CN112866287A - Cross-network access method, device and system based on office environment and storage medium - Google Patents

Cross-network access method, device and system based on office environment and storage medium Download PDF

Info

Publication number
CN112866287A
CN112866287A CN202110213791.6A CN202110213791A CN112866287A CN 112866287 A CN112866287 A CN 112866287A CN 202110213791 A CN202110213791 A CN 202110213791A CN 112866287 A CN112866287 A CN 112866287A
Authority
CN
China
Prior art keywords
service
network
server
external network
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110213791.6A
Other languages
Chinese (zh)
Inventor
张义
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Weikun Shanghai Technology Service Co Ltd
Original Assignee
Weikun Shanghai Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Weikun Shanghai Technology Service Co Ltd filed Critical Weikun Shanghai Technology Service Co Ltd
Priority to CN202110213791.6A priority Critical patent/CN112866287A/en
Publication of CN112866287A publication Critical patent/CN112866287A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Abstract

The invention relates to the field of computer software, and discloses an office environment-based cross-network access method, device, equipment, office system and storage medium. In the invention, the external network equipment generates a login request based on user operation and sends the login request to the mobile terminal front-end server; the method comprises the steps that a mobile terminal front-end server obtains a verification result of a login request, receives a service access request sent by an extranet device when the verification result of the login request is successful, determines a target intranet address corresponding to the service access request, and sends the service access request to a service server based on the target intranet address so that the service server can respond to the service access request, and therefore mobile office is achieved, and mobile office safety is improved; moreover, if the office system only supporting intranet office supports mobile office, only a new mobile-end front-end server needs to be added, the equipment in the original office system does not need to be modified, and the mobile office cost is low.

Description

Cross-network access method, device and system based on office environment and storage medium
Technical Field
The invention relates to the field of computer software, in particular to a cross-network access method, a cross-network access device, cross-network access equipment, an office system and a storage medium based on an office environment.
Background
In order to enable office staff to handle any business related matters at any time and any place and further to perform portable company management and communication at any time for office posts depending on computers, office mobility is a trend in recent years.
For security reasons, office systems typically support only internal network access for the enterprise. In order to realize that the external network device accesses the office system and thus realizes office mobility, in the related art, the office system supporting mobile office has low security and high cost.
Disclosure of Invention
The invention mainly aims to provide an office environment-based cross-network access method, device and system, a mobile-end front-end server and a storage medium, and aims to solve the problems of low security and high cost of the conventional office system holding mobile office.
In order to achieve the above object, the present invention provides an office environment-based cross-network access method, which includes the following steps:
receiving a login request sent by an external network device through an external network, and acquiring a verification result of the login request;
when the verification result is successful, receiving a service access request sent by the external network equipment through the external network;
analyzing the service access request to determine a corresponding service server;
determining a target intranet address based on the address of the service server;
and based on the target intranet address, sending the service access request to the service server through an internal network so that the service server responds to the service access request.
Optionally, the step of receiving, by the external network, a login request sent by the external network device and obtaining a verification result of the login request includes:
receiving a login request sent by an external network device through an external network;
sending the login request to an authentication server so that the authentication server authenticates the login request;
and receiving the verification result of the login request sent by the verification server.
Optionally, before the step of analyzing the service access request to determine the service server corresponding to the service access request, the cross-network access method based on the office environment further includes the following steps:
acquiring a data cookie of the extranet equipment, which is stored on a local terminal of a user;
acquiring a verification result of the cookie;
and when the verification result of the cookie is successful, analyzing the service access request to determine a corresponding service server.
Optionally, after the step of sending the service access request to the service server through an internal network based on the target intranet address, the cross-network access method based on the office environment further includes the following steps:
receiving a service access response sent by the service server through the internal network, wherein the service access response is generated by the service server based on the service access request;
determining a target extranet address based on the service access response;
and sending the service access response to the external network equipment through the external network based on the target external network address.
In addition, in order to achieve the above object, the present invention further provides an office environment-based cross-network access method, which is characterized by comprising the following steps:
generating a login request based on user operation;
sending the login request to a mobile terminal front-end server through an external network so that the mobile terminal front-end server obtains a verification result of the login request;
and when the verification result of the login request is successful, sending a service access request to the mobile terminal front-end server through the external network, so that the mobile terminal front-end server analyzes the service access request to determine a corresponding service server, determining a target intranet address based on the address of the service server, and sending the service access request to the service server through the internal network based on the target intranet address so that the service server responds to the service access request.
In addition, to achieve the above object, the present invention also provides an office system, including: the system comprises an external network device, a mobile terminal front-end server and a service server;
the extranet equipment is used for generating a login request based on user operation and sending the login request to the mobile terminal front-end server through an external network; when the verification result of the login request is successful, sending a service access request to the mobile terminal front-end server through the external network;
the mobile terminal front-end server is used for receiving the login request through the external network, acquiring a verification result of the login request, and receiving the service access request when the verification result is successful; analyzing the service access request to determine a corresponding service server; determining a target intranet address based on the address of the service server; determining a target intranet address based on the service access request; based on the target intranet address, the service access request is sent to the service server through an internal network;
and the service server is used for receiving the service access request through the internal network and responding.
In addition, to achieve the above object, the present invention further provides an inter-network access apparatus based on an office environment, the inter-network access apparatus including:
the generating module is used for generating a login request based on user operation;
the first sending module is used for sending the login request to a mobile terminal front-end server through an external network so that the mobile terminal front-end server can obtain the verification result of the login request;
and the second sending module is used for sending a service access request to the mobile terminal front-end server through the external network when the verification result of the login request is successful, so that the mobile terminal front-end server analyzes the service access request to determine a corresponding service server, a target intranet address is determined based on the address of the service server, and the service access request is sent to the service server through the internal network based on the target intranet address, so that the service server responds to the service access request.
In addition, to achieve the above object, the present invention further provides an inter-network access apparatus based on an office environment, the inter-network access apparatus including:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for receiving a login request sent by an external network device through an external network and acquiring a verification result of the login request;
a receiving module, configured to receive, through the external network, a service access request sent by the external network device when the verification result is that the verification is successful;
the analysis module is used for analyzing the service access request to determine the corresponding service;
the determining module is used for determining a target intranet address based on the address of the service server;
and the third sending module is used for sending the service access request to the service server through an internal network based on the target intranet address so as to enable the service server to respond to the service access request.
In addition, to achieve the above object, the present invention also provides a computer device, including: a memory, a processor, and a first cross-network access program or a second cross-network access program stored in the memory and running on the processor, wherein the first cross-network access program when executed by the processor implements the steps of the office environment-based cross-network access method of the first to fourth items, and the second cross-network access program when executed by the processor implements the steps of the office environment-based cross-network access method of the fifth item.
In addition, to achieve the above object, the present invention further provides a storage medium having a first cross-network access program or a second cross-network access program stored thereon, wherein the first cross-network access program, when executed by the processor, implements the steps of the office environment-based cross-network access method according to the first to fourth items, and the second cross-network access program, when executed by the processor, implements the steps of the office environment-based cross-network access method according to the fifth item
According to the technical scheme provided by the invention, the external network equipment generates a login request based on user operation and sends the login request to the mobile terminal front-end server through an external network; the method comprises the steps that a mobile terminal front-end server obtains a verification result of a login request, receives a service access request sent by an extranet device when the verification result of the login request is successful, analyzes the service access request to determine a corresponding service server, determines a target intranet address based on the address of the service server, and sends the service access request to the service server based on the target intranet address so that the service server responds to the service access request, and therefore cross-network access is achieved to achieve mobile office work, and due to the fact that an internal network is not directly connected with an external network, safety is high; moreover, if the office system only supporting intranet office work supports mobile office work, only a new mobile-end front-end server needs to be added, and equipment (such as a business server) in the original office system does not need to be modified, so that the mobile office work cost is low.
Drawings
FIG. 1 is a schematic diagram of a computer device architecture of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of an office-based cross-network access method according to the present invention;
FIG. 3 is a flowchart illustrating a second embodiment of the cross-network access method based on office environment according to the present invention;
FIG. 4 is a flowchart illustrating a third embodiment of an office-based cross-network access method according to the present invention;
FIG. 5 is a flowchart illustrating a fourth embodiment of an office-based cross-network access method according to the present invention;
FIG. 6 is a flowchart illustrating a fifth embodiment of the cross-network access method based on office environment according to the present invention;
FIG. 7 is a block diagram of a first embodiment of an office system of the present invention;
FIG. 8 is a block diagram of a cross-network access device based on an office environment according to the present invention;
fig. 9 is a block diagram of a cross-network access device based on an office environment according to a second embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a computer device in a hardware operating environment according to an embodiment of the present invention.
The computer device may be a User Equipment (UE) such as a Mobile phone, a smart phone, a laptop, a digital broadcast receiver, a Personal Digital Assistant (PDA), a tablet computer (PAD), a handheld device, a vehicle mounted device, a wearable device, a computing device, a monitoring device, a server or other processing device connected to a wireless modem, a Mobile Station (MS), etc.
Generally, a computer device includes: at least one processor 101, a memory 102, and a first cross-network access program or a second cross-network access program stored on the memory and executable on the processor, the first cross-network access program being configured to implement the steps of the mobile front-end server side in the office environment-based cross-network access method according to any one of the following embodiments; the second cross-network access program is configured to implement the steps on the external network device side in the office environment-based cross-network access method according to any one of the following embodiments.
Processor 101 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so forth. The processor 101 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 101 may also include a main processor and a coprocessor, where the main processor is a processor for processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 101 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing the content required to be displayed on the display screen. The processor 101 may further include an AI (Artificial Intelligence) processor for processing information about the operation of the office-based cross-network access method, so that the office-based cross-network access method model can be trained autonomously for learning, improving efficiency and accuracy.
Memory 102 may include one or more computer-readable storage media, which may be non-transitory. Memory 102 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 102 is used to store at least one instruction for execution by processor 101 to implement the office environment based cross-network access method provided by the method embodiments herein.
In some embodiments, the computer device may further optionally include: a communication interface 103 and at least one peripheral device. The processor 101, memory 102 and communication interface 103 may be connected by a bus or signal lines. Various peripheral devices may be connected to communication interface 103 via a bus, signal line, or circuit board. Specifically, the peripheral device includes: at least one of radio frequency circuitry 104, display screen 105, and power supply 106.
The communication interface 103 can be used to connect at least one peripheral device related to I/O (Input/Output) to the processor 101 and the memory 102. In some embodiments, the processor 101, memory 102, and communication interface 103 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 101, the memory 102 and the communication interface 103 may be implemented on a single chip or circuit board, which is not limited in this embodiment.
The Radio Frequency circuit 104 is used for receiving and transmitting RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuitry 104 communicates with communication networks and other communication devices via electromagnetic signals. The rf circuit 104 converts an electrical signal into an electromagnetic signal for transmission, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 104 comprises: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuitry 104 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: metropolitan area networks, various generations of mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WIFI (Wireless Fidelity) networks. In some embodiments, the rf circuit 104 may further include NFC (Near Field Communication) related circuits, which are not limited in this application.
The display screen 105 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. When the display screen 105 is a touch display screen, the display screen 105 also has the ability to capture touch signals on or over the surface of the display screen 105. The touch signal may be input to the processor 101 as a control signal for processing. At this point, the display screen 105 may also be used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, the display screen 105 may be one, the front panel of the electronic device; in other embodiments, the display screens 105 may be at least two, respectively disposed on different surfaces of the electronic device or in a folded design; in still other embodiments, the display 105 may be a flexible display, disposed on a curved surface or on a folded surface of the electronic device. Even further, the display screen 105 may be arranged in a non-rectangular irregular pattern, i.e. a shaped screen. The Display screen 105 may be made of LCD (liquid crystal Display), OLED (Organic Light-Emitting Diode), and the like.
The power supply 106 is used to supply power to various components in the electronic device. The power source 106 may be alternating current, direct current, disposable batteries, or rechargeable batteries. When the power source 106 includes a rechargeable battery, the rechargeable battery may support wired or wireless charging. The rechargeable battery may also be used to support fast charge technology. Those skilled in the art will appreciate that the configuration shown in FIG. 1 does not constitute a limitation of a computer device and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
In addition, an embodiment of the present invention further provides a storage medium, where a first cross-network access program or a second cross-network access program is stored in the storage medium, and when executed by a processor, the first cross-network access program implements a step on a mobile front-end server side in an office environment-based cross-network access method as described in any of the following embodiments; when executed by the processor, the second cross-network access program implements the steps on the external network device side in the office environment-based cross-network access method according to any of the embodiments described below. Therefore, a detailed description thereof will be omitted. In addition, the beneficial effects of the same method are not described in detail. For technical details not disclosed in embodiments of the computer-readable storage medium referred to in the present application, reference is made to the description of embodiments of the method of the present application. It is determined that, by way of example, the program instructions may be deployed to be executed on one computing device or on multiple computing devices at one site or distributed across multiple sites and interconnected by a communication network.
It will be understood by those skilled in the art that all or part of the processes of the methods of any of the embodiments described below may be implemented by instructions associated with hardware of a computer program that is stored in a computer-readable storage medium and that, when executed, may comprise processes of the embodiments of the methods described below. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
For security reasons, office systems typically support only internal private network access for the enterprise. In order to realize that the extranet device accesses the office system, thereby realizing office mobility, in the related art, mobile office is generally realized by the following means: the method comprises the steps of setting an outer network gateway and an inner network gateway, connecting an outer network with an inner network through the inner network gateway and the outer network gateway, and enabling a service server to be a server which supports direct access through an outer network address. In this way, the external network is directly connected to the internal network, and the security is low. Moreover, if an existing office system that only supports internal network office supports mobile office, devices such as an external network gateway and an internal network gateway need to be added, and meanwhile, devices in the existing office system need to be modified (for example, a service server that only supports internal network access in the existing office system needs to be modified to support external network address access), so that the mobile office cost is high.
In order to solve the above technical problems, embodiments of the present invention are proposed based on the above hardware configuration.
An embodiment of a cross-network access method based on office environment comprises the following steps:
referring to fig. 2, fig. 2 is a schematic flowchart of a first embodiment of the cross-network access method based on an office environment according to the present invention. In the embodiment of the invention, the cross-network access method based on the office environment comprises the following steps:
step S21: the extranet device generates a login request based on user operation.
It should be noted that, in the embodiment of the present invention, the office system includes an external network device, and the external network device is a device that can access an external network, that is, a device that is set in the external network. The external network equipment can be a mobile phone, a smart phone, a notebook computer, a tablet computer and the like. The external network is the internet or a wide area network.
When the extranet user needs to log in the office system for mobile office, the extranet user can operate on the extranet equipment to trigger login, and the extranet equipment receives user operation and generates a login request based on the user operation. When logging in based on the password, the login request can comprise a user name and a password; alternatively, when logging in based on the authentication code, the user name and the authentication code may be included in the login request.
In some embodiments, step S21 includes: the extranet equipment displays an office interface, receives user operation through the office interface and generates a login request based on the user operation. The office interface is used for receiving operation of an external network user, displaying office data and the like.
In some embodiments, the office system may further include an intranet device, where the intranet device is a device that can access the intranet, that is, a device disposed in the intranet. The intranet equipment is used for displaying an office interface, and the intranet equipment can receive intranet user operation and display office data through the office interface. The intranet equipment can be a notebook computer, a tablet computer and the like. The internal network is an enterprise internal special network established by adopting the Internet technology, and forms a unified and convenient information exchange platform by taking a TCP/IP protocol as a basis and Web as core application.
In order to reduce the development cost, the office interface of the extranet equipment and the office interface of the intranet equipment can be generated based on the same front-end code. The front-end code can ensure that the office interface can be self-adapted to screens with various sizes, and it needs to be explained that the display of the office interface of the external network equipment essentially adjusts the size of the office interface to the size of the screen of the equipment, and the office interface can be self-adapted to the screens of the external network equipment and the internal network equipment well under the support of a proper front-end frame, so that one set of office interface and two sets of environments are used. Like this, if need make the office system who only supports intranet official working support mobile office, then can acquire the front end code of intranet equipment official working interface, the official working interface of extranet equipment is generated based on the front end code of intranet equipment official working interface to need not to develop the official working interface of extranet equipment alone, reduce the mobile office cost, and, the later stage unified maintenance of being convenient for.
Step S22: and the external network equipment sends the login request to the mobile terminal front-end server through the external network.
In the embodiment of the invention, the office system comprises a mobile end front-end server. The mobile terminal front-end server can access an external network and can also access an internal network. That is, the mobile-end front-end server is connected to the external network and the internal network, and can receive data transmitted by the external network or data transmitted by the internal network.
In the embodiment of the invention, the mobile terminal front-end server is connected with the external network equipment through the external network. After the extranet device generates the login request, the mobile terminal front-end server and the extranet device are connected through the external network, so that the extranet device can send the login request to the mobile terminal front-end server through the external network.
Step S23: and the mobile terminal front-end server acquires the verification result of the login request.
The mobile terminal front-end server receives a login request sent by the extranet equipment through an external network, the login request needs to be verified in order to verify whether the extranet equipment has login authority, and the mobile terminal front-end server obtains a verification result of the login request.
In some embodiments, step S23 includes: and the mobile terminal front-end server verifies the login request to obtain a verification result.
The mobile front-end server receives a login request sent by the extranet device through the external network, and can authenticate the login request according to the preconfigured user information allowing to log in the office system to obtain an authentication result.
In some embodiments, step S23 includes:
step S231: the mobile terminal front-end server sends the login request to the authentication server.
The office system can comprise an authentication server, and the authentication server is connected with the mobile terminal front-end server. In some examples, the mobile-end front-end server may be connected with the authentication server through an external network, i.e., the authentication server is provided in the external network; alternatively, the mobile-end front-end server may be connected to the authentication server through an internal network, i.e. the authentication server is disposed in the internal network.
The authentication server is pre-configured with user information allowing login to the office system, so that the login request can be authenticated. Therefore, when the mobile terminal front-end server receives the login request, the login request can be sent to the authentication server, so that the authentication server can authenticate the login request.
Step S232: and the mobile terminal front-end server receives the verification result of the login request sent by the verification server.
And after receiving the login request sent by the mobile terminal front-end server, the authentication server authenticates the login request based on the preconfigured user information allowing the user to login the office system, and sends the authentication result to the mobile terminal front-end server. And the mobile terminal front-end server receives the verification result of the login request sent by the verification server. The verification result of the login request comprises verification success and verification failure, wherein the verification success is that the login request passes the verification, namely the information included in the login request is correct; the authentication failure is an error in the information included in the login request.
Step S24: and when the verification result of the login request is successful, the external network equipment sends the service access request to the mobile terminal front-end server through the external network.
And when the verification result is that the verification is successful, the mobile terminal front-end server can send a verification success response to the external network equipment through the external network, so that an external network user can operate on the external network equipment to trigger a service request, the external network equipment receives user operation, generates a service access request based on the user operation, and sends the service access request to the mobile terminal front-end server through the external network.
Step S25: the mobile terminal front-end server analyzes the service access request to determine a corresponding service server.
When the verification result of the login request is successful, the mobile terminal front-end server receives a service access request sent by the external network equipment through the external network, and the service access request is transmitted based on the external network, and the destination address of the service access request is an external network address (namely an address supported by the external network), so that the service access request cannot be directly transmitted to the internal network. Therefore, the mobile end front-end server analyzes the service access request to determine the corresponding service server.
In some embodiments, the mobile front-end server may parse the service access request to determine the service requested to be accessed, and determine the corresponding service server based on the service requested to be accessed.
It should be noted that, in the office system, one or more service servers may be deployed according to actual needs, and different service servers are used for providing different services. Therefore, the mobile terminal front-end server can analyze the service access request to determine the service which needs to be accessed, determine the corresponding service server according to the service which needs to be accessed, and take the intranet address of the service server as the target intranet address; for example, suppose that the office system includes a service server 1 and a service server 2, the service server 1 is used for providing services 1 and 2, the service server 2 is used for providing services 3 and 4, the mobile front-end server analyzes the service access request, and determines that the service that needs to be accessed is the service 3, and since the service 3 is provided by the service server 2, the corresponding service server is the service server 2.
Step S26: and the mobile terminal front-end server determines a target intranet address based on the address of the service server.
In the embodiment of the invention, the mobile end front-end server can access the internal network, so that the mobile end front-end server can acquire the address of the service server and take the address of the service server as the target intranet address. The intranet Address is an Address supported by the internal network, and the form of the intranet Address includes, but is not limited to, an intranet domain name, an intranet IP (Internet Protocol Address), and the like.
Step S27: and the mobile terminal front-end server sends the service access request to a corresponding service server through an internal network based on the target intranet address so that the service server responds to the service access request.
After the mobile terminal front-end server determines the target intranet address based on the service access request, the service access request is sent to the corresponding service server through the internal network, so that the service server responds to the service access request, and mobile office is achieved.
In some embodiments, since the service access request is sent based on an external network, and the destination address of the service access request is an external network address, and cannot be directly transmitted to an internal network, the mobile-end front-end server may change the destination address of the service access request to a target internal network address, and send the service access request with the changed destination address out through the internal network, so as to send the service access request to a corresponding service server. For example, assuming that the destination address of the service access request is an extranet domain name and the target intranet address is a target intranet domain name, the mobile-end front-end server may change the destination address of the service access request from the extranet domain name to the target intranet domain name, and send the service access request with the changed domain name through an internal network, so as to send the service access request to a corresponding service server.
According to the cross-network access method based on the office environment, provided by the embodiment of the invention, the external network equipment generates a login request based on user operation and sends the login request to the mobile terminal front-end server through the external network; the method comprises the steps that a mobile terminal front-end server obtains a verification result of a login request, receives a service access request sent by an external network device when the verification result of the login request is successful, analyzes the service access request to determine a corresponding service server, determines a target internal network address based on the address of the service server, and sends the service access request to the service server based on the target internal network address, so that the service server responds to the service access request, cross-network access is realized, and mobile office is realized; moreover, if the office system only supporting intranet office work supports mobile office work, only a new mobile-end front-end server needs to be added, and equipment (such as a business server) in the original office system does not need to be modified, so that the mobile office work cost is low.
Based on the first embodiment, the invention provides a second embodiment of the cross-network access method based on the office environment. Referring to fig. 3, fig. 3 is a flowchart illustrating a second embodiment of the cross-network access method based on an office environment according to the present invention. In this embodiment of the present invention, after step S27, the method for accessing across networks based on an office environment may further include the following steps:
step S28: and the service server generates a service access response according to the service access request.
In the embodiment of the invention, after the service server receives the service access request sent by the mobile terminal server through the internal network, the service server generates the service access response according to the service access request.
In some embodiments, the service access response includes service data corresponding to the service access request, and the office system may further include a service database connected to the service server through the internal network, that is, a service database set in the internal network; the service database stores service data. After receiving the service access request, the service server may obtain service data from the service database based on the service access request, and generate a service access response based on the obtained service data.
Step S29: and the service server sends the service access response to the mobile terminal front-end server through the internal network.
And after the service server generates a service access response, the service access response is sent to the mobile terminal front-end server through the internal network.
Step S30: and the mobile terminal front-end server determines a target external network address based on the service access response.
After the mobile terminal front-end server receives the service access response sent by the service server through the internal network, the destination address of the service access response is an intranet address because the service access response is transmitted based on the internal network, and the service access response cannot be directly transmitted to the external network. Therefore, the mobile-end front-end server determines the target extranet address based on the service access response.
In some embodiments, the mobile-end front-end server parses the service access response to determine the corresponding external network device, and then the mobile-end front-end server may obtain the external network address corresponding to the external network device as the target external network address.
Step S31: and the mobile terminal front-end server sends the service access response to the external network equipment through the external network based on the target external network address.
And after determining the target external network address based on the service access response, the mobile terminal front-end server sends the service access response to the corresponding external network equipment through the external network so as to provide service data for the external network equipment, thereby realizing mobile office.
In some embodiments, since the service access response is sent based on an internal network, and the destination address of the service access response is an internal network address and cannot be directly transmitted to an external network, the mobile-end front-end server may change the destination address of the service access response to a target external network address, and send the service access response after the destination address change out through the external network, so as to send the service access response to the corresponding external network device. For example, assuming that the destination address of the service access response is an intranet domain name and the target extranet address is a target extranet domain name, the mobile-end front-end server may change the destination address of the service access response from the intranet domain name to the target extranet domain name, and send the service access response after changing the domain name out through an external network, so as to send the service access response to the corresponding extranet device.
According to the cross-network access method based on the office environment, the business server generates a business access response according to the business access request and sends the business access response to the mobile terminal front-end server through the internal network, the mobile terminal front-end server determines a target external network address based on the business access response, and sends the business access response to the external network equipment through the external network based on the target external network address so as to provide business data for the external network equipment, and therefore mobile office is achieved.
Based on the foregoing embodiments, a third embodiment of the cross-network access method based on the office environment is provided. Referring to fig. 4, fig. 4 is a flowchart illustrating a third embodiment of the cross-network access method based on an office environment according to the present invention. In this embodiment of the present invention, before step S25, the method for accessing across networks based on an office environment may further include the following steps:
step S32: the mobile end front end server acquires the cookie of the extranet equipment.
It should be noted that the cookie is data stored on the user local terminal, and is information that some websites store on the user local terminal (usually encrypted) for Session tracking in order to identify the user identity, and is temporarily or permanently stored by the user client computer.
In the embodiment of the present invention, the extranet device stores a cookie, and the cookie includes user information (for example, a user name and a password), where the user information may be obtained from the login request and stored in the cookie. In some embodiments, the mobile-end front-end server may obtain the user information from the login request when the authentication result of the login request is successful, generate a cookie based on the user information, and send the cookie to the extranet device, where the extranet device stores the cookie.
After receiving the service access request, the mobile end front-end server acquires the cookie from the external network equipment.
Step S33: and the mobile terminal front-end server acquires the verification result of the cookie.
In the embodiment of the invention, after the cookie of the external network equipment is acquired, the cookie needs to be verified. And the mobile terminal front-end server acquires the verification result of the cookie.
The mobile end front end server can verify the cookie, namely the mobile end front end server verifies the cookie after acquiring the cookie of the external network equipment; or, the authentication server may authenticate the cookie, that is, after the mobile front-end server acquires the cookie of the extranet device, the mobile front-end server sends the cookie to the authentication server, and the authentication server authenticates the cookie and sends the authentication result to the mobile front-end server.
In some embodiments, the step of validating the cookie comprises: and extracting the user information from the cookie, and verifying the user information to obtain a verification result of the user information in the cookie. The user information in the cookie can be verified based on the pre-configured user information allowing the user to log in the office system.
In some embodiments, the step of validating the cookie comprises: and verifying whether the cookie is effective, if so, extracting the user information from the cookie, and verifying the user information to obtain a verification result of the user information in the cookie.
In an example, after the verification result of the login request is successful, the mobile-end front-end server may update the cookie on the extranet device every other preset first time period, and simultaneously monitor the operation on the extranet device, and stop updating the cookie on the extranet device if the extranet device does not receive the user operation within a preset second time period. The way of verifying whether the cookie is valid may be: verifying whether the time difference between the updating time of the cookie and the current time exceeds a preset first time period, and if so, invalidating; if not, the method is effective. The specific values of the preset second time period and the preset first time period can be flexibly set according to actual needs, and in one example, the preset second time period is greater than or equal to the preset first time period. For example, assuming that the preset first time period is 5 minutes, the preset second time period is 10 minutes, the mobile front-end server updates the cookie on the external network device every 5 minutes, assuming that 12: 07 minutes updates the cookie on the external network device, and during 12: 12 to 12: 10 minutes, no user operation is received on the external network device, the mobile front-end device stops updating the cookie on the external network device from 12: 10 minutes, and at 12: 15 minutes, the mobile front-end device receives the service access request sent on the external network device, acquires the cookie on the external network device, and since the update time of the acquired cookie is 12: 07 minutes, the time difference from 12: 15 minutes at the current time is 8 minutes, the cookie has exceeded the preset first time period by 5 minutes, and is invalid.
Step S34: when the authentication result of the cookie is authentication success, step S25 is performed.
When the authentication result of the cookie is authentication success, step S25 is performed.
According to the cross-network access method based on the office environment, provided by the embodiment of the invention, after the login request is successfully verified, the mobile terminal front-end server receives the service access request sent by the external network equipment through the external network, firstly obtains the cookie from the external network equipment, obtains the verification result of the cookie, and sends the service access request to the service server when the verification result is successful, namely, the cookie of the external network equipment is verified every time the service access request is received, and the service access request is processed when the verification is passed, so that the safety of mobile office is improved.
Based on the foregoing embodiment, a fourth embodiment of the cross-network access method based on the office environment is provided. Referring to fig. 5, fig. 5 is a schematic flowchart of a fourth embodiment of the cross-network access method based on the office environment according to the present invention. In this embodiment of the present invention, before step S25, the method for accessing across networks based on an office environment may further include the following steps:
step S35: and the mobile terminal front-end server judges whether the external network equipment has the access authority or not based on the service access request.
The office system supports various office services, and in consideration of different access permissions of different users for accessing the services, in the embodiment of the invention, the mobile terminal front-end server is configured with service access permission data, and the service access permission data comprises user names and corresponding service access permissions. After receiving a service access request sent by an external network device through an external network, a mobile terminal front-end server can analyze the service access request to determine a target service requested to be accessed by the mobile device, and then judges whether a user name corresponding to the external network device has the authority to access the target service based on pre-configured service access authority data.
Step S36: if yes, go to step S25.
If yes, go to step S25 and the following steps.
According to the cross-network access method based on the office environment, provided by the embodiment of the invention, after the login request is successfully verified, the mobile terminal front-end server receives the service access request sent by the external network equipment through the external network, firstly, whether the external network equipment has the access authority is judged based on the service access request, and if the external network equipment has the access authority, the service access request is sent to the service server, namely, whether the external network equipment has the access authority is judged every time the service access request is received, and the service access request is processed only when the external network equipment has the access authority, so that the safety of mobile office is improved.
Based on the foregoing embodiments, a fifth embodiment of the cross-network access method based on the office environment according to the present invention is provided. Referring to fig. 6, fig. 6 is a schematic flowchart of a fifth embodiment of the cross-network access method based on an office environment according to the present invention. In this embodiment of the present invention, after step S23, the method for accessing across networks based on an office environment may further include the following steps:
step S37: and when the verification result of the login request is successful, the mobile terminal front-end server monitors the operation on the external network equipment.
And when the verification result of the login request is successful, the mobile terminal front-end server can monitor the user operation on the extranet equipment.
Step S38: and when the preset violation operation is monitored, the mobile terminal front-end server controls the external network equipment according to a preset safety prevention and control strategy.
The violation operation can be flexibly set according to actual needs, for example, in one example, the violation operation includes but is not limited to: screen capture, screen recording, downloading and the like can reveal the operation of office data.
The preset security prevention and control policy can be flexibly set according to actual needs, for example, in one example, the preset security prevention and control policy includes but is not limited to: adding watermark on the office interface of the external network equipment, deepening the watermark on the office interface of the external network equipment, forbidding the external network equipment to log in and the like to avoid the control strategy of leakage of office data from the external network equipment.
In the embodiment of the invention, when the preset violation operation is monitored, the mobile terminal front-end server controls the external network equipment according to the preset security prevention and control strategy, so that the security of office data is ensured.
According to the cross-network access method based on the office environment, provided by the embodiment of the invention, after the login request is successfully verified, the mobile terminal front-end server monitors the operation on the external network equipment, and when the preset illegal operation is monitored, the external network equipment is controlled according to the preset safety prevention and control strategy, so that the office data is prevented from being leaked, and the safety of mobile office is ensured.
Office system embodiment
Based on the foregoing embodiments, a first embodiment of the office system of the present invention is provided. Referring to fig. 7, fig. 7 is a block diagram illustrating a first embodiment of an office system according to the present invention, wherein the office system includes: the external network device 71 is connected to the mobile-end front-end server 72 via an external network, and the mobile-end front-end server 72 is connected to the service server 73 via an internal network.
The extranet device 71 is configured to generate a login request based on a user operation, and send the login request to the mobile-end front-end server 72 through an external network; and sends the service access request to the mobile-end front-end server 72 through the external network when the authentication result of the login request is successful. Specifically, please refer to the foregoing embodiments, which are not described herein again.
The mobile terminal front-end server 72 is configured to receive a login request through an external network, obtain a verification result of the login request, and receive a service access request when the verification result is successful; analyzing the service access request to determine the corresponding service; determining a target intranet address based on the address of the service server; based on the target intranet address, a service access request is sent to the service server 73 through the internal network. Specifically, please refer to the foregoing embodiments, which are not described herein again.
And a service server 73 for receiving the service access request through the internal network and responding. Specifically, please refer to the foregoing embodiments, which are not described herein again.
In some embodiments, referring to fig. 7, the office system further optionally includes an intranet device 74 connected to the service server 73 via an intranet.
The intranet device 74 is used for displaying an office interface, the extranet device 71 is used for displaying an office interface, and the office interface of the extranet device 71 and the office interface of the intranet device 74 are generated based on the same front-end code.
The office system also optionally comprises: an authentication server 75 connected to the mobile-end head-end device, and a service database 76 connected to the service server 73 via an internal network.
The authentication server 75 is used to authenticate a login request, a cookie, and the like.
The service database 76 stores service data, and the service server 73 may obtain the service data from the service database 76 based on the service access request and generate a service access response.
Referring to fig. 8, fig. 8 is a block diagram illustrating a cross-network access apparatus based on an office environment, which is applied to an external network device, according to the present invention, wherein the apparatus includes:
and a generating module 81, configured to generate a login request based on a user operation.
The first sending module 82 is configured to send the login request to the mobile frontend server through the external network, so that the mobile frontend server obtains an authentication result of the login request.
And a second sending module 83, configured to send the service access request to the mobile-end front-end server through the external network when the verification result of the login request is that the verification is successful, so that the mobile-end front-end server parses the service access request to determine a corresponding service server, determine a target intranet address based on the address of the service server, and send the service access request to the service server through the internal network based on the target intranet address, so that the service server responds to the service access request.
It should be noted that the cross-network access apparatus may further optionally include a corresponding module to implement other steps on the external network device side in the cross-network access method based on the office environment.
Referring to fig. 9, fig. 9 is a block diagram of an office-environment-based cross-network access apparatus applied to a mobile-end front-end device according to the present invention, wherein the apparatus includes:
the obtaining module 91 is configured to receive, through an external network, a login request sent by an extranet device, and obtain a verification result of the login request.
A receiving module 92, configured to receive, through the external network, a service access request sent by the external network device when the verification result is that the verification is successful.
The parsing module 93 is configured to parse the service access request to determine a service corresponding to the service access request;
and a determining module 94, configured to determine a target intranet address based on the address of the service server.
A third sending module 95, configured to send the service access request to a corresponding service server through an internal network based on the target intranet address, so that the service server responds to the service access request.
It should be noted that the cross-network access device may further optionally include a corresponding module to implement other steps on the mobile-end front-end server side in the office-environment-based cross-network access method.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for causing a terminal device to execute the method according to the embodiments of the present invention.
The above description is only an alternative embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications and equivalents of the present invention, which are made by the contents of the present specification and the accompanying drawings, or directly/indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. An office environment-based cross-network access method, characterized by comprising the following steps:
receiving a login request sent by an external network device through an external network, and acquiring a verification result of the login request;
when the verification result is successful, receiving a service access request sent by the external network equipment through the external network;
analyzing the service access request to determine a corresponding service server;
determining a target intranet address based on the address of the service server;
and based on the target intranet address, sending the service access request to the service server through an internal network so that the service server responds to the service access request.
2. The cross-network access method based on office environment according to claim 1, wherein the step of receiving a login request sent by an external network device through an external network and obtaining a verification result of the login request comprises:
receiving a login request sent by an external network device through an external network;
sending the login request to an authentication server so that the authentication server authenticates the login request;
and receiving the verification result of the login request sent by the verification server.
3. The office-based cross-network access method of claim 1, wherein prior to the step of parsing the service access request to determine its corresponding service server, the office-based cross-network access method further comprises the steps of:
acquiring a data cookie of the extranet equipment, which is stored on a local terminal of a user;
acquiring a verification result of the cookie;
and when the verification result of the cookie is successful, analyzing the service access request to determine a corresponding service server.
4. The office-based cross-network access method according to any one of claims 1-3, wherein after the step of sending the service access request to the service server through an internal network based on the target intranet address, the office-based cross-network access method further comprises the steps of:
receiving a service access response sent by the service server through the internal network, wherein the service access response is generated by the service server based on the service access request;
determining a target extranet address based on the service access response;
and sending the service access response to the external network equipment through the external network based on the target external network address.
5. An office environment-based cross-network access method, characterized by comprising the following steps:
generating a login request based on user operation;
sending the login request to a mobile terminal front-end server through an external network so that the mobile terminal front-end server obtains a verification result of the login request;
and when the verification result of the login request is successful, sending a service access request to the mobile terminal front-end server through the external network, so that the mobile terminal front-end server analyzes the service access request to determine a corresponding service server, determining a target intranet address based on the address of the service server, and sending the service access request to the service server through the internal network based on the target intranet address so that the service server responds to the service access request.
6. An office system, comprising: the system comprises an external network device, a mobile terminal front-end server and a service server;
the extranet equipment is used for generating a login request based on user operation and sending the login request to the mobile terminal front-end server through an external network; when the verification result of the login request is successful, sending a service access request to the mobile terminal front-end server through the external network;
the mobile terminal front-end server is used for receiving the login request through the external network, acquiring a verification result of the login request, and receiving the service access request when the verification result is successful; analyzing the service access request to determine a corresponding service server; determining a target intranet address based on the address of the service server; determining a target intranet address based on the service access request; based on the target intranet address, the service access request is sent to the service server through an internal network;
and the service server is used for receiving the service access request through the internal network and responding.
7. An office environment-based cross-network access device, the cross-network access device comprising:
the generating module is used for generating a login request based on user operation;
the first sending module is used for sending the login request to a mobile terminal front-end server through an external network so that the mobile terminal front-end server can obtain the verification result of the login request;
and the second sending module is used for sending a service access request to the mobile terminal front-end server through the external network when the verification result of the login request is successful, so that the mobile terminal front-end server analyzes the service access request to determine a corresponding service server, a target intranet address is determined based on the address of the service server, and the service access request is sent to the service server through the internal network based on the target intranet address, so that the service server responds to the service access request.
8. An office environment-based cross-network access device, the cross-network access device comprising:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for receiving a login request sent by an external network device through an external network and acquiring a verification result of the login request;
a receiving module, configured to receive, through the external network, a service access request sent by the external network device when the verification result is that the verification is successful;
the analysis module is used for analyzing the service access request to determine the corresponding service;
the determining module is used for determining a target intranet address based on the address of the service server;
and the third sending module is used for sending the service access request to the service server through an internal network based on the target intranet address so as to enable the service server to respond to the service access request.
9. A computer device, characterized in that the computer device comprises: a memory, a processor and a first cross-network access program or a second cross-network access program stored on the memory and running on the processor, the first cross-network access program when executed by the processor implementing the steps of the office environment based cross-network access method according to any one of claims 1-4, the second cross-network access program when executed by the processor implementing the steps of the office environment based cross-network access method according to claim 5.
10. A storage medium having stored thereon a first cross-network access program or a second cross-network access program, the first cross-network access program when executed by the processor implementing the steps of the office environment based cross-network access method according to any one of claims 1-4, the second cross-network access program when executed by the processor implementing the steps of the office environment based cross-network access method according to claim 5.
CN202110213791.6A 2021-02-25 2021-02-25 Cross-network access method, device and system based on office environment and storage medium Pending CN112866287A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110213791.6A CN112866287A (en) 2021-02-25 2021-02-25 Cross-network access method, device and system based on office environment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110213791.6A CN112866287A (en) 2021-02-25 2021-02-25 Cross-network access method, device and system based on office environment and storage medium

Publications (1)

Publication Number Publication Date
CN112866287A true CN112866287A (en) 2021-05-28

Family

ID=75991575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110213791.6A Pending CN112866287A (en) 2021-02-25 2021-02-25 Cross-network access method, device and system based on office environment and storage medium

Country Status (1)

Country Link
CN (1) CN112866287A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113472760A (en) * 2021-06-22 2021-10-01 上海外高桥造船有限公司 Enterprise internal cooperation management method, system, equipment and medium
CN113992382A (en) * 2021-10-22 2022-01-28 北京京东振世信息技术有限公司 Service data processing method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040093519A1 (en) * 2002-11-13 2004-05-13 Grobman Steven L. Network protecting authentication proxy
CN101072102A (en) * 2007-03-23 2007-11-14 南京联创网络科技有限公司 Information leakage preventing technology based on safety desktop for network environment
CN108600204A (en) * 2018-04-11 2018-09-28 浙江大学 A kind of corporate intranet access method based on Opposite direction connection and application layer tunnel
CN111355720A (en) * 2020-02-25 2020-06-30 深信服科技股份有限公司 Method, system and equipment for accessing intranet by application and computer storage medium
CN112260990A (en) * 2020-09-16 2021-01-22 厦门网宿有限公司 Method and device for safely accessing intranet application

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040093519A1 (en) * 2002-11-13 2004-05-13 Grobman Steven L. Network protecting authentication proxy
CN1501264A (en) * 2002-11-13 2004-06-02 ض� Network protecting authentication proxy
CN101072102A (en) * 2007-03-23 2007-11-14 南京联创网络科技有限公司 Information leakage preventing technology based on safety desktop for network environment
CN108600204A (en) * 2018-04-11 2018-09-28 浙江大学 A kind of corporate intranet access method based on Opposite direction connection and application layer tunnel
CN111355720A (en) * 2020-02-25 2020-06-30 深信服科技股份有限公司 Method, system and equipment for accessing intranet by application and computer storage medium
CN112260990A (en) * 2020-09-16 2021-01-22 厦门网宿有限公司 Method and device for safely accessing intranet application

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113472760A (en) * 2021-06-22 2021-10-01 上海外高桥造船有限公司 Enterprise internal cooperation management method, system, equipment and medium
CN113992382A (en) * 2021-10-22 2022-01-28 北京京东振世信息技术有限公司 Service data processing method and device, electronic equipment and storage medium
CN113992382B (en) * 2021-10-22 2024-04-05 北京京东振世信息技术有限公司 Service data processing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
EP1233636B1 (en) System and method for over the air configuration security
CN107222485B (en) Authorization method and related equipment
US9635018B2 (en) User identity verification method and system, password protection apparatus and storage medium
US20150319173A1 (en) Co-verification method, two dimensional code generation method, and device and system therefor
US20190268770A1 (en) Method and apparatus for remote portable wireless device authentication
US8234492B2 (en) Method, client and system for reversed access to management server using one-time password
CN109768977B (en) Streaming media data processing method and device, related equipment and medium
CN103095457A (en) Login and verification method for application program
CN108616499B (en) Authentication method of application program, terminal and computer readable storage medium
US20100082982A1 (en) Service control system and service control method
CN108881103B (en) Network access method and device
KR101201095B1 (en) Portable computing environment
KR20130143263A (en) Method for authentication users using open id based on trusted platform, apparatus and system for the same
CN112788150A (en) Registration method, terminal device, block chain management screen platform and storage medium
CN112866287A (en) Cross-network access method, device and system based on office environment and storage medium
US20220330021A1 (en) Network Profile Anti-spoofing On Wireless Gateways
CN113259301A (en) Account data sharing method and electronic equipment
CN107317796A (en) The method and terminal of a kind of safety certification
CN113037741A (en) Authentication method and related device
KR20130031435A (en) Method and apparatus for generating and managing of encryption key portable terminal
JP2014211677A (en) Authentication method, terminal, and program
CN110445746B (en) Cookie obtaining method and device and storage equipment
CN109729045B (en) Single sign-on method, system, server and storage medium
KR100858146B1 (en) Method for personal authentication using mobile and subscriber identify module and device thereof
CN108737341B (en) Service processing method, terminal and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210528