CN112511556A - User authentication state monitoring method, device and system - Google Patents
User authentication state monitoring method, device and system Download PDFInfo
- Publication number
- CN112511556A CN112511556A CN202011482422.9A CN202011482422A CN112511556A CN 112511556 A CN112511556 A CN 112511556A CN 202011482422 A CN202011482422 A CN 202011482422A CN 112511556 A CN112511556 A CN 112511556A
- Authority
- CN
- China
- Prior art keywords
- authentication
- user
- message
- server
- preset program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/141—Setup of application sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/143—Termination or inactivation of sessions, e.g. event-controlled end of session
- H04L67/145—Termination or inactivation of sessions, e.g. event-controlled end of session avoiding end of session, e.g. keep-alive, heartbeats, resumption message or wake-up for inactive or interrupted session
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/54—Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Cardiology (AREA)
- Health & Medical Sciences (AREA)
- Power Engineering (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Abstract
The disclosure relates to a user authentication state monitoring method, device, system, electronic equipment and computer readable medium. The method comprises the following steps: sending the authentication message to an authentication server; receiving an authentication success message from the authentication server; running a user state keep-alive page and a preset program based on the authentication success message; and monitoring the authentication state of the user based on the user state keep-alive page and the preset program. The user authentication state monitoring method, the device, the system, the electronic equipment and the computer readable medium can greatly reduce the requirement configuration of the server, reduce the resources occupied by the server, quickly carry out user offline and display the state of the user in real time.
Description
Technical Field
The present disclosure relates to the field of computer information processing, and in particular, to a method, an apparatus, a system, an electronic device, and a computer-readable medium for monitoring a user authentication status.
Background
In a traditional networking environment, a user can access a device or resource in a network as long as the user can access a local area network device, and in order to enhance security control and operation management of network resources, the access of the user needs to be controlled under many circumstances. When the Portal authentication system runs, after a user passes authentication, the server adds the user information and changes the user state into online, the server sends messages to each user at regular time by configuring the keep-alive period on the server, if the user is in the online state, the server replies the messages, the online state of the user is judged after the returned messages are received, and the offline state of the user is judged if the messages are not received. When a large number of users are online, the monitoring period of the server is configured according to the user quantity, the configuration of the server is required to be high, the resources occupied by the server in operation are very large, the whole keep-alive process is off, the state of the user who is off-line is updated slowly, the state displayed on the user on a page is not very accurate, and the user who is off-line needs to wait for the server to send a message next time and can change the message after the whole keep-alive process is finished.
Under the scheme, the configuration requirement of the server is high, after a large amount of user authentication is on line, the occupied resources of the server are more, the time consumption of the whole keep-alive processing flow is long, the updating of the off-line state of the user is slow, the user is possibly off-line, but the user state in the page display is still on line.
Therefore, a new method, apparatus, system, electronic device and computer readable medium for monitoring user authentication status are needed.
The above information disclosed in this background section is only for enhancement of understanding of the background of the disclosure and therefore it may contain information that does not constitute prior art that is already known to a person of ordinary skill in the art.
Disclosure of Invention
In view of this, the present disclosure provides a method, an apparatus, a system, an electronic device and a computer readable medium for monitoring a user authentication status, which can greatly reduce the requirement configuration of a server, reduce resources occupied by the server, and enable a user to be quickly offline and display the status of the user in real time.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to an aspect of the present disclosure, a method for monitoring a user authentication status is provided, which can be applied to a user side, and the method includes: sending the authentication message to an authentication server; receiving an authentication success message from the authentication server; running a user state keep-alive page and a preset program based on the authentication success message; and monitoring the authentication state of the user based on the user state keep-alive page and the preset program.
In an exemplary embodiment of the present disclosure, further comprising: and when the user state keep-alive page is closed, the preset program sends an exit request message to the authentication server.
In an exemplary embodiment of the present disclosure, further comprising: and after receiving an exit request success message returned by the authentication server, stopping the running of the preset program.
In an exemplary embodiment of the present disclosure, before sending the authentication packet to the authentication server, the method further includes: acquiring an account and a password according to an operation instruction of a user; and generating the authentication message based on the account and the password.
In an exemplary embodiment of the present disclosure, receiving an authentication success packet from the authentication server includes: and establishing communication connection with an external network based on the authentication success message so as to perform network access.
In an exemplary embodiment of the present disclosure, the running of the user state keep-alive page and the preset program based on the authentication success message includes: acquiring and displaying information of a user state keep-alive page by the authentication server based on the authentication success message; and downloading a preset program by the authentication server based on the authentication success message and running the preset program locally.
In an exemplary embodiment of the present disclosure, monitoring the authentication state of the user based on the user state keep-alive page and the preset program includes: and sending a confirmation message between the user state keep-alive page and the preset program at regular time so as to monitor the authentication state of the user.
According to an aspect of the present disclosure, a method for monitoring a user authentication status is provided, which is applicable to an authentication server, and the method includes: acquiring an authentication message from a user side; checking the authentication message; when the verification passes, generating an authentication success message, wherein the authentication success message comprises a user state keep-alive page and a preset program; and returning the successful authentication message to the user side to monitor the authentication state of the user.
In an exemplary embodiment of the present disclosure, further comprising: obtaining an exit request message by the user side; and disconnecting the network connection of the user side based on the quit request message.
In an exemplary embodiment of the present disclosure, further comprising: establishing the user state keep-alive page and the preset program; the user state keep-alive page and the preset program have an information interaction function, and the preset program is forbidden to be closed forcibly.
According to an aspect of the present disclosure, a user authentication status monitoring apparatus is provided, which is applicable to a user side, and the apparatus includes: the sending module is used for sending the authentication message to the authentication server; the receiving module is used for receiving an authentication success message from the authentication server; the operation module is used for operating the user state keep-alive page and the preset program based on the authentication success message; and the monitoring module is used for monitoring the authentication state of the user based on the user state keep-alive page and the preset program.
According to an aspect of the present disclosure, a user authentication status monitoring apparatus is provided, which is applicable to an authentication server, the apparatus including: the message module is used for acquiring an authentication message from a user side; the verification module is used for verifying the authentication message; the generating module is used for generating an authentication success message when the verification passes, wherein the authentication success message comprises a user state keep-alive page and a preset program; and the return module is used for returning the successful authentication message to the user side so as to monitor the authentication state of the user.
According to an aspect of the present disclosure, a user authentication status monitoring system is provided, the system including: the user side is used for sending the authentication message to the authentication server; receiving an authentication success message from the authentication server; running a user state keep-alive page and a preset program based on the authentication success message; monitoring the authentication state of the user based on the user state keep-alive page and the preset program; the authentication server is used for acquiring an authentication message from the user side; checking the authentication message; when the verification passes, generating an authentication success message, wherein the authentication success message comprises a user state keep-alive page and a preset program; and returning the successful authentication message to the user side.
According to an aspect of the present disclosure, an electronic device is provided, the electronic device including: one or more processors; storage means for storing one or more programs; when executed by one or more processors, cause the one or more processors to implement a method as above.
According to an aspect of the disclosure, a computer-readable medium is proposed, on which a computer program is stored, which program, when being executed by a processor, carries out the method as above.
According to the user authentication state monitoring method, device, system, electronic equipment and computer readable medium disclosed by the invention, the authentication message is sent to the authentication server; receiving an authentication success message from the authentication server; running a user state keep-alive page and a preset program based on the authentication success message; based on the user state keep-alive page and the mode that the preset program monitors the authentication state of the user, the demand configuration of the server can be greatly reduced, the resources occupied by the server are reduced, the user can be quickly off-line, and the state of the user can be displayed in real time.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings. The drawings described below are merely some embodiments of the present disclosure, and other drawings may be derived from those drawings by those of ordinary skill in the art without inventive effort.
Fig. 1 is a system block diagram illustrating a user authentication status monitoring system according to an exemplary embodiment.
Fig. 2 is a flowchart illustrating a user authentication status monitoring method according to an example embodiment.
Fig. 3 is a flowchart illustrating a user authentication status monitoring method according to another exemplary embodiment.
Fig. 4 is a flowchart illustrating a user authentication status monitoring method according to another exemplary embodiment.
Fig. 5 is a block diagram illustrating a user authentication status monitoring apparatus according to an exemplary embodiment.
Fig. 6 is a block diagram illustrating a user authentication status monitoring apparatus according to another exemplary embodiment.
FIG. 7 is a block diagram illustrating an electronic device in accordance with an example embodiment.
FIG. 8 is a block diagram illustrating a computer-readable medium in accordance with an example embodiment.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus, a repetitive description thereof will be omitted.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, devices, systems, implementations, or operations have not been shown or described in detail to avoid obscuring aspects of the disclosure.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various components, these components should not be limited by these terms. These terms are used to distinguish one element from another. Thus, a first component discussed below may be termed a second component without departing from the teachings of the disclosed concept. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
It is to be understood by those skilled in the art that the drawings are merely schematic representations of exemplary embodiments, and that the blocks or processes shown in the drawings are not necessarily required to practice the present disclosure and are, therefore, not intended to limit the scope of the present disclosure.
Fig. 1 is a system block diagram illustrating a user authentication status monitoring system according to an exemplary embodiment.
As shown in fig. 1, the system architecture 10 may include clients 101, 102, 103, a network 104, and a server 105. The network 104 is used to provide a medium for communication links between the user terminals 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user can interact with the server 105 via the network 104 by means of the user terminals 101, 102, 103 for authentication and then network access after authentication. The user terminals 101, 102, 103 may have various communication client applications installed thereon, such as a shopping application, a web browser application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The user terminals 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background authentication server providing support for the clients 101, 102, 103. The background authentication server may analyze and perform other processing on the received authentication packet, and feed back a processing result (e.g., a successful authentication packet) to the terminal device.
The user terminal 101, 102, 103 may for example send an authentication message to the authentication server; the user terminal 101, 102, 103 may for example receive an authentication success message from the authentication server; the user terminals 101, 102, 103 can run a user state keep-alive page and a preset program based on the authentication success message, for example; the user terminals 101, 102, 103 can monitor the authentication status of the user based on the user status keep-alive page and the preset program, for example.
The user side 101, 102, 103 may also send an exit request message to the authentication server by the preset program, for example, when the user state keep-alive page is closed.
The user side 101, 102, 103 may also stop the running of the preset program, for example, after receiving the exit request success message returned by the authentication server.
The server 105 may, for example, obtain an authentication message from the user side; the server 105 may, for example, check the authentication message; the server 105 may generate an authentication success message including the user state keep-alive page and the preset program, for example, when the verification passes; the server 105 may, for example, return the authentication success message to the user side to monitor the authentication status of the user.
The server 105 may also obtain an exit request message, for example, from the user side; and disconnecting the network connection of the user side based on the quit request message.
The server 105 may be a physical server, or may be composed of a plurality of servers, for example, it should be noted that the user authentication status monitoring method provided by the embodiment of the present disclosure may be executed by the user terminals 101, 102, 103 and the server 105, and accordingly, the user authentication status monitoring apparatus may be disposed in the user terminals 101, 102, 103 and the server 105.
Fig. 2 is a flowchart illustrating a user authentication status monitoring method according to an example embodiment. The user authentication status monitoring method 20 is applicable to a user side and at least includes steps S202 to S210.
As shown in fig. 2, in S202, the authentication message is sent to the authentication server. The account number and the password can be acquired according to the operation instruction of the user; and generating the authentication message based on the account and the password. The authentication message can be a message based on a Portal authentication mode.
In S204, an authentication success message from the authentication server is received. A communication connection may also be established with an external network for network access, for example, based on the authentication success message.
In S206, the user state keep-alive page and the preset program are executed based on the authentication success message. The method specifically comprises the following steps: acquiring and displaying information of a user state keep-alive page by the authentication server based on the authentication success message; and downloading a preset program by the authentication server based on the authentication success message and running the preset program locally.
In S208, the authentication status of the user is monitored based on the user status keep-alive page and the preset program. And sending a confirmation message between the user state keep-alive page and the preset program at regular time so as to monitor the authentication state of the user.
In S210, when the user state keep-alive page is closed, the preset program sends an exit request message to the authentication server.
In one embodiment, further comprising: and after receiving an exit request success message returned by the authentication server, stopping the running of the preset program.
In the user authentication state monitoring method, after the user is authenticated, the keep-alive verification is locally carried out, the server does not send messages to the authenticated user at regular time to confirm whether the user is online, after the user is found to be offline, the user sends messages to the server to inform the server that the authenticated user is offline and modify the online state of the user, and the online state of the user can be updated immediately when the user is offline.
According to the user authentication state monitoring method, the authentication message is sent to the authentication server; receiving an authentication success message from the authentication server; running a user state keep-alive page and a preset program based on the authentication success message; based on the user state keep-alive page and the mode that the preset program monitors the authentication state of the user, the demand configuration of the server can be greatly reduced, the resources occupied by the server are reduced, the user can be quickly off-line, and the state of the user can be displayed in real time.
It should be clearly understood that this disclosure describes how to make and use particular examples, but the principles of this disclosure are not limited to any details of these examples. Rather, these principles can be applied to many other embodiments based on the teachings of the present disclosure.
Fig. 3 is a flowchart illustrating a user authentication status monitoring method according to another exemplary embodiment. The user authentication status monitoring method 30 is applicable to an authentication server, and includes at least steps S32 to S308.
As shown in fig. 3, in S302, an authentication message from a user side is acquired. The authentication message can be a message for Portal authentication.
In S304, the authentication packet is verified. And checking based on the user name and the password in the authentication message.
In S306, when the verification passes, an authentication success message is generated, where the authentication success message includes the user state keep-alive page and the preset program.
In one embodiment, further comprising: establishing the user state keep-alive page and the preset program; the user state keep-alive page and the preset program have an information interaction function, and the preset program is forbidden to be closed forcibly.
In S308, the authentication success message is returned to the user side to monitor the authentication state of the user. When the user passes the authentication, the server adds the user information and changes the user state to online, the server returns an authentication success message to the user, after the user receives the authentication success message, a user state keep-alive page is popped up, the keep-alive page represents that the user is in the online state, if the page is closed, the user is off-line,
in S310, the network connection of the ue is disconnected based on the exit request message of the ue. After the request disconnection message sent by the user side is obtained, the state of the user on the authentication server is changed into the offline state.
Fig. 4 is a flowchart illustrating a user authentication status monitoring method according to another exemplary embodiment. The flow 40 shown in fig. 4 is a detailed description of the overall process of the user authentication status monitoring method.
As shown in fig. 4, in S402, the user side authentication is successful. A user sends an authentication message to a server, the authentication message represents that the user wants to perform network information interaction through the server, and the message comprises user information (account password request authentication and the like); and after the authentication is passed, allowing the user to access the network.
In S404, the server returns an authentication success message, pops up a user state keep-alive page, and automatically downloads and runs an exe or other executable program, which does not allow the user to forcibly close or end, and when the user has run the exe, actively ends the old exe and runs a new exe.
In S406, the keep-alive page and the locally executed preset exe program periodically send a confirmation message. And confirming that the user is in an online state, starting the keep-alive page, and sending an exit request message to the server if the keep-alive page is closed.
In S408, the preset program determines whether the keep-alive page has closed based on the confirmation message.
In S410, an exit request is sent to the authentication server. The local exe program of the user sends an exit request message to the server, wherein the message contains user information (account password exit request and the like) which represents that the user finishes the network information interaction behavior and disconnects the network connection.
In S412, whether or not the exit is successful.
In S414, the exit is successful, and the preset routine is ended. The method comprises the steps that a confirmation message is sent between a keep-alive page and an exe program executed locally ceaselessly, the exe program confirms whether the keep-alive page is closed or not after receiving a message sent by the keep-alive page, if the keep-alive page is not closed, the user is still in an online state, if the keep-alive page is closed, an exit request message is sent to a server by the exe program, the server receives the exit request message and then carries out offline processing on the user, then the message sent by the exe is sent to inform a processing result, the exe receives the message sent by the server to carry out processing judgment, if the offline processing of the user is successful, the exe program is ended, and if the offline processing of the user is failed, the exe program continues to.
All the processes of judging the online state of the user are executed locally, and the server only manages to receive an exit request message sent by the user in the user authentication offline process, removes the user from the network connection, modifies the online state of the user, and sends the processing result to the user.
According to the user authentication state monitoring method, after a user receives an authentication success message, a user state keep-alive page is popped up, an exe and other executable programs are automatically downloaded and run, a confirmation message is sent continuously between the keep-alive page and the locally executed exe program, and after the exe program receives a message sent by the keep-alive page, whether the keep-alive page is closed or not is confirmed. And if the keep-alive page is closed, sending an exit request message to the server by the exe program, and performing offline processing on the user after the server receives the exit request message.
The user authentication state monitoring method disclosed by the invention is realized by distributing the monitoring work of the original server to the local of each authenticated user, so that the configuration requirement of a Portal authentication system on the server is greatly reduced, the authentication state of the user can be updated quickly, and the change of the real-time state is basically realized. Through the local keep-alive mechanism, the demand configuration of the server is greatly reduced, the resources occupied by the server are reduced, the user can be quickly off-line, and the state of the user is displayed in real time.
Those skilled in the art will appreciate that all or part of the steps implementing the above embodiments are implemented as computer programs executed by a CPU. When executed by the CPU, performs the functions defined by the above-described methods provided by the present disclosure. The program may be stored in a computer readable storage medium, which may be a read-only memory, a magnetic or optical disk, or the like.
Furthermore, it should be noted that the above-mentioned figures are only schematic illustrations of the processes involved in the methods according to exemplary embodiments of the present disclosure, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods. For details not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method of the present disclosure.
Fig. 5 is a block diagram illustrating a user authentication status monitoring apparatus according to an exemplary embodiment. As shown in fig. 5, the user authentication status monitoring apparatus 50 may be used for a user terminal, and includes: the sending module 502, the receiving module 504, the running module 506, the monitoring module 508, and the user authentication status monitoring apparatus 50 may further include: exit module 510.
The sending module 502 is configured to send the authentication packet to the authentication server;
the receiving module 504 is configured to receive an authentication success message from the authentication server;
the running module 506 is configured to run a user state keep-alive page and a preset program based on the authentication success message;
the monitoring module 508 is configured to monitor the authentication status of the user based on the user status keep-alive page and the preset program.
The exit module 510 is configured to send an exit request message to the authentication server by the preset program when the user state keep-alive page is closed.
Fig. 6 is a block diagram illustrating a user authentication status monitoring apparatus according to another exemplary embodiment. As shown in fig. 6, the user authentication state monitoring apparatus 60 may be used for an authentication server, and includes: the message module 602, the verification module 604, the generation module 606, and the return module 608, the user authentication status monitoring apparatus 60 may further include: a disconnect module 610.
The message module 602 is configured to obtain an authentication message from a user side;
the checking module 604 is configured to check the authentication packet;
the generating module 606 is configured to generate an authentication success message when the verification passes, where the authentication success message includes a user state keep-alive page and a preset program;
the returning module 608 is configured to return the authentication success message to the user side to monitor the authentication state of the user.
The disconnection module 610 is configured to disconnect a network connection of the user side based on an exit request packet of the user side.
According to the user authentication state monitoring device, the authentication message is sent to the authentication server; receiving an authentication success message from the authentication server; running a user state keep-alive page and a preset program based on the authentication success message; based on the user state keep-alive page and the mode that the preset program monitors the authentication state of the user, the demand configuration of the server can be greatly reduced, the resources occupied by the server are reduced, the user can be quickly off-line, and the state of the user can be displayed in real time.
FIG. 7 is a block diagram illustrating an electronic device in accordance with an example embodiment.
An electronic device 700 according to this embodiment of the disclosure is described below with reference to fig. 7. The electronic device 700 shown in fig. 7 is only an example and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 7, electronic device 700 is embodied in the form of a general purpose computing device. The components of the electronic device 700 may include, but are not limited to: at least one processing unit 710, at least one memory unit 720, a bus 730 that connects the various system components (including the memory unit 720 and the processing unit 710), a display unit 740, and the like.
Wherein the storage unit stores program code that can be executed by the processing unit 710 to cause the processing unit 710 to perform the steps according to various exemplary embodiments of the present disclosure described in this specification. For example, the processing unit 710 may perform the steps as shown in fig. 2, 3, 4.
The memory unit 720 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM)7201 and/or a cache memory unit 7202, and may further include a read only memory unit (ROM) 7203.
The memory unit 720 may also include a program/utility 7204 having a set (at least one) of program modules 7205, such program modules 7205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
The electronic device 700 may also communicate with one or more external devices 700' (e.g., keyboard, pointing device, bluetooth device, etc.), such that a user can communicate with devices with which the electronic device 700 interacts, and/or any devices (e.g., router, modem, etc.) with which the electronic device 700 can communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 750. Also, the electronic device 700 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the internet) via the network adapter 760. The network adapter 760 may communicate with other modules of the electronic device 700 via the bus 730. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 700, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, as shown in fig. 8, the technical solution according to the embodiment of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, or a network device, etc.) to execute the above method according to the embodiment of the present disclosure.
The software product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The computer readable medium carries one or more programs which, when executed by a device, cause the computer readable medium to perform the functions of: sending the authentication message to an authentication server; receiving an authentication success message from the authentication server; running a user state keep-alive page and a preset program based on the authentication success message; and monitoring the authentication state of the user based on the user state keep-alive page and the preset program.
Those skilled in the art will appreciate that the modules described above may be distributed in the apparatus according to the description of the embodiments, or may be modified accordingly in one or more apparatuses unique from the embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Exemplary embodiments of the present disclosure are specifically illustrated and described above. It is to be understood that the present disclosure is not limited to the precise arrangements, instrumentalities, or instrumentalities described herein; on the contrary, the disclosure is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.
Claims (13)
1. A user authentication state monitoring method can be applied to a user side, and is characterized by comprising the following steps:
sending the authentication message to an authentication server;
receiving an authentication success message from the authentication server;
running a user state keep-alive page and a preset program based on the authentication success message;
and monitoring the authentication state of the user based on the user state keep-alive page and the preset program.
2. The method of claim 1, further comprising:
and when the user state keep-alive page is closed, the preset program sends an exit request message to the authentication server.
3. The method of claim 2, further comprising:
and after receiving an exit request success message returned by the authentication server, stopping the running of the preset program.
4. The method of claim 1, wherein prior to sending the authentication message to the authentication server, further comprising:
acquiring an account and a password according to an operation instruction of a user;
and generating the authentication message based on the account and the password.
5. The method of claim 1, wherein receiving an authentication success message from the authentication server comprises:
and establishing communication connection with an external network based on the authentication success message so as to perform network access.
6. The method of claim 1, wherein running a user state keep-alive page and a pre-set program based on the authentication success message comprises:
acquiring and displaying information of a user state keep-alive page by the authentication server based on the authentication success message;
and downloading a preset program by the authentication server based on the authentication success message and running the preset program locally.
7. The method of claim 1, wherein monitoring the authentication status of the user based on the user status keep-alive page and the pre-set program comprises:
and sending a confirmation message between the user state keep-alive page and the preset program at regular time so as to monitor the authentication state of the user.
8. A user authentication state monitoring method can be applied to an authentication server, and is characterized by comprising the following steps:
acquiring an authentication message from a user side;
checking the authentication message;
when the verification passes, generating an authentication success message, wherein the authentication success message comprises a user state keep-alive page and a preset program;
and returning the successful authentication message to the user side to monitor the authentication state of the user.
9. The method of claim 8, further comprising:
obtaining an exit request message by the user side;
and disconnecting the network connection of the user side based on the quit request message.
10. The method of claim 8, further comprising:
establishing the user state keep-alive page and the preset program;
the user state keep-alive page and the preset program have an information interaction function, and the preset program is forbidden to be closed forcibly.
11. A user authentication status monitoring device, which can be applied to a user side, comprises:
the sending module is used for sending the authentication message to the authentication server;
the receiving module is used for receiving an authentication success message from the authentication server;
the operation module is used for operating the user state keep-alive page and the preset program based on the authentication success message;
and the monitoring module is used for monitoring the authentication state of the user based on the user state keep-alive page and the preset program.
12. A user authentication state monitoring device, which can be applied to an authentication server, is characterized by comprising:
the message module is used for acquiring an authentication message from a user side;
the verification module is used for verifying the authentication message;
the generating module is used for generating an authentication success message when the verification passes, wherein the authentication success message comprises a user state keep-alive page and a preset program;
and the return module is used for returning the successful authentication message to the user side so as to monitor the authentication state of the user.
13. A user authentication status monitoring system, comprising:
the user side is used for sending the authentication message to the authentication server; receiving an authentication success message from the authentication server; running a user state keep-alive page and a preset program based on the authentication success message; monitoring the authentication state of the user based on the user state keep-alive page and the preset program;
the authentication server is used for acquiring an authentication message from the user side; checking the authentication message; when the verification passes, generating an authentication success message, wherein the authentication success message comprises a user state keep-alive page and a preset program; and returning the successful authentication message to the user side.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011482422.9A CN112511556B (en) | 2020-12-16 | 2020-12-16 | User authentication state monitoring method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011482422.9A CN112511556B (en) | 2020-12-16 | 2020-12-16 | User authentication state monitoring method, device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112511556A true CN112511556A (en) | 2021-03-16 |
CN112511556B CN112511556B (en) | 2023-04-07 |
Family
ID=74972257
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011482422.9A Active CN112511556B (en) | 2020-12-16 | 2020-12-16 | User authentication state monitoring method, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112511556B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1571366A (en) * | 2003-07-23 | 2005-01-26 | 华为技术有限公司 | Method for monitoring user connection state |
US20060258417A1 (en) * | 2005-05-13 | 2006-11-16 | Yahoo! Inc. | Mapping online service user id to portal user id |
CN101360021A (en) * | 2008-10-14 | 2009-02-04 | 中国电信股份有限公司 | Monitoring method and system for wireless wideband user status |
US20160127395A1 (en) * | 2014-10-31 | 2016-05-05 | Cyber Crucible Inc. | System and method for network intrusion detection of covert channels based on off-line network traffic |
CN109327468A (en) * | 2018-11-22 | 2019-02-12 | 杭州迪普科技股份有限公司 | A kind of offline reminding method, device, equipment and storage medium |
CN109698832A (en) * | 2018-12-28 | 2019-04-30 | 杭州迪普科技股份有限公司 | The method and relevant device that Portal certification is quickly provided, quickly pops up Portal certification page |
CN111092904A (en) * | 2019-12-27 | 2020-05-01 | 杭州迪普科技股份有限公司 | Network connection method and device |
CN111866029A (en) * | 2020-08-20 | 2020-10-30 | 杭州迪普科技股份有限公司 | Access server authentication offline method and system |
-
2020
- 2020-12-16 CN CN202011482422.9A patent/CN112511556B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1571366A (en) * | 2003-07-23 | 2005-01-26 | 华为技术有限公司 | Method for monitoring user connection state |
US20060258417A1 (en) * | 2005-05-13 | 2006-11-16 | Yahoo! Inc. | Mapping online service user id to portal user id |
CN101360021A (en) * | 2008-10-14 | 2009-02-04 | 中国电信股份有限公司 | Monitoring method and system for wireless wideband user status |
US20160127395A1 (en) * | 2014-10-31 | 2016-05-05 | Cyber Crucible Inc. | System and method for network intrusion detection of covert channels based on off-line network traffic |
CN109327468A (en) * | 2018-11-22 | 2019-02-12 | 杭州迪普科技股份有限公司 | A kind of offline reminding method, device, equipment and storage medium |
CN109698832A (en) * | 2018-12-28 | 2019-04-30 | 杭州迪普科技股份有限公司 | The method and relevant device that Portal certification is quickly provided, quickly pops up Portal certification page |
CN111092904A (en) * | 2019-12-27 | 2020-05-01 | 杭州迪普科技股份有限公司 | Network connection method and device |
CN111866029A (en) * | 2020-08-20 | 2020-10-30 | 杭州迪普科技股份有限公司 | Access server authentication offline method and system |
Also Published As
Publication number | Publication date |
---|---|
CN112511556B (en) | 2023-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109347855B (en) | Data access method, device, system, electronic design and computer readable medium | |
CN113179323B (en) | HTTPS request processing method, device and system for load balancing equipment | |
CN109447712B (en) | Consultation method, consultation device, electronic equipment and storage medium | |
CN114500614B (en) | Satellite telemetry data processing method and device, electronic equipment and readable medium | |
CN111191200B (en) | Three-party linkage authentication page display method and device and electronic equipment | |
CN112346803A (en) | Remote assistance method, device and system and electronic equipment | |
CN110333866B (en) | Method and device for generating receiving page and electronic equipment | |
CN111612504A (en) | Information sending method and device for task completion user and electronic equipment | |
CN111046010A (en) | Log storage method, device, system, electronic equipment and computer readable medium | |
CN112347383A (en) | Sharing link generation method and device and electronic equipment | |
CN109491721A (en) | Method and apparatus for load information | |
CN112394907A (en) | Container-based delivery system construction method, application delivery method and delivery system | |
CN112491940B (en) | Request forwarding method and device of proxy server, storage medium and electronic equipment | |
CN111526039A (en) | Electronic equipment opening method and device, electronic equipment and computer readable medium | |
CN112511556B (en) | User authentication state monitoring method, device and system | |
CN116112172B (en) | Android client gRPC interface security verification method and device | |
CN114449523B (en) | Flow filtering method, device, equipment and medium for satellite measurement and control system | |
CN113722007B (en) | Configuration method, device and system of VPN branch equipment | |
CN112131095A (en) | Pressure testing method and device | |
CN113079085B (en) | Business service interaction method, business service interaction device, business service interaction equipment and storage medium | |
CN114726556A (en) | WAF management method, device, system, electronic equipment and readable medium | |
CN114417318A (en) | Third-party page jumping method and device and electronic equipment | |
CN112347382A (en) | Product page sharing method and device and electronic equipment | |
CN111722986A (en) | Software performance monitoring method and device | |
CN113760727A (en) | Interface regression testing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |