CN111131132A - Method and device for realizing multi-system login - Google Patents

Method and device for realizing multi-system login Download PDF

Info

Publication number
CN111131132A
CN111131132A CN201811289121.7A CN201811289121A CN111131132A CN 111131132 A CN111131132 A CN 111131132A CN 201811289121 A CN201811289121 A CN 201811289121A CN 111131132 A CN111131132 A CN 111131132A
Authority
CN
China
Prior art keywords
login
user information
information
authority
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811289121.7A
Other languages
Chinese (zh)
Inventor
凌龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gridsum Technology Co Ltd
Original Assignee
Beijing Gridsum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Gridsum Technology Co Ltd filed Critical Beijing Gridsum Technology Co Ltd
Priority to CN201811289121.7A priority Critical patent/CN111131132A/en
Publication of CN111131132A publication Critical patent/CN111131132A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Abstract

The embodiment of the application discloses a method and a device for realizing multi-system login, which are used for logging in different subsystems, and the method comprises the following steps: responding to a login request of a first system, and sending first login authentication information aiming at the first system to a server, wherein the first login authentication information comprises user information and authentication information corresponding to the user information; after the server passes the verification of the first login verification information, logging in a first system, and acquiring an authority keyword corresponding to the user information from the server; responding to a login request of a second system, and sending second login verification information aiming at the second system to the server, wherein the second login verification information comprises user information and an authority keyword corresponding to the user information; and after the server determines that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, logging in the second system.

Description

Method and device for realizing multi-system login
Technical Field
The application relates to the technical field of internet, in particular to a method and a device for realizing multi-system login.
Background
Currently, in many scenarios, there is a case where an integrated system is composed of a plurality of subsystems. In this case, there is a separate user login system for each subsystem, and information cannot be directly transferred between the subsystems due to physical factors. For a user, after logging in one subsystem of the integrated system, if the user wants to jump to access another subsystem, the user needs to log in again, which is complex in operation and low in efficiency.
Disclosure of Invention
In view of this, embodiments of the present application provide a method and an apparatus for implementing multi-system login, so as to solve the technical problem in the prior art that repeated login is required to log in different subsystems, which is inefficient.
In order to solve the above problem, the technical solution provided by the embodiment of the present application is as follows:
a method for implementing multi-system login, the method comprising:
responding to a login request of a first system, and sending first login authentication information aiming at the first system to a server, wherein the first login authentication information comprises user information and authentication information corresponding to the user information;
after the server passes the verification of the first login verification information, logging in the first system, and acquiring an authority keyword corresponding to the user information from the server;
responding to a login request of a second system, and sending second login verification information aiming at the second system to the server, wherein the second login verification information comprises the user information and an authority keyword corresponding to the user information;
and after the server determines that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, logging in the second system.
In a possible implementation manner, after obtaining the authority keyword corresponding to the user information from the server, the method further includes:
and storing the user information and the authority key words corresponding to the user information in a local storage.
In one possible implementation, the method further includes:
and acquiring the authority key words corresponding to the updated user information from the server.
In one possible implementation, the method includes:
acquiring first login authentication information aiming at a first system, which is sent by a client, wherein the first login authentication information comprises user information and authentication information corresponding to the user information;
after the first login verification information is verified, first login success information is sent to the client so that the client can log in the first system, and an authority keyword corresponding to the user information is sent to the client;
acquiring second login authentication information aiming at a second system and sent by a client, wherein the second login authentication information comprises the user information and an authority keyword corresponding to the user information;
and after determining that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, sending second login success information to the client so that the client logs in the second system.
In one possible implementation, the method further includes:
and sending the authority key words corresponding to the updated user information to the client.
A system for enabling multi-system login, the apparatus comprising:
the system comprises a first sending unit, a second sending unit and a third sending unit, wherein the first sending unit is used for responding to a login request of a first system and sending first login verification information aiming at the first system to a server, and the first login verification information comprises user information and verification information corresponding to the user information;
the first login unit is used for logging in the first system after the server passes the verification of the first login verification information, and acquiring an authority keyword corresponding to the user information from the server;
a second sending unit, configured to send, to the server, second login authentication information for a second system in response to a login request for the second system, where the second login authentication information includes the user information and an authority keyword corresponding to the user information;
and the second login unit is used for logging in the second system after the server determines that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system.
In one possible implementation, the apparatus further includes:
and the storage unit is used for storing the user information and the authority key words corresponding to the user information in a local storage after the authority key words corresponding to the user information are acquired from the server.
In one possible implementation, the apparatus further includes:
and the acquisition unit is used for acquiring the authority key words corresponding to the updated user information from the server.
An apparatus for enabling multi-system login, the apparatus comprising:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring first login authentication information aiming at a first system, which is sent by a client, and the first login authentication information comprises user information and authentication information corresponding to the user information;
a third sending unit, configured to send first login success information to the client after the first login authentication information is authenticated, so that the client logs in the first system, and send an authority keyword corresponding to the user information to the client;
the second acquisition unit is used for acquiring second login authentication information aiming at a second system and sent by a client, and the second login authentication information comprises the user information and an authority keyword corresponding to the user information;
and the fourth sending unit is used for sending second login success information to the client after determining that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system so that the client logs in the second system.
In one possible implementation, the apparatus further includes:
and the fifth sending unit is used for sending the authority key words corresponding to the updated user information to the client.
A storage medium comprising a stored program, wherein the program performs the first method for implementing multi-system login, or the program performs the second method for implementing multi-system login when running.
A processor, configured to execute a program, where the program executes the first method for implementing multi-system login when running, or the program executes the second method for implementing multi-system login when running.
Therefore, the embodiment of the application has the following beneficial effects:
in the embodiment of the application, when a user logs in through a first system for the first time, a client can send login authentication information aiming at the first system to a server through an authentication interface corresponding to the first system, wherein the login authentication information comprises user information and authentication information corresponding to the user information. And when the server passes the verification, logging in the first system, and simultaneously acquiring the authority key words corresponding to the user information from the server. When a user needs to switch from a first system to a second system, a client can send login authentication information aiming at the second system to a server through an authentication interface corresponding to the second system, the login authentication information comprises user information and authority keywords corresponding to the user information, and when the server determines that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, the user can login the second system. Therefore, when jumping from one subsystem to another subsystem, a user does not need to input user information and authentication information corresponding to the user information again for logging, and can log in to another system through the authority key words obtained through authentication, so that the operation is simple, and the logging efficiency is improved.
Drawings
Fig. 1 is a schematic diagram of a framework of an exemplary application scenario provided in an embodiment of the present application;
fig. 2 is a flowchart of a method for implementing multi-system login according to an embodiment of the present disclosure;
fig. 3 is a flowchart of another method for implementing multi-system login according to an embodiment of the present application;
fig. 4 is a signaling interaction diagram for implementing multi-system login according to an embodiment of the present disclosure;
fig. 5 is a structural diagram of an apparatus for implementing multi-system login according to an embodiment of the present disclosure;
fig. 6 is a block diagram of another apparatus for implementing multi-system login according to an embodiment of the present disclosure.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, embodiments accompanying the drawings are described in detail below.
The inventor finds that, in the research of the traditional login multi-subsystem method, when a user logins one of the subsystems, if the user wants to jump to the other subsystem, the user needs to log in the other subsystem again, the operation is complex, the efficiency is low, and the user experience is affected.
Based on this, the embodiment of the present application provides a method and an apparatus for implementing multi-system login, and in this embodiment, an authority keyword that can log in each system for each user may be stored in a server in advance. When a user logs in through the first system for the first time, the first system may send first login authentication information to the server, where the first login authentication information includes user information and authentication information corresponding to the user information. And after the server passes the verification of the first login verification information, the client logs in the first system and sends the authority key words corresponding to the user information to the client. When jumping to a second system, the second system may send second login authentication information to the server, where the second login authentication information includes the user information and an authority keyword corresponding to the user information. And after the server determines that the authority key words corresponding to the received user information comprise the authority key of the second system, the client logs in the second system after the authentication is passed. Therefore, by the login method provided by the embodiment of the application, when jumping from one subsystem to another subsystem, login can be performed by using the pre-obtained authority keywords, user information and verification information corresponding to the user information do not need to be input again for login, operation is simplified, efficiency is improved, and user experience is improved.
Referring to fig. 1, the figure is a schematic diagram of a framework of an exemplary application scenario provided in an embodiment of the present application, where the data processing method provided in the embodiment of the present application may be applied to a client 10. The user can log in a first system and a second system through the client 10, wherein the first system and the second system are different subsystems in the same integrated system. When a user logs in the integration system through the first system for the first time, the user information and the authentication information corresponding to the user information may be input through the client 10, and then sent to the server 20 through the authentication interface corresponding to the first system, and the server 20 authenticates the user information and the authentication information corresponding to the user information. When the authentication is passed, the server 20 transmits an authority keyword corresponding to the user information to the client 10 so as to log in the second system using the authority keyword.
Those skilled in the art will appreciate that the frame diagram shown in fig. 1 is only one example in which embodiments of the present application may be implemented, and the scope of applicability of embodiments of the present application is not limited in any way by this frame.
It should be noted that the client 10 in the embodiment of the present application may be embodied in a terminal, which may be any user equipment existing, developing or developed in the future capable of interacting with the server 20 through any form of wired and/or wireless connection (e.g., Wi-Fi, LAN, cellular, coaxial cable, etc.), including but not limited to: existing, developing, or future developing smartphones, non-smartphones, tablets, laptop personal computers, desktop personal computers, minicomputers, midrange computers, mainframe computers, and the like. It should also be noted that the server 20 in the embodiment of the present application may be an example of an existing, developing or future developing device capable of providing login services to a user. The embodiments of the present application are not limited in any way in this respect.
In order to facilitate understanding of the technical solutions provided by the present application, a method for implementing multi-system login provided by the embodiments of the present application will be described below with reference to the accompanying drawings.
Referring to fig. 2, which is a flowchart of a method for implementing multi-system login according to an embodiment of the present application, as shown in fig. 2, the method may include:
s201: first login authentication information for a first system is sent to a server in response to a login request for the first system.
In this embodiment, a user may log in to the first system through the client, and the client may send, in response to a login request of the user to the first system, first login authentication information of the first system to the server through an authentication interface corresponding to the first system, so that the server may authenticate the first login authentication information.
The first login authentication information may include user information and authentication information corresponding to the user information, and the authentication information may be a user password when the user logs in the first system. When the server receives the user information and the user password, the received information may be verified according to the pre-stored user information and the user password.
It will be appreciated that in order for the server to identify which system the client needs to log on to, an authentication interface may be provided for each system. When a user logs in the first system, the authentication interface corresponding to the first system is used for sending login authentication information corresponding to the first system to the server, and the server can identify the received login authentication information as the login authentication information of the first system according to the authentication interface.
S202: and after the server passes the verification of the first login verification information, logging in a first system, and acquiring the authority key words corresponding to the user information from the server.
In this embodiment, after the server verifies the first login verification information, the server may send first login success information to the client, so that the client may log in the first system according to the first login success information. Meanwhile, the client can obtain the authority keywords corresponding to the user information from the server, and the authority keywords corresponding to the user information can include the authority keywords that the user can log in other one or more systems.
During specific implementation, the first login success information may include an authority keyword corresponding to the user information, and when the first login success information sent by the server is received, the authority keyword corresponding to the user information may be obtained from the first login success information; or after the client logs in the first system, the authority keyword corresponding to the user information can be acquired from the server.
In practical application, the authority key word corresponding to each user information can be preset in the server, and when a user logs in one subsystem of the multiple systems for the first time and passes verification, the authority key word corresponding to the user information is obtained from the server. For example, the multiple systems comprise a subsystem A, a subsystem B and a subsystem C, the server stores the authority keywords corresponding to the user 1 as the authority keywords for logging in the subsystem 1 and the authority keywords for logging in the subsystem B, when the user 1 logs in the subsystem A for the first time, the user 1 inputs user information and a password in the subsystem A through terminal equipment, when the server passes verification, the user 1 logs in the subsystem A through a client, and meanwhile the authority keywords corresponding to the subsystem B for logging in the user 1 are obtained from the server.
S203: in response to a login request to the second system, second login authentication information for the second system is sent to the server.
In this embodiment, when the user wants to jump to the second system, according to a login request of the user for the second system, the client may send, to the server, second login authentication information for the second system through an authentication interface corresponding to the second system, where the second login authentication information may include user information and an authority keyword corresponding to the user information. That is, when logging in the second system, the client may directly send the user information and the authority keyword corresponding to the user information acquired through S202 to the server without sending the user information and the authentication information corresponding to the user information to the server again. The second system can be logged in by using the authority key words corresponding to the user information.
The user information in the second login authentication information is used for representing the user identity information of the second system, so that the server can acquire the user identity of the second system according to the user identity information.
S204: and after the server determines that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, logging in the second system.
In this embodiment, after receiving the authority keyword corresponding to the user information sent by the verification interface corresponding to the second system, the server checks whether the received authority keyword includes the authority keyword corresponding to the second system. If the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, the user is indicated to have the authority of logging in the second system, and the user can log in the second system. And if the authority keywords corresponding to the user information do not comprise the authority keywords corresponding to the second system, the user is indicated to have no authority for logging in the second system, and the user is refused to log in the second system.
In practical application, in order to avoid the loss of the authority keyword corresponding to the acquired user information caused by system refreshing, the user information and the authority keyword corresponding to the user information can be stored in a local storage. That is, the user information and the authority keyword corresponding to the user information are encapsulated in the local storage, and then the encapsulated data is stored. When jumping from the first system to the second system, the user information and the authority keyword corresponding to the user information can be obtained from the local storage, and the second system is logged in by using the authority keyword corresponding to the user information. Therefore, the user information and the authority keywords corresponding to the user information are not lost due to refreshing or other reasons, and skipping failure is avoided.
It can be understood that when a subsystem is added or deleted in the integrated system or the authority of a user to log in a subsystem is modified, the authority key word corresponding to the user can be updated in the server. After the server finishes updating the authority keyword corresponding to the user information, the client can acquire the authority keyword corresponding to the updated user information from the server. During specific implementation, the server can actively issue the authority keywords corresponding to the updated user information; and issuing the authority keywords corresponding to the updated user information in response to a request sent by the client.
For example, if a third system is added to the integration system, the authority keyword corresponding to the third system may be set in the server, and the user information that can log in the third system is stored. After the server updates the related information of the third system, when the user jumps from a certain system to another system, if the authority keyword corresponding to the user information of the user changes, the authority keyword corresponding to the updated user information can be obtained from the server, and the authority keyword corresponding to the updated user information includes the keyword corresponding to the third system.
Therefore, when the system jumps to the second system from the first system, the user does not need to input the user information and the verification information corresponding to the user information again for logging in, and can log in another system through the authority key words obtained through verification, so that the operation is simple, and the logging efficiency is improved.
The above embodiments describe the technical solutions provided by the present application from the client side of the login system, and the technical solutions provided by the embodiments of the present application will be described from the server side with reference to the drawings.
Referring to fig. 3, which is a flowchart of another method for implementing multi-system login according to an embodiment of the present application, as shown in fig. 3, the method may include:
s301: the method comprises the steps of obtaining first login authentication information aiming at a first system and sent by a client.
In this embodiment, when a user logs in a first system through a client, the client sends first login authentication information to a server through an authentication interface corresponding to the first system according to a trigger operation of the user. The first login authentication information comprises user information and authentication information corresponding to the user information.
S302: and after the first login authentication information passes the authentication, sending first login success information to the client so that the client logs in the first system, and sending an authority keyword corresponding to the user information to the client.
In this embodiment, after receiving the first login authentication information sent by the client, the server authenticates the received first login authentication information according to the first login authentication information stored in advance, and after the authentication is passed, the server can send first login success information to the client, so that the client logs in the first system according to the first login success information, and simultaneously sends an authority keyword corresponding to the user information to the client.
When the server fails in verification, first login failure information can be sent to the client, so that the client prompts the user of login failure according to the first login failure information, and the user can be reminded to check whether the input user information and the verification information corresponding to the user information are accurate or not.
S303: and acquiring second login authentication information aiming at the second system, which is sent by the client.
When a user jumps from the first system to the second system through the client, the client sends second login authentication information to the server through an authentication interface corresponding to the second system according to the jump operation triggered by the user, so that the server acquires the second login authentication information aiming at the second system. The second login authentication information comprises user information and an authority keyword corresponding to the user information.
S304: and after determining that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, sending second login success information to the client so that the client logs in the second system.
After the server obtains the second login authentication information sent by the client, whether the authority key corresponding to the user information comprises the authority key corresponding to the second system or not can be searched in the second login authentication information, and if the authority key corresponding to the user information comprises the authority key corresponding to the second system, second login success information can be sent to the client so that the client can log in the second system. If not, second login failure information can be sent to the client to prompt the user that the user has no login authority through the client.
Through the above description, in the embodiment of the present application, when a user logs in a first system for the first time, a client may send login authentication information for the first system to a server through an authentication interface corresponding to the first system, where the login authentication information includes user information and authentication information corresponding to the user information. And when the server passes the verification, the client logs in the first system and simultaneously acquires the authority key words corresponding to the user information from the server. When a user needs to switch from a first system to a second system, a client can send login authentication information aiming at the second system to a server through an authentication interface corresponding to the second system, wherein the login authentication information comprises user information and authority keywords corresponding to the user information, and when the server determines that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, the login of the second system is realized.
Therefore, when jumping from one subsystem to another subsystem, the user does not need to input the user information and the verification information corresponding to the user information again for logging, and the user can log in to another system by verifying the obtained authority key words, so that the operation is simple, and the logging efficiency is improved.
For convenience of understanding, referring to fig. 4, which is a signaling interaction diagram for logging into multiple systems according to an embodiment of the present application, as shown in fig. 4, the method may include:
s401: in response to a triggering operation of a user for logging in a first system, a client sends first login verification information aiming at the first system to a server.
In this embodiment, the first login authentication information includes user information and authentication information corresponding to the user information.
S402: the server verifies the received first login verification information.
The server verifies the user information in the first login verification information and the verification information corresponding to the user information, and determines whether the user information sent by the client and the verification information corresponding to the user information are consistent with the user information stored in advance and the verification information corresponding to the user information. If the two are consistent, the verification is passed; if not, the verification fails.
S403: and after the first login authentication information passes the authentication, the server sends first login success information to the client, and simultaneously sends an authority keyword corresponding to the user information to the client.
When the first login authentication information is not verified, the server may send first login failure information to the client to prompt the user of login failure through the client.
S404: and the client logs in the first system according to the first login success information.
S405: and responding to the triggering operation of the user for logging in the second system, and sending second login verification information aiming at the second system to the server by the client.
The second login authentication information comprises user information and an authority keyword corresponding to the user information.
S406: and the server verifies whether the authority key words corresponding to the user information comprise the authority key words corresponding to the second system or not according to the received second login verification information.
S407: and after the server determines that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, sending second login success information to the client.
S408: and the client logs in the second system according to the second login success information.
It should be noted that, implementation of each step in this embodiment may refer to implementation of the method described in fig. 2 and fig. 3, and details of this embodiment are not described herein again.
Based on the foregoing embodiments, the embodiments of the present application further provide a device for implementing multi-system login, and the login device will be described with reference to the accompanying drawings.
Referring to fig. 5, which is a block diagram of an apparatus for implementing multi-system login according to an embodiment of the present application, as shown in fig. 5, the apparatus may include:
a first sending unit 501, configured to send, in response to a login request for a first system, first login authentication information for the first system to a server, where the first login authentication information includes user information and authentication information corresponding to the user information;
a first login unit 502, configured to log in the first system after the server verifies the first login verification information, and obtain an authority keyword corresponding to the user information from the server;
a second sending unit 503, configured to send, to the server, second login authentication information for a second system in response to a login request for the second system, where the second login authentication information includes the user information and an authority keyword corresponding to the user information;
a second login unit 504, configured to log in the second system after the server determines that the authority keyword corresponding to the user information includes the authority keyword corresponding to the second system.
In one possible implementation, the apparatus further includes:
and the storage unit is used for storing the user information and the authority key words corresponding to the user information in a local storage after the authority key words corresponding to the user information are acquired from the server.
In one possible implementation, the apparatus further includes:
and the acquisition unit is used for acquiring the authority key words corresponding to the updated user information from the server.
It should be noted that, implementation of each unit in this embodiment may refer to implementation of the method embodiment shown in fig. 2, and this embodiment is not described herein again.
Referring to fig. 6, which is a block diagram of an apparatus for implementing multi-system login according to an embodiment of the present application, as shown in fig. 6, the apparatus may include:
a first obtaining unit 601, configured to obtain first login authentication information for a first system, where the first login authentication information is sent by a client and includes user information and authentication information corresponding to the user information;
a third sending unit 602, configured to send first login success information to the client after the first login authentication information is authenticated, so that the client logs in the first system, and sends an authority keyword corresponding to the user information to the client;
a second obtaining unit 603, configured to obtain second login authentication information for a second system, where the second login authentication information is sent by a client and includes the user information and an authority keyword corresponding to the user information;
a fourth sending unit 604, configured to send second login success information to the client after determining that the permission keyword corresponding to the user information includes the permission keyword corresponding to the second system, so that the client logs in the second system.
In one possible implementation, the apparatus further includes:
and the fifth sending unit is used for sending the authority key words corresponding to the updated user information to the client.
It should be noted that, implementation of each unit in this embodiment may refer to implementation of the method embodiment shown in fig. 3, and this embodiment is not described herein again.
According to the embodiment, when a user logs in the first system for the first time, the client can send login authentication information aiming at the first system to the server through the authentication interface corresponding to the first system, wherein the login authentication information comprises user information and authentication information corresponding to the user information. And when the server passes the verification, logging in the first system, and simultaneously acquiring the authority key words corresponding to the user information from the server. When a user needs to switch from a first system to a second system, a client can send login authentication information aiming at the second system to a server through an authentication interface corresponding to the second system, the login authentication information comprises user information and authority keywords corresponding to the user information, and when the server determines that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, the user can login the second system. Therefore, when jumping from one subsystem to another subsystem, the user does not need to input the user information and the verification information corresponding to the user information again for logging, and the user can log in to another system by verifying the obtained authority key words, so that the operation is simple, and the logging efficiency is improved.
The device for realizing multi-system login comprises a processor and a memory, wherein the first sending unit, the first login unit, the second sending unit, the second login unit and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
Or, the device for implementing multi-system login includes a processor and a memory, the first acquiring unit, the third sending unit, the second acquiring unit, the fourth sending unit, and the like are all stored in the memory as program units, and the processor executes the program units stored in the memory to implement corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more than one, and multi-system login is achieved by adjusting kernel parameters.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
The embodiment of the invention provides a storage medium, wherein a program is stored on the storage medium, and the program realizes the method for realizing multi-system login when being executed by a processor.
The embodiment of the invention provides a processor, which is used for running a program, wherein the method for realizing multi-system login is executed when the program runs.
The embodiment of the invention provides equipment, which comprises a processor, a memory and a program which is stored on the memory and can run on the processor, wherein the processor executes the program and realizes the following steps:
responding to a login request of a first system, and sending first login authentication information aiming at the first system to a server, wherein the first login authentication information comprises user information and authentication information corresponding to the user information;
after the server passes the verification of the first login verification information, logging in the first system, and acquiring an authority keyword corresponding to the user information from the server;
responding to a login request of a second system, and sending second login verification information aiming at the second system to the server, wherein the second login verification information comprises the user information and an authority keyword corresponding to the user information;
and after the server determines that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, logging in the second system.
In a possible implementation manner, after obtaining the authority keyword corresponding to the user information from the server, the method further includes:
and storing the user information and the authority key words corresponding to the user information in a local storage.
In one possible implementation manner, the method further includes:
and acquiring the authority key words corresponding to the updated user information from the server.
The embodiment of the invention also provides equipment, which comprises a processor, a memory and a program which is stored on the memory and can be operated on the processor, wherein the processor executes the program and realizes the following steps:
acquiring first login authentication information aiming at a first system, which is sent by a client, wherein the first login authentication information comprises user information and authentication information corresponding to the user information;
after the first login verification information is verified, first login success information is sent to the client so that the client can log in the first system, and an authority keyword corresponding to the user information is sent to the client;
acquiring second login authentication information aiming at a second system and sent by a client, wherein the second login authentication information comprises the user information and an authority keyword corresponding to the user information;
and after determining that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, sending second login success information to the client so that the client logs in the second system.
In one possible implementation manner, the method further includes:
and sending the authority key words corresponding to the updated user information to the client.
The device herein may be a server, a PC, a PAD, a mobile phone, etc.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device:
responding to a login request of a first system, and sending first login authentication information aiming at the first system to a server, wherein the first login authentication information comprises user information and authentication information corresponding to the user information;
after the server passes the verification of the first login verification information, logging in the first system, and acquiring an authority keyword corresponding to the user information from the server;
responding to a login request of a second system, and sending second login verification information aiming at the second system to the server, wherein the second login verification information comprises the user information and an authority keyword corresponding to the user information;
and after the server determines that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, logging in the second system.
In a possible implementation manner, after obtaining the authority keyword corresponding to the user information from the server, the method further includes:
and storing the user information and the authority key words corresponding to the user information in a local storage.
In one possible implementation manner, the method further includes:
and acquiring the authority key words corresponding to the updated user information from the server.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device:
acquiring first login authentication information aiming at a first system, which is sent by a client, wherein the first login authentication information comprises user information and authentication information corresponding to the user information;
after the first login verification information is verified, first login success information is sent to the client so that the client can log in the first system, and an authority keyword corresponding to the user information is sent to the client;
acquiring second login authentication information aiming at a second system and sent by a client, wherein the second login authentication information comprises the user information and an authority keyword corresponding to the user information;
and after determining that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, sending second login success information to the client so that the client logs in the second system.
In one possible implementation manner, the method further includes:
and sending the authority key words corresponding to the updated user information to the client.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method for implementing multi-system login, the method comprising:
responding to a login request of a first system, and sending first login authentication information aiming at the first system to a server, wherein the first login authentication information comprises user information and authentication information corresponding to the user information;
after the server passes the verification of the first login verification information, logging in the first system, and acquiring an authority keyword corresponding to the user information from the server;
responding to a login request of a second system, and sending second login verification information aiming at the second system to the server, wherein the second login verification information comprises the user information and an authority keyword corresponding to the user information;
and after the server determines that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, logging in the second system.
2. The method according to claim 1, wherein after obtaining the authority keyword corresponding to the user information from the server, the method further comprises:
and storing the user information and the authority key words corresponding to the user information in a local storage.
3. The method of claim 1, further comprising:
and acquiring the authority key words corresponding to the updated user information from the server.
4. A method for implementing multi-system login, the method comprising:
acquiring first login authentication information aiming at a first system, which is sent by a client, wherein the first login authentication information comprises user information and authentication information corresponding to the user information;
after the first login verification information is verified, first login success information is sent to the client so that the client can log in the first system, and an authority keyword corresponding to the user information is sent to the client;
acquiring second login authentication information aiming at a second system and sent by a client, wherein the second login authentication information comprises the user information and an authority keyword corresponding to the user information;
and after determining that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system, sending second login success information to the client so that the client logs in the second system.
5. The method of claim 4, further comprising:
and sending the authority key words corresponding to the updated user information to the client.
6. A system for enabling multi-system login, the apparatus comprising:
the system comprises a first sending unit, a second sending unit and a third sending unit, wherein the first sending unit is used for responding to a login request of a first system and sending first login verification information aiming at the first system to a server, and the first login verification information comprises user information and verification information corresponding to the user information;
the first login unit is used for logging in the first system after the server passes the verification of the first login verification information, and acquiring an authority keyword corresponding to the user information from the server;
a second sending unit, configured to send, to the server, second login authentication information for a second system in response to a login request for the second system, where the second login authentication information includes the user information and an authority keyword corresponding to the user information;
and the second login unit is used for logging in the second system after the server determines that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system.
7. The apparatus of claim 6, further comprising:
and the storage unit is used for storing the user information and the authority key words corresponding to the user information in a local storage after the authority key words corresponding to the user information are acquired from the server.
8. An apparatus for enabling multi-system login, the apparatus comprising:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring first login authentication information aiming at a first system, which is sent by a client, and the first login authentication information comprises user information and authentication information corresponding to the user information;
a third sending unit, configured to send first login success information to the client after the first login authentication information is authenticated, so that the client logs in the first system, and send an authority keyword corresponding to the user information to the client;
the second acquisition unit is used for acquiring second login authentication information aiming at a second system and sent by a client, and the second login authentication information comprises the user information and an authority keyword corresponding to the user information;
and the fourth sending unit is used for sending second login success information to the client after determining that the authority keywords corresponding to the user information comprise the authority keywords corresponding to the second system so that the client logs in the second system.
9. A storage medium comprising a stored program, wherein the program performs the method for implementing a multiple system login of any one of claims 1 to 3, or wherein the program when executed performs the method for implementing a multiple system login of any one of claims 4 to 5.
10. A processor, configured to execute a program, wherein the program when executed performs the method for implementing multiple system login according to any one of claims 1 to 3, or wherein the program when executed performs the method for implementing multiple system login according to any one of claims 4 to 5.
CN201811289121.7A 2018-10-31 2018-10-31 Method and device for realizing multi-system login Pending CN111131132A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811289121.7A CN111131132A (en) 2018-10-31 2018-10-31 Method and device for realizing multi-system login

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811289121.7A CN111131132A (en) 2018-10-31 2018-10-31 Method and device for realizing multi-system login

Publications (1)

Publication Number Publication Date
CN111131132A true CN111131132A (en) 2020-05-08

Family

ID=70485680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811289121.7A Pending CN111131132A (en) 2018-10-31 2018-10-31 Method and device for realizing multi-system login

Country Status (1)

Country Link
CN (1) CN111131132A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101989910A (en) * 2010-12-22 2011-03-23 北京安天电子设备有限公司 Multi-system authentication method, device and system
US20120291114A1 (en) * 2011-05-13 2012-11-15 Cch Incorporated Single sign-on between applications
CN104378376A (en) * 2014-11-18 2015-02-25 深圳中兴网信科技有限公司 SOA-based single-point login method, authentication server and browser
CN107770192A (en) * 2017-11-13 2018-03-06 郑州云海信息技术有限公司 Identity authentication method and computer-readable recording medium in multisystem

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101989910A (en) * 2010-12-22 2011-03-23 北京安天电子设备有限公司 Multi-system authentication method, device and system
US20120291114A1 (en) * 2011-05-13 2012-11-15 Cch Incorporated Single sign-on between applications
CN104378376A (en) * 2014-11-18 2015-02-25 深圳中兴网信科技有限公司 SOA-based single-point login method, authentication server and browser
CN107770192A (en) * 2017-11-13 2018-03-06 郑州云海信息技术有限公司 Identity authentication method and computer-readable recording medium in multisystem

Similar Documents

Publication Publication Date Title
US10728235B2 (en) System and method for mobile single sign-on integration
US11089023B2 (en) Computer readable storage media for tiered connection pooling and methods and systems for utilizing same
US10009355B2 (en) Bootstrapping user authentication on devices
CN110460595B (en) Authentication and service method, device and equipment
CN107026832B (en) Account login method, device and server
US10148638B2 (en) Authentication server system, method, and storage medium
US10833859B2 (en) Automating verification using secure encrypted phone verification
US20130340048A1 (en) Mobile application management framework
CN107040560B (en) Service processing method and device based on service platform
CN112836204A (en) Token updating method and device
CN109462601B (en) Multi-platform access method and device based on eSIM
CN105704178B (en) Task platform access method and device
US20150143475A1 (en) Operation Processing Method and Device
CN106254319B (en) Light application login control method and device
CN111431920A (en) Security control method and system based on dynamic token
US20160373422A1 (en) User identity based on location patterns of non-associated devices
US20220277179A1 (en) Barcode-based enrollment of devices with a management service
CN111523098A (en) Data authority management method and device
CN113630253A (en) Login method, device, computer system and readable storage medium
US9680814B2 (en) Method, device, and system for registering terminal application
CN104065674A (en) Terminal device and information processing method
US10992474B2 (en) Proactive user authentication for facilitating subsequent resource access across multiple devices
CN111259368A (en) Method and equipment for logging in system
CN111753270B (en) Application program login verification method, device, equipment and storage medium
CN111355583B (en) Service providing system, method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200508