CN112738045A - Multi-source fusion identity authentication system and method - Google Patents

Multi-source fusion identity authentication system and method Download PDF

Info

Publication number
CN112738045A
CN112738045A CN202011536653.3A CN202011536653A CN112738045A CN 112738045 A CN112738045 A CN 112738045A CN 202011536653 A CN202011536653 A CN 202011536653A CN 112738045 A CN112738045 A CN 112738045A
Authority
CN
China
Prior art keywords
processing unit
service processing
service
identity authentication
chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011536653.3A
Other languages
Chinese (zh)
Inventor
张炜
卓流艺
秦东明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
3Clear Technology Co Ltd
Original Assignee
3Clear Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 3Clear Technology Co Ltd filed Critical 3Clear Technology Co Ltd
Priority to CN202011536653.3A priority Critical patent/CN112738045A/en
Publication of CN112738045A publication Critical patent/CN112738045A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
    • G06F9/44526Plug-ins; Add-ons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels

Abstract

The invention discloses a multi-source fusion identity authentication system and method. The multi-source converged identity authentication system comprises a plurality of service processing units and further comprises: the selecting module is used for selecting each service processing unit matched with the current service from the plurality of service processing units; the arrangement module is used for arranging the selected service processing units into a service processing unit chain according to the execution sequence; and the marking module is used for respectively marking the sequence of the arranged business processing units in the business processing unit chain. In the multi-source integrated identity authentication system and method, each service processing unit processes own service, each node plays its own role and has clear responsibilities, and each node in the chain identity authentication process can adjust the execution sequence or cut according to the service requirements to realize dynamic adjustment.

Description

Multi-source fusion identity authentication system and method
Technical Field
The invention relates to the field of computer information security, in particular to a multi-source fusion identity authentication system and method.
Background
In the www (world Wide web), i.e., the global Wide area network, also called the world Wide web system, identity authentication and security protection are extremely important functions, and have been used as infrastructure for system construction. Most authentication systems only provide basic identity authentication functions, meet the service scenes of the authentication systems, and have relatively single functions. Currently, mainstream identity authentication frameworks such as CAS, Spring security, Shiro, oauth2.0, and the like are compared in the market, and although these frameworks provide solutions for identity authentication, in a complicated and diversified business scenario, it is difficult to have a technical solution that can be compatible with the requirements of different projects, expansion is difficult, and flexibility is insufficient.
The authentication process of existing authentication systems is highly coupled to the business. While identity authentication is completed, service-related calculations, such as permission calculation, menu calculation, behavior record and the like, need to be processed, and expansion is difficult. The high coupling with the service results in unclear responsibility of each part, and the original code needs to be modified every time a new function needs to be added, which undoubtedly affects the stability and safety of the system. After the new function is on line, shutdown maintenance is necessary, and normal system operation is influenced.
The authentication function is integrated in the system, and needs to be displayed in the face of different terminals, such as a Personal Computer (PC), an APP, an applet, and the like, and also needs to meet complex and complicated integration requirements, so that an identity authentication system which is dynamically adjustable, simple in expansion, good in compatibility and stability, and easy to maintain is needed.
Disclosure of Invention
The invention innovatively provides a multi-source converged identity authentication system and method, each service processing unit processes own service, each service processing unit has separate functions and clear responsibilities, and each node of a chained identity authentication process can adjust the execution sequence or cut according to the requirements of the service.
In order to achieve the technical purpose, on one hand, the invention discloses an identity authentication system with multi-source fusion. The multi-source converged identity authentication system comprises a plurality of service processing units and further comprises: the selecting module is used for selecting each service processing unit matched with the current service from the plurality of service processing units; the arrangement module is used for arranging the selected service processing units into a service processing unit chain according to the execution sequence; and the marking module is used for respectively marking the sequence of the arranged business processing units in the business processing unit chain.
Further, for the multi-source converged identity authentication system, the marking module is further configured to mark the order of the service processing unit arranged at the head in the service processing unit chain and the identity of the service processing unit executed next to the service processing unit arranged at the head, mark the identity of the service processing unit executed last to the service processing unit arranged at the middle in the service processing unit chain and the identity of the service processing unit executed next to the service processing unit arranged at the end in the service processing unit chain.
Furthermore, the multi-source converged identity authentication system further comprises an adjusting module, which is used for adjusting the execution sequence and/or increasing or decreasing the nodes in the service processing unit chain according to different service requirements.
Furthermore, the multi-source converged identity authentication system further comprises an extended interface specification and an authentication plug-in development module.
Furthermore, the multi-source converged identity authentication system further comprises a dynamic loading module, wherein the dynamic loading module is used for uploading the developed authentication plug-in to a specified file directory, and adding the corresponding function of the developed authentication plug-in to an authentication flow after checking and calculating.
The technical purpose is achieved, and on the other hand, the invention discloses a multi-source fusion identity authentication method. The multi-source fusion identity authentication method comprises the following steps: selecting each service processing unit matched with the current service; arranging the selected service processing units into a service processing unit chain according to an execution sequence; the sequence of the arranged service processing units in the processing unit chain is respectively marked on the arranged service processing units.
Further, for the multi-source converged identity authentication method, the sequence of the arranged business processing units in the processing unit chain is respectively marked on each arranged business processing unit, and the method comprises the following steps: the sequence of the service processing unit in the service processing unit chain and the identification of the service processing unit executed next to the service processing unit are marked on the service processing unit arranged at the head, the identification of the service processing unit executed last to the service processing unit arranged at the middle and the identification of the service processing unit executed next to the service processing unit arranged at the tail, and the sequence of the service processing unit executed last to the service processing unit arranged at the tail.
Further, the multi-source converged identity authentication method further comprises the following steps: the execution order is adjusted and/or nodes in the chain of service processing units are added or subtracted according to different service needs.
To achieve the above technical object, in yet another aspect, the present invention discloses a computing device. The computing device includes: one or more processors, and a memory coupled with the one or more processors, the memory storing instructions that, when executed by the one or more processors, cause the one or more processors to perform the above-described method.
To achieve the above technical objects, in yet another aspect, the present invention discloses a machine-readable storage medium. The machine-readable storage medium stores executable instructions that, when executed, cause the machine to perform the above-described method.
The invention has the beneficial effects that:
in the multi-source converged identity authentication system and method provided by the embodiment of the invention, each service unit processes own service, each service has its own function and clear responsibility, and the chain identity authentication process can adjust the execution sequence or cut according to the service requirement to realize dynamic adjustment. The unified interface specification is provided, the plug-in development is realized, a user can develop the authentication plug-in of the user under the condition that the original code is not influenced, the expansion is convenient, the customized function of the service can be realized on the premise of considering the stability and the safety of the system, and the stability and the safety of the system are obviously improved. The method has the advantages of visual background management function, self-regulation of the authentication mode through the management interface, real-time effect, no need of shutdown maintenance, easy monitoring and low maintenance cost, and can install, uninstall and configure the custom-developed authentication plug-in through the interface.
Drawings
In the figure, the position of the upper end of the main shaft,
fig. 1 is a schematic structural diagram of a multi-source converged identity authentication system according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of various service processing units in a chain of service processing units according to an example of the present invention;
FIG. 3 is a diagram illustrating a dynamic loading process implemented by a dynamic loading module according to an embodiment of the present invention;
FIG. 4 is a flowchart of a multi-source converged identity authentication method according to another embodiment of the present invention;
fig. 5 is a block diagram of a computing device for identity authentication processing for multi-source fusion according to an embodiment of the present invention.
Detailed Description
The multi-source converged identity authentication system and method provided by the invention are explained and explained in detail below with reference to the drawings of the specification.
Fig. 1 is a schematic structural diagram of a multi-source converged identity authentication system according to an embodiment of the present invention. The multi-source fusion refers to unified management and docking authentication of multiple authentication sources, wherein the multiple authentication sources are authenticated in multiple authentication modes such as user name and password, short message, WeChat and/or biological identification such as fingerprint identification. As shown in fig. 1, the multi-source converged identity authentication system provided in this embodiment includes a plurality of business processing units 110, and further includes a selecting module 120, an arranging module 130, and a marking module 140. The selecting module 120 is configured to select each service processing unit matching the current service from the plurality of service processing units. The arranging module 130 is configured to arrange the selected service processing units into a service processing unit chain according to the execution order. The marking module 140 is used to mark the sequence of the arranged service processing units in the service processing unit chain.
As an optional implementation, the marking module 140 is further configured to mark the service processing unit ranked first in the chain of service processing units and the identification of the service processing unit executed next to the service processing unit ranked first, mark the identification of the service processing unit executed last in the chain of service processing units and the identification of the service processing unit executed next to the service processing unit ranked middle in the chain of service processing units, and mark the identification of the service processing unit executed last in the chain of service processing units and the identification of the service processing unit executed last in the chain of service processing units ranked last in the chain of service processing units. As a specific example, each execution node, i.e. service processing unit, may comprise 3 attributes: current node identification (nodeID), previous node (preNode), next node (nextNode), to indicate where the current node is located, and who its previous and next nodes are. As shown in fig. 2, top indicates that the node is a top-level node, and the process is to start from the node; next represents who the next node of the node, i.e. nextNode, is; prev indicates who the previous node of this node, namely preNode, is.
The process of identity authentication is like a production line or a chain, the rings are buckled with each other, one link is processed, and the next link is processed. Each node in the chain is a service processing unit, and is responsible for processing specific services, such as verification code verification, user name and password verification, identity authentication, role calculation, authority control, behavior audit, and/or menu calculation, and the like. And after the execution of the current node is finished, the current node is turned to the next node, and the processed data can be selected whether to be bound into an execution chain or not and transmitted to the next execution node.
As an optional implementation manner, the multi-source converged identity authentication system of this embodiment may further include an adjusting module, configured to adjust the execution sequence and/or increase or decrease nodes in the service processing unit chain according to different service needs, so as to implement dynamic adjustment. Since the marking module 140 marks the order of the current node on each node, an ordered chain is formed. According to different service requirements, the execution sequence of the service processing unit chain can be adjusted and/or nodes in the chain can be increased or decreased, so that the dynamic adjustment of the nodes is realized.
The multi-source converged identity authentication system of the embodiment may further include an extended interface specification and an authentication plug-in development module. The specification of the extension interface is defined, as an optional implementation manner, the provided interface specification can adopt an interface specification LoginChain, and the service needs to realize the LoginChain through a coding mode according to the service requirement of the service. The nodes participating in the execution need to implement this interface in order to be scalable. According to the interface specification, an authentication plug-in suitable for the service can be developed. The specification of the defined extension interface is uniform, easy to extend and friendly to development.
The multi-source converged identity authentication system of the embodiment may further include a dynamic loading module, which is configured to upload the developed authentication plug-in to a designated file directory, and add a function corresponding to the developed authentication plug-in to an authentication flow after checking and calculating. The developed authentication plug-in can be uploaded to a specified file directory, and after the system is checked and calculated, the function can be added into an authentication flow and is immediately effective without shutdown or service restart, and the service in operation is not influenced. As an alternative embodiment, installation and uninstallation of the authentication plug-in may be implemented based on the dynamic loading mechanism of Groovy. Each node on the execution chain can be realized through a Groovy language, and the Groovy is an agile dynamic scripting language and is communicated with Java. As shown in fig. 3, when the execution chain listener detects that the script directory is updated, the execution chain listener notifies the execution chain processor to re-read data and update the execution chain.
The multi-source converged identity authentication system of the embodiment can further comprise a visual management module for realizing the switching of the verification modes and taking effect in real time. The system background has corresponding management functions, so that the switching of the verification modes can be realized, and the verification mode can take effect in real time. The system management background has a login configuration maintenance function, and the switching of authentication modes can be realized by selecting a verification mode, wherein the verification mode can be selected more, and at least 2 modes in the following verification modes are supported: user name and/or password authentication, short message authentication, WeChat and/or QQ and/or nail authentication, mixed authentication modes and the like.
Fig. 4 is a flowchart of a multi-source converged identity authentication method according to another embodiment of the present invention.
As shown in fig. 4, in step S410, each service processing unit matching the current service is selected.
In step S420, the selected service processing units are arranged into a service processing unit chain according to the execution order.
In step S430, the sequence of the service processing units in the processing unit chain is respectively indicated on the arranged service processing units. As an alternative, the first ranked service processing unit may be marked with its sequence in the service processing unit chain and its identifier of the next service processing unit to be executed, the middle ranked service processing unit may be marked with its identifier of the last service processing unit to be executed and its identifier of the next service processing unit to be executed, and the last service processing unit may be marked with its identifier of the last service processing unit to be executed and its sequence in the service processing unit chain.
As an optional implementation manner, the multi-source converged identity authentication method of this embodiment may further include the following steps: according to different service requirements, the execution sequence is adjusted and/or nodes in the chain are increased or decreased, so that dynamic adjustment is realized.
As an optional implementation manner, the multi-source converged identity authentication method of this embodiment may further include the following steps: and developing an authentication plug-in, uploading the developed authentication plug-in to a specified file directory, and adding a function corresponding to the developed authentication plug-in to an authentication flow after checking and calculating.
The multi-source fused identity authentication method of the embodiment may further include the steps of: the verification mode switching is realized through visual management, and the verification mode switching is effective in real time.
In the multi-source converged identity authentication system and method provided by the embodiment of the invention, each service unit processes own service, each service takes its own role, the responsibility is clear, and the chain identity authentication process can adjust the execution sequence or cut according to the service scene to realize dynamic adjustment. The unified interface specification is provided, the plug-in development is realized, a user can develop the authentication plug-in of the user under the condition of not influencing the original code, the expansion is convenient, and the customized function of the service can be realized on the premise of considering the stability and the safety of the system. The system stability and safety are obviously improved. The method has the advantages of visual background management function, self-regulation of the authentication mode through the management interface, real-time effect, no need of shutdown maintenance, easy monitoring and low maintenance cost, and can install, uninstall and configure the custom-developed authentication plug-in through the interface.
Fig. 5 is a block diagram of a computing device for identity authentication processing for multi-source fusion according to an embodiment of the present invention.
As shown in fig. 5, computing device 500 may include at least one processor 510, memory 520, memory 530, communication interface 540, and internal bus 550, and at least one processor 510, memory 520, memory 530, and communication interface 540 are connected together via bus 550. The at least one processor 510 executes at least one computer-readable instruction (i.e., an element described above as being implemented in software) stored or encoded in a computer-readable storage medium (i.e., memory 520).
In one embodiment, computer-executable instructions are stored in the memory 520 that, when executed, cause the at least one processor 510 to perform: selecting each service processing unit matched with the current service; arranging the selected service processing units into a service processing unit chain according to an execution sequence; the sequence of the arranged service processing units in the processing unit chain is respectively marked on the arranged service processing units.
It should be understood that the computer-executable instructions stored in the memory 520, when executed, cause the at least one processor 510 to perform the various operations and functions described above in connection with fig. 1-4 in the various embodiments of the present disclosure.
In the present disclosure, computing device 500 may include, but is not limited to: personal computers, server computers, workstations, desktop computers, laptop computers, notebook computers, mobile computing devices, smart phones, tablet computers, cellular phones, Personal Digital Assistants (PDAs), handheld devices, messaging devices, wearable computing devices, consumer electronics, and so forth.
According to one embodiment, a program product, such as a non-transitory machine-readable medium, is provided. A non-transitory machine-readable medium may have instructions (i.e., elements described above as being implemented in software) that, when executed by a machine, cause the machine to perform various operations and functions described above in connection with fig. 1-4 in various embodiments of the present disclosure.
Specifically, a system or apparatus may be provided which is provided with a readable storage medium on which software program code implementing the functions of any of the above embodiments is stored, and causes a computer or processor of the system or apparatus to read out and execute instructions stored in the readable storage medium.
In this case, the program code itself read from the readable medium can realize the functions of any of the above-described embodiments, and thus the machine-readable code and the readable storage medium storing the machine-readable code form part of the present invention.
Examples of the readable storage medium include floppy disks, hard disks, magneto-optical disks, optical disks (e.g., CD-ROMs, CD-R, CD-RWs, DVD-ROMs, DVD-RAMs, DVD-RWs), magnetic tapes, nonvolatile memory cards, and ROMs. Alternatively, the program code may be downloaded from a server computer or from the cloud via a communications network.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the claims, and all equivalent structures or equivalent processes that are transformed by the content of the specification and the drawings, or directly or indirectly applied to other related technical fields are included in the scope of the claims.

Claims (10)

1. The multi-source converged identity authentication system is characterized by comprising a plurality of business processing units and further comprising:
the selecting module is used for selecting each service processing unit matched with the current service from the plurality of service processing units;
the arrangement module is used for arranging the selected service processing units into a service processing unit chain according to the execution sequence;
and the marking module is used for respectively marking the sequence of the arranged business processing units in the business processing unit chain.
2. The multi-source converged identity authentication system of claim 1, wherein the marking module is further configured to mark the service processing unit ranked at the head with its sequence in the service processing unit chain and its identifier of the next service processing unit to be executed, mark the service processing unit ranked at the middle with its identifier of the last service processing unit to be executed and its identifier of the next service processing unit to be executed, and mark the service processing unit ranked at the end with its identifier of the last service processing unit to be executed and its sequence in the service processing unit chain.
3. The multi-source converged identity authentication system according to claim 1, further comprising an adjusting module, configured to adjust an execution sequence and/or increase or decrease nodes in the business processing unit chain according to different business needs.
4. The multi-source converged identity authentication system of claim 1, further comprising an extended interface specification and an authentication plug-in development module.
5. The multi-source converged identity authentication system of claim 4, further comprising a dynamic loading module, configured to upload the developed authentication plug-in to a designated file directory, and add a function corresponding to the developed authentication plug-in to an authentication flow after checking and calculating.
6. A multi-source converged identity authentication method is characterized by comprising the following steps:
selecting each service processing unit matched with the current service;
arranging the selected service processing units into a service processing unit chain according to an execution sequence;
the sequence of the arranged service processing units in the processing unit chain is respectively marked on the arranged service processing units.
7. The multi-source converged identity authentication method of claim 6, wherein the step of respectively indicating the sequence of the arranged business processing units in the processing unit chain comprises: the sequence of the service processing unit in the service processing unit chain and the identification of the service processing unit executed next to the service processing unit are marked on the service processing unit arranged at the head, the identification of the service processing unit executed last to the service processing unit arranged at the middle and the identification of the service processing unit executed next to the service processing unit arranged at the tail, and the sequence of the service processing unit executed last to the service processing unit arranged at the tail.
8. The multi-source converged identity authentication method of claim 6, further comprising: the execution order is adjusted and/or nodes in the chain of service processing units are added or subtracted according to different service needs.
9. A computing device, comprising:
one or more processors, and
a memory coupled with the one or more processors, the memory storing instructions that, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 6 to 8.
10. A machine-readable storage medium having stored thereon executable instructions that, when executed, cause the machine to perform the method of any one of claims 6 to 8.
CN202011536653.3A 2020-12-23 2020-12-23 Multi-source fusion identity authentication system and method Pending CN112738045A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011536653.3A CN112738045A (en) 2020-12-23 2020-12-23 Multi-source fusion identity authentication system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011536653.3A CN112738045A (en) 2020-12-23 2020-12-23 Multi-source fusion identity authentication system and method

Publications (1)

Publication Number Publication Date
CN112738045A true CN112738045A (en) 2021-04-30

Family

ID=75604712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011536653.3A Pending CN112738045A (en) 2020-12-23 2020-12-23 Multi-source fusion identity authentication system and method

Country Status (1)

Country Link
CN (1) CN112738045A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012146091A1 (en) * 2011-04-26 2012-11-01 International Business Machines Corporation Authentication information processing
CN102904885A (en) * 2012-09-26 2013-01-30 北京工业大学 Compound authentication method of multi-identity authentication information feature
CN109493204A (en) * 2018-10-16 2019-03-19 平安科技(深圳)有限公司 Business bookkeeping methods and terminal device based on block chain
CN111010368A (en) * 2019-11-11 2020-04-14 泰康保险集团股份有限公司 Authority authentication method, device and medium based on authentication chain and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012146091A1 (en) * 2011-04-26 2012-11-01 International Business Machines Corporation Authentication information processing
CN102904885A (en) * 2012-09-26 2013-01-30 北京工业大学 Compound authentication method of multi-identity authentication information feature
CN109493204A (en) * 2018-10-16 2019-03-19 平安科技(深圳)有限公司 Business bookkeeping methods and terminal device based on block chain
CN111010368A (en) * 2019-11-11 2020-04-14 泰康保险集团股份有限公司 Authority authentication method, device and medium based on authentication chain and electronic equipment

Similar Documents

Publication Publication Date Title
US20210037097A1 (en) Cloud data storage location monitoring
EP3632036B1 (en) Digital certificate application method and device
US8195124B2 (en) Apparatus and methods for managing time sensitive application privileges on a wireless device
US20150341795A1 (en) Instant messaging message processing method and device and storage medium
US9641575B2 (en) Method for sharing multimedia content between two users
US20200044916A1 (en) Implementation of compliance settings by a mobile device for compliance with a configuration scenario
WO2008073787A1 (en) Apparatus and methods for client-driven server-side installation
CN105814591A (en) Verification information transmission method and terminal
CN104317626A (en) Application software permission control method, device and system for terminal equipment
EP3867710B1 (en) Apparatus, device and computer implemented method for automatic generation of scada slave interface
CN103177200A (en) Method and system for configuring computing appliance
CN111625301A (en) Idempotent processing method, apparatus, device and storage medium
CN111988337A (en) Authority management method and system
KR20190069574A (en) Wireless network type detection method and apparatus, and electronic device
CN110602043A (en) API gateway implementation system and method for mobile application
CN108829467A (en) Third-party platform docks implementation method, device, equipment and storage medium
CN107770212A (en) Rich communication suite distribution platform, method for updating edition and system, mobile terminal
US20140273973A1 (en) Method and system for replacing key deployed in se of mobile terminal
CN110308880A (en) Log Method of printing, system, computer equipment and computer readable storage medium
CN112364049A (en) Data synchronization script generation method, system, terminal and storage medium
CN102970207B (en) A kind of instant communicating method, client terminal device and instantaneous communication system
CN113672894A (en) Data processing method, device and equipment for identifying code request and storage medium
CN112738045A (en) Multi-source fusion identity authentication system and method
CN113946739A (en) Sensitive data query method, device, equipment and storage medium
US20160330151A1 (en) Method and system for managing an informational site using a social networking application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210430

RJ01 Rejection of invention patent application after publication