CN112491839A - Cross-system-based login processing method and device, computer equipment and medium - Google Patents
Cross-system-based login processing method and device, computer equipment and medium Download PDFInfo
- Publication number
- CN112491839A CN112491839A CN202011285506.3A CN202011285506A CN112491839A CN 112491839 A CN112491839 A CN 112491839A CN 202011285506 A CN202011285506 A CN 202011285506A CN 112491839 A CN112491839 A CN 112491839A
- Authority
- CN
- China
- Prior art keywords
- login
- duration
- target
- jump
- routing information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application relates to a data processing technology, and provides a cross-system-based login processing method, a cross-system-based login processing device, a computer device and a storage medium, wherein the method comprises the following steps: when a target jump button on a first system is monitored to be triggered, target routing information of a second system is acquired; analyzing the target routing information to obtain login parameters, and detecting whether the login state of the second system is logged in or not according to the login parameters; when the detection result is negative, obtaining and analyzing the routing information of the first system to obtain the remaining duration of the validity period of the login state of the first system; detecting whether the remaining duration of the validity period meets the target jump duration or not; when the detection result is negative, prolonging the valid period of the login state of the first system, and jumping to the second system according to the target jump button; logging on the second system. The method and the device can improve development efficiency and reduce development and maintenance cost. The application can be applied to all function modules of smart cities such as smart government affairs and smart traffic, and rapid development of the smart cities is promoted.
Description
Technical Field
The invention relates to the technical field of data processing, in particular to a cross-system-based login processing method, a cross-system-based login processing device, computer equipment and a cross-system-based login processing medium.
Background
At present, with the rapid development of information technology, the upgrade and maintenance of software systems become very frequent, because of the difference between the old and new technologies, a new technology cannot be perfectly integrated in the old system, and a new system needs to be developed to support the new technology, thus causing the existence of the old and new systems. In the switching process of a new system and an old system, the problem that the two systems run in parallel is often encountered, most functions are in the old system, the other small part is migrated out and realized on the new system, and a user often needs to switch the two systems back and forth in use.
Aiming at the condition that two sets of systems share account names and passwords, in the process of implementing the invention, the inventor finds that the prior art at least has the following problems: the buttons are added in the old system, partial functions can be skipped to the new system for operation through the touch buttons, and under the condition, no matter whether the old system is in a logged-in state or not, when a user is detected to skip to the new system, cross-system skip authentication logic still needs to be executed through a large amount of codes, so that the development efficiency is low, and the development and maintenance cost is high.
Therefore, it is necessary to provide a cross-system based login processing method, which can improve the development efficiency and reduce the development and maintenance costs.
Disclosure of Invention
In view of the above, it is desirable to provide a cross-system based login processing method, a cross-system based login processing apparatus, a computer device, and a medium, which can improve development efficiency and reduce development and maintenance costs.
A first aspect of an embodiment of the present application provides a cross-system based login processing method, where the cross-system based login processing method includes:
when a target jump button on a first system is monitored to be triggered, second routing information of a second system related to the target jump button is acquired;
analyzing the second routing information to obtain a second login parameter, and detecting whether the login state of the second system is logged in or not according to the second login parameter;
when the detection result shows that the login state of the second system is not logged in, acquiring and analyzing first routing information of the first system to obtain the remaining duration of the validity period of the login state of the first system;
detecting whether the remaining duration of the validity period meets a target jump duration or not;
when the detection result shows that the remaining duration of the validity period does not meet the target jump duration, prolonging the validity period of the login state of the first system, and jumping to the second system according to the target jump button;
logging in the second system.
Further, in the above login processing method based on a cross-system provided in the present application, the analyzing the second routing information to obtain a second login parameter includes:
acquiring second routing information, wherein the second routing information is unstructured information;
capturing a target field from the second routing information according to a pre-configured regular expression, wherein the regular expression comprises a name of a second login parameter corresponding to the target field;
and combining the target field and the name thereof to obtain the key value pair form structured second routing information.
Further, in the above login processing method based on a cross-system provided in the present application, the detecting whether the login status of the second system is logged in according to the second login parameter includes:
acquiring a target parameter in the second login parameters and an attribute value of the target parameter;
detecting whether the attribute value meets the requirement of a preset attribute value;
when the detection result shows that the attribute value meets the requirement of a preset attribute value, determining that the login state of the second system is logged in;
and when the detection result shows that the attribute value does not meet the requirement of the preset attribute value, determining that the login state of the second system is not logged in.
Further, in the above login processing method based on a cross-system provided in the present application, the obtaining and analyzing the first routing information of the first system to obtain the remaining duration of the validity period of the login state of the first system includes:
analyzing the first routing information of the first system to obtain a first login parameter;
determining a target time and a preset effective duration for a user to log in the first system according to the first login parameter;
calculating the failure time of the login state according to the target time and the preset effective duration;
and acquiring the current time of the first system, and determining the remaining duration of the validity period of the login state of the first system according to the expiration time and the current time.
Further, in the login processing method based on the cross-system provided by the present application, the method for obtaining the target jump duration includes:
obtaining historical page jump information, and dividing the historical page jump information into a training set and a test set;
training an initial jump duration prediction model according to the training set to obtain a trained jump duration prediction model;
detecting whether the accurate value of the jump duration prediction model meets a preset accurate threshold range or not according to the test set;
when the detection result is that the accurate value of the jump duration prediction model meets a preset accurate threshold range, determining that the training of the jump duration prediction model is finished;
and acquiring the target jump duration based on the jump duration prediction model.
Further, in the above method for processing login based on a cross-system provided in the present application, the extending the validity period of the login state of the first system includes:
acquiring the residual duration of the validity period and the target jump duration;
calculating the difference value between the residual time length of the validity period and the target jump time length;
and prolonging the valid period of the login state of the first system according to the difference.
Further, in the above method for processing login based on a cross-system provided in the present application, after the login to the second system, the method includes:
acquiring login information of a user;
determining page authentication information according to the login information;
and rendering the page of the second system according to the page authentication information.
A second aspect of the embodiments of the present application further provides a cross-system based login processing apparatus, where the cross-system based login processing apparatus includes:
the information acquisition module is used for acquiring second routing information of a second system associated with a target jump button when the target jump button on a first system is monitored to be triggered;
the information analysis module is used for analyzing the second routing information to obtain a second login parameter and detecting whether the login state of the second system is logged in or not according to the second login parameter;
the duration acquisition module is used for acquiring and analyzing the first routing information of the first system when the detection result shows that the login state of the second system is not logged in, so as to obtain the remaining duration of the validity period of the login state of the first system;
the duration detection module is used for detecting whether the remaining duration of the validity period meets a target jump duration or not;
the time prolonging module is used for prolonging the valid period of the login state of the first system and jumping to the second system according to the target jumping button when the detection result shows that the remaining duration of the valid period does not meet the target jumping duration;
and the system login module is used for logging in the second system.
A third aspect of embodiments of the present application further provides a computer device, where the computer device includes a processor, and the processor is configured to implement the cross-system based login processing method according to any one of the above items when executing a computer program stored in a memory.
The fourth aspect of the embodiments of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when executed by a processor, the computer program implements the cross-system based login processing method according to any one of the above.
According to the cross-system-based login processing method, the cross-system-based login processing device, the computer equipment and the computer readable storage medium, provided by the embodiment of the application, aiming at the situation that a new system and an old system share account and account in parallel, the old system can be ensured to be in a login state, the new system is directly logged in when the old system jumps to the new system, a large amount of codes are not needed to execute cross-system jump authentication logic on the new system, the development efficiency can be improved, and the development and maintenance cost can be reduced; in addition, whether the remaining time of the validity period of the old system meets the preset time is detected, and the remaining time of the validity period does not meet the preset time is detected, so that the remaining time of the old system is prolonged, the new system can directly log in when the cross-system jumps, the condition that the user inputs account density for many times is avoided, the operation steps of the user are simplified, and the processing efficiency of the cross-system login is improved. This application can be applied to in each functional module in wisdom cities such as wisdom government affairs, wisdom traffic, for example, the old and new system of each of wisdom government affairs etc. can promote the rapid development in wisdom city.
Drawings
Fig. 1 is a flowchart of a cross-system based login processing method according to a first embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
FIG. 3 is an exemplary functional block diagram of the computer device shown in FIG. 2.
The following detailed description will further illustrate the invention in conjunction with the above-described figures.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a detailed description of the present invention will be given below with reference to the accompanying drawings and specific embodiments. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth to provide a thorough understanding of the present invention, and the described embodiments are a part, but not all, of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention.
Fig. 1 is a flowchart of a cross-system based login processing method according to a first embodiment of the present invention. As shown in fig. 1, the cross-system based login processing method may include the following steps:
and S11, when the target jump button on the first system is monitored to be triggered, acquiring second routing information of the second system associated with the target jump button.
In at least one embodiment of the present application, the first system may be an old system, the second system may be a new system, and the first system and the second system are associated with each other according to the target jump button, that is, the jump to the second system can be performed by triggering the target jump button in the first system, so as to implement parallel processing of the old system and the new system. The first system and the second system can log in by using the same account and password. The method and the device for cross-system jumping adopt route jumping, and the route jumping can access pages of different systems through different URLs so as to realize web application in a display view of a terminal. The second routing information is information mapped with the second system, and comprises a URL (uniform resource locator) address, a login parameter and a skip parameter, wherein the URL address is used for identifying whether the current routing information of the terminal is changed; the login parameters comprise parameters such as an account name, a password, user login time, a login state, preset effective duration of the login state and the like; the jump parameter is used for identifying whether the current route change is the target cross-system change.
Optionally, the jump parameter is an isOrgin parameter, and an attribute value of the isOrgin parameter may be true or false. When the attribute value of the isoscope parameter is true, determining that the routing change meets target cross-system change (namely, meets the change of skipping from an old system to a new system); and when the attribute value of the isoscope parameter is false, determining that the route change does not meet the target cross-system change. According to the method and the device, whether the current cross-system login meets the requirement that the old system jumps to a new system or not can be quickly identified through the isoorgin parameter in the cross-system login processing process, the code judging step is simplified, the login required time is shortened, and the login processing efficiency is improved.
S12, analyzing the second routing information to obtain a second login parameter, and detecting whether the login state of the second system is logged in or not according to the second login parameter; when the detection result indicates that the login status of the second system is not logged in, step S13 is executed.
In at least one embodiment of the present application, an original state of the second routing information is unstructured information, and structured routing information about the second login parameter is constructed by parsing the second routing information.
Optionally, the analyzing the second routing information to obtain a second login parameter includes: acquiring second routing information, wherein the second routing information is unstructured information; capturing a target field from the second routing information according to a pre-configured regular expression, wherein the regular expression comprises a name of a second login parameter corresponding to the target field; and combining the target field and the name thereof to obtain the key value pair form structured second routing information.
The preset plug-in can be embedded in the computer equipment and used for analyzing the second routing information. The regular expression is a series of character strings which are described and captured by using a single character string and accord with a certain characteristic, and the regular expression can be a user-defined regular expression according to the actual situation. The target field may be a field related to the second login parameter. The structured data in the key-value pair form is generally composed of two parts, i.e., a key and a value, and the structured data in the key-value pair form can be obtained by using the name of the target field (e.g., the name of the second registration parameter) as the key and the captured target field (e.g., the second registration parameter) as the value and combining the two.
In at least one embodiment of the present application, the second login parameter is a parameter cached in the routing information after the user successfully logs in the second system, and the login parameter includes an account name, a password, a user login time, a login state, a preset effective duration of the login state, and the like, where the login state passes through the target parameter identifier. Optionally, the detecting, according to the second login parameter, whether the login state of the second system is logged in includes: acquiring a target parameter in the second login parameters and an attribute value of the target parameter; detecting whether the attribute value meets the requirement of a preset attribute value; when the detection result shows that the attribute value meets the requirement of a preset attribute value, determining that the login state of the second system is logged in; and when the detection result shows that the attribute value does not meet the requirement of the preset attribute value, determining that the login state of the second system is not logged in.
The target parameter is a parameter for identifying a login state, and in an embodiment, the target parameter is an isLoginUser parameter. The preset attribute value requirement refers to a preset attribute value corresponding to the login state of the second system, for example, the preset attribute value is true.
In at least one embodiment of the present application, when the detection result indicates that the login status in the second system is logged in, the method further includes: logging in the second system. And when the login state in the second system is logged in, directly logging in the second system without developing codes to verify the identity information of the user.
S13, obtaining and analyzing the first routing information of the first system, and obtaining the remaining duration of the validity period of the login state of the first system.
In at least one embodiment of the present application, when a user logs in the first system, authentication (face authentication, code scanning authentication, account and password authentication, or the like) is required to obtain a login state, so that non-shared information in the first system can be operated. In order to prevent the user from not logging out in time and further causing information security accidents such as privacy data leakage, the login state needs to set the preset effective time of login. It can be understood that, outside the preset effective duration, the login state of the user is invalid, and the user cannot continue to operate the first system. The preset effective duration is preset, for example, the preset effective duration may be 30min, 1h, or 3 h. That is, the user logs in the first system at 9 o 'clock, the preset effective duration of the login state is 30min, and the current login state failure time is 9 o' clock and 30 min.
Optionally, the obtaining and analyzing the first routing information of the first system to obtain the remaining duration of the validity period of the login state of the first system further includes: analyzing the first routing information of the first system to obtain a first login parameter; determining a target time and a preset effective duration for a user to log in the first system according to the first login parameter; calculating the failure time of the login state according to the target time and the preset effective duration; and acquiring the current time of the first system, and determining the remaining duration of the validity period of the login state of the first system according to the expiration time and the current time.
S14, detecting whether the remaining duration of the validity period meets the target jump duration, and executing the step S15 when the detection result shows that the remaining duration of the validity period does not meet the target jump duration.
In at least one embodiment of the present application, the target jump duration refers to a preset duration that can satisfy a system-crossing jump, that is, a duration required for the first system to jump to the second system. The target jump duration can be determined by data volume information of the target jump page, UI element number information of the target jump page and GPU utilization rate information of the computer equipment. The target jump duration is determined through a pre-trained jump duration prediction model.
Optionally, the method for acquiring the target jump duration includes: obtaining historical page jump information, and dividing the historical page jump information into a training set and a test set; training an initial jump duration prediction model according to the training set to obtain a trained jump duration prediction model; detecting whether the accurate value of the jump duration prediction model meets a preset accurate threshold range or not according to the test set, and determining that the training of the jump duration prediction model is finished when the detection result is that the accurate value of the jump duration prediction model meets the preset accurate threshold range; and acquiring the target jump duration based on the jump duration prediction model.
The preset accuracy threshold is a preset value, for example, the preset accuracy threshold is 85%. The page jump information comprises data volume information of a target jump page, UI element number information of the target jump page, GPU utilization rate information of computer equipment and jump duration information. And taking the data volume information of the target jump page, the UI element quantity information of the target jump page and GPU utilization rate information of computer equipment as input data, and taking the jump duration information as output data for training. And the jump duration prediction model is stored in a target node of the block chain. In an embodiment, when the detection result is that the accurate value of the jump duration prediction model meets a preset accurate threshold range, a training set is added to retrain the jump duration prediction model until the accurate value meets the preset accurate threshold range.
Optionally, the page jump duration can be accurately calculated based on shot image processing, so that the training accuracy of the jump duration prediction model is improved. The method for determining the jump duration information comprises the following steps: shooting a page jump video; acquiring a page picture which triggers switching operation in the page jump video and popping up a picture when loading of a new page is completed; determining time points corresponding to all the pictures; and calculating the jump duration information of the page according to the time point.
The shooting camera can be opened before page operation, and shooting is carried out in the page jump process, so that a page jump video is obtained. And converting the page jump video into a plurality of pictures according to a preset frequency, wherein the total time of the page jump video is 5 seconds, and if the preset frequency is 1 ms/picture, 50 pictures are obtained.
In at least one embodiment of the present application, when the detection result indicates that the remaining duration of the validity period satisfies the target skip duration, the method further includes: logging in the second system.
And S15, prolonging the valid period of the login state of the first system, and jumping to the second system according to the target jump button.
In at least one embodiment of the application, when the detection result indicates that the remaining duration of the validity period does not satisfy the target jump duration, it indicates that the login state of the first system may fail in a process of the first system jumping to the second system, and if the login state of the first system is in a failure state, for the second system that jumps, the user needs to re-input the account and the password for identity verification, and the user can log in the second system after the identity verification is successful, which wastes time. This application is through right the validity period of the login state of first system prolongs, can guarantee according to the target jumps the button and jumps to the in-process of second system, the login state of first system is in the validity period always, and then need not user's identity check-up when logging in the second system, directly logs in, can reduce the number of times of user's manual identity check-up, reduces and logs in required time, improves and logs in the treatment effeciency.
Optionally, the extending the validity period of the login status of the first system includes: acquiring the residual duration of the validity period and the target jump duration; calculating the difference value between the residual time length of the validity period and the target jump time length; and prolonging the valid period of the login state of the first system according to the difference. And the prolonged remaining time of the validity period of the login state of the first system is greater than or equal to the difference.
And S16, logging in the second system.
In at least one embodiment of the application, after jumping to the second system according to the target jump button, the user directly logs in the second system without manually inputting the account number to log in, so that the user can be prevented from inputting the account number for multiple times to log in, the operation steps of the user are simplified, the time required by cross-system login is shortened, and the login processing efficiency is improved.
In at least one embodiment of the application, a front-end route, a front-end component and a front-end operation are registered through an authority management interface of a background management system, and a specific front-end route, a specific front-end component or an operation authority is allocated according to login information of a user. The front-end page comprises three types of authority control including a routing-level authority, a component-level authority and an operation-level authority, wherein the routing-level authority determines that a user cannot enter a page represented by the route; the component level authority determines whether a certain user can see a certain service component; the operation level authority refers to the authority of a current user to be endowed with certain operation, and the corresponding operation button can be displayed for the user.
Optionally, after the logging in to the second system, the method further comprises: acquiring login information of a user; determining page authentication information according to the login information; and rendering the page of the second system according to the page authentication information.
After the user logs in a front-end page of the second system, calling login information of the user, wherein the login information comprises basic information of the user, an affiliated organization chain (a current organization and a corresponding parent organization) and a role to which the user belongs; and then acquiring and integrating the authority data table according to the user, organization and role information.
In an embodiment, the application is further provided with a preset request interface for monitoring the permission change, realizing the first time of the permission change, updating various permission controls at the front end, and providing a flexible solution for data isolation and service isolation. The method further comprises the following steps: calling a preset request interface to continuously track background permission change information of a user; when the background authority state is changed, updating the authority data table and outputting a user authority change prompt to the front end; the front page is re-rendered.
The computer equipment provided by the application can be developed based on a Vue.js framework, and the vuex file is a state management file of an application program developed under the Vue.js framework. The vuex file comprises a page menu management list of the second system, and the page menu management list comprises routing level authority, component level authority and operation level authority of a page.
After acquiring the page authentication information of the corresponding user, the front end sets a routing filter, and judges whether the user is allowed to enter a page represented by the route or not according to the page authentication information in the routing filter; when the front-end component renders, firstly, judging whether a user has the component authority, if not, rendering the component on the page, and if so, rendering the component on the page; when the front-end operation button is rendered, whether the user has the component authority is judged firstly, if the user does not have the authority, the operation button is not rendered on the page, and if the user has the component authority, the operation button is rendered on the page. The method and the device adopt a strategy of front-end authority background management, integrate management and control, and can flexibly configure and control the authority in a multi-angle and real-time manner.
According to the login processing method based on the cross-system, provided by the embodiment of the application, aiming at the condition that the old system and the new system share account and account, the old system can be ensured to be in a login state, the new system is directly logged in when the old system jumps to the new system, a large amount of codes are not needed to execute cross-system jump authentication logic on the new system, the development efficiency can be improved, and the development and maintenance cost can be reduced; in addition, whether the remaining time of the validity period of the old system meets the preset time is detected, and the remaining time of the validity period does not meet the preset time is detected, so that the remaining time of the old system is prolonged, the new system can directly log in when the cross-system jumps, the condition that the user inputs account density for many times is avoided, the operation steps of the user are simplified, and the processing efficiency of the cross-system login is improved. This application can be applied to in each functional module in wisdom cities such as wisdom government affairs, wisdom traffic, for example, the old and new system of each of wisdom government affairs etc. can promote the rapid development in wisdom city.
The above is a detailed description of the method provided by the embodiments of the present invention. The order of execution of the blocks in the flowcharts shown may be changed, and some blocks may be omitted, according to various needs. The following describes a computer device 1 provided by an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a computer device according to an embodiment of the present invention, and as shown in fig. 2, the computer device 1 includes a memory 10, and the cross-system based login processing device 300 is stored in the memory 10. The computer device 1 may be an electronic device having functions of data processing, analysis, program execution, display, and the like, such as a computer, a tablet computer, and a personal digital assistant. The cross-system based login processing device 300 may acquire second routing information of a second system associated with a target skip button when it is monitored that the target skip button on a first system is triggered; analyzing the second routing information to obtain a second login parameter, and detecting whether the login state of the second system is logged in or not according to the second login parameter; when the detection result shows that the login state of the second system is not logged in, acquiring and analyzing first routing information of the first system to obtain the remaining duration of the validity period of the login state of the first system; detecting whether the remaining duration of the validity period meets a target jump duration or not; when the detection result shows that the remaining duration of the validity period does not meet the target jump duration, prolonging the validity period of the login state of the first system, and jumping to the second system according to the target jump button; logging in the second system. According to the method and the device, the old system can be directly logged in the new system when the old system jumps to the new system under the login state aiming at the condition that the old system and the new system share account and password, a large amount of codes are not needed to execute cross-system jump authentication logic on the new system, the development efficiency can be improved, the development and maintenance cost is reduced, and the cross-system login processing efficiency is improved.
In this embodiment, the computer device 1 may further include a display screen 20 and a processor 30. The memory 10 and the display screen 20 can be electrically connected with the processor 30 respectively.
The memory 10 may be of different types of memory devices for storing various types of data. For example, the memory and the internal memory of the computer device 1 may be used, and the memory Card may be a memory Card that is externally connected to the computer device 1, such as a flash memory, an SM Card (Smart Media Card), an SD Card (Secure Digital Card), and the like. Further, the memory 10 may include non-volatile memory and volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other storage devices. The memory 10 is used for storing various types of data, for example, various types of application programs (Applications) installed in the computer device 1, data set and acquired by applying the above-described login processing method across systems, and the like.
A display screen 20 is mounted to the computer apparatus 1 for displaying information.
The processor 30 is used for executing the cross-system based login processing method and various types of software installed in the computer device 1, such as an operating system, application display software and the like. The processor 30 includes, but is not limited to, a Central Processing Unit (CPU), a Micro Controller Unit (MCU), and other devices for interpreting computer instructions and Processing data in computer software.
The cross-system based login processing apparatus 300 may comprise one or more modules, which are stored in the memory 10 of the computer device 1 and configured to be executed by one or more processors (in this embodiment, one processor 30) to implement the embodiment of the present invention. Referring to fig. 3, the cross-system based login processing apparatus 300 may include an information obtaining module 301, an information parsing module 302, a duration obtaining module 303, a duration detecting module 304, a duration extending module 305, and a system login module 306. The modules referred to in the embodiments of the present invention may be program segments that perform a specific function, and are more suitable than programs for describing the execution process of software in the processor 30.
It is understood that, corresponding to the above-mentioned embodiments of the cross-system based login processing method, the cross-system based login processing apparatus 300 may include some or all of the functional modules shown in fig. 3, and the functions of the modules will be described in detail below. It should be noted that the same noun and its specific explanation in the above embodiments based on the cross-system login processing method can also be applied to the following functional introduction of each module. For brevity and to avoid repetition, further description is omitted.
The information obtaining module 301 may be configured to, when it is monitored that a target skip button on a first system is triggered, obtain second routing information of a second system associated with the target skip button.
The information analyzing module 302 may be configured to analyze the second routing information to obtain a second login parameter, and detect whether the login status of the second system is logged in according to the second login parameter.
The duration obtaining module 303 may be configured to, when the detection result indicates that the login state of the second system is not logged in, obtain and analyze the first routing information of the first system, to obtain the remaining duration of the validity period of the login state of the first system.
The duration detection module 304 may be configured to detect whether the remaining duration of the validity period satisfies a target jump duration.
The time extension module 305 may be configured to extend the validity period of the login state of the first system and jump to the second system according to the target jump button when the detection result indicates that the remaining duration of the validity period does not satisfy the target jump duration.
The system login module 306 may be used to log in to the second system.
The embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by the processor 30, implements the steps of the login processing method based on the cross-system in any of the above embodiments.
The cross-system based login processing device 300/computer device 1/computer device integrated module/unit may be stored in a computer readable storage medium if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, all or part of the flow in the method according to the above embodiments may be implemented by a computer program, which may be stored in a computer readable storage medium and used by the processor 30 to implement the steps of the above method embodiments. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable storage medium may include: any entity or device capable of carrying the computer program code, recording medium, U-disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), random-access Memory, or the like.
The Processor 30 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. The general purpose processor may be a microprocessor or the processor may be any conventional processor, etc., and the processor 30 is a control center of the cross-system based login processing device 300/computer apparatus 1, and various interfaces and lines are used to connect the various parts of the whole cross-system based login processing device 300/computer apparatus 1.
The memory 10 is used for storing the computer programs and/or modules, and the processor 30 implements various functions of the cross-system based login processing device 300/computer apparatus 1 by running or executing the computer programs and/or modules stored in the memory 10 and calling the data stored in the memory 10. The memory 10 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data created according to the use of the computer apparatus 1, and the like.
In the several embodiments provided in the present invention, it should be understood that the disclosed computer apparatus and method may be implemented in other ways. For example, the system embodiments described above are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
It will be evident to those skilled in the art that the embodiments of the present invention are not limited to the details of the foregoing illustrative embodiments, and that the embodiments of the present invention are capable of being embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the embodiments being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. A plurality of units, modules or devices recited in the present invention can also be implemented by the same unit, module or device through software or hardware.
Although the embodiments of the present invention have been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the spirit and scope of the embodiments of the present invention.
Claims (10)
1. A cross-system-based login processing method is characterized by comprising the following steps:
when a target jump button on a first system is monitored to be triggered, second routing information of a second system related to the target jump button is acquired;
analyzing the second routing information to obtain a second login parameter, and detecting whether the login state of the second system is logged in or not according to the second login parameter;
when the detection result shows that the login state of the second system is not logged in, acquiring and analyzing first routing information of the first system to obtain the remaining duration of the validity period of the login state of the first system;
detecting whether the remaining duration of the validity period meets a target jump duration or not;
when the detection result shows that the remaining duration of the validity period does not meet the target jump duration, prolonging the validity period of the login state of the first system, and jumping to the second system according to the target jump button;
logging in the second system.
2. The method according to claim 1, wherein the analyzing the second routing information to obtain a second login parameter comprises:
acquiring second routing information, wherein the second routing information is unstructured information;
capturing a target field from the second routing information according to a pre-configured regular expression, wherein the regular expression comprises a name of a second login parameter corresponding to the target field;
and combining the target field and the name thereof to obtain the key value pair form structured second routing information.
3. The cross-system based login processing method according to claim 1, wherein the detecting whether the login status of the second system is logged in according to the second login parameter comprises:
acquiring a target parameter in the second login parameters and an attribute value of the target parameter;
detecting whether the attribute value meets the requirement of a preset attribute value;
when the detection result shows that the attribute value meets the requirement of a preset attribute value, determining that the login state of the second system is logged in;
and when the detection result shows that the attribute value does not meet the requirement of the preset attribute value, determining that the login state of the second system is not logged in.
4. The method according to claim 1, wherein the obtaining and analyzing the first routing information of the first system to obtain the remaining duration of the validity period of the login status of the first system comprises:
analyzing the first routing information of the first system to obtain a first login parameter;
determining a target time and a preset effective duration for a user to log in the first system according to the first login parameter;
calculating the failure time of the login state according to the target time and the preset effective duration;
and acquiring the current time of the first system, and determining the remaining duration of the validity period of the login state of the first system according to the expiration time and the current time.
5. The login processing method based on the cross-system as claimed in claim 1, wherein the method for obtaining the target jump duration comprises:
obtaining historical page jump information, and dividing the historical page jump information into a training set and a test set;
training an initial jump duration prediction model according to the training set to obtain a trained jump duration prediction model;
detecting whether the accurate value of the jump duration prediction model meets a preset accurate threshold range or not according to the test set;
when the detection result is that the accurate value of the jump duration prediction model meets a preset accurate threshold range, determining that the training of the jump duration prediction model is finished;
and acquiring the target jump duration based on the jump duration prediction model.
6. The cross-system based login processing method of claim 1, wherein the extending the validity period of the login state of the first system comprises:
acquiring the residual duration of the validity period and the target jump duration;
calculating the difference value between the residual time length of the validity period and the target jump time length;
and prolonging the valid period of the login state of the first system according to the difference.
7. The cross-system based login processing method according to claim 1, wherein after said login to said second system, said method comprises:
acquiring login information of a user;
determining page authentication information according to the login information;
and rendering the page of the second system according to the page authentication information.
8. A cross-system based login processing apparatus, the cross-system based login processing apparatus comprising:
the information acquisition module is used for acquiring second routing information of a second system associated with a target jump button when the target jump button on a first system is monitored to be triggered;
the information analysis module is used for analyzing the second routing information to obtain a second login parameter and detecting whether the login state of the second system is logged in or not according to the second login parameter;
the duration acquisition module is used for acquiring and analyzing the first routing information of the first system when the detection result shows that the login state of the second system is not logged in, so as to obtain the remaining duration of the validity period of the login state of the first system;
the duration detection module is used for detecting whether the remaining duration of the validity period meets a target jump duration or not;
the time prolonging module is used for prolonging the valid period of the login state of the first system and jumping to the second system according to the target jumping button when the detection result shows that the remaining duration of the valid period does not meet the target jumping duration;
and the system login module is used for logging in the second system.
9. A computer device comprising a processor for implementing a cross-system based login processing method of any one of claims 1 to 7 when executing a computer program stored in a memory.
10. A computer-readable storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the cross-system based login processing method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011285506.3A CN112491839B (en) | 2020-11-17 | 2020-11-17 | Cross-system-based login processing method and device, computer equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011285506.3A CN112491839B (en) | 2020-11-17 | 2020-11-17 | Cross-system-based login processing method and device, computer equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112491839A true CN112491839A (en) | 2021-03-12 |
CN112491839B CN112491839B (en) | 2022-10-21 |
Family
ID=74930693
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011285506.3A Active CN112491839B (en) | 2020-11-17 | 2020-11-17 | Cross-system-based login processing method and device, computer equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112491839B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114866455A (en) * | 2022-04-18 | 2022-08-05 | 北京凝思软件股份有限公司 | Construction method, system, terminal and medium for SSH multi-level jump path |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015062362A1 (en) * | 2013-11-01 | 2015-05-07 | 北京奇虎科技有限公司 | Method, device, and system for user login |
CN108241799A (en) * | 2018-01-31 | 2018-07-03 | 广州市全周至程软件技术有限公司 | cross-system access method, system, device and computer readable storage medium |
CN111181941A (en) * | 2019-12-23 | 2020-05-19 | 杭州安恒信息技术股份有限公司 | Page login method, system and related device |
-
2020
- 2020-11-17 CN CN202011285506.3A patent/CN112491839B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015062362A1 (en) * | 2013-11-01 | 2015-05-07 | 北京奇虎科技有限公司 | Method, device, and system for user login |
CN108241799A (en) * | 2018-01-31 | 2018-07-03 | 广州市全周至程软件技术有限公司 | cross-system access method, system, device and computer readable storage medium |
CN111181941A (en) * | 2019-12-23 | 2020-05-19 | 杭州安恒信息技术股份有限公司 | Page login method, system and related device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114866455A (en) * | 2022-04-18 | 2022-08-05 | 北京凝思软件股份有限公司 | Construction method, system, terminal and medium for SSH multi-level jump path |
Also Published As
Publication number | Publication date |
---|---|
CN112491839B (en) | 2022-10-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10885306B2 (en) | Living body detection method, system and non-transitory computer-readable recording medium | |
CN110602052B (en) | Micro-service processing method and server | |
CN110855676B (en) | Network attack processing method and device and storage medium | |
CN112468520B (en) | Data detection method, device and equipment and readable storage medium | |
US9934310B2 (en) | Determining repeat website users via browser uniqueness tracking | |
US10885167B1 (en) | Intrusion detection based on anomalies in access patterns | |
CN109614781B (en) | Account management method, system and terminal equipment | |
CN111625809B (en) | Data authorization method and device, electronic equipment and storage medium | |
CN111159697B (en) | Key detection method and device and electronic equipment | |
US11301522B1 (en) | Method and apparatus for collecting information regarding dark web | |
CN113037505B (en) | Method and system for realizing trusted Web application | |
CN112073709B (en) | Test data generation method and device and electronic equipment | |
CN112433705A (en) | Script generation method and device, electronic equipment and storage medium | |
CN112491839B (en) | Cross-system-based login processing method and device, computer equipment and medium | |
RU2734027C2 (en) | Method and device for preventing an attack on a server | |
KR101460916B1 (en) | User authentication method using one time password and user authentication device for using one time password | |
CN114979109B (en) | Behavior track detection method, behavior track detection device, computer equipment and storage medium | |
CN115659940A (en) | Template adjusting method based on SaaS system, driver information obtaining method and device | |
CN116405270A (en) | Triggering method, device, equipment and medium of login flow | |
CN115935310A (en) | Method, device, equipment and storage medium for detecting weak password in login page | |
CN113886263A (en) | System testing method, device, equipment and storage medium | |
CN111784352A (en) | Authentication risk identification method and device and electronic equipment | |
CN111178536B (en) | Data information processing method and device, electronic equipment and storage medium | |
CN114385985A (en) | Data processing method, device, equipment and storage medium | |
CN115277212B (en) | Website login method and device based on cookie semantic analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |