CN109815656A - Login authentication method, device, equipment and computer readable storage medium - Google Patents
Login authentication method, device, equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN109815656A CN109815656A CN201811509574.6A CN201811509574A CN109815656A CN 109815656 A CN109815656 A CN 109815656A CN 201811509574 A CN201811509574 A CN 201811509574A CN 109815656 A CN109815656 A CN 109815656A
- Authority
- CN
- China
- Prior art keywords
- user
- authentication
- logging
- server
- operation system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention belongs to technical field of safety protection, a kind of login authentication method, device, equipment and computer readable storage medium are provided, this method comprises: client judges whether the access request carries user's logging on authentication when receiving the operation system access request of user terminal transmission;If the access request does not carry user's logging on authentication, user terminal is redirected to Verification System login page and logged in by client;Server-side carries out login authentication to user terminal, certification by when create user's logging on authentication, and user's logging on authentication of creation is fed back into operation system;Server-side verifies user's logging on authentication verification request that operation system is initiated, and the corresponding User Identity of user's logging on authentication is back to operation system when verification passes through, and establishes session with user terminal so that operation system is based on User Identity.The present invention is capable of the operating process of the multiple operation systems of simplified access, saves user time, promotes user experience.
Description
Technical field
The present invention relates to technical field of safety protection more particularly to a kind of login authentication method, device, equipment and calculating
Machine readable storage medium storing program for executing.
Background technique
With being growing for scope of the enterprise, enterprises can all have multiple operation systems to provide corresponding management kimonos
Business, the correlation between business and business is also increasing, has close relationship between each operation system.Currently, for
Information security considers that each individually operation system has security module, and user's processing is related to the business of multiple operation systems
When, access each operation system require input username and password once logged in, this is cumbersome for a user
And the time is expended, user experience is poor.
Summary of the invention
The main purpose of the present invention is to provide a kind of login authentication method, device, equipment and computer-readable storage mediums
Matter, it is intended to which the operating process of the multiple operation systems of simplified access saves user time, promotes user experience.
To achieve the above object, the present invention provides a kind of login authentication method, and the login authentication method is applied to certification
System, the Verification System include client and server-side, the login authentication method the following steps are included:
When receiving the operation system access request of user terminal transmission, the client judges that the access request is
No carrying user's logging on authentication;
If the access request does not carry user's logging on authentication, the user terminal is redirected to institute by the client
Verification System login page is stated to be logged in;
The server-side to the user terminal carry out login authentication, certification by when create user's logging on authentication, and will
User's logging on authentication of creation feeds back to the operation system;
The server-side verifies user's logging on authentication verification request that the operation system is initiated, and is verifying
By when the corresponding User Identity of user's logging on authentication is back to the operation system, for the business system
System establishes session based on the User Identity and the user terminal.
Optionally, before the step of server-side carries out login authentication to the user terminal, comprising:
The client is by presetting the private key in rivest, shamir, adelman to the password in the user terminal log-on message
It is encrypted, and User Identity, identifying code and the encrypted password in the log-on message is sent to the service
End.
Optionally, the server-side includes: to the step of user terminal progress login authentication
The server-side obtains the User Identity according to the User Identity from predetermined directory server
Corresponding identifying code, and the identifying code that will acquire is compared with the identifying code in the log-on message;
If the identifying code of the acquisition is consistent with the identifying code in the log-on message, by presetting asymmetric encryption
Public key in algorithm verifies the encrypted password, and confirms that login authentication passes through when being verified.
Optionally, the server-side to the user terminal carry out login authentication, certification by when creation user log in
After the step of card, further includes:
The mapping relations of user's logging on authentication and the User Identity that the server-side establishes creation are saved to slow
In deposit data library;
The step of server-side verifies user's logging on authentication verification request that the operation system is initiated packet
It includes:
The server-side judges in the cache database with the presence or absence of the use in user's logging on authentication verification request
Family logging on authentication;
If sentencing in the cache database there are user's logging on authentication in user's logging on authentication verification request
Whether the user's logging on authentication that user's logging on authentication verifies in request that breaks is expired;
If user's logging on authentication in user's logging on authentication verification request is not out of date, confirm that verification passes through.
Optionally, the server-side verifies user's logging on authentication verification request that the operation system is initiated, and
The corresponding User Identity of user's logging on authentication is back to the operation system when verification passes through, for described
Operation system was based on after the step of User Identity establishes session with the user terminal, comprising:
The mark of the operation system is added in the mapping relations by the server-side;
Monitor the state of the session;
When listening to the session timeout, the mark of the operation system is deleted from the mapping relations.
Optionally, it is described from the mark for deleting the operation system in the mapping relations the step of after, comprising:
The server-side judges the mark that whether there is other operation systems in the mapping relations;
If the mark of other operation systems is not present in the mapping relations, institute is deleted from the cache database
State the mapping relations.
Optionally, described when receiving the operation system access request of user terminal transmission, described in the client judgement
Whether access request carried after the step of user's logging on authentication, further includes:
If the access request carries user's logging on authentication, user's logging on authentication is sent to by the client
The server-side is verified.
In addition, to achieve the above object, the present invention also provides login authentication device, the login authentication device includes:
Client judgment module, for judging the visit when receiving the operation system access request of user terminal transmission
Ask whether request carries user's logging on authentication;
Client redirection module, if not carrying user's logging on authentication for the access request, by the user terminal
The Verification System login page is redirected to be logged in;
Server side authentication module, for the user terminal carry out login authentication, certification by when creation user log in
Voucher, and user's logging on authentication of creation is fed back into the operation system;
Server-side correction verification module, user's logging on authentication verification request for initiating the operation system verify,
And the corresponding User Identity of user's logging on authentication is back to the operation system when verification passes through, for institute
It states operation system and session is established with the user terminal based on User Identity foundation.
In addition, to achieve the above object, the present invention also provides a kind of login authentication equipment, the login authentication equipment packet
It includes processor, memory and is stored in the login authentication program that can be executed on the memory and by the processor,
Described in login authentication program when being executed by the processor, realize such as the step of above-mentioned login authentication method.
In addition, to achieve the above object, the present invention also provides a kind of computer readable storage medium, the computer can
It reads to be stored with login authentication program on storage medium, wherein realizing when the login authentication program is executed by processor as above-mentioned
Login authentication method the step of.
The present invention provides a kind of login authentication method, is applied to Verification System, which includes client and service
End, when receiving the operation system access request of user terminal transmission, client first judges whether the access request carries user
Logging on authentication, if the access request does not carry user's logging on authentication, user terminal is redirected to Verification System and stepped on by client if
Record the page logged in, then server-side to user terminal carry out login authentication, certification by when create user's logging on authentication,
And user's logging on authentication of creation is fed back into the operation system, final server-side logs in the user that the operation system is initiated
Credential verification request is verified, and the corresponding User Identity of user's logging on authentication is back to this when verification passes through
Operation system, so that the operation system is based on the User Identity and the user terminal establishes session, the present invention passes through
Build Verification System, guarantee the information security of operation system, as long as and user carried out in Verification System it is primary
It logs in, can directly access each operation system, require once to be logged in compared to each operation system of existing access
Mode simplifies user's operation process, saves user time, promotes user experience.
Detailed description of the invention
Fig. 1 is the hardware structural diagram of login authentication equipment involved in the embodiment of the present invention;
Fig. 2 is the flow diagram of login authentication method first embodiment of the present invention;
Fig. 3 is the functional block diagram of login authentication device first embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to limit this hair
It is bright.
The present embodiments relate to login authentication method be mainly used in login authentication equipment, the login authentication equipment
It can be the equipment having data processing function such as personal computer (personal computer, PC), server.
Referring to Fig.1, Fig. 1 is the hardware structural diagram of login authentication equipment involved in the embodiment of the present invention.This
In inventive embodiments, login authentication equipment may include (such as the central processing unit Central Processing of processor 1001
Unit, CPU), communication bus 1002, user interface 1003, network interface 1004, memory 1005.Wherein, communication bus
1002 for realizing the connection communication between these components;User interface 1003 may include display screen (Display), input
Unit such as keyboard (Keyboard);Network interface 1004 optionally may include standard wireline interface and wireless interface (such as
Wireless Fidelity WIreless-FIdelity, WI-FI interface);Memory 1005 can be high-speed random access memory
(random access memory, RAM) is also possible to stable memory (non-volatile memory), such as magnetic
Disk storage, memory 1005 optionally can also be the storage device independently of aforementioned processor 1001.Those skilled in the art
Member may include more or more than illustrating it is appreciated that hardware configuration and do not constitute a limitation of the invention shown in Fig. 1
Few component perhaps combines certain components or different component layouts.
With continued reference to Fig. 1, the memory 1005 in Fig. 1 as a kind of computer storage medium may include operating system,
Network communication module and login authentication program.In Fig. 1, processor 1001 can call what is stored in memory 1005 to step on
Authentication procedure is recorded, and the login authentication method of various embodiments of the present invention offer is provided.
The embodiment of the invention provides a kind of login authentication methods.
It is the flow diagram of login authentication method first embodiment of the present invention referring to Fig. 2, Fig. 2.
In the present embodiment, the login authentication method is applied to Verification System, and the Verification System includes client kimonos
Be engaged in end, the login authentication method the following steps are included:
Step S10, when receiving the operation system access request of user terminal transmission, the client judges the visit
Ask whether request carries user's logging on authentication;
In the present embodiment, Verification System is built in advance, as enterprise operation system user (employee, business personnel, cooperation
Partner) management system.The Verification System applies CAS (Central Authentication Service, central authentication clothes
Business) technology.CAS is the frame of a set of single-sign-on (Single Sign On, abbreviation SSO), can realize login one using it
Account can access the function of multiple related systems.In the present embodiment, Verification System include Client (client) and
Server (server-side), wherein be deployed with a client in the operation system each registered in Verification System, visitor
Family end is for handling access request;And server-side is then individually disposed, server-side is responsible for the certification work to user, server-side packet
Include cache database.In the present embodiment, only Verification System can receive the security information such as user account and password, business system
System does not provide logentry.
When user accesses operation system by user browser, that is, user terminal sends access request to operation system
When, the client being deployed in operation system can then intercept the operation system access request, whether then judge the access request
Carry user's logging on authentication token.If client determines that the access request does not carry user logging on authentication token, execute
The user terminal is then redirected to the Verification System login page and logged in by step S20, the client;
In step S20, if client determines that the access request does not carry user logging on authentication token, illustrate the use
Family end belongs to and first logs into without the certification of server-side, and user terminal is then redirected to the log in page of Verification System by client
Face (mark for carrying the operation system of access), so that user logs in.In the present embodiment, it to reinforce safety, authenticates
The login prompt frame of the system login page is except including that user account fills in item and further includes that identifying code is filled in addition to password fills in item
, which is when user terminal is redirected to the login page of Verification System by client, simultaneously by server-side in-time generatin
It is shown in the login page of Verification System, and the identifying code is also stored in LDAP Server (ldap directory clothes by server-side
Business device) in.LDAP (Lightweight Directory Access Protocol) is that the catalogue based on TCP/IP agreement is visited
Ask agreement, ldap directory service can effectively solve the problems, such as user account, it defines unified identity information database and connects
Mouthful.In the present embodiment, user account of the user when Verification System is registered is also stored in ldap directory server.
Step S30, the server-side to the user terminal carry out login authentication, certification by when creation user log in
Voucher, and user's logging on authentication of creation is fed back into the operation system;
When user Verification System the unified login page input user account (as User Identity), password and
Logon informations such as identifying code and after submitting logging request, network interception and hacker attack, avoid user password from letting out in order to prevent
Dew, client uses the rivest, shamir, adelman-elliptic curve made an appointment with server-side, in log-on message
Password is encrypted, specifically:
If G is the reference point on elliptic curve, key pair is (dA, PA), and wherein dA is private key (client is held), PA
It is public key (server-side is held), PA=dA*G;
It is as follows that client passes through the calculating process that the private key dA held is encrypted to obtain (r, s) to password e:
Choose random number k
Calculate r=e+x1, wherein (x1,y1)=k*G
Calculate s=(1+dA)-1*(k-r*dA)
Later, user account, identifying code and the encrypted password in log-on message are sent to service by client
End, server-side retrieve the corresponding identifying code of the user according to user account, from ldap directory server, will be in log-on message
Identifying code is compared with the identifying code retrieved from ldap directory server, if unanimously, server-side to logging request into
Row certification, specifically, server-side is used and is tested with the elliptic curve that client has been made an appointment encrypted password
Card, i.e., verify encrypted password using the public key held, process is as follows:
Calculate t=r+s;
Pass through the point (x on t and s calculated curve1,y1)=s*G+t*PA;
R=x1+e is calculated again, then verifies whether R and r is consistent, if unanimously, showing to be verified, confirmation is authenticated
Passing through, user logins successfully, and server-side creates the corresponding user's logging on authentication token of user terminal, and accessed based on user
The mark of operation system, by the corresponding cookie of user's logging on authentication token write-in operation system, cookie is server-side
The small text file being stored in operation system, that is, user's logging on authentication token is fed back to the operation system of user's access.
In addition, user's logging on authentication is associated with user account also, establishes two after server-side creation user's logging on authentication token
Mapping relations between person are stored in cache database, are also also stored in the time for creating user's logging on authentication token
In cache database.
Step S40, the server-side verify user's logging on authentication verification request that the operation system is initiated,
And the corresponding User Identity of user's logging on authentication is back to the operation system when verification passes through, for institute
It states operation system and session is established based on the User Identity and the user terminal.
The operation system of user's access initiates the verification request of user's logging on authentication, client after obtaining user's logging on authentication
End is firstly received verification request, and verification request is then sent to server-side and is verified.Server-side receives the verification
Request verifies user's logging on authentication token in verification request, and specifically, server-side judges in cache database
With the presence or absence of user's logging on authentication in user's logging on authentication verification request, if it is present judging user's logging on authentication
Whether user's logging on authentication in verification request is expired, that is, the corresponding wound of user's logging on authentication is obtained from cache database
It builds the time, then judges whether the time difference of the creation time and current time exceeds default effective time, this is default effective
The case where duration is to cause a certain user's logging on authentication that can not nullify when preventing operation system abnormal end and set, can root
According to actual conditions flexible setting.If the time difference of the creation time and current time is without departing from default effective time, server-side
It can be determined that user's logging on authentication in the verification request of user's logging on authentication is not out of date, then verification passes through, and server-side is based on caching
In database, mapping relations between user's logging on authentication token and User Identity, by token pairs of user's logging on authentication
The user account answered is back to accessed operation system by client, which then according to the user account and uses
Session is established at family end, and the operation system resource that user terminal is accessed is back to user terminal.If the creation time and current
The time difference of time exceeds default effective time, and server-side can be determined that the user in the verification request of user's logging on authentication logs in
Voucher is expired, then verifies and do not pass through, and user terminal is forbidden to access the operation system.
To be best understood from the present embodiment, citing is illustrated below.
User a accesses operation system 1 by user browser, if operation system 1 is used in entire operation system set
What family accessed for the first time, then user a just without the login authentication Jing Guo server-side, just will not be carried in the access request of user a
Token, client need for browser to be redirected to the login page of Verification System, so that user a carries out register, when
User a is in logon informations such as the login page input account of Verification System, password, identifying codes and after submitting logging request, service
End carries out login authentication to the logging request, and after certification passes through, and generates token and feeds back to operation system 1, later, business
System 1 initiates token verification request, and client is firstly received verification request, and verification request is then sent to clothes
Business end is verified, and server-side verifies token, and verification passes through, then the corresponding user account of token is passed through client
End is back to operation system 1, and operation system 1 then establishes session according to the browser of the user account and user a.
As an implementation, after step slo, further includes:
If the access request carries user's logging on authentication, user's logging on authentication is sent to by the client
The server-side is verified.
In this step, when user terminal sends access request to operation system, if being deployed in the client in operation system
Judge that the access request carries user's logging on authentication token, illustrates the user by the login authentication of server-side, the user
Have logged on success, it is only necessary to which user's logging on authentication token is sent to server-side and verified by client, server-side
User's logging on authentication token is verified.Verification passes through, and server-side then believes the corresponding user of user's logging on authentication token
Breath is back to operation system by client, and operation system then according to the corresponding user account of user's logging on authentication token and is used
Session is established at family end.As long as can directly access each operation system by the above-mentioned means, user is once logged in, keep away
Exempting from one operation system of every access once will be logged in and be verified, user need to only register an account can access it is each
Operation system improves convenience.To be best understood from the embodiment, citing is illustrated below: when user A accesses business
After system 1, operation system 2 is then accessed, then Portable belt token in the access request of user A access operation system 2, this
When client token be sent to server-side verified, verification passes through, then passes through the corresponding user account of token
Client is back to operation system 2, and operation system 2 then establishes session according to the user account and user browser, in this way, with
Family A just directly accessible operation system 2.
The present embodiment provides a kind of login authentication methods, are applied to Verification System, which includes client kimonos
Business end, when receiving the operation system access request of user terminal transmission, client first judges whether the access request carries use
User terminal is redirected to Verification System if client if the access request does not carry user's logging on authentication by family logging on authentication
Login page is logged in, then server-side to user terminal carry out login authentication, certification by when creation user log in
Card, and user's logging on authentication of creation is fed back into the operation system, the user that final server-side initiates the operation system steps on
Record credential verification request is verified, and is back to the corresponding User Identity of user's logging on authentication when verification passes through
The operation system, so that the operation system is based on the User Identity and the user terminal establishes session, the present embodiment
By building Verification System, guarantee the information security of operation system, as long as and user Verification System carry out
It is primary to log in, each operation system can be directly accessed, requires once to be stepped on compared to the existing each operation system of access
The mode of record simplifies user's operation process, saves user time, promotes user experience.
Further, the second embodiment of login authentication method of the present invention is proposed based on first embodiment.Login authentication side
The difference of the first embodiment of the second embodiment and login authentication method of method is, after the step 40, may include:
The mark of the operation system is added in the mapping relations by step a1, the server-side;
In the present embodiment, after operation system and user terminal establish session, server-side can add the mark of operation system
It adds in the mapping relations in cache database between user's logging on authentication and User Identity information.
Step a2 monitors the state of the session;
Later, server-side can monitor the state of the session.
Step a3 deletes the mark of the operation system when listening to the session timeout from the mapping relations
Know.
When server-side listens to the session timeout, operation system has been likely to occur the abnormal conditions such as collapse, for business
System information safety considers, the mark of the operation system can be deleted from the mapping relations, indicates user's logging on authentication for this
No longer valid for operation system, user terminal needs to carry out login authentication in Verification System again when accessing the operation system.
Further, after the step a3, may include:
Step a4, the server-side judge the mark that whether there is other operation systems in the mapping relations;
Step a5, if the mark of other operation systems is not present in the mapping relations, from the cache database
Delete the mapping relations.
User terminal is after accessing the operation system, if having accessed other operation systems, the user of the user terminal is logged in
Also the mark of other operation systems can be added in the corresponding mapping relations of voucher, if user's logging on authentication pair of the user terminal
Also the mark of other operation systems is not present in the mapping relations answered, that is, the corresponding mapping of user's logging on authentication of the user terminal
Operation system in relationship is identified as sky, then the mapping relations is deleted from cache database, that is, delete the user terminal
User's logging on authentication, when which accesses any one operation system all in Verification System re-start login authentication.
The present embodiment, for the operation system, is cancelled user terminal and is based in user terminal and the session timeout of operation system
The access authority that user's logging on authentication generates needs log in Verification System again when user terminal accesses the operation system to recognize
Card, in addition, can delete user from cache database when confirming that user's logging on authentication all fails to all operation systems and step on
Voucher is recorded, ensure that the safety of operation system.
In addition, the embodiment of the present invention also provides a kind of login authentication device.
It is the functional block diagram of login authentication device first embodiment of the present invention referring to Fig. 3, Fig. 3.
In the present embodiment, the login authentication device includes:
Client judgment module 10, for when receiving the operation system access request of user terminal transmission, described in judgement
Whether access request carries user's logging on authentication;
Client redirection module 20, if not carrying user's logging on authentication for the access request, by the user
End is redirected to the Verification System login page and is logged in;
Server side authentication module 30, for the user terminal carry out login authentication, certification by when creation user step on
Voucher is recorded, and user's logging on authentication of creation is fed back into the operation system;
Server-side correction verification module 40, user's logging on authentication verification request for initiating the operation system carry out school
It tests, and the corresponding User Identity of user's logging on authentication is back to the operation system when verification passes through, for
The operation system is based on the User Identity and the user terminal establishes session.
Wherein, each virtual functions module of above-mentioned login authentication device is stored in the storage of login authentication equipment shown in Fig. 1
It is functional for realizing the institute of login authentication program in device 1005;When each module is executed by processor 1001, so that business system
The information security of system guaranteed, as long as and user once logged in Verification System, can directly access each business system
System requires the mode once logged in compared to the existing each operation system of access, simplifies user's operation process, save
User time has been saved, user experience is promoted.
Further, the login authentication device further include:
Client encrypting module, for being believed by presetting the private key in rivest, shamir, adelman and being logged in the user terminal
Password in breath is encrypted, and User Identity, identifying code and the encrypted password in the log-on message are sent
To the server-side.
Further, the server side authentication module 30 includes:
Server-side comparing unit, for obtaining the use from predetermined directory server according to the User Identity
The corresponding identifying code of family identity, and the identifying code that will acquire is compared with the identifying code in the log-on message;
Server-side authentication unit, if the identifying code for the acquisition is consistent with the identifying code in the log-on message,
The encrypted password is verified by presetting the public key in rivest, shamir, adelman, and the confirmation when being verified
Login authentication passes through.
Further, the login authentication device further include:
Server-side establishes module, closes for establishing the mapping of user's logging on authentication and the User Identity of creation
System saves into cache database;
The server-side correction verification module 40 includes:
The first judging unit of server-side, for judging in the cache database with the presence or absence of user's logging on authentication
User's logging on authentication in verification request;
Server-side second judgment unit, if for there are user's logging on authentication verifications to ask in the cache database
User's logging on authentication in asking then judges whether user's logging on authentication in user's logging on authentication verification request is expired;
Server-side confirmation unit, if user's logging on authentication in user's logging on authentication verification request is not out of date,
Then confirm that verification passes through.
Further, the login authentication device further include:
Server-side adding module, for the mark of the operation system to be added in the mapping relations;
Server-side monitors module, for monitoring the state of the session;
The first removing module of server-side, for deleting institute from the mapping relations when listening to the session timeout
State the mark of operation system.
Further, the login authentication device further include:
Server-side judgment module, the mark for judging to whether there is other operation systems in the mapping relations;
The second removing module of server-side, if the mark for other operation systems to be not present in the mapping relations, from
The mapping relations are deleted in the cache database.
Further, the login authentication device further include:
Client sending module, if carrying user's logging on authentication for the access request, the client will be described
User's logging on authentication is sent to the server-side and verifies.
Wherein, in above-mentioned login authentication device in the function realization and above-mentioned login authentication method embodiment of modules
Each step is corresponding, and function and realization process no longer repeat one by one here.
In addition, the embodiment of the present invention also provides a kind of computer readable storage medium.
Login authentication program is stored on computer readable storage medium of the present invention, wherein the login authentication program quilt
When processor executes, realize such as the step of above-mentioned login authentication method.
Wherein, login authentication program, which is performed realized method, can refer to each of login authentication method of the present invention
Embodiment, details are not described herein again.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant be intended to it is non-
It is exclusive to include, so that the process, method, article or the system that include a series of elements not only include those elements,
It but also including other elements that are not explicitly listed, or further include for this process, method, article or system institute
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or system including the element.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but many situations
It is lower the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to the prior art
The part to contribute can be embodied in the form of software products, which is stored in as described above
In one storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be
Mobile phone, computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content, it is relevant to be applied directly or indirectly in other
Technical field is included within the scope of the present invention.
Claims (10)
1. a kind of login authentication method, which is characterized in that the login authentication method is applied to Verification System, the Verification System
Including client and server-side, the login authentication method the following steps are included:
When receiving the operation system access request of user terminal transmission, the client judges whether the access request carries
User's logging on authentication;
If the access request does not carry user's logging on authentication, the user terminal is redirected to the certification by the client
The system login page is logged in;
The server-side to the user terminal carry out login authentication, certification by when create user's logging on authentication, and will creation
User's logging on authentication feed back to the operation system;
The server-side verifies user's logging on authentication verification request that the operation system is initiated, and when verification passes through
The corresponding User Identity of user's logging on authentication is back to the operation system, so that the operation system is based on institute
It states User Identity and the user terminal establishes session.
2. login authentication method as described in claim 1, which is characterized in that the server-side logs in the user terminal
Before the step of certification, comprising:
The client carries out the password in the user terminal log-on message by presetting the private key in rivest, shamir, adelman
Encryption, and User Identity, identifying code and the encrypted password in the log-on message are sent to the server-side.
3. login authentication method as claimed in claim 2, which is characterized in that the server-side logs in the user terminal
The step of certification includes:
It is corresponding that the server-side obtains the User Identity according to the User Identity from predetermined directory server
Identifying code, and the identifying code that will acquire is compared with the identifying code in the log-on message;
If the identifying code of the acquisition is consistent with the identifying code in the log-on message, by default rivest, shamir, adelman
Public key the encrypted password is verified, and when being verified confirm login authentication pass through.
4. login authentication method as claimed in claim 3, which is characterized in that the server-side logs in the user terminal
Certification, certification by when creation user's logging on authentication the step of after, further includes:
The mapping relations of user's logging on authentication and the User Identity that the server-side establishes creation are saved to caching number
According in library;
The server-side verifies the step of request verifies to user's logging on authentication that the operation system is initiated
The server-side judges to step in the cache database with the presence or absence of the user in user's logging on authentication verification request
Record voucher;
If in the cache database there are user's logging on authentication verification request in user's logging on authentication, judgement described in
Whether user's logging on authentication in the verification request of user's logging on authentication is expired;
If user's logging on authentication in user's logging on authentication verification request is not out of date, confirm that verification passes through.
5. login authentication method as claimed in claim 4, which is characterized in that the server-side initiates the operation system
The verification request of user's logging on authentication verifies, and when verification passes through by the corresponding user identity mark of user's logging on authentication
Knowledge is back to the operation system, establishes session with the user terminal so that the operation system is based on the User Identity
The step of after, comprising:
The mark of the operation system is added in the mapping relations by the server-side;
Monitor the state of the session;
When listening to the session timeout, the mark of the operation system is deleted from the mapping relations.
6. login authentication method as claimed in claim 5, which is characterized in that described to delete the industry from the mapping relations
After the step of mark of business system, comprising:
The server-side judges the mark that whether there is other operation systems in the mapping relations;
If the mark of other operation systems is not present in the mapping relations, the mapping is deleted from the cache database
Relationship.
7. login authentication method as described in claim 1, which is characterized in that whether the client judges the access request
After the step of carrying user's logging on authentication, further includes:
If the access request carries user's logging on authentication, user's logging on authentication is sent to the clothes by the client
Business end is verified.
8. a kind of login authentication device, which is characterized in that the login authentication device includes:
Client judgment module, for judging that the access is asked when receiving the operation system access request of user terminal transmission
The no carrying user's logging on authentication of Seeking Truth;
Client redirection module resets the user terminal if not carrying user's logging on authentication for the access request
It is logged in to the Verification System login page;
Server side authentication module, for the user terminal carry out login authentication, certification by when create user's logging on authentication,
And user's logging on authentication of creation is fed back into the operation system;
Server-side correction verification module, user's logging on authentication verification request for initiating the operation system verify, and
The corresponding User Identity of user's logging on authentication is back to the operation system when verification passes through, for the business
System is based on User Identity foundation and establishes session with the user terminal.
9. a kind of login authentication equipment, which is characterized in that the login authentication equipment includes processor, memory and storage
On the memory and the login authentication program that can be executed by the processor, wherein the login authentication program is by the place
When managing device and executing, the step of realizing login authentication method as described in any one of claims 1 to 7.
10. a kind of computer readable storage medium, which is characterized in that be stored with login on the computer readable storage medium and recognize
Program is demonstrate,proved, wherein realizing stepping on as described in any one of claims 1 to 7 when the login authentication program is executed by processor
The step of recording authentication method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811509574.6A CN109815656A (en) | 2018-12-11 | 2018-12-11 | Login authentication method, device, equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811509574.6A CN109815656A (en) | 2018-12-11 | 2018-12-11 | Login authentication method, device, equipment and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109815656A true CN109815656A (en) | 2019-05-28 |
Family
ID=66602167
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811509574.6A Pending CN109815656A (en) | 2018-12-11 | 2018-12-11 | Login authentication method, device, equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109815656A (en) |
Cited By (48)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110247917A (en) * | 2019-06-20 | 2019-09-17 | 北京百度网讯科技有限公司 | Method and apparatus for authenticating identity |
CN110335065A (en) * | 2019-06-10 | 2019-10-15 | 平安科技(深圳)有限公司 | Method of servicing, system, equipment and the storage medium of robot |
CN110445768A (en) * | 2019-07-18 | 2019-11-12 | 阿里巴巴集团控股有限公司 | A kind of login method, device and electronic equipment |
CN110582769A (en) * | 2019-07-11 | 2019-12-17 | 深圳市鹰硕技术有限公司 | single-account multi-identity login method, device, server and storage medium |
CN110750765A (en) * | 2019-09-27 | 2020-02-04 | 奇安信科技集团股份有限公司 | Service system, front-end page control method thereof, computer device, and storage medium |
CN110784450A (en) * | 2019-09-24 | 2020-02-11 | 云深互联(北京)科技有限公司 | Single sign-on method and device based on browser |
CN110855640A (en) * | 2019-10-30 | 2020-02-28 | 北京市天元网络技术股份有限公司 | CAS-based login credential destruction method and device |
CN111107063A (en) * | 2019-12-04 | 2020-05-05 | 海南新软软件有限公司 | Login method and device |
CN111159673A (en) * | 2019-12-31 | 2020-05-15 | 上海亿保健康管理有限公司 | Identity information verification method, device and equipment |
CN111182030A (en) * | 2019-12-04 | 2020-05-19 | 北京健康之家科技有限公司 | Network service execution method and device |
CN111241504A (en) * | 2020-01-16 | 2020-06-05 | 远景智能国际私人投资有限公司 | Identity authentication method and device, electronic equipment and storage medium |
CN111243715A (en) * | 2019-12-23 | 2020-06-05 | 福建亿能达信息技术股份有限公司 | Login method for unifying business system to integrated platform |
CN111259363A (en) * | 2020-01-19 | 2020-06-09 | 数字广东网络建设有限公司 | Service access information processing method, system, device, equipment and storage medium |
CN111447245A (en) * | 2020-05-27 | 2020-07-24 | 杭州海康威视数字技术股份有限公司 | Authentication method, authentication device, electronic equipment and server |
CN111552936A (en) * | 2020-04-26 | 2020-08-18 | 国电南瑞科技股份有限公司 | Cross-system access right control method and system based on scheduling mechanism level |
CN111698250A (en) * | 2020-06-11 | 2020-09-22 | 腾讯科技(深圳)有限公司 | Access request processing method and device, electronic equipment and computer storage medium |
CN111865889A (en) * | 2019-12-10 | 2020-10-30 | 北京嘀嘀无限科技发展有限公司 | Login request processing method, system, device, electronic equipment and storage medium |
CN112035810A (en) * | 2020-08-19 | 2020-12-04 | 绿盟科技集团股份有限公司 | Access control method, device, medium and equipment |
CN112104625A (en) * | 2020-09-03 | 2020-12-18 | 腾讯科技(深圳)有限公司 | Process access control method and device |
CN112165475A (en) * | 2020-09-22 | 2021-01-01 | 成都知道创宇信息技术有限公司 | Anti-crawler method, anti-crawler device, website server and readable storage medium |
CN112398789A (en) * | 2019-08-15 | 2021-02-23 | 奇安信安全技术(珠海)有限公司 | Remote login control method, device, system, storage medium and electronic device |
CN112417401A (en) * | 2020-11-26 | 2021-02-26 | 深圳创维-Rgb电子有限公司 | Account verification method, device and system and computer readable storage medium |
CN112540917A (en) * | 2020-12-03 | 2021-03-23 | 北京航天云路有限公司 | Automatic login method for realizing automatic test based on token authentication mechanism |
CN112559994A (en) * | 2020-12-25 | 2021-03-26 | 北京百度网讯科技有限公司 | Access control method, device, equipment and storage medium |
CN112769754A (en) * | 2020-12-18 | 2021-05-07 | 中国平安财产保险股份有限公司 | Client access method, device, equipment and storage medium |
CN112995219A (en) * | 2021-05-06 | 2021-06-18 | 四川省明厚天信息技术股份有限公司 | Single sign-on method, device, equipment and storage medium |
CN113129526A (en) * | 2020-12-08 | 2021-07-16 | 浙江口碑网络技术有限公司 | Cabinet opening control method, server, computing device and computer storage medium |
CN113132302A (en) * | 2019-12-31 | 2021-07-16 | 北京懿医云科技有限公司 | Login method and system |
CN113259319A (en) * | 2021-04-12 | 2021-08-13 | 顶象科技有限公司 | Verification processing method and system |
CN113395289A (en) * | 2021-06-30 | 2021-09-14 | 北京奇艺世纪科技有限公司 | Authentication method, authentication device, electronic equipment and storage medium |
CN113434836A (en) * | 2021-05-31 | 2021-09-24 | 深信服科技股份有限公司 | Identity authentication method, device, equipment and medium |
CN113542201A (en) * | 2020-04-20 | 2021-10-22 | 上海云盾信息技术有限公司 | Access control method and device for Internet service |
CN113645239A (en) * | 2021-08-10 | 2021-11-12 | 平安普惠企业管理有限公司 | Application login method and device, user terminal and storage medium |
CN113656787A (en) * | 2021-08-12 | 2021-11-16 | 青岛海信智慧生活科技股份有限公司 | Service providing device, terminal, authentication device, resource access method and system |
CN113949534A (en) * | 2021-09-22 | 2022-01-18 | 广东电网有限责任公司 | Resource access method and device for information system, electronic equipment and storage medium |
CN114039773A (en) * | 2021-11-08 | 2022-02-11 | 北京天融信网络安全技术有限公司 | Connection establishing method, device, equipment and computer readable storage medium |
CN114124530A (en) * | 2021-11-23 | 2022-03-01 | 中国银行股份有限公司 | Automatic login method and device of cross-border matching system |
CN114143053A (en) * | 2021-11-24 | 2022-03-04 | 国云科技股份有限公司 | Third-party service login method and device, terminal equipment and storage medium |
CN114158046A (en) * | 2021-12-30 | 2022-03-08 | 支付宝(杭州)信息技术有限公司 | Method and device for realizing one-key login service |
CN114258023A (en) * | 2021-12-23 | 2022-03-29 | 深圳市创维软件有限公司 | Mesh networking method, device, equipment and readable storage medium |
CN114338223A (en) * | 2022-01-14 | 2022-04-12 | 百果园技术(新加坡)有限公司 | User authentication method, system, device, equipment and storage medium |
CN114500031A (en) * | 2022-01-21 | 2022-05-13 | 浙江惠瀜网络科技有限公司 | System, method, electronic device and medium for obtaining BI report form based on single sign-on |
CN114500097A (en) * | 2022-03-03 | 2022-05-13 | 中国农业银行股份有限公司四川省分行 | Verification mechanism based on single sign-on of Web system |
CN114666160A (en) * | 2022-04-26 | 2022-06-24 | 济南超级计算技术研究院 | Jwt-based multi-system security unified authentication system and method |
CN114666124A (en) * | 2022-03-22 | 2022-06-24 | 通号智慧城市研究设计院有限公司 | Business system login method, login device, electronic equipment and storage medium |
CN114745145A (en) * | 2021-01-07 | 2022-07-12 | 腾讯科技(深圳)有限公司 | Business data access method, device and equipment and computer storage medium |
CN115134144A (en) * | 2022-06-28 | 2022-09-30 | 中国工商银行股份有限公司 | Enterprise-level business system authentication method, device and system |
CN116881877A (en) * | 2023-07-11 | 2023-10-13 | 安徽泽悦信息科技有限公司 | Data security protection method and system based on big data analysis technology |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102420836A (en) * | 2012-01-12 | 2012-04-18 | 中国电子科技集团公司第十五研究所 | Sign-on method and sign-on management system for service information system |
CN105721502A (en) * | 2016-04-11 | 2016-06-29 | 上海上实龙创智慧能源科技股份有限公司 | Authorized access method for browser client and server |
CN107770140A (en) * | 2016-08-22 | 2018-03-06 | 南京中兴软件有限责任公司 | A kind of single sign-on authentication method and device |
CN108600203A (en) * | 2018-04-11 | 2018-09-28 | 四川长虹电器股份有限公司 | Secure Single Sign-on method based on Cookie and its unified certification service system |
-
2018
- 2018-12-11 CN CN201811509574.6A patent/CN109815656A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102420836A (en) * | 2012-01-12 | 2012-04-18 | 中国电子科技集团公司第十五研究所 | Sign-on method and sign-on management system for service information system |
CN105721502A (en) * | 2016-04-11 | 2016-06-29 | 上海上实龙创智慧能源科技股份有限公司 | Authorized access method for browser client and server |
CN107770140A (en) * | 2016-08-22 | 2018-03-06 | 南京中兴软件有限责任公司 | A kind of single sign-on authentication method and device |
CN108600203A (en) * | 2018-04-11 | 2018-09-28 | 四川长虹电器股份有限公司 | Secure Single Sign-on method based on Cookie and its unified certification service system |
Cited By (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110335065A (en) * | 2019-06-10 | 2019-10-15 | 平安科技(深圳)有限公司 | Method of servicing, system, equipment and the storage medium of robot |
CN110335065B (en) * | 2019-06-10 | 2023-06-20 | 平安科技(深圳)有限公司 | Service method, system, equipment and storage medium of robot |
CN110247917A (en) * | 2019-06-20 | 2019-09-17 | 北京百度网讯科技有限公司 | Method and apparatus for authenticating identity |
CN110247917B (en) * | 2019-06-20 | 2021-09-10 | 北京百度网讯科技有限公司 | Method and apparatus for authenticating identity |
CN110582769A (en) * | 2019-07-11 | 2019-12-17 | 深圳市鹰硕技术有限公司 | single-account multi-identity login method, device, server and storage medium |
CN110445768A (en) * | 2019-07-18 | 2019-11-12 | 阿里巴巴集团控股有限公司 | A kind of login method, device and electronic equipment |
CN110445768B (en) * | 2019-07-18 | 2021-11-09 | 创新先进技术有限公司 | Login method and device and electronic equipment |
CN112398789A (en) * | 2019-08-15 | 2021-02-23 | 奇安信安全技术(珠海)有限公司 | Remote login control method, device, system, storage medium and electronic device |
CN110784450A (en) * | 2019-09-24 | 2020-02-11 | 云深互联(北京)科技有限公司 | Single sign-on method and device based on browser |
CN110750765A (en) * | 2019-09-27 | 2020-02-04 | 奇安信科技集团股份有限公司 | Service system, front-end page control method thereof, computer device, and storage medium |
CN110855640A (en) * | 2019-10-30 | 2020-02-28 | 北京市天元网络技术股份有限公司 | CAS-based login credential destruction method and device |
CN111107063A (en) * | 2019-12-04 | 2020-05-05 | 海南新软软件有限公司 | Login method and device |
CN111182030A (en) * | 2019-12-04 | 2020-05-19 | 北京健康之家科技有限公司 | Network service execution method and device |
CN111107063B (en) * | 2019-12-04 | 2022-04-22 | 海南新软软件有限公司 | Login method and device |
CN111182030B (en) * | 2019-12-04 | 2022-12-09 | 北京健康之家科技有限公司 | Network service execution method and device |
CN111865889B (en) * | 2019-12-10 | 2022-08-26 | 北京嘀嘀无限科技发展有限公司 | Login request processing method, system, device, electronic equipment and storage medium |
CN111865889A (en) * | 2019-12-10 | 2020-10-30 | 北京嘀嘀无限科技发展有限公司 | Login request processing method, system, device, electronic equipment and storage medium |
CN111243715A (en) * | 2019-12-23 | 2020-06-05 | 福建亿能达信息技术股份有限公司 | Login method for unifying business system to integrated platform |
CN111159673B (en) * | 2019-12-31 | 2022-09-02 | 海南老白健康科技有限公司 | Identity information verification method, device and equipment |
CN113132302A (en) * | 2019-12-31 | 2021-07-16 | 北京懿医云科技有限公司 | Login method and system |
CN111159673A (en) * | 2019-12-31 | 2020-05-15 | 上海亿保健康管理有限公司 | Identity information verification method, device and equipment |
CN111241504A (en) * | 2020-01-16 | 2020-06-05 | 远景智能国际私人投资有限公司 | Identity authentication method and device, electronic equipment and storage medium |
CN111241504B (en) * | 2020-01-16 | 2024-01-05 | 远景智能国际私人投资有限公司 | Identity verification method, device, electronic equipment and storage medium |
CN111259363A (en) * | 2020-01-19 | 2020-06-09 | 数字广东网络建设有限公司 | Service access information processing method, system, device, equipment and storage medium |
CN113542201A (en) * | 2020-04-20 | 2021-10-22 | 上海云盾信息技术有限公司 | Access control method and device for Internet service |
CN111552936B (en) * | 2020-04-26 | 2022-10-14 | 国电南瑞科技股份有限公司 | Cross-system access right control method and system based on scheduling mechanism level |
CN111552936A (en) * | 2020-04-26 | 2020-08-18 | 国电南瑞科技股份有限公司 | Cross-system access right control method and system based on scheduling mechanism level |
CN111447245A (en) * | 2020-05-27 | 2020-07-24 | 杭州海康威视数字技术股份有限公司 | Authentication method, authentication device, electronic equipment and server |
CN111698250B (en) * | 2020-06-11 | 2023-11-28 | 腾讯科技(深圳)有限公司 | Access request processing method and device, electronic equipment and computer storage medium |
CN111698250A (en) * | 2020-06-11 | 2020-09-22 | 腾讯科技(深圳)有限公司 | Access request processing method and device, electronic equipment and computer storage medium |
CN112035810A (en) * | 2020-08-19 | 2020-12-04 | 绿盟科技集团股份有限公司 | Access control method, device, medium and equipment |
CN112104625B (en) * | 2020-09-03 | 2024-04-16 | 腾讯云计算(北京)有限责任公司 | Process access control method and device |
CN112104625A (en) * | 2020-09-03 | 2020-12-18 | 腾讯科技(深圳)有限公司 | Process access control method and device |
CN112165475B (en) * | 2020-09-22 | 2023-05-02 | 成都知道创宇信息技术有限公司 | Anticreeper method, anticreeper device, web server, and readable storage medium |
CN112165475A (en) * | 2020-09-22 | 2021-01-01 | 成都知道创宇信息技术有限公司 | Anti-crawler method, anti-crawler device, website server and readable storage medium |
CN112417401A (en) * | 2020-11-26 | 2021-02-26 | 深圳创维-Rgb电子有限公司 | Account verification method, device and system and computer readable storage medium |
CN112540917A (en) * | 2020-12-03 | 2021-03-23 | 北京航天云路有限公司 | Automatic login method for realizing automatic test based on token authentication mechanism |
CN113129526A (en) * | 2020-12-08 | 2021-07-16 | 浙江口碑网络技术有限公司 | Cabinet opening control method, server, computing device and computer storage medium |
CN112769754A (en) * | 2020-12-18 | 2021-05-07 | 中国平安财产保险股份有限公司 | Client access method, device, equipment and storage medium |
CN112769754B (en) * | 2020-12-18 | 2023-10-24 | 中国平安财产保险股份有限公司 | Client access method, device, equipment and storage medium |
CN112559994B (en) * | 2020-12-25 | 2023-12-01 | 北京百度网讯科技有限公司 | Access control method, device, equipment and storage medium |
CN112559994A (en) * | 2020-12-25 | 2021-03-26 | 北京百度网讯科技有限公司 | Access control method, device, equipment and storage medium |
CN114745145A (en) * | 2021-01-07 | 2022-07-12 | 腾讯科技(深圳)有限公司 | Business data access method, device and equipment and computer storage medium |
CN113259319B (en) * | 2021-04-12 | 2023-05-12 | 杭州顶象科技有限公司 | Verification processing method and system |
CN113259319A (en) * | 2021-04-12 | 2021-08-13 | 顶象科技有限公司 | Verification processing method and system |
CN112995219A (en) * | 2021-05-06 | 2021-06-18 | 四川省明厚天信息技术股份有限公司 | Single sign-on method, device, equipment and storage medium |
CN113434836A (en) * | 2021-05-31 | 2021-09-24 | 深信服科技股份有限公司 | Identity authentication method, device, equipment and medium |
CN113395289A (en) * | 2021-06-30 | 2021-09-14 | 北京奇艺世纪科技有限公司 | Authentication method, authentication device, electronic equipment and storage medium |
CN113645239B (en) * | 2021-08-10 | 2022-10-28 | 平安普惠企业管理有限公司 | Application login method and device, user terminal and storage medium |
CN113645239A (en) * | 2021-08-10 | 2021-11-12 | 平安普惠企业管理有限公司 | Application login method and device, user terminal and storage medium |
CN113656787B (en) * | 2021-08-12 | 2023-10-27 | 青岛海信智慧生活科技股份有限公司 | Service providing device, terminal, authentication device, resource access method and system |
CN113656787A (en) * | 2021-08-12 | 2021-11-16 | 青岛海信智慧生活科技股份有限公司 | Service providing device, terminal, authentication device, resource access method and system |
CN113949534A (en) * | 2021-09-22 | 2022-01-18 | 广东电网有限责任公司 | Resource access method and device for information system, electronic equipment and storage medium |
CN114039773B (en) * | 2021-11-08 | 2024-02-02 | 北京天融信网络安全技术有限公司 | Connection establishment method, device, equipment and computer readable storage medium |
CN114039773A (en) * | 2021-11-08 | 2022-02-11 | 北京天融信网络安全技术有限公司 | Connection establishing method, device, equipment and computer readable storage medium |
CN114124530B (en) * | 2021-11-23 | 2024-04-19 | 中国银行股份有限公司 | Automatic login method and device of cross-border matching system |
CN114124530A (en) * | 2021-11-23 | 2022-03-01 | 中国银行股份有限公司 | Automatic login method and device of cross-border matching system |
CN114143053A (en) * | 2021-11-24 | 2022-03-04 | 国云科技股份有限公司 | Third-party service login method and device, terminal equipment and storage medium |
CN114258023A (en) * | 2021-12-23 | 2022-03-29 | 深圳市创维软件有限公司 | Mesh networking method, device, equipment and readable storage medium |
CN114258023B (en) * | 2021-12-23 | 2024-01-09 | 深圳市创维软件有限公司 | Mesh networking method, device, equipment and readable storage medium |
CN114158046A (en) * | 2021-12-30 | 2022-03-08 | 支付宝(杭州)信息技术有限公司 | Method and device for realizing one-key login service |
CN114158046B (en) * | 2021-12-30 | 2024-04-23 | 支付宝(杭州)信息技术有限公司 | Method and device for realizing one-key login service |
CN114338223B (en) * | 2022-01-14 | 2024-01-09 | 百果园技术(新加坡)有限公司 | User authentication method, system, device, equipment and storage medium |
CN114338223A (en) * | 2022-01-14 | 2022-04-12 | 百果园技术(新加坡)有限公司 | User authentication method, system, device, equipment and storage medium |
CN114500031A (en) * | 2022-01-21 | 2022-05-13 | 浙江惠瀜网络科技有限公司 | System, method, electronic device and medium for obtaining BI report form based on single sign-on |
CN114500097A (en) * | 2022-03-03 | 2022-05-13 | 中国农业银行股份有限公司四川省分行 | Verification mechanism based on single sign-on of Web system |
CN114666124A (en) * | 2022-03-22 | 2022-06-24 | 通号智慧城市研究设计院有限公司 | Business system login method, login device, electronic equipment and storage medium |
CN114666160A (en) * | 2022-04-26 | 2022-06-24 | 济南超级计算技术研究院 | Jwt-based multi-system security unified authentication system and method |
CN115134144A (en) * | 2022-06-28 | 2022-09-30 | 中国工商银行股份有限公司 | Enterprise-level business system authentication method, device and system |
CN116881877A (en) * | 2023-07-11 | 2023-10-13 | 安徽泽悦信息科技有限公司 | Data security protection method and system based on big data analysis technology |
CN116881877B (en) * | 2023-07-11 | 2024-03-22 | 山西星宇合创信息技术有限公司 | Data security protection method and system based on big data analysis technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109815656A (en) | Login authentication method, device, equipment and computer readable storage medium | |
US10567391B2 (en) | Graduated authentication in an identity management system | |
CA3059330C (en) | Systems and methods for dynamic flexible authentication in a cloud service | |
US8832787B1 (en) | Implementing single sign-on across a heterogeneous collection of client/server and web-based applications | |
CN105024819B (en) | A kind of multiple-factor authentication method and system based on mobile terminal | |
US7685631B1 (en) | Authentication of a server by a client to prevent fraudulent user interfaces | |
US9264420B2 (en) | Single sign-on for network applications | |
CN106453361B (en) | A kind of security protection method and system of the network information | |
US20090235345A1 (en) | Authentication system, authentication server apparatus, user apparatus and application server apparatus | |
CN112651011B (en) | Login verification method, device and equipment for operation and maintenance system and computer storage medium | |
CN112468481B (en) | Single-page and multi-page web application identity integrated authentication method based on CAS | |
CN106161348B (en) | Single sign-on method, system and terminal | |
JP2007310512A (en) | Communication system, service providing server, and user authentication server | |
CN106330816A (en) | Method and system for logging in cloud desktop | |
CN112580006A (en) | Access right control method and device of multi-cloud system and authentication server | |
US20160241536A1 (en) | System and methods for user authentication across multiple domains | |
CN108881309A (en) | Access method, device, electronic equipment and the readable storage medium storing program for executing of big data platform | |
CN111371725A (en) | Method for improving security of session mechanism, terminal equipment and storage medium | |
CN106453396A (en) | Double token account login method and login verification device | |
CN110313003A (en) | Authentication management method and system | |
CN108076077A (en) | A kind of conversation controlling method and device | |
CN109547481A (en) | A kind of website user's conversation managing method based on Redis ordered set and token mode | |
CN109067749A (en) | A kind of information processing method, equipment and computer readable storage medium | |
CN109905402B (en) | SSO login method and device based on SSL VPN | |
CN112929388B (en) | Network identity cross-device application rapid authentication method and system, and user agent device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |