CN112600813A - UKEY-based multi-application unified authentication method - Google Patents
UKEY-based multi-application unified authentication method Download PDFInfo
- Publication number
- CN112600813A CN112600813A CN202011421209.7A CN202011421209A CN112600813A CN 112600813 A CN112600813 A CN 112600813A CN 202011421209 A CN202011421209 A CN 202011421209A CN 112600813 A CN112600813 A CN 112600813A
- Authority
- CN
- China
- Prior art keywords
- authentication
- user
- ukey
- application
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a unified authentication method for multiple applications based on UKEY, which comprises the following steps: receiving an authentication request initiated by a user through a login page through an authentication center, calling an authentication middleware to communicate with a UKEY, verifying the authentication request of the user, and notifying a security credential module to generate a security credential corresponding to the user after the verification is passed; receiving user identity authentication requests of one or more application systems through an application authentication agent, and acquiring a security certificate of a current user from a security certificate module; and issuing a request for acquiring the identity information to a management center by using the security certificate of the user, acquiring a request result and providing the required user identity information data for the application system. The invention manages the application system and the user information through the management center, and the authorization, the safety certificate and other identity information of the user are provided by the application authentication agent, thereby isolating the user authentication step, reducing the interaction between the application system and the authentication center, and safely and reliably ensuring the authentication process of the information system.
Description
Technical Field
The invention belongs to the field of secret-related information systems, and particularly relates to a unified multi-application authentication method based on UKEY.
Background
With the technical development of the internet industry, the service application functions of the confidential information system are continuously increased, such as a scheduling system, a payment system, a multimedia platform and the like, when a user needs to use a plurality of systems, the user needs to input an account password for verification every time, and much inconvenience is brought to the user.
The common method is that after a user logs in an application system once, a plurality of application systems share session information through a single sign-on mechanism, so that the problem of multiple login is solved. If the user accesses the application system A, the user jumps to the authentication center to log in, returns an authenticated security credential to the user after logging in, transmits the security credential to the user B when the user accesses the application system B again, and transmits the credential to the authentication center to be verified again by the user B, so that switching between the application systems is completed.
The prior art has limitations in the following two aspects on the basis of solving the problem of repeated login of a user:
on the network communication level, the interaction process of a plurality of application systems and an authentication center is added, so that the performance problem of the authentication server is indirectly caused;
on the security level, the security credentials generated by user authentication participate in information interaction between application systems, and on the application level, there is a risk of packet capturing and decryption.
Disclosure of Invention
In view of this, the present invention provides a unified authentication method for multiple applications based on UKEY, which is used to solve the problem in the prior art that when multiple application systems interact with an authentication center, the security is reduced due to too many interaction processes.
The invention discloses a unified authentication method for multiple applications based on UKEY, which comprises the following steps:
receiving an authentication request initiated by a user through a login page through an authentication center, calling an authentication middleware to communicate with a UKEY, verifying the authentication request of the user, and notifying a security credential module to generate a security credential corresponding to the user after the verification is passed;
receiving user identity authentication requests of one or more application systems through an application authentication agent, and acquiring a security certificate of a current user from a security certificate module;
and issuing a request for acquiring the identity information to a management center by using the security certificate of the user, acquiring a request result and providing the required user identity information data for the application system.
Preferably, the authentication middleware is configured to establish a communication channel from the authentication center to the UKEY, the invoking authentication middleware is configured to communicate with the UKEY, and the verifying of the authentication request of the user specifically includes:
when the authentication middleware monitors that the UKEY equipment is inserted/pulled out, scanning the UKEY equipment, reading a local service configuration table, acquiring a unique UKEY identifier, a UKEY manufacturer and other information, and updating a UKEY list; the local service configuration table is used for recording the mapping relation among a UKEY manufacturer, a UKEY driving library path and an adaptive library path corresponding to the UKEY driving;
the authentication middleware receives an identity authentication request sent by an authentication center, indexes UKEY from a UKEY list according to a unique UKEY identifier, positions a communication channel corresponding to the UKEY, forwards the request to a UKEY driving adaptation library, returns an identity authentication request result to the authentication center through the identity authentication request processed by a UKEY equipment driving if the UKEY is not authenticated, and directly passes authentication if the UKEY is authenticated.
Preferably, the security credential module is configured to generate and record security credentials that have passed authentication of the user, maintain a life cycle of each security credential, and notify the authentication center to remove the security credentials of the user when the life cycle of the security credentials of the user is completed; the end of the life cycle of the security certificate of the user means that the user logs out through the application system or the security certificate is overtime.
Preferably, the management center is configured to record and maintain an association relationship between the user identity information and the application system, receive, through the management page, a request for obtaining the identity information sent by the application authentication agent, and feed back a request result based on the user security credential authentication result.
Preferably, the management center specifically includes an application management center and an identity management center, and the application management center and the identity management center record the association relationship between the user identity information and the application system.
Preferably, the receiving, by the application authentication agent, a user identity authentication request of one or more application systems, and acquiring the security credential of the current user from the security credential module specifically includes:
receiving a user identity authentication request of an application system, and attempting to read a security certificate of a current user from a security certificate module;
if the security certificate of the current user is expired, returning failure, and informing the application system to redirect to a login page; and if the security certificate of the current user is not expired, acquiring the security certificate of the corresponding user.
Preferably, the application authentication agent sends a request for acquiring identity information to the management center by using the security certificate of the corresponding user; the management center sends a request for verifying the security certificate to the authentication center through the management page, after receiving a verification passing notice fed back by the authentication center, the management center returns user identity information data to the application authentication agent through the management page, and the application authentication agent returns corresponding user identity information data for the application system.
Compared with the prior art, the invention has the following beneficial effects:
the invention manages the application system and the user information through the management center, realizes the unified authentication authorization management of various applications, and can maintain the life cycle of user login; the application system does not need to pay attention to the process of system authentication, and the authorization, the security certificate and other identity information of the user are provided by the application authentication agent, so that the effects of isolating the step of user authentication and reducing the interaction between the application system and the authentication center are achieved, the performance of the authentication server is improved, meanwhile, the security certificate generated by the user authentication is reduced to participate in the information interaction between the application systems, the risk of packet capturing is reduced, and the authentication process of the information system is safely and reliably ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic structural diagram of a UKEY-based multi-application authentication system according to the present invention;
fig. 2 is a schematic flow chart of a multi-application authentication method based on UKEY according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
Referring to fig. 1, a schematic diagram of a mechanism of a UKEY-based multi-application unified authentication system according to the present invention includes: the system comprises an authentication center 1, a security certificate module 2, an application authentication agent 3, a management center 4 and an authentication middleware 5;
the authentication center 1 is used for receiving an authentication request initiated by a user through a login page, calling authentication middleware to communicate with the UKEY, verifying the authentication request of the user, and informing the security credential module to generate a security credential corresponding to the user after the verification is passed;
the security certificate module 2 is used for recording the security certificates which pass the authentication of the users and maintaining the life cycle of each security certificate; when the life cycle of the security certificate of the user is finished, informing the authentication center to remove the security certificate of the user; the end of the life cycle of the security certificate of the user means that the user logs out through the application system or the security certificate is overtime.
The application authentication agent 3 is used for processing user identity authentication requests of all application systems in a centralized manner, verifying the security credentials of the user, issuing a request for acquiring identity information to a management center by using the security credentials of the user, acquiring a request result and providing required user identity information data for the application systems;
the certificate acquisition unit is used for receiving a user identity authentication request of the application system, trying to read the security certificate of the current user from the security certificate module, if the security certificate of the current user is expired, returning failure, and informing the application system of redirecting to a login page; if the security certificate of the current user is not expired, acquiring the security certificate of the corresponding user;
the data feedback unit is used for issuing an identity information acquisition request to the management center by using the security certificate of the corresponding user to acquire a request result; the request result is a request for the management center to send a verification security certificate to the authentication center through the management page, and the verification result obtained from the authentication center is user identity information data returned for the application system after passing.
And the management center 4 is used for recording and maintaining the incidence relation between the user identity information and the application system, receiving a request for acquiring the identity information sent by the application authentication agent through the management page, and feeding back a request result based on the authentication result of the user security certificate. The management center specifically comprises an application management center and an identity management center, and the application management center and the identity management center record the incidence relation between the user identity information and the application system.
And the authentication middleware 5 is used for building a communication channel from the authentication center to the UKEY and is used as a connecting bridge between the authentication center and the UKEY equipment. The authentication middleware specifically includes: the system comprises a scheduling unit 5-1, a monitoring unit 5-2 and a communication assembly 5-3;
the scheduling unit 5-1 is used for constructing a UKEY memory data structure, constructing and maintaining a UKEY list and a service configuration list, recording the authentication state about the identity authority, receiving an interface request of an authentication center and a notification of a monitoring module, and performing corresponding scheduling processing; the scheduling module specifically includes:
the system comprises a service configuration table subunit, a service configuration table updating unit and a service configuration table updating unit, wherein the service configuration table is used for recording the mapping relation among a UKEY manufacturer, a UKEY driving library path and an adaptation library path corresponding to a UKEY drive;
the UKEY list subunit is used for scanning the UKEY through the communication component when receiving the UKEY equipment insertion/extraction notification of the monitoring module, reading the service configuration table, acquiring a unique identifier of the UKEY, a UKEY manufacturer and other information, and updating the UKEY list;
the application interaction subunit is used for interacting with the authentication center in an interface mode, receiving an identity authentication request sent by the authentication center, indexing UKEY from a UKEY list according to the unique UKEY identifier, positioning a communication channel corresponding to the UKEY, sending the request to a UKEY driving adaptation library, acquiring an identity authentication request result processed by a UKEY device driver if the UKEY is not authenticated, returning the request result to the authentication center, and directly passing authentication if the UKEY is authenticated.
The monitoring unit 5-2 is used for monitoring the plugging and unplugging of the UKEY equipment, and informing the scheduling module when the UKEY equipment is plugged or unplugged;
and the communication component 5-3 is used for integrating the drive of the UKEY equipment to form a corresponding adaptation library so as to realize butt joint communication with a COS system of the UKEY equipment.
Referring to fig. 2, based on the system shown in fig. 1, the present invention provides a unified authentication method for multiple applications based on UKEY, the method includes:
s1, the administrator performs the related configuration of the application system and the user identity on the management center through the management page;
s2, the user initiates an authentication request through the login page, the authentication center receives the authentication request initiated by the user through the login page, calls the authentication middleware to communicate with the UKEY, verifies the authentication request of the user, and informs the security credential module to generate the security credential corresponding to the user after the verification is passed;
the authentication middleware is used for building a communication channel from the authentication center to the UKEY, the authentication middleware is called to communicate with the UKEY, and the authentication request of the verification user specifically comprises the following steps:
when the authentication middleware monitors that the UKEY equipment is inserted/pulled out, scanning the UKEY equipment, reading a local service configuration table, acquiring a unique UKEY identifier, a UKEY manufacturer and other information, and updating a UKEY list; the local service configuration table is used for recording the mapping relation among a UKEY manufacturer, a UKEY driving library path and an adaptive library path corresponding to the UKEY driving;
the authentication middleware receives an identity authentication request sent by an authentication center, indexes UKEY from a UKEY list according to a unique UKEY identifier, positions a communication channel corresponding to the UKEY, forwards the request to a UKEY driving adaptation library, returns an identity authentication request result to the authentication center through the identity authentication request processed by a UKEY equipment driving if the UKEY is not authenticated, and directly passes authentication if the UKEY is authenticated. Specifically, the security credential module is configured to generate and record security credentials that have passed authentication of a user, maintain a life cycle of each security credential, and notify the authentication center to remove the security credentials of the user when the life cycle of the security credentials of the user is completed; the end of the life cycle of the security certificate of the user means that the user logs out through the application system or the security certificate is overtime.
S3, receiving user identity authentication requests of one or more application systems through the application authentication agent, and acquiring the security credentials of the current user from the security credential module;
specifically, a user identity authentication request of an application system is received, and a security certificate of a current user is tried to be read from a security certificate module; if the security certificate of the current user is expired, returning failure, and informing the application system to redirect to a login page; and if the security certificate of the current user is not expired, acquiring the security certificate of the corresponding user.
S4, issuing a request for obtaining identity information to the management center by using the security certificate of the user, obtaining the request result and providing the required user identity information data for the application system.
The management center records and maintains the incidence relation between the user identity information and the application system, receives the request for acquiring the identity information sent by the application authentication agent through the management page, and feeds back the request result to the application authentication agent based on the user security certificate authentication result. Specifically, an identity information request is sent to a management center by using a security certificate of a corresponding user, and a request result is obtained; the management center comprises an application management center and an identity management center, and records the incidence relation between the user identity information and the application system; and the request result is that the management center sends a request for verifying the security certificate to the authentication center through the management page, and after receiving a verification passing notice fed back by the authentication center, the management center returns user identity information data for the application system through the management page.
The invention provides a unified authentication method for multiple applications based on UKEY, which can maintain the life cycle of user login, an application system does not need to pay attention to the process of system authentication, the authorization, security credentials and other identity information of a user are provided by an application authentication agent, the security credentials of the user do not participate in the interactive process among different application systems and do not influence each other through the authentication of the application systems, thereby isolating the user authentication step, reducing the interaction between the application system and an authentication center and safely and reliably ensuring the authentication process of an information system.
The method embodiment and the system embodiment of the invention are corresponding, all the embodiments can be referred to each other, and the method embodiment can be referred to the system embodiment in brief.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (7)
1. A unified authentication method for multiple applications based on UKEY is characterized by comprising the following steps:
receiving an authentication request initiated by a user through a login page through an authentication center, calling an authentication middleware to communicate with a UKEY, verifying the authentication request of the user, and notifying a security credential module to generate a security credential corresponding to the user after the verification is passed;
receiving user identity authentication requests of one or more application systems through an application authentication agent, and acquiring a security certificate of a current user from a security certificate module;
and issuing a request for acquiring the identity information to a management center by using the security certificate of the user, acquiring a request result and providing the required user identity information data for the application system.
2. The UKEY-based multi-application unified authentication method according to claim 1, wherein the authentication middleware is used for building a communication channel from an authentication center to the UKEY, the invoking authentication middleware is communicated with the UKEY, and verifying the authentication request of the user specifically comprises:
when the authentication middleware monitors that the UKEY equipment is inserted/pulled out, scanning the UKEY equipment, reading a local service configuration table, acquiring a unique UKEY identifier, a UKEY manufacturer and other information, and updating a UKEY list; the local service configuration table is used for recording the mapping relation among a UKEY manufacturer, a UKEY driving library path and an adaptive library path corresponding to the UKEY driving;
the authentication middleware receives an identity authentication request sent by an authentication center, indexes UKEY from a UKEY list according to a unique UKEY identifier, positions a communication channel corresponding to the UKEY, forwards the request to a UKEY driving adaptation library, returns an identity authentication request result to the authentication center through the identity authentication request processed by a UKEY equipment driving if the UKEY is not authenticated, and directly passes authentication if the UKEY is authenticated.
3. The UKEY-based multi-application unified authentication method according to claim 1, wherein the security credential module is configured to generate and record security credentials that have passed authentication of the user, maintain a life cycle of each security credential, and notify the authentication center to remove the security credentials of the user when the life cycle of the security credentials of the user is over; the end of the life cycle of the security certificate of the user means that the user logs out through the application system or the security certificate is overtime.
4. The UKEY-based multi-application unified authentication method as claimed in claim 1, wherein the management center is configured to record and maintain an association relationship between the user identity information and the application system, receive a request for obtaining the identity information sent by the application authentication agent through the management page, and feed back a request result to the application authentication agent based on the user security credential authentication result.
5. The UKEY-based multi-application unified authentication method as claimed in claim 4, wherein the management center specifically comprises an application management center and an identity management center, and the application management center and the identity management center respectively record the combination of the application system information and the user identity information and the association relationship therebetween.
6. The unified authentication method for multiple applications based on UKEY according to claim 4, wherein the receiving, by the application authentication broker, the user identity authentication request of one or more application systems, and the obtaining the security credentials of the current user from the security credentials module specifically includes:
receiving a user identity authentication request of an application system, and attempting to read a security certificate of a current user from a security certificate module;
if the security certificate of the current user is expired, returning failure, and informing the application system to redirect to a login page; and if the security certificate of the current user is not expired, acquiring the security certificate of the corresponding user.
7. The unified authentication method for multiple applications based on UKEY according to claim 6, wherein the issuing of the request for obtaining the identity information to the management center by using the security credentials of the user, obtaining the result of the request and providing the application system with the required user identity information data specifically comprises:
the application authentication agent sends an identity information acquisition request to the management center by using the security certificate of the corresponding user; the management center sends a request for verifying the security certificate to the authentication center through the management page, after receiving a verification passing notice fed back by the authentication center, the management center returns user identity information data to the application authentication agent through the management page, and the application authentication agent returns corresponding user identity information data for the application system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011421209.7A CN112600813B (en) | 2020-12-08 | 2020-12-08 | UKEY-based multi-application unified authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011421209.7A CN112600813B (en) | 2020-12-08 | 2020-12-08 | UKEY-based multi-application unified authentication method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112600813A true CN112600813A (en) | 2021-04-02 |
CN112600813B CN112600813B (en) | 2023-03-28 |
Family
ID=75188760
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011421209.7A Active CN112600813B (en) | 2020-12-08 | 2020-12-08 | UKEY-based multi-application unified authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112600813B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101902327A (en) * | 2009-06-01 | 2010-12-01 | 中国移动通信集团公司 | Method and device for realizing single-point log-in and system thereof |
CN104506499A (en) * | 2014-12-11 | 2015-04-08 | 歌尔声学股份有限公司 | Single sign-on method and device for application systems |
CN104573464A (en) * | 2014-12-30 | 2015-04-29 | 北京工业大学 | Office terminal system reentrant method based on USB controllers |
CN105225072A (en) * | 2015-11-05 | 2016-01-06 | 浪潮(北京)电子信息产业有限公司 | A kind of access management method of multi-application system and system |
CN107180172A (en) * | 2017-04-19 | 2017-09-19 | 上海海加网络科技有限公司 | A kind of IPSAN access control methods and device based on USBKey digital certificate authentications |
CN107770139A (en) * | 2016-08-23 | 2018-03-06 | 北京计算机技术及应用研究所 | SAMBA identity identifying methods based on third party's USBKEY equipment |
US20190007392A1 (en) * | 2017-06-30 | 2019-01-03 | Microsoft Technology Licensing, Llc | Single sign-on mechanism on a rich client |
CN110493352A (en) * | 2019-08-30 | 2019-11-22 | 南京联创互联网技术有限公司 | A kind of unified gateway service system and its method of servicing based on WEB middleware |
CN111698312A (en) * | 2020-06-08 | 2020-09-22 | 中国建设银行股份有限公司 | Service processing method, device, equipment and storage medium based on open platform |
-
2020
- 2020-12-08 CN CN202011421209.7A patent/CN112600813B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101902327A (en) * | 2009-06-01 | 2010-12-01 | 中国移动通信集团公司 | Method and device for realizing single-point log-in and system thereof |
CN104506499A (en) * | 2014-12-11 | 2015-04-08 | 歌尔声学股份有限公司 | Single sign-on method and device for application systems |
CN104573464A (en) * | 2014-12-30 | 2015-04-29 | 北京工业大学 | Office terminal system reentrant method based on USB controllers |
CN105225072A (en) * | 2015-11-05 | 2016-01-06 | 浪潮(北京)电子信息产业有限公司 | A kind of access management method of multi-application system and system |
CN107770139A (en) * | 2016-08-23 | 2018-03-06 | 北京计算机技术及应用研究所 | SAMBA identity identifying methods based on third party's USBKEY equipment |
CN107180172A (en) * | 2017-04-19 | 2017-09-19 | 上海海加网络科技有限公司 | A kind of IPSAN access control methods and device based on USBKey digital certificate authentications |
US20190007392A1 (en) * | 2017-06-30 | 2019-01-03 | Microsoft Technology Licensing, Llc | Single sign-on mechanism on a rich client |
CN110493352A (en) * | 2019-08-30 | 2019-11-22 | 南京联创互联网技术有限公司 | A kind of unified gateway service system and its method of servicing based on WEB middleware |
CN111698312A (en) * | 2020-06-08 | 2020-09-22 | 中国建设银行股份有限公司 | Service processing method, device, equipment and storage medium based on open platform |
Also Published As
Publication number | Publication date |
---|---|
CN112600813B (en) | 2023-03-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108901022B (en) | Micro-service unified authentication method and gateway | |
CN112468481B (en) | Single-page and multi-page web application identity integrated authentication method based on CAS | |
JP4927361B2 (en) | System and method for controlling network access | |
US8621206B2 (en) | Authority-neutral certification for multiple-authority PKI environments | |
CN110278187B (en) | Multi-terminal single sign-on method, system, synchronous server and medium | |
CN101647254B (en) | Method and system for the provision of services for terminal devices | |
CN111355713B (en) | Proxy access method, device, proxy gateway and readable storage medium | |
CN101662496B (en) | System and method using point-to-point technology to realize file sharing | |
JP2018522323A (en) | Voice communication processing method and system, electronic apparatus, and storage medium | |
EP3851983B1 (en) | Authorization method, auxiliary authorization component, management server and computer readable medium | |
CN109150800A (en) | Login access method, system and storage medium | |
CN104796408A (en) | Single-point live login method and single-point live login device | |
CN113225351A (en) | Request processing method and device, storage medium and electronic equipment | |
JP2009245268A (en) | Business management system | |
CN110247905A (en) | The data backup memory method and system of secure authentication mode based on Token | |
CN112600813B (en) | UKEY-based multi-application unified authentication method | |
CN111245791B (en) | Single sign-on method for realizing management and IT service through reverse proxy | |
CN112434276B (en) | UKEY-based self-adaptive identity recognition system | |
CN104426890B (en) | Network element access method and system based on B/S frameworks | |
CN116055137A (en) | Authentication and authorization adaptation system, method and device for Internet of things system and storage medium | |
CN113346990B (en) | Secure communication method and system, and related equipment and device | |
CN113765876B (en) | Report processing software access method and device | |
CN111935164B (en) | Https interface request method | |
CN114338224A (en) | Intelligent hardware cross-platform control method and system | |
CN108206818A (en) | A kind of message system login method, entering device and server of instant message |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |