such as all can be configured at client-side.
As shown in Figure 9, in embodiments of the present invention, acquisition module 110 can comprise: call unit 111 and receiving element 112, particularly:
Call unit 111, for calling the login page of described the first system, so that described server 200 receives the log-on message of user by described login page and judges the licensing status of described application platform 100 according to described log-on message;
Receiving element 112, for receiving described server 200 at the authentication information determining to generate and send after the licensing status of described application platform 100 is authorize.
Figure 10 shows the structural representation of the server 200 shown in Fig. 7.See Figure 10, described server 200 comprises: generation module 210 and sending module 220, particularly:
Generation module 210, for producing authentication information and authorization information.
Sending module 220, the authentication information for being generated by described generation module 210 sends to application platform 100 and the authorization information that described generation module 210 generates is sent to server 300 so that described application platform 100 accesses the data on described server 300 by described authentication information.
As shown in figure 11, in embodiments of the present invention, described generation module 210 can comprise: receiving element 211, authentication unit 212 and generation unit 213, particularly:
Receiving element 211, for receiving the log-on message of user.
For the log-on message received according to described receiving element 211, authentication unit 212, verifies whether described user authorizes described application platform 100 to access the data of described user on described server 300 at least partially.
Generation unit 213, when authorizing for being verified as when described authentication unit 212, producing authentication information and authorization information.
In embodiments of the present invention, described server 200 can generate access token; Using described access token as described authentication information and described authorization information, or, be encrypted by access token described in the double secret key of application platform, using the cipher-text information of described access token as described authentication information, using the cleartext information of described access token as described authorization information, and described key is sent to described server 300.
Figure 12 shows the structural representation of the server 300 shown in Fig. 7.See Figure 12, described server 300 comprises: receiver module 310, parsing module 320, authentication module 330, sending module 340, identification and adjusting module 350, judge module 360 and shroud module 370, particularly:
Receiver module 310, the access request that authorization information and application platform 100 for receiving the transmission of described server 200 send.
Parsing module 320, for parsing authentication information in the access request from described receiver module 310 reception.
Authentication module 330, the authorization information received for the authentication information that parses according to described parsing module 320 and described receiver module 310 carries out verification process to described application platform 100.
Sending module 340, for when described authentication module 330 is defined as being verified, sends the data corresponding with described access request to described application platform 100.
Identify and adjusting module 350, for when described authentication module 330 is defined as authentication failed, identify that current accessed is that falseness is accessed and adjusts the false access times of described application platform 100.
Whether judge module 360, be greater than or equal to predetermined threshold for the false access times after judging described identification and adjusting module 350 adjustment.
Shroud module 370, for when the false access times after the judged result of described judge module 360 is described adjustment are greater than or equal to described predetermined threshold, shields described application platform 100.
Certainly, embodiments of the present invention are not limited thereto, such as by for when described authentication module 330 is defined as authentication failed, the access of described application platform 100 can be refused and points out the refusal of corresponding information and reminding module to replace described identification and adjusting module 350, comparison module 360 and shroud module 370.
Implement data access method provided by the invention, equipment and system, can by making the server of certain system being different from open system as the authorization server for producing authentication information, thus realize ensure that authorization server is separated with the role of Resource Server when open system is without the need to setting up separately an authorization server, reduce hardware cost.
Through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by the mode of software combined with hardware platform.Based on such understanding, what technical scheme of the present invention contributed to background technology can embody with the form of software product in whole or in part, this computer software product can be stored in storage medium, as ROM/RAM, magnetic disc, CD etc., comprising some instructions in order to make a computer equipment (can be personal computer, server, smart mobile phone or the network equipment etc.) perform the method described in some part of each embodiment of the present invention or embodiment.
The term used in specification of the present invention and wording, just to illustrating, are not meaned and are formed restriction.It will be appreciated by those skilled in the art that under the prerequisite of the general principle not departing from disclosed execution mode, can various change be carried out to each details in above-mentioned execution mode.Therefore, scope of the present invention is only determined by claim, and in the claims, except as otherwise noted, all terms should be understood by the most wide in range rational meaning.

Claims (10)

1. a data access method, is characterized in that, described method comprises:
Application platform obtains authentication information from the server of the first system;
Described application platform accesses the data on the server of second system by the authentication information got.
2. the method for claim 1, is characterized in that, application platform obtains authentication information from the server of the first system and comprises:
Described application platform calls the login page of described the first system, so that the server of described the first system receives the log-on message of user by described login page and judges the licensing status of described application platform according to described log-on message;
Described application platform receives the server of described the first system at the authentication information determining to generate and send after the licensing status of described application platform is authorize.
3. a data access method, is characterized in that, described method comprises:
The server producing authentication information of the first system and authorization information;
The authentication information of generation is sent to application platform and the authorization information of generation is sent to the server of second system so that described application platform accesses the data on the server of described second system by described authentication information by the server of described the first system.
4. method as claimed in claim 3, it is characterized in that, the server producing authentication information of the first system and authorization information comprise:
The log-on message of the server receives user of described the first system;
According to the log-on message received, the server of described the first system verifies whether described user authorizes described application platform to access the data of described user on the server of described second system at least partially;
If authorize, then the server producing authentication information of described the first system and authorization information.
5. the method as described in claim 3 or 4, is characterized in that,
Described authentication information comprises: the cipher-text information of access token;
Described authorization information comprises: the cleartext information of described access token.
6. a data access method, is characterized in that, described method comprises:
The server of second system receives the authorization information of the server transmission of the first system and the access request of application platform transmission;
The server of described second system parses authentication information from described access request;
The server of described second system carries out verification process according to described authentication information and described authorization information to described application platform;
If be verified, then the server of described second system sends the data corresponding with described access request to described application platform.
7. method as claimed in claim 6, it is characterized in that, described method also comprises:
If authentication failed, then the server identification current accessed of second system is that falseness is accessed and adjusts the false access times of described application platform;
The server of described second system judges whether the false access times after adjusting are greater than or equal to predetermined threshold;
If the false access times after described adjustment are greater than or equal to described predetermined threshold, then the server of described second system shields described application platform.
8. an application platform, is characterized in that, described application platform comprises:
Acquisition module, obtains authentication information for the server from the first system;
Access modules, the data on the server of the authentication information access second system got by described acquisition module.
9. application platform as claimed in claim 8, it is characterized in that, described acquisition module comprises:
Call unit, for calling the login page of described the first system, so that the server of described the first system receives the log-on message of user by described login page and judges the licensing status of described application platform according to described log-on message;
Receiving element, for receiving the server of described the first system at the authentication information determining to generate and send after the licensing status of described application platform is authorize.
10. a data access system, is characterized in that, described system comprises:
Application platform as claimed in claim 8 or 9, is positioned at the server of the first system, and, be positioned at the server of second system; Wherein,
The server being positioned at described the first system comprises:
Generation module, for producing authentication information and authorization information,
Sending module, the authentication information for being generated by described generation module sends to described application platform and the authorization information that described generation module generates is sent to the server of described second system so that described application platform accesses the data on the server of described second system by described authentication information;
The server being positioned at described second system comprises:
Receiver module, the authorization information that the server for receiving described the first system sends and the access request that described application platform sends,
Parsing module, parses authentication information in the access request that receives from described receiver module,
Authentication module, the authorization information received for the authentication information that parses according to described parsing module and described receiver module carries out verification process to described application platform,
Sending module, for when described authentication module is defined as being verified, sends the data corresponding with described access request to described application platform.
CN201510781737.6A 2015-11-13 2015-11-13 Data access method, equipment and system Active CN105429978B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510781737.6A CN105429978B (en) 2015-11-13 2015-11-13 Data access method, equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510781737.6A CN105429978B (en) 2015-11-13 2015-11-13 Data access method, equipment and system

Publications (2)

Publication Number Publication Date
CN105429978A true CN105429978A (en) 2016-03-23
CN105429978B CN105429978B (en) 2018-10-30

Family

ID=55507920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510781737.6A Active CN105429978B (en) 2015-11-13 2015-11-13 Data access method, equipment and system

Country Status (1)

Country Link
CN (1) CN105429978B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110022279A (en) * 2018-01-08 2019-07-16 普天信息技术有限公司 The method and system of authentication in a kind of micro services system
CN110771112A (en) * 2017-05-25 2020-02-07 脸谱公司 System and method for preventing session pinning on a domain portal
WO2020102974A1 (en) * 2018-11-20 2020-05-28 深圳市欢太科技有限公司 Data access method, data access apparatus, and mobile terminal
CN112104588A (en) * 2019-06-17 2020-12-18 北京车和家信息技术有限公司 Login authentication method and system, terminal and server

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739708A (en) * 2011-04-07 2012-10-17 腾讯科技(深圳)有限公司 System and method for accessing third party application based on cloud platform
CN103685139A (en) * 2012-08-30 2014-03-26 中兴通讯股份有限公司 Authentication and authorization processing method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102739708A (en) * 2011-04-07 2012-10-17 腾讯科技(深圳)有限公司 System and method for accessing third party application based on cloud platform
CN103685139A (en) * 2012-08-30 2014-03-26 中兴通讯股份有限公司 Authentication and authorization processing method and device

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110771112A (en) * 2017-05-25 2020-02-07 脸谱公司 System and method for preventing session pinning on a domain portal
CN110771112B (en) * 2017-05-25 2022-02-15 元平台公司 System and method for preventing session pinning on a domain portal
CN110022279A (en) * 2018-01-08 2019-07-16 普天信息技术有限公司 The method and system of authentication in a kind of micro services system
WO2020102974A1 (en) * 2018-11-20 2020-05-28 深圳市欢太科技有限公司 Data access method, data access apparatus, and mobile terminal
CN112823503A (en) * 2018-11-20 2021-05-18 深圳市欢太科技有限公司 Data access method, data access device and mobile terminal
CN112823503B (en) * 2018-11-20 2022-08-16 深圳市欢太科技有限公司 Data access method, data access device and mobile terminal
CN112104588A (en) * 2019-06-17 2020-12-18 北京车和家信息技术有限公司 Login authentication method and system, terminal and server

Also Published As

Publication number Publication date
CN105429978B (en) 2018-10-30

Similar Documents

Publication Publication Date Title
US8819800B2 (en) Protecting user information
US11234128B2 (en) Managing undesired service requests in a network
US9154955B1 (en) Authenticated delivery of premium communication services to trusted devices over an untrusted network
CN109873819B (en) Method and system for preventing illegal access to server
CN111132305B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN105681259A (en) Open authorization method and apparatus and open platform
US9369873B2 (en) Network application function authorisation in a generic bootstrapping architecture
CN105429978A (en) Data access methods and system, and equipment
CN105722072A (en) Business authorization method, device, system and router
CN112491890A (en) Access method and device
CN109873818B (en) Method and system for preventing illegal access to server
WO2013071836A1 (en) Method and apparatus for processing client application access authentication
CN111093196B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN105635060B (en) It is a kind of to obtain method, authentication server and the gateway for applying data
CA2938780A1 (en) Method and system for determining that a sim and a sip client are co-located in the same mobile equipment
CN101990771B (en) Service reporting
CN102318376A (en) Method of and system for implementing privacy control
CN107995587B (en) Authentication method, authentication platform, authentication system and service provider platform
CN104427497A (en) Handset verification method, handset and handset verification system
KR20140095050A (en) Method and apparatus for supporting single sign-on in a mobile communication system
US8578492B2 (en) Application revocation
EP4109837A1 (en) Device verification using binary message service messages
US9615256B2 (en) Method and apparatus for providing an access to a tethering service via an endpoint device
CN114629672A (en) Method, system and storage medium for improving security of voice call based on token authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant