CN114528542A - Login management method and device, electronic equipment and storage medium - Google Patents

Login management method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114528542A
CN114528542A CN202210006872.3A CN202210006872A CN114528542A CN 114528542 A CN114528542 A CN 114528542A CN 202210006872 A CN202210006872 A CN 202210006872A CN 114528542 A CN114528542 A CN 114528542A
Authority
CN
China
Prior art keywords
login
target
identification information
server
subsystem
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210006872.3A
Other languages
Chinese (zh)
Inventor
李良斌
陈孝良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing SoundAI Technology Co Ltd
Original Assignee
Beijing SoundAI Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing SoundAI Technology Co Ltd filed Critical Beijing SoundAI Technology Co Ltd
Priority to CN202210006872.3A priority Critical patent/CN114528542A/en
Publication of CN114528542A publication Critical patent/CN114528542A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1078Logging; Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present disclosure relates to a login management method, device, electronic device and storage medium, including: responding to a login request for logging in an integrated system, and acquiring identification information corresponding to the login request, wherein the integrated system at least comprises two subsystems, the identification information is used for identifying a login object, and the login request comprises account information of the login object; when the cache identification information does not include the identification information, jumping to a target login page, wherein the target login page displays a login control of a subsystem corresponding to the login authority of a login object, and the cache identification information is generated based on the identification information obtained by the historical login request; and the target subsystem is logged in response to the login control of the target subsystem triggered on the target login page, and the verification of the user login authority does not need to be carried out on the server, so that the memory overhead of the server is reduced.

Description

Login management method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of system login technologies, and in particular, to a login management method and apparatus, an electronic device, and a storage medium.
Background
With the rapid development of society, a large number of huge business systems with complex business are developed, generally, the business systems are composed of a plurality of subsystems, users need to switch and log in among the subsystems to complete a certain business, and the operation is time-consuming and labor-consuming.
For the above situation, currently, pages of multiple subsystems are mainly integrated into an integrated system, and a user can process all services only by operating on the integrated system.
However, when integrating pages of multiple subsystems onto an integrated system, it is necessary to authenticate the authority of the logged-in user.
In the prior art, the login information of the users is stored in the memory of the server, and when a large number of users log in, the memory overhead of the server is increased.
Disclosure of Invention
In order to solve the technical problem or at least partially solve the technical problem, the present disclosure provides a login management method, apparatus, electronic device and storage medium, which reduces memory overhead of a server.
In a first aspect, an embodiment of the present disclosure provides a login management method, including:
responding to a login request for logging in an integrated system, and acquiring identification information corresponding to the login request, wherein the integrated system at least comprises two subsystems, the identification information is used for identifying a login object, and the login request comprises account information of the login object;
when the cache identification information does not include the identification information, jumping to a target login page, wherein the target login page displays a login control of a subsystem corresponding to the login authority of the login object, and the cache identification information is generated based on the identification information obtained by the historical login request;
and responding to a login control of the target subsystem triggered on the target login page, and logging in the target subsystem.
Optionally, when the cache identification information does not include the identification information, jumping to a target login page includes:
jumping to an initial login page when the cache identification information does not include the identification information;
and when receiving the indication information that the account information of the login object passes the verification, jumping from the initial login page to a target login page.
Optionally, when the cache identification information does not include the identification information, jumping to an initial login page includes:
when the cache identification information does not include the identification information, jumping to an initial login page and accessing a server of the integrated system to realize the verification of the account information of the login object based on the server of the integrated system;
when the indication information that the account information of the login object passes the verification is received, jumping from the initial login page to a target login page comprises the following steps:
and when receiving indication information which is returned by the server of the integrated system and passes the account information verification of the login object, jumping from the initial login page to a target login page.
Optionally, the method further includes:
and when the account information of the login object is not verified, displaying verification failure information on the initial login page.
Optionally, the logging in the target subsystem in response to the login control of the target subsystem triggered on the target login page includes:
responding to a login control of a target subsystem triggered on a target login page, accessing a server of the target subsystem, and checking the identification information based on the server of the target subsystem;
and logging in the target subsystem when receiving the indication information which is returned by the server of the target subsystem and passes the verification of the identification information.
Optionally, in response to a login control of the target subsystem triggered on the target login page, accessing the server of the target subsystem to check the identification information based on the server of the target subsystem, where the method includes:
responding to a login control of a target subsystem triggered on a target login page, and acquiring the operation authority of the login object in the target subsystem based on a server of the target subsystem;
verifying the identification information according to the operation authority of the login object;
when receiving the indication information that the identification information returned by the server of the target subsystem passes the verification, logging in the target subsystem includes:
and when receiving indication information which is returned by the server of the target subsystem and passes the identification information verification, logging in the target subsystem and displaying the operation authority of the logged-in object on the page of the target subsystem.
Optionally, the obtaining, by the server based on the target subsystem, the operation right of the login object in the target subsystem in response to the login control of the target subsystem triggered on the target login page includes:
and responding to a login control of the target subsystem triggered on a target login page, and accessing the server of the target subsystem to acquire the operation authority of the login object in the target subsystem from the server of the integrated system based on the server of the target subsystem.
In a second aspect, an embodiment of the present disclosure provides a login management apparatus, including:
the system comprises an identification information acquisition module, a login processing module and a login processing module, wherein the identification information acquisition module is used for responding to a login request for logging in an integrated system and acquiring identification information corresponding to the login request, the integrated system at least comprises two subsystems, the identification information is used for identifying a login object, and the login request comprises account information of the login object;
the jumping module is used for jumping to a target login page when the cache identification information does not include the identification information, wherein the target login page displays a login control of a subsystem corresponding to the login authority of the login object, and the cache identification information is generated on the basis of the identification information obtained by the historical login request;
and the login module is used for responding to a login control of the target subsystem triggered on the target login page and logging in the target subsystem.
In a third aspect, an embodiment of the present disclosure provides an electronic device, including:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement a method as described in any of the first aspects.
In a fourth aspect, the embodiments of the present disclosure provide a computer storage medium on which a computer program is stored, which when executed by a processor, implements the method according to any one of the first aspect.
Compared with the prior art, the technical scheme provided by the embodiment of the disclosure has the following advantages:
according to the login management method and device, the electronic device and the storage medium, the integrated system adopts a single-point login authentication mechanism, and when the operation of logging in a target subsystem is triggered, any subsystem of the integrated system, which is provided with login permission by a user, can be accessed without executing the operation of a login request again. When a user processes a certain service and needs to jump among different subsystems, the operation that the user repeatedly logs in the subsystems can be reduced through a single sign-on authentication mechanism, and the user experience is improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present disclosure, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic flowchart of a login management method according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of another login management method provided in the embodiment of the present disclosure;
fig. 3 is a schematic flowchart of another login management method provided in the embodiment of the present disclosure;
fig. 4 is a schematic flowchart of another login management method provided in the embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a login management apparatus according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of an electronic device provided in an embodiment of the present disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, aspects of the present disclosure will be further described below. It should be noted that the embodiments and features of the embodiments of the present disclosure may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced in other ways than those described herein; it is to be understood that the embodiments disclosed in the specification are only a few embodiments of the present disclosure, and not all embodiments.
When the service system comprises a plurality of subsystems, in order to reduce switching and logging back and forth between the plurality of subsystems of a user, the plurality of subsystems are integrated into an integrated system in the prior art, the user logging entries are unified based on the integrated system, and the integrated system determines the subsystems which can be accessed by different users based on authorization of the users, so that the problem that the users need to manage a plurality of accounts and a plurality of domain names is solved. However, in the prior art, the login information of the user is stored in the memory of the server, and when a large number of users log in, the server needs to record the information of the users, so as to implement the authentication on the server, but the authentication of the user information on the server greatly increases the memory overhead of the server.
Based on this, the embodiment of the present disclosure provides a login management method, including: the method comprises the steps that a login request is initiated in a browser of the electronic equipment, the browser of the electronic equipment sends the login request to a server, identification information corresponding to the login request returned from the server is obtained, when identification information corresponding to the login request returned from the server is not included in a browser cache of the electronic equipment, the browser of the electronic equipment skips to a target login page from a login request page, and after a user triggers a login control of the target subsystem, the target subsystem is logged in on the browser of the electronic equipment. That is, in the login management method provided in the embodiment of the present disclosure, the cache identification information is stored in the cache of the browser that initiates the login request, and therefore, the process of determining whether the cache identification information includes the identification information is performed in the browser corresponding to the login request, and therefore, the verification of the user login permission does not need to be performed on the server, which reduces the memory overhead of the server.
The login management method of the present disclosure is executed by the electronic device or an application program, a web page, a public number, and the like in the electronic device. The electronic device may be a tablet computer, a mobile phone, a wearable device, an in-vehicle device, an Augmented Reality (AR)/Virtual Reality (VR) device, a notebook computer, an ultra-mobile personal computer (UMPC), a netbook, a Personal Digital Assistant (PDA), a smart television, a smart screen, a high definition television, a 4K television, a smart speaker, a smart projector, and the like, and the specific type of the electronic device is not limited in this disclosure.
The present disclosure does not limit the type of operating system of the electronic device. For example, an Android system, a Linux system, a Windows system, an iOS system, etc.
Based on the foregoing description, the embodiments of the present disclosure will use an electronic device as an example, and the login management method provided by the present disclosure is elaborated in combination with an application scenario.
As shown in fig. 1, the login management method includes:
and S10, responding to the login request of the login integrated system, and acquiring the identification information corresponding to the login request.
The integrated system at least comprises two subsystems, the identification information is used for identifying the login object, and the login request comprises account information of the login object.
The integrated system is a system which integrates a plurality of subsystems according to the business logic relationship and uniformly provides front-end access service to the outside. For example, the internet XX integration system and the subsystems integrated by the internet XX integration system are included in the first subsystem, the second subsystem, the third subsystem, the fourth subsystem and the like, and a user logs in the internet XX integration system through a front-end page provided by the internet XX integration system to complete related tasks.
The login object includes a user, an object, and the like, and the following embodiment will specifically describe the login object as the user.
The login request may refer to a login operation initiated by a user to an integrated system in a browser through an electronic device. For example, a user may initiate a corresponding login request by entering a user account and password on a login page of the integrated system and clicking a login button. The login request includes account information input by the user, such as a user account and a password.
The identification information is a flag generated based on the user login information, which may be used to identify the logged in user. The user login information may be determined according to a login manner of the user, and different login manners correspond to different login information, for example, the user login manner includes: account password, mobile phone verification code, login modes such as inserting a USB flash disk, voiceprint or fingerprint and the like. In this embodiment, the user login information is taken as the login account and password of the user as an example for description. For example, if the user corresponding to the login account a and the password a is a, the identification information identifies the user a at this time.
And S20, jumping to a target login page when the cache identification information does not include the identification information.
The target login page displays a login control of a subsystem corresponding to the login authority of the login object, and caches identification information obtained by the identification information based on the historical login request.
The cache identification information is identification information obtained by requesting to log in the integrated system in the history login request cached by the browser.
When a user initiates a login operation to an integrated system in a browser through electronic equipment, if the cache identification information of the browser does not include identification information corresponding to a current login request, the user can obtain a subsystem with login permission on a target login page by jumping to the target login page.
The cache identification information is stored in the browser, after a user triggers a login request for logging in the integrated system in the browser, the browser sends the login request to a server of the integrated system, the server of the integrated system returns identification information corresponding to the login request to the browser, the browser compares the identification information returned by the server of the integrated system with the cache identification information cached in the browser, when the cache identification information does not include the identification information returned by the server of the integrated system, the browser jumps to a target login page, and displays a login control of a subsystem which has login permission in the integrated system and is identified by the identification information returned by the server of the integrated system and corresponding to the login request on the target login page, so that the user can access any subsystem which has login permission in the integrated system.
The process of judging whether the cache identification information cached by the browser comprises the identification information of the login request is carried out in the browser corresponding to the login request, so that the verification of the login permission of the user is not required to be carried out on the server, the server only needs to process the login request based on an encryption and decryption algorithm to obtain the identification information in the login request, the verification of the user operation permission corresponding to the identification information is not required, namely, the encryption and decryption operation is carried out on the server, the user permission verification is carried out on the browser, and the memory overhead of the server is reduced.
And S30, responding to the login control of the target subsystem triggered on the target login page, and logging in the target subsystem.
And after the browser skips to a target login page, a user triggers a login control of any target subsystem on the target login page to realize login of the target subsystem.
In the embodiment of the invention, because the integrated system adopts a Single Sign On authentication mechanism, Single Sign On (SSO) means that a user only needs to log On the integrated system once and complete corresponding Single Sign On authentication, and when the operation of logging On a target subsystem is triggered, any subsystem of the integrated system, which the user has the login authority, can be accessed without executing the operation of logging On the target subsystem again. When a user needs to jump among different subsystems when processing a certain service, the operation that the user repeatedly logs in the subsystems can be reduced through the single sign-on authentication mechanism, and the user experience is improved.
According to the login management method provided by the embodiment of the disclosure, the integrated system adopts a Single Sign On authentication mechanism, and Single Sign On (SSO) means that a user only needs to log On the integrated system once and complete corresponding Single Sign On authentication, and when the operation of logging in a target subsystem is triggered, any subsystem of the integrated system, which the user has login permission, can be accessed without executing the operation of logging in a request again. When a user processes a certain service and needs to jump among different subsystems, the operation that the user repeatedly logs in the subsystems can be reduced through a single sign-on authentication mechanism, and the user experience is improved.
Fig. 2 is a schematic flowchart of another login management method provided in the embodiment of the present disclosure, and based on the foregoing embodiment, as shown in fig. 2, an implementation manner of step S20 includes:
and S21, jumping to the initial login page when the cache identification information does not include the identification information.
The initial login page is a unified login page of the integrated system, that is, all subsystems included in the integrated system can be accessed through the unified login page of the integrated system.
The method comprises the steps that after the browser receives identification information returned by a server of the integrated system, whether the identification information returned by the server of the integrated system is included is searched in cache identification information cached by the browser, when the cache identification information cached by the browser does not include the identification information returned by the server of the integrated system, the browser firstly jumps to an initial login page, and the account information of a user is verified on the initial login page.
Specifically, the specific process of checking the account information of the user on the initial login page is as follows:
and when the cache identification information does not comprise the identification information, jumping to an initial login page and accessing a server of the integrated system, and verifying the account information of the login object through the server of the integrated system.
The account information of the login object is checked by the server of the integrated system to ensure whether the account information of the login object is correct and whether the integrated system authorizes the authority of the account information to login the integrated system.
And when the server of the integrated system passes the verification of the account information of the login object, the server of the integrated system sends the indication information that the account information of the login object passes the verification to the browser.
And S22, jumping from the initial login page to the target login page when the indication information that the account information of the login object passes the verification is received.
And the target login page displays a login control of the subsystem with the login authority of the login object.
Optionally, when indication information that the account information of the login object returned by the server of the integrated system passes the verification is received, the initial login page jumps to the target login page.
And when the server of the integrated system passes the verification of the account information of the login object, the server of the integrated system sends indication information that the account information of the login object passes the verification to the browser. At this time, after the browser receives indication information that the account information returned by the server of the integrated system passes the verification, the browser jumps from the initial login page to the target login page.
Because the target login page displays the login control of the subsystem with the login authority of the login object, at the moment, the login control of the subsystem displayed by the target login page can be triggered on the target login page, and the target subsystem is logged in.
According to the login management method provided by the embodiment of the invention, when the cache identification information does not include the identification information, the initial login page is jumped to, when the indication information that the account information of the login object passes the verification is received, the initial login page is jumped to the target login page, namely, the account information of the user is verified on the initial login page, when the account information of the user passes the verification, the initial login page is jumped to the target login page, and the target subsystem is logged in the target login page after the account information of the user is verified.
Fig. 3 is a schematic flowchart of another login management method provided in an embodiment of the present disclosure, where on the basis of the foregoing embodiment, as shown in fig. 3, an implementation manner of step S30 includes:
and S31, responding to the login control of the target subsystem triggered on the target login page, accessing the server of the target subsystem, and checking the identification information based on the server of the target subsystem.
After a user triggers a login control of a target subsystem on a target login page, a browser accesses a server corresponding to the target subsystem to verify identification information based on the server of the target subsystem, namely, after the user triggers the login control of the target subsystem on the target login page, the browser accesses the server of the target subsystem, the server of the target subsystem receives a login request sent by the browser for logging in the target subsystem, decodes the identification information included in the login request to obtain account information included in the login request, and after the server verifies the account information included in the login request, the server sends indication information that the verification is passed to the browser.
And S33, logging in the target subsystem when receiving the indication information that the identification information returned by the server of the target subsystem passes the verification.
And after the browser receives the indication information that the identification information returned by the server of the target subsystem passes the verification, the browser logs in the target subsystem.
The server of the target subsystem verifies the identity of the user, based on the identification information carried in the access request, the server of the target subsystem performs operations such as encryption and decryption and the like on the identification information carried in the access request to obtain the user information corresponding to the identification information, the server of the target subsystem verifies the user information and checks the legality of the user information, and if the user information is legal, the user can access any subsystem of the integrated system without logging in again.
The login management method provided by the embodiment of the disclosure is used for responding to a login control of a target subsystem triggered on a target login page, and accessing a server of the target subsystem so as to realize the verification of the server based on the target subsystem on identification information; when indication information that identification information returned by a server of a target subsystem passes verification is received, the target subsystem is logged in, namely, based on the identification information carried in the access request, the server of the target subsystem performs operations such as encryption and decryption on the identification information carried in the access request, so that user information corresponding to the identification information is obtained, the server of the target subsystem can verify the user information and check the validity of the user information, and if the user information is legal, a user can access any subsystem of the integrated system without logging in again.
Fig. 4 is a schematic flowchart of another login management method provided in the embodiment of the present disclosure, and on the basis of the embodiment corresponding to fig. 4, as shown in fig. 4, a specific implementation manner of step S31 includes:
s310, responding to a login control of the target subsystem triggered on the target login page, and acquiring the operation authority of the login object in the target subsystem based on the server of the target subsystem.
Specifically, the server of the target subsystem is accessed in response to the login control of the target subsystem triggered on the target login page, so that the server of the target subsystem acquires the operation authority of the login object in the target subsystem from the server of the integrated system.
When the login control of the target subsystem is triggered on the target login page, the browser acquires a login request of the target subsystem, the browser requests to access a server of the target subsystem, and the server based on the target subsystem acquires the operation authority of the login object in the target subsystem from the server of the integrated system.
The operating authority of the login object triggering the login of the target subsystem is integrated in the server of the integrated system in the target subsystem, so that after the login control of the target subsystem is triggered in the target login page, the browser firstly accesses the server corresponding to the target subsystem, at the moment, after the server of the target subsystem receives the request of the browser for logging in the target subsystem, the server of the target subsystem accesses the server of the integrated system, the operating authority of the login object in the target subsystem is obtained from the server of the integrated system, and the operating authority configured by the login object is displayed on the page where the target subsystem logs in after the login object logs in the target subsystem.
In the above embodiment, the server of each subsystem in the integrated system and the server of the integrated system may be independent servers, or may be a server, but the server serves the integrated system and each subsystem through integrating a plurality of interfaces.
S311, verifying the identification information according to the operation authority of the login object.
After a user triggers a login control of a target subsystem on a target login page, a browser accesses a server corresponding to the target subsystem to acquire the operation authority of a login object, and after the operation authority of the login object is acquired, the identification information is verified according to the operation authority of the login object, so that the identification information is verified by the server based on the target subsystem.
When the login management method includes the specific implementation steps S310 and S311 of step S31, one implementation manner of step S33 includes:
s330, when the indication information that the identification information returned by the server of the target subsystem passes the verification is received, logging in the target subsystem and displaying the operation authority of the logged-in object on the page of the target subsystem.
The method includes the steps that in the process of logging in a target subsystem by a browser, account information of a login object does not need to be filled again, the browser enters the target subsystem only after a target login page triggers a login control of the target subsystem, and operation permission of the login object is displayed on a page of the target subsystem after the target login page enters the target subsystem, namely even if the account information of the login object is not input in the process of triggering the login control of the target subsystem, the browser can obtain the operation permission of the login object in the target subsystem.
The login management method provided by the embodiment of the disclosure is used for responding to the login control of the target subsystem triggered by the target login page, acquiring the operation permission of the login object in the target subsystem, logging in the target subsystem and displaying the operation permission of the login object on the page of the target subsystem, namely when the account information of the login object is not input in the process of triggering the login control of the target subsystem, the operation permission of the login object in the target subsystem can be acquired, the repeated login operation of the subsystem by a user can be reduced, and the user experience is improved.
In one possible implementation manner, when the account information of the login object is not verified, the verification failing information is displayed on the initial login page.
When the account information of the login object is not verified, the verification failing information is displayed on the initial login page, so that the login object can consult an administrator to open the related login permission in time.
As another implementation mode, when indication information that the identification information returned by the server of the target subsystem fails in verification is received, returning to the target login page.
Fig. 5 is a schematic structural diagram of a login management device according to an embodiment of the present disclosure, and as shown in fig. 5, the login management device includes:
an identification information obtaining module 510, configured to obtain, in response to a login request to login to an integrated system, identification information corresponding to the login request, where the integrated system includes at least two subsystems, the identification information is used to identify a login object, and the login request includes account information of the login object;
a skip module 520, configured to skip to a target login page when the cache identification information does not include the identification information, where the target login page displays a login control of a subsystem corresponding to a login authority of a login object, and the cache identification information is generated based on identification information obtained by a historical login request;
and a login module 530, configured to log in the target subsystem in response to the login control of the target subsystem triggered on the target login page.
According to the login management device provided by the embodiment of the disclosure, the integrated system adopts a Single Sign On authentication mechanism, and Single Sign On (SSO) means that a user only needs to log in the integrated system once and complete corresponding Single Sign On authentication, and when the operation of logging in a target subsystem is triggered, any subsystem which the user has login permission in the integrated system can be accessed without executing the operation of logging in a request again. When a user processes a certain service and needs to jump among different subsystems, the operation that the user repeatedly logs in the subsystems can be reduced through a single sign-on authentication mechanism, and the user experience is improved.
Optionally, the skip module includes:
the first jumping module is used for jumping to an initial login page when the cached identification information does not include the identification information;
and the second skipping module is used for skipping from the initial login page to the target login page when the indication information that the account information of the login object passes the verification is received.
Optionally, the first skip module is specifically configured to:
when the cache identification information does not include the identification information, jumping to an initial login page and accessing a server of the integrated system, so that the account information of the login object is verified based on the server of the integrated system;
the second skip module is specifically configured to:
and when receiving indication information that the account information of the login object returned by the server of the integrated system passes the verification, jumping from the initial login page to a target login page.
Optionally, the skip module further includes:
and the third skipping module is used for displaying the verification failed information on the initial login page when the account information of the login object is not verified.
Optionally, the login module includes:
the access unit is used for responding to a login control of the target subsystem triggered on the target login page, accessing the server of the target subsystem and verifying the identification information based on the server of the target subsystem;
and the first login unit is used for logging in the target subsystem when receiving the indication information that the identification information returned by the server of the target subsystem passes the verification.
Optionally, the access unit is specifically configured to:
responding to a login control of a target subsystem triggered on a target login page, and acquiring the operation authority of a login object in the target subsystem based on a server of the target subsystem;
verifying the identification information according to the operation authority of the login object;
the first login unit is specifically configured to:
and when receiving indication information that the identification information returned by the server of the target subsystem passes the verification, logging in the target subsystem and displaying the operation authority of the logged-in object on the page of the target subsystem.
Optionally, the first login unit is further specifically configured to:
and responding to the login control of the target subsystem triggered on the target login page, and accessing the server of the target subsystem to realize that the server of the target subsystem acquires the operation authority of the login object in the target subsystem from the server of the integrated system.
The device provided by the embodiment of the invention can execute the method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
It should be noted that, in the embodiment of the apparatus, the included units and modules are merely divided according to functional logic, but are not limited to the above division as long as the corresponding functions can be implemented; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention.
Fig. 6 is a schematic structural diagram of an electronic device provided in an embodiment of the present disclosure, and as shown in fig. 6, the electronic device includes a processor 610, a memory 620, an input device 630, and an output device 640; the number of processors 610 in the computer device may be one or more, and one processor 610 is taken as an example in fig. 6; the processor 610, the memory 620, the input device 630, and the output device 640 in the electronic apparatus may be connected by a bus or other means, and fig. 6 illustrates an example of connection by a bus.
The memory 620 is provided as a computer-readable storage medium for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the methods in the embodiments of the present invention. The processor 610 executes various functional applications of the computer device and data processing by executing software programs, instructions and modules stored in the memory 620, namely, implements the method provided by the embodiment of the present invention.
The memory 620 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal, and the like. Further, the memory 620 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory 620 can further include memory located remotely from the processor 610, which can be connected to a computer device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 630 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic device, and may include a keyboard, a mouse, and the like. The output device 640 may include a display device such as a display screen.
The disclosed embodiments also provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are used to implement the methods provided by the embodiments of the present invention.
Of course, the storage medium provided by the embodiment of the present invention contains computer-executable instructions, and the computer-executable instructions are not limited to the method operations described above, and may also perform related operations in the method provided by any embodiment of the present invention.
From the above description of the embodiments, it is obvious for those skilled in the art that the present invention can be implemented by software and necessary general hardware, and certainly, can also be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which can be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute the methods according to the embodiments of the present invention.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present disclosure, which enable those skilled in the art to understand or practice the present disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A login management method, comprising:
responding to a login request for logging in an integrated system, and acquiring identification information corresponding to the login request, wherein the integrated system at least comprises two subsystems, the identification information is used for identifying a login object, and the login request comprises account information of the login object;
when the cache identification information does not include the identification information, jumping to a target login page, wherein the target login page displays a login control of a subsystem corresponding to the login authority of the login object, and the cache identification information is generated based on the identification information obtained by the historical login request;
and responding to a login control of the target subsystem triggered on the target login page, and logging in the target subsystem.
2. The method of claim 1, wherein jumping to a target landing page when the cached identification information does not include the identification information comprises:
skipping to an initial login page when the cache identification information does not comprise the identification information;
and when receiving the indication information that the account information of the login object passes the verification, jumping from the initial login page to a target login page.
3. The method of claim 2, wherein jumping to an initial login page when the cached identification information does not include the identification information comprises:
when the cache identification information does not include the identification information, jumping to an initial login page and accessing a server of the integrated system, so that account information of the login object is verified based on the server of the integrated system;
when the indication information that the account information of the login object passes the verification is received, jumping from the initial login page to a target login page comprises the following steps:
and when receiving indication information which is returned by the server of the integrated system and passes the account information verification of the login object, jumping from the initial login page to a target login page.
4. The method of claim 2, further comprising:
and when the account information of the login object is not verified, displaying verification failure information on the initial login page.
5. The method of claim 1, wherein logging into the target subsystem in response to a login control of the target subsystem being triggered at a target login page comprises:
responding to a login control of a target subsystem triggered on a target login page, accessing a server of the target subsystem, and checking the identification information based on the server of the target subsystem;
and logging in the target subsystem when receiving the indication information which is returned by the server of the target subsystem and passes the verification of the identification information.
6. The method of claim 5, wherein accessing the server of the target subsystem to verify the identification information based on the server of the target subsystem in response to the target subsystem's login control being triggered at the target login page comprises:
responding to a login control of a target subsystem triggered on a target login page, and acquiring the operation authority of the login object in the target subsystem based on a server of the target subsystem;
verifying the identification information according to the operation authority of the login object;
when receiving the indication information that the identification information returned by the server of the target subsystem passes the verification, logging in the target subsystem includes:
and when receiving indication information which is returned by the server of the target subsystem and passes the identification information verification, logging in the target subsystem and displaying the operation authority of the logged-in object on the page of the target subsystem.
7. The method of claim 6, wherein the obtaining, by the target subsystem-based server, the operating right of the login object at the target subsystem in response to the login control of the target subsystem triggered at the target login page comprises:
and responding to a login control of the target subsystem triggered on a target login page, and accessing the server of the target subsystem to realize that the server of the target subsystem acquires the operation authority of the login object in the target subsystem from the server of the integrated system.
8. A login management apparatus, comprising:
the system comprises an identification information acquisition module, a login processing module and a login processing module, wherein the identification information acquisition module is used for responding to a login request for logging in an integrated system and acquiring identification information corresponding to the login request, the integrated system at least comprises two subsystems, the identification information is used for identifying a login object, and the login request comprises account information of the login object;
the jumping module is used for jumping to a target login page when the cache identification information does not include the identification information, wherein the target login page displays a login control of a subsystem corresponding to the login authority of the login object, and the cache identification information is generated on the basis of the identification information obtained by the historical login request;
and the login module is used for responding to a login control of the target subsystem triggered on the target login page and logging in the target subsystem.
9. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement a method as claimed in any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the method of any one of claims 1 to 7.
CN202210006872.3A 2022-01-05 2022-01-05 Login management method and device, electronic equipment and storage medium Pending CN114528542A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210006872.3A CN114528542A (en) 2022-01-05 2022-01-05 Login management method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210006872.3A CN114528542A (en) 2022-01-05 2022-01-05 Login management method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114528542A true CN114528542A (en) 2022-05-24

Family

ID=81621344

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210006872.3A Pending CN114528542A (en) 2022-01-05 2022-01-05 Login management method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114528542A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115102765A (en) * 2022-06-22 2022-09-23 北京声智科技有限公司 Authority configuration method and device, electronic equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115102765A (en) * 2022-06-22 2022-09-23 北京声智科技有限公司 Authority configuration method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109274685B (en) Multi-system login method and device, computer equipment and storage medium
CN108632253B (en) Client data security access method and device based on mobile terminal
CN112597472B (en) Single sign-on method, device and storage medium
US11212283B2 (en) Method for authentication and authorization and authentication server using the same for providing user management mechanism required by multiple applications
US20170346815A1 (en) Multifactor authentication processing using two or more devices
US20160004855A1 (en) Login using two-dimensional code
US9934310B2 (en) Determining repeat website users via browser uniqueness tracking
CN110365684B (en) Access control method and device for application cluster and electronic equipment
US9210159B2 (en) Information processing system, information processing device, and authentication method
CN106656455B (en) Website access method and device
CN112000951A (en) Access method, device, system, electronic equipment and storage medium
CN110708335A (en) Access authentication method and device and terminal equipment
US20200036525A1 (en) Method for determining approval for access to gate through network, and server and computer-readable recording media using the same
CN113630253A (en) Login method, device, computer system and readable storage medium
CN112118238A (en) Method, device, system, equipment and storage medium for authentication login
CN116484338A (en) Database access method and device
CN114978605A (en) Page access method and device, electronic equipment and storage medium
CN114528542A (en) Login management method and device, electronic equipment and storage medium
CN112260983B (en) Identity authentication method, device, equipment and computer readable storage medium
CN110912865A (en) Security access control method, server and electronic equipment
CN111241523B (en) Authentication processing method, device, equipment and storage medium
US11409856B2 (en) Video-based authentication
CN111355583B (en) Service providing system, method, device, electronic equipment and storage medium
CN111259368A (en) Method and equipment for logging in system
CN112528286B (en) Terminal equipment safety detection method, associated equipment and computer program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination