CN106549909A - A kind of authority checking method and apparatus - Google Patents

A kind of authority checking method and apparatus Download PDF

Info

Publication number
CN106549909A
CN106549909A CN201510595523.XA CN201510595523A CN106549909A CN 106549909 A CN106549909 A CN 106549909A CN 201510595523 A CN201510595523 A CN 201510595523A CN 106549909 A CN106549909 A CN 106549909A
Authority
CN
China
Prior art keywords
signing messages
user
signature
service chaining
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510595523.XA
Other languages
Chinese (zh)
Other versions
CN106549909B (en
Inventor
吕建文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510595523.XA priority Critical patent/CN106549909B/en
Publication of CN106549909A publication Critical patent/CN106549909A/en
Application granted granted Critical
Publication of CN106549909B publication Critical patent/CN106549909B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses a kind of authority checking method, signing messages is generated after User logs in success is confirmed in advance, and the service chaining arranged in the initial authorization page contains signing messages, after the accessing page request that client sends is received, the signing messages of the service chaining carried in obtaining accessing page request, and judge whether consistent with the signing messages carried in the corresponding signing messages of user and the accessing page request, confirming that when judged result is consistent authority checking passes through, on the premise of consuming in save resources, the private data for preventing from illegal user from distorting by parameter to obtain other users, the safety of network is ensured.

Description

A kind of authority checking method and apparatus
Technical field
The application is related to communication technical field, more particularly to a kind of authority checking method.The application also simultaneously It is related to a kind of checking equipment.
Background technology
With the continuous popularization of Internet technology, network can be supplied to the function of user more and more. For website, which also becomes to get over for the service that different levels or the user of authority provide differentiation Come more important.
In the prior art, when user uses some function of website, as page browser is in visitor Family end renders, therefore illegal user is possible to repair to distort by way of the horizontal authority of modification Change some parameters on the page, so as to the data of its people of unauthorized access.As an example it is assumed that user a and user B is owned by the mandate of certain function of website, and the website id of user a is 1, and the website id of user b is 100, when User a is obtained after website authorizes, may be by by the URL addresses of website:http://xxxx.comId=1 is tried Figure is revised as the http of user b://xxxx.comId=id=100, thus tries to usurp in the browser client page Change parameter to obtain the data of user b.
For problem above, prior art is by way of database authentication (db checkings) come to current visit Ask the checking authorized by the user of link.Assume that user is accessing http://abc.com/a.htmDuring id=100 Attempt id100 to be repaiied for id=1000 to attempt to bypass authority checking, server is receiving the access of client Rear end verification can be carried out for id therein after request, specifically, server is according to id=100 in data base Search carries out db checkings, and judges to be associated with the user whether corresponding data belong to current login, if It is legal, confirm that user authorizes and pass through, it is allowed to which user uses phase business, otherwise confirm that authorization failure refusal is used Family uses related service.
Inventor had found during the application is realized, needs server to carry out with upper type a series of Inquire about and verification operation, not only consumption data base resource, performance is low, and also need to developer and exist Data base db counterlogics after each parameter will carry out different business scene codes realization, greatly drop The low efficiency of authority checking.
The content of the invention
This application provides a kind of authority checking method, to the business for accurately and efficiently accessing for user Carry out authority checking, it is to avoid user forges parameter access unauthorized data.The method is applied to server, Including:
Receive client send accessing page request, the accessing page request be the client according to Operation of the user to the initial authorization page is generated, and the service chaining in the initial authorization page contains signature Information, the signing messages server are generated after the User logs in success is confirmed;
The signing messages of the service chaining carried in obtaining the accessing page request;
The signing messages carried in judging signing messages corresponding with the user and the accessing page request It is whether consistent;
When the signing messages one carried in signing messages corresponding with the user with the accessing page request Cause, confirm that authority checking passes through.
Correspondingly, the application also proposed a kind of server, including:
Receiver module, for receiving the accessing page request of client transmission, the accessing page request is Operation of the client according to user to the initial authorization page is generated, the industry in the initial authorization page Business link contains signing messages, and the signing messages is that the server is confirming the User logs in success Generate afterwards;
Acquisition module, for obtaining the signing messages of the service chaining carried in the accessing page request;
Judge module, for judging in signing messages corresponding with the user and the accessing page request Whether the signing messages of carrying is consistent, and in signing messages corresponding with the user and the page access Confirm when the signing messages that carries in request is consistent that authority checking passes through.
As can be seen here, it is by the technical scheme using the application, raw after User logs in success is confirmed in advance Into signing messages, and the service chaining arranged in the initial authorization page contains signing messages, objective when receiving After the accessing page request that family end sends, the A.L.S. of the service chaining carried in obtaining accessing page request Breath, and the signing messages carried in judging corresponding with user signing messages and the accessing page request is It is no consistent, confirming that when judged result is consistent authority checking passes through, so as to before save resources are consumed Put, the private data for preventing from illegal user from distorting by parameter to obtain other users has ensured network Safety.
Description of the drawings
Fig. 1 is a kind of schematic flow sheet of authority checking method that the application is proposed;
A kind of authority checking schematic device that Fig. 2 is proposed by the application specific embodiment;
A kind of schematic flow sheet of authority checking method that Fig. 3 is proposed by the application specific embodiment;
A kind of structural representation of server that Fig. 4 is proposed for the application.
Specific embodiment
As stated in the Background Art, prior art distorts parameter acquiring other users privacy for illegal user Behavior judges that often by backend services server is needed according to the current id of user to be verified in data base Whether middle retrieval registrant can be with access associated data.The money of which not only consumption data storehouse and server Source and degraded performance, and developer needs the db counterlogics after each parameter carry out difference Business scenario coding is realized, so that arranging very complicated.For this present applicant proposes a kind of mandate is tested Card method, by the implantation signature before user to access pages so that link on the page contains signature parameter, Subsequently judge whether parameter is legal according to the signature in the link for sending, once have user to forge directly refuse, Require no the complex logics such as db checkings to judge, efficiency is improve on the basis of guaranteeing safety.
As shown in figure 1, a kind of schematic flow sheet of the authority checking method proposed for the application, including it is following Step:
S101, receives the accessing page request that client sends, and the accessing page request is the client The operation according to user to the initial authorization page is held to generate, the service chaining in the initial authorization page contains There is a signing messages, the signing messages server is generated after the User logs in success is confirmed.
As authority checking is that the subsequent access after being logged in successfully for user first is verified, therefore Before the step, server will also receive the logging request that the client sends, in the logging request The log-on message of the user is carried, and the User logs in success is judged according to the log-on message working as When, signing messages corresponding with the user is generated, and the signing messages is implanted into into the initial authorization Service chaining in the page.
In the preferred embodiment of the application, signing messages can be spliced by ingredient of signing, And signature process is carried out to the result after the splicing;Generate after subsequently processed the signature Encryption string is used as the signing messages.
It should be noted that the service chaining includes the URL link and business form of business, it is described Signature ingredient, is at least included with Types Below:Parameter, the personal information of the user after sequence, Server key.
Meanwhile, in order to save the resource of network, after this step, carry in can preferentially judging request Link whether need checking, specifically, what is carried in obtaining the accessing page request first initially awards The service chaining of the power page;Subsequently recognize whether the service chaining needs checking signature;And according to following Situation is processed:
(1) when recognizing that the service chaining needs checking signature, continue to obtain the accessing page request The signing messages of middle carrying;
(2) when recognizing that the service chaining need not verify signature, confirm that authority checking passes through.
S102, the signing messages of the service chaining carried in obtaining the accessing page request.
S103, the label carried in judging signing messages corresponding with the user and the accessing page request Whether name information is consistent.
S104, when the signature carried in signing messages corresponding with the user with the accessing page request Information is consistent, confirms that authority checking passes through.
It is in order to the technological thought of the application is expanded on further, in conjunction with application scenarios as shown in Figure 2, right The technical scheme of the application is illustrated.User enters an initial authorization page, page after Website login All follow-up business link implantation signatures in the content of face, specifically, modules effect and work(in Fig. 2 Can be as follows:
Signature blocks:It is responsible for the generation of signature, generating mode includes that parameter is ranked up, increases current use All of above information is spliced and is carried out md5 signatures, encrypted by family information, increase server key String sign=md5 (parameter+user+key after sequence).
Page rendering module:Initial authorization webpage is implanted in page key parameter signature by template plug-in unit It is interior
Blocking module:It is responsible for controlling which URL link needs to carry out signature authentication.
Signature verification module:The parameter that the page is transmitted is signed, judge whether sign=page transmission Signature.
Arranged based on above-mentioned module, the specific embodiment schematic flow sheet is as shown in figure 3, concrete mandate is tested Card flow process is as follows:
Step a) users in the initial access page, sign to dynamic parameter in web page template by server And the page is implanted into, export to user.
In this step, user initiates accessing page request to page rendering module by client first, Whether page rendering module judges the current Successful login of the user, if User logs in success, blocking module Notify that signature blocks dynamic generates signature.
After signature blocks generation signature is finished, i.e., generated signature is returned to blocking module, intercepted Module assembled results page, and the link in the page is implanted into the signature that signature blocks are returned, and returns to user Return initial page.
It should be noted that in the product process of above-mentioned signature, one group of default parameter conduct can be taken Signature to be selected, when needing to generate signature with specified order (ascending order or descending etc.) successively selection parameter; Or the information with reference to active user and UID generate exclusive signature;Or it is preset in server One private key is used as signature, and is used as signature by arranging MD5 codes, and these belong to the guarantor of the application Shield scope.
Additionally, in specific application scenarios, the form generated by the link on the page is as follows:
http://abc.comId=1&param=abc&sign=DsadfdkfjXXXX
Step b) users are operated on the page, and in the page, the service chaining of privacy contains signature.
When user needs to carry out page access again, user submits the URL parameter of the page for needing to access to, Now page rendering module indicates that blocking module is intercepted for the accessing page request of user.In this tool In body embodiment, carrying in URL parameter needs the signature of checking.
By intercepting, whether identification current business link needs checking signature to step c) server ends.
For the accessing page request intercepted, the link that blocking module is accessed according to required for user is sentenced It is disconnected to judge whether service chaining needs to be verified, then continue later step if desired, if otherwise leading to Cross the accessing page request.
If step d) users normally access, server dual signature be previously implanted with the page be it is consistent, Otherwise it is assumed that being unauthorized access, blocker refusal user does not enter the business page.
Based on the carrying signing messages URL parameter obtained by abovementioned steps, blocking module is by label therein Name information is sent to authentication module, and authentication module indicates that signature blocks are secondary and generates signature, and will generate Signature verified with the signature obtained from blocking module.In this specific embodiment, checking can be Compare whether the two is identical, the certification if identical passes through, if otherwise certification does not pass through.
Regardless of authentication result, authentication module all can return the result to blocking module.Subsequently intercept Module returns corresponding message to page rendering module according to the result:If being verified, page wash with watercolours Dye module receive for unauthorized result;Be verified, receive for Authorization result.Page rendering module These results are shown to user by client.
By taking above-mentioned technical proposal, due to being implanted into signing messages in page link in advance, subsequently Whether the user that the signing messages in linking when can be accessed according to user carries out contrast verification current accessed is legal, So as to prevent disabled user from the private data for obtaining other users is distorted by parameter, network is improve Safety.
Another aspect, to reach above technical purpose, the application also proposed a kind of server, such as Fig. 3 It is shown, including:
Receiver module 410, for receiving the accessing page request of client transmission, the accessing page request Operation for the client according to user to the initial authorization page is generated, in the initial authorization page Service chaining contains signing messages, the signing messages be the server confirm the User logs in into Generate after work(;
Acquisition module 420, for obtaining the signing messages of the service chaining carried in the accessing page request;
Judge module 430, for judging signing messages corresponding with the user and the accessing page request Whether the signing messages of middle carrying is consistent, and visits in signing messages corresponding with the user and the page Confirm when asking that the signing messages carried in asking is consistent that authority checking passes through.
In specific application scenarios, also include:
Generation module, for receiving the logging request that the client sends, and is logging in letter according to described Breath judges to generate signing messages corresponding with the user during User logs in success, by the A.L.S. Service chaining in the breath implantation initial authorization page, carries stepping on for the user in the logging request Record information.
In specific application scenarios, the generation module specifically for:
Signature ingredient is spliced, and signature process is carried out to the result after the splicing;
Using the encryption string generated after signature process as the signing messages.
In specific application scenarios, also include:
Identification module, for obtaining the business chain of the initial authorization page carried in the accessing page request Connect, recognize whether the service chaining needs checking signature, and checking is needed in the identification service chaining The signing messages carried in continuing to obtain the accessing page request during signature, and recognizing the business Confirm when link need not verify signature that authority checking passes through.
In specific application scenarios, the service chaining includes service chaining and business form, described Signature ingredient, is at least included with Types Below:
Parameter, the personal information of the user after sequence, server key.
Specifically, server always according to instruction perform above-described embodiment described in authority checking method, specifically Will not be described here.
Authority checking method and server that the application is provided, due to being implanted into label in page link in advance Name information, the signing messages in linking when subsequently can be accessed according to user carry out contrast verification current accessed Whether user is legal such that it is able to prevent disabled user from the privacy number for obtaining other users is distorted by parameter According to improve the safety of network.
Through the above description of the embodiments, those skilled in the art can be understood that this Shen Please be realized by hardware, it is also possible to by software plus necessary general hardware platform mode realizing. Based on such understanding, the technical scheme of the application can be embodied in the form of software product, and this is soft It (can be CD-ROM, USB flash disk, movement are hard that part product can be stored in a non-volatile memory medium Disk etc.) in, use including some instructions so that a computer equipment (can be personal computer, take Business device, or the network equipment etc.) perform method described in the application each implement scene.
It will be appreciated by those skilled in the art that accompanying drawing is a schematic diagram for being preferable to carry out scene, in accompanying drawing Module or flow process not necessarily implement necessary to the application.
It will be appreciated by those skilled in the art that the module in device in implement scene can be according to implement scene Description carries out being distributed in the device of implement scene, it is also possible to carries out respective change and is disposed other than this enforcement In one or more devices of scene.The module of above-mentioned implement scene can merge into a module, also may be used To be further split into multiple submodule.
Above-mentioned the application sequence number is for illustration only, does not represent the quality of implement scene.
Disclosed above is only that the several of the application are embodied as scene, but, the application is not limited to This, the changes that any person skilled in the art can think of should all fall into the protection domain of the application.

Claims (10)

1. a kind of authority checking method, methods described are applied to server, it is characterised in that the method bag Include:
Receive client send accessing page request, the accessing page request be the client according to Operation of the user to the initial authorization page is generated, and the service chaining in the initial authorization page contains signature Information, the signing messages server are generated after the User logs in success is confirmed;
The signing messages of the service chaining carried in obtaining the accessing page request;
The signing messages carried in judging signing messages corresponding with the user and the accessing page request It is whether consistent;
When the signing messages one carried in signing messages corresponding with the user with the accessing page request Cause, confirm that authority checking passes through.
2. the method for claim 1, it is characterised in that receiving the page that the client sends Before the access request of face, also include:
The logging request that the client sends is received, the login of the user in the logging request, is carried Information;
When the User logs in success is judged according to the log-on message, generate corresponding with the user Signing messages, and the signing messages is implanted into into the service chaining in the initial authorization page.
3. method as claimed in claim 2, it is characterised in that generate signature corresponding with the user Information, specially:
Signature ingredient is spliced, and signature process is carried out to the result after the splicing;
Using the encryption string generated after signature process as the signing messages.
4. the method for claim 1, it is characterised in that visit the page that client sends is received After asking request, also include:
The service chaining of the initial authorization page carried in obtaining the accessing page request;
Recognize whether the service chaining needs checking signature;
When recognizing that the service chaining needs checking signature, take in continuing to obtain the accessing page request The signing messages of band;
When recognizing that the service chaining need not verify signature, confirm that authority checking passes through.
5. the method as described in any one of claim 1-4, it is characterised in that the service chaining includes Service chaining and business form, the signature ingredient, are at least included with Types Below:
Parameter, the personal information of the user after sequence, server key.
6. a kind of server, it is characterised in that include:
Receiver module, for receiving the accessing page request of client transmission, the accessing page request is Operation of the client according to user to the initial authorization page is generated, the industry in the initial authorization page Business link contains signing messages, and the signing messages is that the server is confirming the User logs in success Generate afterwards;
Acquisition module, for obtaining the signing messages of the service chaining carried in the accessing page request;
Judge module, for judging in signing messages corresponding with the user and the accessing page request Whether the signing messages of carrying is consistent, and in signing messages corresponding with the user and the page access Confirm when the signing messages that carries in request is consistent that authority checking passes through.
7. server as claimed in claim 6, it is characterised in that also include:
Generation module, for receiving the logging request that the client sends, and is logging in letter according to described Breath judges to generate signing messages corresponding with the user during User logs in success, by the A.L.S. Service chaining in the breath implantation initial authorization page, carries stepping on for the user in the logging request Record information.
8. server as claimed in claim 7, it is characterised in that the generation module specifically for:
Signature ingredient is spliced, and signature process is carried out to the result after the splicing;
Using the encryption string generated after signature process as the signing messages.
9. server as claimed in claim 6, it is characterised in that also include:
Identification module, for obtaining the business chain of the initial authorization page carried in the accessing page request Connect, recognize whether the service chaining needs checking signature, and checking is needed in the identification service chaining The signing messages carried in continuing to obtain the accessing page request during signature, and recognizing the business Confirm when link need not verify signature that authority checking passes through.
10. the server as described in any one of claim 6-9, it is characterised in that the service chaining bag Service chaining and business form are included, the signature ingredient is at least included with Types Below:
Parameter, the personal information of the user after sequence, server key.
CN201510595523.XA 2015-09-17 2015-09-17 Authorization verification method and device Active CN106549909B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510595523.XA CN106549909B (en) 2015-09-17 2015-09-17 Authorization verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510595523.XA CN106549909B (en) 2015-09-17 2015-09-17 Authorization verification method and device

Publications (2)

Publication Number Publication Date
CN106549909A true CN106549909A (en) 2017-03-29
CN106549909B CN106549909B (en) 2020-04-24

Family

ID=58362883

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510595523.XA Active CN106549909B (en) 2015-09-17 2015-09-17 Authorization verification method and device

Country Status (1)

Country Link
CN (1) CN106549909B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107896145A (en) * 2017-11-10 2018-04-10 郑州云海信息技术有限公司 A kind of anti-method for implanting of interface interchange and system
CN107944253A (en) * 2017-12-12 2018-04-20 深圳创维数字技术有限公司 A kind of third party APK endorsement methods, electronic equipment and storage medium
CN108011972A (en) * 2017-12-21 2018-05-08 联想(北京)有限公司 Data processing method and system
CN110034922A (en) * 2019-04-22 2019-07-19 湖南快乐阳光互动娱乐传媒有限公司 Request processing method, processing unit and requests verification method, verifying device
CN110138568A (en) * 2019-07-02 2019-08-16 云深互联(北京)科技有限公司 Intranet access method and system
KR20200003144A (en) * 2017-11-10 2020-01-08 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 Signature generation method, electronic device and storage medium
CN111010368A (en) * 2019-11-11 2020-04-14 泰康保险集团股份有限公司 Authority authentication method, device and medium based on authentication chain and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110131416A1 (en) * 2009-11-30 2011-06-02 James Paul Schneider Multifactor validation of requests to thw art dynamic cross-site attacks
CN102546579A (en) * 2010-12-31 2012-07-04 北大方正集团有限公司 Method, device and system used for providing system resources
CN103139147A (en) * 2011-11-25 2013-06-05 腾讯科技(深圳)有限公司 Method and system for security verification during data transmission
CN104283903A (en) * 2013-07-01 2015-01-14 深圳市腾讯计算机系统有限公司 Downloading method for files and device thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110131416A1 (en) * 2009-11-30 2011-06-02 James Paul Schneider Multifactor validation of requests to thw art dynamic cross-site attacks
CN102546579A (en) * 2010-12-31 2012-07-04 北大方正集团有限公司 Method, device and system used for providing system resources
CN103139147A (en) * 2011-11-25 2013-06-05 腾讯科技(深圳)有限公司 Method and system for security verification during data transmission
CN104283903A (en) * 2013-07-01 2015-01-14 深圳市腾讯计算机系统有限公司 Downloading method for files and device thereof

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘国卿: "基于MD5的URL防篡改算法设计", 《科技信息》 *
张杰 等: "一种采用MD5加密算法防止URL攻击的方法", 《现代计算机(专业版)》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107896145A (en) * 2017-11-10 2018-04-10 郑州云海信息技术有限公司 A kind of anti-method for implanting of interface interchange and system
KR20200003144A (en) * 2017-11-10 2020-01-08 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 Signature generation method, electronic device and storage medium
US11128450B2 (en) 2017-11-10 2021-09-21 Tencent Technology (Shenzhen) Company Ltd Signature generation method, electronic device, and storage medium
KR102350462B1 (en) * 2017-11-10 2022-01-11 텐센트 테크놀로지(센젠) 컴퍼니 리미티드 Signature generation method, electronic device and storage medium
CN107944253A (en) * 2017-12-12 2018-04-20 深圳创维数字技术有限公司 A kind of third party APK endorsement methods, electronic equipment and storage medium
CN108011972A (en) * 2017-12-21 2018-05-08 联想(北京)有限公司 Data processing method and system
CN110034922A (en) * 2019-04-22 2019-07-19 湖南快乐阳光互动娱乐传媒有限公司 Request processing method, processing unit and requests verification method, verifying device
CN110138568A (en) * 2019-07-02 2019-08-16 云深互联(北京)科技有限公司 Intranet access method and system
CN111010368A (en) * 2019-11-11 2020-04-14 泰康保险集团股份有限公司 Authority authentication method, device and medium based on authentication chain and electronic equipment

Also Published As

Publication number Publication date
CN106549909B (en) 2020-04-24

Similar Documents

Publication Publication Date Title
CN106549909A (en) A kind of authority checking method and apparatus
DE102018121306A1 (en) Identity verification while respecting privacy
CN103491084B (en) The authentication method of a kind of client and device
CN106209912A (en) Access authorization methods, device and system
CN103986584A (en) Double-factor identity verification method based on intelligent equipment
CN105099707B (en) A kind of offline authentication method, server and system
CN103888255A (en) Identity authentication method, device and system
CN111062023B (en) Method and device for realizing single sign-on of multi-application system
CN102868702B (en) System login device and system login method
CN104063650B (en) A kind of key storage device and using method thereof
CN107046544A (en) A kind of method and apparatus of the unauthorized access request recognized to website
CN106162641B (en) A kind of safe public WiFi authentication method and system
CN104767617A (en) Message processing method, system and related device
CN104767616A (en) Message processing method, system and related device
CN106559384A (en) A kind of utilization public number realizes the method and device for logging in
CN106302606A (en) A kind of across application access method and device
CN106331003A (en) Method and device for accessing application portal system on cloud desktop
CN105791249A (en) Third-party application processing method, device and system
CN105095729B (en) A kind of Quick Response Code login method, server and system
CN105187417B (en) Authority acquiring method and apparatus
CN104618356B (en) Auth method and device
CN112118238A (en) Method, device, system, equipment and storage medium for authentication login
CN108140079A (en) Device authentication system
CN107645474B (en) Method and device for logging in open platform
CN103559430B (en) application account management method and device based on Android system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.