CN106302606A - A kind of across application access method and device - Google Patents
A kind of across application access method and device Download PDFInfo
- Publication number
- CN106302606A CN106302606A CN201510308538.3A CN201510308538A CN106302606A CN 106302606 A CN106302606 A CN 106302606A CN 201510308538 A CN201510308538 A CN 201510308538A CN 106302606 A CN106302606 A CN 106302606A
- Authority
- CN
- China
- Prior art keywords
- application
- user
- bill
- account information
- identities
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/567—Integrating service provisioning from a plurality of service providers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
Abstract
The invention discloses a kind of across application access method and device.Described method includes, the user receiving request permission the second application that the first application sends accesses the access request of described first application;Described access request includes the application identities of described first application, and the ID of the user of described second application;According to the application identities of described first application, described first application is carried out authentication;If authentication is passed through, then according to the ID of the described second user applied, inquiring about account information, described account information belongs to the user of described second application, logs in the account information needed for described first application;The described account information obtained is sent to described first application, indicates described first application to allow the user of described second application to access described first application.User operation can be simplified by the method for the present invention, improve the safety of account information.
Description
Technical field
The present invention relates to video coding and decoding technology field, particularly relate to a kind of across application access method and device.
Background technology
Have multiple application in a usual enterprise, different application realize different functions.Normal conditions
Under, in order to protect the safety of the resource information in application, after user needs to carry out login authentication, could access
Application.
For realizing the centralized management of application, generally completed the login authentication work to each application by centralized management platform
Make.Such as, after inputting account information when user accesses application A in the login interface of application A, should
With A, this account information is sent to manage platform concentratedly be authenticated;After certification is passed through, manage platform concentratedly
Message certification passed through is sent to apply A, and then application A is that this user carries according to the account information of user
For the resource in its extent of competence.When user wants that the interface request from application A accesses application B, i.e. user and thinks
When application A directly redirects access application B, user then needs to enter the login interface of application B, then
Input logs in the account information of application B, and after being completed certification by centralized management platform equally, user just can visit
Ask application B.
Visible, in prior art, user needs to remember the accounts information of different application, and each accessing
Being required to during individual application input account information, this is not only user and makes troubles, but also probably due to user
During input account information, easily stolen by unauthorized person, and cause account information dangerous.
Summary of the invention
Embodiments provide a kind of across application access method and device, in order to solve the visit that presently, there are
Ask that application is made troubles and the unsafe problem of account information to user.
Embodiments provide a kind of across applying access method, including:
The user receiving request permission the second application that the first application sends accesses the access of described first application
Request;Wherein, described access request is user's interface request in described second application of described second application
Trigger what described first application generated when accessing described first application;Described access request includes described first
The application identities of application, and the ID of the user of described second application;
According to the application identities of described first application, described first application is carried out authentication;
If authentication is passed through, then according to the ID of the described second user applied, inquire about account information,
Described account information belongs to the user of described second application, logs in the account letter needed for described first application
Breath;
The described account information obtained is sent to described first application, indicates described first application to allow described
The user of the second application accesses described first application.
Further, the embodiment of the present invention additionally provides a kind of across applying access device, including:
First receiver module, the request sent for receiving the first application allows the user of the second application to access institute
State the access request of the first application;Wherein, described access request is that the user of described second application is described the
The interface request of two application triggers what described first application generated when accessing described first application;Described access please
Ask the application identities including described first application, and the ID of the user of described second application;
Authentication module, for the application identities according to described first application, is carried out described first application
Authentication;
Enquiry module, if passing through for authentication, then according to the ID of the described second user applied,
Inquiry account information, described account information be belong to described second application user, log in described first should
By required account information;
First sending module, for the described account information obtained is sent to described first application, indicates institute
Stating the first application allows the user of described second application to access described first application.
The present invention has the beneficial effect that:
Another application in inventive embodiments, after user's successful access one is applied, in access rights
Time, it is not necessary to user inputs account information, so user operation can be simplified, accesses the application side of bringing for user
Just;Because inputting account information without user, it is also possible to improve the safety of account information.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, institute in embodiment being described below
The accompanying drawing used is needed to briefly introduce, it should be apparent that, the accompanying drawing in describing below is only the present invention's
Some embodiments, from the point of view of those of ordinary skill in the art, on the premise of not paying creative work,
Other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 show in the embodiment of the present invention one across one of schematic flow sheet applying access method;
Fig. 2 show in the embodiment of the present invention two two of the schematic flow sheet across application access method;
Fig. 3 show in the embodiment of the present invention three one of schematic diagram accessing device across application;
Fig. 4 show in the embodiment of the present invention three two of the schematic diagram across application access device.
Detailed description of the invention
Embodiments provide a kind of across application access method, technical side described in the embodiment of the present invention
In case, owing to user is when the second application accesses the first application, by the first application to centralized management platform request
Allow this user to access, and at centralized management platform, the identity of the first application is confirmed, confirm that first should
When using credible, user is just allowed to access the first application.So, in the technical scheme that the embodiment of the present invention provides
In, when application accesses, it is not necessary to user inputs account information, simplifies user operation, and, also avoid
Because user inputs account information unsafe problem that the account information of account information agency causes.
In order to make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to this
Bright it is described in further detail, it is clear that described embodiment is only a part of embodiment of the present invention,
Rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing
Go out all other embodiments obtained under creative work premise, broadly fall into the scope of protection of the invention.
Embodiment one:
As it is shown in figure 1, its be in the embodiment of the present invention one across application access method schematic flow sheet, be somebody's turn to do
Method can comprise the following steps that
Step 101: the user of request permission the second application receiving the first application transmission accesses described first should
Access request;Wherein, described access request is that the user of described second application is in described second application
Interface request triggers what described first application generated when accessing described first application;Described access request includes
The application identities of described first application, and the ID of the user of described second application.
Wherein, ID can be the account information that user logs in the second application.
Wherein, if user can log in centralized management platform, each in access rights in centralized management platform
During application, user can be logged in centralized management platform account as primary account number, user is logged in its authority
In the range of the account of application be considered as from account, and set up primary account number and each corresponding relation between account,
So ID in step 101 is the primary account number of user.
Certainly, needing explanation, any information that can uniquely represent user identity all can be marked as user
Knowing, this is not limited by the present invention.
Step 102: according to the application identities of described first application, described first application is carried out authentication.
Step 103: if authentication is passed through, then according to the ID of the described second user applied, look into
Asking account information, described account information belongs to the user of described second application, logs in described first application
Required account information.
Wherein, to any user, storage has respectively should in the range of the ID of this user and this user right
The corresponding relation of account information, the account letter logging in the first application can be inquired according to this corresponding relation
Breath.
Step 104: the described account information obtained is sent to described first application, indicates described first to answer
Described first application is accessed with the user allowing described second application.
Further, for realizing the authentication to the first application, step 102, following steps are specifically included:
Step A1: according to the application identities of described first application, generate the bill of described first application, institute
State bill and include the application identities of described first application, and password information.
Wherein, in one embodiment, application identities can be application numbers and/or Apply Names, and password is believed
The character of the information that breath can be randomly generated, such as stochastic generation;Password information can also is that generation bill
Time timestamp.It is any for verifying that the first the most believable information of application is all applicable to the embodiment of the present invention,
This is not limited by the present invention.
Step A2: the described bill generated is sent to described first application, indicates described first application to solve
Password information after application identities after analysing described bill and returning parsing, and parsing.
Step A3: receive the application identities after the parsing that described first application returns, and the mouth after parsing
Make information.
Step A4: judge whether resolve after application identities identical with the application identities in described bill and
And resolve after password information identical with the password information in described bill.
Step A5: if the application identities after Xie Xiing is identical with the application identities in described bill and resolves
After password information identical with the password information in described bill, it is determined that described first application identity certification lead to
Cross;Otherwise, it determines described first application identity certification is not passed through.
Further, in order to improve the safety accessing the first application, including the resource in the first application,
After step A1 generates bill, it is also possible to described bill is encrypted;Step A2 then can perform
Described bill after encryption is sent to described first application.The most just can reach to prevent because bill is by malice
The unauthorized access intercepted and captured or forge and cause.
Further, understand the result of authentication for ease of the first application, after performing step 102,
And in step 103 according to the ID of the described second user applied, before inquiry account information, also
Can perform following steps:
Step B1: the authentication result that described first application is carried out authentication is sent to described first should
With.
Step B2: receive described first apply confirm authentication result be authentication by time the account that sends
Number information acquisition request.
Performing after step B2, step 103 can perform to be to receive after described account information obtains request,
The ID of the user according to described second application, inquires about account information.
Further, for ensureing the safety of account information, step 104 can specifically perform the institute for obtaining
After stating account information encryption, it is sent to described first application.
To sum up, in the embodiment of the present invention, after user's successful access one is applied, another in access rights
During one application, it is not necessary to user inputs account information, so user operation can be simplified, accessing for user should
With bringing convenience;Because inputting account information without user, it is also possible to improve the safety of account information.
Embodiment two
As in figure 2 it is shown, the embodiment of the present invention by user from application A access application B as a example by, to the present invention
What embodiment provided illustrates across application access method, and the method comprises the following steps:
Step 201: user P sends the jump request accessing application B in application A.
Wherein, this request e.g. user clicks through the connection triggering of application B in application A.
Step 202: after application B receives jump request, sends request to centralized management platform and allows user
P accesses the access request of application B, and described access request includes the application identities applying B, and user
The ID of P.
Step 203: centralized management platform receives access request.
Step 204: centralized management platform, according to the application identities of described application B, generates the bill of application B,
Described bill includes the application identities applying B, and password information.
Step 205: the bill generated is encrypted by centralized management platform.
Step 206: the bill after encryption is sent to apply B by centralized management platform.
Step 207: bill is decrypted after receiving the bill that centralized management platform sends by application B, and solves
Application identities in analysis bill and password information.
Step 208: the application identities after applying B to resolve and the password information after parsing are sent to concentrate tube
Platform.
Step 209: centralized management platform receives the application identities after the parsing that application B sends, and resolves
After password information.
Step 210: centralized management platform judges whether the application identities after resolving and the application in described bill
Identify identical and resolve after password information identical with the password information in described bill;The most true
Surely application B authentication is passed through, if otherwise determining application B authentication difference mistake, and sends identity and recognizes
Card result gives application B.
Step 211: after application B receives identity authentication result, leads to if identity authentication result is authentication
Cross, then send account information obtain request to centralized management platform, if identity authentication result be authentication not
By then sending the login interface logging in application B to application A.
Step 212: after centralized management platform receives the account information acquisition request that application B sends, according to
The ID of described user P, inquiry belongs to the account information needed for user P, login application B.
Step 213: centralized management platform is sent to apply B after the account information inquired being encrypted.
Step 214: after application B receives the account information after the encryption that centralized management platform sends, to account
Information is decrypted, and according in the extent of competence for user P offer user P of the account information after deciphering
Resource.
In the embodiment of the present invention, when accessing across application, it is not necessary to user inputs account information, it is possible to simplify and use
Family operates, by the encryption of the encryption of bill and account information can improve the safety of access.
Embodiment three
Based on identical inventive concept, the embodiment of the present invention also provides for a kind of across application access device, such as Fig. 3
Shown in, for the schematic diagram of this device, this device includes:
First receiver module 301, the request sent for receiving the first application allows the user of the second application to visit
Ask the access request of described first application;Wherein, described access request is that the user of described second application is in institute
Trigger what described first application generated when stating described first application of interface request access of the second application;Described visit
The request of asking includes the application identities of described first application, and user's mark of the user of described second application
Know;
Authentication module 302, for the application identities according to described first application, to described first application
Carry out authentication;
Enquiry module 303, if passing through for authentication, then according to the user of the described second user applied
Mark, inquires about account information, and described account information is to belong to described in the described second user applied, login
Account information needed for first application;
First sending module 304, for the described account information obtained is sent to described first application, refers to
Show that described first application allows the user of described second application to access described first application.
Preferably, described authentication module 302, specifically include:
Signal generating unit 305, for the application identities according to described first application, generates described first application
Bill, described bill includes the application identities of described first application, and password information;
Transmitting element 306, for the described bill generated is sent to described first application, indicates described the
Bill described in one analytic application the application identities after returning parsing, and the password information after resolving;
Receive unit 307, the application identities after receiving the parsing that described first application returns, and solve
Password information after analysis;
Judging unit 308, for judging whether the application identities after resolving and the application identities in described bill
Identical and resolve after password information identical with the password information in described bill;
Authentication ' unit 309, if the application identities after resolving is identical with the application identities in described bill,
And the password information after Xie Xiing is identical with the password information in described bill, it is determined that described first application body
Part certification is passed through;Otherwise, it determines described first application identity certification is not passed through.
Preferably, as shown in Figure 4, described device also includes:
Encrypting module 310, after described signal generating unit 305 generates the bill of described first application, right
Described bill is encrypted;
Described first sending module 304, should specifically for the described bill after encryption is sent to described first
With.
Preferably, as shown in Figure 4, described device also includes:
Second sending module 311, for described authentication module 302 according to the described first application applied
Mark, after described first application is carried out authentication, described enquiry module 303 should according to described second
The ID of user, before inquiry account information, described first application will be carried out authentication
Authentication result is sent to described first application;
Second receiver module 312, being used for receiving described first and applying in confirmation authentication result is that authentication is led to
The account information of out-of-date transmission obtains request;
Described enquiry module 303, after receiving the acquisition request of described account information, according to described
The ID of the user of the second application, inquires about account information.
Preferably, described by the first sending module 304, specifically for the described account information encryption that will obtain
After, it is sent to described first application.
About the device in above-described embodiment, wherein modules performs the concrete mode of operation relevant
The embodiment of the method is described in detail, explanation will be not set forth in detail herein.
It will be understood by those skilled in the art that embodiments of the invention can be provided as method, device (device),
Or computer program.Therefore, the present invention can use complete hardware embodiment, complete software implementation,
Or combine the form of embodiment in terms of software and hardware.And, the present invention can use one or more its
In include the computer-usable storage medium of computer usable program code and (include but not limited to disk storage
Device, CD-ROM, optical memory etc.) form of the upper computer program implemented.
The present invention is with reference to method, device (device) and computer program according to embodiments of the present invention
Flow chart and/or block diagram describe.It should be understood that can by computer program instructions flowchart and/or
Flow process in each flow process in block diagram and/or square frame and flow chart and/or block diagram and/or square frame
In conjunction with.These computer program instructions can be provided to general purpose computer, special-purpose computer, Embedded Processor
Or the processor of other programmable data processing meanss is to produce a machine so that by computer or other
The instruction that the processor of programmable data processing means performs produce for realizing in one flow process of flow chart or
The device of the function specified in multiple flow processs and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and computer or other programmable datas can be guided to process dress
Put in the computer-readable memory worked in a specific way so that be stored in this computer-readable memory
Instruction produce and include the manufacture of command device, this command device realizes in one flow process or multiple of flow chart
The function specified in flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing meanss, makes
Obtain and perform sequence of operations step on the computer or other programmable apparatus to produce computer implemented place
Reason, thus the instruction performed on the computer or other programmable apparatus provides for realizing flow chart one
The step of the function specified in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know base
This creativeness concept, then can make other change and amendment to these embodiments.So, appended right is wanted
Ask and be intended to be construed to include preferred embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and modification without deviating from this to the present invention
Bright spirit and scope.So, if the present invention these amendment and modification belong to the claims in the present invention and
Within the scope of its equivalent technologies, then the present invention is also intended to comprise these change and modification.
Claims (10)
1. one kind across application access method, it is characterised in that described method includes:
The user receiving request permission the second application that the first application sends accesses the access of described first application
Request;Wherein, described access request is user's interface request in described second application of described second application
Trigger what described first application generated when accessing described first application;Described access request includes described first
The application identities of application, and the ID of the user of described second application;
According to the application identities of described first application, described first application is carried out authentication;
If authentication is passed through, then according to the ID of the described second user applied, inquire about account information,
Described account information belongs to the user of described second application, logs in the account letter needed for described first application
Breath;
The described account information obtained is sent to described first application, indicates described first application to allow described
The user of the second application accesses described first application.
Method the most according to claim 1, it is characterised in that described according to described first application
Application identities, carries out authentication to described first application, specifically includes:
According to the application identities of described first application, generate the bill of described first application, described bill wraps
Include the application identities of described first application, and password information;
The described bill generated is sent to described first application, indicates bill described in described first analytic application
And return the password information after the application identities after parsing, and parsing;
Receive the application identities after the parsing that described first application returns, and the password information after parsing;
Judge whether resolve after application identities identical with the application identities in described bill and parsing after
Password information is identical with the password information in described bill;
If the application identities after Xie Xiing is identical with the application identities in described bill and resolve after password letter
Cease identical with the password information in described bill, it is determined that described first application identity certification is passed through;Otherwise,
Determine that described first application identity certification is not passed through.
Method the most according to claim 2, it is characterised in that described first application of described generation
After bill, described method also includes:
Described bill is encrypted;
The described described bill by generation is sent to described first application, specifically includes:
Described bill after encryption is sent to described first application.
Method the most according to claim 1, it is characterised in that described according to described first application
Application identities, after described first application is carried out authentication, the described user according to described second application
ID, inquiry account information before, described method also includes:
The authentication result that described first application is carried out authentication is sent to described first application;And,
Receive described first apply confirm authentication result be authentication by time the account information that sends obtain
Take request;
The ID of the described user according to described second application, inquires about account information, specifically includes:
After receiving the acquisition request of described account information, according to the ID of the user of described second application,
Inquiry account information.
5. according to described method arbitrary in claim 1-4, it is characterised in that the described institute that will obtain
State account information and be sent to described first application, specifically include:
After the described account information encryption that will obtain, it is sent to described first application.
6. one kind accesses device across application, it is characterised in that described device includes:
First receiver module, the request sent for receiving the first application allows the user of the second application to access institute
State the access request of the first application;Wherein, described access request is that the user of described second application is described the
The interface request of two application triggers what described first application generated when accessing described first application;Described access please
Ask the application identities including described first application, and the ID of the user of described second application;
Authentication module, for the application identities according to described first application, is carried out described first application
Authentication;
Enquiry module, if passing through for authentication, then according to the ID of the described second user applied,
Inquiry account information, described account information be belong to described second application user, log in described first should
By required account information;
First sending module, for the described account information obtained is sent to described first application, indicates institute
Stating the first application allows the user of described second application to access described first application.
Device the most according to claim 6, it is characterised in that described authentication module, specifically
Including:
Signal generating unit, for the application identities according to described first application, generates the bill of described first application,
Described bill includes the application identities of described first application, and password information;
Transmitting element, for the described bill generated is sent to described first application, indicates described first to answer
With resolving described bill the application identities after returning parsing, and the password information after resolving;
Receive unit, the application identities after receiving the parsing that described first application returns, and after parsing
Password information;
Judging unit, for judging whether the application identities after resolving and the application identities phase in described bill
With and resolve after password information identical with the password information in described bill;
Authentication ' unit, if for resolve after application identities identical with the application identities in described bill and
Password information after parsing is identical with the password information in described bill, it is determined that described first application identity is recognized
Card passes through;Otherwise, it determines described first application identity certification is not passed through.
Device the most according to claim 7, it is characterised in that described device also includes:
Encrypting module, after described signal generating unit generates the bill of described first application, to described bill
It is encrypted;
Described first sending module, specifically for being sent to described first application by the described bill after encryption.
Device the most according to claim 6, it is characterised in that described device also includes:
Second sending module, for described authentication module according to the described first application identities applied, right
After described first application carries out authentication, described enquiry module is according to the use of the user of described second application
Family identifies, and before inquiry account information, the authentication result that described first application is carried out authentication is sent
To described first application;
Second receiver module, be used for receiving described first apply confirm authentication result be authentication pass through time
The account information sent obtains request;
Described enquiry module, after receiving the acquisition request of described account information, according to described second
The ID of the user of application, inquires about account information.
10. according to described device arbitrary in claim 6-9, it is characterised in that described by the first transmission
Module, after the described account information specifically for obtaining is encrypted, is sent to described first application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510308538.3A CN106302606B (en) | 2015-06-08 | 2015-06-08 | Across the application access method and device of one kind |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510308538.3A CN106302606B (en) | 2015-06-08 | 2015-06-08 | Across the application access method and device of one kind |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106302606A true CN106302606A (en) | 2017-01-04 |
CN106302606B CN106302606B (en) | 2019-11-29 |
Family
ID=57659156
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510308538.3A Active CN106302606B (en) | 2015-06-08 | 2015-06-08 | Across the application access method and device of one kind |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106302606B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107920060A (en) * | 2017-10-11 | 2018-04-17 | 北京京东尚科信息技术有限公司 | Data access method and device based on account |
CN108965331A (en) * | 2018-08-29 | 2018-12-07 | 腾讯科技(深圳)有限公司 | Log in method of calibration, device and login system |
CN110311926A (en) * | 2019-02-02 | 2019-10-08 | 奇安信科技集团股份有限公司 | A kind of application access control method, system and medium |
CN110612528A (en) * | 2017-05-10 | 2019-12-24 | 微软技术许可有限责任公司 | Securely authenticating an automated program user |
CN110868467A (en) * | 2019-11-12 | 2020-03-06 | 广州大白互联网科技有限公司 | Network certificate synchronization method, system and storage medium based on network certificate platform |
CN114301717A (en) * | 2022-03-08 | 2022-04-08 | 苏州万店掌网络科技有限公司 | Single sign-on method, device, equipment and storage medium |
CN114553573A (en) * | 2022-02-23 | 2022-05-27 | 中国工商银行股份有限公司 | Identity authentication method and device |
CN115189975A (en) * | 2022-09-14 | 2022-10-14 | 中化现代农业有限公司 | Login method, login device, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103384254A (en) * | 2013-07-19 | 2013-11-06 | 北京小米科技有限责任公司 | Application account login method, server, client and system |
CN103544220A (en) * | 2013-09-29 | 2014-01-29 | 北京航空航天大学 | Method and device for recommending applications |
CN104065616A (en) * | 2013-03-20 | 2014-09-24 | 中国移动通信集团公司 | Single sign-on method and system |
CN104113533A (en) * | 2014-07-02 | 2014-10-22 | 百度在线网络技术(北京)有限公司 | Login authorization method and device |
CN104618364A (en) * | 2015-01-23 | 2015-05-13 | 联想(北京)有限公司 | Information processing method, electronic device and server |
CN104660557A (en) * | 2013-11-19 | 2015-05-27 | 腾讯科技(深圳)有限公司 | Operation processing method and device |
-
2015
- 2015-06-08 CN CN201510308538.3A patent/CN106302606B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065616A (en) * | 2013-03-20 | 2014-09-24 | 中国移动通信集团公司 | Single sign-on method and system |
CN103384254A (en) * | 2013-07-19 | 2013-11-06 | 北京小米科技有限责任公司 | Application account login method, server, client and system |
CN103544220A (en) * | 2013-09-29 | 2014-01-29 | 北京航空航天大学 | Method and device for recommending applications |
CN104660557A (en) * | 2013-11-19 | 2015-05-27 | 腾讯科技(深圳)有限公司 | Operation processing method and device |
CN104113533A (en) * | 2014-07-02 | 2014-10-22 | 百度在线网络技术(北京)有限公司 | Login authorization method and device |
CN104618364A (en) * | 2015-01-23 | 2015-05-13 | 联想(北京)有限公司 | Information processing method, electronic device and server |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110612528A (en) * | 2017-05-10 | 2019-12-24 | 微软技术许可有限责任公司 | Securely authenticating an automated program user |
CN107920060A (en) * | 2017-10-11 | 2018-04-17 | 北京京东尚科信息技术有限公司 | Data access method and device based on account |
CN107920060B (en) * | 2017-10-11 | 2020-06-05 | 北京京东尚科信息技术有限公司 | Data access method and device based on account |
CN108965331A (en) * | 2018-08-29 | 2018-12-07 | 腾讯科技(深圳)有限公司 | Log in method of calibration, device and login system |
CN110311926A (en) * | 2019-02-02 | 2019-10-08 | 奇安信科技集团股份有限公司 | A kind of application access control method, system and medium |
CN110868467A (en) * | 2019-11-12 | 2020-03-06 | 广州大白互联网科技有限公司 | Network certificate synchronization method, system and storage medium based on network certificate platform |
CN110868467B (en) * | 2019-11-12 | 2022-06-03 | 广州大白互联网科技有限公司 | Network certificate synchronization method, system and storage medium based on network certificate platform |
CN114553573A (en) * | 2022-02-23 | 2022-05-27 | 中国工商银行股份有限公司 | Identity authentication method and device |
CN114301717A (en) * | 2022-03-08 | 2022-04-08 | 苏州万店掌网络科技有限公司 | Single sign-on method, device, equipment and storage medium |
CN114301717B (en) * | 2022-03-08 | 2022-07-05 | 苏州万店掌网络科技有限公司 | Single sign-on method, device, equipment and storage medium |
CN115189975A (en) * | 2022-09-14 | 2022-10-14 | 中化现代农业有限公司 | Login method, login device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106302606B (en) | 2019-11-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111131242B (en) | Authority control method, device and system | |
CN105187362B (en) | Method and device for connection authentication between desktop cloud client and server | |
CN106302606A (en) | A kind of across application access method and device | |
KR102429633B1 (en) | Automatic login method and device between multiple websites | |
CN109787988B (en) | Identity strengthening authentication and authorization method and device | |
CN104065652B (en) | A kind of auth method, device, system and relevant device | |
CN104065653B (en) | A kind of interactive auth method, device, system and relevant device | |
US5586260A (en) | Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms | |
CN112491881B (en) | Cross-platform single sign-on method, system, electronic equipment and storage medium | |
CN105007280A (en) | Application sign-on method and device | |
JP2018501567A (en) | Device verification method and equipment | |
CN111800378B (en) | Login authentication method, device, system and storage medium | |
CN105099707B (en) | A kind of offline authentication method, server and system | |
KR101451359B1 (en) | User account recovery | |
CN111614673A (en) | Operation method of authority authentication system based on CAS | |
CN107241329B (en) | Account login processing method and device | |
CN110069909B (en) | Method and device for login of third-party system without secret | |
WO2019015516A1 (en) | Methods and apparatus for authentication of joint account login | |
CN104954330A (en) | Method of accessing data resources, device and system | |
CN109388937B (en) | Single sign-on method and sign-on system for multi-factor identity authentication | |
CN104767616A (en) | Message processing method, system and related device | |
CN104767617A (en) | Message processing method, system and related device | |
CN106992859B (en) | Bastion machine private key management method and device | |
CN106453378A (en) | Data authentication method, apparatus and system | |
CN106101054A (en) | The single-point logging method of a kind of multisystem and centralized management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |