CN109413096A - A kind of login method and device more applied - Google Patents

A kind of login method and device more applied Download PDF

Info

Publication number
CN109413096A
CN109413096A CN201811453442.6A CN201811453442A CN109413096A CN 109413096 A CN109413096 A CN 109413096A CN 201811453442 A CN201811453442 A CN 201811453442A CN 109413096 A CN109413096 A CN 109413096A
Authority
CN
China
Prior art keywords
application
login
target
terminal equipment
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811453442.6A
Other languages
Chinese (zh)
Other versions
CN109413096B (en
Inventor
安晓江
胡伯良
蒋红宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Haitai Fangyuan High Technology Co Ltd
Original Assignee
Beijing Haitai Fangyuan High Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Haitai Fangyuan High Technology Co Ltd filed Critical Beijing Haitai Fangyuan High Technology Co Ltd
Priority to CN201811453442.6A priority Critical patent/CN109413096B/en
Publication of CN109413096A publication Critical patent/CN109413096A/en
Application granted granted Critical
Publication of CN109413096B publication Critical patent/CN109413096B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The invention discloses login methods and device that one kind is applied more, which comprises the first authentication server receives the logging request for the first application that first terminal equipment is sent, and generation includes the login two dimensional code of the first login banner corresponding with logging request;The display of first terminal equipment is set to log in two dimensional code;It receives the scanning of second terminal equipment and logs in the first login banner that two dimensional code obtains, and the log-on message that at least one logined successfully second is applied, the list of application of the third application of logging state is approved according to the first application, when recognizing the application of target second for applying approval logging state at least one second application there are first, target user's information corresponding with the second login banner of target that any target second is applied is obtained, the first terminal is made to pass through the first application described in target user's information registration.Provide the login scheme that can be mutually authenticated between a kind of different application.

Description

A kind of login method and device more applied
Technical field
The present invention relates to field of computer technology, more particularly to a kind of login method and device more applied.
Background technique
With the development of science and technology and continuous improvement of people's living standards, terminal device have gradually come into the work of people Make and live, brings great convenience for the work and life of people.People are carried out by the various applications on terminal device Amusement, study, office etc., but user on the terminal device using application when usually require log in application, after logining successfully It is able to achieve the use to application.
The common login mode for logging in application at present is exactly that username and password logs in, however this login mode needs are every Secondary login all inputs username and password, and login process is cumbersome, affects user experience.In order to simplify login process, existing skill The mode that art mostly uses two dimensional code to log in, such as: the login two dimensional code of a certain application is shown on a certain terminal device A, is such as existed The login two dimensional code of wechat is shown on computer;By another terminal device B for having logged in the application, shown on end of scan equipment A The login two dimensional code for a certain application shown obtains the login mark of a certain application shown on terminal device A logged in two dimensional code Know, and the user information for having logged in the application in login banner and terminal device B is sent to authentication server, authentication server The user information that the login banner and terminal device B that include in two dimensional code that terminal device A is shown are sent is bound, is realized at end The application is logged on end equipment A.
However, login mode in the prior art only relies upon the login of the certification between same application, login mode is not flexible, Affect user experience.
Summary of the invention
The present invention provides a kind of login method and device more applied, to solve to exist in the prior art login mode not Flexibly, the problem of influencing user experience.
In a first aspect, being applied to the first authentication server, the side the invention discloses the login method that one kind is applied more Method includes:
The logging request for receiving the first application that first terminal equipment is sent, generates corresponding with the logging request first Login banner, and the login two dimensional code comprising first login banner is sent to the first terminal equipment, make described One terminal device shows the login two dimensional code;
It receives second terminal equipment and scans first login banner and described second of the login two dimensional code acquisition eventually Log-on message at least one the second application that end equipment has logined successfully, wherein the log-on message includes application identities and the Two login banners;The list of application that the third application of logging state is approved according to first application pre-saved, identifies institute It states at least one second application and approves that the target second of logging state is applied with the presence or absence of first application;
Believe if so, obtaining target user corresponding with the second login banner of target that any target second is applied Breath makes the first terminal pass through the first application described in target user's information registration.
Optionally, if being provided with the public key and private key of each application in advance, the log-on message further includes the second application Private key signature, acquisition target user's information corresponding with the second login banner of target of any target second application Before, the method also includes:
According to the public key that the target second is applied, sign test is carried out to the private key signature of the target second application;
If sign test passes through, carry out obtaining target use corresponding with the second login banner of target that the target second is applied The step of family information.
Second aspect, the invention discloses the login methods that one kind is applied more, are applied to second terminal equipment, the method Include:
The login two dimensional code for the first application that scanning first terminal equipment show obtains the login two dimensional code includes the One login banner, wherein first login banner is with first corresponding first authentication server of application according to described the What the logging request for first application that one terminal device is sent generated;
It has been logined successfully into first server transmission first login banner and the second terminal equipment The log-on message of at least one the second application, wherein the log-on message includes application identities and the second login banner;Make described First authentication server approves the list of application of the third application of logging state according to first application pre-saved, is knowing Be clipped at least one described second application approve the target second of logging state there are first application in application, obtain with The corresponding target user's information of the second login banner of target that any target second is applied, makes the first terminal pass through institute State the first application described in target user's information registration.
Optionally, if being provided with the public key and private key of each application in advance, the log-on message further includes private key signature.
Optionally, described to be sent in first login banner and the second terminal equipment to the first server Before the log-on message that at least one logined successfully second is applied, the method also includes:
For the second application each logined successfully in the second terminal equipment, the login letter of second application is obtained Breath.
The third aspect, the invention discloses the entering devices that one kind is applied more, are applied to the first authentication server, the dress It sets and includes:
Request processing module receives the logging request for the first application that first terminal equipment is sent, generates and the login Corresponding first login banner is requested, and the login two dimensional code comprising first login banner is sent to the first terminal Equipment makes the first terminal equipment show the login two dimensional code;
Identification module is received, scans first login that the login two dimensional code obtains for receiving second terminal equipment The log-on message at least one the second application that mark and the second terminal equipment have logined successfully, wherein the login is believed Breath includes application identities and the second login banner;The third application of logging state is approved according to first application pre-saved List of application, the target the of logging state is approved at least one described second application of identification with the presence or absence of first application Two applications, and when recognition result, which is, is, triggering logs in control module;
Control module is logged in, for obtaining mesh corresponding with the second login banner of target of any application of target second User information is marked, the first terminal is made to pass through the first application described in target user's information registration.
Optionally, the login control module, if specifically for the public key and private key that are provided with each application in advance, institute Stating log-on message further includes private key signature, according to the public key that the target second is applied, to the private key of the target second application Signature carries out sign test;If sign test passes through, obtain corresponding with the second login banner of target that the target second is applied The step of target user's information.
Fourth aspect, the present invention disclose a kind of entering device more applied, are applied to second terminal equipment, described device packet It includes:
Scan module obtains the login for scanning the login two dimensional code for the first application that first terminal equipment is shown The first login banner that two dimensional code includes, wherein first login banner is that the first verifying corresponding with first application takes What the logging request for first application that business device is sent according to the first terminal equipment generated;
Sending module, for sending first login banner and the second terminal equipment to the first server In logined successfully at least one second application log-on message, wherein the log-on message includes that application identities and second step on Record mark;Make first authentication server according to the third application of the first application approval logging state pre-saved List of application, there are the targets second that logging state is approved in first application in recognizing at least one described second application In application, obtaining target user's information corresponding with the second login banner of target that any target second is applied, make described First terminal passes through the first application described in target user's information registration.
Optionally, if being provided with the public key and private key of each application in advance, the log-on message further includes private key signature.
Optionally, described device further include:
Obtain module, for for the second application each logined successfully in the second terminal equipment, obtain this The log-on message of two applications.
5th aspect, the invention discloses a kind of authentication servers, comprising: processor, communication interface, memory and communication Bus, wherein processor, communication interface, memory complete mutual communication by communication bus;
It is stored with computer program in the memory, when described program is executed by the processor, so that the place Manage the step of device executes any one of above-mentioned first aspect the method.
6th aspect, the invention discloses a kind of terminal devices, comprising: processor, communication interface, memory and communication are total Line, wherein processor, communication interface, memory complete mutual communication by communication bus;
It is stored with computer program in the memory, when described program is executed by the processor, so that the place Manage the step of device executes any one of above-mentioned second aspect the method.
7th aspect, the invention discloses a kind of computer readable storage medium, being stored with can be executed by electronic equipment Computer program, when described program is run on the electronic equipment, so that the electronic equipment executes above-mentioned first party The step of any one of face the method.
Eighth aspect, the invention discloses a kind of computer readable storage medium, being stored with can be executed by electronic equipment Computer program, when described program is run on the electronic equipment, so that the electronic equipment executes above-mentioned second party The step of any one of face the method.
The present invention has the beneficial effect that:
Due in embodiments of the present invention, the first authentication server pre-saves that logging state is approved in the first application The list of application of three applications, in the corresponding second terminal equipment for logging in two dimensional code of the first application of scanning first terminal equipment There are the first applications to approve the target second of logging state logined successfully in application, according to any target logined successfully Second makes first terminal equipment log in the first application using corresponding target user's information, realizes mutually recognizing each other between different application Card, improves the flexibility of login, improves user experience.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of communication construction schematic diagram that the login method provided in an embodiment of the present invention more applied is applicable in;
Fig. 2 is the login process schematic diagram that one kind provided in an embodiment of the present invention is applied more;
Fig. 3 is the login process schematic diagram that one kind provided in an embodiment of the present invention is applied more;
Fig. 4 is the entering device structural schematic diagram that one kind provided in an embodiment of the present invention is applied more;
Fig. 5 is the entering device structural schematic diagram that one kind provided in an embodiment of the present invention is applied more;
Fig. 6 is a kind of authentication server provided in an embodiment of the present invention;
Fig. 7 is a kind of terminal device provided in an embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, make below in conjunction with the attached drawing present invention into one Step ground detailed description, it is clear that described embodiment is only a part of the embodiments of the present invention, rather than whole implementation Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts Every other embodiment, shall fall within the protection scope of the present invention.
It is to be appreciated that in the description of the present application, the vocabulary such as " first ", " second " are only used for distinguishing the mesh of description , it is not understood to indicate or imply relative importance, indication or suggestion sequence can not be interpreted as.It is involved in the application It is a variety of, refer to two or more.
Below in conjunction with attached drawing, the embodiment of the present application is described in detail.
Fig. 1 is a kind of communication construction schematic diagram that the login method provided in an embodiment of the present invention more applied is applicable in, such as Fig. 1 It is shown, include first terminal equipment, second terminal equipment, the first verifying for carrying out login authentication and management to the first application Server and the second authentication server for carrying out login authentication and management correspondingly respectively with multiple second applications.At this In inventive embodiments, first terminal equipment can be the equipment such as mobile phone, tablet computer, palm PC, PC;Second terminal Equipment can be the equipment such as mobile phone, tablet computer with two-dimensional code scanning function;Authentication server can be to test with login The server or server cluster etc. of card and management function.It is said below in conjunction with login process of the specific embodiment to the application It is bright.
Embodiment 1:
Fig. 2 is the login process schematic diagram that one kind provided in an embodiment of the present invention is applied more, which includes:
S201: the logging request for the first application that first terminal equipment is sent is received, is generated corresponding with the logging request The first login banner, and the login two dimensional code comprising first login banner is sent to the first terminal equipment, made The first terminal equipment shows the login two dimensional code.
In embodiments of the present invention, authentication server is directed to the logging request of each application received, can generate one A unique corresponding login banner with the logging request, identifying the logging request, such as: it can wrap in logging request mark It is used to guarantee the unique of logging request mark containing globally unique identifier (Globally Unique Identifier, GUID) etc. Property.
In addition, in practical applications, user can be shown in the icon of the first application of first terminal equipment by clicking First terminal equipment is triggered to the logging request for sending the first application with the first corresponding first authentication server of application;It can also be with It is to trigger first terminal equipment by other application program or event to send to the first corresponding first authentication server of application The logging request of first application, in embodiments of the present invention without limiting.
Specifically, after the first authentication server receives the first logging request applied that first terminal equipment is sent, it is raw It at the first login banner corresponding with the logging request and stores, and generates the login two dimensional code comprising first login banner, The login two dimensional code of generation is sent to first terminal equipment, first terminal equipment is made to show the login two dimensional code for scanning Two dimensional code logs in.
Preferably, logging in the terminal device of two dimensional code for the ease of scanning, the first verifying corresponding with the first application is taken The information of business device is known, also includes the identification information of the first authentication server in the first login banner, such as: interconnecting between network The address agreement (Internet Protocol, IP), media access control address (Media Access Control Address, MAC) address, uniform resource locator (Uniform Resource Locator, URL) etc., it is logged in convenient for scanning The terminal device of two dimensional code is known to the information of the first authentication server;It of courses, the first authentication server is also possible to give birth to At the login two dimensional code of the identification information comprising the first login banner and the first authentication server, two dimensional code is logged in convenient for scanning Terminal device is known to the information of the first authentication server.Specifically, log in two dimensional code in comprising carry out login authentication and The identification information of the authentication server of management is this field routine techniques, is no longer repeated.
S202: it receives second terminal equipment and scans first login banner and described that the login two dimensional code obtains The log-on message at least one the second application that second terminal equipment has logined successfully, wherein the log-on message includes application mark Know and the second login banner;The list of application of the third application of logging state is approved according to first application pre-saved, Approve that the target second of logging state is applied with the presence or absence of first application at least one described second application of identification, if It is to carry out S203, if it is not, then terminating.
Its first application for carrying out login authentication is pre-saved in the first authentication server approves the of logging state The list of application of three applications, wherein the first application approves that the third application of logging state can be for one or multiple, The application identities that each third application of logging state is approved in the first application are preserved in list of application, such as Apply Names, application ID etc., preferably, also preserving the mark that each third in list of application applies corresponding authentication server in list of application Information, such as: IP address, MAC Address, URL, convenient for the first authentication server pair with third using corresponding authentication server Information is known.Wherein, the first application approves that the list of application of the third application of logging state can be pre-configured with completion by user.
Specifically, needing to log in first in application, by second terminal equipment scanning the in first terminal equipment in user The login two dimensional code for the first application that one terminal device is shown, obtains the first login banner for including in the login two dimensional code, and The log-on message hair of at least one the second application logined successfully in the first login banner and second terminal equipment that will acquire It gives and applies corresponding first authentication server with first.
First authentication server receives the first login banner of second terminal transmission and second terminal equipment is logged in into The log-on message of at least one the second application of function, according to the application identities of each second application and the first application pre-saved Approve the list of application of the third application of logging state, at least one second application that identification second terminal equipment has logined successfully In, if the target second existed in the list of application that logging state is approved in the first application is applied.
In embodiments of the present invention, the second login banner of the second application, the login for the every time second application is also only One, specifically, if current log in of the second application is logined successfully by the login two dimensional code of the second application of scanning, the Second login banner of the second application saved in two terminals, with the second corresponding second authentication server of application to the secondary login The second login banner of generation logged in two dimensional code is identical;If the second application is currently by modes such as username and passwords It logs in, the second authentication server does not generate login two dimensional code corresponding with current second application login, then the second authentication server Second login banner can be generated for the second application this time login be used to bind this user information for logging in the second application, And the second login banner of generation is sent to second terminal.
S203: obtaining target user's information corresponding with the second login banner of target that any target second is applied, The first terminal is set to pass through the first application described in target user's information registration.
Specifically, if existing and being answered positioned at first at least one second application that second terminal equipment has logined successfully It is applied with the target second in the list of application for approving logging state, the first authentication server is stepped on according to any first using approval The target second of record state is applied, and includes the target to sending with corresponding the second authentication server of target of the target second application The user information request of the second login banner of target of second application;The second authentication server of target is received comprising target second After the user information request of login banner, the target user's information bound with target login banner is sent to first service for checking credentials After the first authentication server receives target user's information, target user's information and first terminal equipment are sent for device The corresponding first login banner binding of the logging request of first application, so that first terminal equipment is stepped on by target user's information The first application of record.
In addition, if there is no be located at first to answer at least one second application that second terminal equipment has logined successfully It is applied with the target second in the list of application for approving logging state, then needs to log in the first application by other login modes, As username and password logs in.
In addition, in order to guarantee the reliability logged in, if second terminal equipment logined successfully at least one second answer In, there are multiple targets second in the list of application that logging state is approved in the first application in application, if first tests The logging state that a certain target second of card server selection is applied has failed, such as the corresponding target of the target second application the Two login banners using second login banner of target in corresponding the second authentication server of target and are used with the target second Family information is unbinding, and identity user has dropped out logging state, and first server, which can continue poll, to be existed positioned at the first application Approve that other targets second in the list of application of logging state are applied, to guarantee the reliability logged in.
Preferably, the first authentication server has failed in the logging state for determining that a certain target second is applied, can also incite somebody to action The fail message of application identities comprising the target second application is sent to second terminal, and second terminal is made to delete the target second The log-on message of application.
In embodiments of the present invention, the operation that second terminal equipment carries out can be by a certain specific in second terminal equipment It is no longer repeated using realization, such as authentication application.
Due in embodiments of the present invention, the first authentication server pre-saves that logging state is approved in the first application The list of application of three applications, in the corresponding second terminal equipment for logging in two dimensional code of the first application of scanning first terminal equipment There are the first applications to approve the target second of logging state logined successfully in application, according to any target logined successfully Second makes first terminal equipment log in the first application using corresponding target user's information, realizes mutually recognizing each other between different application Card, improves the flexibility of login, improves user experience.
Embodiment 2:
In order to improve the reliability of login, on the basis of the above embodiments, in embodiments of the present invention, if matched in advance It is equipped with the public key and private key of each application, the log-on message further includes private key signature, the acquisition and any target the Before the corresponding target user's information of the second login banner of target of two applications, the method also includes:
According to the public key that the target second is applied, sign test is carried out to the private key signature of the target second application;
If sign test passes through, carry out obtaining target use corresponding with the second login banner of target that the target second is applied The step of family information.
In embodiments of the present invention, each application can be configured with public key and private key, and external disclosure public key.
Specifically, the first authentication server is obtained by applying corresponding the second authentication server of target with target second Before taking target user's information corresponding with the second login banner of target, according to the public key of the target second application to the target the The private key signature of two applications carries out sign test, i.e., the private key signature applied according to the public key that the target second is applied to the target second It is decrypted, if successful decryption, determines that sign test passes through, by applying corresponding second service for checking credentials of target with the target second Device obtains target user's information corresponding with second login banner of target, for the login to the first application.
If sign test does not pass through, it is determined that the target second application is unavailable, and the first authentication server, which continues poll, to be existed Other targets second in the list of application that logging state is approved in the first application are applied, to guarantee the reliability logged in.
In embodiments of the present invention, the application that second terminal equipment can be applied according to the private key of the second application to second ID, unique login mark etc. one of or it is a variety of encrypted, generate private key signature, in this application without specifically limiting It is fixed.
Embodiment 3:
Fig. 3 is the login process schematic diagram that one kind provided in an embodiment of the present invention is applied more, which includes:
S301: the login two dimensional code for the first application that scanning first terminal equipment is shown obtains the login two dimensional code packet The first login banner contained, wherein first login banner be with it is described first application corresponding first authentication server according to What the logging request for first application that the first terminal equipment is sent generated.
In embodiments of the present invention, authentication server is directed to the logging request of each application received, can generate one A unique corresponding login banner with the logging request, identifying the logging request, such as: it can wrap in logging request mark It is used to guarantee the uniqueness of logging request mark containing GUID etc..
Specifically, after the first authentication server receives the first logging request applied that first terminal equipment is sent, it is raw It at the first login banner corresponding with the logging request and stores, and generates the login two dimensional code comprising first login banner, The login two dimensional code of generation is sent to first terminal equipment, first terminal equipment is made to show the login two dimensional code for scanning Two dimensional code logs in.It needs to log in first in application, eventually by second terminal equipment scanning first in first terminal equipment in user The login two dimensional code for the first application that end equipment is shown, obtains the first login banner for including in the login two dimensional code.
Preferably, applying corresponding first authentication server to first for the ease of the terminal device that scanning logs in two dimensional code Information know, also include the identification information of first authentication server in the first login banner, such as: IP address, MAC Address, URL etc.;Specifically, the identification information in logging in two dimensional code comprising carrying out the authentication server of login authentication and management is ability Domain routine techniques, is no longer repeated.
S302: Xiang Suoshu first server sends in first login banner and the second terminal equipment and has logged in The successfully log-on message of at least one the second application, wherein the log-on message includes application identities and the second login banner; First authentication server is set to approve the application column of the third application of logging state according to first application pre-saved Table, there are the applications of target second that logging state is approved in first application in recognizing at least one described second application When, target user's information corresponding with the second login banner of target that any target second is applied is obtained, makes described first Terminal passes through the first application described in target user's information registration.
Its first application for carrying out login authentication is pre-saved in the first authentication server approves the of logging state The list of application of three applications, wherein the first application approves that the third application of logging state can be for one or multiple, The application identities that each third application of logging state is approved in the first application are preserved in list of application, such as Apply Names, application ID etc., preferably, also preserving the mark that each third in list of application applies corresponding authentication server in list of application Information, such as: IP address, MAC Address, URL, convenient for the first authentication server pair with third using corresponding authentication server Information is known.Wherein, the first application approves that the list of application of the third application of logging state can be pre-configured with completion by user.
Logined successfully in the first login banner and second terminal equipment that second terminal will acquire at least one second The log-on message of application, which is sent to, applies corresponding first authentication server with first.First authentication server receives second eventually The log-on message at least one the second application for holding the first login banner sent and second terminal equipment to login successfully, according to The list of application of the third application of logging state is approved in the application identities of each second application and the first application pre-saved, knows In at least one second application that other second terminal equipment has logined successfully, if exist and approve logging state positioned at the first application List of application in target second apply.
In embodiments of the present invention, the second login banner of the second application, the login for the every time second application is also only One, specifically, if current log in of the second application is logined successfully by the login two dimensional code of the second application of scanning, the Second login banner of the second application saved in two terminals, with the second corresponding second authentication server of application to the secondary login The second login banner of generation logged in two dimensional code is identical;If the second application is currently by modes such as username and passwords It logs in, the second authentication server does not generate login two dimensional code corresponding with current second application login, then the second authentication server Second login banner can be generated for the second application this time login be used to bind this user information for logging in the second application, And the second login banner of generation is sent to second terminal.
If existing and being stepped on positioned at first using approval at least one second application that second terminal equipment has logined successfully Target second in the list of application of record state is applied, and the first authentication server approves logging state according to any first application Target second is applied, and is applied to sending with corresponding the second authentication server of target of the target second application comprising the target second The second login banner of target user information request;The second authentication server of target is received comprising the second login banner of target User information request after, the target user's information bound with target login banner is sent to the first authentication server, first After authentication server receives target user's information, first that target user's information and first terminal equipment are sent is applied Logging request corresponding first login banner binding so that first terminal equipment is answered by target user's information registration first With.
In addition, if there is no be located at first to answer at least one second application that second terminal equipment has logined successfully It is applied with the target second in the list of application for approving logging state, then needs to log in the first application by other login modes, As username and password logs in.
In addition, in order to guarantee the reliability logged in, if second terminal equipment logined successfully at least one second answer In, there are multiple targets second in the list of application that logging state is approved in the first application in application, if first tests The logging state that a certain target second of card server selection is applied has failed, such as the corresponding target of the target second application the Two login banners using second login banner of target in corresponding the second authentication server of target and are used with the target second Family information is unbinding, and identity user has dropped out logging state, and first server, which can continue poll, to be existed positioned at the first application Approve that other targets second in the list of application of logging state are applied, to guarantee the reliability logged in.
Preferably, the first authentication server has failed in the logging state for determining that a certain target second is applied, can also incite somebody to action The fail message of application identities comprising the target second application is sent to second terminal, and second terminal is made to delete the target second The log-on message of application.
In embodiments of the present invention, the operation that second terminal equipment carries out can be by a certain specific in second terminal equipment It is no longer repeated using realization, such as authentication application.
Preferably, for the ease of the first authentication server to each second application logined successfully in second terminal equipment Legitimacy is verified, if being provided with the public key and private key of each application in advance, the log-on message further includes private key signature, Second terminal equipment is set to carry out sign test, specific sign test process ginseng to the private key signature of the second application according to the public key of the second application See above-described embodiment 2, is no longer repeated.
Embodiment 4:
It is in embodiments of the present invention, described to described in the first server transmission on the basis of the various embodiments described above Before the log-on message of at least one the second application logined successfully in first login banner and the second terminal equipment, The method also includes:
For the second application each logined successfully in the second terminal equipment, the login letter of second application is obtained Breath.
Specifically, in second terminal equipment it is each second application login successfully after, second terminal equipment obtain this second The log-on message of application, and save.Specifically, second terminal equipment can log in each second application directly in second terminal After success, the log-on message of second application saved in second terminal equipment is directly read, second terminal equipment is also possible to In it is each second application login successfully after, this second application generate one include log-on message log-on message two dimensional code, second Terminal device can obtain the log-on message of second application and preservation according to the log-on message two dimensional code, wherein the login applied Information includes application identities, corresponding login banner, private key signature etc..
Embodiment 5:
Fig. 4 is the entering device structural schematic diagram that one kind provided in an embodiment of the present invention is applied more, is applied to the first verifying Server, the device include:
Request processing module 41, receives the logging request for the first application that first terminal equipment is sent, and generation is stepped on described Corresponding first login banner is requested in record, and the login two dimensional code comprising first login banner is sent to described first eventually End equipment makes the first terminal equipment show the login two dimensional code;
Identification module 42 is received, described first is stepped on for receive that second terminal equipment scans that the login two dimensional code obtains The log-on message at least one the second application that record mark and the second terminal equipment have logined successfully, wherein the login Information includes application identities and the second login banner;Approve that the third of logging state is answered according to first application pre-saved List of application identifies at least one described second application with the presence or absence of the target of the first application approval logging state Second application, and when recognition result, which is, is, triggering logs in control module;
Control module 43 is logged in, the second login banner of target for obtaining with any target second is applied is corresponding Target user's information makes the first terminal pass through the first application described in target user's information registration.
The login control module 43, if specifically for the public key and private key that are provided with each application in advance, it is described to step on Recording information further includes private key signature, according to the public key that the target second is applied, to the private key signature of the target second application Carry out sign test;If sign test passes through, carry out obtaining target corresponding with the second login banner of target that the target second is applied The step of user information.
Embodiment 6:
Fig. 5 is the entering device structural schematic diagram that one kind provided in an embodiment of the present invention is applied more, is applied to second terminal Equipment, the device include:
Scan module 51 is stepped on described in acquisition for scanning the login two dimensional code for the first application that first terminal equipment is shown The first login banner that record two dimensional code includes, wherein first login banner is the first verifying corresponding with first application What the logging request for first application that server is sent according to the first terminal equipment generated;
Sending module 52, for being set to first server transmission first login banner and the second terminal The log-on message of at least one the second application logined successfully in standby, wherein the log-on message includes application identities and second Login banner;First authentication server is set to approve the third application of logging state according to first application pre-saved List of application, there are the targets that logging state is approved in first application in recognizing at least one described second application Two in application, acquisition target user's information corresponding with the second login banner of target that any target second is applied, makes institute It states first terminal and passes through the first application described in target user's information registration.
Preferably, if being provided with the public key and private key of each application in advance, the log-on message further includes private key signature.
Described device further include:
Module 53 is obtained, for for the second application each logined successfully in the second terminal equipment, obtaining should The log-on message of second application.
Embodiment 7:
On the basis of the various embodiments described above, the embodiment of the invention also provides a kind of authentication servers, as shown in fig. 6, It include: processor 61, communication interface 62, memory 63 and communication bus 64, wherein processor 61, communication interface 62, memory 63 complete mutual communication by communication bus 64;
It is stored with computer program in the memory 63, when described program is executed by the processor 61, so that institute It states processor 61 and executes following steps:
The logging request for receiving the first application that first terminal equipment is sent, generates corresponding with the logging request first Login banner, and the login two dimensional code comprising first login banner is sent to the first terminal equipment, make described One terminal device shows the login two dimensional code;
It receives second terminal equipment and scans first login banner and described second of the login two dimensional code acquisition eventually Log-on message at least one the second application that end equipment has logined successfully, wherein the log-on message includes application identities and the Two login banners;The list of application that the third application of logging state is approved according to first application pre-saved, identifies institute It states at least one second application and approves that the target second of logging state is applied with the presence or absence of first application;
Believe if so, obtaining target user corresponding with the second login banner of target that any target second is applied Breath makes the first terminal pass through the first application described in target user's information registration.
Embodiment 8:
On the basis of the various embodiments described above, the embodiment of the invention also provides a kind of terminal devices, as shown in fig. 7, packet It includes: processor 71, communication interface 72, memory 73 and communication bus 74, wherein processor 71, communication interface 72, memory 73 Mutual communication is completed by communication bus 74;
It is stored with computer program in the memory 73, when described program is executed by the processor 71, so that institute It states processor 71 and executes following steps:
The login two dimensional code for the first application that scanning first terminal equipment show obtains the login two dimensional code includes the One login banner, wherein first login banner is with first corresponding first authentication server of application according to described the What the logging request for first application that one terminal device is sent generated;
It has been logined successfully into first server transmission first login banner and the second terminal equipment The log-on message of at least one the second application, wherein the log-on message includes application identities and the second login banner;Make described First authentication server approves the list of application of the third application of logging state according to first application pre-saved, is knowing Be clipped at least one described second application approve the target second of logging state there are first application in application, obtain with The corresponding target user's information of the second login banner of target that any target second is applied, makes the first terminal pass through institute State the first application described in target user's information registration.
Embodiment 9:
On the basis of the various embodiments described above, the embodiment of the invention also provides a kind of computers to store readable storage medium Matter is stored with the computer program that can be executed by electronic equipment in the computer readable storage medium, when described program is in institute It states when being run on electronic equipment, so that the electronic equipment realizes following steps when executing:
The logging request for receiving the first application that first terminal equipment is sent, generates corresponding with the logging request first Login banner, and the login two dimensional code comprising first login banner is sent to the first terminal equipment, make described One terminal device shows the login two dimensional code;
It receives second terminal equipment and scans first login banner and described second of the login two dimensional code acquisition eventually Log-on message at least one the second application that end equipment has logined successfully, wherein the log-on message includes application identities and the Two login banners;The list of application that the third application of logging state is approved according to first application pre-saved, identifies institute It states at least one second application and approves that the target second of logging state is applied with the presence or absence of first application;
Believe if so, obtaining target user corresponding with the second login banner of target that any target second is applied Breath makes the first terminal pass through the first application described in target user's information registration.
Embodiment 10:
On the basis of the various embodiments described above, the embodiment of the invention also provides a kind of computers to store readable storage medium Matter is stored with the computer program that can be executed by electronic equipment in the computer readable storage medium, when described program is in institute It states when being run on electronic equipment, so that the electronic equipment realizes following steps when executing:
The login two dimensional code for the first application that scanning first terminal equipment show obtains the login two dimensional code includes the One login banner, wherein first login banner is with first corresponding first authentication server of application according to described the What the logging request for first application that one terminal device is sent generated;
It has been logined successfully into first server transmission first login banner and the second terminal equipment The log-on message of at least one the second application, wherein the log-on message includes application identities and the second login banner;Make described First authentication server approves the list of application of the third application of logging state according to first application pre-saved, is knowing Be clipped at least one described second application approve the target second of logging state there are first application in application, obtain with The corresponding target user's information of the second login banner of target that any target second is applied, makes the first terminal pass through institute State the first application described in target user's information registration.
For systems/devices embodiment, since it is substantially similar to the method embodiment, so the comparison of description is simple Single, the relevent part can refer to the partial explaination of embodiments of method.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications can be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the application range.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (10)

1. the login method that one kind is applied more, which is characterized in that be applied to the first authentication server, which comprises
The logging request for receiving the first application that first terminal equipment is sent, generates corresponding with the logging request first and logs in Mark, and the login two dimensional code comprising first login banner is sent to the first terminal equipment, make first end End equipment shows the login two dimensional code;
Reception second terminal equipment scans first login banner that the login two dimensional code obtains and the second terminal is set The log-on message of standby at least one the second application logined successfully, wherein the log-on message includes that application identities and second step on Record mark;The list of application of the third application of logging state is approved according to first application pre-saved, identification is described extremely Approve that the target second of logging state is applied with the presence or absence of first application in few one second application;
If so, obtaining target user's information corresponding with the second login banner of target that any target second is applied, make The first terminal passes through the first application described in target user's information registration.
2. the method as described in claim 1, which is characterized in that if being provided with the public key and private key of each application, institute in advance Stating log-on message further includes private key signature, and the acquisition is corresponding with the second login banner of target that any target second is applied Target user's information before, the method also includes:
According to the public key that the target second is applied, sign test is carried out to the private key signature of the target second application;
If sign test passes through, carry out obtaining target user's letter corresponding with the second login banner of target that the target second is applied The step of breath.
3. the login method that one kind is applied more, which is characterized in that be applied to second terminal equipment, which comprises
The login two dimensional code for the first application that scanning first terminal equipment is shown obtains the login two dimensional code includes first and steps on Record mark, wherein first login banner is whole according to described first with first corresponding first authentication server of application What the logging request for first application that end equipment is sent generated;
It sends in first login banner and the second terminal equipment and has been logined successfully at least to the first server The log-on message of one second application, wherein the log-on message includes application identities and the second login banner;Make described first Authentication server approves the list of application of the third application of logging state according to first application pre-saved, is recognizing It is described at least one second application in there are it is described first application approve logging state target second in application, obtain with it is any The corresponding target user's information of the second login banner of target that the target second is applied makes the first terminal pass through the mesh It marks user information and logs in first application.
4. method as claimed in claim 3, which is characterized in that described to send the first login mark to the first server Before log-on message of at least one the second application logined successfully in knowledge and the second terminal equipment, the method is also Include:
For the second application each logined successfully in the second terminal equipment, the log-on message of second application is obtained.
5. the entering device that one kind is applied more, which is characterized in that be applied to the first authentication server, described device includes:
Request processing module receives the logging request for the first application that first terminal equipment is sent, generates and the logging request Corresponding first login banner, and the login two dimensional code comprising first login banner is sent to the first terminal and is set It is standby, so that the first terminal equipment is shown the login two dimensional code;
Identification module is received, scans the first login mark that the login two dimensional code obtains for receiving second terminal equipment Log-on message at least one the second application that knowledge and the second terminal equipment have logined successfully, wherein the log-on message Including application identities and the second login banner;The third application of logging state is approved according to first application pre-saved List of application identifies at least one described second application with the presence or absence of the target second of the first application approval logging state Using, and when recognition result, which is, is, triggering logs in control module;
Control module is logged in, is used for obtaining target corresponding with the second login banner of target of any application of target second Family information makes the first terminal pass through the first application described in target user's information registration.
6. device as claimed in claim 5, which is characterized in that the login control module, if specifically for being pre-configured with Have the public key and private key of each application, the log-on message further includes private key signature, according to the target second apply public key, Sign test is carried out to the private key signature of the target second application;If sign test passes through, obtain and applied with the target second The second login banner of target corresponding target user's information the step of.
7. the entering device that one kind is applied more, which is characterized in that be applied to second terminal equipment, described device includes:
Scan module obtains the login two dimension for scanning the login two dimensional code for the first application that first terminal equipment is shown The first login banner that code includes, wherein first login banner is to apply corresponding first authentication server with described first What the logging request of first application sent according to the first terminal equipment generated;
Sending module, for being sent in first login banner and the second terminal equipment to the first server The log-on message that at least one logined successfully second is applied, wherein the log-on message includes that application identities and second log in mark Know;First authentication server is set to approve the application of the third application of logging state according to first application pre-saved List, there are the applications of target second that logging state is approved in first application in recognizing at least one described second application When, target user's information corresponding with the second login banner of target that any target second is applied is obtained, makes described first Terminal passes through the first application described in target user's information registration.
8. device as claimed in claim 7, which is characterized in that described device further include:
Module is obtained, second is answered for for the second application each logined successfully in the second terminal equipment, obtaining this Log-on message.
9. a kind of authentication server characterized by comprising processor, communication interface, memory and communication bus, wherein place Device, communication interface are managed, memory completes mutual communication by communication bus;
It is stored with computer program in the memory, when described program is executed by the processor, so that the processor Perform claim requires the step of any one of 1-2 the method.
10. a kind of terminal device characterized by comprising processor, communication interface, memory and communication bus, wherein place Device, communication interface are managed, memory completes mutual communication by communication bus;
It is stored with computer program in the memory, when described program is executed by the processor, so that the processor Perform claim requires the step of any one of 3-4 the method.
CN201811453442.6A 2018-11-30 2018-11-30 A kind of login method and device more applied Active CN109413096B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811453442.6A CN109413096B (en) 2018-11-30 2018-11-30 A kind of login method and device more applied

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811453442.6A CN109413096B (en) 2018-11-30 2018-11-30 A kind of login method and device more applied

Publications (2)

Publication Number Publication Date
CN109413096A true CN109413096A (en) 2019-03-01
CN109413096B CN109413096B (en) 2019-08-09

Family

ID=65456591

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811453442.6A Active CN109413096B (en) 2018-11-30 2018-11-30 A kind of login method and device more applied

Country Status (1)

Country Link
CN (1) CN109413096B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110248356A (en) * 2019-06-06 2019-09-17 北京达佳互联信息技术有限公司 Information acquisition method and device
CN111490991A (en) * 2020-04-11 2020-08-04 苏州淘喜网络科技有限公司 Multiple server connection request system and method based on communication equipment
CN112118238A (en) * 2020-09-04 2020-12-22 腾讯音乐娱乐科技(深圳)有限公司 Method, device, system, equipment and storage medium for authentication login
CN112199652A (en) * 2020-10-23 2021-01-08 网易(杭州)网络有限公司 Login method, terminal, server, system, medium and equipment of application program
CN112333164A (en) * 2020-10-26 2021-02-05 北京白龙马云行科技有限公司 Application login method and device
CN113051954A (en) * 2021-04-19 2021-06-29 杭州拼便宜网络科技有限公司 Code scanning login method and device, electronic equipment and storage medium
CN113157812A (en) * 2021-05-21 2021-07-23 湖南快乐阳光互动娱乐传媒有限公司 Method and system for synchronizing distributed multi-cluster state class data
CN114301717A (en) * 2022-03-08 2022-04-08 苏州万店掌网络科技有限公司 Single sign-on method, device, equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104125485A (en) * 2014-07-02 2014-10-29 深圳创维数字技术股份有限公司 Method, equipment and system for sharing user information
CN104253784A (en) * 2013-06-25 2014-12-31 腾讯科技(深圳)有限公司 Logging and authorization method and system
CN105162591A (en) * 2015-07-07 2015-12-16 腾讯科技(深圳)有限公司 Equipment registration method and device
CN105656922A (en) * 2016-02-04 2016-06-08 腾讯科技(深圳)有限公司 Login method and device of application program and intelligent equipment
CN106105091A (en) * 2013-12-13 2016-11-09 T移动美国公司 Identification and Access Management Access
CN106778206A (en) * 2016-11-22 2017-05-31 泰康保险集团股份有限公司 Method, system and mobile terminal for being managed collectively multiple applications
CN106961447A (en) * 2017-05-10 2017-07-18 泰康保险集团股份有限公司 Method, user terminal, logging device and the server of system login
CN108023881A (en) * 2017-12-04 2018-05-11 泰康保险集团股份有限公司 Login method, device, medium and the electronic equipment of application program
CN108200040A (en) * 2017-12-28 2018-06-22 北京奇虎科技有限公司 Mobile client exempts from method, system, browser and the mobile terminal of close login
CN108197480A (en) * 2017-12-12 2018-06-22 泰康保险集团股份有限公司 Access control method, device and computer readable storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253784A (en) * 2013-06-25 2014-12-31 腾讯科技(深圳)有限公司 Logging and authorization method and system
CN106105091A (en) * 2013-12-13 2016-11-09 T移动美国公司 Identification and Access Management Access
CN104125485A (en) * 2014-07-02 2014-10-29 深圳创维数字技术股份有限公司 Method, equipment and system for sharing user information
CN105162591A (en) * 2015-07-07 2015-12-16 腾讯科技(深圳)有限公司 Equipment registration method and device
CN105656922A (en) * 2016-02-04 2016-06-08 腾讯科技(深圳)有限公司 Login method and device of application program and intelligent equipment
CN106778206A (en) * 2016-11-22 2017-05-31 泰康保险集团股份有限公司 Method, system and mobile terminal for being managed collectively multiple applications
CN106961447A (en) * 2017-05-10 2017-07-18 泰康保险集团股份有限公司 Method, user terminal, logging device and the server of system login
CN108023881A (en) * 2017-12-04 2018-05-11 泰康保险集团股份有限公司 Login method, device, medium and the electronic equipment of application program
CN108197480A (en) * 2017-12-12 2018-06-22 泰康保险集团股份有限公司 Access control method, device and computer readable storage medium
CN108200040A (en) * 2017-12-28 2018-06-22 北京奇虎科技有限公司 Mobile client exempts from method, system, browser and the mobile terminal of close login

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110248356A (en) * 2019-06-06 2019-09-17 北京达佳互联信息技术有限公司 Information acquisition method and device
CN110248356B (en) * 2019-06-06 2022-03-25 北京达佳互联信息技术有限公司 Information acquisition method and device
CN111490991A (en) * 2020-04-11 2020-08-04 苏州淘喜网络科技有限公司 Multiple server connection request system and method based on communication equipment
CN112118238A (en) * 2020-09-04 2020-12-22 腾讯音乐娱乐科技(深圳)有限公司 Method, device, system, equipment and storage medium for authentication login
CN112199652A (en) * 2020-10-23 2021-01-08 网易(杭州)网络有限公司 Login method, terminal, server, system, medium and equipment of application program
CN112199652B (en) * 2020-10-23 2023-08-25 网易(杭州)网络有限公司 Login method, terminal, server, system, medium and equipment of application program
CN112333164A (en) * 2020-10-26 2021-02-05 北京白龙马云行科技有限公司 Application login method and device
CN112333164B (en) * 2020-10-26 2023-04-07 北京白龙马云行科技有限公司 Application login method and device
CN113051954A (en) * 2021-04-19 2021-06-29 杭州拼便宜网络科技有限公司 Code scanning login method and device, electronic equipment and storage medium
CN113157812A (en) * 2021-05-21 2021-07-23 湖南快乐阳光互动娱乐传媒有限公司 Method and system for synchronizing distributed multi-cluster state class data
CN114301717A (en) * 2022-03-08 2022-04-08 苏州万店掌网络科技有限公司 Single sign-on method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN109413096B (en) 2019-08-09

Similar Documents

Publication Publication Date Title
CN109413096B (en) A kind of login method and device more applied
CN111556006B (en) Third-party application system login method, device, terminal and SSO service platform
CN104144419B (en) Identity authentication method, device and system
EP4066434B1 (en) Password-authenticated public key establishment
CN103475726B (en) A kind of virtual desktop management, server and client side
CN105099707B (en) A kind of offline authentication method, server and system
CN104184705A (en) Verification method, apparatus, server, user data center and system
CN104901970B (en) A kind of Quick Response Code login method, server and system
CN110519268B (en) Voting method, device, equipment, system and storage medium based on block chain
US11483155B2 (en) Access control using proof-of-possession token
CN109981287B (en) Code signing method and storage medium thereof
WO2014048749A1 (en) Inter-domain single sign-on
CN103475484B (en) USB key authentication methods and system
CN101841521A (en) Method, server and system for authenticating identify information in DNS message
CN103905399A (en) Account registration management method and apparatus
CN102143131B (en) User logout method and authentication server
CN108347428A (en) Accreditation System, the method and apparatus of application program based on block chain
CN104184709A (en) Verification method, device, server, service data center and system
CN109067785A (en) Cluster authentication method, device
CN109474600A (en) A kind of account binding method, system, device and its equipment
Alhaidary et al. Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol
US9461986B2 (en) Single sign-on for disparate servers
CN109218389A (en) The method, apparatus and storage medium and electronic equipment of processing business request
CN105162774A (en) Virtual machine login method and device used for terminal
CN105095729B (en) A kind of Quick Response Code login method, server and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant