CN109905402A - SSO login method and device based on SSL VPN - Google Patents

SSO login method and device based on SSL VPN Download PDF

Info

Publication number
CN109905402A
CN109905402A CN201910226942.4A CN201910226942A CN109905402A CN 109905402 A CN109905402 A CN 109905402A CN 201910226942 A CN201910226942 A CN 201910226942A CN 109905402 A CN109905402 A CN 109905402A
Authority
CN
China
Prior art keywords
sso
server
password
user terminal
ssl vpn
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910226942.4A
Other languages
Chinese (zh)
Other versions
CN109905402B (en
Inventor
李绍辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN201910226942.4A priority Critical patent/CN109905402B/en
Publication of CN109905402A publication Critical patent/CN109905402A/en
Application granted granted Critical
Publication of CN109905402B publication Critical patent/CN109905402B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The application is for a kind of SSO login method and device based on SSL VPN, applied in SSL vpn server, the described method includes: being verified after receiving the SSL VPN logging request for carrying username and password that user terminal is sent to the user name and the password;If the user name and the password establish ssl tunneling with the user terminal by verifying;To the SSO server transmission carrying user name, the SSO logging request of the address URL of the password and the SSL vpn server, so that after the SSO server determines the user name and the password by verifying, establish the global session between the user terminal, authorization token is created, and the authorization token is redirected to the address URL of the SSL vpn server.Using embodiments herein, the workload of configuration is reduced, promotes user experience.

Description

SSO login method and device based on SSL VPN
Technical field
This application involves network communication technology fields, are specifically designed a kind of based on Secure Socket Layer (Security Socket Layer, SSL) Virtual Private Network (Virtual Private Network, VPN) single-sign-on (Single Sign-On, SSO) login method and device.
Background technique
With developing for enterprise, headcount and management cost are continuously increased, and enterprise can generally set up the interior of oneself Portion's network, deployment multiple systems improve office efficiency, and currently used system includes office automation (Office Automation, OA) system, mailing system, attendance checking system, performance systems etc., each system is required to log in corresponding clothes It could be accessed after business device.If user needs when handling official business using multiple systems, it is necessary to the server of multiple systems is logged in, it is repeatedly defeated Access customer name and password are verified, and cumbersome operation is brought great inconvenience to users.
To solve the above-mentioned problems, SSO technology is introduced, user only needs to log in once, that is, passes through the clothes of a system It is engaged in after device verifying, when visiting again the server of other systems, it is no longer necessary to verify again.
Sometimes the user of enterprise, which goes on business or is in, is also required to handle official business, this just needs to dispose SSL vpn server, and SSL is A kind of safety data transmission standard used on internet, it transmits data using encryption technology on the internet, guarantees data It is not ravesdropping, is not modified;And VPN belongs to remote access technology, is briefly exactly to set up dedicated network using common network. User logs in SSL vpn server by public network, establishes ssl tunneling, and realization facilitates office as in enterprises, reads Mail, examination & approval etc..
The deployment of SSL vpn server, for the user in Intranet, directly login SSO server access is each A system.But for the user of public network, referring to FIG. 1, establishing SSL tunnel firstly the need of SSL vpn server is logged in Road, each system could be accessed by then logging in SSO server.Detailed process are as follows:
When user needs to log in SSL vpn server, the SSL VPN for carrying username and password is sent by user terminal Logging request, SSL vpn server verifies username and password, if being verified, establishing ssl tunneling and authorizing can be visited The system asked;If when OA system in the addressable system of user's access mandate, clicking the link of OA system to the clothes of OA system Business device sends access request, and the server of OA system detects that the user is not logged in, and jumps directly to SSO server, and will be certainly Oneself address uniform resource locator (Uniform Resource Locator, URL) is as parameter;SSO server detects When the user is not logged in, SSO login page is returned to user;User submits after SSO login page inputs username and password Logging request;SSO server authentication username and password creates the session between user if being verified, referred to as global Session, while creating authorization token;SSO server is redirected back to the address URL of the server of OA system with token;OA system Server take token after, it is whether effective to SSO server check token;After SSO server verifies token, return Effectively;The server of OA system uses the session of the token creation and user, and referred to as local session returns to the letter of user's access Breath.
In the above process, when SSL vpn server authorized user addressable system, needs to do some particular arrangements, than Such as, user name, password, the address URL, login interface parameter name and method name etc., and be for each support SSO System requires to configure, currently, can only be configured by technical staff, when supporting the quantity of system of SSO more, Jiu Hui great The big workload for increasing configuration, and allocative efficiency is lower, and accuracy is also poor;Also, this and user make in corporate intranet It is also not identical with mode, reduce user experience.
Summary of the invention
In view of this, the application provides a kind of SSO login method and device based on SSL VPN, to solve to greatly increase The workload of configuration, and allocative efficiency is lower, and accuracy is also poor, and the problem of reduction user experience.
Specifically, the application is achieved by the following technical solution:
A kind of SSO login method based on SSL VPN is applied in SSL vpn server, which comprises
After the SSL VPN logging request of carrying username and password for receiving user terminal transmission, to the user name It is verified with the password;
If the user name and the password establish ssl tunneling with the user terminal by verifying;
Send to SSO server the address URL for carrying the user name, the password and the SSL vpn server SSO logging request, so as to be established and the use after the SSO server determines the user name and the password by verifying Global session between the terminal of family creates authorization token, and the authorization token is redirected to the SSL vpn server The address URL.
A kind of SSO entering device based on SSL VPN is applied in SSL vpn server, and described device includes:
Authentication module, after receiving the SSL VPN logging request for carrying username and password that user terminal is sent, The user name and the password are verified;
Module is established, if establishing SSL tunnel with the user terminal by verifying for the user name and the password Road;
Sending module carries the user name, the password and SSL VPN service for sending to SSO server The SSO logging request of the address URL of device, so that after the SSO server determines the user name and the password by verifying, The global session between the user terminal is established, creates authorization token, and the authorization token is redirected to the SSL The address URL of vpn server.
By the above technical solution provided by the present application as it can be seen that SSL vpn server sent the user terminal received After username and password is verified, then ssl tunneling is established with user terminal, no longer needs to may have access to user terminal authorized user System, without carrying out relevant configuration, and then reduce the workload of configuration, also, this and user are in Intranet Usage mode be it is identical, the user experience is improved;Meanwhile SSL vpn server can be used as support SSO another be System directly initiates SSO logging request from trend SSO server, after waiting until that user accesses some system, by the clothes of the system Device of being engaged in initiates SSO logging request to SSO server again, can also be into so as to save the response time that user accesses system One step promotes user experience.
Detailed description of the invention
Fig. 1 be the application in the related technology public network user using SSL VPN carry out SSO login application scenarios schematic diagram;
Fig. 2 is a kind of flow chart of SSO login method based on SSL VPN shown in the application;
Fig. 3 is a kind of flow chart of SSO cancellation method based on SSL VPN shown in the application;
Fig. 4 is a kind of structural schematic diagram of SSO entering device based on SSL VPN shown in the application.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the application.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the application.
It is only to be not intended to be limiting the application merely for for the purpose of describing particular embodiments in term used in this application. It is also intended in the application and the "an" of singular used in the attached claims, " " and "the" including most shapes Formula, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein refers to and includes One or more associated any or all of project listed may combine.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the application A little information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not departing from In the case where the application range, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determination ".
To solve the above-mentioned problems, the embodiment of the invention provides a kind of SSO login methods based on SSL VPN, reduce The workload of configuration promotes user experience.Fig. 2 is referred to, Fig. 2 is that a kind of SSO based on SSL VPN shown in the application is logged in The flow chart of method is applied in SSL vpn server shown in Fig. 1.
S21: after the SSL VPN logging request of carrying username and password for receiving user terminal transmission, to user name It is verified with password.
When the user for being located at public network needs to access the system in Intranet, it is necessary first to initiate SSL VPN and step on Record request, and username and password is carried in the SSL VPN logging request, in order to which SSL vpn server is to the user Name and password are verified.
S22: if username and password establishes ssl tunneling with user terminal by verifying.
The system that subsequent user terminal can access Intranet by the ssl tunneling.
If username and password is unverified, unverified reason may be that username and password input error is made At, SSL VPN login page can be returned at this time, so that user re-enters username and password and verifies.
S23: it is asked to the SSO login of SSO server transmission carrying user name, the address URL of password and SSL vpn server It asks, so as to establish the global session between user terminal, creation after SSO server determines username and password by verifying Authorization token, and authorization token is redirected to the address URL of SSL vpn server.
If desired subsequent user accesses some system for supporting SSO, for example, access OA system, can directly pass through foundation Ssl tunneling to SSL vpn server send access OA system server access request, then by SSLVPN server by its It is transmitted to the server of OA system, the place of the process flow of the server of OA system and the server of OA system in the prior art Reason process be it is identical, no longer repeat one by one here.
By the above technical solution provided by the present application as it can be seen that SSL vpn server sent the user terminal received After username and password is verified, then ssl tunneling is established with user terminal, no longer needs to may have access to user terminal authorized user System, without carrying out relevant configuration, and then reduce the workload of configuration, also, this and user are in Intranet Usage mode be it is identical, the user experience is improved;Meanwhile SSL vpn server can be used as support SSO another be System directly initiates SSO logging request from trend SSO server, after waiting until that user accesses some system, by the clothes of the system Device of being engaged in initiates SSO logging request to SSO server again, can also be into so as to save the response time that user accesses system One step promotes user experience.
Specifically, sending the URL for carrying user name, password and SSL vpn server to SSO server in above-mentioned S23 The SSO logging request of address, realization process specifically include:
Pre-registered SSO is called to log in the address URL that Hook Function is redirected to SSO login page, SSO login page The address URL carry user name, password and SSL vpn server the address URL;
The address URL of SSO login page is sent to SSO server.
Hook Function can be logged in SSO registered in advance, when user needs SSO to log in, SSL vpn server is called directly The SSO logs in Hook Function and the address URL of user name, password and SSL vpn server is filled into SSO login page automatically In the address URL, it is then sent to SSO server.
A kind of process of SSO login method based on SSL VPN is described above, is described below a kind of based on SSL VPN SSO cancellation method, refer to Fig. 3, Fig. 3 is a kind of flow chart of SSO cancellation method based on SSL VPN, on the basis of Fig. 2 On further include:
S24: after the SSL VPN de-registration request for receiving user terminal transmission, the ssl tunneling established with user terminal is nullified With authorization token corresponding with user terminal.
After user has used system or connection time-out, user terminal can initiate SSL VPN to SSL vpn server Registration request, SSL vpn server directly nullify between the ssl tunneling between the user terminal set up and before The authorization token got, to realize that SSL VPN is nullified.
S25: the SSO de-registration request for carrying authorization token corresponding with user terminal is sent to SSO server, so that SSO Server nullifies authorization token corresponding with user terminal and session.
Simultaneously or after carrying out SSL VPN cancellation, SSO de-registration request can also be initiated from trend SSO server, and The corresponding authorization token of user terminal is carried in SSO de-registration request, since the authorization token is the creation of SSO server, because This, SSO server can determine corresponding session according to the authorization token, then nullify the authorization token and session, thus Realize that SSO is nullified.
Specifically, sending in above-mentioned S25 to SSO server carries the SSO note of authorization token corresponding with user terminal Pin request, realization process specifically include:
It calls pre-registered SSO to nullify Hook Function and is redirected to the address URL that SSO nullifies the page, SSO nullifies the page The address URL carry corresponding with user terminal authorization token;
The address URL that SSO nullifies the page is sent to SSO server.
Hook Function can be nullified with SSO registered in advance, when user needs SSO to nullify, SSL vpn server is called directly The SSO nullifies Hook Function and is automatically filled into authorization token corresponding with user terminal in the address URL of the SSO cancellation page, SSO server is then sent to so that SSO server can carry out the process of subsequent SSO cancellation.
Fig. 4 is referred to, Fig. 4 is a kind of structural schematic diagram of SSO entering device based on SSL VPN shown in the application, Applied in SSL vpn server, which includes:
Authentication module 41, the SSL VPN logging request of the carrying username and password for receiving user terminal transmission Afterwards, username and password is verified;
Module 42 is established, if establishing ssl tunneling with user terminal by verifying for username and password;
Sending module 43, for sending the address URL for carrying user name, password and SSL vpn server to SSO server SSO logging request so that SSO server determine username and password by verifying after, establish and user terminal between it is complete Office's session, creates authorization token, and authorization token is redirected to the address URL of SSL vpn server.
By the above technical solution provided by the present application as it can be seen that SSL vpn server sent the user terminal received After username and password is verified, then ssl tunneling is established with user terminal, no longer needs to may have access to user terminal authorized user System, without carrying out relevant configuration, and then reduce the workload of configuration, also, this and user are in Intranet Usage mode be it is identical, the user experience is improved;Meanwhile SSL vpn server can be used as support SSO another be System directly initiates SSO logging request from trend SSO server, after waiting until that user accesses some system, by the clothes of the system Device of being engaged in initiates SSO logging request to SSO server again, can also be into so as to save the response time that user accesses system One step promotes user experience.
A kind of optional embodiment, device further include return module, are used for:
If username and password is unverified, SSL VPN login page is returned.
Specifically, above-mentioned sending module, carries user name, password and SSL vpn server for sending to SSO server The address URL SSO logging request, be specifically used for:
Pre-registered SSO is called to log in the address URL that Hook Function is redirected to SSO login page, SSO login page The address URL carry user name, password and SSL vpn server the address URL;
The address URL of SSO login page is sent to SSO server.
A kind of optional embodiment, above-mentioned apparatus further include cancellation module, in which:
Cancellation module is nullified and is established with user terminal after receiving the SSL VPN de-registration request that user terminal is sent Ssl tunneling and authorization token corresponding with user terminal;
Sending module is also used to send the SSO cancellation for carrying authorization token corresponding with user terminal to SSO server and asks It asks, so that SSO server nullifies authorization token corresponding with user terminal and session.
Specifically, above-mentioned sending module, carries authorization token corresponding with user terminal for sending to SSO server SSO de-registration request, is specifically used for:
It calls pre-registered SSO to nullify Hook Function and is redirected to the address URL that SSO nullifies the page, SSO nullifies the page The address URL carry corresponding with user terminal authorization token;
The address URL that SSO nullifies the page is sent to SSO server.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual The purpose for needing to select some or all of the modules therein to realize application scheme.Those of ordinary skill in the art are not paying Out in the case where creative work, it can understand and implement.
The foregoing is merely the preferred embodiments of the application, not to limit the application, all essences in the application Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the application protection.

Claims (10)

1. a kind of single-sign-on SSO login method based on Secure Socket Layer SSL Virtual Private Network VPN is applied to SSL VPN In server, which is characterized in that the described method includes:
After the SSL VPN logging request of carrying username and password for receiving user terminal transmission, to the user name and institute Password is stated to be verified;
If the user name and the password establish ssl tunneling with the user terminal by verifying;
It is sent to SSO server and carries the user name, the uniform resource locator of the password and the SSL vpn server The SSO logging request of the address URL, so as to be established after the SSO server determines the user name and the password by verifying With the global session between the user terminal, authorization token is created, and the authorization token is redirected to the SSL VPN The address URL of server.
2. the method according to claim 1, wherein the method also includes:
If the user name and the password are unverified, SSL VPN login page is returned.
3. carrying the user name, described close the method according to claim 1, wherein sending to SSO server The SSO logging request of the address URL of code and the SSL vpn server, specifically includes:
Pre-registered SSO is called to log in the address URL that Hook Function is redirected to SSO login page, the SSO login page The address URL carry the address URL of the user name, the password and the SSL vpn server;
The address URL of the SSO login page is sent to the SSO server.
4. method according to claim 1 to 3, which is characterized in that the method also includes:
After receiving the SSL VPN de-registration request that the user terminal is sent, the ssl tunneling established with the user terminal is nullified With authorization token corresponding with the user terminal;
The SSO de-registration request for carrying authorization token corresponding with the user terminal is sent to SSO server, so that the SSO Server nullifies authorization token corresponding with the user terminal and session.
5. according to the method described in claim 4, being carried and the user terminal pair it is characterized in that, being sent to SSO server The SSO de-registration request for the authorization token answered, specifically includes:
It calls pre-registered SSO to nullify Hook Function and is redirected to the address URL that SSO nullifies the page, the SSO nullifies the page The address URL carry corresponding with user terminal authorization token;
The address URL that the SSO nullifies the page is sent to the SSO server.
6. a kind of SSO entering device based on SSL VPN is applied in SSL vpn server, which is characterized in that described device Include:
Authentication module, after receiving the SSL VPN logging request for carrying username and password that user terminal is sent, to institute It states user name and the password is verified;
Module is established, if establishing ssl tunneling with the user terminal by verifying for the user name and the password;
Sending module carries the user name, the password and the SSL vpn server for sending to SSO server The SSO logging request of the address URL, so as to be established after the SSO server determines the user name and the password by verifying With the global session between the user terminal, authorization token is created, and the authorization token is redirected to the SSL VPN The address URL of server.
7. device according to claim 6, which is characterized in that described device further includes return module, is used for:
If the user name and the password are unverified, SSL VPN login page is returned.
8. device according to claim 6, which is characterized in that the sending module is carried for sending to SSO server The user name, the password and the SSL vpn server the address URL SSO logging request, be specifically used for:
Pre-registered SSO is called to log in the address URL that Hook Function is redirected to SSO login page, the SSO login page The address URL carry the address URL of the user name, the password and the SSL vpn server;
The address URL of the SSO login page is sent to the SSO server.
9. according to device described in claim 6-8, which is characterized in that described device further includes cancellation module, in which:
The cancellation module is nullified and the user after receiving the SSL VPN de-registration request that the user terminal is sent The ssl tunneling and authorization token corresponding with the user terminal that terminal is established;
The sending module is also used to send the SSO note for carrying authorization token corresponding with the user terminal to SSO server Pin request, so that the SSO server nullifies authorization token corresponding with the user terminal and session.
10. device according to claim 9, which is characterized in that the sending module, for being taken to the transmission of SSO server The SSO de-registration request of band authorization token corresponding with the user terminal, is specifically used for:
It calls pre-registered SSO to nullify Hook Function and is redirected to the address URL that SSO nullifies the page, the SSO nullifies the page The address URL carry corresponding with user terminal authorization token;
The address URL that the SSO nullifies the page is sent to the SSO server.
CN201910226942.4A 2019-03-25 2019-03-25 SSO login method and device based on SSL VPN Active CN109905402B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910226942.4A CN109905402B (en) 2019-03-25 2019-03-25 SSO login method and device based on SSL VPN

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910226942.4A CN109905402B (en) 2019-03-25 2019-03-25 SSO login method and device based on SSL VPN

Publications (2)

Publication Number Publication Date
CN109905402A true CN109905402A (en) 2019-06-18
CN109905402B CN109905402B (en) 2021-03-23

Family

ID=66953812

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910226942.4A Active CN109905402B (en) 2019-03-25 2019-03-25 SSO login method and device based on SSL VPN

Country Status (1)

Country Link
CN (1) CN109905402B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110225050A (en) * 2019-06-20 2019-09-10 四川长虹电器股份有限公司 The management method of JWT token
CN110798456A (en) * 2019-10-22 2020-02-14 北京天融信网络安全技术有限公司 SSLVPN authentication method and intranet resource access and data acquisition method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012041654A1 (en) * 2010-09-30 2012-04-05 Siemens Aktiengesellschaft Method and system for secure data transmission with a vpn box
CN105407092A (en) * 2015-11-04 2016-03-16 北京汉柏科技有限公司 VPN user authentication method and device
CN106803822A (en) * 2015-11-26 2017-06-06 北京网御星云信息技术有限公司 The safety access method and device of network application
CN106941418A (en) * 2017-03-10 2017-07-11 杭州迪普科技股份有限公司 The synchronous method and device of SSL VPN configuration informations

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012041654A1 (en) * 2010-09-30 2012-04-05 Siemens Aktiengesellschaft Method and system for secure data transmission with a vpn box
CN105407092A (en) * 2015-11-04 2016-03-16 北京汉柏科技有限公司 VPN user authentication method and device
CN106803822A (en) * 2015-11-26 2017-06-06 北京网御星云信息技术有限公司 The safety access method and device of network application
CN106941418A (en) * 2017-03-10 2017-07-11 杭州迪普科技股份有限公司 The synchronous method and device of SSL VPN configuration informations

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110225050A (en) * 2019-06-20 2019-09-10 四川长虹电器股份有限公司 The management method of JWT token
CN110225050B (en) * 2019-06-20 2022-05-03 四川长虹电器股份有限公司 JWT token management method
CN110798456A (en) * 2019-10-22 2020-02-14 北京天融信网络安全技术有限公司 SSLVPN authentication method and intranet resource access and data acquisition method

Also Published As

Publication number Publication date
CN109905402B (en) 2021-03-23

Similar Documents

Publication Publication Date Title
CN109815656A (en) Login authentication method, device, equipment and computer readable storage medium
CN105162777B (en) A kind of wireless network login method and device
CN107404485B (en) Self-verification cloud connection method and system thereof
US20130185775A1 (en) Multi factor authentication
US20170118226A1 (en) Methods, Systems, Devices and Products for Error Correction in Computer Programs
CN103475726B (en) A kind of virtual desktop management, server and client side
CN112468481B (en) Single-page and multi-page web application identity integrated authentication method based on CAS
CN103581184B (en) The method and system of mobile terminal accessing corporate intranet server
CN103414684A (en) Single sign-on method and system
CN102984169A (en) Single sign-on method, equipment and system
CN111314340B (en) Authentication method and authentication platform
CN107172054A (en) A kind of purview certification method based on CAS, apparatus and system
CN105871881A (en) Portal authentication method based on Openwrt router
JP2007264835A (en) Authentication method and system
CN108111473A (en) Mixed cloud Explore of Unified Management Ideas, device and system
CN110958237A (en) Authority verification method and device
CN103986734B (en) Authentication management method and authentication management system applicable to high-security service system
JP2007310512A (en) Communication system, service providing server, and user authentication server
CN109388937B (en) Single sign-on method and sign-on system for multi-factor identity authentication
CN112235265A (en) System and method for external network to access project progress
CN110401641A (en) User authen method, device, electronic equipment
CN105429979A (en) Cross-platform user certificating method and intelligent router, Internet surfing system
WO2015131524A1 (en) Remote access server method and web server
CN112583834A (en) Method and device for single sign-on through gateway
CN108111486B (en) Method and device for avoiding repeated login

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant