CN110602076B - Identity using method, device and system based on master identity multiple authentication - Google Patents
Identity using method, device and system based on master identity multiple authentication Download PDFInfo
- Publication number
- CN110602076B CN110602076B CN201910823445.2A CN201910823445A CN110602076B CN 110602076 B CN110602076 B CN 110602076B CN 201910823445 A CN201910823445 A CN 201910823445A CN 110602076 B CN110602076 B CN 110602076B
- Authority
- CN
- China
- Prior art keywords
- identity
- application
- user
- certificate
- certification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 238000004590 computer program Methods 0.000 claims description 11
- 238000012795 verification Methods 0.000 claims description 7
- 239000000126 substance Substances 0.000 claims description 6
- 238000010586 diagram Methods 0.000 description 14
- 230000006870 function Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 4
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
Abstract
The invention discloses an identity using method, device and system based on master identity multiple authentication, and relates to the technical field of computers. One embodiment of the method comprises: receiving a usage request, wherein the usage request indicates an application to be used by a user and a primary identity of the user; determining an identity certificate associated with a primary identity of the user; and sending the identification of the user to the application so that the user uses the application according to the identification. According to the embodiment, the user does not need to switch the application identity for multiple times to log in different applications, so that the login efficiency is improved, and the user experience is improved.
Description
Technical Field
The invention relates to the technical field of computers, in particular to an identity using method, device and system based on master identity multiple authentication.
Background
With the development of computer technology, users can process different online services by using a plurality of applications with different functions.
In order to use the application function, a user needs to log in the application by using the corresponding application identity, and the application identities corresponding to different applications are generally different, so that the user needs to switch the application identities for multiple times to log in different applications when using different applications, which not only increases the workload of the user, but also reduces the logging efficiency, thereby reducing the user experience.
Disclosure of Invention
In view of this, embodiments of the present invention provide an identity using method, apparatus, and system based on multiple authentication of a master identity, which enable a user to use different applications by using the master identity, so as to improve login efficiency and improve user experience.
In order to achieve the above object, according to a first aspect of the embodiments of the present invention, there is provided an identity using method based on master identity multiple authentication, including:
receiving a usage request, wherein the usage request indicates an application to be used by a user and a primary identity of the user;
determining an identity certificate associated with a primary identity of the user;
and sending the identification of the user to the application so that the user uses the application according to the identification.
Optionally, the identity using method further includes: a certification authority that receives the application approval;
the sending the identification of the user to the application comprises:
sending the identification to the application that matches a certificate authority approved by the application.
Optionally, the identity using method further includes: and signing the identity certificate by using a first secret key, and sending the signed identity certificate to the application so that the application decrypts the identity certificate of the user by using a first public key corresponding to the first secret key.
According to a second aspect of the embodiments of the present invention, there is provided an identity using apparatus based on master identity multiple authentication, including: the system comprises a request receiving module, a certification determining module and a certification sending module; wherein the content of the first and second substances,
the request receiving module is used for receiving a use request, wherein the use request indicates an application to be used by a user and a main identity of the user;
the proof determination module is used for determining an identity proof associated with the primary identity of the user;
the certification sending module is used for sending the identity certification of the user to the application so that the user can use the application according to the identity certification.
Optionally, the certification sending module is configured to receive a certification authority approved by the application, and send the identity certification matching the certification authority approved by the application to the application.
Optionally, the certificate sending module is configured to sign the identity certificate with a first key, and send the signed identity certificate to the application, so that the application decrypts the identity certificate of the user by using a first public key corresponding to the first key.
According to a third aspect of the embodiments of the present invention, there is provided an identity using system based on master identity multiple authentication, including: an identity using device based on master identity multiple authentication according to the second aspect; wherein the content of the first and second substances,
and the application is used for verifying the identity certificate when receiving the identity certificate sent by the identity using device and determining the use authority of the user according to the identity certificate passing the verification.
Optionally, the application is configured to receive the signed identity, decrypt the signed identity using a first public key corresponding to the first secret key, and verify the decrypted identity.
According to a fourth aspect of the embodiments of the present invention, there is provided a server including:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of the first aspects above.
According to a fifth aspect of embodiments of the present invention, there is provided a computer readable medium having stored thereon a computer program which, when executed by a processor, performs the method of any one of the first aspect above.
One embodiment of the above invention has the following advantages or benefits: when a use request indicating an application to be used by a user and a user principal identity is received, the identity using device can determine an identity certificate associated with the principal identity of the user, and then sends the identity certificate associated with the principal identity to the application to be used, so that the user can use the application according to the principal identity and the identity certificate, and therefore the user does not need to switch the application identity for many times to log in different applications, login efficiency is improved, and user experience is improved.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
fig. 1 is a schematic diagram of a main flow of a method for identity usage based on master identity multiple authentication according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of an identity certificate associated with a master identity, according to an embodiment of the invention;
FIG. 3 is a schematic diagram of an application provisioning certification authority in accordance with an embodiment of the present invention;
FIG. 4 is a schematic diagram of the main modules of a master identity based identity management apparatus according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of a master identity based identity management system according to an embodiment of the present invention;
FIG. 6 is an exemplary system architecture diagram in which embodiments of the present invention may be employed;
fig. 7 is a schematic block diagram of a computer system suitable for use in implementing a terminal device or server of an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, in which various details of embodiments of the invention are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
As shown in fig. 1, an embodiment of the present invention provides an identity using method based on master identity multiple authentication, where the method may include the following steps S101 to S103:
step S101: receiving a usage request, wherein the usage request indicates an application to be used by a user and a home identity of the user.
Here, the user may be an organization having characteristics such as organization name and unified credit code. The user's primary identity is created for the user by the identity using device according to the user's registration request in advance.
Step S102: an identification associated with a primary identity of the user is determined.
The identity certificate of the user is generated by the authentication mechanism according to the authentication request of the user in advance, and when the identity use management device receives the returned identity certificate, the principal identity of the user is associated with the identity certificate to perform unified management on a plurality of identity certificates, for example, the identity certificate associated with the principal identity M of the user has a relationship diagram PA and an identity certificate PB, and the relationship diagram between the principal identity of the user and the identity certificate may be as shown in fig. 2, where the identity certificate PA is generated by the authentication mechanism a, and the identity certificate PB is generated by the authentication mechanism B.
When a use request is received, the identification associated with the primary identity is determined according to the primary identity of the user indicated in the use request, in this example, when the primary identity of the user indicated in the use request is M, the identification associated with the primary identity is determined to be PA and PB.
Step S103: and sending the identification of the user to the application so that the user uses the application according to the identification.
The identity using device can firstly receive the certification authority approved by the application, and after the identity certificate associated with the main identity is determined, only the identity certificate matched with the certification authority approved by the application can be sent to the application, so that the application can determine the use permission of the user corresponding to the main identity according to the identity certificate of the user.
For example, if the certification authority approved by the application to be used is certification authority a, the identity using apparatus transmits only the identification PA matching with certification authority a to the application to be used. Because the application can only provide service according to the identity certificate generated by the approved certification authority, the identity using device screens all the identity certificates related to the main identity of the user according to the certification authority approved by the application, and then only sends the identity certificate matched with the approved certification authority to the application, so that the application does not need to verify all the identity certificates of the user one by one, but only needs to verify the identity certificate sent by the approved certification authority, thereby being beneficial to improving the verification efficiency and further improving the user experience. And the identity using device is only responsible for sending the identity certificate of the user to the application, but not responsible for the identity verification of the user, so that the system is decoupled, the timeliness and the accuracy of the identity verification are improved, the application which is responsible for the identity verification is still the application to be used by the user, and the application determines the use permission of the user, so that the application has a highly autonomous permission, and the application is favorable for providing higher-quality service for the user.
It is worth mentioning that each application has its approved certification authority, each application may provide its approved certification authority to the identity use device in advance, and the identity use device may determine the certification authority approved by the application to be used when receiving the use request indicating the application to be used. In addition, each application 301 may also provide its own approved certificate authority to the trusted certificate authority 302, as shown in fig. 3, application a provides its own approved certificate authorities CA1 and CA2 to the trusted certificate authority, application B provides its approved certificate authority CA3 to the trusted certificate authority, and the trusted certificate authority may perform unified management on the certificate authorities provided by each application after receiving one or more certificate authorities provided by each application, for example, the trusted certificate authority may record the certificate authorities approved by each application in the form of a list in table 1 below, so as to quickly return the certificate authorities approved by the applications to be used by the user to the identity-using device when receiving a query of the identity-using device. By adopting the mode that the certification authority approved by the application is provided for the credible certification device, each application can independently maintain the credible certification device, and when the approved certification authority is changed, the certification authority can be efficiently fed back to the identity using device through the credible certification device.
TABLE 1
Applications of | Authentication mechanism for application approval |
A | CA1、CA2 |
B | CA3 |
In an embodiment of the present invention, the identity using method based on master identity multiple authentication further includes: and signing the identity certificate by using a first secret key, and sending the signed identity certificate to the application so that the application decrypts the identity certificate of the user by using a first public key corresponding to the first secret key. For example, the identity using apparatus executing the identity using method signs an identity certificate associated with an application to be used by using a first private key, so as to verify that a sender of the identity certificate to the application is the identity using apparatus, after the identity using apparatus sends the signed identity certificate to the application, the application may decrypt the identity certificate by using a first public key corresponding to the first private key, and then further verify the identity certificate, so as to ensure security of data transmission.
As shown in fig. 4, an embodiment of the present invention further provides an identity using apparatus 400 based on master identity multiple authentication, including: a request receiving module 401, a certification determining module 402, and a certification transmitting module 403; wherein the content of the first and second substances,
the request receiving module 401 is configured to receive a usage request, where the usage request indicates an application to be used by a user and a primary identity of the user;
the proof determination module 402 for determining an identity proof associated with a primary identity of the user;
the certificate sending module 403 is configured to send the identity certificate of the user to the application, so that the user uses the application according to the identity certificate.
In an embodiment of the present invention, the certification sending module 403 is configured to receive the certification authority approved by the application, and send the identity certification matching the certification authority approved by the application to the application.
In an embodiment of the present invention, the certificate sending module 403 is configured to sign the identity certificate with a first key, and send the signed identity certificate to the application, so that the application decrypts the identity certificate of the user using a first public key corresponding to the first key.
As shown in fig. 5, an embodiment of the present invention provides an identity using system 500 based on master identity multiple authentication, including: the identity using device 400 based on master identity multiple authentication according to the application 501 and any of the above embodiments; wherein the content of the first and second substances,
the application 501 is configured to verify the identity certificate when receiving the identity certificate sent by the identity using apparatus 400, and determine the usage right of the user according to the identity certificate that passes the verification.
When a user needs to use an application, the application to be used is triggered, the triggered application can output permission prompt information according to the triggering of the user, for example, if the permission prompt information is 'please input an identity certificate', the user can send a use request to an identity using device according to the permission prompt information, so that the identity using device sends an identity certificate associated with the main identity of the user to the application according to the use request, and the application can determine the use permission of the user according to the identity certificate.
In an embodiment of the present invention, the application 501 is configured to receive the signed identity certificate, decrypt the signed identity certificate by using a first public key corresponding to the first secret key, and verify the decrypted identity certificate.
The identity using device can also use the first secret key to sign the application identity of the user, then sends the signed application identity to the application, so that a sender who confirms the application identity to the application is the identity using device, after receiving the signed application identity, the application can use the first public key corresponding to the first secret key to decrypt the application identity of the user, and then further verify the application identity, thereby ensuring the security of data transmission.
An embodiment of the present invention further provides a server, including: one or more processors; a storage device for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the method of any of the above embodiments.
Embodiments of the present invention further provide a computer-readable medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method according to any of the above embodiments.
Fig. 6 illustrates an exemplary system architecture 600 of an identity usage method or identity usage device to which embodiments of the present invention may be applied.
As shown in fig. 6, the system architecture 600 may include terminal devices 601, 602, 603, a network 604, and a server 605. The network 604 serves to provide a medium for communication links between the terminal devices 601, 602, 603 and the server 605. Network 604 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
A user may use the terminal devices 601, 602, 603 to interact with the server 605 via the network 604 to receive or send messages or the like. The terminal devices 601, 602, 603 may have installed thereon various communication client applications, such as shopping applications, web browser applications, search applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 601, 602, 603 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 605 may be a server providing various services, such as a background management server (for example only) providing support for shopping websites browsed by users using the terminal devices 601, 602, 603. The backend management server may analyze and perform other processing on the received data such as the product information query request, and feed back a processing result (for example, target push information, product information — just an example) to the terminal device.
It should be noted that the identity using method provided by the embodiment of the present invention is generally executed by the server 605, and accordingly, the identity using apparatus is generally disposed in the server 605.
It should be understood that the number of terminal devices, networks, and servers in fig. 6 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 7, shown is a block diagram of a computer system 700 suitable for use with a terminal device implementing an embodiment of the present invention. The terminal device shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 7, the computer system 700 includes a Central Processing Unit (CPU)701, which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM 703, various programs and data necessary for the operation of the system 700 are also stored. The CPU 701, the ROM 702, and the RAM 703 are connected to each other via a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
In particular, according to the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 709, and/or installed from the removable medium 711. The computer program performs the above-described functions defined in the system of the present invention when executed by the Central Processing Unit (CPU) 701.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present invention may be implemented by software or hardware. The described modules may also be provided in a processor, which may be described as: a processor includes a request receiving module, a credential determining module, and a credential sending module. The names of these modules do not in some cases constitute a limitation on the module itself, and for example, the request receiving module may also be described as a "module that receives a use request".
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to comprise: receiving a usage request, wherein the usage request indicates an application to be used by a user and a primary identity of the user; determining an identity certificate associated with a primary identity of the user; and sending the identification of the user to the application so that the user uses the application according to the identification.
According to the technical scheme of the embodiment of the invention, when the use request indicating the application to be used by the user and the user principal identity is received, the identity using device can determine the identity certificate associated with the principal identity of the user, and then the identity certificate associated with the principal identity is sent to the application to be used, so that the user can use the application according to the principal identity and the identity certificate, and therefore, the user does not need to switch the application identity for many times to log in different applications, the login efficiency is improved, and the user experience is improved.
The above-described embodiments should not be construed as limiting the scope of the invention. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (6)
1. An identity using method based on master identity multiple authentication is characterized by comprising the following steps:
receiving a usage request, wherein the usage request indicates an application to be used by a user and a primary identity of the user;
determining an identity certificate associated with a primary identity of the user;
signing the identity certificate by using a first secret key, and sending the signed identity certificate to the application so that the application decrypts the identity certificate of the user by using a first public key corresponding to the first secret key;
a certification authority that receives the application approval;
the sending the identification of the user to the application comprises:
sending the identification to the application that matches a certificate authority approved by the application.
2. An identity using device based on master identity multiple authentication, comprising: the system comprises a request receiving module, a certification determining module and a certification sending module; wherein the content of the first and second substances,
the request receiving module is used for receiving a use request, wherein the use request indicates an application to be used by a user and a main identity of the user;
the proof determination module is used for determining an identity proof associated with the primary identity of the user;
the certificate sending module is configured to sign the identity certificate by using a first secret key, and send the signed identity certificate to the application, so that the application decrypts the identity certificate of the user by using a first public key corresponding to the first secret key;
the certification sending module is further used for receiving the certification authority approved by the application and sending the identity certification matched with the certification authority approved by the application to the application.
3. An identity using system based on master identity multiple authentication, comprising: application and identity using device based on master identity multiple authentication as claimed in claim 2; wherein the content of the first and second substances,
and the application is used for verifying the identity certificate when receiving the identity certificate sent by the identity using device and determining the use authority of the user according to the identity certificate passing the verification.
4. The identity usage system of claim 3,
the application is configured to receive the signed identity certificate, decrypt the signed identity certificate with a first public key corresponding to the first secret key, and verify the decrypted identity certificate.
5. A server, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of claim 1.
6. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of claim 1.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2019107533211 | 2019-08-15 | ||
CN201910753321 | 2019-08-15 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110602076A CN110602076A (en) | 2019-12-20 |
CN110602076B true CN110602076B (en) | 2021-11-26 |
Family
ID=68856971
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910823445.2A Active CN110602076B (en) | 2019-08-15 | 2019-09-02 | Identity using method, device and system based on master identity multiple authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110602076B (en) |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN2891503Y (en) * | 2006-04-26 | 2007-04-18 | 北京华科广通信息技术有限公司 | Security protection system for information system or equipment |
CN101217368A (en) * | 2007-12-29 | 2008-07-09 | 亿阳安全技术有限公司 | A network logging on system and the corresponding configuration method and methods for logging on the application system |
CN102882903B (en) * | 2011-07-12 | 2017-07-28 | 腾讯科技(深圳)有限公司 | A kind of many website application message acquisition methods and system |
US10033720B2 (en) * | 2014-05-28 | 2018-07-24 | Futurewei Technologies, Inc. | Method and system for creating a certificate to authenticate a user identity |
CN104506499B (en) * | 2014-12-11 | 2018-10-30 | 歌尔股份有限公司 | The method and device of single-sign-on application system |
CN105812334B (en) * | 2014-12-31 | 2019-02-05 | 北京华虹集成电路设计有限责任公司 | A kind of method for network authorization |
CN106709315B (en) * | 2015-11-13 | 2020-03-06 | 北京神州泰岳软件股份有限公司 | Login information verification method and device of application system |
CN107294916B (en) * | 2016-03-31 | 2019-10-08 | 北京神州泰岳软件股份有限公司 | Single-point logging method, single-sign-on terminal and single-node login system |
-
2019
- 2019-09-02 CN CN201910823445.2A patent/CN110602076B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN110602076A (en) | 2019-12-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111062024B (en) | Application login method and device | |
CN110611657A (en) | File stream processing method, device and system based on block chain | |
CN113347206A (en) | Network access method and device | |
CN110958119A (en) | Identity verification method and device | |
CN113193961B (en) | Digital certificate management method and device | |
CN111784887A (en) | Authorization releasing method, device and system for user access | |
CN113271296A (en) | Login authority management method and device | |
CN112131599A (en) | Method, device, equipment and computer readable medium for checking data | |
CN112039826A (en) | Login method and device applied to applet terminal | |
CN111814131A (en) | Method and device for equipment registration and configuration management | |
CN110247917B (en) | Method and apparatus for authenticating identity | |
CN112905990A (en) | Access method, client, server and access system | |
CN112489760B (en) | Prescription processing method and system based on distributed identity authentication | |
CN110751467B (en) | Digital currency generation method and system | |
CN111787044A (en) | Internet of things terminal platform | |
CN107707528B (en) | Method and device for isolating user information | |
CN112560003A (en) | User authority management method and device | |
CN110602076B (en) | Identity using method, device and system based on master identity multiple authentication | |
CN107547570B (en) | Data security service platform and data security transmission method | |
CN110602075A (en) | File stream processing method, device and system for encryption access control | |
CN112966286B (en) | Method, system, device and computer readable medium for user login | |
CN110602074B (en) | Service identity using method, device and system based on master-slave association | |
CN110611656B (en) | Identity management method, device and system based on master identity multiple mapping | |
CN110765445B (en) | Method and device for processing request | |
CN110557259A (en) | identity management method, device and system based on multiple identities |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |