CN110768993B - RDP (remote desktop protocol) -based verification method and device - Google Patents
RDP (remote desktop protocol) -based verification method and device Download PDFInfo
- Publication number
- CN110768993B CN110768993B CN201911044650.5A CN201911044650A CN110768993B CN 110768993 B CN110768993 B CN 110768993B CN 201911044650 A CN201911044650 A CN 201911044650A CN 110768993 B CN110768993 B CN 110768993B
- Authority
- CN
- China
- Prior art keywords
- information
- dynamic library
- module
- connection
- connection module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/08—Protocols specially adapted for terminal emulation, e.g. Telnet
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a method and a device for checking an RDP (remote desktop protocol). The method comprises the following steps: storing the first information and second information corresponding to the target device in a session structure; acquiring a dynamic library by using the session structure according to the first information so as to determine a connection module in the dynamic library; and sending the second information to the connection module, and connecting the target equipment by using the connection module according to the first information so as to verify the second information. In the embodiment, the dynamic library is loaded by using the first information to determine the connection module in the dynamic library, the second information to be verified is sent to the connection module, the target device is connected by using the second information in the connection module, whether the second information is correct or not is determined according to the final connection result, the verification result is accurate, and the method is suitable for various devices and has strong universality.
Description
Technical Field
The invention relates to the technical field of network security, in particular to a checking method and a checking device based on an RDP (remote desktop protocol).
Background
RDP, Remote Desktop Protocol, is a multi-channel Protocol, which allows a user (client or "local computer") to connect to a computer (server or "Remote computer") providing microsoft terminal services. Most of Windows, Linux, FreeBSD and Mac OS X have corresponding clients. The server listens for data sent to the TCP 3389 port. The protocol is an extension of the multi-channel conferencing protocol t.120, an international standard promulgated by the international telecommunications union. The user can obtain the client through RDP, input information such as the user, name and password to connect with the target server, and in the process, the RDP protocol completes work such as password verification of the user and serial port initialization to log in the user.
The current bastion machine needs to verify a user name and a password when taking over a windows device, but the current bastion machine in the market basically adopts an avoiding mode to verify the password, for example, a telnet protocol is adopted, an agent is installed on a machine of a user, or other services (except RDP service) on the windows machine are utilized to verify the password.
However, in a bank or a more strict environment, since the agent cannot be installed on the client machine, the agent cannot be verified by installing the agent, and thus the method is not universal. While using telnet or other services for verification, the accuracy remains questionable and in most cases not allowed, for the first time, the protocol is a plain text protocol, exposing the username and password in the network, which is very insecure.
Disclosure of Invention
The embodiment of the invention aims to provide a checking method and a checking device based on an RDP (remote data protocol), which are used for solving the problem that a password checking method in the prior art is not universal.
In order to solve the technical problem, the embodiment of the invention adopts the following technical scheme: a checking method based on RDP protocol includes the following steps:
storing the first information and second information corresponding to the target device in a session structure;
acquiring a dynamic library by using the session structure according to the first information so as to determine a connection module in the dynamic library;
and sending the second information to the connection module, and connecting the target equipment by using the second information in the connection module so as to verify the second information.
Optionally, the first information includes one or more of the following: a dynamic library name and an address of the dynamic library;
the second information comprises one or more of the following: a username of the target device, a password of the target device, and an IP address of a host of the target device.
Optionally, before sending the second information to the connection module in the dynamic library, the method further includes: and assigning values to a plurality of first fields of the connection module in the dynamic library to complete the initialization of the connection module.
Optionally, before storing the first information and the second information in the session structure, the method further includes:
the first information is acquired, and second information corresponding to the target device is acquired.
Optionally, the connecting the target device by using the connection module according to the second information specifically includes:
calling a connection interface of the dynamic library;
sending the address of the connection module to the connection interface so that the connection interface is connected with the target device according to the second information in the connection module;
optionally, the verifying the second information specifically includes: if the connection interface is successfully connected with the target equipment, verifying that the second information is correct; and if the connection with the target equipment fails, verifying that the second information is wrong.
Optionally, when the connection with the target device fails and the second information is verified to be an error, the method further includes: and acquiring error reasons and displaying the error reasons.
In order to solve the above technical problem, an embodiment of the present invention provides a calibration apparatus based on an RDP protocol, including:
the storage module is used for storing the first information and second information corresponding to the target equipment into the session structure body;
the determining module is used for acquiring a dynamic library according to the first information by using the session structure body so as to determine a connecting module in the dynamic library;
and the verification module is used for sending the second information to the connection module and connecting the target equipment by using the second information in the connection module so as to verify the second information.
Optionally, the first information includes one or more of the following: a dynamic library name and an address of the dynamic library;
the second information comprises one or more of the following: a username of the target device, a password of the target device, and an IP address of a host of the target device.
Optionally, the system further includes an assignment module, configured to assign values to the first fields of the connection module, so as to complete initialization of the connection module.
Optionally, the verification apparatus further includes an obtaining module, configured to obtain the first information and obtain second information corresponding to the target device.
Optionally, when the verification module connects the target device by using the second information in the connection module, the verification module is specifically configured to: calling a connection interface of the dynamic library; and sending the address of the connection module to the connection interface so that the connection interface is connected with the target equipment according to the second information in the connection module.
Optionally, when the verification module verifies the second information, the verification module is specifically configured to: determining a connection result, and if the connection interface is successfully connected with the target equipment, verifying that the second information is correct; and if the connection with the target equipment fails, verifying that the second information is wrong.
Optionally, the verification apparatus further includes a display module, where the display module is configured to, when the connection with the target device fails and the second information is verified to be an error, the method further includes: and acquiring error reasons and displaying the error reasons.
The embodiment of the invention has the beneficial effects that: the method comprises the steps of loading a dynamic library by utilizing first information to determine a connection module in the dynamic library, sending second information to be verified to the connection module, connecting target equipment by utilizing the second information in the connection module, determining whether the second information is correct or not according to a final connection result, determining an accurate verification result, being applicable to various equipment and having strong universality.
Drawings
FIG. 1 is a flow chart of a verification method according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating the method of verifying according to another embodiment of the present invention;
fig. 3 is a block diagram of a verifying apparatus according to an embodiment of the present invention.
Detailed Description
Various aspects and features of the present application are described herein with reference to the drawings.
It will be understood that various modifications may be made to the embodiments of the present application. Accordingly, the foregoing description should not be construed as limiting, but merely as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the application.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the application and, together with a general description of the application given above and the detailed description of the embodiments given below, serve to explain the principles of the application.
These and other characteristics of the present application will become apparent from the following description of preferred forms of embodiment, given as non-limiting examples, with reference to the attached drawings.
It should also be understood that, although the present application has been described with reference to some specific examples, a person of skill in the art shall certainly be able to achieve many other equivalent forms of application, having the characteristics as set forth in the claims and hence all coming within the field of protection defined thereby.
The above and other aspects, features and advantages of the present application will become more apparent in view of the following detailed description when taken in conjunction with the accompanying drawings.
Specific embodiments of the present application are described hereinafter with reference to the accompanying drawings; however, it is to be understood that the disclosed embodiments are merely exemplary of the application, which can be embodied in various forms. Well-known and/or repeated functions and constructions are not described in detail to avoid obscuring the application of unnecessary or unnecessary detail. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present application in virtually any appropriately detailed structure.
The specification may use the phrases "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may each refer to one or more of the same or different embodiments in accordance with the application.
The embodiment of the present invention provides a verification method, where when a target device requests to connect to a target server or another terminal device to which the target device requests to connect, information of the target device needs to be verified, so that an execution subject of the embodiment of the present invention may be the target server or another terminal device to which the target device requests to connect. When verifying the information to be verified (second information) of the target device, the method specifically comprises the following steps: storing the first information and second information corresponding to the target device in a session structure; acquiring a dynamic library by using the session structure according to the first information so as to determine a connection module in the dynamic library; and sending the second information to the connection module, and connecting the target equipment by using the connection module according to the first information so as to verify the second information. In the embodiment, the dynamic library is loaded by using the first information to determine the connection module in the dynamic library, the second information to be verified is sent to the connection module, the target device is connected by using the second information in the connection module, whether the second information is correct or not is determined according to the final connection result, the verification result is accurate, and the method is suitable for various devices and has strong universality.
Another embodiment of the present invention provides a verification method, where an execution subject may be a target server to which a target device requests connection, or may be another terminal device to which the target device requests connection, as shown in fig. 1, and the method specifically includes the following steps:
step S101, storing the first information and second information corresponding to the target equipment into a session structure;
the session structure in this step is a structure of an xrdp session.
Wherein, the first information comprises one or more of the following: a dynamic library name and an address of the dynamic library; the second information comprises one or more of the following: a username, a password, and an IP address of the host.
In the step, the dynamic library is preset in the target server or the terminal device (the execution main body in this embodiment) that is requested to be connected in the specific implementation process, so that the execution main body itself can determine the name of the dynamic library and the address of the dynamic library, that is, the first information is obtained. And the second information is obtained by receiving the second information input by the target device.
Step S102, acquiring a dynamic library by using the session structure according to the first information to determine a connection module in the dynamic library;
in this embodiment, the dynamic library includes a plurality of modules with different functions, and includes a connection module for connecting to the target device, so that when the session structure loads the dynamic library according to the first information, the connection module can be determined from the plurality of modules in the dynamic library.
Step S103, sending the second information to the connection module, and connecting the target device by using the second information in the connection module to verify the second information.
In this step, after the connection module is determined, the second information may be sent to the connection module. After the connection module acquires the second information, the dynamic library can be actually connected with the target device, so that the second information can be verified according to the connection result.
In the embodiment, the dynamic library is loaded by using the first information to determine the connection module in the dynamic library, the second information to be verified is sent to the connection module, the second information in the connection module is used for connecting the target device, whether the second information is correct or not is determined according to the final connection result, the verification result is accurate, and the method is suitable for various devices and has strong universality.
Another embodiment of the present invention provides a verification method, as shown in fig. 2, including the following steps:
step S201, acquiring the first information, and acquiring the second information corresponding to the target device.
In the step, the dynamic library is preset in the target server or the terminal device (the execution main body in this embodiment) that is requested to be connected in the specific implementation process, so that the execution main body itself can determine the name of the dynamic library and the address of the dynamic library, that is, the first information is obtained. And the second information is obtained by receiving the second information input by the target device.
Step S202, storing the first information and the second information corresponding to the target equipment in a session structure; the session structure in this step is a structure of an xrdp session.
Step S203, acquiring a dynamic library by using the session structure according to the first information to determine a connection module in the dynamic library;
step S204, assigning values to a plurality of first fields of the connection module in the dynamic library to complete the initialization of the connection module;
in this step, after the dynamic library is obtained, the initialization interface of the connection module can be called to assign values to important fields in the connection module, so as to complete the initial initialization of the connection module.
Step S205, sending the second information to the connection module;
in this step, after the initialization of the connection module is completed, the interface of the session structure may be used to send the information, such as the user name, the password, and the IP address of the host, stored in the session structure to the connection module, so as to assign values to the corresponding fields in the connection module, and complete the final initialization of the connection module.
Step S206, calling a connection interface of the dynamic library; sending the address of the connection module to the connection interface so that the connection interface is connected with the target device according to the second information in the connection module; determining a connection result, and if the connection interface is successfully connected with the target equipment, verifying that the second information is correct; and if the connection with the target equipment fails, verifying that the second information is wrong.
Since there are several modules in the dynamic library, each module stores information (i.e. second information) to be verified of different terminal devices, the module in which the second information of the terminal device is stored needs to be known when the connection interface wants to connect to a certain terminal device. Therefore, in this step, after the connection module completes the final initialization, the connection interface of the dynamic library may be called, and then the address of the connection module is sent to the connection interface, so that the connection interface may search the connection module according to the address of the connection module, obtain the second information in the connection module, and then connect the target device according to the second information to verify the second information.
Preferably, in this embodiment, when the connection between the connection module and the target device fails and the second information is verified to be an error, the method further includes: and acquiring error reasons and displaying the error reasons. The error reasons include: unreachable IP, wrong password, wrong username, etc. Through the display of the error information, the user can clearly know the details of the error.
In this embodiment, the session structure and the dynamic library are both based on the RDP protocol, so that when verifying the to-be-verified information of the target device, the target device is connected by using the connection interface of the dynamic library in the RDP protocol only by depending on the RDP protocol, thereby verifying the to-be-verified information (i.e., the second information) of the target device. Therefore, during verification, the verification of the user name and the password of the windows can be completed without using other services except the RDP service.
Meanwhile, in the implementation of the invention, the connection interface of the dynamic library is called, the connection interface is utilized to connect the target equipment according to the second information in the connection module, and whether the second information is correct or not is determined according to the final connection result, so that the verification result is accurate and the method is suitable for various terminal equipment.
Another embodiment of the present invention provides a calibration apparatus, as shown in fig. 3, including:
the storage module 1 is used for storing the first information and the second information corresponding to the target equipment into the session structure;
the determining module 2 is used for acquiring a dynamic library according to the first information by using the session structure body so as to determine a connecting module in the dynamic library;
and the checking module 3 is configured to send the second information to the connection module, and connect the target device with the second information in the connection module to check the second information.
In a specific implementation process of this embodiment, the first information includes one or more of the following: a dynamic library name and an address of the dynamic library; the second information comprises one or more of the following: a user name of the target device, a password of the target device and an IP address of a host of the target device;
in a specific implementation process of this embodiment, when the verification module connects to the target device by using the second information in the connection module, the verification module is specifically configured to: calling a connection interface of the dynamic library; and sending the address of the connection module to the connection interface so that the connection interface is connected with the target equipment according to the second information in the connection module.
Specifically, when the verification module verifies the second information, the verification module is specifically configured to: determining a connection result, and if the connection interface is successfully connected with the target equipment, verifying that the second information is correct; and if the connection with the target equipment fails, verifying that the second information is wrong.
Specifically, the verification apparatus in this embodiment further includes an assignment module, where the assignment module is configured to assign values to the first fields of the connection module, so as to complete initialization of the connection module.
Specifically, the verification apparatus in this embodiment further includes an obtaining module, configured to obtain the first information and obtain second information corresponding to the target device.
Specifically, the verification device in this embodiment further includes a display module, where the display module is configured to obtain a cause of the error and display the cause of the error when the connection with the target device fails and the second information is verified to be an error. The user can then know the details of the error, such as: an unreachable IP address, a password error, or a username error, etc.
The verification device in the implementation of the invention determines the connection module in the dynamic library by loading the dynamic library by using the first information, sends the second information to be verified to the connection module, connects the target equipment by using the second information in the connection module, determines whether the second information is correct or not according to the final connection result, has accurate verification result, is suitable for various equipment, and has strong universality.
When the verification device in this embodiment performs verification, the flow is as follows:
1. using information such as user name, password, IP and dynamic library path to be checked as input parameters;
2. storing the information (namely, the input parameters) needing to be verified into an xrdp session structure (namely, a session structure) to complete initialization of the session structure;
3. calling a session initialization interface of the first-stage session structure body to complete loading of the dynamic library according to the address of the dynamic library, then calling an initialization interface of a connection module in the dynamic library to assign values to important fields in the connection module to complete initial initialization of the connection module;
4. judging whether the initialization of the session structure body and the initial initialization of the connection module are successful or not, and if not, directly ending the process; if successful, go to step 5.
5. Calling a second-stage session initialization interface, assigning the user name, the password, the host IP and the like stored in the session structure body (xrdp session) to corresponding fields of the connection module, and finishing the final initialization of the connection module;
6. judging whether the final initialization of the connection module is successful or not, and if not, directly ending the initialization; if successful, go to step 7.
7. Calling a connection interface of the dynamic library, wherein the interface has completed initialization in the first part, and the interface takes the address (pointer) of the connection module which has been initialized before as an incoming parameter to actually connect with a target server (or target device);
8. if the connection interface of the dynamic library is successfully connected with the target server (or the target equipment), judging that the verification is successful, and if the verification is successful, finishing; if the connection between the connection interface of the dynamic library and the target server (or the target device) is unsuccessful, the verification is judged to be unsuccessful, and the error reason can be obtained according to the returned error code. The error reasons include unreachable IP, wrong password and the like.
The embodiment of the invention has the following beneficial effects: the invention has the following beneficial effects: password verification can be carried out based on an RDP (remote data protocol), even in a bank or other stricter environments, the password verification can be carried out, and the situation that the agent cannot be installed on the target server or telnet is not allowed to be used can be avoided; in addition, password verification based on RDP protocol can improve verification accuracy
In the embodiment of the invention, the password verification is carried out based on the RDP protocol, and the password verification of the user name of the windows can be completed only by depending on the RDP protocol and without depending on other services except RDP services.
In the implementation of the invention, the password verification is carried out based on the RDP protocol, and the password verification is obtained by encryption, which is safer than other plaintext obtaining protocols such as telnet protocol.
The above embodiments are only exemplary embodiments of the present invention, and are not intended to limit the present invention, and the scope of the present invention is defined by the claims. Various modifications and equivalents may be made by those skilled in the art within the spirit and scope of the present invention, and such modifications and equivalents should also be considered as falling within the scope of the present invention.
Claims (10)
1. A checking method based on RDP protocol is characterized in that when agent cannot be installed on a target server or telnet is not allowed to be used, the method comprises the following steps:
storing the first information and second information corresponding to the target device in a session structure;
acquiring a dynamic library by using the session structure according to the first information so as to determine a connection module in the dynamic library;
and sending the second information to the connection module, and connecting the target equipment by using the second information in the connection module so as to verify the second information.
2. The method of claim 1, wherein the first information comprises one or more of: a dynamic library name and an address of the dynamic library;
the second information comprises one or more of the following: a username of the target device, a password of the target device, and an IP address of a host of the target device.
3. The verification method of claim 1, wherein prior to sending the second information to the connection module in the dynamic library, the method further comprises: and assigning values to a plurality of first fields of the connection module in the dynamic library to complete the initialization of the connection module.
4. The method of claim 1, wherein prior to storing the first information and the second information in the session structure, the method further comprises:
the first information is acquired, and second information corresponding to the target device is acquired.
5. The verification method according to claim 1, wherein the connecting, by using the connection module, the target device according to the second information specifically includes:
calling a connection interface of the dynamic library;
and sending the address of the connection module to the connection interface so that the connection interface is connected with the target equipment according to the second information in the connection module.
6. The verification method according to claim 5, wherein the verifying the second information specifically includes: determining a connection result, and if the connection interface is successfully connected with the target equipment, verifying that the second information is correct; and if the connection with the target equipment fails, verifying that the second information is wrong.
7. The verification method of claim 6, wherein upon a connection failure with the target device verifying that the second information is an error, the method further comprises: and acquiring error reasons and displaying the error reasons.
8. A verification apparatus, when an agent cannot be installed on a target server or telnet is not allowed to be used, comprising:
the storage module is used for storing the first information and second information corresponding to the target equipment into the session structure body;
the determining module is used for acquiring a dynamic library according to the first information by using the session structure body so as to determine a connecting module in the dynamic library;
and the checking module is used for sending the second information to the connecting module and connecting the target equipment by using the second information in the connecting module so as to check the second information.
9. The apparatus of claim 8, wherein the first information comprises one or more of: a dynamic library name and an address of the dynamic library;
the second information comprises one or more of the following: a username of the target device, a password of the target device, and an IP address of a host of the target device.
10. The apparatus of claim 8, further comprising an assignment module configured to assign values to a number of first fields of the connection module to complete initialization of the connection module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911044650.5A CN110768993B (en) | 2019-10-30 | 2019-10-30 | RDP (remote desktop protocol) -based verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911044650.5A CN110768993B (en) | 2019-10-30 | 2019-10-30 | RDP (remote desktop protocol) -based verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110768993A CN110768993A (en) | 2020-02-07 |
CN110768993B true CN110768993B (en) | 2022-03-11 |
Family
ID=69333146
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911044650.5A Active CN110768993B (en) | 2019-10-30 | 2019-10-30 | RDP (remote desktop protocol) -based verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110768993B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101909061A (en) * | 2010-08-06 | 2010-12-08 | 福建升腾资讯有限公司 | Creation and application method of dynamic virtual channel based on remote display protocol |
CN104811455A (en) * | 2015-05-18 | 2015-07-29 | 成都卫士通信息产业股份有限公司 | Cloud computing identity authentication method |
CN105282095A (en) * | 2014-06-18 | 2016-01-27 | 中兴通讯股份有限公司 | Login verification method and device of virtual desktop |
CN106060029A (en) * | 2016-05-24 | 2016-10-26 | 杭州华三通信技术有限公司 | Access control method and device of virtual desktop |
CN108255547A (en) * | 2017-09-28 | 2018-07-06 | 新华三云计算技术有限公司 | A kind of application control method and device |
-
2019
- 2019-10-30 CN CN201911044650.5A patent/CN110768993B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101909061A (en) * | 2010-08-06 | 2010-12-08 | 福建升腾资讯有限公司 | Creation and application method of dynamic virtual channel based on remote display protocol |
CN105282095A (en) * | 2014-06-18 | 2016-01-27 | 中兴通讯股份有限公司 | Login verification method and device of virtual desktop |
CN104811455A (en) * | 2015-05-18 | 2015-07-29 | 成都卫士通信息产业股份有限公司 | Cloud computing identity authentication method |
CN106060029A (en) * | 2016-05-24 | 2016-10-26 | 杭州华三通信技术有限公司 | Access control method and device of virtual desktop |
CN108255547A (en) * | 2017-09-28 | 2018-07-06 | 新华三云计算技术有限公司 | A kind of application control method and device |
Non-Patent Citations (1)
Title |
---|
基于应用虚拟化的运维审计系统的设计与实现;姜婷;《中国优秀硕士论文全文数据库信息科技辑》;20190415;第2章-第4章 * |
Also Published As
Publication number | Publication date |
---|---|
CN110768993A (en) | 2020-02-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016165536A1 (en) | Identity verification method and device | |
CN109063457B (en) | Cross-platform login unified authentication docking method, storage medium and electronic equipment | |
CN108462704A (en) | Login validation method, device, computer equipment and storage medium | |
US20110225641A1 (en) | Token Request Troubleshooting | |
US20120124242A1 (en) | Server and method for testing pxe function of network interface card | |
CN103051630A (en) | Method, device and system for implementing authorization of third-party application based on open platform | |
US10425537B2 (en) | Method, apparatus, and system for allocating phone number | |
JP2017502381A (en) | Method, terminal device, and system for associating user resource information | |
CN105681258A (en) | Session method and session device based on third-party server | |
US20220377556A1 (en) | Internet-of-things device registration method and apparatus, device, and storage medium | |
CN106130980A (en) | A kind of vulnerability scanning method and device | |
US20180115542A1 (en) | Security mechanism for multi-tiered server-implemented applications | |
CN111241523B (en) | Authentication processing method, device, equipment and storage medium | |
CN106453349A (en) | An account number login method and apparatus | |
CN110768993B (en) | RDP (remote desktop protocol) -based verification method and device | |
CN114448734A (en) | Network access method, device, equipment and storage medium | |
CN107566421B (en) | Login method | |
CN109861969A (en) | Password remapping method and server based on recognition of face | |
CN111212155B (en) | Log debugging method, television and storage medium | |
CN103179089A (en) | System and method for identity authentication for accessing of different software development platforms | |
CN105812138B (en) | Processing method, device, user terminal and the login system of login | |
WO2020038049A1 (en) | Communication connection method, device, communication device and computer readable storage medium | |
CN110572857A (en) | Network connection processing method and device | |
CN110995756B (en) | Method and device for calling service | |
CN112492598A (en) | WIFI network setting method and system, mobile terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |