CN106302606A - A kind of across application access method and device - Google Patents

A kind of across application access method and device Download PDF

Info

Publication number
CN106302606A
CN106302606A CN201510308538.3A CN201510308538A CN106302606A CN 106302606 A CN106302606 A CN 106302606A CN 201510308538 A CN201510308538 A CN 201510308538A CN 106302606 A CN106302606 A CN 106302606A
Authority
CN
China
Prior art keywords
application
user
bill
account information
identities
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510308538.3A
Other languages
Chinese (zh)
Other versions
CN106302606B (en
Inventor
王泽成
杜普洲
王滔
贺嘉
罗向阳
陶亚勋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Henan Co Ltd
China Mobile Group Hunan Co Ltd
Original Assignee
China Mobile Group Hunan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Hunan Co Ltd filed Critical China Mobile Group Hunan Co Ltd
Priority to CN201510308538.3A priority Critical patent/CN106302606B/en
Publication of CN106302606A publication Critical patent/CN106302606A/en
Application granted granted Critical
Publication of CN106302606B publication Critical patent/CN106302606B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/567Integrating service provisioning from a plurality of service providers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Abstract

The invention discloses a kind of across application access method and device.Described method includes, the user receiving request permission the second application that the first application sends accesses the access request of described first application;Described access request includes the application identities of described first application, and the ID of the user of described second application;According to the application identities of described first application, described first application is carried out authentication;If authentication is passed through, then according to the ID of the described second user applied, inquiring about account information, described account information belongs to the user of described second application, logs in the account information needed for described first application;The described account information obtained is sent to described first application, indicates described first application to allow the user of described second application to access described first application.User operation can be simplified by the method for the present invention, improve the safety of account information.

Description

A kind of across application access method and device
Technical field
The present invention relates to video coding and decoding technology field, particularly relate to a kind of across application access method and device.
Background technology
Have multiple application in a usual enterprise, different application realize different functions.Normal conditions Under, in order to protect the safety of the resource information in application, after user needs to carry out login authentication, could access Application.
For realizing the centralized management of application, generally completed the login authentication work to each application by centralized management platform Make.Such as, after inputting account information when user accesses application A in the login interface of application A, should With A, this account information is sent to manage platform concentratedly be authenticated;After certification is passed through, manage platform concentratedly Message certification passed through is sent to apply A, and then application A is that this user carries according to the account information of user For the resource in its extent of competence.When user wants that the interface request from application A accesses application B, i.e. user and thinks When application A directly redirects access application B, user then needs to enter the login interface of application B, then Input logs in the account information of application B, and after being completed certification by centralized management platform equally, user just can visit Ask application B.
Visible, in prior art, user needs to remember the accounts information of different application, and each accessing Being required to during individual application input account information, this is not only user and makes troubles, but also probably due to user During input account information, easily stolen by unauthorized person, and cause account information dangerous.
Summary of the invention
Embodiments provide a kind of across application access method and device, in order to solve the visit that presently, there are Ask that application is made troubles and the unsafe problem of account information to user.
Embodiments provide a kind of across applying access method, including:
The user receiving request permission the second application that the first application sends accesses the access of described first application Request;Wherein, described access request is user's interface request in described second application of described second application Trigger what described first application generated when accessing described first application;Described access request includes described first The application identities of application, and the ID of the user of described second application;
According to the application identities of described first application, described first application is carried out authentication;
If authentication is passed through, then according to the ID of the described second user applied, inquire about account information, Described account information belongs to the user of described second application, logs in the account letter needed for described first application Breath;
The described account information obtained is sent to described first application, indicates described first application to allow described The user of the second application accesses described first application.
Further, the embodiment of the present invention additionally provides a kind of across applying access device, including:
First receiver module, the request sent for receiving the first application allows the user of the second application to access institute State the access request of the first application;Wherein, described access request is that the user of described second application is described the The interface request of two application triggers what described first application generated when accessing described first application;Described access please Ask the application identities including described first application, and the ID of the user of described second application;
Authentication module, for the application identities according to described first application, is carried out described first application Authentication;
Enquiry module, if passing through for authentication, then according to the ID of the described second user applied, Inquiry account information, described account information be belong to described second application user, log in described first should By required account information;
First sending module, for the described account information obtained is sent to described first application, indicates institute Stating the first application allows the user of described second application to access described first application.
The present invention has the beneficial effect that:
Another application in inventive embodiments, after user's successful access one is applied, in access rights Time, it is not necessary to user inputs account information, so user operation can be simplified, accesses the application side of bringing for user Just;Because inputting account information without user, it is also possible to improve the safety of account information.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, institute in embodiment being described below The accompanying drawing used is needed to briefly introduce, it should be apparent that, the accompanying drawing in describing below is only the present invention's Some embodiments, from the point of view of those of ordinary skill in the art, on the premise of not paying creative work, Other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 show in the embodiment of the present invention one across one of schematic flow sheet applying access method;
Fig. 2 show in the embodiment of the present invention two two of the schematic flow sheet across application access method;
Fig. 3 show in the embodiment of the present invention three one of schematic diagram accessing device across application;
Fig. 4 show in the embodiment of the present invention three two of the schematic diagram across application access device.
Detailed description of the invention
Embodiments provide a kind of across application access method, technical side described in the embodiment of the present invention In case, owing to user is when the second application accesses the first application, by the first application to centralized management platform request Allow this user to access, and at centralized management platform, the identity of the first application is confirmed, confirm that first should When using credible, user is just allowed to access the first application.So, in the technical scheme that the embodiment of the present invention provides In, when application accesses, it is not necessary to user inputs account information, simplifies user operation, and, also avoid Because user inputs account information unsafe problem that the account information of account information agency causes.
In order to make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to this Bright it is described in further detail, it is clear that described embodiment is only a part of embodiment of the present invention, Rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing Go out all other embodiments obtained under creative work premise, broadly fall into the scope of protection of the invention.
Embodiment one:
As it is shown in figure 1, its be in the embodiment of the present invention one across application access method schematic flow sheet, be somebody's turn to do Method can comprise the following steps that
Step 101: the user of request permission the second application receiving the first application transmission accesses described first should Access request;Wherein, described access request is that the user of described second application is in described second application Interface request triggers what described first application generated when accessing described first application;Described access request includes The application identities of described first application, and the ID of the user of described second application.
Wherein, ID can be the account information that user logs in the second application.
Wherein, if user can log in centralized management platform, each in access rights in centralized management platform During application, user can be logged in centralized management platform account as primary account number, user is logged in its authority In the range of the account of application be considered as from account, and set up primary account number and each corresponding relation between account, So ID in step 101 is the primary account number of user.
Certainly, needing explanation, any information that can uniquely represent user identity all can be marked as user Knowing, this is not limited by the present invention.
Step 102: according to the application identities of described first application, described first application is carried out authentication.
Step 103: if authentication is passed through, then according to the ID of the described second user applied, look into Asking account information, described account information belongs to the user of described second application, logs in described first application Required account information.
Wherein, to any user, storage has respectively should in the range of the ID of this user and this user right The corresponding relation of account information, the account letter logging in the first application can be inquired according to this corresponding relation Breath.
Step 104: the described account information obtained is sent to described first application, indicates described first to answer Described first application is accessed with the user allowing described second application.
Further, for realizing the authentication to the first application, step 102, following steps are specifically included:
Step A1: according to the application identities of described first application, generate the bill of described first application, institute State bill and include the application identities of described first application, and password information.
Wherein, in one embodiment, application identities can be application numbers and/or Apply Names, and password is believed The character of the information that breath can be randomly generated, such as stochastic generation;Password information can also is that generation bill Time timestamp.It is any for verifying that the first the most believable information of application is all applicable to the embodiment of the present invention, This is not limited by the present invention.
Step A2: the described bill generated is sent to described first application, indicates described first application to solve Password information after application identities after analysing described bill and returning parsing, and parsing.
Step A3: receive the application identities after the parsing that described first application returns, and the mouth after parsing Make information.
Step A4: judge whether resolve after application identities identical with the application identities in described bill and And resolve after password information identical with the password information in described bill.
Step A5: if the application identities after Xie Xiing is identical with the application identities in described bill and resolves After password information identical with the password information in described bill, it is determined that described first application identity certification lead to Cross;Otherwise, it determines described first application identity certification is not passed through.
Further, in order to improve the safety accessing the first application, including the resource in the first application, After step A1 generates bill, it is also possible to described bill is encrypted;Step A2 then can perform Described bill after encryption is sent to described first application.The most just can reach to prevent because bill is by malice The unauthorized access intercepted and captured or forge and cause.
Further, understand the result of authentication for ease of the first application, after performing step 102, And in step 103 according to the ID of the described second user applied, before inquiry account information, also Can perform following steps:
Step B1: the authentication result that described first application is carried out authentication is sent to described first should With.
Step B2: receive described first apply confirm authentication result be authentication by time the account that sends Number information acquisition request.
Performing after step B2, step 103 can perform to be to receive after described account information obtains request, The ID of the user according to described second application, inquires about account information.
Further, for ensureing the safety of account information, step 104 can specifically perform the institute for obtaining After stating account information encryption, it is sent to described first application.
To sum up, in the embodiment of the present invention, after user's successful access one is applied, another in access rights During one application, it is not necessary to user inputs account information, so user operation can be simplified, accessing for user should With bringing convenience;Because inputting account information without user, it is also possible to improve the safety of account information.
Embodiment two
As in figure 2 it is shown, the embodiment of the present invention by user from application A access application B as a example by, to the present invention What embodiment provided illustrates across application access method, and the method comprises the following steps:
Step 201: user P sends the jump request accessing application B in application A.
Wherein, this request e.g. user clicks through the connection triggering of application B in application A.
Step 202: after application B receives jump request, sends request to centralized management platform and allows user P accesses the access request of application B, and described access request includes the application identities applying B, and user The ID of P.
Step 203: centralized management platform receives access request.
Step 204: centralized management platform, according to the application identities of described application B, generates the bill of application B, Described bill includes the application identities applying B, and password information.
Step 205: the bill generated is encrypted by centralized management platform.
Step 206: the bill after encryption is sent to apply B by centralized management platform.
Step 207: bill is decrypted after receiving the bill that centralized management platform sends by application B, and solves Application identities in analysis bill and password information.
Step 208: the application identities after applying B to resolve and the password information after parsing are sent to concentrate tube Platform.
Step 209: centralized management platform receives the application identities after the parsing that application B sends, and resolves After password information.
Step 210: centralized management platform judges whether the application identities after resolving and the application in described bill Identify identical and resolve after password information identical with the password information in described bill;The most true Surely application B authentication is passed through, if otherwise determining application B authentication difference mistake, and sends identity and recognizes Card result gives application B.
Step 211: after application B receives identity authentication result, leads to if identity authentication result is authentication Cross, then send account information obtain request to centralized management platform, if identity authentication result be authentication not By then sending the login interface logging in application B to application A.
Step 212: after centralized management platform receives the account information acquisition request that application B sends, according to The ID of described user P, inquiry belongs to the account information needed for user P, login application B.
Step 213: centralized management platform is sent to apply B after the account information inquired being encrypted.
Step 214: after application B receives the account information after the encryption that centralized management platform sends, to account Information is decrypted, and according in the extent of competence for user P offer user P of the account information after deciphering Resource.
In the embodiment of the present invention, when accessing across application, it is not necessary to user inputs account information, it is possible to simplify and use Family operates, by the encryption of the encryption of bill and account information can improve the safety of access.
Embodiment three
Based on identical inventive concept, the embodiment of the present invention also provides for a kind of across application access device, such as Fig. 3 Shown in, for the schematic diagram of this device, this device includes:
First receiver module 301, the request sent for receiving the first application allows the user of the second application to visit Ask the access request of described first application;Wherein, described access request is that the user of described second application is in institute Trigger what described first application generated when stating described first application of interface request access of the second application;Described visit The request of asking includes the application identities of described first application, and user's mark of the user of described second application Know;
Authentication module 302, for the application identities according to described first application, to described first application Carry out authentication;
Enquiry module 303, if passing through for authentication, then according to the user of the described second user applied Mark, inquires about account information, and described account information is to belong to described in the described second user applied, login Account information needed for first application;
First sending module 304, for the described account information obtained is sent to described first application, refers to Show that described first application allows the user of described second application to access described first application.
Preferably, described authentication module 302, specifically include:
Signal generating unit 305, for the application identities according to described first application, generates described first application Bill, described bill includes the application identities of described first application, and password information;
Transmitting element 306, for the described bill generated is sent to described first application, indicates described the Bill described in one analytic application the application identities after returning parsing, and the password information after resolving;
Receive unit 307, the application identities after receiving the parsing that described first application returns, and solve Password information after analysis;
Judging unit 308, for judging whether the application identities after resolving and the application identities in described bill Identical and resolve after password information identical with the password information in described bill;
Authentication ' unit 309, if the application identities after resolving is identical with the application identities in described bill, And the password information after Xie Xiing is identical with the password information in described bill, it is determined that described first application body Part certification is passed through;Otherwise, it determines described first application identity certification is not passed through.
Preferably, as shown in Figure 4, described device also includes:
Encrypting module 310, after described signal generating unit 305 generates the bill of described first application, right Described bill is encrypted;
Described first sending module 304, should specifically for the described bill after encryption is sent to described first With.
Preferably, as shown in Figure 4, described device also includes:
Second sending module 311, for described authentication module 302 according to the described first application applied Mark, after described first application is carried out authentication, described enquiry module 303 should according to described second The ID of user, before inquiry account information, described first application will be carried out authentication Authentication result is sent to described first application;
Second receiver module 312, being used for receiving described first and applying in confirmation authentication result is that authentication is led to The account information of out-of-date transmission obtains request;
Described enquiry module 303, after receiving the acquisition request of described account information, according to described The ID of the user of the second application, inquires about account information.
Preferably, described by the first sending module 304, specifically for the described account information encryption that will obtain After, it is sent to described first application.
About the device in above-described embodiment, wherein modules performs the concrete mode of operation relevant The embodiment of the method is described in detail, explanation will be not set forth in detail herein.
It will be understood by those skilled in the art that embodiments of the invention can be provided as method, device (device), Or computer program.Therefore, the present invention can use complete hardware embodiment, complete software implementation, Or combine the form of embodiment in terms of software and hardware.And, the present invention can use one or more its In include the computer-usable storage medium of computer usable program code and (include but not limited to disk storage Device, CD-ROM, optical memory etc.) form of the upper computer program implemented.
The present invention is with reference to method, device (device) and computer program according to embodiments of the present invention Flow chart and/or block diagram describe.It should be understood that can by computer program instructions flowchart and/or Flow process in each flow process in block diagram and/or square frame and flow chart and/or block diagram and/or square frame In conjunction with.These computer program instructions can be provided to general purpose computer, special-purpose computer, Embedded Processor Or the processor of other programmable data processing meanss is to produce a machine so that by computer or other The instruction that the processor of programmable data processing means performs produce for realizing in one flow process of flow chart or The device of the function specified in multiple flow processs and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and computer or other programmable datas can be guided to process dress Put in the computer-readable memory worked in a specific way so that be stored in this computer-readable memory Instruction produce and include the manufacture of command device, this command device realizes in one flow process or multiple of flow chart The function specified in flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing meanss, makes Obtain and perform sequence of operations step on the computer or other programmable apparatus to produce computer implemented place Reason, thus the instruction performed on the computer or other programmable apparatus provides for realizing flow chart one The step of the function specified in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know base This creativeness concept, then can make other change and amendment to these embodiments.So, appended right is wanted Ask and be intended to be construed to include preferred embodiment and fall into all changes and the amendment of the scope of the invention.
Obviously, those skilled in the art can carry out various change and modification without deviating from this to the present invention Bright spirit and scope.So, if the present invention these amendment and modification belong to the claims in the present invention and Within the scope of its equivalent technologies, then the present invention is also intended to comprise these change and modification.

Claims (10)

1. one kind across application access method, it is characterised in that described method includes:
The user receiving request permission the second application that the first application sends accesses the access of described first application Request;Wherein, described access request is user's interface request in described second application of described second application Trigger what described first application generated when accessing described first application;Described access request includes described first The application identities of application, and the ID of the user of described second application;
According to the application identities of described first application, described first application is carried out authentication;
If authentication is passed through, then according to the ID of the described second user applied, inquire about account information, Described account information belongs to the user of described second application, logs in the account letter needed for described first application Breath;
The described account information obtained is sent to described first application, indicates described first application to allow described The user of the second application accesses described first application.
Method the most according to claim 1, it is characterised in that described according to described first application Application identities, carries out authentication to described first application, specifically includes:
According to the application identities of described first application, generate the bill of described first application, described bill wraps Include the application identities of described first application, and password information;
The described bill generated is sent to described first application, indicates bill described in described first analytic application And return the password information after the application identities after parsing, and parsing;
Receive the application identities after the parsing that described first application returns, and the password information after parsing;
Judge whether resolve after application identities identical with the application identities in described bill and parsing after Password information is identical with the password information in described bill;
If the application identities after Xie Xiing is identical with the application identities in described bill and resolve after password letter Cease identical with the password information in described bill, it is determined that described first application identity certification is passed through;Otherwise, Determine that described first application identity certification is not passed through.
Method the most according to claim 2, it is characterised in that described first application of described generation After bill, described method also includes:
Described bill is encrypted;
The described described bill by generation is sent to described first application, specifically includes:
Described bill after encryption is sent to described first application.
Method the most according to claim 1, it is characterised in that described according to described first application Application identities, after described first application is carried out authentication, the described user according to described second application ID, inquiry account information before, described method also includes:
The authentication result that described first application is carried out authentication is sent to described first application;And,
Receive described first apply confirm authentication result be authentication by time the account information that sends obtain Take request;
The ID of the described user according to described second application, inquires about account information, specifically includes:
After receiving the acquisition request of described account information, according to the ID of the user of described second application, Inquiry account information.
5. according to described method arbitrary in claim 1-4, it is characterised in that the described institute that will obtain State account information and be sent to described first application, specifically include:
After the described account information encryption that will obtain, it is sent to described first application.
6. one kind accesses device across application, it is characterised in that described device includes:
First receiver module, the request sent for receiving the first application allows the user of the second application to access institute State the access request of the first application;Wherein, described access request is that the user of described second application is described the The interface request of two application triggers what described first application generated when accessing described first application;Described access please Ask the application identities including described first application, and the ID of the user of described second application;
Authentication module, for the application identities according to described first application, is carried out described first application Authentication;
Enquiry module, if passing through for authentication, then according to the ID of the described second user applied, Inquiry account information, described account information be belong to described second application user, log in described first should By required account information;
First sending module, for the described account information obtained is sent to described first application, indicates institute Stating the first application allows the user of described second application to access described first application.
Device the most according to claim 6, it is characterised in that described authentication module, specifically Including:
Signal generating unit, for the application identities according to described first application, generates the bill of described first application, Described bill includes the application identities of described first application, and password information;
Transmitting element, for the described bill generated is sent to described first application, indicates described first to answer With resolving described bill the application identities after returning parsing, and the password information after resolving;
Receive unit, the application identities after receiving the parsing that described first application returns, and after parsing Password information;
Judging unit, for judging whether the application identities after resolving and the application identities phase in described bill With and resolve after password information identical with the password information in described bill;
Authentication ' unit, if for resolve after application identities identical with the application identities in described bill and Password information after parsing is identical with the password information in described bill, it is determined that described first application identity is recognized Card passes through;Otherwise, it determines described first application identity certification is not passed through.
Device the most according to claim 7, it is characterised in that described device also includes:
Encrypting module, after described signal generating unit generates the bill of described first application, to described bill It is encrypted;
Described first sending module, specifically for being sent to described first application by the described bill after encryption.
Device the most according to claim 6, it is characterised in that described device also includes:
Second sending module, for described authentication module according to the described first application identities applied, right After described first application carries out authentication, described enquiry module is according to the use of the user of described second application Family identifies, and before inquiry account information, the authentication result that described first application is carried out authentication is sent To described first application;
Second receiver module, be used for receiving described first apply confirm authentication result be authentication pass through time The account information sent obtains request;
Described enquiry module, after receiving the acquisition request of described account information, according to described second The ID of the user of application, inquires about account information.
10. according to described device arbitrary in claim 6-9, it is characterised in that described by the first transmission Module, after the described account information specifically for obtaining is encrypted, is sent to described first application.
CN201510308538.3A 2015-06-08 2015-06-08 Across the application access method and device of one kind Active CN106302606B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510308538.3A CN106302606B (en) 2015-06-08 2015-06-08 Across the application access method and device of one kind

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510308538.3A CN106302606B (en) 2015-06-08 2015-06-08 Across the application access method and device of one kind

Publications (2)

Publication Number Publication Date
CN106302606A true CN106302606A (en) 2017-01-04
CN106302606B CN106302606B (en) 2019-11-29

Family

ID=57659156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510308538.3A Active CN106302606B (en) 2015-06-08 2015-06-08 Across the application access method and device of one kind

Country Status (1)

Country Link
CN (1) CN106302606B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107920060A (en) * 2017-10-11 2018-04-17 北京京东尚科信息技术有限公司 Data access method and device based on account
CN108965331A (en) * 2018-08-29 2018-12-07 腾讯科技(深圳)有限公司 Log in method of calibration, device and login system
CN110311926A (en) * 2019-02-02 2019-10-08 奇安信科技集团股份有限公司 A kind of application access control method, system and medium
CN110612528A (en) * 2017-05-10 2019-12-24 微软技术许可有限责任公司 Securely authenticating an automated program user
CN110868467A (en) * 2019-11-12 2020-03-06 广州大白互联网科技有限公司 Network certificate synchronization method, system and storage medium based on network certificate platform
CN114301717A (en) * 2022-03-08 2022-04-08 苏州万店掌网络科技有限公司 Single sign-on method, device, equipment and storage medium
CN114553573A (en) * 2022-02-23 2022-05-27 中国工商银行股份有限公司 Identity authentication method and device
CN115189975A (en) * 2022-09-14 2022-10-14 中化现代农业有限公司 Login method, login device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103384254A (en) * 2013-07-19 2013-11-06 北京小米科技有限责任公司 Application account login method, server, client and system
CN103544220A (en) * 2013-09-29 2014-01-29 北京航空航天大学 Method and device for recommending applications
CN104065616A (en) * 2013-03-20 2014-09-24 中国移动通信集团公司 Single sign-on method and system
CN104113533A (en) * 2014-07-02 2014-10-22 百度在线网络技术(北京)有限公司 Login authorization method and device
CN104618364A (en) * 2015-01-23 2015-05-13 联想(北京)有限公司 Information processing method, electronic device and server
CN104660557A (en) * 2013-11-19 2015-05-27 腾讯科技(深圳)有限公司 Operation processing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065616A (en) * 2013-03-20 2014-09-24 中国移动通信集团公司 Single sign-on method and system
CN103384254A (en) * 2013-07-19 2013-11-06 北京小米科技有限责任公司 Application account login method, server, client and system
CN103544220A (en) * 2013-09-29 2014-01-29 北京航空航天大学 Method and device for recommending applications
CN104660557A (en) * 2013-11-19 2015-05-27 腾讯科技(深圳)有限公司 Operation processing method and device
CN104113533A (en) * 2014-07-02 2014-10-22 百度在线网络技术(北京)有限公司 Login authorization method and device
CN104618364A (en) * 2015-01-23 2015-05-13 联想(北京)有限公司 Information processing method, electronic device and server

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110612528A (en) * 2017-05-10 2019-12-24 微软技术许可有限责任公司 Securely authenticating an automated program user
CN107920060A (en) * 2017-10-11 2018-04-17 北京京东尚科信息技术有限公司 Data access method and device based on account
CN107920060B (en) * 2017-10-11 2020-06-05 北京京东尚科信息技术有限公司 Data access method and device based on account
CN108965331A (en) * 2018-08-29 2018-12-07 腾讯科技(深圳)有限公司 Log in method of calibration, device and login system
CN110311926A (en) * 2019-02-02 2019-10-08 奇安信科技集团股份有限公司 A kind of application access control method, system and medium
CN110868467A (en) * 2019-11-12 2020-03-06 广州大白互联网科技有限公司 Network certificate synchronization method, system and storage medium based on network certificate platform
CN110868467B (en) * 2019-11-12 2022-06-03 广州大白互联网科技有限公司 Network certificate synchronization method, system and storage medium based on network certificate platform
CN114553573A (en) * 2022-02-23 2022-05-27 中国工商银行股份有限公司 Identity authentication method and device
CN114301717A (en) * 2022-03-08 2022-04-08 苏州万店掌网络科技有限公司 Single sign-on method, device, equipment and storage medium
CN114301717B (en) * 2022-03-08 2022-07-05 苏州万店掌网络科技有限公司 Single sign-on method, device, equipment and storage medium
CN115189975A (en) * 2022-09-14 2022-10-14 中化现代农业有限公司 Login method, login device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN106302606B (en) 2019-11-29

Similar Documents

Publication Publication Date Title
CN111131242B (en) Authority control method, device and system
CN105187362B (en) Method and device for connection authentication between desktop cloud client and server
CN106302606A (en) A kind of across application access method and device
KR102429633B1 (en) Automatic login method and device between multiple websites
CN109787988B (en) Identity strengthening authentication and authorization method and device
CN104065652B (en) A kind of auth method, device, system and relevant device
CN104065653B (en) A kind of interactive auth method, device, system and relevant device
US5586260A (en) Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms
CN112491881B (en) Cross-platform single sign-on method, system, electronic equipment and storage medium
CN105007280A (en) Application sign-on method and device
JP2018501567A (en) Device verification method and equipment
CN111800378B (en) Login authentication method, device, system and storage medium
CN105099707B (en) A kind of offline authentication method, server and system
KR101451359B1 (en) User account recovery
CN111614673A (en) Operation method of authority authentication system based on CAS
CN107241329B (en) Account login processing method and device
CN110069909B (en) Method and device for login of third-party system without secret
WO2019015516A1 (en) Methods and apparatus for authentication of joint account login
CN104954330A (en) Method of accessing data resources, device and system
CN109388937B (en) Single sign-on method and sign-on system for multi-factor identity authentication
CN104767616A (en) Message processing method, system and related device
CN104767617A (en) Message processing method, system and related device
CN106992859B (en) Bastion machine private key management method and device
CN106453378A (en) Data authentication method, apparatus and system
CN106101054A (en) The single-point logging method of a kind of multisystem and centralized management system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant