CN113051541B - Logoff method and device of target account, electronic equipment and computer readable medium - Google Patents

Logoff method and device of target account, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN113051541B
CN113051541B CN202110349798.0A CN202110349798A CN113051541B CN 113051541 B CN113051541 B CN 113051541B CN 202110349798 A CN202110349798 A CN 202110349798A CN 113051541 B CN113051541 B CN 113051541B
Authority
CN
China
Prior art keywords
time
token
webpage
duration
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110349798.0A
Other languages
Chinese (zh)
Other versions
CN113051541A (en
Inventor
吴建亮
胡鹏
李才晓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Jeeseen Network Technologies Co Ltd
Original Assignee
Guangzhou Jeeseen Network Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Jeeseen Network Technologies Co Ltd filed Critical Guangzhou Jeeseen Network Technologies Co Ltd
Priority to CN202110349798.0A priority Critical patent/CN113051541B/en
Publication of CN113051541A publication Critical patent/CN113051541A/en
Application granted granted Critical
Publication of CN113051541B publication Critical patent/CN113051541B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides a logout method and device of a target account, electronic equipment and a computer readable medium, and belongs to the technical field of server web. The method comprises the following steps: determining whether a token exists in a browser in a terminal, wherein under the condition that the token exists in the browser in the terminal, the recording time length of a timing tool in a current webpage is obtained, wherein each webpage corresponds to one timing tool, the timing tool is used for recording the starting time length of the current webpage and timing the refreshing of the indication token, and the recording time length is the time length between the preset starting time of the timing tool and the current time of the timing tool; under the condition that the recording duration reaches the effective duration of the token, judging whether an operation record exists in the effective duration of the current webpage or not; and under the condition that the current webpage does not have the operation record within the effective duration, executing logout operation of the target account. The application improves the security of the target account.

Description

Logoff method and device of target account, electronic equipment and computer readable medium
Technical Field
The present application relates to the field of computer web technologies, and in particular, to a logoff method and apparatus for a target account, an electronic device, and a computer-readable medium.
Background
If the front end requests authentication from the server end by using the user name/password, and the authentication of the server end is successful, an access Token (hereinafter referred to as Token) and a refresh Token are returned to the front end at the server end, and the front end can bring the Token to prove the legal status of the front end at each request.
token is a credential for acquiring protected resources, but it has an expiration time, otherwise it can be permanently used by one login, and the authentication function loses its meaning. When the token expires, the token is reacquired, i.e., the token is actively refreshed. The credential for the active refresh token is a refresh token, whose expiration duration may be set longer than the expiration duration of the token.
At present, after a user logs in a webpage, a refresh token can refresh the token all the time to avoid the user from frequently inputting a user name and a password, the account can be quitted from the webpage until the time of the refresh token expires or the user actively quits the account, and because the expiration time of the refresh token is longer, if the user does not actively quit the account, the risk of information leakage exists when the user name and the password are stored on the webpage for a long time.
Disclosure of Invention
An object of the embodiments of the present application is to provide a method, an apparatus, an electronic device, and a computer-readable medium for logoff of a target account, so as to solve the problem of low system running speed. The specific technical scheme is as follows:
in a first aspect, a logoff method for a target account is provided, where the method includes:
determining whether a token exists in a browser in a terminal, wherein the browser comprises a plurality of opened webpages, the plurality of webpages share one token, the token is a mark fed back by a server after receiving an authentication request of a target account sent by the terminal, and the token is used for indicating that the target account of the browser is successfully authenticated;
under the condition that a token exists in a browser in a terminal, acquiring the recording time length of a timing tool in a current webpage, wherein each webpage corresponds to one timing tool, the timing tool is used for recording the time length of starting the current webpage and timing and indicating the refreshing of the token, and the recording time length is the time length between the preset starting time of the timing tool and the current time of the timing tool;
under the condition that the record duration reaches the effective duration of the token, judging whether an operation record exists in the effective duration of the current webpage or not;
and executing logout operation of the target account under the condition that the current webpage does not have the operation record within the effective duration.
Optionally, after determining whether an operation record exists in the valid duration of the current webpage, the method further includes:
and under the condition that the operation record exists in the effective duration of the current webpage, resetting the current moment of the timing tool to be the preset starting moment, wherein the duration between the preset starting moment and the preset ending moment of the timing tool is the same as the effective duration.
Optionally, the determining that the operation record exists in the valid duration of the current webpage includes:
determining the refreshing time of the current webpage when the token refreshing is executed last time;
under the condition that the operation behavior of the current webpage is determined, recording the operation time of the operation behavior, wherein the refreshing time is earlier than the operation time;
determining a target duration between the operation time and a refreshing time;
and under the condition that the target duration is not greater than the effective duration, refreshing the token and determining that an operation record exists in the effective duration of the current webpage.
Optionally, the refreshing the token comprises:
and under the condition that the timing tool indicates the preset ending time, calling a refreshing tool to update the refreshing time of the current token so as to enable the token to keep an effective state, wherein the updated refreshing time is the same as the current system time.
Optionally, the resetting the current time of the timing tool to the preset starting time when it is determined that the operation record exists in the effective duration of the current webpage includes:
under the condition that the operation record of the current webpage exists in the effective duration, judging whether a refreshing identifier of a target webpage exists in a shared memory or not, wherein the target webpage is a webpage except the current webpage in the current opened webpage, the shared memory is used for storing the refreshing identifier of the webpage, and the refreshing identifier is an identifier of the webpage which is refreshed by the token at present;
if the shared memory is determined not to have the refreshing identifier of the target webpage, resetting the current moment of the timing tool to the preset starting moment and executing the refreshing operation.
Optionally, after determining whether the refresh identifier of the target webpage exists in the shared memory, the method further includes:
and if the refresh identifier of the target webpage exists in the shared memory, resetting the current moment of the timing tool to the preset starting moment.
Optionally, the obtaining the recording duration of the timing tool in the current webpage includes:
under the condition that the target time length is determined to be inconsistent with the recording time length of the timing tool, adjusting the time of the timing tool according to the target time length;
and acquiring the recording duration of the timing tool according to the adjusted time.
Optionally, when it is determined that the target duration is inconsistent with the recording duration of the timing tool, adjusting the time of the timing tool according to the target duration includes: under the condition that the target duration is longer than the recording duration of the timing tool, adjusting the time of the timing tool until the target duration is the same as the recording duration;
the acquiring the recording duration of the timing tool according to the adjusted time comprises: adjusting the timing tool to an intermediate time according to the target time length, wherein the preset starting time length and the intermediate time length are the same as the target time length; taking the difference value between the intermediate time and the preset starting time as a first recording duration; taking the difference value between the current time and the intermediate time as a second recording duration; and taking the sum of the first recording duration and the second recording duration as the recording duration.
Optionally, the obtaining the recording duration of the timing tool in the current webpage includes:
configuring an identifier for a new web page when the new web page is detected, wherein each web page has a unique identifier;
saving the identification in memory;
under the condition that a target webpage executes token refreshing operation, sending a target identifier of the target webpage to the shared memory, wherein the target identifier is the same as the refreshing identifier;
and under the condition that the identification of the current webpage is detected, starting timing through the timing tool and acquiring the recording duration of the timing tool.
Optionally, configuring an identifier for the new web page includes:
and constructing the identification of the new web page through a timestamp and a random number.
Optionally, saving the identification in memory comprises:
determining whether the identity of the new web page already exists in the memory;
in the event that it is determined that the identity of the new web page already exists in the memory, altering the random number;
constructing a new identifier of the new web page through the timestamp and the changed random number;
saving the new identification in the memory.
Optionally, the determining that the operation behavior occurs to the current webpage includes:
and monitoring the operation behaviors of the current webpage through a monitoring tool, wherein the operation behaviors comprise keyboard operations and mouse operations.
Optionally, after performing logoff operation of the target account, the method further includes:
and deleting the token, the refreshing tool and the information of the effective duration.
Optionally, after performing logoff operation of the target account, the method further includes:
and listing information of the token, the refreshing tool and the effective duration into a blacklist.
Optionally, the timing tool exists in the monitoring tool, and the monitoring the operation behavior of the current webpage through the monitoring tool includes:
and monitoring the operation behavior of the current webpage through JavaScript.
In a second aspect, a logoff device for a target account is provided, the device comprising:
the system comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining whether a token exists in a browser in a terminal, the browser comprises a plurality of opened webpages, the webpages share one token, the token is a mark fed back by a server after receiving an authentication request of a target account sent by the terminal, and the token is used for indicating that the target account of the browser is successfully authenticated;
the acquisition module is used for acquiring the recording time length of a timing tool in a current webpage under the condition that a token exists in a browser in a terminal, wherein each webpage corresponds to one timing tool, the timing tool is used for recording the starting time length of the current webpage and timing and indicating the refreshing of the token, and the recording time length is the time length between the preset starting time of the timing tool and the current time of the timing tool;
the judging module is used for judging whether the current webpage has an operation record in the effective duration or not under the condition that the record duration reaches the effective duration of the token;
and the execution module is used for executing logout operation of the target account under the condition that the current webpage does not have the operation record in the effective duration.
In a third aspect, an electronic device is provided, which includes a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete communication with each other through the communication bus;
a memory for storing a computer program;
and the processor is used for realizing the logoff method steps of any target account when executing the program stored in the memory.
In a fourth aspect, a computer-readable storage medium is provided, in which a computer program is stored, and the computer program, when executed by a processor, implements the logoff method steps of any of the target accounts.
The embodiment of the application has the following beneficial effects:
the embodiment of the application provides a logoff method of a target account, which comprises the following steps: determining whether a token exists in a browser in the terminal, acquiring the recording time length of a timing tool in the current webpage under the condition that the token exists in the browser in the terminal, judging whether an operation record exists in the effective time length of the current webpage under the condition that the recording time length reaches the effective time length of the token, and executing logout operation of the target account under the condition that the operation record does not exist in the effective time length of the current webpage. According to the method and the device, under the condition that the user does not operate the current webpage within a period of time, the account can be automatically logged out for logging in without manual operation of the user, the token refreshing time length is less than the refreshing time length of the refresh token, the account can be timely logged out after the token is expired, the target account is prevented from being stored in the browser for a long time, and the safety of the target account is improved.
Of course, not all of the above advantages need be achieved in the practice of any one product or method of the present application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
Fig. 1 is a hardware environment diagram of a logoff method for a target account according to an embodiment of the present disclosure;
fig. 2 is a flowchart of a method for logoff of a target account according to an embodiment of the present disclosure;
FIG. 3 is a flowchart of a method for determining whether to perform a token refresh according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a logoff system for a target account according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a logoff device for a target account according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for the convenience of description of the present application, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
In order to solve the problems mentioned in the background art, according to an aspect of the embodiments of the present application, an embodiment of a logoff method for a target account is provided.
Alternatively, in the embodiment of the present application, the logoff method for the target account may be applied to a hardware environment formed by the terminal 101 and the server 103 as shown in fig. 1. As shown in fig. 1, a server 103 is connected to a terminal 101 through a network, which may be used to provide services for the terminal or a client installed on the terminal, and a database 105 may be provided on the server or separately from the server, and is used to provide data storage services for the server 103, and the network includes but is not limited to: wide area network, metropolitan area network, or local area network, and the terminal 101 includes but is not limited to a PC, a cell phone, a tablet computer, and the like.
The logout method of the target account in the embodiment of the present application may be executed by the server 103, or may be executed by both the server 103 and the terminal 101.
The embodiment of the application provides a logout method of a target account, which can be applied to a terminal and is used for executing logout operation of the target account.
The method for logoff of a target account provided in the embodiment of the present application will be described in detail below with reference to specific embodiments, as shown in fig. 2, the specific steps are as follows:
step 201: it is determined whether a token is present in the browser in the terminal.
The browser comprises a plurality of opened webpages, the webpages share one token, the token is a mark fed back by the server after receiving an authentication request of a target account sent by the terminal, and the token is used for indicating that the target account of the browser is successfully authenticated.
In the embodiment of the application, the terminal is provided with the browser, the browser can open a plurality of webpages, the current webpage is a webpage currently displayed in the terminal, and the plurality of webpages share the same token. After a user logs in a browser by adopting a target account, a terminal sends an authentication request of the target account to a server, the server sends a token (token) and a refresh tool (refresh token) to the terminal when confirming that the target account is not abnormal, namely the server generates the token and the refresh token based on JWT (Json web token, which is an open standard based on JSON and executed for transferring statements between network application environments), and the existence of the token in the browser indicates that the target account is not abnormal, namely the target account is successfully authenticated, and the token is a mark for successfully authenticating the target account.
The token is a certificate for acquiring protected resources, and certainly, the token must have an expiration time, otherwise, the token can be permanently used through one-time login, and the authentication function loses the meaning. The token has an effective time length which is set in advance at a terminal or a server, the timing time length of the refreshing tool is longer than the effective time length of the token, and the refreshing tool refreshes the effective time length of the token after the token reaches the effective time length. Illustratively, the token has an effective duration of 15 minutes, and the refresh token refreshes the token every 15 minutes.
If the terminal determines that the token exists in the browser, the process is continued to step 202; and if the token is determined not to exist in the browser, continuing to monitor the token.
Step 202: and acquiring the recording duration of the timing tool in the current webpage.
Each webpage corresponds to a timing tool, the timing tool is used for recording the starting time of the current webpage and timing the refreshing of the indication token, and the recorded time is the time between the preset starting time of the timing tool and the current time of the timing tool.
A plurality of web pages exist in the browser, and each web page corresponds to one timing tool. After the current webpage is opened, the timing tool starts timing from the preset starting time and then gradually becomes the current time of the timing tool, wherein the time length between the preset starting time and the current time is the recording time length of the timing tool. The timing tool may count down or count up, and may be a timer, for example.
Illustratively, if token is valid for 15 minutes, the value of the timer is 15 × 60 — 900 seconds, the recording duration is 100 seconds, and if the timer counts down, the preset starting time is 900, and the current time is 800; if the timer is counting, the preset starting time is 0, and the current time is 100.
The timing tool starts timing after the webpage is opened, the timing tool stops timing when the webpage is closed midway, and when the webpage is opened again, the timing tool continues timing on the basis of last timing. Therefore, the timing tool can record the time length of the current webpage opening.
Illustratively, token is valid for 15 minutes, and the timer has a value of 15 × 60 — 900 seconds, when the current web page is opened for 100 seconds, token will count down from 900 seconds to 800 seconds, and then the current web page is closed for 100 seconds and then opened again, and the timer will continue to count down from 800 seconds, rather than 700 seconds.
Step 203: and under the condition that the recording duration reaches the effective duration of the token, judging whether the current webpage has an operation record in the effective duration.
the effective duration of token is the duration from between refreshes. After the recording duration of the timing tool reaches the effective duration of the token, the expiration of the effective duration of the token is represented, the refresh token needs to be adopted, and at this time, the terminal judges whether the operation record exists in the effective duration of the current webpage.
The operation record refers to a record of operation behaviors existing in the current webpage, and the operation behaviors are behaviors for operating the current webpage, including but not limited to keyboard operations, mouse operations, touch screen operations and the like. The terminal can monitor the operation behavior of the current webpage by using a monitoring tool, illustratively, the monitoring tool can be JavaScript, and the monitoring tool is not specifically limited in the present application. The timing tool is present in the listening tool, and illustratively, the timer may be present in JavaScript.
If the terminal judges that no operation record exists in the effective duration of the current webpage, executing step 204; if the terminal determines that the operation record exists in the valid duration of the current web page, step 205 is executed.
Step 204: and executing logout operation of the target account.
The terminal determines that no operation record exists in the effective duration of the current webpage, and indicates that no user operation exists in the current webpage within a period of time, the user may not need to use the current webpage, and since the multiple webpages in the browser adopt the same token, the user does not need to use the browser and the target account in the browser, and in order to protect the privacy of the account of the user, the terminal automatically executes the logout operation of the target account, namely quitting the login of the target account in the browser.
Optionally, after the terminal logs out of the target account, the token, the refresh token and the valid duration (token time) of the token are also stored in the terminal, which may be stolen. The terminal can also list the token, the refreshing tool and the effective duration information into a blacklist, so that the security of the target account is further improved.
Step 205: and resetting the current moment of the timing tool as the preset starting moment.
And the duration between the preset starting time and the preset ending time of the timing tool is the same as the effective duration.
The terminal determines that the operation record exists in the effective duration of the current webpage, and indicates that the user operation exists in the current webpage within a period of time, and the user has the possibility of operating the browser, the target account cannot be logoff, and in order to ensure the safety of the target account, the token needs to be refreshed, and then the timing tool needs to count again. Since the timing tool counts the preset ending time, which indicates that the recording time of the timing tool is the same as the effective time of the token, the terminal needs to reset the current time of the timing tool to the preset starting time, so that the timing tool restarts timing, and the current webpage continues to be started.
In the application, after the terminal determines that the token is expired, if the operation record of the user does not exist in the current webpage within the valid duration of the token, the refresh token is not needed, and the terminal executes logout operation of the target account. According to the method and the device, under the condition that the user does not operate the current webpage within a period of time, the account can be automatically logged out for logging in without manual operation of the user, the token refreshing time length is less than the refreshing time length of the refresh token, the account can be timely logged out after the token is expired, the target account is prevented from being stored in the browser for a long time, and the safety of the target account is improved. If the operation record of the user exists in the current webpage within the token effective duration, the timing tool counts again, and the refresh token refreshes the token, so that the login of the target account is maintained, and the user experience is improved.
As an optional implementation manner, the determining that the operation record exists in the valid duration of the current webpage includes: determining the refreshing time of the current webpage when the token refreshing is executed last time; recording the operation time of the operation behavior under the condition that the operation behavior of the current webpage is determined, wherein the refreshing time is earlier than the operation time; determining a target duration between the operation time and the refreshing time; and under the condition that the target duration is not greater than the effective duration, determining that the operation record exists in the effective duration of the current webpage.
In the embodiment of the application, the terminal records the refreshing time when the token refreshes each time, for the current webpage, the terminal records the refreshing time of the current webpage when the token refreshes last time, if the operation behavior occurs between the previous token refreshing and the next token refreshing of the current webpage, the terminal records the operation time of the operation behavior, the refreshing time is earlier than the operation time, the time length between the operation time and the refreshing time is the target time length, and the terminal judges whether the target time length is longer than the effective time length of the token or not.
If the terminal judges that the target duration is not greater than the effective duration, the operation behavior is located between two token refreshes, namely the token has the operation behavior before the next refresh, and the operation record of the operation behavior is stored, so that the operation record exists in the effective duration of the current webpage.
If the terminal does not detect the operation time of the operation behavior within the token effective duration, it indicates that the operation behavior may occur after the next refresh, that is, the current web page does not have the operation record within the token effective duration, and after the recording duration of the timing tool reaches the token effective duration, the terminal does not detect the operation record, and then the logout operation of the target account is executed.
As an optional implementation manner, after determining that the target duration is not greater than the preset duration, the method further includes: and under the condition that the timing tool indicates the preset ending time, calling the refreshing tool to update the refreshing time of the current token so as to keep the token in an effective state, wherein the updated refreshing time is the same as the current system time.
After determining that the target duration is not greater than the preset duration, the terminal may determine that the operation behavior occurs between two token refreshes. The timing tool has a preset starting time and a preset ending time, and the time length between the preset starting time and the preset ending time is the same as the effective time length of the token, namely the timing tool finishes the timing and indicates that the effective time length of the token is expired and needs to be refreshed. Therefore, when the timing tool indicates the preset ending time, the terminal calls the refresh token to refresh the token, and meanwhile, the refreshing time of the current token is updated, so that the token is continuously in an effective state. And the updated refreshing time is the same as the current system time.
The token refresh time is the same as the system time, and may be the system time or converted into a timestamp. Illustratively, the token refresh time is 2021-03-0318: 35:22, scaled to a timestamp of 1614767722.
As an optional implementation manner, as shown in fig. 3, in a case that the terminal determines that the operation record exists in the valid duration of the current webpage, determining whether to perform token refreshing includes the following steps:
step 301: and under the condition that the operation record exists in the effective duration of the current webpage, judging whether the refresh identifier of the target webpage exists in the shared memory.
The target webpage is a webpage except the current webpage in the current opened webpage, the shared memory is used for storing a refreshing identifier of the webpage, and the refreshing identifier is an identifier of the webpage which is refreshed by the token currently.
In the embodiment of the application, the browser comprises a plurality of web pages, when a terminal detects a new web page, the terminal automatically allocates an identifier to the new web page, so that each web page has a unique identifier (window id), and the terminal stores the identifier of each web page in the memory. If the target webpage needs to refresh the token, the target identifier of the target webpage is sent to the shared memory, the identifier sent to the shared memory is a refresh identifier (refresh flag), and since the shared memory can only store one refresh identifier, only one webpage can be refreshed at the same time. Only after the token refreshing of the target webpage is finished, the refreshing identification in the shared memory disappears, and other webpages can be refreshed by the token.
In the method and the device, only the webpage corresponding to the refreshing identifier in the shared memory is allowed to refresh the token, and the token does not need to be refreshed again if the tokens of other webpages expire at the same time, so that the token can be prevented from being refreshed continuously by a plurality of webpages, and the timing of the timing tool cannot be disturbed. After the token of each webpage is expired, the token can be refreshed according to the condition, so that the token always exists, and the token can be prevented from being deleted by mistake after some webpages are closed.
The unique identification of the web page can be constructed by a timestamp and a random number, so that the unique identification of each web page is different, and the identification of the web page can be stored in a memory after being constructed. After the identifier of each new web page is constructed, the terminal needs to determine whether the identifier of the new web page already exists in the memory, i.e., whether the identifier is unique. If the terminal determines that the identifier of the new web page already exists in the memory, and the identifier of the new web page does not have uniqueness, the terminal changes the random number, and constructs the identifier of the new web page by using the timestamp and the changed random number until the identifier of the new web page does not exist in the memory. This ensures that the identity of each web page is unique.
And when the terminal determines that the operation record exists in the effective duration of the current webpage, the token is required to be refreshed. Since the shared memory can only store one refresh identifier, after the terminal confirms the operation record, it needs to first determine whether the shared memory has a refresh identifier of a target webpage, where the target webpage is a webpage except the current webpage in the current open webpage. If the terminal determines that the refresh identifier of the target webpage does not exist in the shared memory, executing step 302; if the terminal determines that the refresh identifier of the target webpage exists in the shared memory, step 303 is executed.
Step 302: resetting the current time of the timing tool to a preset starting time and executing a refreshing operation.
If the terminal determines that the refresh identifier of the target webpage does not exist in the shared memory, indicating that no other webpage is currently performing token refresh, the current webpage can execute token refresh. The terminal refreshes the token through the refresh token and restarts the timing of the timing tool so as to perform next token refreshing at regular time, and then the terminal resets the current time of the timing tool to the preset starting time.
Step 303: and resetting the current moment of the timing tool as the preset starting moment.
If the terminal determines that the refresh identifier of the target webpage exists in the shared memory, it indicates that other webpages are performing token refresh operation, and because the plurality of webpages adopt the same token, the token is refreshed by other webpages, the current webpage does not need to be refreshed again, and only by ensuring that the timing tool counts again, the terminal resets the current moment of the timing tool to the preset starting moment.
As an optional implementation manner, the obtaining the recording duration of the timing tool in the current webpage includes: under the condition that the target time length is determined to be inconsistent with the recording time length of the timing tool, adjusting the preset starting time of the timing tool according to the target time length; and acquiring the recording duration of the timing tool according to the adjusted preset starting moment.
In the embodiment of the application, the timing tool starts timing after the webpage is opened, the timing tool stops timing when the webpage is closed halfway, and the timing tool continues timing on the basis of the last timing when the webpage is opened again. Therefore, the timing tool can record the actual opening time of the current webpage, but the token can always time and is not affected by opening and closing of the webpage, and if the webpage is closed midway and opened again, the recording time of the timing tool is inconsistent with the target time of the token.
That is to say, when the current webpage has an operation behavior, the terminal records the operation time, determines the target duration according to the last refreshing time and the operation time, then judges whether the timing duration of the timing tool is consistent with the target duration of token at the operation time, and if so, indicates that the timing of the timing tool is accurate, so that the timing tool can continue to time. If the time length of the timing tool is inconsistent with the time length of the token, the timing of the timing tool is inaccurate, and the timing tool needs to be corrected.
After the general webpage is temporarily closed and opened again, the timing tool continues to time on the basis of the last time, and the token is always timed, so that the target time length of the token is greater than the recording time length of the timing tool, and therefore the time of the timing tool needs to be specifically adjusted according to the target time length, and the timing time length of the timing tool is consistent with the target time length according to the adjusted time length.
Optionally, in a case that it is determined that the target duration is inconsistent with the recording duration of the timing tool, adjusting the timing tool according to the target duration includes: adjusting the timing tool to an intermediate time according to the target time length, wherein the preset starting time length and the intermediate time length are the same as the target time length; taking the difference value between the intermediate time and the preset starting time as a fixed first recording time length; taking the difference value between the current time and the middle time as a second recording duration; the sum of the first recording duration and the second recording duration is taken as the recording duration.
In the embodiment of the application, after the webpage is temporarily closed and opened again at the time a, the token records the target time length at the time a, the recording time length between the preset starting time and the time a of the timing tool is different from the target time length, the terminal determines the time B according to the target time length, the time length between the preset starting time and the time B of the timing tool is the same as the target time length, the time B is an intermediate time, and the timing tool is adjusted to the intermediate time. In this case, the terminal takes the difference between the intermediate time and the preset start time as the fixed first recording time period, and takes the difference between the current time and the intermediate time as the second recording time period. The sum of the first recording duration and the second recording duration is taken as the recording duration.
Illustratively, the token is valid for 15 minutes, the timer has a value of 15 × 60 — 900 seconds, when the current web page is opened for 100 seconds, the token counts down from 900 seconds to 800 seconds, when the current web page is closed for 100 seconds, the token is opened again, and the timer counts down from 800 seconds instead of 700 seconds. But at this time, token has recorded 200 seconds, and then the terminal needs to adjust the current timer to 700 seconds according to the duration of 200 seconds, so that the timer is accurate. Therefore, the first recording time period is from 900 seconds to 700 seconds, the second recording time period is from 700 seconds to the current time, and the recording time period is from 900 seconds to the current time.
Optionally, an embodiment of the present application further provides a processing flow chart of a logoff method for a target account, which includes the following specific steps.
Step 1: and the user adopts the target account to log in the browser and receives the token and the refresh token fed back by the server.
Step 2: and configuring an identifier for each webpage in the browser, and storing the identifier in a memory.
And step 3: and under the condition that the token of the browser in the terminal is determined, acquiring the recording duration of the timing tool in the current webpage.
And 4, step 4: and determining that the recording duration reaches the effective duration of the token, and judging whether the current webpage has an operation record in the effective duration. If not, step 5 is executed, and if yes, step 6 is executed.
And 5: and executing logout operation of the target account.
Step 6: and judging whether the refresh identifier of the target webpage exists in the shared memory, if so, executing the step 7, and if not, executing the step 8.
And 7: and resetting the current moment of the timing tool as the preset starting moment.
And 8: refreshing the token by adopting a refresh token, and resetting the current moment of the timing tool to be a preset starting moment.
Based on the same technical concept, an embodiment of the present application further provides a logout system for a target account, as shown in fig. 4, the system includes a terminal and a server, a terminal browser includes a plurality of webpages, each webpage corresponds to a timer and an identifier (window id), the identifiers of all the webpages are stored in the browser, and the webpage timer is used for monitoring webpage operations. When a user logs in a browser by adopting a target account, the terminal sends an interface request to the server, and the server responds to send an access token, a refresh token and a token time to the terminal and stores the information in the browser. After the recording duration of the webpage timer reaches the token effective duration, if no operation record exists in the effective duration of the current webpage, the terminal executes the log-out operation of the target account, and the server stores the access token and the refresh token to a blacklist. If the operation record exists in the effective duration of the current webpage and the shared memory does not have the refreshing identifier (refresh flag) of other webpages, the server writes the refresh flag of the current webpage into the shared memory, calls a refresh token interface to refresh the effective duration of the access token, and only corrects the time of the timing tool if the terminal reads the refresh flag of other webpages in the shared memory. As can be seen, the browser has stored therein an access token, a refresh token, a token time, an all window id, and a refresh flag.
Based on the same technical concept, an embodiment of the present application further provides a logoff apparatus for a target account, as shown in fig. 5, the apparatus includes:
a determining module 501, configured to determine whether a token exists in a browser in a terminal, where the browser includes multiple open webpages, the multiple webpages share one token, the token is a mark fed back by a server after receiving an authentication request of a target account sent by the terminal, and the token is used to indicate that the target account of the browser is successfully authenticated;
the obtaining module 502 is used for obtaining the recording time length of a timing tool in a current webpage under the condition that a token exists in a browser in a terminal, wherein each webpage corresponds to one timing tool, the timing tool is used for recording the starting time length of the current webpage and timing and indicating the refreshing of the token, and the recording time length is the time length between the preset starting time of the timing tool and the current time of the timing tool;
the judging module 503 is configured to, when the recording duration reaches the valid duration of the token, judge whether an operation record exists in the valid duration of the current webpage;
the executing module 504 is configured to execute logout operation of the target account if it is determined that the operation record does not exist in the valid duration of the current web page.
Optionally, the apparatus further comprises:
the first resetting module is used for resetting the current time of the timing tool to be a preset starting time under the condition that the operation record of the current webpage exists in the effective time, wherein the time length between the preset starting time and the preset ending time of the timing tool is the same as the effective time length.
Optionally, the first reset module comprises:
the first determining unit is used for determining the refreshing time of the current webpage when the token refreshing is executed last time;
the recording unit is used for recording the operation time of the operation behavior under the condition that the operation behavior of the current webpage is determined, wherein the refreshing time is earlier than the operation time;
a second determination unit configured to determine a target duration between the operation time and the refresh time;
and the third determining unit is used for refreshing the token and determining that the operation record exists in the effective duration of the current webpage under the condition that the target duration is not greater than the effective duration.
Optionally, the third determining unit includes:
and the calling subunit is used for calling the refreshing tool to update the refreshing time of the current token under the condition that the timing tool indicates the preset ending time so as to enable the token to keep an effective state, wherein the updated refreshing time is the same as the current system time.
Optionally, the reset module comprises:
the judging unit is used for judging whether a refreshing identifier of a target webpage exists in the shared memory under the condition that the operation record of the current webpage exists in the effective duration, wherein the target webpage is a webpage except the current webpage in the current opened webpage, the shared memory is used for storing the refreshing identifier of the webpage, and the refreshing identifier is an identifier of the webpage which is refreshed by the token at present;
and the resetting unit is used for resetting the current moment of the timing tool to a preset starting moment and executing the refreshing operation if the refreshing identifier of the target webpage does not exist in the shared memory.
Optionally, the apparatus comprises:
and the second resetting module is used for resetting the current moment of the timing tool to the preset starting moment if the refreshing identifier of the target webpage exists in the shared memory.
Optionally, the obtaining module 502 includes:
the adjusting unit is used for adjusting the time of the timing tool according to the target duration under the condition that the target duration is determined to be inconsistent with the recording duration of the timing tool;
and the acquisition unit is used for acquiring the recording duration of the timing tool according to the adjusted time.
In the application, after the terminal determines that the token is expired, if the operation record of the user does not exist in the current webpage within the valid duration of the token, the refresh token is not needed, and the terminal executes logout operation of the target account. According to the method and the device, under the condition that the user does not operate the current webpage within a period of time, the account can be automatically logged out for logging in without manual operation of the user, the token refreshing time length is less than the refreshing time length of the refresh token, the account can be timely logged out after the token is expired, the target account is prevented from being stored in the browser for a long time, and the safety of the target account is improved. If the operation record of the user exists in the current webpage within the token effective duration, the timing tool counts again, and the refresh token refreshes the token, so that the login of the target account is maintained, and the user experience is improved.
According to another aspect of the embodiments of the present application, there is provided an electronic device, as shown in fig. 6, including a memory 603, a processor 601, a communication interface 602, and a communication bus 604, where a computer program operable on the processor 601 is stored in the memory 603, the memory 603 and the processor 601 communicate through the communication interface 602 and the communication bus 604, and the steps of the method are implemented when the processor 601 executes the computer program.
The memory and the processor in the electronic equipment are communicated with the communication interface through a communication bus. The communication bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc.
The Memory may include a Random Access Memory (RAM) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component.
There is also provided, in accordance with yet another aspect of an embodiment of the present application, a computer-readable medium having non-volatile program code executable by a processor.
Optionally, in an embodiment of the present application, a computer readable medium is configured to store program codes for the processor to execute the above method:
optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments, and this embodiment is not described herein again.
When the embodiments of the present application are specifically implemented, reference may be made to the above embodiments, and corresponding technical effects are achieved.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the Processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units configured to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented by means of units performing the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and in actual implementation, there may be other divisions, for example, multiple modules or components may be combined or integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or make a contribution to the prior art, or may be implemented in the form of a software product stored in a storage medium and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk. It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is merely exemplary of the present application and is presented to enable those skilled in the art to understand and practice the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (7)

1. A logoff method of a target account, the method comprising:
determining whether a token exists in a browser in a terminal, wherein the browser comprises a plurality of opened webpages, the plurality of webpages share one token, the token is a mark fed back by a server after receiving an authentication request of a target account sent by the terminal, and the token is used for indicating that the target account of the browser is successfully authenticated;
under the condition that a token exists in a browser in a terminal, acquiring the recording time length of a timing tool in a current webpage, wherein each webpage corresponds to one timing tool, the timing tool is used for recording the time length of starting the current webpage and timing and indicating the refreshing of the token, and the recording time length is the time length between the preset starting time of the timing tool and the current time of the timing tool;
under the condition that the record duration reaches the effective duration of the token, judging whether an operation record exists in the effective duration of the current webpage or not;
executing logout operation of the target account under the condition that the current webpage does not have operation records within the effective duration;
after judging whether the operation record exists in the effective duration of the current webpage, the method further comprises the following steps:
under the condition that the operation record exists in the effective duration of the current webpage, resetting the current time of the timing tool to be the preset starting time, wherein the duration between the preset starting time and the preset ending time of the timing tool is the same as the effective duration;
wherein the determining that the operation record exists in the valid duration of the current webpage includes:
determining the refreshing time of the current webpage when the token refreshing is executed last time;
under the condition that the operation behavior of the current webpage is determined, recording the operation time of the operation behavior, wherein the refreshing time is earlier than the operation time;
determining a target duration between the operation time and a refreshing time;
under the condition that the target duration is not larger than the effective duration, refreshing the token and determining that an operation record exists in the effective duration of the current webpage;
wherein, the acquiring the recording duration of the timing tool in the current webpage comprises:
under the condition that the target time length is determined to be inconsistent with the recording time length of the timing tool, adjusting the time of the timing tool according to the target time length;
and acquiring the recording duration of the timing tool according to the adjusted time.
2. The method of claim 1, wherein refreshing the token comprises:
and under the condition that the timing tool indicates the preset ending time, calling a refreshing tool to update the refreshing time of the token so as to keep the token in an effective state, wherein the updated refreshing time is the same as the current system time.
3. The method of claim 1, wherein the resetting the current time of the timing tool to the preset starting time when it is determined that the operation record exists in the valid duration of the current webpage comprises:
under the condition that the operation record of the current webpage exists in the effective duration, judging whether a refreshing identifier of a target webpage exists in a shared memory or not, wherein the target webpage is a webpage except the current webpage in the current opened webpage, the shared memory is used for storing the refreshing identifier of the webpage, and the refreshing identifier is an identifier of the webpage which is refreshed by the token at present;
if the shared memory is determined not to have the refreshing identifier of the target webpage, resetting the current moment of the timing tool to the preset starting moment and executing the refreshing operation.
4. The method of claim 3, wherein after determining whether the refresh indicator of the target webpage exists in the shared memory, the method further comprises:
and if the refresh identifier of the target webpage exists in the shared memory, resetting the current moment of the timing tool to the preset starting moment.
5. An apparatus for logoff of a target account, the apparatus comprising:
the system comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining whether a token exists in a browser in a terminal, the browser comprises a plurality of opened webpages, the webpages share one token, the token is a mark fed back by a server after receiving an authentication request of a target account sent by the terminal, and the token is used for indicating that the target account of the browser is successfully authenticated;
the acquisition module is used for acquiring the recording time length of a timing tool in a current webpage under the condition that a token exists in a browser in a terminal, wherein each webpage corresponds to one timing tool, the timing tool is used for recording the starting time length of the current webpage and timing and indicating the refreshing of the token, and the recording time length is the time length between the preset starting time of the timing tool and the current time of the timing tool;
the judging module is used for judging whether the current webpage has an operation record in the effective duration or not under the condition that the record duration reaches the effective duration of the token;
the execution module is used for executing logout operation of the target account under the condition that the current webpage does not have the operation record within the effective duration;
wherein the apparatus further comprises:
the first resetting module is used for resetting the current time of the timing tool to the preset starting time under the condition that the operation record of the current webpage exists in the effective time, wherein the time length between the preset starting time and the preset ending time of the timing tool is the same as the effective time length;
wherein the first reset module comprises:
the first determining unit is used for determining the refreshing time of the current webpage when the token refreshing is executed last time;
the recording unit is used for recording the operation time of the operation behavior under the condition that the operation behavior of the current webpage is determined, wherein the refreshing time is earlier than the operation time;
a second determining unit, configured to determine a target duration between the operation time and the refresh time;
a third determining unit, configured to refresh the token and determine that an operation record exists in the valid duration of the current webpage when it is determined that the target duration is not greater than the valid duration;
wherein the acquisition module comprises:
the adjusting unit is used for adjusting the time of the timing tool according to the target duration under the condition that the target duration is determined to be inconsistent with the recording duration of the timing tool;
and the acquisition unit is used for acquiring the recording duration of the timing tool according to the adjusted moment.
6. An electronic device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any of claims 1 to 4 when executing a program stored in the memory.
7. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of claims 1 to 4.
CN202110349798.0A 2021-03-31 2021-03-31 Logoff method and device of target account, electronic equipment and computer readable medium Active CN113051541B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110349798.0A CN113051541B (en) 2021-03-31 2021-03-31 Logoff method and device of target account, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110349798.0A CN113051541B (en) 2021-03-31 2021-03-31 Logoff method and device of target account, electronic equipment and computer readable medium

Publications (2)

Publication Number Publication Date
CN113051541A CN113051541A (en) 2021-06-29
CN113051541B true CN113051541B (en) 2022-02-01

Family

ID=76516713

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110349798.0A Active CN113051541B (en) 2021-03-31 2021-03-31 Logoff method and device of target account, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN113051541B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114520744A (en) * 2022-02-28 2022-05-20 佛山众陶联供应链服务有限公司 Method and system for automatic authentication and login non-refreshing of front end of web system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179176A (en) * 2011-12-26 2013-06-26 中国移动通信集团公司 Call method, device and system for web application in cloud/cluster environment
CN105337949A (en) * 2014-08-13 2016-02-17 中国移动通信集团重庆有限公司 SSO (Single Sign On) authentication method, web server, authentication center and token check center
CN107920063A (en) * 2017-11-07 2018-04-17 杭州安恒信息技术有限公司 A kind of method of online updating tokenID
CN108462581A (en) * 2018-01-08 2018-08-28 平安科技(深圳)有限公司 Method, apparatus, terminal device and the storage medium that network token generates
CN108509604A (en) * 2018-03-30 2018-09-07 成都优易数据有限公司 A kind of method of the data sharing duke groups of multiple Shipping Options Pages
CN108965291A (en) * 2018-07-11 2018-12-07 平安科技(深圳)有限公司 Registration login method, system and the computer equipment of mixed application
CN109547422A (en) * 2018-11-09 2019-03-29 福建天泉教育科技有限公司 A kind of method and terminal that logging state is renewed a contract automatically
CN110381078A (en) * 2019-07-29 2019-10-25 迈普通信技术股份有限公司 Determination method, apparatus, electronic equipment and the storage medium that token renews

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9147062B2 (en) * 2011-06-29 2015-09-29 International Business Machines Corporation Renewal of user identification information
CN103634301B (en) * 2013-11-14 2017-01-04 新浪网技术(中国)有限公司 The method of the private data of user's storage in client and access server thereof
US11550891B2 (en) * 2019-06-19 2023-01-10 Preventice Solutions, Inc. Login token management

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179176A (en) * 2011-12-26 2013-06-26 中国移动通信集团公司 Call method, device and system for web application in cloud/cluster environment
CN105337949A (en) * 2014-08-13 2016-02-17 中国移动通信集团重庆有限公司 SSO (Single Sign On) authentication method, web server, authentication center and token check center
CN107920063A (en) * 2017-11-07 2018-04-17 杭州安恒信息技术有限公司 A kind of method of online updating tokenID
CN108462581A (en) * 2018-01-08 2018-08-28 平安科技(深圳)有限公司 Method, apparatus, terminal device and the storage medium that network token generates
CN108509604A (en) * 2018-03-30 2018-09-07 成都优易数据有限公司 A kind of method of the data sharing duke groups of multiple Shipping Options Pages
CN108965291A (en) * 2018-07-11 2018-12-07 平安科技(深圳)有限公司 Registration login method, system and the computer equipment of mixed application
CN109547422A (en) * 2018-11-09 2019-03-29 福建天泉教育科技有限公司 A kind of method and terminal that logging state is renewed a contract automatically
CN110381078A (en) * 2019-07-29 2019-10-25 迈普通信技术股份有限公司 Determination method, apparatus, electronic equipment and the storage medium that token renews

Also Published As

Publication number Publication date
CN113051541A (en) 2021-06-29

Similar Documents

Publication Publication Date Title
JP5925910B2 (en) Method and apparatus for facilitating single sign-on service
AU2017268608B2 (en) Method, device, server and storage medium of detecting DoS/DDoS attack
US10798090B2 (en) User authentication method, system for implementing the same, and information communication terminal used in the same
KR101721032B1 (en) Security challenge assisted password proxy
EP3248128B1 (en) Methods and computer storage medium for session security splitting
US9424407B2 (en) Weak password support in a multi-user environment
CN108293050A (en) For the technology based on speed event detection for the unauthorized access of cloud application
US10542044B2 (en) Authentication incident detection and management
CN109698809B (en) Method and device for identifying abnormal login of account
JP2016541082A (en) Connection management method, apparatus, electronic equipment, program, and recording medium
US20170257359A1 (en) User authentication method and system for implementing same
CN110474911B (en) Terminal credibility identification method, device, equipment and computer readable storage medium
CN107682345B (en) IP address detection method and device and electronic equipment
US8024782B2 (en) Cumulative login credit
CN105306610B (en) Network identity detection method and device
EP2770690A1 (en) Protecting multi-factor authentication
US10735398B1 (en) Rolling code authentication techniques
CN113051541B (en) Logoff method and device of target account, electronic equipment and computer readable medium
WO2020010726A1 (en) Registration and login method for hybrid application program, system, and computer device
CN106951768B (en) Fingerprint unlocking timeliness control method and device, mobile terminal and storage medium
CN107766716B (en) Certificate detection method and device and electronic equipment
JP6835507B2 (en) Unauthorized access detector, unauthorized access detection method and computer program
WO2021015711A1 (en) Automatic password expiration based on password integrity
CN111339460B (en) Data updating method, device, computer equipment and storage medium
CN110199289B (en) Method for regulating access to a data connection by an electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant