CN107276966A - The control method and login system of a kind of distributed system - Google Patents

The control method and login system of a kind of distributed system Download PDF

Info

Publication number
CN107276966A
CN107276966A CN201610213133.6A CN201610213133A CN107276966A CN 107276966 A CN107276966 A CN 107276966A CN 201610213133 A CN201610213133 A CN 201610213133A CN 107276966 A CN107276966 A CN 107276966A
Authority
CN
China
Prior art keywords
operation system
client
login
server
bag
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610213133.6A
Other languages
Chinese (zh)
Other versions
CN107276966B (en
Inventor
韩松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201610213133.6A priority Critical patent/CN107276966B/en
Publication of CN107276966A publication Critical patent/CN107276966A/en
Application granted granted Critical
Publication of CN107276966B publication Critical patent/CN107276966B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of control method of distributed system, the distributed system includes login system and operation system, and this method includes:Login system receives the operation system information of input, and after confirming that examination & verification passes through, dynamic generation carries the client logging program bag that the operation system is identified, and the client logging program bag includes being used for logging in the cookie decryption program bags that cookie values are decrypted;The cookie decryption programs bag is pushed on each server of the operation system by login system, and the cookie decryption programs bag is loaded after starting for the operation system, and decryption logs in cookie values.The invention also discloses the login system in a kind of distributed system.The login safety of system is able to ensure that using the present invention.

Description

The control method and login system of a kind of distributed system
Technical field
The present invention relates to distributed system technical field, more particularly to a kind of controlling party of distributed system Method and login system.
Background technology
With flourishing for network, distributed system has become the necessary means of large scale system website, will Complicated operation system is split, and splits into several function systems, forms large-scale distributed system Using.So, the unified login problem of several function systems, i.e. single-sign-on are related to.I.e. from stepping on After recording system is logged in, can no longer it be logged in when accessing other operation systems, you can access corresponding function.
Prior art is that user is each by single-node login system, and input account number cipher carries out login authentication, Encryption information (logging in cookie values) can be generated by unique key by being proved to be successful rear login system, meanwhile, will Encryption information, which is placed into cookie, returns to subscription client browser.Afterwards, user passes through browser again When accessing each operation system, each operation system can obtain login cookie values from the request of user, Decrypted with cookie values are carried out with single-node login system identical key, and whether verify decrypted result legal. If illegal, rebound login page is logged in again;If legal, the request of normal process user.
It should be noted that each business is required for accessing single-node login system, the mode of access is by visitor Family end logging program bag introduces the operation system, and client logging program bag includes being used for logging in cookie values The cookie decryption program bags being decrypted, are the client-side program for carrying out cookie decryption, with login The cookie values encryption logic of system is reverse process.
Prior art exist client logging program coating operation system can arbitrarily obtain, decompiling, can Cookie decrypted codes are logged in analyze, meanwhile, obtaining method, address of cookie keys etc. can be held Change places and get, login system has very big security risk.
The content of the invention
, can be true it is an object of the invention to provide a kind of control method of distributed system and login system The login safety of insurance system.
For achieving the above object, it is described the invention provides a kind of control method of distributed system Distributed system includes login system and operation system, and this method includes:Login system receives input Operation system information, and after confirming that examination & verification passes through, dynamic generation carries the client that the operation system is identified Logging program bag is held, the client logging program bag includes being used for what is be decrypted to logging in cookie values Cookie decryption program bags;The cookie decryption programs bag is pushed to the operation system by login system Each server on, for the operation system start after load the cookie decryption programs bag, solve Close login cookie values.
For achieving the above object, present invention also offers the login system in a kind of distributed system, The login system includes:Generation unit, receives the operation system information of input, and confirms that examination & verification passes through Afterwards, dynamic generation carries the client logging program bag that the operation system is identified, and the client is logged in Program bag includes being used for logging in the cookie decryption program bags that cookie values are decrypted;Push unit, The cookie decryption programs bag is pushed on each server of the operation system by system, for described Operation system loads the cookie decryption programs bag after starting, decryption logs in cookie values.
In summary, the control method of the distributed system of the embodiment of the present invention, the distributed system bag Login system and operation system are included, this method includes:Login system receives the operation system information of input, And after confirming that examination & verification passes through, dynamic generation carries the client logging program bag that the operation system is identified, The client logging program bag includes being used for logging in the cookie decryption programs that cookie values are decrypted Bag;The cookie decryption programs bag is pushed on each server of the operation system by login system, The cookie decryption programs bag is loaded after starting for the operation system, decryption logs in cookie values. It can thus be seen that in the solution of the present invention, login system is confirming operation system signal auditing by rear, Automatically client logging program bag is pushed to operation system.The developer of operation system not will recognize that, It can prevent malicious persons from obtaining client logging program bag and carrying out the behaviour such as cookie is cracked, key is stolen Make, therefore improve the security of operation system.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the control method of distributed system of the embodiment of the present invention.
Fig. 2 is the structural representation of login system of the embodiment of the present invention.
Embodiment
For the objects, technical solutions and advantages of the present invention are more clearly understood, develop simultaneously referring to the drawings Embodiment, is described in further detail to scheme of the present invention.
The solution of the present invention is managed collectively client for defect present in existing system using login system The mode of logging program bag, and by client logging program bag automatic push to the server where operation system It is upper so to isolate logging program and business procedure (such as on Tomcat, Jboss), allow business development personnel Client logging program bag can not be got, it is ensured that isolation of the login system to developer.
The schematic flow sheet of the control method of distributed system of the embodiment of the present invention as shown in figure 1, wherein, The distributed system includes login system and operation system, and this method comprises the following steps:
Step 11, login system receive the operation system information of input, and after confirming that examination & verification passes through, move The client logging program bag that state generation is identified with the operation system, the client logging program bag Including for logging in the cookie decryption program bags that cookie values are decrypted.
The cookie decryption programs bag is pushed to each of the operation system by step 12, login system On server, the cookie decryption programs bag is loaded after starting for the operation system, decryption is logged in Cookie values.
Further, in a step 11, the client logging program bag of dynamic generation also includes being used for business The program bag of system dynamic access cipher key list;In step 12, login system pushes the cookie While decryption program bag, also the program bag for operation system dynamic access cipher key list is pushed Onto each server of the operation system, so that the server of operation system is used for business according to described The program bag timing of system dynamic access cipher key list sends asking for dynamic access cipher key list to login system Ask.
Wherein, the operation system information input is in client records table, including the operation system mark Know, and multiple server ip address where operation system;The login system is according to each server IP address, the journey by the cookie decryption programs bag or for operation system dynamic access cipher key list Sequence bag is pushed on each server of the operation system.
Further, multiple server ip address in the client records table where each operation system Form an IP list;This method further comprises:The server that login system receives operation system is determined When the request of dynamic access cipher key list that sends after, obtain mark and service of the operation system The IP address of device, and by the mark inquiring client terminal record sheet of the operation system, confirm the server IP address whether there is and identified in the operation system in corresponding IP lists, if it is present will Login system current key list synchronization is on the server.
Preferably, the client records table also includes client logging program bag version, and this method enters one Step includes:After the upgrading of client logging program bag, login system is by the client logging program after upgrading Bag is pushed on each server of the operation system, and updates client login in client records table Package version number.
Preferably, the client records table also includes the examination & verification state to operation system information, client Logging program bag pushes the mark whether completed;This method further comprises:Confirm in login system to industry After the examination & verification of business system information passes through, the examination & verification state of the operation system information in client records table is updated To pass through;After the push that login system completes client logging program bag, update in client records table Push is masked as completing.
To sum up, the present invention pushes client logging program bag by login system from trend operation system, and Login system obtains cipher key list to operation system according to business system server IP lists to login system Mode limited, effectively increase the login security of system.
For the clear explanation present invention, concrete scene is set forth below and illustrates.
1) developer of operation system this operation system of typing in the client records table of login system Information.Multiple services where the mark of operation system, operation system can be included in client records table The IP lists of device IP address formation.
For example, operation system A, corresponding IP lists (IP1, IP2, IP3).Certainly, client The information othered on operation system, such as director of each operation system can also be included in record sheet Etc. information.
2) after auditor passes through to above-mentioned operation system A information progress examination & verification, login system is more The examination & verification state of the operation system information is to pass through in new client records table.
3) login system dynamic generation client logging program bag, the mark A of the operation system is squeezed into In the client logging program bag.
4) client logging program bag is pushed on operation system A each server by login system, It is pushed on IP address respectively IP1, IP2, IP3 server.Login system updates client note The corresponding push of operation system A is masked as completing in record table.
Wherein, client logging program bag includes being used for logging in the cookie that cookie values are decrypted Decryption program bag, in addition to the program bag for operation system dynamic access cipher key list.
Cookie decryption program bags are the client-side program for carrying out cookie decryption, with login system Cookie values encryption logic is reverse process.Operation system loads the cookie decryption programs bag after starting, Then cookie values are logged in using key and cookie decryption programs bag decryption.
For the program bag of operation system dynamic access cipher key list, be make the server of operation system according to The program bag timing for operation system dynamic access cipher key list sends dynamic access to login system The request of cipher key list.
Client records table is as shown in table 1.
Operation system is identified IP lists Examination & verification state Client logging program bag version Whether push completes
Operation system A IP1,IP2,IP3 Pass through V1 It is
Operation system B IP11,IP12,IP13 Pass through V2 It is no
Table 1
In the embodiment of the present invention, client records table also includes client logging program bag version, in client Hold after the upgrading of logging program bag, the client logging program bag after upgrading is pushed to the industry by login system On each server of business system, and update client logging program bag version number in client records table.
Wherein, in client records table on operation system B information forming process and operation system A Principle is identical.Operation system B, corresponding IP lists (IP11, IP12, IP13), examination & verification state is Pass through, client logging program bag version is V2, client logging program bag, which is pushed, not to be completed.
It is noted herein that, login system and in the absence of cipher key list, only one of which in the prior art Unique key is used for generating login cookie values, and the key is also that operation system is used for decrypting login Cookie values.And then, in the prior art, the client logging program bag for introducing operation system is also not required to To include the program bag for operation system dynamic access cipher key list.And system is logged in the solution of the present invention System employs the cipher key list of real time modifying, and the cipher key list includes multiple key values, each key value pair Should there are key state and key version.That is, login system administrative staff's maintenance key list, because This cipher key list can be carried out crash handling etc. to existing key, can also be increased newly with real time modifying Key.Moreover, importantly, the solution of the present invention client logging program bag, which is included, is used for business system The program bag for dynamic access cipher key list of uniting, the program bag is logged system and is pushed to after operation system, industry Business system is used for the program bag Timing Synchronization login system of operation system dynamic access cipher key list according to described Current key list.Simply, the side of the present invention further to timing acquisition login system current key list Formula is limited, and is specifically described below.
Login system receives the dynamic that operation system A server (IP address is IP1) timing is sent After the request for obtaining cipher key list, the mark A and the server of the operation system are obtained from request IP address (IP1), and pass through the mark A inquiring client terminal record sheets of the operation system, confirm The IP address of the server whether there is in the corresponding IP lists of operation system mark A, if In the presence of then by login system current key list synchronization to the server.If it does not exist, then terminating Flow.
According to foregoing description, the login validation method of distributed system of the present invention may comprise steps of:
Step S1, login system checking client account number cipher success after, using in cipher key list most Login cookie value of effective key generation with the highest version number of highest version, and logged in described Cookie values return to client;
Step S2, operation system receive the service request that client carries the login cookie values Afterwards, the key version for logging in cookie values is obtained, by the key version in the key column synchronously obtained Corresponding key is inquired about in table;The cookie decryption programs bag obtained using the key and push, which is decrypted, to be logged in Cookie values, after verification decrypted result is legal, handle normal service request.
Wherein, the cipher key list of operation system is after operation system startup, according to being used for that push is obtained The program bag of operation system dynamic access cipher key list, Timing Synchronization login system current key list, and And verify what IP address was obtained after.
It should be noted that the present invention by client logging program bag except being pushed to business system server It is upper outer, client logging program bag can also be pushed on some path of server, afterwards by the road Footpath is added to system path, is easy to business procedure to be able to access that the program bag, using local method call The mode mode of method (such as JAVA by the light of nature), consistent effect can also be reached.
Based on same inventive concept, the invention discloses a kind of login system, structural representation such as Fig. 2 It is shown.The login system includes:
Generation unit 201, receives the operation system information of input, and after confirming that examination & verification passes through, dynamic The client logging program bag that generation is identified with the operation system, the client logging program bag Include for logging in the cookie decryption program bags that cookie values are decrypted;
Push unit 202, the cookie decryption programs bag is pushed to each clothes of the operation system It is engaged on device, the cookie decryption programs bag is loaded after starting for the operation system, decryption is logged in Cookie values.
The client logging program bag also includes the program for operation system dynamic access cipher key list Bag;
The push unit 202, while pushing the cookie decryption programs bag, is also used for described The program bag of operation system dynamic access cipher key list is pushed on each server of the operation system, So that the server of operation system is determined according to the program bag for operation system dynamic access cipher key list When to login system send dynamic access cipher key list request.
The operation system information input is in client records table, including operation system mark, and Multiple server ip address where operation system;
The push unit 202, according to the IP address of each server, by the cookie decryption programs Bag is pushed to each of the operation system for the program bag of operation system dynamic access cipher key list On server.
Multiple server ip address formation one in the client records table where each operation system IP lists;
The login system also includes processing unit 203, and the server timing for receiving operation system is sent Dynamic access cipher key list request after, obtain the mark of the operation system and the IP of the server Address, and by the mark inquiring client terminal record sheet of the operation system, with confirming the IP of the server Location whether there is to be identified in corresponding IP lists in the operation system, if it is present by login system Current key list synchronization is on the server.
The client records table also includes client logging program bag version,
The push unit 202, after the upgrading of client logging program bag, login system is by after upgrading Client logging program bag is pushed on each server of the operation system, and updates client records Client logging program bag version number in table.
The client records table also includes the examination & verification state to operation system information, client logging program Bag pushes the mark whether completed;
The push unit 202,
After examination & verification of the login system confirmation to operation system information passes through, updating should in client records table The examination & verification state of operation system information is to pass through;
After the push that login system completes client logging program bag, update in client records table and push It is masked as completing.
The beneficial effects of the present invention are:
First, the present invention using operation system login mechanism come the operation system of administrative login, using business system The mode of system server ip white list limits come the acquisition to key.Both malicious persons can be prevented Obtain client logging program bag and carry out the operations such as cookie is cracked, key is stolen, system can be carried out again Monitoring management, white list control of single-sign-on etc., can effectively improve the login safety of single-node login system Coefficient.
2nd, the present invention dynamically manages cipher key list by login system administrative staff, and operation system timing acquisition is arrived The cipher key list of login system, and the developer of operation system not will recognize that, therefore further increase The security of operation system.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the protection of the present invention Scope.Within the spirit and principles of the invention, any modification, equivalent substitution and improvements made Deng should be included in the scope of the protection.

Claims (13)

1. a kind of control method of distributed system, the distributed system includes login system and business system System, this method includes:
Login system receives the operation system information of input, and after confirming that examination & verification passes through, dynamic generation band There is the client logging program bag of the operation system mark, the client logging program bag includes being used for To logging in the cookie decryption program bags that cookie values are decrypted;
The cookie decryption programs bag is pushed to each server of the operation system by login system On, the cookie decryption programs bag is loaded after starting for the operation system, decryption logs in cookie Value.
2. the method as described in claim 1, it is characterised in that the client logging program bag is also wrapped Include the program bag for operation system dynamic access cipher key list;
While login system pushes the cookie decryption programs bag, also moved described for operation system The program bag that state obtains cipher key list is pushed on each server of the operation system, so that business system The server of system is according to the program bag for operation system dynamic access cipher key list regularly to login system System sends the request of dynamic access cipher key list.
3. method as claimed in claim 1 or 2, it is characterised in that the operation system information input In client records table, including operation system mark, and multiple servers where operation system IP address;
The login system according to the IP address of each server, by the cookie decryption programs bag or Person is pushed to each service of the operation system for the program bag of operation system dynamic access cipher key list On device.
4. method as claimed in claim 3, it is characterised in that each industry in the client records table Multiple server ip address one IP list of formation where business system;This method further comprises:
The request for the dynamic access cipher key list that the server timing that login system receives operation system is sent Afterwards, the mark of the operation system and the IP address of the server are obtained, and passes through the operation system Mark inquiring client terminal record sheet, confirm the server IP address whether there is in the operation system Identify in corresponding IP lists, if it is present by login system current key list synchronization to the service On device.
5. method as claimed in claim 3, it is characterised in that the client records table also includes visitor Family end logging program bag version, this method further comprises:After the upgrading of client logging program bag, step on Client logging program bag after upgrading is pushed on each server of the operation system by recording system, And update client logging program bag version number in client records table.
6. method as claimed in claim 3, it is characterised in that the client records table also includes pair The examination & verification state of operation system information, client logging program bag pushes the mark whether completed;This method Further comprise:
After examination & verification of the login system confirmation to operation system information passes through, updating should in client records table The examination & verification state of operation system information is to pass through;
After the push that login system completes client logging program bag, update in client records table and push It is masked as completing.
7. method as claimed in claim 2, it is characterised in that the login system is employed repaiies in real time The cipher key list changed, the cipher key list include multiple key values, each key value to should have key state and Key version.
8. a kind of login system in distributed system, the login system includes:
Generation unit, receives the operation system information of input, and after confirming that examination & verification passes through, dynamic generation The client logging program bag identified with the operation system, the client logging program bag includes using In to logging in the cookie decryption program bags that cookie values are decrypted;
Push unit, the cookie decryption programs bag is pushed to each server of the operation system On, the cookie decryption programs bag is loaded after starting for the operation system, decryption logs in cookie Value.
9. login system as claimed in claim 8, it is characterised in that the client logging program bag Also include the program bag for operation system dynamic access cipher key list;
The push unit, while pushing the cookie decryption programs bag, also described will be used for business The program bag of system dynamic access cipher key list is pushed on each server of the operation system, so that The server of operation system according to the program bag timing for operation system dynamic access cipher key list to Login system sends the request of dynamic access cipher key list.
10. login system as claimed in claim 8 or 9, it is characterised in that the operation system letter Breath input is in client records table, including operation system mark, and multiple where operation system Server ip address;
The push unit, according to the IP address of each server, by the cookie decryption programs bag Or it is pushed to each clothes of the operation system for the program bag of operation system dynamic access cipher key list It is engaged on device.
11. login system as claimed in claim 10, it is characterised in that in the client records table Multiple server ip address one IP list of formation where each operation system;
The login system also includes processing unit, and receive that the server timing of operation system sends is dynamic State is obtained after the request of cipher key list, with obtaining the mark of the operation system and the IP of the server Location, and by the mark inquiring client terminal record sheet of the operation system, confirm the IP address of the server Identified with the presence or absence of in the operation system in corresponding IP lists, if it is present login system is worked as Preceding cipher key list is synchronized on the server.
12. login system as claimed in claim 10, it is characterised in that the client records table is also Including client logging program bag version,
The push unit, after the upgrading of client logging program bag, login system is by the client after upgrading End logging program bag is pushed on each server of the operation system, and is updated in client records table Client logging program bag version number.
13. login system as claimed in claim 10, it is characterised in that the client records table is also Including the examination & verification state to operation system information, client logging program bag pushes the mark whether completed;
The push unit,
After examination & verification of the login system confirmation to operation system information passes through, updating should in client records table The examination & verification state of operation system information is to pass through;
After the push that login system completes client logging program bag, update in client records table and push It is masked as completing.
CN201610213133.6A 2016-04-07 2016-04-07 Control method and login system of distributed system Active CN107276966B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610213133.6A CN107276966B (en) 2016-04-07 2016-04-07 Control method and login system of distributed system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610213133.6A CN107276966B (en) 2016-04-07 2016-04-07 Control method and login system of distributed system

Publications (2)

Publication Number Publication Date
CN107276966A true CN107276966A (en) 2017-10-20
CN107276966B CN107276966B (en) 2020-03-03

Family

ID=60052370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610213133.6A Active CN107276966B (en) 2016-04-07 2016-04-07 Control method and login system of distributed system

Country Status (1)

Country Link
CN (1) CN107276966B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111065097A (en) * 2019-10-11 2020-04-24 上海交通大学 Channel protection method and system based on shared secret key in mobile internet
CN112738030A (en) * 2020-12-16 2021-04-30 重庆扬成大数据科技有限公司 Data acquisition and sharing working method for agricultural technicians through big data analysis
CN113037702A (en) * 2020-12-16 2021-06-25 重庆扬成大数据科技有限公司 Agricultural worker login system safe working method based on big data analysis

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101202753A (en) * 2007-11-29 2008-06-18 中国电信股份有限公司 Method and device for accessing plug-in connector applied system by client terminal
US20110126220A1 (en) * 2000-02-01 2011-05-26 Charles Schwab & Co., Inc. Method and Apparatus for Integrating Distributed Shared Services System
US20110277027A1 (en) * 2010-05-07 2011-11-10 Richard Hayton Systems and Methods for Providing a Single Click Access to Enterprise, SAAS and Cloud Hosted Application
CN103841117A (en) * 2014-03-21 2014-06-04 北京京东尚科信息技术有限公司 JAAS login method and server based on Cookie mechanism
CN104394172A (en) * 2014-12-12 2015-03-04 用友软件股份有限公司 Single sign-on device and method
CN105049448A (en) * 2015-08-24 2015-11-11 用友网络科技股份有限公司 Single sign-on device and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110126220A1 (en) * 2000-02-01 2011-05-26 Charles Schwab & Co., Inc. Method and Apparatus for Integrating Distributed Shared Services System
CN101202753A (en) * 2007-11-29 2008-06-18 中国电信股份有限公司 Method and device for accessing plug-in connector applied system by client terminal
US20110277027A1 (en) * 2010-05-07 2011-11-10 Richard Hayton Systems and Methods for Providing a Single Click Access to Enterprise, SAAS and Cloud Hosted Application
CN103841117A (en) * 2014-03-21 2014-06-04 北京京东尚科信息技术有限公司 JAAS login method and server based on Cookie mechanism
CN104394172A (en) * 2014-12-12 2015-03-04 用友软件股份有限公司 Single sign-on device and method
CN105049448A (en) * 2015-08-24 2015-11-11 用友网络科技股份有限公司 Single sign-on device and method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111065097A (en) * 2019-10-11 2020-04-24 上海交通大学 Channel protection method and system based on shared secret key in mobile internet
CN111065097B (en) * 2019-10-11 2021-08-10 上海交通大学 Channel protection method and system based on shared secret key in mobile internet
CN112738030A (en) * 2020-12-16 2021-04-30 重庆扬成大数据科技有限公司 Data acquisition and sharing working method for agricultural technicians through big data analysis
CN113037702A (en) * 2020-12-16 2021-06-25 重庆扬成大数据科技有限公司 Agricultural worker login system safe working method based on big data analysis
CN112738030B (en) * 2020-12-16 2021-09-14 重庆扬成大数据科技有限公司 Data acquisition and sharing working method for agricultural technicians through big data analysis
CN113037702B (en) * 2020-12-16 2021-11-09 重庆扬成大数据科技有限公司 Agricultural worker login system safe working method based on big data analysis

Also Published As

Publication number Publication date
CN107276966B (en) 2020-03-03

Similar Documents

Publication Publication Date Title
CN100544361C (en) The method and apparatus that is used for managing session identifiers
EP1953950B1 (en) A method for protecting network service application account, the system, and the apparatus thereof
CN106899570A (en) The processing method of Quick Response Code, apparatus and system
CN104202162B (en) A kind of system logged in based on mobile phone and login method
CN106534143A (en) Method and system capable of realizing cross-application authentication authorization
CN105100084B (en) It is a kind of to prevent the method and system across station request forgery attack
CN104378379B (en) A kind of digital content encrypted transmission method, equipment and system
JP2004015530A5 (en)
CN103986584A (en) Double-factor identity verification method based on intelligent equipment
CN106302453A (en) The processing method of data, Apparatus and system
CN111753014B (en) Identity authentication method and device based on block chain
CN107851143A (en) Apparatus and method for using customer equipment certificate in equipment
CN108259502A (en) For obtaining the identification method of interface access rights, server-side and storage medium
CN108028840A (en) Realize the peer to peer connection for establishing safety
CN103905395A (en) WEB access control method and system based on redirection
CN106331042B (en) Single sign-on method and device for heterogeneous user system
CN105915537A (en) Token generation method, token calibration method and token authentication server
CN105210076A (en) Resilient and restorable dynamic device identification
CN106549909A (en) A kind of authority checking method and apparatus
CN111800426A (en) Method, device, equipment and medium for accessing native code interface in application program
CN107276966A (en) The control method and login system of a kind of distributed system
CN106815734B (en) Information transmission method and device
CN103825906B (en) Enterprise private key self-encryption and self-arrangement method based on content distribution network
CN105187417B (en) Authority acquiring method and apparatus
CN106888200B (en) Identification association method, information sending method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant