CN111131324A - Login method and device of business system, storage medium and electronic device - Google Patents

Login method and device of business system, storage medium and electronic device Download PDF

Info

Publication number
CN111131324A
CN111131324A CN201911425323.4A CN201911425323A CN111131324A CN 111131324 A CN111131324 A CN 111131324A CN 201911425323 A CN201911425323 A CN 201911425323A CN 111131324 A CN111131324 A CN 111131324A
Authority
CN
China
Prior art keywords
source
target object
access
verification result
source information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911425323.4A
Other languages
Chinese (zh)
Inventor
张锋
赵天龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wangzhong Gongchuang Technology Co ltd
Original Assignee
Beijing Wangzhong Gongchuang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wangzhong Gongchuang Technology Co ltd filed Critical Beijing Wangzhong Gongchuang Technology Co ltd
Priority to CN201911425323.4A priority Critical patent/CN111131324A/en
Publication of CN111131324A publication Critical patent/CN111131324A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The invention provides a login method and a device of a business system, a storage medium and an electronic device, wherein the method comprises the steps of acquiring source information of a target object in the process of logging in the business system by the target object, wherein the source information is used for indicating an access source of the target object; verifying the source information to obtain a verification result, wherein the verification result is used for indicating whether the access source is trustable or not; according to the verification result, whether the target object is allowed to log in the business system is determined, by adopting the technical scheme, the problems that in the related technology, a user is limited from accessing a source and a separate external network device is required to provide support, the strategy maintenance is complex and the like are solved, and whether the source information target object is allowed to log in the corresponding business system is verified through the source limitation system, so that the overall safety of an internal system is improved.

Description

Login method and device of business system, storage medium and electronic device
Technical Field
The present invention relates to the field of communications, and in particular, to a method and an apparatus for logging in a service system, a storage medium, and an electronic apparatus.
Background
At present, the method for limiting the user access source is mostly realized by adopting external network equipment, and the purpose of limiting the user access source is further achieved by adjusting the access strategy of the network equipment. The access right of a user is limited by erecting a single external network device and setting a special access strategy, and the external network device is generally deployed at an exit of the whole network or a group of network devices, and the influence on other service systems needs to be considered when the strategy is adjusted. When the strategy of the external network is maintained, professional operation and maintenance personnel are needed to add or change the network access strategy, so that the purpose of access source limitation is realized, and the learning cost is too high for non-technical users.
Aiming at the problems that in the related art, the limitation of user access sources needs a single external network device to provide support, the strategy maintenance is complex and the like, an effective technical scheme is not provided yet.
Disclosure of Invention
The embodiment of the invention provides a login method and device, a storage medium and an electronic device relating to a service system, and aims to at least solve the problems that in the related technology, a user access source is limited to be supported by a single external network device, the strategy maintenance is complex and the like.
According to an embodiment of the present invention, a login method of a service system is provided, including: in the process of logging in a business system by a target object, acquiring source information of the target object, wherein the source information is used for indicating an access source of the target object; verifying the source information to obtain a verification result, wherein the verification result is used for indicating whether the access source is trustable or not; and determining whether the target object is allowed to log in the service system or not according to the verification result.
In the embodiment of the present invention, in the process of logging in the service system by the target object, after the source information of the target object is acquired, the method further includes: receiving an operation instruction sent by a management object; executing at least one of the following operations on the acquired source information according to the operation instruction: and adding the source information to a source limiting platform, changing the acquired source information, and deleting the acquired source information.
In this embodiment of the present invention, determining whether to allow the target object to log in the service system according to the verification result includes: allowing the target object to log in the business system under the condition that the verification result indicates that the access source is trustable; and under the condition that the verification result indicates that the access source is untrustworthy, forbidding the target object to log in the service system.
In this embodiment of the present invention, verifying the source information to obtain a verification result, where the verification result is used to indicate whether the access source is trusted, and the verifying includes: setting one or more first access sources which are trusted and one or more second access sources which are not trusted; obtaining a verification result that the access source is trustable under the condition that the access source indicated by the source information is successfully matched with the first access source; and under the condition that the access source indicated by the source information is successfully matched with the second access source, obtaining a verification result that the access source is not trustable.
According to another embodiment of the present invention, there is also provided a login device for a service system, including: the system comprises an acquisition module, a service processing module and a service processing module, wherein the acquisition module is used for acquiring source information of a target object in the process of logging in the service system by the target object, and the source information is used for indicating an access source of the target object; the verification module is used for verifying the source information to obtain a verification result, wherein the verification result is used for indicating whether the access source is trustable; and the determining module is used for determining whether the target object is allowed to log in the service system or not according to the verification result.
In an embodiment of the present invention, the apparatus further includes: the receiving module is used for receiving an operation instruction sent by the management object; the operation module is used for executing at least one of the following operations on the acquired source information according to the operation instruction: and adding the source information to a source limiting platform, changing the acquired source information, and deleting the acquired source information.
In this embodiment of the present invention, the determining module is further configured to allow the target object to log in the business system if the verification result indicates that the access source is trusted; and under the condition that the verification result indicates that the access source is untrustworthy, forbidding the target object to log in the service system.
In an embodiment of the present invention, the verification module is further configured to set one or more trusted first access sources and one or more untrusted second access sources; obtaining a verification result that the access source is trustable under the condition that the access source indicated by the source information is successfully matched with the first access source; and under the condition that the access source indicated by the source information is successfully matched with the second access source, obtaining a verification result that the access source is not trustable.
According to another embodiment of the present invention, there is also provided a storage medium, in which a computer program is stored, wherein the computer program is configured to execute the login method of the business system in any one of the above manners when running.
According to yet another embodiment of the present invention, there is also provided an electronic device, including a memory in which a computer program is stored and a processor configured to execute the computer program to perform the steps in any of the above method embodiments.
According to the invention, in the process of logging in a business system by a target object, the source information of the target object is obtained, wherein the source information is used for indicating the access source of the target object; verifying the source information to obtain a verification result, wherein the verification result is used for indicating whether the access source is trustable or not; according to the technical scheme, whether the target object is allowed to log in the business system is determined, the problems that a user needs to support an access source by a single external network device, the strategy maintenance is complex and the like are solved, and whether the source information target object is allowed to log in the corresponding business system can be verified by the source limiting system, so that the overall safety of an internal system is improved, meanwhile, the source limiting system can be deployed at the front end, access limitation on a plurality of sets of business systems is realized through interfaces and configuration, and the universality of the system is further enhanced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
fig. 1 is a block diagram of a hardware structure of a computer terminal of a login method of a service system according to an embodiment of the present invention;
fig. 2 is a flowchart of a login method of a service system according to an embodiment of the present invention;
FIG. 3 is a block diagram of a source-limited platform according to an embodiment of the invention;
fig. 4 is a process flow diagram of a login method of a business system according to an embodiment of the present invention;
fig. 5 is a block diagram of a login device of a service system according to an embodiment of the present invention.
Detailed Description
The invention will be described in detail hereinafter with reference to the accompanying drawings in conjunction with embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The method provided by the embodiment of the application can be executed in a mobile terminal, a computer terminal or a similar operation system. Taking the example of running on a computer terminal, fig. 1 is a hardware structure block diagram of a computer terminal of a login method of a service system according to an embodiment of the present invention. As shown in fig. 1, the computer terminal may include one or more (only one shown in fig. 1) processors 102 (the processor 102 may include, but is not limited to, a processing system such as a microprocessor MCU or a programmable logic device FPGA) and a memory 104 for storing data, and optionally, a transmission device 106 for communication functions and an input-output device 108. It will be understood by those skilled in the art that the structure shown in fig. 1 is only an illustration and is not intended to limit the structure of the computer terminal. For example, the computer terminal may also include more or fewer components than shown in FIG. 1, or have a different configuration with equivalent functionality to that shown in FIG. 1 or with more functionality than that shown in FIG. 1.
The memory 104 may be used to store computer programs, for example, software programs and modules of application software, such as computer programs corresponding to the login method of the business system in the embodiment of the present invention, and the processor 102 executes various functional applications and data processing by running the computer programs stored in the memory 104, so as to implement the above-mentioned method. The memory 104 may include high speed random access memory and may also include non-volatile memory, such as one or more magnetic storage systems, flash memory, or other non-volatile solid-state memory. In some examples, the memory 104 may further include memory located remotely from the processor 102, which may be connected to a computer terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission system 106 is used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the computer terminal. In one example, the transmission system 106 includes a Network adapter (NIC) that can be connected to other Network devices through a base station to communicate with the internet. In one example, the transmission system 106 can be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
According to an embodiment of the present invention, a login method of a business system is provided, and fig. 2 is a flowchart of the login method of the business system according to the embodiment of the present invention, as shown in fig. 2, including:
step 202, in the process of logging in a business system by a target object, obtaining source information of the target object, wherein the source information is used for indicating an access source of the target object;
step 204, verifying the source information to obtain a verification result, wherein the verification result is used for indicating whether the access source is trusted;
step 206, determining whether to allow the target object to log in the service system according to the verification result.
Through the steps, in the process of logging in a business system by a target object, the source information of the target object is obtained, wherein the source information is used for indicating the access source of the target object; verifying the source information to obtain a verification result, wherein the verification result is used for indicating whether the access source is trustable or not; according to the technical scheme, whether the target object is allowed to log in the business system is determined, the problems that a user needs to support an access source by a single external network device, the strategy maintenance is complex and the like are solved, and whether the source information target object is allowed to log in the corresponding business system can be verified by the source limiting system, so that the overall safety of an internal system is improved, meanwhile, the source limiting system can be deployed at the front end, access limitation on a plurality of sets of business systems is realized through interfaces and configuration, and the universality of the system is further enhanced.
In the embodiment of the present invention, in the process of logging in the service system by the target object, after the source information of the target object is acquired, the method further includes: receiving an operation instruction sent by a management object; executing at least one of the following operations on the acquired source information according to the operation instruction: in this embodiment of the present invention, the role of an administrator (the above management object) may be set in the source restriction platform, so that operations such as adding, changing, deleting, and the like may be performed on the source information in the source restriction platform.
In other words, when the target object logs in the relevant service system, the source information capable of identifying the target object is acquired, and the service system performs operations such as adding, changing and deleting on the acquired source information in the source limiting platform through the operation instruction of the management object, so that the service system manages the login authority of the target object, and the flexibility of authority management is increased.
In this embodiment of the present invention, determining whether to allow the target object to log in the service system according to the verification result includes: allowing the target object to log in the business system under the condition that the verification result indicates that the access source is trustable; and under the condition that the verification result indicates that the access source is untrustworthy, forbidding the target object to log in the service system.
After the target object is verified, the access source of the target object is confirmed to be trustable in the verification result, the target object is allowed to log in the business system, relevant business operation is carried out, and when the access source of the target object is confirmed to be untrustworthy in the verification result, the target object is forbidden to log in the business system, so that the safety of the business system in accessing the target source is improved.
In this embodiment of the present invention, verifying the source information to obtain a verification result, where the verification result is used to indicate whether the access source is trusted, and the verifying includes: setting one or more first access sources which are trusted and one or more second access sources which are not trusted; obtaining a verification result that the access source is trustable under the condition that the access source indicated by the source information is successfully matched with the first access source; and under the condition that the access source indicated by the source information is successfully matched with the second access source, obtaining a verification result that the access source is not trustable.
The method comprises the steps that one or more first access sources which are trusted and one or more second access sources which are untrustworthy are set in a source limiting platform, source information in the source limiting platform is matched with a target object when the target object is subjected to business system login to obtain source information of the target object, when the source information of the target object is matched with the first access sources of the source limiting platform, the current target object can be confirmed to be trusted, the target object can be subjected to business system login, when the source information of the target object is matched with the second access sources of the source limiting platform, the current target object can be confirmed to be untrustworthy, and the current target object is prohibited from being subjected to business system login.
The following explains the technical solution of the login method of the business system with reference to an example, but is not limited to the technical solution of the embodiment of the present invention.
An alternative embodiment of the present invention provides a block diagram of a source-limited platform, as shown in figure 3,
in order to restrict a user from accessing a source of the system, when the user logs in the service system, the source restriction platform acquires source information of the user, identifies an access source of the user and identifies access service authority (which is equivalent to authentication in fig. 3), when the source system access control table has a current identified user, the source information carried by the user is available and is trustable, and subsequent access operation is performed, and if not, subsequent behaviors are directly rejected.
Meanwhile, in order to increase the flexibility of authority management, the role of an administrator (equivalent to a management object) is distributed in the source limiting system, and the administrator role can complete the addition and the change of user source information by performing source management, service system management, access control management and user management in the source limiting system through simple click operation, so that the access source of a user is limited, and the maintenance of an access control table of the source system is realized.
In order to increase the universality of the system, the functions are interfaced, and services needing source restriction can be accessed only by calling the interfaces, so that the services of the source restriction system can be used, and the overall safety of an internal system is conveniently improved. Meanwhile, a set of source restriction system is deployed at the front end, access restriction on a plurality of sets of service systems can be realized through interfaces and configuration, and the universality of the system is further enhanced.
Fig. 4 is a flowchart of an execution flow of a source restriction system according to an alternative embodiment of the present invention, and the following steps are performed to implement a technical solution of a login method of a service system.
Step one, a user logs in a related management service system, the service system receives a login request of the user, if the request is successful, the user logs in the service system, at the moment, the service system responds to the current login state in a related manner, and informs the user of the current login state of the service system.
And step two, when the service system receives a user request and does not log in the service system, acquiring information of source information carried by a current user by calling a source limiting system (equivalent to a source limiting platform), and transmitting the acquired source parameters (equivalent to the source information) to the source limiting system by the service system.
And step three, the source limiting system identifies the access source of the user and identifies the access service authority by acquiring the source parameter of the user, when the current identified user exists in the source system access control list, the source limiting system indicates that the source information carried by the user is available and is trustable, the source limiting system confirms that login is allowed, the service system executes login operation, and after the login is successful, the source limiting system enters the service system, and the user performs the function of accessing the service.
And step four, when the current identification user does not exist in the access control table of the source system, the source information carried by the user is indicated to be unavailable and untrustworthy, the source limiting system confirms that the user is rejected to log in, and the user is limited to access the service system.
Through the optional embodiment, the source system is used for managing the authority of the user service system, the strategy maintenance is simple, professional operation knowledge does not need to be learned, the limitation on the access source of the service system is easily realized, service personnel can only access the service system at a specified place, and the safety of the service system is ensured to a greater extent.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
In this embodiment, a login device of a service system is further provided, and the login device is used to implement the foregoing embodiments and preferred embodiments, and details of which have been already described are omitted. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 5 is a block diagram of a login device of a service system according to an embodiment of the present invention, and as shown in fig. 5, the login device includes:
(1) an obtaining module 52, configured to obtain source information of a target object in a process of logging in a service system, where the source information is used to indicate an access source of the target object;
(2) a verification module 54, configured to verify the source information to obtain a verification result, where the verification result is used to indicate whether the access source is trusted;
(3) and the determining module 56 is configured to determine whether to allow the target object to log in the service system according to the verification result.
According to the invention, in the process of logging in a business system by a target object, the source information of the target object is obtained, wherein the source information is used for indicating the access source of the target object; verifying the source information to obtain a verification result, wherein the verification result is used for indicating whether the access source is trustable or not; according to the technical scheme, whether the target object is allowed to log in the business system is determined, the problems that a user needs to support an access source by a single external network device, the strategy maintenance is complex and the like are solved, and whether the source information target object is allowed to log in the corresponding business system can be verified by the source limiting system, so that the overall safety of an internal system is improved, meanwhile, the source limiting system can be deployed at the front end, access limitation on a plurality of sets of business systems is realized through interfaces and configuration, and the universality of the system is further enhanced.
In an embodiment of the present invention, the apparatus further includes: the receiving module is used for receiving an operation instruction sent by the management object; the operation module is used for executing at least one of the following operations on the acquired source information according to the operation instruction: and adding the source information to a source limiting platform, changing the acquired source information, and deleting the acquired source information.
When a target object logs in a related service system, source information capable of identifying the target object is acquired, and the service system performs operations such as adding, changing and deleting on the acquired source information in a source limiting platform through an operation instruction of a management object, so that the service system manages the login authority of the target object, and the flexibility of authority management is improved.
In this embodiment of the present invention, the determining module is further configured to allow the target object to log in the business system if the verification result indicates that the access source is trusted; and under the condition that the verification result indicates that the access source is untrustworthy, forbidding the target object to log in the service system.
After the target object is verified, the access source of the target object is confirmed to be trustable in the verification result, the target object is allowed to log in the business system, relevant business operation is carried out, and when the access source of the target object is confirmed to be untrustworthy in the verification result, the target object is forbidden to log in the business system, so that the safety of the business system in accessing the target source is improved.
In an embodiment of the present invention, the verification module is further configured to set one or more trusted first access sources and one or more untrusted second access sources; obtaining a verification result that the access source is trustable under the condition that the access source indicated by the source information is successfully matched with the first access source; and under the condition that the access source indicated by the source information is successfully matched with the second access source, obtaining a verification result that the access source is not trustable.
The method comprises the steps that one or more first access sources which are trusted and one or more second access sources which are untrustworthy are set in a source limiting platform, source information in the source limiting platform is matched with a target object when the target object is subjected to business system login to obtain source information of the target object, when the source information of the target object is matched with the first access sources of the source limiting platform, the current target object can be confirmed to be trusted, the target object can be subjected to business system login, when the source information of the target object is matched with the second access sources of the source limiting platform, the current target object can be confirmed to be untrustworthy, and the current target object is prohibited from being subjected to business system login.
Embodiments of the present invention also provide a storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
Alternatively, in the present embodiment, the storage medium may be configured to store a computer program for executing the steps of:
s1, in the process of logging in a business system, obtaining source information of a target object, wherein the source information is used for indicating an access source of the target object;
s2, verifying the source information to obtain a verification result, wherein the verification result is used for indicating whether the access source is trustable;
s3, determining whether the target object is allowed to log in the service system according to the verification result.
Optionally, in this embodiment, the storage medium may include, but is not limited to: various media capable of storing computer programs, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Embodiments of the present invention also provide an electronic device comprising a memory having a computer program stored therein and a processor arranged to run the computer program to perform the steps of any of the above method embodiments.
Optionally, the electronic apparatus may further include a transmission device and an input/output device, wherein the transmission device is connected to the processor, and the input/output device is connected to the processor.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, in the process of logging in a business system, obtaining source information of a target object, wherein the source information is used for indicating an access source of the target object;
s2, verifying the source information to obtain a verification result, wherein the verification result is used for indicating whether the access source is trustable;
s3, determining whether the target object is allowed to log in the service system according to the verification result.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation manners, and this embodiment is not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented in a general purpose computing system, centralized on a single computing system or distributed across a network of computing systems, or alternatively implemented in program code that is executable by a computing system, such that the steps shown and described may be executed by a computing system on storage systems, and in some cases, performed in an order other than that shown and described herein, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from a plurality of modules or steps. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A login method of a service system is characterized by comprising the following steps:
in the process of logging in a business system by a target object, acquiring source information of the target object, wherein the source information is used for indicating an access source of the target object;
verifying the source information to obtain a verification result, wherein the verification result is used for indicating whether the access source is trustable or not;
and determining whether the target object is allowed to log in the service system or not according to the verification result.
2. The method according to claim 1, wherein after obtaining the source information of the target object during the process of logging in the business system, the method further comprises:
receiving an operation instruction sent by a management object;
executing at least one of the following operations on the acquired source information according to the operation instruction: and adding the source information to a source limiting platform, changing the acquired source information, and deleting the acquired source information.
3. The method of claim 1, wherein determining whether to allow the target object to log in the business system according to the verification result comprises:
allowing the target object to log in the business system under the condition that the verification result indicates that the access source is trustable;
and under the condition that the verification result indicates that the access source is untrustworthy, forbidding the target object to log in the service system.
4. The method of claim 1, wherein verifying the source information to obtain a verification result, wherein the verification result is used to indicate whether the access source is trusted, comprises:
setting one or more first access sources which are trusted and one or more second access sources which are not trusted;
obtaining a verification result that the access source is trustable under the condition that the access source indicated by the source information is successfully matched with the first access source;
and under the condition that the access source indicated by the source information is successfully matched with the second access source, obtaining a verification result that the access source is not trustable.
5. A login device of a service system is applied to a source limitation platform, and is characterized by comprising:
the system comprises an acquisition module, a service processing module and a service processing module, wherein the acquisition module is used for acquiring source information of a target object in the process of logging in the service system by the target object, and the source information is used for indicating an access source of the target object;
the verification module is used for verifying the source information to obtain a verification result, wherein the verification result is used for indicating whether the access source is trustable;
and the determining module is used for determining whether the target object is allowed to log in the service system or not according to the verification result.
6. The apparatus of claim 5, further comprising:
the receiving module is used for receiving an operation instruction sent by the management object;
the operation module is used for executing at least one of the following operations on the acquired source information according to the operation instruction: and adding the source information to a source limiting platform, changing the acquired source information, and deleting the acquired source information.
7. The apparatus according to claim 5, wherein the determining module is further configured to allow the target object to log in the business system if the verification result indicates that the access source is trusted; and under the condition that the verification result indicates that the access source is untrustworthy, forbidding the target object to log in the service system.
8. The apparatus of claim 5, wherein the verification module is further configured to set one or more first access sources that are trusted and one or more second access sources that are untrusted; obtaining a verification result that the access source is trustable under the condition that the access source indicated by the source information is successfully matched with the first access source; and under the condition that the access source indicated by the source information is successfully matched with the second access source, obtaining a verification result that the access source is not trustable.
9. A computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to carry out the method of any one of claims 1 to 4 when executed.
10. An electronic device comprising a memory and a processor, wherein the memory has stored therein a computer program, and wherein the processor is arranged to execute the computer program to perform the method of any of claims 1 to 4.
CN201911425323.4A 2019-12-31 2019-12-31 Login method and device of business system, storage medium and electronic device Pending CN111131324A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911425323.4A CN111131324A (en) 2019-12-31 2019-12-31 Login method and device of business system, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911425323.4A CN111131324A (en) 2019-12-31 2019-12-31 Login method and device of business system, storage medium and electronic device

Publications (1)

Publication Number Publication Date
CN111131324A true CN111131324A (en) 2020-05-08

Family

ID=70507193

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911425323.4A Pending CN111131324A (en) 2019-12-31 2019-12-31 Login method and device of business system, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN111131324A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112464213A (en) * 2020-11-18 2021-03-09 苏州浪潮智能科技有限公司 Operating system access control method, device, equipment and storage medium
CN114285613A (en) * 2021-12-15 2022-04-05 青岛海尔科技有限公司 Data information calling method and device, storage medium and electronic device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330474A (en) * 2007-06-22 2008-12-24 鸿富锦精密工业(深圳)有限公司 System and method for managing and controlling consumer authority
CN106330836A (en) * 2015-07-01 2017-01-11 北京京东尚科信息技术有限公司 Access control method for client by server
CN107277038A (en) * 2017-07-18 2017-10-20 北京微影时代科技有限公司 Access control method, device and system
US20180146001A1 (en) * 2016-11-22 2018-05-24 Daniel Chien Network security based on device identifiers and network addresses
CN109167780A (en) * 2018-08-28 2019-01-08 下代互联网重大应用技术(北京)工程研究中心有限公司 A kind of method, equipment, system and the medium of the access of control resource
CN110287682A (en) * 2019-07-01 2019-09-27 北京芯盾时代科技有限公司 A kind of login method, apparatus and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330474A (en) * 2007-06-22 2008-12-24 鸿富锦精密工业(深圳)有限公司 System and method for managing and controlling consumer authority
CN106330836A (en) * 2015-07-01 2017-01-11 北京京东尚科信息技术有限公司 Access control method for client by server
US20180146001A1 (en) * 2016-11-22 2018-05-24 Daniel Chien Network security based on device identifiers and network addresses
CN107277038A (en) * 2017-07-18 2017-10-20 北京微影时代科技有限公司 Access control method, device and system
CN109167780A (en) * 2018-08-28 2019-01-08 下代互联网重大应用技术(北京)工程研究中心有限公司 A kind of method, equipment, system and the medium of the access of control resource
CN110287682A (en) * 2019-07-01 2019-09-27 北京芯盾时代科技有限公司 A kind of login method, apparatus and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112464213A (en) * 2020-11-18 2021-03-09 苏州浪潮智能科技有限公司 Operating system access control method, device, equipment and storage medium
CN112464213B (en) * 2020-11-18 2022-07-08 苏州浪潮智能科技有限公司 Operating system access control method, device, equipment and storage medium
CN114285613A (en) * 2021-12-15 2022-04-05 青岛海尔科技有限公司 Data information calling method and device, storage medium and electronic device
CN114285613B (en) * 2021-12-15 2024-03-22 青岛海尔科技有限公司 Data information calling method and device, storage medium and electronic device

Similar Documents

Publication Publication Date Title
CN110493184B (en) Method and device for processing login page in client and electronic device
EP3337219B1 (en) Carrier configuration processing method, device and system, and computer storage medium
EP3396905B1 (en) Method and device for securely sending a message
CN105389263B (en) Application software authority monitoring method, system and equipment
CN111654399B (en) Networking method, device, equipment and storage medium based on SD-WAN
CN113296859B (en) Page loading method and device, storage medium and electronic device
KR20160038878A (en) Method and device for grayscale-upgrading
CN113438314A (en) Equipment control method and device, storage medium and electronic device
CN111131324A (en) Login method and device of business system, storage medium and electronic device
CN112637221B (en) Equipment control method and device
EP4142238A1 (en) Pico base station configuration method and apparatus, and storage medium and electronic apparatus
CN110275913A (en) Data furnishing method, device and storage medium and electronic device
CN113489689A (en) Access request authentication method and device, storage medium and electronic equipment
CN113259918A (en) Equipment binding method and system
CN111182527B (en) OTA (over the air) firmware upgrading method and device, terminal equipment and storage medium thereof
EP3654587B1 (en) Systems and methods for managing iot/eot devices
CN110366164B (en) Method for remotely controlling terminal, server, terminal and computing equipment
CN112738025A (en) Device control method and apparatus, storage medium, and electronic apparatus
CN109462589B (en) Method, device and equipment for controlling network access of application program
CN105868622A (en) Method and device for controlling startup of application
CN110580172B (en) Configuration rule verification method and device, storage medium and electronic device
CN104753927A (en) Unified verification method and device
CN113596082A (en) Method and system for determining equipment data and electronic device
CN111046383B (en) Terminal attack defense method and device, terminal and cloud server
CN113779516A (en) Equipment control method and device, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200508

RJ01 Rejection of invention patent application after publication