CN113742696B - User login method, device, equipment and medium based on distributed login component - Google Patents

User login method, device, equipment and medium based on distributed login component Download PDF

Info

Publication number
CN113742696B
CN113742696B CN202111310324.1A CN202111310324A CN113742696B CN 113742696 B CN113742696 B CN 113742696B CN 202111310324 A CN202111310324 A CN 202111310324A CN 113742696 B CN113742696 B CN 113742696B
Authority
CN
China
Prior art keywords
login
user
distributed
component
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111310324.1A
Other languages
Chinese (zh)
Other versions
CN113742696A (en
Inventor
王君林
陈景涛
廖春生
常鹏天
袁杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taiping Financial Technology Services Shanghai Co Ltd Shenzhen Branch
Original Assignee
Taiping Financial Technology Services Shanghai Co Ltd Shenzhen Branch
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taiping Financial Technology Services Shanghai Co Ltd Shenzhen Branch filed Critical Taiping Financial Technology Services Shanghai Co Ltd Shenzhen Branch
Priority to CN202111310324.1A priority Critical patent/CN113742696B/en
Publication of CN113742696A publication Critical patent/CN113742696A/en
Application granted granted Critical
Publication of CN113742696B publication Critical patent/CN113742696B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application relates to a user login method, a device, equipment and a medium based on a distributed login component. The distributed login component is configured in the application system in advance, and the method comprises the following steps: acquiring a user login request based on a distributed login page at the front end of an application system, wherein the user login request carries user data; acquiring login setting data of a distributed login system; and according to the login setting data and the user data, performing user login of the application system through the distributed login component. By adopting the method, the login convenience and controllability of the user can be improved.

Description

User login method, device, equipment and medium based on distributed login component
Technical Field
The present application relates to the field of computer technologies, and in particular, to a user login method, apparatus, device, and medium based on a distributed login component.
Background
With the rapid development of computer technology, each application system has higher and higher requirements on the security of a user account. The traditional unified centralized management and control login verification method cannot meet the requirements of an application system, and how to combine distributed components to provide a user login method with diversified login modes is a problem to be solved urgently at the present stage.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a user login method, apparatus, device and medium based on a distributed login component.
A user login method based on a distributed login component, the distributed login component being pre-configured in an application system, the method comprising:
acquiring a user login request based on a distributed login page at the front end of an application system, wherein the user login request carries user data;
acquiring login setting data of a distributed login system;
and according to the login setting data and the user data, performing user login of the application system through the distributed login component.
In one embodiment, the method for performing user login of an application system through a distributed login component according to login setting data and user data includes:
when the login setting data indicate that login is performed through the distributed component, performing local user login through local data of the distributed login component;
and when the login setting data indicate that the system user does not log in through the distributed components, logging in the system user through the background service of the distributed login system.
In one embodiment, a user login of an application system is performed through a distributed login component, comprising:
obtaining user credentials stored in a distributed login component;
performing login verification on user data based on the user credential;
and when the verification is passed, completing the user login.
In one embodiment, the user credentials are encrypted user credentials;
performing login verification on user data based on user credentials, comprising:
determining an encryption mode of the user certificate based on the encrypted user certificate;
encrypting the user data based on an encryption mode to obtain encrypted user data;
and verifying the encrypted user data according to the encrypted user certificate.
In one embodiment, the method further includes:
and when an updating instruction for updating the user credential is detected, updating the user credential based on the updating instruction.
In one embodiment, a user login of an application system is performed through a distributed login component, comprising:
generating a login event through a distributed login component;
and triggering the application system to change the user login state based on the login event so as to complete the user login.
In one embodiment, after the user login of the application system is performed through the distributed login component, the method further includes:
acquiring corresponding login information;
and performing login control based on the login information.
A user login apparatus based on a distributed login component, the distributed login component being pre-configured to an application system, the apparatus comprising:
the system comprises a user login request acquisition module, a user data acquisition module and a user login request processing module, wherein the user login request acquisition module is used for acquiring a user login request based on a distributed login page at the front end of an application system, and the user login request carries user data;
the login setting data acquisition module is used for acquiring login setting data of the distributed login system;
and the login module is used for logging in the user of the application system through the distributed login component according to the login setting data and the user data.
A computer device comprising a memory storing a computer program and a processor implementing the steps of the method of any of the above embodiments when the processor executes the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any of the above embodiments.
According to the user login method, the device, the equipment and the medium based on the distributed login component, the distributed login component is configured in the application system in advance, then the user login request is obtained based on the distributed login page at the front end of the application system, the user login request carries user data, login setting data of the distributed login system are obtained, and further user login of the application system is carried out through the distributed login component according to the login setting data and the user data. Therefore, distributed login can be performed through the distributed components and the set login setting data of the distributed login system, and login in different modes can be realized based on different login setting data. Moreover, login in different modes is realized by setting login setting data, systematic management and control can be performed, centralized control can be performed according to different application scenes, and the login convenience and controllability of a user are improved.
Drawings
FIG. 1 is a diagram illustrating an exemplary implementation of a distributed login component-based user login methodology;
FIG. 2 is a flowchart illustrating a distributed login component-based user login method in one embodiment;
FIG. 3 is a diagram that illustrates an application scenario for the distributed logon component in one embodiment;
FIG. 4 is a diagram of a local login process in one embodiment;
FIG. 5 is a flow diagram that illustrates pushing user credentials by the user center, under an embodiment;
FIG. 6 is a block diagram of a distributed login component based user login device in one embodiment;
FIG. 7 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The user login method based on the distributed login component can be applied to the application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The distributed login component may be pre-configured in the application system, and is configured to obtain user information through a distributed login page displayed on the terminal 102, and send the user information to the server 104, where the user login request carries user data. The server 104 may obtain the user login request based on the distributed login page at the front end of the application system, obtain login setting data of the distributed login system, and perform user login of the application system through the distributed login component according to the login setting data and the user data. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 104 may be implemented by an independent server or a server cluster formed by a plurality of servers.
In one embodiment, as shown in fig. 2, a user login method based on a distributed login component is provided, the distributed login component is pre-configured in an application system, and the method is described by taking the application of the method to the server in fig. 1 as an example, and includes the following steps:
step S202, a user login request is obtained based on a distributed login page at the front end of the application system, and the user login request carries user data.
The application system refers to a system for executing various services, such as an insurance system in the insurance industry, and a shopping system, a catering system, and the like in the consumption industry, without limitation.
The user login request refers to a request for logging in an application system and the like, and user data can be carried in the user login request.
In this embodiment, the user data may include information such as a user name ID and a login password of the user to be logged in, or may further include device information of the login device, and the like.
In this embodiment, when the application system is developed, the Jar file including the distributed login component may be packaged into the application system, so as to implement pre-configuration of the distributed login component in the application system.
In this embodiment, a Jar (Java Archive) file may be in the form of a WAR package or a Fat Jar, and all dependency packages of the distributed login component may be included in the Jar file.
In this embodiment, after the server configures the application system file, the user may trigger to start the application system through the terminal. When the application system is started, the distributed components configured in the application system can be started together, and automatically complete configuration to enter a state to be served.
In this embodiment, referring to fig. 3, the terminal may display the front end of the application system, and the user may obtain user data through the distributed login page of the front end of the application system, and generate a user login request to send to the distributed login component of the background of the application system, and perform subsequent processing.
In this embodiment, the distributed login page at the front end of the application system may include a user name ID input box and a password input box, and after the user enters the user name ID and the password in the input box, the distributed login component may obtain the user data.
In one embodiment, the distributed login page may be a static page, and the related files of the distributed login component may be packaged in the WAR or the Fat Jar as described above according to the actual application choice, or may be separately deployed in an application container, such as Tomcat. Moreover, the distributed login component and the application system may be implemented based on different system frameworks, for example, the distributed login component is implemented based on Spring4, and the application system may be implemented based on other system frameworks besides Spring, so that decoupling of the distributed login component and the application system may be implemented.
In this embodiment, the server may create a configuration file application property on a specified path of the application system, and set a URL (Uniform Resource Locator) of a background service of the distributed login component, a jump address after successful login, and a parameter equivalent of a database JDBC (java database connectivity, database connection technology) to implement configuration of the distributed login component when performing packaging of the Jar file and receiving of configuration of the distributed login component.
As described above, the distributed login component is implemented based on Spring4, the application system can be implemented based on other system frameworks besides Spring, and when the application system is not based on the Spring system framework, the server can specify in web.xml based on the provided configuration file of the Spring application and complete the configuration.
Step S204, obtaining login setting data of the distributed login system.
The login setting data is data for setting a login mode of the distributed login module, and may be set in advance by an operator such as an administrator.
In particular, with continued reference to fig. 3, the distributed login component may query the distributed login backend service for login setting data set by the administrator, such as switch state data, so that the server obtains the login setting data of the distributed login system.
In this embodiment, referring to fig. 4, a user may send a request for querying a switch state to a distributed backend service through a distributed login component, and obtain a result returned by the distributed backend service to obtain login setting data,
and step S206, performing user login of the application system through the distributed login component according to the login setting data and the user data.
Specifically, after acquiring the login setting data and the user data, the server may determine a corresponding login manner based on the login setting data, and perform login verification based on the user data.
In this embodiment, the server performs user login of the application system through the distributed login component, which may be matching verification of a user name and a password in user data, and when the verification is determined to be passed, the user login is completed, and when the matching is unsuccessful, the user login is rejected.
In this embodiment, after the user logs in successfully, the distributed login component may return a result to a distributed login page at the front end of the application system, and the distributed login page may be automatically redirected to a preconfigured jump page, such as a specific system page of the application system, and perform operation processing of the application system, and the like.
According to the user login method based on the distributed login component, the distributed login component is configured in the application system in advance, then the user login request is obtained based on the distributed login page at the front end of the application system, the user login request carries user data, login setting data of the distributed login system are obtained, and further user login of the application system is carried out through the distributed login component according to the login setting data and the user data. Therefore, distributed login can be performed through the distributed components and the set login setting data of the distributed login system, and login in different modes can be realized based on different login setting data. Moreover, login in different modes is realized by setting login setting data, systematic management and control can be performed, centralized control can be performed according to different application scenes, and the login convenience and controllability of a user are improved.
In one embodiment, the logging in the user of the application system through the distributed logging component according to the logging setting data and the user data may include: when the login setting data indicate that login is performed through the distributed component, performing local user login through local data of the distributed login component; and when the login setting data indicate that the system user does not log in through the distributed components, logging in the system user through the background service of the distributed login system.
As described above, after acquiring the login setting data and the user data, the server determines a corresponding login manner based on the login setting data, such as the switch state data, and performs login based on the user data.
In this embodiment, if the login setting data is "off", the distributed login component may automatically redirect to a specified URL (Uniform Resource Locator), and perform system user login through the distributed login system background service. If the login setting data is 'on', the server can enter distributed login, and local user login is carried out through the local data of the distributed login component.
In the above embodiment, local user login is performed or system user login is performed through the distributed login system background service based on the on-off state indicated by the login setting data, the login mode can be controlled based on the login setting data, the local login of the distributed login component is turned on and turned off, and management and control over different login modes are achieved.
In one embodiment, the logging in the user of the application system through the distributed login component may include: obtaining user credentials stored in a distributed login component; performing login verification on user data based on the user credential; and when the verification is passed, completing the user login.
The user credential refers to credential data used for performing login authentication on user data when performing login authentication on a user. The user credentials may include a username ID and password for the user data.
In this embodiment, with continued reference to fig. 3, the server may obtain the user credential through the user center, and store the user credential in the distributed login background service through the distributed login component at the local end. Similarly, the distributed login component may also store the user credential in a database of the application system, so as to implement local storage of the user credential.
In this embodiment, when the server performs local login through the distributed login component, the server may obtain a user credential locally stored in the application system through the distributed login component, perform login verification on user data of a user to be logged in, and complete user login.
In another embodiment, when the server performs system user login through the distributed login system backend service, the server may obtain the user credentials from the distributed login backend service of the distributed system through the distributed login component, and perform system user login.
In this embodiment, when the server acquires the user credential and performs login authentication, the user name and the password in the user credential may be respectively matched with the acquired user name and password, and if matching is successful, authentication is passed, so that the user login is realized, and if matching is failed, authentication is not passed, and login is failed.
It will be understood by those skilled in the art that the foregoing is merely an example, and in practical applications, the user credentials and the user data may include more data content, and the login verification process may also be more complicated, and the present application is not limited thereto.
In one embodiment, the user credentials are encrypted user credentials.
Specifically, the user credential acquired by the server through the user center is the encrypted user credential, and the server may store the encrypted user credential through the distributed login component.
In this embodiment, performing login verification on the user data based on the user credential may include: determining an encryption mode of the user certificate based on the encrypted user certificate; encrypting the user data based on an encryption mode to obtain encrypted user data; and verifying the encrypted user data according to the encrypted user certificate.
Specifically, after obtaining the encrypted user credentials, the server may identify the encryption manner, which may be hash encryption, elliptic encryption, MD5 encryption, or the like.
In this embodiment, the server may further obtain a corresponding encryption key, and perform encryption processing on the obtained user data based on the encryption key and the identified encryption manner, so as to obtain encrypted user data.
In this embodiment, the server may perform matching verification on the encrypted user credential and the encrypted user data, and generate a corresponding verification result.
In the above embodiment, through the identification encryption mode, the user data is encrypted, and then the encrypted user data and the confidential user certificate are subjected to login verification, so that when the encrypted data is subjected to login verification, compared with the case of decrypting the user certificate and performing matching verification, the user data is only required to be encrypted through encryption and verification based on the encrypted data, data processing data can be reduced, the data processing efficiency is improved, and the processing speed of the login verification is further improved.
In one embodiment, the method may further include: and when an updating instruction for updating the user credential is detected, updating the user credential based on the updating instruction.
In this embodiment, the user credentials need to be pushed to the application system by the user center before local login can be performed. Fig. 5 shows a flow chart of user-centric pushing of user credentials, which is described in detail below in conjunction with fig. 5.
In this embodiment, when detecting the update of the user credential, the user center may perform an add/delete/modify operation on the distributed login component, such as add/delete/modify operation. After receiving the operations of addition, deletion and modification, the distributed login component can correspondingly update the application system database, and stores the user credentials into the application system database, so that the persistence of the user credentials is realized.
Further, the distributed login component may feed back the corresponding result to the application system background. For example, the feedback may be performed by a notification Event (Spring Event) or the like.
Further, the distributed login component may also return a corresponding result to the user center to implement the update of the user credentials.
In this embodiment, the user center may further generate a user query based on the user input, send the user query to the distributed login component, query the user credential stored in the application system through the distributed login component, and return a corresponding query result.
In one embodiment, the user center may perform an add/delete operation on the user data to the distributed login component through an interface, such as through a Restful interface.
In one embodiment, the logging in the user of the application system through the distributed login component may include: generating a login event through a distributed login component; and triggering the application system to change the user login state based on the login event so as to complete the user login.
As previously described, the distributed login component can send a notification event to the business system.
In this embodiment, after performing login authentication based on user data, user credentials, and the like, and after determining that the authentication passes, the distributed login component may generate a login event, notify the service system that the login is successful, and keep the user logged in.
Specifically, referring to fig. 4, the distributed login component may invoke a "login status holding" Bean provided by the application system through the login event (implement an interface defined by the distributed login component, including login success, login failure, whether the application system has logged in, etc.), and notify the application system of the login status holding.
In one embodiment, the service system may also determine whether to perform login status maintenance based on its own configuration data, which is not limited in this application.
In this embodiment, the service system completes the maintenance of the login state, and after the user logs in the service system, the user can perform corresponding service processing on the service system. Such as browsing the page, uploading and downloading the page content, etc.
In this embodiment, after the user logs in the service system, the service system may further determine a user role of the corresponding user based on the user data of the logged-in user, and perform user authority control on the logged-in user, for example, some users only have a browsing authority and no downloading authority, some users only have an authority to access the page a and no authority to access the page B, or some users have an administrator authority, and the like, which is not limited in this application.
In one embodiment, after the user login of the application system is performed through the distributed login component, the method may further include: acquiring corresponding login information; and performing login control based on the login information.
The login information is generated when the user to be logged in logs in the service system, and may include, but is not limited to, success of login, failure of login, the number of times of login, relationship data between login setting data and login result, and the like.
In this embodiment, the relationship data between the login setting data and the login result indicates whether the login setting and the login result are consistent with each other. If the login setting data is off, but the actual user logs in the local login performed through the distributed login component, the two are inconsistent; the login setting data is on, and the actual user logs in the local login performed by the distributed login component, the actual user and the local login are consistent.
In this embodiment, with continued reference to fig. 4, the distributed login component may synchronously transmit the login information to the distributed login backend service, and perform a login relationship, such as performing an audit and analysis process.
Specifically, the server may analyze and count whether the user logs in abnormally, illegally, or the like based on the login information, or the server may check whether the login of the distributed login component is abnormal, as described above, the login setting data is off, but if the actual user logs in the local login performed by the distributed login component, the login setting data is off, the actual user and the local login performed by the distributed login component are not consistent, the login of the distributed login component may be determined to be abnormal, and if the login setting data is on, the actual user logs in the local login performed by the distributed login component, the login setting data is consistent, the actual user and the local login are determined to be normal.
It should be understood that, although the steps in the flowchart of fig. 2 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in fig. 2 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 6, there is provided a user login apparatus based on a distributed login component, the distributed login component being pre-configured to an application system, the apparatus may include: a user login request obtaining module 100, a login setting data obtaining module 200 and a login module 300, wherein:
the user login request obtaining module 100 is configured to obtain a user login request based on a distributed login page at a front end of an application system, where the user login request carries user data.
A login setting data obtaining module 200, configured to obtain login setting data of the distributed login system.
The login module 300 is configured to log in a user of the application system through the distributed login component according to the login setting data and the user data.
In one embodiment, the login module 300 may include:
and the local login submodule is used for performing local user login through the local data of the distributed login component when the login setting data indicate that login is performed through the distributed component.
And the system login submodule is used for logging in a system user through background service of the distributed login system when the login setting data indicate that the system user does not log in through the distributed components.
In one embodiment, the login module 300 may include:
and the user certificate acquisition submodule is used for acquiring the user certificate stored in the distributed login component.
And the verification submodule is used for performing login verification on the user data based on the user credential.
And the login submodule is used for finishing user login when the verification is passed.
In one embodiment, the user credentials are encrypted user credentials.
In this embodiment, the verification sub-module may include:
and the encryption mode determining unit is used for determining the encryption mode of the user certificate based on the encrypted user certificate.
And the encryption unit is used for encrypting the user data based on the encryption mode to obtain the encrypted user data.
And the verification unit is used for verifying the encrypted user data according to the encrypted user certificate.
In one embodiment, the apparatus may further include:
and the updating module is used for updating the user credential based on the updating instruction when the updating instruction for updating the user credential is detected.
In one embodiment, the login module 300 may include:
and the time generation submodule is used for generating a login event through the distributed login component.
And the login submodule is used for triggering the application system to change the login state of the user based on the login event so as to complete the login of the user.
In one embodiment, the apparatus may further include:
and the login information acquisition module is used for acquiring corresponding login information after the user of the application system logs in through the distributed login component.
And the login control module is used for performing login control based on the login information.
For specific limitations of the user login device based on the distributed login component, reference may be made to the above limitations of the user login method based on the distributed login component, which will not be described herein again. The modules in the user login device based on the distributed login component can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 7. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing data such as user login requests, user data, login setting data and the like. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a distributed login component based user login method.
Those skilled in the art will appreciate that the architecture shown in fig. 7 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, there is provided a computer device comprising a memory storing a computer program and a processor implementing the following steps when the processor executes the computer program: acquiring a user login request based on a distributed login page at the front end of an application system, wherein the user login request carries user data; acquiring login setting data of a distributed login system; and according to the login setting data and the user data, performing user login of the application system through the distributed login component.
In one embodiment, the processor, when executing the computer program, implementing a user login of the application system through the distributed login component according to the login setting data and the user data, may include: when the login setting data indicate that login is performed through the distributed component, performing local user login through local data of the distributed login component; and when the login setting data indicate that the system user does not log in through the distributed components, logging in the system user through the background service of the distributed login system.
In one embodiment, the processor, when executing the computer program, implements user login for the application system via the distributed login component, which may include: obtaining user credentials stored in a distributed login component; performing login verification on user data based on the user credential; and when the verification is passed, completing the user login.
In one embodiment, the user credentials are encrypted user credentials.
In this embodiment, the implementing, by the processor, login verification of the user data based on the user credential when executing the computer program may include: determining an encryption mode of the user certificate based on the encrypted user certificate; encrypting the user data based on an encryption mode to obtain encrypted user data; and verifying the encrypted user data according to the encrypted user certificate.
In one embodiment, the processor, when executing the computer program, may further implement the following steps: and when an updating instruction for updating the user credential is detected, updating the user credential based on the updating instruction.
In one embodiment, the processor, when executing the computer program, implements user login for the application system via the distributed login component, which may include: generating a login event through a distributed login component; and triggering the application system to change the user login state based on the login event so as to complete the user login.
In one embodiment, after the processor executes the computer program to log in a user of the application system through the distributed login component, the following steps can be further implemented: acquiring corresponding login information; and performing login control based on the login information.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: acquiring a user login request based on a distributed login page at the front end of an application system, wherein the user login request carries user data; acquiring login setting data of a distributed login system; and according to the login setting data and the user data, performing user login of the application system through the distributed login component.
In one embodiment, the computer program when executed by the processor for enabling user login of the application system via the distributed login component based on the login setting data and the user data may include: when the login setting data indicate that login is performed through the distributed component, performing local user login through local data of the distributed login component; and when the login setting data indicate that the system user does not log in through the distributed components, logging in the system user through the background service of the distributed login system.
In one embodiment, a computer program that when executed by a processor implements user login for an application system via a distributed login component may include: obtaining user credentials stored in a distributed login component; performing login verification on user data based on the user credential; and when the verification is passed, completing the user login.
In one embodiment, the user credentials are encrypted user credentials.
In this embodiment, the computer program, when executed by the processor, for performing login authentication on user data based on user credentials, may include: determining an encryption mode of the user certificate based on the encrypted user certificate; encrypting the user data based on an encryption mode to obtain encrypted user data; and verifying the encrypted user data according to the encrypted user certificate.
In one embodiment, the computer program when executed by the processor may further implement the steps of: and when an updating instruction for updating the user credential is detected, updating the user credential based on the updating instruction.
In one embodiment, a computer program that when executed by a processor implements user login for an application system via a distributed login component may include: generating a login event through a distributed login component; and triggering the application system to change the user login state based on the login event so as to complete the user login.
In one embodiment, after the computer program is executed by the processor to log in the user of the application system through the distributed login component, the following steps can be further realized: acquiring corresponding login information; and performing login control based on the login information.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A user login method based on a distributed login component is characterized in that the distributed login component is configured in an application system in advance, and the method comprises the following steps:
acquiring a user certificate through a user center, and storing the user certificate in a database of a distributed login background service and an application system through a distributed login component of a local end;
acquiring a user login request based on a distributed login page at the front end of an application system, wherein the user login request carries user data;
acquiring login setting data of a distributed login system, wherein the login setting data is used for setting a login mode of a distributed login component;
according to the login setting data and the user data, the user login of the application system is carried out through the distributed login component, and the method comprises the following steps: when a server performs local login through a distributed login component, user credentials stored locally in an application system are obtained through the distributed login component, login verification of user data of a user to be logged in is performed, and user login is completed; when the server logs in the system user through the background service of the distributed login system, the user credentials are obtained from the background service of the distributed login of the distributed system through the distributed login component, and the system user logs in.
2. The method of claim 1, wherein the performing a user login for an application system via the distributed login component based on the login setting data and the user data comprises:
when the login setting data indicate that login is performed through the distributed component, performing local user login through local data of the distributed login component;
and when the login setting data indicate that the system user does not log in through the distributed components, logging in the system user through the background service of the distributed login system.
3. The method of claim 1, wherein the logging in a user of an application system via the distributed login component comprises:
obtaining a user credential stored in the distributed login component;
performing login verification on the user data based on the user credential;
and when the verification is passed, completing the user login.
4. The method of claim 3, wherein the user credentials are encrypted user credentials;
the performing login verification on the user data based on the user credential comprises:
determining an encryption mode of the user certificate based on the encrypted user certificate;
encrypting the user data based on the encryption mode to obtain encrypted user data;
and verifying the encrypted user data according to the encrypted user certificate.
5. The method of claim 3, further comprising:
and when an updating instruction for updating the user credential is detected, updating the user credential based on the updating instruction.
6. The method of claim 1, wherein the logging in a user of an application system via the distributed login component comprises:
generating a login event by the distributed login component;
and triggering the application system to change the user login state based on the login event, and completing the user login.
7. The method of claim 1, wherein after logging in a user of an application system via the distributed login component, further comprising:
acquiring corresponding login information;
and performing login control based on the login information.
8. A user login apparatus based on a distributed login component, wherein the distributed login component is pre-configured in an application system, the apparatus comprising:
the system comprises a user login request acquisition module, a distributed login background service acquisition module and a distributed login background service acquisition module, wherein the user login request acquisition module is used for acquiring a user certificate through a user center and storing the user certificate into a database of a distributed login background service and an application system through a distributed login component of a local end; acquiring a user login request based on a distributed login page at the front end of an application system, wherein the user login request carries user data;
the system comprises a login setting data acquisition module, a login setting data acquisition module and a login setting data processing module, wherein the login setting data acquisition module is used for acquiring login setting data of the distributed login system, and the login setting data is used for setting a login mode of a distributed login component;
the login module is used for performing user login of the application system through the distributed login component according to the login setting data and the user data, and comprises: when a server performs local login through a distributed login component, user credentials stored locally in an application system are obtained through the distributed login component, login verification of user data of a user to be logged in is performed, and user login is completed; when the server logs in the system user through the background service of the distributed login system, the user credentials are obtained from the background service of the distributed login of the distributed system through the distributed login component, and the system user logs in.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202111310324.1A 2021-11-08 2021-11-08 User login method, device, equipment and medium based on distributed login component Active CN113742696B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111310324.1A CN113742696B (en) 2021-11-08 2021-11-08 User login method, device, equipment and medium based on distributed login component

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111310324.1A CN113742696B (en) 2021-11-08 2021-11-08 User login method, device, equipment and medium based on distributed login component

Publications (2)

Publication Number Publication Date
CN113742696A CN113742696A (en) 2021-12-03
CN113742696B true CN113742696B (en) 2022-03-18

Family

ID=78727606

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111310324.1A Active CN113742696B (en) 2021-11-08 2021-11-08 User login method, device, equipment and medium based on distributed login component

Country Status (1)

Country Link
CN (1) CN113742696B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103312796A (en) * 2012-05-31 2013-09-18 微软公司 Logon interface selection for calculating environment user login
CN105306423A (en) * 2014-07-04 2016-02-03 中国银联股份有限公司 Unified login method for distributed web station system
CN107786540A (en) * 2017-09-21 2018-03-09 国家电网公司 A kind of equipment information acquiring method and terminal device
CN111339505A (en) * 2018-12-18 2020-06-26 北京奇虎科技有限公司 Method and device for realizing user login
CN111885080A (en) * 2020-07-31 2020-11-03 成都新潮传媒集团有限公司 Login service architecture, server and client
CN113111340A (en) * 2021-04-10 2021-07-13 支付宝(杭州)信息技术有限公司 Method, device, equipment and readable medium for displaying login mode options

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160127310A1 (en) * 2014-11-04 2016-05-05 Ctek Inc. Distributed industrial control monitoring and management
CN109583157A (en) * 2017-09-29 2019-04-05 卓望数码技术(深圳)有限公司 A kind of long-range trace protecting method of APP and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103312796A (en) * 2012-05-31 2013-09-18 微软公司 Logon interface selection for calculating environment user login
CN105306423A (en) * 2014-07-04 2016-02-03 中国银联股份有限公司 Unified login method for distributed web station system
CN107786540A (en) * 2017-09-21 2018-03-09 国家电网公司 A kind of equipment information acquiring method and terminal device
CN111339505A (en) * 2018-12-18 2020-06-26 北京奇虎科技有限公司 Method and device for realizing user login
CN111885080A (en) * 2020-07-31 2020-11-03 成都新潮传媒集团有限公司 Login service architecture, server and client
CN113111340A (en) * 2021-04-10 2021-07-13 支付宝(杭州)信息技术有限公司 Method, device, equipment and readable medium for displaying login mode options

Also Published As

Publication number Publication date
CN113742696A (en) 2021-12-03

Similar Documents

Publication Publication Date Title
US11650955B2 (en) Systems and methods for distributed data storage and delivery using blockchain
CN110365670B (en) Blacklist sharing method and device, computer equipment and storage medium
CN110781509B (en) Data verification method and device, storage medium and computer equipment
CN111107073B (en) Application automatic login method and device, computer equipment and storage medium
CN108365958B (en) Account login verification method and device, computer equipment and storage medium
CN110750766B (en) Authority verification method, device, computer equipment and storage medium
CN112860778B (en) Database management method, device, equipment and medium for desktop application program
CN110727949B (en) Data storage method and device, computer equipment and storage medium
CN112800393B (en) Authorization authentication method, software development kit generation method, device and electronic equipment
CN112308561A (en) Block chain-based evidence storing method and system, computer equipment and storage medium
CN112632573B (en) Intelligent contract execution method, device, system, storage medium and electronic equipment
CN114650154B (en) Webpage authority behavior control method and device, computer equipment and storage medium
CN108763888B (en) User profile processing method and device, computer equipment and storage medium
CN111737232A (en) Database management method, system, device, equipment and computer storage medium
CN112272093B (en) Token management method, electronic equipment and readable storage medium
CN114662150A (en) Data acquisition method and device and electronic equipment
CN113742696B (en) User login method, device, equipment and medium based on distributed login component
CN116827551A (en) Method and device for preventing global override
CN113742681B (en) Account management method and device, computer equipment and storage medium
CN111552551A (en) User management method and device based on master-slave system, computer equipment and medium
CN114448722A (en) Cross-browser login method and device, computer equipment and storage medium
CN116339767B (en) Application resource allocation method, device, computer equipment and storage medium
CN111740980B (en) Method and device for logging in application, mobile terminal and storage medium
CN110248166B (en) Video information processing method, client, electronic device and storage medium
CN114095173A (en) Block chain-based user authentication method, device and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant