CN107276966B - Control method and login system of distributed system - Google Patents

Control method and login system of distributed system Download PDF

Info

Publication number
CN107276966B
CN107276966B CN201610213133.6A CN201610213133A CN107276966B CN 107276966 B CN107276966 B CN 107276966B CN 201610213133 A CN201610213133 A CN 201610213133A CN 107276966 B CN107276966 B CN 107276966B
Authority
CN
China
Prior art keywords
login
service system
client
program package
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610213133.6A
Other languages
Chinese (zh)
Other versions
CN107276966A (en
Inventor
韩松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201610213133.6A priority Critical patent/CN107276966B/en
Publication of CN107276966A publication Critical patent/CN107276966A/en
Application granted granted Critical
Publication of CN107276966B publication Critical patent/CN107276966B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

The invention discloses a control method of a distributed system, wherein the distributed system comprises a login system and a service system, and the method comprises the following steps: the login system receives input service system information, dynamically generates a client login program package with the service system identification after confirming that the verification is passed, wherein the client login program package comprises a cookie decryption program package for decrypting a login cookie value; and the login system pushes the cookie decryption program package to each server of the service system, and is used for loading the cookie decryption program package after the service system is started and decrypting a login cookie value. The invention also discloses a login system in the distributed system. The invention can ensure the login safety of the system.

Description

Control method and login system of distributed system
Technical Field
The present invention relates to the field of distributed system technologies, and in particular, to a control method and a login system for a distributed system.
Background
With the rapid development of networks, distributed systems have become a necessary means for large-scale system websites, and a complex business system is split into a plurality of functional systems to form large-scale distributed system application. Thus, the problem of unified login of a plurality of functional systems, namely single login, is involved. After logging in from the login system, the corresponding functions can be accessed without logging in when other business systems are accessed.
In the prior art, a user inputs an account password to perform login verification through a single sign-on system every time, after the verification is successful, the login system generates encryption information (login cookie value) through a unique key, and meanwhile, the encryption information is placed in a cookie and returned to a user client browser. And then, when the user accesses each service system through the browser, each service system acquires the login cookie value from the request of the user, decrypts the cookie value by using the key same as that of the single sign-on system, and verifies whether the decryption result is legal or not. If the login page is illegal, jumping back to the login page to log in again; and if the request is legal, the request of the user is processed normally.
It should be noted that each service needs to access the single sign-on system, the access mode is to introduce a client login package into the service system, the client login package includes a cookie decryption package for decrypting a login cookie value, and is a client program for decrypting a cookie, and the cookie value encryption logic of the login system is a reverse process.
In the prior art, a client login program packet service system can be randomly acquired and decompiled, a login cookie decryption code can be analyzed, a cookie key acquiring method, an address and the like can be easily acquired, and a login system has a great safety risk.
Disclosure of Invention
The invention aims to provide a control method and a login system of a distributed system, which can ensure the login safety of the system.
In order to achieve the above object, the present invention provides a method for controlling a distributed system, where the distributed system includes a login system and a service system, and the method includes: the login system receives input service system information, dynamically generates a client login program package with the service system identification after confirming that the verification is passed, wherein the client login program package comprises a cookie decryption program package for decrypting a login cookie value; and the login system pushes the cookie decryption program package to each server of the service system, and is used for loading the cookie decryption program package after the service system is started and decrypting a login cookie value.
In order to achieve the above object, the present invention further provides a login system in a distributed system, where the login system includes: the generating unit is used for receiving input service system information, dynamically generating a client login program package with the service system identifier after confirming that the verification is passed, wherein the client login program package comprises a cookie decryption program package used for decrypting a login cookie value; and the pushing unit is used for pushing the cookie decryption program package to each server of the service system, loading the cookie decryption program package after the service system is started, and decrypting and logging in the cookie value.
In order to achieve the above object, the present invention further provides a control apparatus for a distributed system, characterized in that,
the method comprises the following steps:
a memory; and
a processor coupled to the memory, the processor configured to perform any of the methods described above based on instructions stored in the memory.
To achieve the above object, the present invention further provides a computer-readable storage medium having a computer program stored thereon, wherein the computer program is configured to implement any one of the methods described above when executed by a processor.
In summary, the control method of the distributed system in the embodiment of the present invention includes a login system and a service system, and the method includes: the login system receives input service system information, dynamically generates a client login program package with the service system identification after confirming that the verification is passed, wherein the client login program package comprises a cookie decryption program package for decrypting a login cookie value; and the login system pushes the cookie decryption program package to each server of the service system, and is used for loading the cookie decryption program package after the service system is started and decrypting a login cookie value. Therefore, in the scheme of the invention, the login system automatically pushes the client login program package to the service system after confirming that the service system information is approved. Developers of the service system can not know, and malicious personnel can be prevented from obtaining the client login program package to perform operations such as cookie cracking and key stealing, so that the safety of the service system is improved.
Drawings
Fig. 1 is a flowchart illustrating a control method of a distributed system according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a login system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Aiming at the defects in the existing system, the scheme of the invention adopts a mode that the login system uniformly manages the client login program package, and automatically pushes the client login program package to the server (such as Tomcat and Jboss) where the service system is located, so that the login program and the service program can be isolated, service developers can not obtain the client login program package, and the isolation of the login system to the developers is ensured.
A flow diagram of a control method of a distributed system according to an embodiment of the present invention is shown in fig. 1, where the distributed system includes a login system and a service system, and the method includes the following steps:
and step 11, the login system receives the input service system information, dynamically generates a client login program package with the service system identifier after confirming that the verification is passed, wherein the client login program package comprises a cookie decryption program package for decrypting a login cookie value.
And step 12, the login system pushes the cookie decryption program package to each server of the service system, and the cookie decryption program package is used for loading the cookie decryption program package after the service system is started and decrypting the login cookie value.
Further, in step 11, the dynamically generated client login package further includes a package for the service system to dynamically obtain the key list; in step 12, the login system pushes the cookie decryption program package, and simultaneously pushes the program package for the service system to dynamically acquire the key list to each server of the service system, so that the server of the service system sends a request for dynamically acquiring the key list to the login system at regular time according to the program package for the service system to dynamically acquire the key list.
The service system information is input into a client record list and comprises the service system identification and a plurality of server IP addresses where the service systems are located; and the login system pushes the cookie decryption program package or the program package for the service system to dynamically acquire the key list to each server of the service system according to the IP address of each server.
Furthermore, a plurality of server IP addresses where each service system is located in the client record list form an IP list; the method further comprises the following steps: after receiving a request of dynamically acquiring a key list sent by a server of a service system at regular time, a login system acquires an identifier of the service system and an IP address of the server, inquires a client record list through the identifier of the service system, confirms whether the IP address of the server exists in the IP list corresponding to the identifier of the service system, and synchronizes the current key list of the login system to the server if the IP address of the server exists in the IP list corresponding to the identifier of the service system.
Preferably, the client record table further includes a client login package version, and the method further includes: and after the client login program package is upgraded, the login system pushes the upgraded client login program package to each server of the service system, and updates the version number of the client login program package in the client record list.
Preferably, the client record table further includes a flag indicating whether the pushing of the client login package is completed or not, and an audit state of the service system information; the method further comprises the following steps: after the login system confirms that the auditing of the service system information is passed, updating the auditing state of the service system information in the client record list to be passed; and after the login system finishes pushing the client login program package, updating the pushing mark in the client record table to be finished.
In conclusion, the login system automatically pushes the client login program package to the service system, and the login system limits the way of obtaining the key list from the login system by the service system according to the service system server IP list, so that the login security of the system is effectively improved.
For clarity of the present invention, the following description will be made by taking specific scenarios.
1) The developer of the service system inputs the information of the service system in the client record table of the login system. The client record table may include an identifier of the service system and an IP list formed by IP addresses of a plurality of servers where the service system is located.
E.g. service system a, corresponding IP list (IP1, IP2, IP 3). Of course, other information about the service systems, such as information about the person in charge of each service system, may also be included in the client record table.
2) And after the auditor audits the information of the service system A, the log-in system updates the audit state of the service system information in the client record table to be a pass state.
3) The login system dynamically generates a client login program package, and the identifier A of the service system is input into the client login program package.
4) The login system pushes the client login package to each server of the service system a, i.e. to the servers with IP addresses IP1, IP2, IP3, respectively. And the login system updates the pushing mark corresponding to the service system A in the client record list to be finished.
The client login program package comprises a cookie decryption program package used for decrypting the login cookie value and a program package used for dynamically acquiring the key list by the service system.
The cookie decryption package is a client program for decrypting the cookie, and is a reverse process to the cookie value encryption logic of the login system. And after the service system is started, loading the cookie decryption program package, and then decrypting the login cookie value by using the key and the cookie decryption program package.
The program package for the service system to dynamically obtain the key list is used for enabling the server of the service system to regularly send a request for dynamically obtaining the key list to the login system according to the program package for the service system to dynamically obtain the key list.
The client record table is shown in table 1.
Business system identification IP list Audit status Client login package version Whether the pushing is completed
Service system A IP1,IP2,IP3 By passing V1 Is that
Service system B IP11,IP12,IP13 By passing V2 Whether or not
TABLE 1
In the embodiment of the invention, the client record table also comprises a client login program package version, after the client login program package is upgraded, the login system pushes the upgraded client login program package to each server of the service system, and updates the client login program package version number in the client record table.
The forming process of the information about the service system B in the client record table is the same as the principle of the service system A. And the business system B, the corresponding IP list (IP11, IP12 and IP13), the auditing state is passed, the version of the client login program package is V2, and the pushing of the client login program package is not finished.
It should be noted here that the prior art login system does not have a key list, but only a unique key is used to generate the login cookie value, which is also used by the service system to decrypt the login cookie value. Furthermore, in the prior art, the client login package introduced into the service system does not need to include a package for the service system to dynamically acquire the key list. In the scheme of the invention, the login system adopts a real-time modified key list, the key list comprises a plurality of key values, and each key value corresponds to a key state and a key version. That is, the login system administrator maintains the key list, so the key list can be modified in real time, the existing key can be invalidated, and the key can be added. Moreover, more importantly, the program package for logging in the client side comprises a program package for dynamically acquiring the key list by the service system, and after the program package is pushed to the service system by the logging system, the service system synchronously logs in the current key list of the system at regular time according to the program package for dynamically acquiring the key list by the service system. However, the present invention further limits the manner of obtaining the current key list of the login system at regular time, and the following detailed description is provided.
After receiving a request for dynamically acquiring a key list sent by a server (IP address is IP1) of a service system A at regular time, a login system acquires an identifier A of the service system and an IP address (IP1) of the server from the request, queries a client record table through the identifier A of the service system, confirms whether the IP address of the server exists in the IP list corresponding to the identifier A of the service system, and synchronizes the current key list of the login system to the server if the IP address of the server exists in the IP list corresponding to the identifier A of the service system. If not, the flow ends.
According to the above description, the login verification method of the distributed system of the present invention may include the steps of:
step S1, after the login system successfully verifies the account password of the client, the login cookie value with the highest version number is generated by adopting the effective key of the highest version in the key list, and the login cookie value is returned to the client;
step S2, after receiving a service request carrying the login cookie value from the client, the service system acquires a key version of the login cookie value, and queries a corresponding key in a key list obtained synchronously through the key version; and decrypting the login cookie value by using the key and the cookie decryption program package obtained by pushing, and processing a normal service request after verifying that the decryption result is legal.
After the service system is started, the key list of the service system is obtained by regularly and synchronously logging in the current key list of the system according to the pushed program packet for dynamically obtaining the key list by the service system and checking the IP address.
It should be noted that, in addition to pushing the client login package to the service system server, the present invention may also push the client login package to a certain path of the server, and then add the path to the system path, so that the service program can access the package, and a local method calling manner (e.g., a JAVA native method manner) is adopted, so as to achieve a consistent effect.
Based on the same inventive concept, the invention discloses a login system, and the structural schematic diagram is shown in fig. 2. The login system comprises:
the generating unit 201 receives the input service system information, dynamically generates a client login program package with the service system identifier after confirming that the audit is passed, wherein the client login program package comprises a cookie decryption program package for decrypting a login cookie value;
the pushing unit 202 is configured to push the cookie decryption program package to each server of the service system, and is configured to load the cookie decryption program package after the service system is started, and decrypt and log in a cookie value.
The client login program package also comprises a program package used for the service system to dynamically obtain a key list;
the pushing unit 202, while pushing the cookie decryption program package, also pushes the program package for the service system to dynamically obtain the key list to each server of the service system, so that the server of the service system sends a request for dynamically obtaining the key list to the login system at regular time according to the program package for the service system to dynamically obtain the key list.
The service system information is input into a client record table and comprises the service system identification and a plurality of server IP addresses where the service systems are located;
the pushing unit 202, according to the IP address of each server, pushes the cookie decryption program package or the program package for the service system to dynamically obtain the key list to each server of the service system.
Forming an IP list by a plurality of server IP addresses where each service system is located in the client record list;
the login system further includes a processing unit 203, which obtains the identifier of the service system and the IP address of the server after receiving a request for dynamically obtaining the key list sent by the server of the service system at regular time, and queries the client record table through the identifier of the service system to determine whether the IP address of the server exists in the IP list corresponding to the identifier of the service system, and if so, synchronizes the current key list of the login system to the server.
The client record table also includes a client login package version,
after the client login package is upgraded, the push unit 202 pushes the upgraded client login package to each server of the service system by the login system, and updates the version number of the client login package in the client record table.
The client record list also comprises a check state of the service system information and a mark indicating whether pushing of a client login program package is completed;
the push-out unit 202 is provided with a push-out unit,
after the login system confirms that the auditing of the service system information is passed, updating the auditing state of the service system information in the client record list to be passed;
and after the login system finishes pushing the client login program package, updating the pushing mark in the client record table to be finished.
The invention has the beneficial effects that:
firstly, the invention adopts a service system registration mechanism to manage a logged-in service system, and adopts a service system server IP white list mode to limit the acquisition of a secret key. The method can prevent malicious personnel from obtaining the client login program package to perform operations such as cookie cracking, key stealing and the like, can perform monitoring management, white list control and the like of the system single sign-on, and can effectively improve the login safety factor of the single sign-on system.
Secondly, the key list is dynamically managed by the login system manager, the service system regularly acquires the key list of the login system, and developers of the service system cannot know the key list, so that the safety of the service system is further improved.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (13)

1. A control method of a distributed system, wherein the distributed system comprises a login system and a service system, and the method comprises the following steps:
the login system receives input service system information, dynamically generates a client login program package with the service system identification after confirming that the verification is passed, wherein the client login program package comprises a cookie decryption program package for decrypting a login cookie value;
and the login system pushes the cookie decryption program package to each server of the service system, and is used for loading the cookie decryption program package after the service system is started and decrypting a login cookie value.
2. The method of claim 1, wherein the client login package further comprises a package for a business system to dynamically obtain a list of keys;
and the login system pushes the cookie decryption program package and simultaneously pushes the program package for dynamically acquiring the key list by the service system to each server of the service system, so that the server of the service system sends a request for dynamically acquiring the key list to the login system at regular time according to the program package for dynamically acquiring the key list by the service system.
3. The method according to claim 1 or 2, wherein the service system information is input in a client record table, and comprises the service system identification and a plurality of server IP addresses where the service systems are located;
and the login system pushes the cookie decryption program package or the program package for the service system to dynamically acquire the key list to each server of the service system according to the IP address of each server.
4. The method of claim 3, wherein the IP addresses of the plurality of servers where each service system is located in the client record form an IP list; the method further comprises the following steps:
after receiving a request of dynamically acquiring a key list sent by a server of a service system at regular time, a login system acquires an identifier of the service system and an IP address of the server, inquires a client record list through the identifier of the service system, confirms whether the IP address of the server exists in the IP list corresponding to the identifier of the service system, and synchronizes the current key list of the login system to the server if the IP address of the server exists in the IP list corresponding to the identifier of the service system.
5. The method of claim 3, wherein the client record table further includes a client login package version, the method further comprising: and after the client login program package is upgraded, the login system pushes the upgraded client login program package to each server of the service system, and updates the version number of the client login program package in the client record list.
6. The method of claim 3, wherein the client record table further comprises a status of auditing the business system information, a flag indicating whether the client login package push is complete; the method further comprises the following steps:
after the login system confirms that the auditing of the service system information is passed, updating the auditing state of the service system information in the client record list to be passed;
and after the login system finishes pushing the client login program package, updating the pushing mark in the client record table to be finished.
7. The method of claim 2, wherein the logon system employs a real-time modified key list comprising a plurality of key values, each key value having a key state and a key version.
8. A login system in a distributed system, the login system comprising:
the generating unit is used for receiving input service system information, dynamically generating a client login program package with the service system identifier after confirming that the verification is passed, wherein the client login program package comprises a cookie decryption program package used for decrypting a login cookie value;
and the pushing unit is used for pushing the cookie decryption program package to each server of the service system, loading the cookie decryption program package after the service system is started, and decrypting and logging in the cookie value.
9. The logon system of claim 8, wherein said client logon package further comprises a package for a business system to dynamically obtain a list of keys;
and the pushing unit is used for pushing the program package for dynamically acquiring the key list by the service system to each server of the service system while pushing the cookie decryption program package, so that the server of the service system sends a request for dynamically acquiring the key list to the login system at regular time according to the program package for dynamically acquiring the key list by the service system.
10. The login system of claim 8 or 9, wherein the service system information is entered in a client record table, comprising the service system identification and a plurality of server IP addresses where the service system is located;
and the pushing unit is used for pushing the cookie decryption program package or the program package for dynamically acquiring the key list by the service system to each server of the service system according to the IP address of each server.
11. The login system of claim 10, wherein the IP addresses of the plurality of servers where each service system is located in the client log sheet form an IP list;
the login system also comprises a processing unit, which acquires the identification of the service system and the IP address of the server after receiving a request of dynamically acquiring the key list sent by the server of the service system at regular time, inquires a client record table through the identification of the service system, confirms whether the IP address of the server exists in the IP list corresponding to the identification of the service system, and synchronizes the current key list of the login system to the server if the IP address of the server exists in the IP list corresponding to the identification of the service system.
12. The login system of claim 10, wherein the client record table further comprises a client login package version,
and the pushing unit is used for pushing the upgraded client login program package to each server of the service system by the login system after the client login program package is upgraded, and updating the version number of the client login program package in the client record table.
13. The login system of claim 10, wherein the client log table further comprises a flag indicating whether the client login package push is complete or not for the audit status of the business system information;
the pushing unit is used for pushing the paper to be pushed,
after the login system confirms that the auditing of the service system information is passed, updating the auditing state of the service system information in the client record list to be passed;
and after the login system finishes pushing the client login program package, updating the pushing mark in the client record table to be finished.
CN201610213133.6A 2016-04-07 2016-04-07 Control method and login system of distributed system Active CN107276966B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610213133.6A CN107276966B (en) 2016-04-07 2016-04-07 Control method and login system of distributed system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610213133.6A CN107276966B (en) 2016-04-07 2016-04-07 Control method and login system of distributed system

Publications (2)

Publication Number Publication Date
CN107276966A CN107276966A (en) 2017-10-20
CN107276966B true CN107276966B (en) 2020-03-03

Family

ID=60052370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610213133.6A Active CN107276966B (en) 2016-04-07 2016-04-07 Control method and login system of distributed system

Country Status (1)

Country Link
CN (1) CN107276966B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111065097B (en) * 2019-10-11 2021-08-10 上海交通大学 Channel protection method and system based on shared secret key in mobile internet
CN112738030B (en) * 2020-12-16 2021-09-14 重庆扬成大数据科技有限公司 Data acquisition and sharing working method for agricultural technicians through big data analysis
CN113037702B (en) * 2020-12-16 2021-11-09 重庆扬成大数据科技有限公司 Agricultural worker login system safe working method based on big data analysis

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101202753A (en) * 2007-11-29 2008-06-18 中国电信股份有限公司 Method and device for accessing plug-in connector applied system by client terminal
CN103841117A (en) * 2014-03-21 2014-06-04 北京京东尚科信息技术有限公司 JAAS login method and server based on Cookie mechanism
CN104394172A (en) * 2014-12-12 2015-03-04 用友软件股份有限公司 Single sign-on device and method
CN105049448A (en) * 2015-08-24 2015-11-11 用友网络科技股份有限公司 Single sign-on device and method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6954799B2 (en) * 2000-02-01 2005-10-11 Charles Schwab & Co., Inc. Method and apparatus for integrating distributed shared services system
US9461996B2 (en) * 2010-05-07 2016-10-04 Citrix Systems, Inc. Systems and methods for providing a single click access to enterprise, SAAS and cloud hosted application

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101202753A (en) * 2007-11-29 2008-06-18 中国电信股份有限公司 Method and device for accessing plug-in connector applied system by client terminal
CN103841117A (en) * 2014-03-21 2014-06-04 北京京东尚科信息技术有限公司 JAAS login method and server based on Cookie mechanism
CN104394172A (en) * 2014-12-12 2015-03-04 用友软件股份有限公司 Single sign-on device and method
CN105049448A (en) * 2015-08-24 2015-11-11 用友网络科技股份有限公司 Single sign-on device and method

Also Published As

Publication number Publication date
CN107276966A (en) 2017-10-20

Similar Documents

Publication Publication Date Title
US11784823B2 (en) Object signing within a cloud-based architecture
CN106612290B (en) Cross-domain single sign-on method oriented to system integration
CN105007280B (en) A kind of application login method and device
US8839395B2 (en) Single sign-on between applications
EP1914658B1 (en) Identity controlled data center
US20170293766A1 (en) Distributed data storage by means of authorisation token
JP2017510013A (en) Techniques for providing network security with just-in-time provisioned accounts
US20070101440A1 (en) Auditing correlated events using a secure web single sign-on login
JP2018501567A (en) Device verification method and equipment
CN103384198B (en) A kind of authenticating user identification method of servicing based on mailbox and system
US20160381001A1 (en) Method and apparatus for identity authentication between systems
CN106302606B (en) Across the application access method and device of one kind
CN106992859B (en) Bastion machine private key management method and device
US9059987B1 (en) Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network
CN104954330A (en) Method of accessing data resources, device and system
US20170070486A1 (en) Server public key pinning by url
US11552948B1 (en) Domain management intermediary service
JP2016516250A (en) Recoverable and recoverable dynamic device identification
CN111800426A (en) Method, device, equipment and medium for accessing native code interface in application program
CN106850612A (en) The cipher management method and system of a kind of facing cloud system
CN107276966B (en) Control method and login system of distributed system
CN108234122B (en) Token checking method and device
CN111786996A (en) Cross-domain synchronous login state method and device and cross-domain synchronous login system
CN111181714A (en) Password generation and authentication method, device, electronic equipment and medium
US11611435B2 (en) Automatic key exchange

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant