CN112600813A - UKEY-based multi-application unified authentication method - Google Patents

UKEY-based multi-application unified authentication method Download PDF

Info

Publication number
CN112600813A
CN112600813A CN202011421209.7A CN202011421209A CN112600813A CN 112600813 A CN112600813 A CN 112600813A CN 202011421209 A CN202011421209 A CN 202011421209A CN 112600813 A CN112600813 A CN 112600813A
Authority
CN
China
Prior art keywords
authentication
user
ukey
application
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011421209.7A
Other languages
Chinese (zh)
Other versions
CN112600813B (en
Inventor
周显敬
刘虎
汪寒雨
沈人杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Zhuoer Information Technology Co ltd
Original Assignee
Wuhan Zhuoer Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Zhuoer Information Technology Co ltd filed Critical Wuhan Zhuoer Information Technology Co ltd
Priority to CN202011421209.7A priority Critical patent/CN112600813B/en
Publication of CN112600813A publication Critical patent/CN112600813A/en
Application granted granted Critical
Publication of CN112600813B publication Critical patent/CN112600813B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a unified authentication method for multiple applications based on UKEY, which comprises the following steps: receiving an authentication request initiated by a user through a login page through an authentication center, calling an authentication middleware to communicate with a UKEY, verifying the authentication request of the user, and notifying a security credential module to generate a security credential corresponding to the user after the verification is passed; receiving user identity authentication requests of one or more application systems through an application authentication agent, and acquiring a security certificate of a current user from a security certificate module; and issuing a request for acquiring the identity information to a management center by using the security certificate of the user, acquiring a request result and providing the required user identity information data for the application system. The invention manages the application system and the user information through the management center, and the authorization, the safety certificate and other identity information of the user are provided by the application authentication agent, thereby isolating the user authentication step, reducing the interaction between the application system and the authentication center, and safely and reliably ensuring the authentication process of the information system.

Description

UKEY-based multi-application unified authentication method
Technical Field
The invention belongs to the field of secret-related information systems, and particularly relates to a unified multi-application authentication method based on UKEY.
Background
With the technical development of the internet industry, the service application functions of the confidential information system are continuously increased, such as a scheduling system, a payment system, a multimedia platform and the like, when a user needs to use a plurality of systems, the user needs to input an account password for verification every time, and much inconvenience is brought to the user.
The common method is that after a user logs in an application system once, a plurality of application systems share session information through a single sign-on mechanism, so that the problem of multiple login is solved. If the user accesses the application system A, the user jumps to the authentication center to log in, returns an authenticated security credential to the user after logging in, transmits the security credential to the user B when the user accesses the application system B again, and transmits the credential to the authentication center to be verified again by the user B, so that switching between the application systems is completed.
The prior art has limitations in the following two aspects on the basis of solving the problem of repeated login of a user:
on the network communication level, the interaction process of a plurality of application systems and an authentication center is added, so that the performance problem of the authentication server is indirectly caused;
on the security level, the security credentials generated by user authentication participate in information interaction between application systems, and on the application level, there is a risk of packet capturing and decryption.
Disclosure of Invention
In view of this, the present invention provides a unified authentication method for multiple applications based on UKEY, which is used to solve the problem in the prior art that when multiple application systems interact with an authentication center, the security is reduced due to too many interaction processes.
The invention discloses a unified authentication method for multiple applications based on UKEY, which comprises the following steps:
receiving an authentication request initiated by a user through a login page through an authentication center, calling an authentication middleware to communicate with a UKEY, verifying the authentication request of the user, and notifying a security credential module to generate a security credential corresponding to the user after the verification is passed;
receiving user identity authentication requests of one or more application systems through an application authentication agent, and acquiring a security certificate of a current user from a security certificate module;
and issuing a request for acquiring the identity information to a management center by using the security certificate of the user, acquiring a request result and providing the required user identity information data for the application system.
Preferably, the authentication middleware is configured to establish a communication channel from the authentication center to the UKEY, the invoking authentication middleware is configured to communicate with the UKEY, and the verifying of the authentication request of the user specifically includes:
when the authentication middleware monitors that the UKEY equipment is inserted/pulled out, scanning the UKEY equipment, reading a local service configuration table, acquiring a unique UKEY identifier, a UKEY manufacturer and other information, and updating a UKEY list; the local service configuration table is used for recording the mapping relation among a UKEY manufacturer, a UKEY driving library path and an adaptive library path corresponding to the UKEY driving;
the authentication middleware receives an identity authentication request sent by an authentication center, indexes UKEY from a UKEY list according to a unique UKEY identifier, positions a communication channel corresponding to the UKEY, forwards the request to a UKEY driving adaptation library, returns an identity authentication request result to the authentication center through the identity authentication request processed by a UKEY equipment driving if the UKEY is not authenticated, and directly passes authentication if the UKEY is authenticated.
Preferably, the security credential module is configured to generate and record security credentials that have passed authentication of the user, maintain a life cycle of each security credential, and notify the authentication center to remove the security credentials of the user when the life cycle of the security credentials of the user is completed; the end of the life cycle of the security certificate of the user means that the user logs out through the application system or the security certificate is overtime.
Preferably, the management center is configured to record and maintain an association relationship between the user identity information and the application system, receive, through the management page, a request for obtaining the identity information sent by the application authentication agent, and feed back a request result based on the user security credential authentication result.
Preferably, the management center specifically includes an application management center and an identity management center, and the application management center and the identity management center record the association relationship between the user identity information and the application system.
Preferably, the receiving, by the application authentication agent, a user identity authentication request of one or more application systems, and acquiring the security credential of the current user from the security credential module specifically includes:
receiving a user identity authentication request of an application system, and attempting to read a security certificate of a current user from a security certificate module;
if the security certificate of the current user is expired, returning failure, and informing the application system to redirect to a login page; and if the security certificate of the current user is not expired, acquiring the security certificate of the corresponding user.
Preferably, the application authentication agent sends a request for acquiring identity information to the management center by using the security certificate of the corresponding user; the management center sends a request for verifying the security certificate to the authentication center through the management page, after receiving a verification passing notice fed back by the authentication center, the management center returns user identity information data to the application authentication agent through the management page, and the application authentication agent returns corresponding user identity information data for the application system.
Compared with the prior art, the invention has the following beneficial effects:
the invention manages the application system and the user information through the management center, realizes the unified authentication authorization management of various applications, and can maintain the life cycle of user login; the application system does not need to pay attention to the process of system authentication, and the authorization, the security certificate and other identity information of the user are provided by the application authentication agent, so that the effects of isolating the step of user authentication and reducing the interaction between the application system and the authentication center are achieved, the performance of the authentication server is improved, meanwhile, the security certificate generated by the user authentication is reduced to participate in the information interaction between the application systems, the risk of packet capturing is reduced, and the authentication process of the information system is safely and reliably ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic structural diagram of a UKEY-based multi-application authentication system according to the present invention;
fig. 2 is a schematic flow chart of a multi-application authentication method based on UKEY according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
Referring to fig. 1, a schematic diagram of a mechanism of a UKEY-based multi-application unified authentication system according to the present invention includes: the system comprises an authentication center 1, a security certificate module 2, an application authentication agent 3, a management center 4 and an authentication middleware 5;
the authentication center 1 is used for receiving an authentication request initiated by a user through a login page, calling authentication middleware to communicate with the UKEY, verifying the authentication request of the user, and informing the security credential module to generate a security credential corresponding to the user after the verification is passed;
the security certificate module 2 is used for recording the security certificates which pass the authentication of the users and maintaining the life cycle of each security certificate; when the life cycle of the security certificate of the user is finished, informing the authentication center to remove the security certificate of the user; the end of the life cycle of the security certificate of the user means that the user logs out through the application system or the security certificate is overtime.
The application authentication agent 3 is used for processing user identity authentication requests of all application systems in a centralized manner, verifying the security credentials of the user, issuing a request for acquiring identity information to a management center by using the security credentials of the user, acquiring a request result and providing required user identity information data for the application systems;
the certificate acquisition unit is used for receiving a user identity authentication request of the application system, trying to read the security certificate of the current user from the security certificate module, if the security certificate of the current user is expired, returning failure, and informing the application system of redirecting to a login page; if the security certificate of the current user is not expired, acquiring the security certificate of the corresponding user;
the data feedback unit is used for issuing an identity information acquisition request to the management center by using the security certificate of the corresponding user to acquire a request result; the request result is a request for the management center to send a verification security certificate to the authentication center through the management page, and the verification result obtained from the authentication center is user identity information data returned for the application system after passing.
And the management center 4 is used for recording and maintaining the incidence relation between the user identity information and the application system, receiving a request for acquiring the identity information sent by the application authentication agent through the management page, and feeding back a request result based on the authentication result of the user security certificate. The management center specifically comprises an application management center and an identity management center, and the application management center and the identity management center record the incidence relation between the user identity information and the application system.
And the authentication middleware 5 is used for building a communication channel from the authentication center to the UKEY and is used as a connecting bridge between the authentication center and the UKEY equipment. The authentication middleware specifically includes: the system comprises a scheduling unit 5-1, a monitoring unit 5-2 and a communication assembly 5-3;
the scheduling unit 5-1 is used for constructing a UKEY memory data structure, constructing and maintaining a UKEY list and a service configuration list, recording the authentication state about the identity authority, receiving an interface request of an authentication center and a notification of a monitoring module, and performing corresponding scheduling processing; the scheduling module specifically includes:
the system comprises a service configuration table subunit, a service configuration table updating unit and a service configuration table updating unit, wherein the service configuration table is used for recording the mapping relation among a UKEY manufacturer, a UKEY driving library path and an adaptation library path corresponding to a UKEY drive;
the UKEY list subunit is used for scanning the UKEY through the communication component when receiving the UKEY equipment insertion/extraction notification of the monitoring module, reading the service configuration table, acquiring a unique identifier of the UKEY, a UKEY manufacturer and other information, and updating the UKEY list;
the application interaction subunit is used for interacting with the authentication center in an interface mode, receiving an identity authentication request sent by the authentication center, indexing UKEY from a UKEY list according to the unique UKEY identifier, positioning a communication channel corresponding to the UKEY, sending the request to a UKEY driving adaptation library, acquiring an identity authentication request result processed by a UKEY device driver if the UKEY is not authenticated, returning the request result to the authentication center, and directly passing authentication if the UKEY is authenticated.
The monitoring unit 5-2 is used for monitoring the plugging and unplugging of the UKEY equipment, and informing the scheduling module when the UKEY equipment is plugged or unplugged;
and the communication component 5-3 is used for integrating the drive of the UKEY equipment to form a corresponding adaptation library so as to realize butt joint communication with a COS system of the UKEY equipment.
Referring to fig. 2, based on the system shown in fig. 1, the present invention provides a unified authentication method for multiple applications based on UKEY, the method includes:
s1, the administrator performs the related configuration of the application system and the user identity on the management center through the management page;
s2, the user initiates an authentication request through the login page, the authentication center receives the authentication request initiated by the user through the login page, calls the authentication middleware to communicate with the UKEY, verifies the authentication request of the user, and informs the security credential module to generate the security credential corresponding to the user after the verification is passed;
the authentication middleware is used for building a communication channel from the authentication center to the UKEY, the authentication middleware is called to communicate with the UKEY, and the authentication request of the verification user specifically comprises the following steps:
when the authentication middleware monitors that the UKEY equipment is inserted/pulled out, scanning the UKEY equipment, reading a local service configuration table, acquiring a unique UKEY identifier, a UKEY manufacturer and other information, and updating a UKEY list; the local service configuration table is used for recording the mapping relation among a UKEY manufacturer, a UKEY driving library path and an adaptive library path corresponding to the UKEY driving;
the authentication middleware receives an identity authentication request sent by an authentication center, indexes UKEY from a UKEY list according to a unique UKEY identifier, positions a communication channel corresponding to the UKEY, forwards the request to a UKEY driving adaptation library, returns an identity authentication request result to the authentication center through the identity authentication request processed by a UKEY equipment driving if the UKEY is not authenticated, and directly passes authentication if the UKEY is authenticated. Specifically, the security credential module is configured to generate and record security credentials that have passed authentication of a user, maintain a life cycle of each security credential, and notify the authentication center to remove the security credentials of the user when the life cycle of the security credentials of the user is completed; the end of the life cycle of the security certificate of the user means that the user logs out through the application system or the security certificate is overtime.
S3, receiving user identity authentication requests of one or more application systems through the application authentication agent, and acquiring the security credentials of the current user from the security credential module;
specifically, a user identity authentication request of an application system is received, and a security certificate of a current user is tried to be read from a security certificate module; if the security certificate of the current user is expired, returning failure, and informing the application system to redirect to a login page; and if the security certificate of the current user is not expired, acquiring the security certificate of the corresponding user.
S4, issuing a request for obtaining identity information to the management center by using the security certificate of the user, obtaining the request result and providing the required user identity information data for the application system.
The management center records and maintains the incidence relation between the user identity information and the application system, receives the request for acquiring the identity information sent by the application authentication agent through the management page, and feeds back the request result to the application authentication agent based on the user security certificate authentication result. Specifically, an identity information request is sent to a management center by using a security certificate of a corresponding user, and a request result is obtained; the management center comprises an application management center and an identity management center, and records the incidence relation between the user identity information and the application system; and the request result is that the management center sends a request for verifying the security certificate to the authentication center through the management page, and after receiving a verification passing notice fed back by the authentication center, the management center returns user identity information data for the application system through the management page.
The invention provides a unified authentication method for multiple applications based on UKEY, which can maintain the life cycle of user login, an application system does not need to pay attention to the process of system authentication, the authorization, security credentials and other identity information of a user are provided by an application authentication agent, the security credentials of the user do not participate in the interactive process among different application systems and do not influence each other through the authentication of the application systems, thereby isolating the user authentication step, reducing the interaction between the application system and an authentication center and safely and reliably ensuring the authentication process of an information system.
The method embodiment and the system embodiment of the invention are corresponding, all the embodiments can be referred to each other, and the method embodiment can be referred to the system embodiment in brief.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (7)

1. A unified authentication method for multiple applications based on UKEY is characterized by comprising the following steps:
receiving an authentication request initiated by a user through a login page through an authentication center, calling an authentication middleware to communicate with a UKEY, verifying the authentication request of the user, and notifying a security credential module to generate a security credential corresponding to the user after the verification is passed;
receiving user identity authentication requests of one or more application systems through an application authentication agent, and acquiring a security certificate of a current user from a security certificate module;
and issuing a request for acquiring the identity information to a management center by using the security certificate of the user, acquiring a request result and providing the required user identity information data for the application system.
2. The UKEY-based multi-application unified authentication method according to claim 1, wherein the authentication middleware is used for building a communication channel from an authentication center to the UKEY, the invoking authentication middleware is communicated with the UKEY, and verifying the authentication request of the user specifically comprises:
when the authentication middleware monitors that the UKEY equipment is inserted/pulled out, scanning the UKEY equipment, reading a local service configuration table, acquiring a unique UKEY identifier, a UKEY manufacturer and other information, and updating a UKEY list; the local service configuration table is used for recording the mapping relation among a UKEY manufacturer, a UKEY driving library path and an adaptive library path corresponding to the UKEY driving;
the authentication middleware receives an identity authentication request sent by an authentication center, indexes UKEY from a UKEY list according to a unique UKEY identifier, positions a communication channel corresponding to the UKEY, forwards the request to a UKEY driving adaptation library, returns an identity authentication request result to the authentication center through the identity authentication request processed by a UKEY equipment driving if the UKEY is not authenticated, and directly passes authentication if the UKEY is authenticated.
3. The UKEY-based multi-application unified authentication method according to claim 1, wherein the security credential module is configured to generate and record security credentials that have passed authentication of the user, maintain a life cycle of each security credential, and notify the authentication center to remove the security credentials of the user when the life cycle of the security credentials of the user is over; the end of the life cycle of the security certificate of the user means that the user logs out through the application system or the security certificate is overtime.
4. The UKEY-based multi-application unified authentication method as claimed in claim 1, wherein the management center is configured to record and maintain an association relationship between the user identity information and the application system, receive a request for obtaining the identity information sent by the application authentication agent through the management page, and feed back a request result to the application authentication agent based on the user security credential authentication result.
5. The UKEY-based multi-application unified authentication method as claimed in claim 4, wherein the management center specifically comprises an application management center and an identity management center, and the application management center and the identity management center respectively record the combination of the application system information and the user identity information and the association relationship therebetween.
6. The unified authentication method for multiple applications based on UKEY according to claim 4, wherein the receiving, by the application authentication broker, the user identity authentication request of one or more application systems, and the obtaining the security credentials of the current user from the security credentials module specifically includes:
receiving a user identity authentication request of an application system, and attempting to read a security certificate of a current user from a security certificate module;
if the security certificate of the current user is expired, returning failure, and informing the application system to redirect to a login page; and if the security certificate of the current user is not expired, acquiring the security certificate of the corresponding user.
7. The unified authentication method for multiple applications based on UKEY according to claim 6, wherein the issuing of the request for obtaining the identity information to the management center by using the security credentials of the user, obtaining the result of the request and providing the application system with the required user identity information data specifically comprises:
the application authentication agent sends an identity information acquisition request to the management center by using the security certificate of the corresponding user; the management center sends a request for verifying the security certificate to the authentication center through the management page, after receiving a verification passing notice fed back by the authentication center, the management center returns user identity information data to the application authentication agent through the management page, and the application authentication agent returns corresponding user identity information data for the application system.
CN202011421209.7A 2020-12-08 2020-12-08 UKEY-based multi-application unified authentication method Active CN112600813B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011421209.7A CN112600813B (en) 2020-12-08 2020-12-08 UKEY-based multi-application unified authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011421209.7A CN112600813B (en) 2020-12-08 2020-12-08 UKEY-based multi-application unified authentication method

Publications (2)

Publication Number Publication Date
CN112600813A true CN112600813A (en) 2021-04-02
CN112600813B CN112600813B (en) 2023-03-28

Family

ID=75188760

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011421209.7A Active CN112600813B (en) 2020-12-08 2020-12-08 UKEY-based multi-application unified authentication method

Country Status (1)

Country Link
CN (1) CN112600813B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902327A (en) * 2009-06-01 2010-12-01 中国移动通信集团公司 Method and device for realizing single-point log-in and system thereof
CN104506499A (en) * 2014-12-11 2015-04-08 歌尔声学股份有限公司 Single sign-on method and device for application systems
CN104573464A (en) * 2014-12-30 2015-04-29 北京工业大学 Office terminal system reentrant method based on USB controllers
CN105225072A (en) * 2015-11-05 2016-01-06 浪潮(北京)电子信息产业有限公司 A kind of access management method of multi-application system and system
CN107180172A (en) * 2017-04-19 2017-09-19 上海海加网络科技有限公司 A kind of IPSAN access control methods and device based on USBKey digital certificate authentications
CN107770139A (en) * 2016-08-23 2018-03-06 北京计算机技术及应用研究所 SAMBA identity identifying methods based on third party's USBKEY equipment
US20190007392A1 (en) * 2017-06-30 2019-01-03 Microsoft Technology Licensing, Llc Single sign-on mechanism on a rich client
CN110493352A (en) * 2019-08-30 2019-11-22 南京联创互联网技术有限公司 A kind of unified gateway service system and its method of servicing based on WEB middleware
CN111698312A (en) * 2020-06-08 2020-09-22 中国建设银行股份有限公司 Service processing method, device, equipment and storage medium based on open platform

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101902327A (en) * 2009-06-01 2010-12-01 中国移动通信集团公司 Method and device for realizing single-point log-in and system thereof
CN104506499A (en) * 2014-12-11 2015-04-08 歌尔声学股份有限公司 Single sign-on method and device for application systems
CN104573464A (en) * 2014-12-30 2015-04-29 北京工业大学 Office terminal system reentrant method based on USB controllers
CN105225072A (en) * 2015-11-05 2016-01-06 浪潮(北京)电子信息产业有限公司 A kind of access management method of multi-application system and system
CN107770139A (en) * 2016-08-23 2018-03-06 北京计算机技术及应用研究所 SAMBA identity identifying methods based on third party's USBKEY equipment
CN107180172A (en) * 2017-04-19 2017-09-19 上海海加网络科技有限公司 A kind of IPSAN access control methods and device based on USBKey digital certificate authentications
US20190007392A1 (en) * 2017-06-30 2019-01-03 Microsoft Technology Licensing, Llc Single sign-on mechanism on a rich client
CN110493352A (en) * 2019-08-30 2019-11-22 南京联创互联网技术有限公司 A kind of unified gateway service system and its method of servicing based on WEB middleware
CN111698312A (en) * 2020-06-08 2020-09-22 中国建设银行股份有限公司 Service processing method, device, equipment and storage medium based on open platform

Also Published As

Publication number Publication date
CN112600813B (en) 2023-03-28

Similar Documents

Publication Publication Date Title
CN108901022B (en) Micro-service unified authentication method and gateway
CN112468481B (en) Single-page and multi-page web application identity integrated authentication method based on CAS
JP4927361B2 (en) System and method for controlling network access
US8621206B2 (en) Authority-neutral certification for multiple-authority PKI environments
CN110278187B (en) Multi-terminal single sign-on method, system, synchronous server and medium
CN101647254B (en) Method and system for the provision of services for terminal devices
CN111355713B (en) Proxy access method, device, proxy gateway and readable storage medium
CN101662496B (en) System and method using point-to-point technology to realize file sharing
JP2018522323A (en) Voice communication processing method and system, electronic apparatus, and storage medium
EP3851983B1 (en) Authorization method, auxiliary authorization component, management server and computer readable medium
CN109150800A (en) Login access method, system and storage medium
CN104796408A (en) Single-point live login method and single-point live login device
CN113225351A (en) Request processing method and device, storage medium and electronic equipment
JP2009245268A (en) Business management system
CN110247905A (en) The data backup memory method and system of secure authentication mode based on Token
CN112600813B (en) UKEY-based multi-application unified authentication method
CN111245791B (en) Single sign-on method for realizing management and IT service through reverse proxy
CN112434276B (en) UKEY-based self-adaptive identity recognition system
CN104426890B (en) Network element access method and system based on B/S frameworks
CN116055137A (en) Authentication and authorization adaptation system, method and device for Internet of things system and storage medium
CN113346990B (en) Secure communication method and system, and related equipment and device
CN113765876B (en) Report processing software access method and device
CN111935164B (en) Https interface request method
CN114338224A (en) Intelligent hardware cross-platform control method and system
CN108206818A (en) A kind of message system login method, entering device and server of instant message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant