CN109815656A - Login authentication method, device, equipment and computer readable storage medium - Google Patents

Login authentication method, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN109815656A
CN109815656A CN201811509574.6A CN201811509574A CN109815656A CN 109815656 A CN109815656 A CN 109815656A CN 201811509574 A CN201811509574 A CN 201811509574A CN 109815656 A CN109815656 A CN 109815656A
Authority
CN
China
Prior art keywords
user
authentication
logging
server
operation system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811509574.6A
Other languages
Chinese (zh)
Inventor
高梁梁
张鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811509574.6A priority Critical patent/CN109815656A/en
Publication of CN109815656A publication Critical patent/CN109815656A/en
Pending legal-status Critical Current

Links

Abstract

The invention belongs to technical field of safety protection, a kind of login authentication method, device, equipment and computer readable storage medium are provided, this method comprises: client judges whether the access request carries user's logging on authentication when receiving the operation system access request of user terminal transmission;If the access request does not carry user's logging on authentication, user terminal is redirected to Verification System login page and logged in by client;Server-side carries out login authentication to user terminal, certification by when create user's logging on authentication, and user's logging on authentication of creation is fed back into operation system;Server-side verifies user's logging on authentication verification request that operation system is initiated, and the corresponding User Identity of user's logging on authentication is back to operation system when verification passes through, and establishes session with user terminal so that operation system is based on User Identity.The present invention is capable of the operating process of the multiple operation systems of simplified access, saves user time, promotes user experience.

Description

Login authentication method, device, equipment and computer readable storage medium
Technical field
The present invention relates to technical field of safety protection more particularly to a kind of login authentication method, device, equipment and calculating Machine readable storage medium storing program for executing.
Background technique
With being growing for scope of the enterprise, enterprises can all have multiple operation systems to provide corresponding management kimonos Business, the correlation between business and business is also increasing, has close relationship between each operation system.Currently, for Information security considers that each individually operation system has security module, and user's processing is related to the business of multiple operation systems When, access each operation system require input username and password once logged in, this is cumbersome for a user And the time is expended, user experience is poor.
Summary of the invention
The main purpose of the present invention is to provide a kind of login authentication method, device, equipment and computer-readable storage mediums Matter, it is intended to which the operating process of the multiple operation systems of simplified access saves user time, promotes user experience.
To achieve the above object, the present invention provides a kind of login authentication method, and the login authentication method is applied to certification System, the Verification System include client and server-side, the login authentication method the following steps are included:
When receiving the operation system access request of user terminal transmission, the client judges that the access request is No carrying user's logging on authentication;
If the access request does not carry user's logging on authentication, the user terminal is redirected to institute by the client Verification System login page is stated to be logged in;
The server-side to the user terminal carry out login authentication, certification by when create user's logging on authentication, and will User's logging on authentication of creation feeds back to the operation system;
The server-side verifies user's logging on authentication verification request that the operation system is initiated, and is verifying By when the corresponding User Identity of user's logging on authentication is back to the operation system, for the business system System establishes session based on the User Identity and the user terminal.
Optionally, before the step of server-side carries out login authentication to the user terminal, comprising:
The client is by presetting the private key in rivest, shamir, adelman to the password in the user terminal log-on message It is encrypted, and User Identity, identifying code and the encrypted password in the log-on message is sent to the service End.
Optionally, the server-side includes: to the step of user terminal progress login authentication
The server-side obtains the User Identity according to the User Identity from predetermined directory server Corresponding identifying code, and the identifying code that will acquire is compared with the identifying code in the log-on message;
If the identifying code of the acquisition is consistent with the identifying code in the log-on message, by presetting asymmetric encryption Public key in algorithm verifies the encrypted password, and confirms that login authentication passes through when being verified.
Optionally, the server-side to the user terminal carry out login authentication, certification by when creation user log in After the step of card, further includes:
The mapping relations of user's logging on authentication and the User Identity that the server-side establishes creation are saved to slow In deposit data library;
The step of server-side verifies user's logging on authentication verification request that the operation system is initiated packet It includes:
The server-side judges in the cache database with the presence or absence of the use in user's logging on authentication verification request Family logging on authentication;
If sentencing in the cache database there are user's logging on authentication in user's logging on authentication verification request Whether the user's logging on authentication that user's logging on authentication verifies in request that breaks is expired;
If user's logging on authentication in user's logging on authentication verification request is not out of date, confirm that verification passes through.
Optionally, the server-side verifies user's logging on authentication verification request that the operation system is initiated, and The corresponding User Identity of user's logging on authentication is back to the operation system when verification passes through, for described Operation system was based on after the step of User Identity establishes session with the user terminal, comprising:
The mark of the operation system is added in the mapping relations by the server-side;
Monitor the state of the session;
When listening to the session timeout, the mark of the operation system is deleted from the mapping relations.
Optionally, it is described from the mark for deleting the operation system in the mapping relations the step of after, comprising:
The server-side judges the mark that whether there is other operation systems in the mapping relations;
If the mark of other operation systems is not present in the mapping relations, institute is deleted from the cache database State the mapping relations.
Optionally, described when receiving the operation system access request of user terminal transmission, described in the client judgement Whether access request carried after the step of user's logging on authentication, further includes:
If the access request carries user's logging on authentication, user's logging on authentication is sent to by the client The server-side is verified.
In addition, to achieve the above object, the present invention also provides login authentication device, the login authentication device includes:
Client judgment module, for judging the visit when receiving the operation system access request of user terminal transmission Ask whether request carries user's logging on authentication;
Client redirection module, if not carrying user's logging on authentication for the access request, by the user terminal The Verification System login page is redirected to be logged in;
Server side authentication module, for the user terminal carry out login authentication, certification by when creation user log in Voucher, and user's logging on authentication of creation is fed back into the operation system;
Server-side correction verification module, user's logging on authentication verification request for initiating the operation system verify, And the corresponding User Identity of user's logging on authentication is back to the operation system when verification passes through, for institute It states operation system and session is established with the user terminal based on User Identity foundation.
In addition, to achieve the above object, the present invention also provides a kind of login authentication equipment, the login authentication equipment packet It includes processor, memory and is stored in the login authentication program that can be executed on the memory and by the processor, Described in login authentication program when being executed by the processor, realize such as the step of above-mentioned login authentication method.
In addition, to achieve the above object, the present invention also provides a kind of computer readable storage medium, the computer can It reads to be stored with login authentication program on storage medium, wherein realizing when the login authentication program is executed by processor as above-mentioned Login authentication method the step of.
The present invention provides a kind of login authentication method, is applied to Verification System, which includes client and service End, when receiving the operation system access request of user terminal transmission, client first judges whether the access request carries user Logging on authentication, if the access request does not carry user's logging on authentication, user terminal is redirected to Verification System and stepped on by client if Record the page logged in, then server-side to user terminal carry out login authentication, certification by when create user's logging on authentication, And user's logging on authentication of creation is fed back into the operation system, final server-side logs in the user that the operation system is initiated Credential verification request is verified, and the corresponding User Identity of user's logging on authentication is back to this when verification passes through Operation system, so that the operation system is based on the User Identity and the user terminal establishes session, the present invention passes through Build Verification System, guarantee the information security of operation system, as long as and user carried out in Verification System it is primary It logs in, can directly access each operation system, require once to be logged in compared to each operation system of existing access Mode simplifies user's operation process, saves user time, promotes user experience.
Detailed description of the invention
Fig. 1 is the hardware structural diagram of login authentication equipment involved in the embodiment of the present invention;
Fig. 2 is the flow diagram of login authentication method first embodiment of the present invention;
Fig. 3 is the functional block diagram of login authentication device first embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to limit this hair It is bright.
The present embodiments relate to login authentication method be mainly used in login authentication equipment, the login authentication equipment It can be the equipment having data processing function such as personal computer (personal computer, PC), server.
Referring to Fig.1, Fig. 1 is the hardware structural diagram of login authentication equipment involved in the embodiment of the present invention.This In inventive embodiments, login authentication equipment may include (such as the central processing unit Central Processing of processor 1001 Unit, CPU), communication bus 1002, user interface 1003, network interface 1004, memory 1005.Wherein, communication bus 1002 for realizing the connection communication between these components;User interface 1003 may include display screen (Display), input Unit such as keyboard (Keyboard);Network interface 1004 optionally may include standard wireline interface and wireless interface (such as Wireless Fidelity WIreless-FIdelity, WI-FI interface);Memory 1005 can be high-speed random access memory (random access memory, RAM) is also possible to stable memory (non-volatile memory), such as magnetic Disk storage, memory 1005 optionally can also be the storage device independently of aforementioned processor 1001.Those skilled in the art Member may include more or more than illustrating it is appreciated that hardware configuration and do not constitute a limitation of the invention shown in Fig. 1 Few component perhaps combines certain components or different component layouts.
With continued reference to Fig. 1, the memory 1005 in Fig. 1 as a kind of computer storage medium may include operating system, Network communication module and login authentication program.In Fig. 1, processor 1001 can call what is stored in memory 1005 to step on Authentication procedure is recorded, and the login authentication method of various embodiments of the present invention offer is provided.
The embodiment of the invention provides a kind of login authentication methods.
It is the flow diagram of login authentication method first embodiment of the present invention referring to Fig. 2, Fig. 2.
In the present embodiment, the login authentication method is applied to Verification System, and the Verification System includes client kimonos Be engaged in end, the login authentication method the following steps are included:
Step S10, when receiving the operation system access request of user terminal transmission, the client judges the visit Ask whether request carries user's logging on authentication;
In the present embodiment, Verification System is built in advance, as enterprise operation system user (employee, business personnel, cooperation Partner) management system.The Verification System applies CAS (Central Authentication Service, central authentication clothes Business) technology.CAS is the frame of a set of single-sign-on (Single Sign On, abbreviation SSO), can realize login one using it Account can access the function of multiple related systems.In the present embodiment, Verification System include Client (client) and Server (server-side), wherein be deployed with a client in the operation system each registered in Verification System, visitor Family end is for handling access request;And server-side is then individually disposed, server-side is responsible for the certification work to user, server-side packet Include cache database.In the present embodiment, only Verification System can receive the security information such as user account and password, business system System does not provide logentry.
When user accesses operation system by user browser, that is, user terminal sends access request to operation system When, the client being deployed in operation system can then intercept the operation system access request, whether then judge the access request Carry user's logging on authentication token.If client determines that the access request does not carry user logging on authentication token, execute The user terminal is then redirected to the Verification System login page and logged in by step S20, the client;
In step S20, if client determines that the access request does not carry user logging on authentication token, illustrate the use Family end belongs to and first logs into without the certification of server-side, and user terminal is then redirected to the log in page of Verification System by client Face (mark for carrying the operation system of access), so that user logs in.In the present embodiment, it to reinforce safety, authenticates The login prompt frame of the system login page is except including that user account fills in item and further includes that identifying code is filled in addition to password fills in item , which is when user terminal is redirected to the login page of Verification System by client, simultaneously by server-side in-time generatin It is shown in the login page of Verification System, and the identifying code is also stored in LDAP Server (ldap directory clothes by server-side Business device) in.LDAP (Lightweight Directory Access Protocol) is that the catalogue based on TCP/IP agreement is visited Ask agreement, ldap directory service can effectively solve the problems, such as user account, it defines unified identity information database and connects Mouthful.In the present embodiment, user account of the user when Verification System is registered is also stored in ldap directory server.
Step S30, the server-side to the user terminal carry out login authentication, certification by when creation user log in Voucher, and user's logging on authentication of creation is fed back into the operation system;
When user Verification System the unified login page input user account (as User Identity), password and Logon informations such as identifying code and after submitting logging request, network interception and hacker attack, avoid user password from letting out in order to prevent Dew, client uses the rivest, shamir, adelman-elliptic curve made an appointment with server-side, in log-on message Password is encrypted, specifically:
If G is the reference point on elliptic curve, key pair is (dA, PA), and wherein dA is private key (client is held), PA It is public key (server-side is held), PA=dA*G;
It is as follows that client passes through the calculating process that the private key dA held is encrypted to obtain (r, s) to password e:
Choose random number k
Calculate r=e+x1, wherein (x1,y1)=k*G
Calculate s=(1+dA)-1*(k-r*dA)
Later, user account, identifying code and the encrypted password in log-on message are sent to service by client End, server-side retrieve the corresponding identifying code of the user according to user account, from ldap directory server, will be in log-on message Identifying code is compared with the identifying code retrieved from ldap directory server, if unanimously, server-side to logging request into Row certification, specifically, server-side is used and is tested with the elliptic curve that client has been made an appointment encrypted password Card, i.e., verify encrypted password using the public key held, process is as follows:
Calculate t=r+s;
Pass through the point (x on t and s calculated curve1,y1)=s*G+t*PA
R=x1+e is calculated again, then verifies whether R and r is consistent, if unanimously, showing to be verified, confirmation is authenticated Passing through, user logins successfully, and server-side creates the corresponding user's logging on authentication token of user terminal, and accessed based on user The mark of operation system, by the corresponding cookie of user's logging on authentication token write-in operation system, cookie is server-side The small text file being stored in operation system, that is, user's logging on authentication token is fed back to the operation system of user's access. In addition, user's logging on authentication is associated with user account also, establishes two after server-side creation user's logging on authentication token Mapping relations between person are stored in cache database, are also also stored in the time for creating user's logging on authentication token In cache database.
Step S40, the server-side verify user's logging on authentication verification request that the operation system is initiated, And the corresponding User Identity of user's logging on authentication is back to the operation system when verification passes through, for institute It states operation system and session is established based on the User Identity and the user terminal.
The operation system of user's access initiates the verification request of user's logging on authentication, client after obtaining user's logging on authentication End is firstly received verification request, and verification request is then sent to server-side and is verified.Server-side receives the verification Request verifies user's logging on authentication token in verification request, and specifically, server-side judges in cache database With the presence or absence of user's logging on authentication in user's logging on authentication verification request, if it is present judging user's logging on authentication Whether user's logging on authentication in verification request is expired, that is, the corresponding wound of user's logging on authentication is obtained from cache database It builds the time, then judges whether the time difference of the creation time and current time exceeds default effective time, this is default effective The case where duration is to cause a certain user's logging on authentication that can not nullify when preventing operation system abnormal end and set, can root According to actual conditions flexible setting.If the time difference of the creation time and current time is without departing from default effective time, server-side It can be determined that user's logging on authentication in the verification request of user's logging on authentication is not out of date, then verification passes through, and server-side is based on caching In database, mapping relations between user's logging on authentication token and User Identity, by token pairs of user's logging on authentication The user account answered is back to accessed operation system by client, which then according to the user account and uses Session is established at family end, and the operation system resource that user terminal is accessed is back to user terminal.If the creation time and current The time difference of time exceeds default effective time, and server-side can be determined that the user in the verification request of user's logging on authentication logs in Voucher is expired, then verifies and do not pass through, and user terminal is forbidden to access the operation system.
To be best understood from the present embodiment, citing is illustrated below.
User a accesses operation system 1 by user browser, if operation system 1 is used in entire operation system set What family accessed for the first time, then user a just without the login authentication Jing Guo server-side, just will not be carried in the access request of user a Token, client need for browser to be redirected to the login page of Verification System, so that user a carries out register, when User a is in logon informations such as the login page input account of Verification System, password, identifying codes and after submitting logging request, service End carries out login authentication to the logging request, and after certification passes through, and generates token and feeds back to operation system 1, later, business System 1 initiates token verification request, and client is firstly received verification request, and verification request is then sent to clothes Business end is verified, and server-side verifies token, and verification passes through, then the corresponding user account of token is passed through client End is back to operation system 1, and operation system 1 then establishes session according to the browser of the user account and user a.
As an implementation, after step slo, further includes:
If the access request carries user's logging on authentication, user's logging on authentication is sent to by the client The server-side is verified.
In this step, when user terminal sends access request to operation system, if being deployed in the client in operation system Judge that the access request carries user's logging on authentication token, illustrates the user by the login authentication of server-side, the user Have logged on success, it is only necessary to which user's logging on authentication token is sent to server-side and verified by client, server-side User's logging on authentication token is verified.Verification passes through, and server-side then believes the corresponding user of user's logging on authentication token Breath is back to operation system by client, and operation system then according to the corresponding user account of user's logging on authentication token and is used Session is established at family end.As long as can directly access each operation system by the above-mentioned means, user is once logged in, keep away Exempting from one operation system of every access once will be logged in and be verified, user need to only register an account can access it is each Operation system improves convenience.To be best understood from the embodiment, citing is illustrated below: when user A accesses business After system 1, operation system 2 is then accessed, then Portable belt token in the access request of user A access operation system 2, this When client token be sent to server-side verified, verification passes through, then passes through the corresponding user account of token Client is back to operation system 2, and operation system 2 then establishes session according to the user account and user browser, in this way, with Family A just directly accessible operation system 2.
The present embodiment provides a kind of login authentication methods, are applied to Verification System, which includes client kimonos Business end, when receiving the operation system access request of user terminal transmission, client first judges whether the access request carries use User terminal is redirected to Verification System if client if the access request does not carry user's logging on authentication by family logging on authentication Login page is logged in, then server-side to user terminal carry out login authentication, certification by when creation user log in Card, and user's logging on authentication of creation is fed back into the operation system, the user that final server-side initiates the operation system steps on Record credential verification request is verified, and is back to the corresponding User Identity of user's logging on authentication when verification passes through The operation system, so that the operation system is based on the User Identity and the user terminal establishes session, the present embodiment By building Verification System, guarantee the information security of operation system, as long as and user Verification System carry out It is primary to log in, each operation system can be directly accessed, requires once to be stepped on compared to the existing each operation system of access The mode of record simplifies user's operation process, saves user time, promotes user experience.
Further, the second embodiment of login authentication method of the present invention is proposed based on first embodiment.Login authentication side The difference of the first embodiment of the second embodiment and login authentication method of method is, after the step 40, may include:
The mark of the operation system is added in the mapping relations by step a1, the server-side;
In the present embodiment, after operation system and user terminal establish session, server-side can add the mark of operation system It adds in the mapping relations in cache database between user's logging on authentication and User Identity information.
Step a2 monitors the state of the session;
Later, server-side can monitor the state of the session.
Step a3 deletes the mark of the operation system when listening to the session timeout from the mapping relations Know.
When server-side listens to the session timeout, operation system has been likely to occur the abnormal conditions such as collapse, for business System information safety considers, the mark of the operation system can be deleted from the mapping relations, indicates user's logging on authentication for this No longer valid for operation system, user terminal needs to carry out login authentication in Verification System again when accessing the operation system.
Further, after the step a3, may include:
Step a4, the server-side judge the mark that whether there is other operation systems in the mapping relations;
Step a5, if the mark of other operation systems is not present in the mapping relations, from the cache database Delete the mapping relations.
User terminal is after accessing the operation system, if having accessed other operation systems, the user of the user terminal is logged in Also the mark of other operation systems can be added in the corresponding mapping relations of voucher, if user's logging on authentication pair of the user terminal Also the mark of other operation systems is not present in the mapping relations answered, that is, the corresponding mapping of user's logging on authentication of the user terminal Operation system in relationship is identified as sky, then the mapping relations is deleted from cache database, that is, delete the user terminal User's logging on authentication, when which accesses any one operation system all in Verification System re-start login authentication.
The present embodiment, for the operation system, is cancelled user terminal and is based in user terminal and the session timeout of operation system The access authority that user's logging on authentication generates needs log in Verification System again when user terminal accesses the operation system to recognize Card, in addition, can delete user from cache database when confirming that user's logging on authentication all fails to all operation systems and step on Voucher is recorded, ensure that the safety of operation system.
In addition, the embodiment of the present invention also provides a kind of login authentication device.
It is the functional block diagram of login authentication device first embodiment of the present invention referring to Fig. 3, Fig. 3.
In the present embodiment, the login authentication device includes:
Client judgment module 10, for when receiving the operation system access request of user terminal transmission, described in judgement Whether access request carries user's logging on authentication;
Client redirection module 20, if not carrying user's logging on authentication for the access request, by the user End is redirected to the Verification System login page and is logged in;
Server side authentication module 30, for the user terminal carry out login authentication, certification by when creation user step on Voucher is recorded, and user's logging on authentication of creation is fed back into the operation system;
Server-side correction verification module 40, user's logging on authentication verification request for initiating the operation system carry out school It tests, and the corresponding User Identity of user's logging on authentication is back to the operation system when verification passes through, for The operation system is based on the User Identity and the user terminal establishes session.
Wherein, each virtual functions module of above-mentioned login authentication device is stored in the storage of login authentication equipment shown in Fig. 1 It is functional for realizing the institute of login authentication program in device 1005;When each module is executed by processor 1001, so that business system The information security of system guaranteed, as long as and user once logged in Verification System, can directly access each business system System requires the mode once logged in compared to the existing each operation system of access, simplifies user's operation process, save User time has been saved, user experience is promoted.
Further, the login authentication device further include:
Client encrypting module, for being believed by presetting the private key in rivest, shamir, adelman and being logged in the user terminal Password in breath is encrypted, and User Identity, identifying code and the encrypted password in the log-on message are sent To the server-side.
Further, the server side authentication module 30 includes:
Server-side comparing unit, for obtaining the use from predetermined directory server according to the User Identity The corresponding identifying code of family identity, and the identifying code that will acquire is compared with the identifying code in the log-on message;
Server-side authentication unit, if the identifying code for the acquisition is consistent with the identifying code in the log-on message, The encrypted password is verified by presetting the public key in rivest, shamir, adelman, and the confirmation when being verified Login authentication passes through.
Further, the login authentication device further include:
Server-side establishes module, closes for establishing the mapping of user's logging on authentication and the User Identity of creation System saves into cache database;
The server-side correction verification module 40 includes:
The first judging unit of server-side, for judging in the cache database with the presence or absence of user's logging on authentication User's logging on authentication in verification request;
Server-side second judgment unit, if for there are user's logging on authentication verifications to ask in the cache database User's logging on authentication in asking then judges whether user's logging on authentication in user's logging on authentication verification request is expired;
Server-side confirmation unit, if user's logging on authentication in user's logging on authentication verification request is not out of date, Then confirm that verification passes through.
Further, the login authentication device further include:
Server-side adding module, for the mark of the operation system to be added in the mapping relations;
Server-side monitors module, for monitoring the state of the session;
The first removing module of server-side, for deleting institute from the mapping relations when listening to the session timeout State the mark of operation system.
Further, the login authentication device further include:
Server-side judgment module, the mark for judging to whether there is other operation systems in the mapping relations;
The second removing module of server-side, if the mark for other operation systems to be not present in the mapping relations, from The mapping relations are deleted in the cache database.
Further, the login authentication device further include:
Client sending module, if carrying user's logging on authentication for the access request, the client will be described User's logging on authentication is sent to the server-side and verifies.
Wherein, in above-mentioned login authentication device in the function realization and above-mentioned login authentication method embodiment of modules Each step is corresponding, and function and realization process no longer repeat one by one here.
In addition, the embodiment of the present invention also provides a kind of computer readable storage medium.
Login authentication program is stored on computer readable storage medium of the present invention, wherein the login authentication program quilt When processor executes, realize such as the step of above-mentioned login authentication method.
Wherein, login authentication program, which is performed realized method, can refer to each of login authentication method of the present invention Embodiment, details are not described herein again.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant be intended to it is non- It is exclusive to include, so that the process, method, article or the system that include a series of elements not only include those elements, It but also including other elements that are not explicitly listed, or further include for this process, method, article or system institute Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or system including the element.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but many situations It is lower the former be more preferably embodiment.Based on this understanding, technical solution of the present invention is substantially in other words to the prior art The part to contribute can be embodied in the form of software products, which is stored in as described above In one storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be Mobile phone, computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content, it is relevant to be applied directly or indirectly in other Technical field is included within the scope of the present invention.

Claims (10)

1. a kind of login authentication method, which is characterized in that the login authentication method is applied to Verification System, the Verification System Including client and server-side, the login authentication method the following steps are included:
When receiving the operation system access request of user terminal transmission, the client judges whether the access request carries User's logging on authentication;
If the access request does not carry user's logging on authentication, the user terminal is redirected to the certification by the client The system login page is logged in;
The server-side to the user terminal carry out login authentication, certification by when create user's logging on authentication, and will creation User's logging on authentication feed back to the operation system;
The server-side verifies user's logging on authentication verification request that the operation system is initiated, and when verification passes through The corresponding User Identity of user's logging on authentication is back to the operation system, so that the operation system is based on institute It states User Identity and the user terminal establishes session.
2. login authentication method as described in claim 1, which is characterized in that the server-side logs in the user terminal Before the step of certification, comprising:
The client carries out the password in the user terminal log-on message by presetting the private key in rivest, shamir, adelman Encryption, and User Identity, identifying code and the encrypted password in the log-on message are sent to the server-side.
3. login authentication method as claimed in claim 2, which is characterized in that the server-side logs in the user terminal The step of certification includes:
It is corresponding that the server-side obtains the User Identity according to the User Identity from predetermined directory server Identifying code, and the identifying code that will acquire is compared with the identifying code in the log-on message;
If the identifying code of the acquisition is consistent with the identifying code in the log-on message, by default rivest, shamir, adelman Public key the encrypted password is verified, and when being verified confirm login authentication pass through.
4. login authentication method as claimed in claim 3, which is characterized in that the server-side logs in the user terminal Certification, certification by when creation user's logging on authentication the step of after, further includes:
The mapping relations of user's logging on authentication and the User Identity that the server-side establishes creation are saved to caching number According in library;
The server-side verifies the step of request verifies to user's logging on authentication that the operation system is initiated
The server-side judges to step in the cache database with the presence or absence of the user in user's logging on authentication verification request Record voucher;
If in the cache database there are user's logging on authentication verification request in user's logging on authentication, judgement described in Whether user's logging on authentication in the verification request of user's logging on authentication is expired;
If user's logging on authentication in user's logging on authentication verification request is not out of date, confirm that verification passes through.
5. login authentication method as claimed in claim 4, which is characterized in that the server-side initiates the operation system The verification request of user's logging on authentication verifies, and when verification passes through by the corresponding user identity mark of user's logging on authentication Knowledge is back to the operation system, establishes session with the user terminal so that the operation system is based on the User Identity The step of after, comprising:
The mark of the operation system is added in the mapping relations by the server-side;
Monitor the state of the session;
When listening to the session timeout, the mark of the operation system is deleted from the mapping relations.
6. login authentication method as claimed in claim 5, which is characterized in that described to delete the industry from the mapping relations After the step of mark of business system, comprising:
The server-side judges the mark that whether there is other operation systems in the mapping relations;
If the mark of other operation systems is not present in the mapping relations, the mapping is deleted from the cache database Relationship.
7. login authentication method as described in claim 1, which is characterized in that whether the client judges the access request After the step of carrying user's logging on authentication, further includes:
If the access request carries user's logging on authentication, user's logging on authentication is sent to the clothes by the client Business end is verified.
8. a kind of login authentication device, which is characterized in that the login authentication device includes:
Client judgment module, for judging that the access is asked when receiving the operation system access request of user terminal transmission The no carrying user's logging on authentication of Seeking Truth;
Client redirection module resets the user terminal if not carrying user's logging on authentication for the access request It is logged in to the Verification System login page;
Server side authentication module, for the user terminal carry out login authentication, certification by when create user's logging on authentication, And user's logging on authentication of creation is fed back into the operation system;
Server-side correction verification module, user's logging on authentication verification request for initiating the operation system verify, and The corresponding User Identity of user's logging on authentication is back to the operation system when verification passes through, for the business System is based on User Identity foundation and establishes session with the user terminal.
9. a kind of login authentication equipment, which is characterized in that the login authentication equipment includes processor, memory and storage On the memory and the login authentication program that can be executed by the processor, wherein the login authentication program is by the place When managing device and executing, the step of realizing login authentication method as described in any one of claims 1 to 7.
10. a kind of computer readable storage medium, which is characterized in that be stored with login on the computer readable storage medium and recognize Program is demonstrate,proved, wherein realizing stepping on as described in any one of claims 1 to 7 when the login authentication program is executed by processor The step of recording authentication method.
CN201811509574.6A 2018-12-11 2018-12-11 Login authentication method, device, equipment and computer readable storage medium Pending CN109815656A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811509574.6A CN109815656A (en) 2018-12-11 2018-12-11 Login authentication method, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811509574.6A CN109815656A (en) 2018-12-11 2018-12-11 Login authentication method, device, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109815656A true CN109815656A (en) 2019-05-28

Family

ID=66602167

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811509574.6A Pending CN109815656A (en) 2018-12-11 2018-12-11 Login authentication method, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109815656A (en)

Cited By (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110247917A (en) * 2019-06-20 2019-09-17 北京百度网讯科技有限公司 Method and apparatus for authenticating identity
CN110335065A (en) * 2019-06-10 2019-10-15 平安科技(深圳)有限公司 Method of servicing, system, equipment and the storage medium of robot
CN110445768A (en) * 2019-07-18 2019-11-12 阿里巴巴集团控股有限公司 A kind of login method, device and electronic equipment
CN110582769A (en) * 2019-07-11 2019-12-17 深圳市鹰硕技术有限公司 single-account multi-identity login method, device, server and storage medium
CN110750765A (en) * 2019-09-27 2020-02-04 奇安信科技集团股份有限公司 Service system, front-end page control method thereof, computer device, and storage medium
CN110784450A (en) * 2019-09-24 2020-02-11 云深互联(北京)科技有限公司 Single sign-on method and device based on browser
CN110855640A (en) * 2019-10-30 2020-02-28 北京市天元网络技术股份有限公司 CAS-based login credential destruction method and device
CN111107063A (en) * 2019-12-04 2020-05-05 海南新软软件有限公司 Login method and device
CN111159673A (en) * 2019-12-31 2020-05-15 上海亿保健康管理有限公司 Identity information verification method, device and equipment
CN111182030A (en) * 2019-12-04 2020-05-19 北京健康之家科技有限公司 Network service execution method and device
CN111241504A (en) * 2020-01-16 2020-06-05 远景智能国际私人投资有限公司 Identity authentication method and device, electronic equipment and storage medium
CN111243715A (en) * 2019-12-23 2020-06-05 福建亿能达信息技术股份有限公司 Login method for unifying business system to integrated platform
CN111259363A (en) * 2020-01-19 2020-06-09 数字广东网络建设有限公司 Service access information processing method, system, device, equipment and storage medium
CN111447245A (en) * 2020-05-27 2020-07-24 杭州海康威视数字技术股份有限公司 Authentication method, authentication device, electronic equipment and server
CN111552936A (en) * 2020-04-26 2020-08-18 国电南瑞科技股份有限公司 Cross-system access right control method and system based on scheduling mechanism level
CN111698250A (en) * 2020-06-11 2020-09-22 腾讯科技(深圳)有限公司 Access request processing method and device, electronic equipment and computer storage medium
CN111865889A (en) * 2019-12-10 2020-10-30 北京嘀嘀无限科技发展有限公司 Login request processing method, system, device, electronic equipment and storage medium
CN112035810A (en) * 2020-08-19 2020-12-04 绿盟科技集团股份有限公司 Access control method, device, medium and equipment
CN112104625A (en) * 2020-09-03 2020-12-18 腾讯科技(深圳)有限公司 Process access control method and device
CN112165475A (en) * 2020-09-22 2021-01-01 成都知道创宇信息技术有限公司 Anti-crawler method, anti-crawler device, website server and readable storage medium
CN112398789A (en) * 2019-08-15 2021-02-23 奇安信安全技术(珠海)有限公司 Remote login control method, device, system, storage medium and electronic device
CN112417401A (en) * 2020-11-26 2021-02-26 深圳创维-Rgb电子有限公司 Account verification method, device and system and computer readable storage medium
CN112540917A (en) * 2020-12-03 2021-03-23 北京航天云路有限公司 Automatic login method for realizing automatic test based on token authentication mechanism
CN112559994A (en) * 2020-12-25 2021-03-26 北京百度网讯科技有限公司 Access control method, device, equipment and storage medium
CN112769754A (en) * 2020-12-18 2021-05-07 中国平安财产保险股份有限公司 Client access method, device, equipment and storage medium
CN112995219A (en) * 2021-05-06 2021-06-18 四川省明厚天信息技术股份有限公司 Single sign-on method, device, equipment and storage medium
CN113129526A (en) * 2020-12-08 2021-07-16 浙江口碑网络技术有限公司 Cabinet opening control method, server, computing device and computer storage medium
CN113132302A (en) * 2019-12-31 2021-07-16 北京懿医云科技有限公司 Login method and system
CN113259319A (en) * 2021-04-12 2021-08-13 顶象科技有限公司 Verification processing method and system
CN113395289A (en) * 2021-06-30 2021-09-14 北京奇艺世纪科技有限公司 Authentication method, authentication device, electronic equipment and storage medium
CN113434836A (en) * 2021-05-31 2021-09-24 深信服科技股份有限公司 Identity authentication method, device, equipment and medium
CN113542201A (en) * 2020-04-20 2021-10-22 上海云盾信息技术有限公司 Access control method and device for Internet service
CN113645239A (en) * 2021-08-10 2021-11-12 平安普惠企业管理有限公司 Application login method and device, user terminal and storage medium
CN113656787A (en) * 2021-08-12 2021-11-16 青岛海信智慧生活科技股份有限公司 Service providing device, terminal, authentication device, resource access method and system
CN113949534A (en) * 2021-09-22 2022-01-18 广东电网有限责任公司 Resource access method and device for information system, electronic equipment and storage medium
CN114039773A (en) * 2021-11-08 2022-02-11 北京天融信网络安全技术有限公司 Connection establishing method, device, equipment and computer readable storage medium
CN114124530A (en) * 2021-11-23 2022-03-01 中国银行股份有限公司 Automatic login method and device of cross-border matching system
CN114143053A (en) * 2021-11-24 2022-03-04 国云科技股份有限公司 Third-party service login method and device, terminal equipment and storage medium
CN114158046A (en) * 2021-12-30 2022-03-08 支付宝(杭州)信息技术有限公司 Method and device for realizing one-key login service
CN114258023A (en) * 2021-12-23 2022-03-29 深圳市创维软件有限公司 Mesh networking method, device, equipment and readable storage medium
CN114338223A (en) * 2022-01-14 2022-04-12 百果园技术(新加坡)有限公司 User authentication method, system, device, equipment and storage medium
CN114500031A (en) * 2022-01-21 2022-05-13 浙江惠瀜网络科技有限公司 System, method, electronic device and medium for obtaining BI report form based on single sign-on
CN114500097A (en) * 2022-03-03 2022-05-13 中国农业银行股份有限公司四川省分行 Verification mechanism based on single sign-on of Web system
CN114666160A (en) * 2022-04-26 2022-06-24 济南超级计算技术研究院 Jwt-based multi-system security unified authentication system and method
CN114666124A (en) * 2022-03-22 2022-06-24 通号智慧城市研究设计院有限公司 Business system login method, login device, electronic equipment and storage medium
CN114745145A (en) * 2021-01-07 2022-07-12 腾讯科技(深圳)有限公司 Business data access method, device and equipment and computer storage medium
CN115134144A (en) * 2022-06-28 2022-09-30 中国工商银行股份有限公司 Enterprise-level business system authentication method, device and system
CN116881877A (en) * 2023-07-11 2023-10-13 安徽泽悦信息科技有限公司 Data security protection method and system based on big data analysis technology

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102420836A (en) * 2012-01-12 2012-04-18 中国电子科技集团公司第十五研究所 Sign-on method and sign-on management system for service information system
CN105721502A (en) * 2016-04-11 2016-06-29 上海上实龙创智慧能源科技股份有限公司 Authorized access method for browser client and server
CN107770140A (en) * 2016-08-22 2018-03-06 南京中兴软件有限责任公司 A kind of single sign-on authentication method and device
CN108600203A (en) * 2018-04-11 2018-09-28 四川长虹电器股份有限公司 Secure Single Sign-on method based on Cookie and its unified certification service system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102420836A (en) * 2012-01-12 2012-04-18 中国电子科技集团公司第十五研究所 Sign-on method and sign-on management system for service information system
CN105721502A (en) * 2016-04-11 2016-06-29 上海上实龙创智慧能源科技股份有限公司 Authorized access method for browser client and server
CN107770140A (en) * 2016-08-22 2018-03-06 南京中兴软件有限责任公司 A kind of single sign-on authentication method and device
CN108600203A (en) * 2018-04-11 2018-09-28 四川长虹电器股份有限公司 Secure Single Sign-on method based on Cookie and its unified certification service system

Cited By (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110335065A (en) * 2019-06-10 2019-10-15 平安科技(深圳)有限公司 Method of servicing, system, equipment and the storage medium of robot
CN110335065B (en) * 2019-06-10 2023-06-20 平安科技(深圳)有限公司 Service method, system, equipment and storage medium of robot
CN110247917A (en) * 2019-06-20 2019-09-17 北京百度网讯科技有限公司 Method and apparatus for authenticating identity
CN110247917B (en) * 2019-06-20 2021-09-10 北京百度网讯科技有限公司 Method and apparatus for authenticating identity
CN110582769A (en) * 2019-07-11 2019-12-17 深圳市鹰硕技术有限公司 single-account multi-identity login method, device, server and storage medium
CN110445768A (en) * 2019-07-18 2019-11-12 阿里巴巴集团控股有限公司 A kind of login method, device and electronic equipment
CN110445768B (en) * 2019-07-18 2021-11-09 创新先进技术有限公司 Login method and device and electronic equipment
CN112398789A (en) * 2019-08-15 2021-02-23 奇安信安全技术(珠海)有限公司 Remote login control method, device, system, storage medium and electronic device
CN110784450A (en) * 2019-09-24 2020-02-11 云深互联(北京)科技有限公司 Single sign-on method and device based on browser
CN110750765A (en) * 2019-09-27 2020-02-04 奇安信科技集团股份有限公司 Service system, front-end page control method thereof, computer device, and storage medium
CN110855640A (en) * 2019-10-30 2020-02-28 北京市天元网络技术股份有限公司 CAS-based login credential destruction method and device
CN111107063A (en) * 2019-12-04 2020-05-05 海南新软软件有限公司 Login method and device
CN111182030A (en) * 2019-12-04 2020-05-19 北京健康之家科技有限公司 Network service execution method and device
CN111107063B (en) * 2019-12-04 2022-04-22 海南新软软件有限公司 Login method and device
CN111182030B (en) * 2019-12-04 2022-12-09 北京健康之家科技有限公司 Network service execution method and device
CN111865889B (en) * 2019-12-10 2022-08-26 北京嘀嘀无限科技发展有限公司 Login request processing method, system, device, electronic equipment and storage medium
CN111865889A (en) * 2019-12-10 2020-10-30 北京嘀嘀无限科技发展有限公司 Login request processing method, system, device, electronic equipment and storage medium
CN111243715A (en) * 2019-12-23 2020-06-05 福建亿能达信息技术股份有限公司 Login method for unifying business system to integrated platform
CN111159673B (en) * 2019-12-31 2022-09-02 海南老白健康科技有限公司 Identity information verification method, device and equipment
CN113132302A (en) * 2019-12-31 2021-07-16 北京懿医云科技有限公司 Login method and system
CN111159673A (en) * 2019-12-31 2020-05-15 上海亿保健康管理有限公司 Identity information verification method, device and equipment
CN111241504A (en) * 2020-01-16 2020-06-05 远景智能国际私人投资有限公司 Identity authentication method and device, electronic equipment and storage medium
CN111241504B (en) * 2020-01-16 2024-01-05 远景智能国际私人投资有限公司 Identity verification method, device, electronic equipment and storage medium
CN111259363A (en) * 2020-01-19 2020-06-09 数字广东网络建设有限公司 Service access information processing method, system, device, equipment and storage medium
CN113542201A (en) * 2020-04-20 2021-10-22 上海云盾信息技术有限公司 Access control method and device for Internet service
CN111552936B (en) * 2020-04-26 2022-10-14 国电南瑞科技股份有限公司 Cross-system access right control method and system based on scheduling mechanism level
CN111552936A (en) * 2020-04-26 2020-08-18 国电南瑞科技股份有限公司 Cross-system access right control method and system based on scheduling mechanism level
CN111447245A (en) * 2020-05-27 2020-07-24 杭州海康威视数字技术股份有限公司 Authentication method, authentication device, electronic equipment and server
CN111698250B (en) * 2020-06-11 2023-11-28 腾讯科技(深圳)有限公司 Access request processing method and device, electronic equipment and computer storage medium
CN111698250A (en) * 2020-06-11 2020-09-22 腾讯科技(深圳)有限公司 Access request processing method and device, electronic equipment and computer storage medium
CN112035810A (en) * 2020-08-19 2020-12-04 绿盟科技集团股份有限公司 Access control method, device, medium and equipment
CN112104625B (en) * 2020-09-03 2024-04-16 腾讯云计算(北京)有限责任公司 Process access control method and device
CN112104625A (en) * 2020-09-03 2020-12-18 腾讯科技(深圳)有限公司 Process access control method and device
CN112165475B (en) * 2020-09-22 2023-05-02 成都知道创宇信息技术有限公司 Anticreeper method, anticreeper device, web server, and readable storage medium
CN112165475A (en) * 2020-09-22 2021-01-01 成都知道创宇信息技术有限公司 Anti-crawler method, anti-crawler device, website server and readable storage medium
CN112417401A (en) * 2020-11-26 2021-02-26 深圳创维-Rgb电子有限公司 Account verification method, device and system and computer readable storage medium
CN112540917A (en) * 2020-12-03 2021-03-23 北京航天云路有限公司 Automatic login method for realizing automatic test based on token authentication mechanism
CN113129526A (en) * 2020-12-08 2021-07-16 浙江口碑网络技术有限公司 Cabinet opening control method, server, computing device and computer storage medium
CN112769754A (en) * 2020-12-18 2021-05-07 中国平安财产保险股份有限公司 Client access method, device, equipment and storage medium
CN112769754B (en) * 2020-12-18 2023-10-24 中国平安财产保险股份有限公司 Client access method, device, equipment and storage medium
CN112559994B (en) * 2020-12-25 2023-12-01 北京百度网讯科技有限公司 Access control method, device, equipment and storage medium
CN112559994A (en) * 2020-12-25 2021-03-26 北京百度网讯科技有限公司 Access control method, device, equipment and storage medium
CN114745145A (en) * 2021-01-07 2022-07-12 腾讯科技(深圳)有限公司 Business data access method, device and equipment and computer storage medium
CN113259319B (en) * 2021-04-12 2023-05-12 杭州顶象科技有限公司 Verification processing method and system
CN113259319A (en) * 2021-04-12 2021-08-13 顶象科技有限公司 Verification processing method and system
CN112995219A (en) * 2021-05-06 2021-06-18 四川省明厚天信息技术股份有限公司 Single sign-on method, device, equipment and storage medium
CN113434836A (en) * 2021-05-31 2021-09-24 深信服科技股份有限公司 Identity authentication method, device, equipment and medium
CN113395289A (en) * 2021-06-30 2021-09-14 北京奇艺世纪科技有限公司 Authentication method, authentication device, electronic equipment and storage medium
CN113645239B (en) * 2021-08-10 2022-10-28 平安普惠企业管理有限公司 Application login method and device, user terminal and storage medium
CN113645239A (en) * 2021-08-10 2021-11-12 平安普惠企业管理有限公司 Application login method and device, user terminal and storage medium
CN113656787B (en) * 2021-08-12 2023-10-27 青岛海信智慧生活科技股份有限公司 Service providing device, terminal, authentication device, resource access method and system
CN113656787A (en) * 2021-08-12 2021-11-16 青岛海信智慧生活科技股份有限公司 Service providing device, terminal, authentication device, resource access method and system
CN113949534A (en) * 2021-09-22 2022-01-18 广东电网有限责任公司 Resource access method and device for information system, electronic equipment and storage medium
CN114039773B (en) * 2021-11-08 2024-02-02 北京天融信网络安全技术有限公司 Connection establishment method, device, equipment and computer readable storage medium
CN114039773A (en) * 2021-11-08 2022-02-11 北京天融信网络安全技术有限公司 Connection establishing method, device, equipment and computer readable storage medium
CN114124530B (en) * 2021-11-23 2024-04-19 中国银行股份有限公司 Automatic login method and device of cross-border matching system
CN114124530A (en) * 2021-11-23 2022-03-01 中国银行股份有限公司 Automatic login method and device of cross-border matching system
CN114143053A (en) * 2021-11-24 2022-03-04 国云科技股份有限公司 Third-party service login method and device, terminal equipment and storage medium
CN114258023A (en) * 2021-12-23 2022-03-29 深圳市创维软件有限公司 Mesh networking method, device, equipment and readable storage medium
CN114258023B (en) * 2021-12-23 2024-01-09 深圳市创维软件有限公司 Mesh networking method, device, equipment and readable storage medium
CN114158046A (en) * 2021-12-30 2022-03-08 支付宝(杭州)信息技术有限公司 Method and device for realizing one-key login service
CN114158046B (en) * 2021-12-30 2024-04-23 支付宝(杭州)信息技术有限公司 Method and device for realizing one-key login service
CN114338223B (en) * 2022-01-14 2024-01-09 百果园技术(新加坡)有限公司 User authentication method, system, device, equipment and storage medium
CN114338223A (en) * 2022-01-14 2022-04-12 百果园技术(新加坡)有限公司 User authentication method, system, device, equipment and storage medium
CN114500031A (en) * 2022-01-21 2022-05-13 浙江惠瀜网络科技有限公司 System, method, electronic device and medium for obtaining BI report form based on single sign-on
CN114500097A (en) * 2022-03-03 2022-05-13 中国农业银行股份有限公司四川省分行 Verification mechanism based on single sign-on of Web system
CN114666124A (en) * 2022-03-22 2022-06-24 通号智慧城市研究设计院有限公司 Business system login method, login device, electronic equipment and storage medium
CN114666160A (en) * 2022-04-26 2022-06-24 济南超级计算技术研究院 Jwt-based multi-system security unified authentication system and method
CN115134144A (en) * 2022-06-28 2022-09-30 中国工商银行股份有限公司 Enterprise-level business system authentication method, device and system
CN116881877A (en) * 2023-07-11 2023-10-13 安徽泽悦信息科技有限公司 Data security protection method and system based on big data analysis technology
CN116881877B (en) * 2023-07-11 2024-03-22 山西星宇合创信息技术有限公司 Data security protection method and system based on big data analysis technology

Similar Documents

Publication Publication Date Title
CN109815656A (en) Login authentication method, device, equipment and computer readable storage medium
US10567391B2 (en) Graduated authentication in an identity management system
CA3059330C (en) Systems and methods for dynamic flexible authentication in a cloud service
US8832787B1 (en) Implementing single sign-on across a heterogeneous collection of client/server and web-based applications
CN105024819B (en) A kind of multiple-factor authentication method and system based on mobile terminal
US7685631B1 (en) Authentication of a server by a client to prevent fraudulent user interfaces
US9264420B2 (en) Single sign-on for network applications
CN106453361B (en) A kind of security protection method and system of the network information
US20090235345A1 (en) Authentication system, authentication server apparatus, user apparatus and application server apparatus
CN112651011B (en) Login verification method, device and equipment for operation and maintenance system and computer storage medium
CN112468481B (en) Single-page and multi-page web application identity integrated authentication method based on CAS
CN106161348B (en) Single sign-on method, system and terminal
JP2007310512A (en) Communication system, service providing server, and user authentication server
CN106330816A (en) Method and system for logging in cloud desktop
CN112580006A (en) Access right control method and device of multi-cloud system and authentication server
US20160241536A1 (en) System and methods for user authentication across multiple domains
CN108881309A (en) Access method, device, electronic equipment and the readable storage medium storing program for executing of big data platform
CN111371725A (en) Method for improving security of session mechanism, terminal equipment and storage medium
CN106453396A (en) Double token account login method and login verification device
CN110313003A (en) Authentication management method and system
CN108076077A (en) A kind of conversation controlling method and device
CN109547481A (en) A kind of website user's conversation managing method based on Redis ordered set and token mode
CN109067749A (en) A kind of information processing method, equipment and computer readable storage medium
CN109905402B (en) SSO login method and device based on SSL VPN
CN112929388B (en) Network identity cross-device application rapid authentication method and system, and user agent device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination