CN110602076B - Identity using method, device and system based on master identity multiple authentication - Google Patents

Identity using method, device and system based on master identity multiple authentication Download PDF

Info

Publication number
CN110602076B
CN110602076B CN201910823445.2A CN201910823445A CN110602076B CN 110602076 B CN110602076 B CN 110602076B CN 201910823445 A CN201910823445 A CN 201910823445A CN 110602076 B CN110602076 B CN 110602076B
Authority
CN
China
Prior art keywords
identity
application
user
certificate
certification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910823445.2A
Other languages
Chinese (zh)
Other versions
CN110602076A (en
Inventor
穆长春
狄刚
李红岗
钱友才
蒋国庆
彭枫
孙浩
赵新宇
黄烈明
王继伟
潘丽
赵欣
黄钦
黄超
张晓鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Digital Currency Institute of the Peoples Bank of China
Original Assignee
Digital Currency Institute of the Peoples Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digital Currency Institute of the Peoples Bank of China filed Critical Digital Currency Institute of the Peoples Bank of China
Publication of CN110602076A publication Critical patent/CN110602076A/en
Application granted granted Critical
Publication of CN110602076B publication Critical patent/CN110602076B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Abstract

The invention discloses an identity using method, device and system based on master identity multiple authentication, and relates to the technical field of computers. One embodiment of the method comprises: receiving a usage request, wherein the usage request indicates an application to be used by a user and a primary identity of the user; determining an identity certificate associated with a primary identity of the user; and sending the identification of the user to the application so that the user uses the application according to the identification. According to the embodiment, the user does not need to switch the application identity for multiple times to log in different applications, so that the login efficiency is improved, and the user experience is improved.

Description

Identity using method, device and system based on master identity multiple authentication
Technical Field
The invention relates to the technical field of computers, in particular to an identity using method, device and system based on master identity multiple authentication.
Background
With the development of computer technology, users can process different online services by using a plurality of applications with different functions.
In order to use the application function, a user needs to log in the application by using the corresponding application identity, and the application identities corresponding to different applications are generally different, so that the user needs to switch the application identities for multiple times to log in different applications when using different applications, which not only increases the workload of the user, but also reduces the logging efficiency, thereby reducing the user experience.
Disclosure of Invention
In view of this, embodiments of the present invention provide an identity using method, apparatus, and system based on multiple authentication of a master identity, which enable a user to use different applications by using the master identity, so as to improve login efficiency and improve user experience.
In order to achieve the above object, according to a first aspect of the embodiments of the present invention, there is provided an identity using method based on master identity multiple authentication, including:
receiving a usage request, wherein the usage request indicates an application to be used by a user and a primary identity of the user;
determining an identity certificate associated with a primary identity of the user;
and sending the identification of the user to the application so that the user uses the application according to the identification.
Optionally, the identity using method further includes: a certification authority that receives the application approval;
the sending the identification of the user to the application comprises:
sending the identification to the application that matches a certificate authority approved by the application.
Optionally, the identity using method further includes: and signing the identity certificate by using a first secret key, and sending the signed identity certificate to the application so that the application decrypts the identity certificate of the user by using a first public key corresponding to the first secret key.
According to a second aspect of the embodiments of the present invention, there is provided an identity using apparatus based on master identity multiple authentication, including: the system comprises a request receiving module, a certification determining module and a certification sending module; wherein the content of the first and second substances,
the request receiving module is used for receiving a use request, wherein the use request indicates an application to be used by a user and a main identity of the user;
the proof determination module is used for determining an identity proof associated with the primary identity of the user;
the certification sending module is used for sending the identity certification of the user to the application so that the user can use the application according to the identity certification.
Optionally, the certification sending module is configured to receive a certification authority approved by the application, and send the identity certification matching the certification authority approved by the application to the application.
Optionally, the certificate sending module is configured to sign the identity certificate with a first key, and send the signed identity certificate to the application, so that the application decrypts the identity certificate of the user by using a first public key corresponding to the first key.
According to a third aspect of the embodiments of the present invention, there is provided an identity using system based on master identity multiple authentication, including: an identity using device based on master identity multiple authentication according to the second aspect; wherein the content of the first and second substances,
and the application is used for verifying the identity certificate when receiving the identity certificate sent by the identity using device and determining the use authority of the user according to the identity certificate passing the verification.
Optionally, the application is configured to receive the signed identity, decrypt the signed identity using a first public key corresponding to the first secret key, and verify the decrypted identity.
According to a fourth aspect of the embodiments of the present invention, there is provided a server including:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of the first aspects above.
According to a fifth aspect of embodiments of the present invention, there is provided a computer readable medium having stored thereon a computer program which, when executed by a processor, performs the method of any one of the first aspect above.
One embodiment of the above invention has the following advantages or benefits: when a use request indicating an application to be used by a user and a user principal identity is received, the identity using device can determine an identity certificate associated with the principal identity of the user, and then sends the identity certificate associated with the principal identity to the application to be used, so that the user can use the application according to the principal identity and the identity certificate, and therefore the user does not need to switch the application identity for many times to log in different applications, login efficiency is improved, and user experience is improved.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
fig. 1 is a schematic diagram of a main flow of a method for identity usage based on master identity multiple authentication according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an identity certificate associated with a master identity, according to an embodiment of the invention;
FIG. 3 is a schematic diagram of an application provisioning certification authority in accordance with an embodiment of the present invention;
FIG. 4 is a schematic diagram of the main modules of a master identity based identity management apparatus according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of a master identity based identity management system according to an embodiment of the present invention;
FIG. 6 is an exemplary system architecture diagram in which embodiments of the present invention may be employed;
fig. 7 is a schematic block diagram of a computer system suitable for use in implementing a terminal device or server of an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, in which various details of embodiments of the invention are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
As shown in fig. 1, an embodiment of the present invention provides an identity using method based on master identity multiple authentication, where the method may include the following steps S101 to S103:
step S101: receiving a usage request, wherein the usage request indicates an application to be used by a user and a home identity of the user.
Here, the user may be an organization having characteristics such as organization name and unified credit code. The user's primary identity is created for the user by the identity using device according to the user's registration request in advance.
Step S102: an identification associated with a primary identity of the user is determined.
The identity certificate of the user is generated by the authentication mechanism according to the authentication request of the user in advance, and when the identity use management device receives the returned identity certificate, the principal identity of the user is associated with the identity certificate to perform unified management on a plurality of identity certificates, for example, the identity certificate associated with the principal identity M of the user has a relationship diagram PA and an identity certificate PB, and the relationship diagram between the principal identity of the user and the identity certificate may be as shown in fig. 2, where the identity certificate PA is generated by the authentication mechanism a, and the identity certificate PB is generated by the authentication mechanism B.
When a use request is received, the identification associated with the primary identity is determined according to the primary identity of the user indicated in the use request, in this example, when the primary identity of the user indicated in the use request is M, the identification associated with the primary identity is determined to be PA and PB.
Step S103: and sending the identification of the user to the application so that the user uses the application according to the identification.
The identity using device can firstly receive the certification authority approved by the application, and after the identity certificate associated with the main identity is determined, only the identity certificate matched with the certification authority approved by the application can be sent to the application, so that the application can determine the use permission of the user corresponding to the main identity according to the identity certificate of the user.
For example, if the certification authority approved by the application to be used is certification authority a, the identity using apparatus transmits only the identification PA matching with certification authority a to the application to be used. Because the application can only provide service according to the identity certificate generated by the approved certification authority, the identity using device screens all the identity certificates related to the main identity of the user according to the certification authority approved by the application, and then only sends the identity certificate matched with the approved certification authority to the application, so that the application does not need to verify all the identity certificates of the user one by one, but only needs to verify the identity certificate sent by the approved certification authority, thereby being beneficial to improving the verification efficiency and further improving the user experience. And the identity using device is only responsible for sending the identity certificate of the user to the application, but not responsible for the identity verification of the user, so that the system is decoupled, the timeliness and the accuracy of the identity verification are improved, the application which is responsible for the identity verification is still the application to be used by the user, and the application determines the use permission of the user, so that the application has a highly autonomous permission, and the application is favorable for providing higher-quality service for the user.
It is worth mentioning that each application has its approved certification authority, each application may provide its approved certification authority to the identity use device in advance, and the identity use device may determine the certification authority approved by the application to be used when receiving the use request indicating the application to be used. In addition, each application 301 may also provide its own approved certificate authority to the trusted certificate authority 302, as shown in fig. 3, application a provides its own approved certificate authorities CA1 and CA2 to the trusted certificate authority, application B provides its approved certificate authority CA3 to the trusted certificate authority, and the trusted certificate authority may perform unified management on the certificate authorities provided by each application after receiving one or more certificate authorities provided by each application, for example, the trusted certificate authority may record the certificate authorities approved by each application in the form of a list in table 1 below, so as to quickly return the certificate authorities approved by the applications to be used by the user to the identity-using device when receiving a query of the identity-using device. By adopting the mode that the certification authority approved by the application is provided for the credible certification device, each application can independently maintain the credible certification device, and when the approved certification authority is changed, the certification authority can be efficiently fed back to the identity using device through the credible certification device.
TABLE 1
Applications of Authentication mechanism for application approval
A CA1、CA2
B CA3
In an embodiment of the present invention, the identity using method based on master identity multiple authentication further includes: and signing the identity certificate by using a first secret key, and sending the signed identity certificate to the application so that the application decrypts the identity certificate of the user by using a first public key corresponding to the first secret key. For example, the identity using apparatus executing the identity using method signs an identity certificate associated with an application to be used by using a first private key, so as to verify that a sender of the identity certificate to the application is the identity using apparatus, after the identity using apparatus sends the signed identity certificate to the application, the application may decrypt the identity certificate by using a first public key corresponding to the first private key, and then further verify the identity certificate, so as to ensure security of data transmission.
As shown in fig. 4, an embodiment of the present invention further provides an identity using apparatus 400 based on master identity multiple authentication, including: a request receiving module 401, a certification determining module 402, and a certification transmitting module 403; wherein the content of the first and second substances,
the request receiving module 401 is configured to receive a usage request, where the usage request indicates an application to be used by a user and a primary identity of the user;
the proof determination module 402 for determining an identity proof associated with a primary identity of the user;
the certificate sending module 403 is configured to send the identity certificate of the user to the application, so that the user uses the application according to the identity certificate.
In an embodiment of the present invention, the certification sending module 403 is configured to receive the certification authority approved by the application, and send the identity certification matching the certification authority approved by the application to the application.
In an embodiment of the present invention, the certificate sending module 403 is configured to sign the identity certificate with a first key, and send the signed identity certificate to the application, so that the application decrypts the identity certificate of the user using a first public key corresponding to the first key.
As shown in fig. 5, an embodiment of the present invention provides an identity using system 500 based on master identity multiple authentication, including: the identity using device 400 based on master identity multiple authentication according to the application 501 and any of the above embodiments; wherein the content of the first and second substances,
the application 501 is configured to verify the identity certificate when receiving the identity certificate sent by the identity using apparatus 400, and determine the usage right of the user according to the identity certificate that passes the verification.
When a user needs to use an application, the application to be used is triggered, the triggered application can output permission prompt information according to the triggering of the user, for example, if the permission prompt information is 'please input an identity certificate', the user can send a use request to an identity using device according to the permission prompt information, so that the identity using device sends an identity certificate associated with the main identity of the user to the application according to the use request, and the application can determine the use permission of the user according to the identity certificate.
In an embodiment of the present invention, the application 501 is configured to receive the signed identity certificate, decrypt the signed identity certificate by using a first public key corresponding to the first secret key, and verify the decrypted identity certificate.
The identity using device can also use the first secret key to sign the application identity of the user, then sends the signed application identity to the application, so that a sender who confirms the application identity to the application is the identity using device, after receiving the signed application identity, the application can use the first public key corresponding to the first secret key to decrypt the application identity of the user, and then further verify the application identity, thereby ensuring the security of data transmission.
An embodiment of the present invention further provides a server, including: one or more processors; a storage device for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the method of any of the above embodiments.
Embodiments of the present invention further provide a computer-readable medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method according to any of the above embodiments.
Fig. 6 illustrates an exemplary system architecture 600 of an identity usage method or identity usage device to which embodiments of the present invention may be applied.
As shown in fig. 6, the system architecture 600 may include terminal devices 601, 602, 603, a network 604, and a server 605. The network 604 serves to provide a medium for communication links between the terminal devices 601, 602, 603 and the server 605. Network 604 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
A user may use the terminal devices 601, 602, 603 to interact with the server 605 via the network 604 to receive or send messages or the like. The terminal devices 601, 602, 603 may have installed thereon various communication client applications, such as shopping applications, web browser applications, search applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 601, 602, 603 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 605 may be a server providing various services, such as a background management server (for example only) providing support for shopping websites browsed by users using the terminal devices 601, 602, 603. The backend management server may analyze and perform other processing on the received data such as the product information query request, and feed back a processing result (for example, target push information, product information — just an example) to the terminal device.
It should be noted that the identity using method provided by the embodiment of the present invention is generally executed by the server 605, and accordingly, the identity using apparatus is generally disposed in the server 605.
It should be understood that the number of terminal devices, networks, and servers in fig. 6 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 7, shown is a block diagram of a computer system 700 suitable for use with a terminal device implementing an embodiment of the present invention. The terminal device shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 7, the computer system 700 includes a Central Processing Unit (CPU)701, which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data necessary for the operation of the system 700 are also stored. The CPU 701, the ROM 702, and the RAM 703 are connected to each other via a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
In particular, according to the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 709, and/or installed from the removable medium 711. The computer program performs the above-described functions defined in the system of the present invention when executed by the Central Processing Unit (CPU) 701.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present invention may be implemented by software or hardware. The described modules may also be provided in a processor, which may be described as: a processor includes a request receiving module, a credential determining module, and a credential sending module. The names of these modules do not in some cases constitute a limitation on the module itself, and for example, the request receiving module may also be described as a "module that receives a use request".
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to comprise: receiving a usage request, wherein the usage request indicates an application to be used by a user and a primary identity of the user; determining an identity certificate associated with a primary identity of the user; and sending the identification of the user to the application so that the user uses the application according to the identification.
According to the technical scheme of the embodiment of the invention, when the use request indicating the application to be used by the user and the user principal identity is received, the identity using device can determine the identity certificate associated with the principal identity of the user, and then the identity certificate associated with the principal identity is sent to the application to be used, so that the user can use the application according to the principal identity and the identity certificate, and therefore, the user does not need to switch the application identity for many times to log in different applications, the login efficiency is improved, and the user experience is improved.
The above-described embodiments should not be construed as limiting the scope of the invention. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (6)

1. An identity using method based on master identity multiple authentication is characterized by comprising the following steps:
receiving a usage request, wherein the usage request indicates an application to be used by a user and a primary identity of the user;
determining an identity certificate associated with a primary identity of the user;
signing the identity certificate by using a first secret key, and sending the signed identity certificate to the application so that the application decrypts the identity certificate of the user by using a first public key corresponding to the first secret key;
a certification authority that receives the application approval;
the sending the identification of the user to the application comprises:
sending the identification to the application that matches a certificate authority approved by the application.
2. An identity using device based on master identity multiple authentication, comprising: the system comprises a request receiving module, a certification determining module and a certification sending module; wherein the content of the first and second substances,
the request receiving module is used for receiving a use request, wherein the use request indicates an application to be used by a user and a main identity of the user;
the proof determination module is used for determining an identity proof associated with the primary identity of the user;
the certificate sending module is configured to sign the identity certificate by using a first secret key, and send the signed identity certificate to the application, so that the application decrypts the identity certificate of the user by using a first public key corresponding to the first secret key;
the certification sending module is further used for receiving the certification authority approved by the application and sending the identity certification matched with the certification authority approved by the application to the application.
3. An identity using system based on master identity multiple authentication, comprising: application and identity using device based on master identity multiple authentication as claimed in claim 2; wherein the content of the first and second substances,
and the application is used for verifying the identity certificate when receiving the identity certificate sent by the identity using device and determining the use authority of the user according to the identity certificate passing the verification.
4. The identity usage system of claim 3,
the application is configured to receive the signed identity certificate, decrypt the signed identity certificate with a first public key corresponding to the first secret key, and verify the decrypted identity certificate.
5. A server, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of claim 1.
6. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of claim 1.
CN201910823445.2A 2019-08-15 2019-09-02 Identity using method, device and system based on master identity multiple authentication Active CN110602076B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2019107533211 2019-08-15
CN201910753321 2019-08-15

Publications (2)

Publication Number Publication Date
CN110602076A CN110602076A (en) 2019-12-20
CN110602076B true CN110602076B (en) 2021-11-26

Family

ID=68856971

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910823445.2A Active CN110602076B (en) 2019-08-15 2019-09-02 Identity using method, device and system based on master identity multiple authentication

Country Status (1)

Country Link
CN (1) CN110602076B (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN2891503Y (en) * 2006-04-26 2007-04-18 北京华科广通信息技术有限公司 Security protection system for information system or equipment
CN101217368A (en) * 2007-12-29 2008-07-09 亿阳安全技术有限公司 A network logging on system and the corresponding configuration method and methods for logging on the application system
CN102882903B (en) * 2011-07-12 2017-07-28 腾讯科技(深圳)有限公司 A kind of many website application message acquisition methods and system
US10033720B2 (en) * 2014-05-28 2018-07-24 Futurewei Technologies, Inc. Method and system for creating a certificate to authenticate a user identity
CN104506499B (en) * 2014-12-11 2018-10-30 歌尔股份有限公司 The method and device of single-sign-on application system
CN105812334B (en) * 2014-12-31 2019-02-05 北京华虹集成电路设计有限责任公司 A kind of method for network authorization
CN106709315B (en) * 2015-11-13 2020-03-06 北京神州泰岳软件股份有限公司 Login information verification method and device of application system
CN107294916B (en) * 2016-03-31 2019-10-08 北京神州泰岳软件股份有限公司 Single-point logging method, single-sign-on terminal and single-node login system

Also Published As

Publication number Publication date
CN110602076A (en) 2019-12-20

Similar Documents

Publication Publication Date Title
CN111062024B (en) Application login method and device
CN110611657A (en) File stream processing method, device and system based on block chain
CN113347206A (en) Network access method and device
CN110958119A (en) Identity verification method and device
CN113193961B (en) Digital certificate management method and device
CN111784887A (en) Authorization releasing method, device and system for user access
CN113271296A (en) Login authority management method and device
CN112131599A (en) Method, device, equipment and computer readable medium for checking data
CN112039826A (en) Login method and device applied to applet terminal
CN111814131A (en) Method and device for equipment registration and configuration management
CN110247917B (en) Method and apparatus for authenticating identity
CN112905990A (en) Access method, client, server and access system
CN112489760B (en) Prescription processing method and system based on distributed identity authentication
CN110751467B (en) Digital currency generation method and system
CN111787044A (en) Internet of things terminal platform
CN107707528B (en) Method and device for isolating user information
CN112560003A (en) User authority management method and device
CN110602076B (en) Identity using method, device and system based on master identity multiple authentication
CN107547570B (en) Data security service platform and data security transmission method
CN110602075A (en) File stream processing method, device and system for encryption access control
CN112966286B (en) Method, system, device and computer readable medium for user login
CN110602074B (en) Service identity using method, device and system based on master-slave association
CN110611656B (en) Identity management method, device and system based on master identity multiple mapping
CN110765445B (en) Method and device for processing request
CN110557259A (en) identity management method, device and system based on multiple identities

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant