CN115242403A - Unified login system and method for intelligent application warehouse - Google Patents

Unified login system and method for intelligent application warehouse Download PDF

Info

Publication number
CN115242403A
CN115242403A CN202210849511.5A CN202210849511A CN115242403A CN 115242403 A CN115242403 A CN 115242403A CN 202210849511 A CN202210849511 A CN 202210849511A CN 115242403 A CN115242403 A CN 115242403A
Authority
CN
China
Prior art keywords
target object
server
identification information
client
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210849511.5A
Other languages
Chinese (zh)
Inventor
魏云朗
昝云飞
王百含
徐红
纪传俊
纪达麒
陈运文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Daguan Technology Beijing Co ltd
Original Assignee
Daguan Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Daguan Technology Beijing Co ltd filed Critical Daguan Technology Beijing Co ltd
Priority to CN202210849511.5A priority Critical patent/CN115242403A/en
Publication of CN115242403A publication Critical patent/CN115242403A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a unified login system and a unified login method for an intelligent application warehouse. The system comprises: a server and a client; the server is used for generating an access token according to the access request of the target object and initiating a jump instruction to the client; the client is used for receiving a jump instruction initiated by the server, performing login verification on the target object according to the first identification information input by the target object, generating a verification result and transmitting the verification result to the server; the server is also used for generating a temporary token according to the verification result; the client is also used for acquiring a temporary token generated by the server according to the verification result; and acquiring second identification information authorized by the target object by using the temporary token, acquiring the target resource to be accessed by the target object from the server side when the second identification information meets the set permission rule, and displaying the link of the target resource. By the technical scheme, the unified login of a plurality of intelligent applications can be realized, and the login efficiency is improved.

Description

Unified login system and method for intelligent application warehouse
Technical Field
The invention relates to the technical field of computer application, in particular to a unified login system and a unified login method for an intelligent application warehouse.
Background
With the rapid development of computer technology, the related services of various technology companies are more and more, and correspondingly, more and more applications are developed. In the prior art, a separate set of login systems is typically matched for each application.
However, because of the large number of applications, if each application matches an individual login system, the login information and address of each login system need to be recorded in detail to ensure accurate login, and a large amount of labor cost and hardware resources are consumed in managing each login system. Therefore, how to provide a unified login method for multiple intelligent applications to improve login efficiency is an urgent problem to be solved at present.
Disclosure of Invention
The invention provides a unified login system and a unified login method for an intelligent application warehouse, which can solve the problem of low login efficiency of intelligent applications.
According to an aspect of the present invention, there is provided a unified login system for an intelligent application repository, the system comprising: a server and a client;
the server is used for generating an access token according to the access request of the target object and initiating a jump instruction to the client; the access request comprises a target resource address to be accessed by the target object;
the client is used for receiving a jump instruction initiated by the server, performing login verification on the target object according to the first identification information input by the target object, generating a verification result and transmitting the verification result to the server;
the server is also used for generating a temporary token according to the verification result;
the client is also used for acquiring a temporary token generated by the server according to the verification result; and acquiring second identification information authorized by the target object by using the temporary token, acquiring the target resource to be accessed by the target object from the server side when the second identification information meets the set permission rule, and displaying the link of the target resource.
According to another aspect of the present invention, there is provided a unified login method for an intelligent application repository, the method including:
generating an access token through a server according to an access request of a target object, and initiating a jump instruction to a client; the access request comprises a target resource address to be accessed by the target object;
receiving a jump instruction initiated by a server through a client, performing login verification on a target object according to first identification information input by the target object, generating a verification result, and transmitting the verification result to the server;
generating a temporary token according to the verification result through the server;
acquiring a temporary token generated by the server according to the verification result through the client; and acquiring second identification information authorized by the target object by using the temporary token, acquiring the target resource to be accessed by the target object from the server side when the second identification information meets the set permission rule, and displaying the link of the target resource.
According to the technical scheme of the embodiment of the invention, the server is used for generating the access token according to the access request of the target object and initiating the jump instruction to the client; the access request comprises a target resource address to be accessed by the target object; the client is used for receiving a jump instruction initiated by the server, performing login verification on a target object according to first identification information input by the target object, generating a verification result and transmitting the verification result to the server; the server is also used for generating a temporary token according to the verification result; the client is also used for acquiring a temporary token generated by the server according to the verification result; and acquiring second identification information authorized by the target object by using the temporary token, acquiring the target resource to be accessed by the target object from the server side when the second identification information meets the set permission rule, and displaying the link of the target resource. According to the technical scheme, through mutual interaction between the server and the client, the target resource to be accessed by the target object can be obtained through the client under the condition that the target object meets login verification and authority verification, so that a unified login method for multiple intelligent applications is provided, and login efficiency is improved.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present invention, nor do they necessarily limit the scope of the invention. Other features of the present invention will become apparent from the following description.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1a is a schematic structural diagram of a unified login system of an intelligent application repository provided according to an embodiment of the present invention;
FIG. 1b is a schematic workflow diagram of a unified login system for an intelligent application repository according to an embodiment of the present invention;
fig. 2 is a flowchart of a unified login method for an intelligent application repository according to a second embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," "target," and the like in the description and claims of the present invention and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Moreover, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to the technical scheme, the data or information are acquired, stored, used, processed and the like according with relevant regulations of national laws and regulations.
Example one
Fig. 1a is a schematic structural diagram of a unified login system for an intelligent application repository according to an embodiment of the present invention, as shown in fig. 1a, the system includes: a server 110 and a client 120; the unified login system of the intelligent application warehouse can be used for assisting a user needing to record a plurality of intelligent application login information to carry out unified login on the intelligent application warehouse.
The server 110 is configured to generate an access token according to an access request of a target object, and initiate a jump instruction to the client 120; the access request comprises a target resource address to be accessed by the target object;
the client 120 is configured to receive a jump instruction initiated by the server 110, perform login verification on a target object according to first identification information input by the target object, generate a verification result, and transmit the verification result to the server 110;
the server 110 is further configured to generate a temporary token according to the verification result;
the client 120 is further configured to obtain a temporary token generated by the server 110 according to the verification result; and acquiring second identification information authorized by the target object by using the temporary token, and acquiring the target resource to be accessed by the target object from the server 110 and displaying the link of the target resource when the second identification information meets the set permission rule.
In this embodiment, the server 110 may be configured to store each intelligent application, where the type of the intelligent application may be an application system, or may also be each development tool, and the like, which is not limited in this embodiment of the present invention. An access token may refer to a token that accesses a smart application stored in the server 110.
The target object may refer to a user who needs to access the smart application in the server. The target resource may refer to an intelligent application that the target object wants to access in the server.
Client 120 may refer to a third-party application, which may illustratively be a website, that desires to access a target resource in server 110. The jump instruction may refer to an instruction to pop the client 120, thereby providing an effective interface for unified login and providing an effective basis for subsequent login verification.
The first identification information may refer to information for verifying the login identity of the target object, and may be, for example, a user name input by the target user, or a password input by the target user. The login verification may refer to verifying correctness of the first identification information input by the target user. The verification result may refer to a result obtained after verifying the correctness of the first identification information input by the target user, and may be, for example, a successful verification or a failed verification.
The temporary token may refer to a token for requesting acquisition information from the target object, and may be generated when the verification result is verification success. The second identification information may refer to information for verifying the access right of the target object, and may be, for example, a login avatar of the target object, or a code of the target object. The set permission rule may refer to a preset target object access permission, and may specify, for example, a name or an address of the smart application that the target object can access.
The link display may refer to that after the target resource to be accessed by the target object is acquired from the server 110, the address of the target resource may be linked, and a home page of the target resource is displayed, so that the target object operates the target resource.
It should be noted that, when the target resource is displayed in a link manner, the smart application meeting all the permissions of the target object in the set permission rule may be simultaneously displayed in a link manner on the top page of the client 120, so that when the target object accesses the smart application except the target resource, login authentication needs to be performed again and login efficiency is reduced due to permission authentication.
According to the technical scheme of the embodiment of the invention, the server 110 is used for generating an access token according to an access request of a target object and initiating a jump instruction to the client 120; the access request comprises a target resource address to be accessed by the target object; the client 120 is configured to receive a jump instruction initiated by the server 110, perform login verification on a target object according to first identification information input by the target object, generate a verification result, and transmit the verification result to the server 110; the server 110 is further configured to generate a temporary token according to the verification result; the client 120 is further configured to obtain a temporary token generated by the server 110 according to the verification result; and acquiring second identification information authorized by the target object by using the temporary token, and acquiring the target resource to be accessed by the target object from the server 110 and displaying the link of the target resource when the second identification information meets the set permission rule. According to the technical scheme, through mutual interaction between the server 110 and the client 120, the target resource to be accessed by the target object can be obtained through the client 120 under the condition that the target object meets login verification and permission verification, so that a unified login method for multiple intelligent applications is provided, and login efficiency is improved.
Optionally, the system for unified login of the intelligent application repository further includes: and the management terminal is used for generating a set authority rule according to the access authority of the target object to each resource in the server terminal.
It should be noted that the management side may also perform unified management on each intelligent application stored in the server side 110, which may include operations of adding, deleting, updating, querying, and the like, for example, on the intelligent application.
Optionally, generating an access token according to the access request of the target object includes: when a target object initiates a trigger instruction to a target resource, generating an access request according to a target resource address to be accessed by the target object; and when the server judges that the target resource address exists, generating an access token.
The triggering instruction may refer to an instruction for triggering a response of the target resource, and may be, for example, a click instruction.
Optionally, the management end is further configured to monitor access information of each target resource, stop an access function of the target resource when the access information exceeds a set threshold, and send alarm information.
The access information may refer to monitoring information for monitoring a target resource in the server 110, and may be, for example, an access amount of the target resource in a set time period, a Central Processing Unit (CPU) usage amount for storing the target resource, and the like. The set threshold may refer to a preset value for evaluating the access information, and for example, if the access information is the access amount of the target resource in a set time period, the set threshold may be that the access amount in one hour does not exceed 100; if the access information is the CPU usage of the storage target resource, the set threshold may be no more than eighty percent of the original CPU usage. The alarm information can be prompt information containing abnormal access information to warn a worker that an abnormal condition occurs, and maintenance is performed in time.
FIG. 1b is a schematic workflow diagram of a unified login system for an intelligent application repository according to an embodiment of the present invention; specifically, firstly, a client generates a set authority rule according to access authorities of different target objects to various resources in a server; furthermore, when the target object makes an access request for the target resource, the server generates an access token according to the target resource address to be accessed in the access request of the target object, and initiates a jump instruction to the client; after receiving a jump instruction initiated by a server, a client performs login verification on a target object according to login information (namely first identification information) input by the target object to generate a verification result, and exits from the current operation when the verification fails; transmitting the verification result to the server side when the verification is successful so that the server side generates a temporary token according to the verification result; the client acquires a temporary token generated by the server according to the verification result; and acquiring authority information (namely second identification information) authorized by the target object by using the temporary token, acquiring the target resource to be accessed by the target object from the server side when the authority information (namely the second identification information) meets the set authority rule, and displaying the link of the target resource.
Example two
Fig. 2 is a flowchart of a unified login method for an intelligent application repository according to a second embodiment of the present invention, where the method is applicable to assist a user who needs to record multiple pieces of intelligent application login information to perform unified login on the intelligent application repository, and the method may be executed by a unified login system for an intelligent application repository according to the second embodiment of the present invention, where the system may be implemented by software and/or hardware.
As shown in fig. 2, a second embodiment of the present invention provides a method for unified login of an intelligent application repository, where the method includes:
s210: an access token is generated by the server 110 according to the access request of the target object, and a jump instruction is initiated to the client 120.
Wherein the access request includes a target resource address to be accessed by the target object. An access token may refer to a token that accesses a smart application stored in the server 110. The target object may refer to a user who needs to access the smart application in the server. The target resource may refer to an intelligent application that the target object wants to access in the server.
Specifically, when the target object accesses the target resource, the server may generate an access token according to an address of the target resource to be accessed by the target object, so that the access token may implement final access to the target resource, and trigger the jump address of the client 120 to provide an effective basis for subsequent login verification of the target object.
In an optional embodiment, the initiating the jump instruction to the client 120 includes: the server 110 triggers the client 120 to jump to the address, generates a jump instruction including the client 120 jump address, and issues the jump instruction to the client 120. Wherein the client 120 jump address may refer to an address to jump to the client 120.
S220: the client 120 receives a jump instruction initiated by the server 110, performs login verification on the target object according to the first identification information input by the target object, generates a verification result, and transmits the verification result to the server 110.
The first identification information may refer to information for verifying a login identity of the target object, and may be, for example, a user name input by the target user, or a password input by the target user. The login verification may refer to verifying correctness of the first identification information input by the target user. The verification result may refer to a result obtained after verifying the correctness of the first identification information input by the target user, and may be, for example, a successful verification or a failed verification.
In an optional embodiment, performing login verification on the target object according to the first identification information input by the target object, and generating a verification result, includes: acquiring first identification information input by a target object; matching the first identification information with a pre-stored object information table; when the first identification information exists in the object information table, the verification result is successful; and when the first identification information does not exist in the object information table, the verification result is verification failure. The object information table may refer to a data table containing first identification information of each pre-authorized target object. Specifically, the first identification information of the target object may be compared with each piece of information stored in the object information table, and if the target object exists in the object information table and the first identification information of the target object is accurate, it indicates that the target object passes login verification; otherwise, the login authentication is not passed.
S230: and generating a temporary token according to the verification result through the server 110.
The temporary token may refer to a token for requesting the target object to obtain information, and may be generated when the verification result is verification success.
In an optional embodiment, generating the temporary token according to the verification result includes: and when the verification result is that the verification is successful, generating a temporary token containing the security identifier.
S240: acquiring a temporary token generated by the server 110 according to the verification result through the client 120; and acquiring second identification information authorized by the target object by using the temporary token, and acquiring the target resource to be accessed by the target object from the server 110 and displaying the link of the target resource when the second identification information meets the set permission rule.
The second identification information may refer to information for verifying the access right of the target object, and may be, for example, a login avatar of the target object, or a code of the target object. The set permission rule may refer to a preset access permission of the target object, and may specify, for example, a name of the smart application or an address of the smart application, which may be accessed by the target object. The link display may refer to that after the target resource to be accessed by the target object is acquired from the server 110, the address of the target resource may be linked, and a home page of the target resource is displayed, so that the target object operates the target resource.
Specifically, after the login verification of the target object is performed, it is further required to determine whether the access right authorized by the second identification information of the target user includes the target resource to be accessed by the target user, and when the access right authorized by the second identification information of the target user includes the target resource to be accessed by the target user, obtain the target resource to be accessed by the target object from the server 110, and perform link display on the target resource. So as to verify the authority of the target object and ensure the security of each intelligent application in the server 110.
In an optional embodiment, the obtaining of the second identification information authorized by the target object by using the temporary token includes: initiating a second identification information acquisition request to the target object by using the temporary token; and after receiving a confirmation instruction of the target object to the second identification information acquisition request, acquiring the second identification information authorized by the target object. The second identification information obtaining request may refer to a request for obtaining second identification information of the target object, and may include, for example, a type of the second identification information, and may also include an authorized identifier or an unauthorized identifier. Specifically, after the target object passes the login authentication, a request for acquiring the second identification information is initiated to the target object through the temporary token generated by the server 110 according to the authentication result, and when the target object agrees to acquire the second identification information, the second identification information authorized by the target object is acquired, so that the information security of the target object is ensured.
In another optional embodiment, the second identification information satisfies the set permission rule, and includes: and matching the second identification information with a pre-stored authority information table, and if the authority information corresponding to the target resource in the authority information table contains the second identification information, judging that the second identification information meets the set authority rule. The permission information table may refer to a data table containing originally set access permissions of each target object, and may contain target resource addresses that can be accessed by each target object. Specifically, the second identification information may be compared with authority information matched with the target object and stored in an authority information table, and when the second identification information corresponding to the target object exists in the authority information table and a preset intelligent application address corresponding to the second identification information in the authority information table includes a target resource address accessed by the target object, it is determined that the second identification information satisfies the set authority rule.
It should be noted that, when the target resource is displayed in a linked manner, the smart application that meets all the permissions of the target object in the set permission rule may also be displayed in a linked manner on the home page of the client 120, so that when the target object accesses the smart application other than the target resource, login authentication needs to be performed again and login efficiency is reduced due to permission authentication.
According to the technical scheme of the embodiment of the invention, the server is used for generating the access token according to the access request of the target object and initiating the jump instruction to the client; the access request comprises a target resource address to be accessed by the target object; the client is used for receiving a jump instruction initiated by the server, performing login verification on a target object according to first identification information input by the target object, generating a verification result and transmitting the verification result to the server; the server is also used for generating a temporary token according to the verification result; the client is also used for acquiring a temporary token generated by the server according to the verification result; and acquiring second identification information authorized by the target object by using the temporary token, acquiring the target resource to be accessed by the target object from the server side when the second identification information meets the set permission rule, and displaying the link of the target resource. According to the technical scheme, through mutual interaction between the server and the client, the target resource to be accessed by the target object can be obtained through the client under the condition that the target object meets login verification and authority verification, so that a unified login method for multiple intelligent applications is provided, and login efficiency is improved.
On the basis of the above embodiment, the embodiment of the present invention further includes generating a set permission rule by the management terminal according to the access permission of the target object to each resource in the service terminal, thereby implementing different permission plans for different target objects according to actual application requirements.
In addition, the embodiment of the present invention may also perform unified management on each intelligent application stored in the server 110 through the management terminal, which may exemplarily include operations such as adding, deleting, updating, querying, and the like on the intelligent application. Specifically, if the operation is added to the intelligent application, the corresponding intelligent application address and the interface information corresponding to the login verification interface of the client 120 may be matched according to the intelligent application name to be added in the intelligent application adding instruction, and the intelligent application address and the interface information corresponding to the login verification interface of the client 120 may be checked and tested. Taking this as an example, operations such as deletion, update, query, and the like of the intelligent application are completed.
It should be noted that, when there is a deletion operation for an intelligent application, it is necessary to present each target object within a preset time range, for example, a mail presentation may be presented, an interface presentation may also be presented, and thus effective preparation time is provided for each target user. If there is an update operation on a target resource in the intelligent application, when the target object accesses the target resource, the client 120 may initiate a prompt message "under update" to display the target object, and delete the prompt message after the update is completed.
It should be understood that various forms of the flows shown above, reordering, adding or deleting steps, may be used. For example, the steps described in the present invention may be executed in parallel, sequentially, or in different orders, and are not limited herein as long as the desired results of the technical solution of the present invention can be achieved.
The above-described embodiments should not be construed as limiting the scope of the invention. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A unified logging system for an intelligent application repository, the system comprising: a server and a client;
the server is used for generating an access token according to the access request of the target object and initiating a jump instruction to the client; the access request comprises a target resource address to be accessed by the target object;
the client is used for receiving a jump instruction initiated by the server, performing login verification on the target object according to the first identification information input by the target object, generating a verification result and transmitting the verification result to the server;
the server is also used for generating a temporary token according to the verification result;
the client is also used for acquiring a temporary token generated by the server according to the verification result; and acquiring second identification information authorized by the target object by using the temporary token, acquiring the target resource to be accessed by the target object from the server side when the second identification information meets the set permission rule, and displaying the link of the target resource.
2. The system of claim 1, further comprising: and the management terminal is used for generating a set authority rule according to the access authority of the target object to each resource in the server terminal.
3. The system of claim 1, wherein generating an access token based on the access request of the target object comprises:
when a target object initiates a trigger instruction to a target resource, generating an access request according to a target resource address to be accessed by the target object;
and when the server judges that the target resource address exists, generating an access token.
4. The system of claim 1, wherein the management end is further configured to monitor access information of each target resource, stop an access function of the target resource when the access information exceeds a set threshold, and send alarm information.
5. A unified login method for an intelligent application warehouse, the method comprising:
generating an access token according to the access request of the target object through the server side, and initiating a jump instruction to the client side; the access request comprises a target resource address to be accessed by the target object;
receiving a jump instruction initiated by a server through a client, performing login verification on a target object according to first identification information input by the target object, generating a verification result, and transmitting the verification result to the server;
generating a temporary token according to the verification result through the server;
acquiring a temporary token generated by the server according to the verification result through the client; and acquiring second identification information authorized by the target object by using the temporary token, acquiring the target resource to be accessed by the target object from the server side when the second identification information meets the set permission rule, and displaying the link of the target resource.
6. The method of claim 5, wherein the initiating a jump instruction to the client comprises:
and triggering the client jump address through the server, generating a jump instruction comprising the client jump address and issuing the jump instruction to the client.
7. The method according to claim 5, wherein the performing login verification on the target object according to the first identification information input by the target object to generate a verification result comprises:
acquiring first identification information input by a target object;
matching the first identification information with a pre-stored object information table;
when the first identification information exists in the object information table, the verification result is successful;
and when the first identification information does not exist in the object information table, the verification result is verification failure.
8. The method of claim 7, wherein generating the temporary token according to the verification result comprises:
and when the verification result is that the verification is successful, generating a temporary token containing the security identifier.
9. The method of claim 5, wherein obtaining the second identification information authorized by the target object by using the temporary token comprises:
initiating a second identification information acquisition request to the target object by using the temporary token;
and after receiving a confirmation instruction of the target object to the second identification information acquisition request, acquiring the second identification information authorized by the target object.
10. The method according to claim 5, wherein the second identification information satisfies a set permission rule, and comprises:
and matching the second identification information with a pre-stored authority information table, and if the authority information corresponding to the target resource in the authority information table contains the second identification information, judging that the second identification information meets the set authority rule.
CN202210849511.5A 2022-07-19 2022-07-19 Unified login system and method for intelligent application warehouse Pending CN115242403A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210849511.5A CN115242403A (en) 2022-07-19 2022-07-19 Unified login system and method for intelligent application warehouse

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210849511.5A CN115242403A (en) 2022-07-19 2022-07-19 Unified login system and method for intelligent application warehouse

Publications (1)

Publication Number Publication Date
CN115242403A true CN115242403A (en) 2022-10-25

Family

ID=83674150

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210849511.5A Pending CN115242403A (en) 2022-07-19 2022-07-19 Unified login system and method for intelligent application warehouse

Country Status (1)

Country Link
CN (1) CN115242403A (en)

Similar Documents

Publication Publication Date Title
CN109474578B (en) Message checking method, device, computer equipment and storage medium
CN111343168B (en) Identity authentication method and device, computer equipment and readable storage medium
WO2020182005A1 (en) Method for information processing in digital asset certificate inheritance transfer, and related device
US10073904B2 (en) Event triggered service for the lightweight directory access protocol
US11386224B2 (en) Method and system for managing personal digital identifiers of a user in a plurality of data elements
CN112860778B (en) Database management method, device, equipment and medium for desktop application program
US9513997B2 (en) Test data management
CN110930561B (en) Control method and device of intelligent lock
CN112995357B (en) Domain name management method, device, medium and electronic equipment based on cloud hosting service
CN110020262A (en) Pushed information sending method, device, computer equipment and storage medium
CN112150113A (en) Method, device and system for borrowing file data and method for borrowing data
CN111666205A (en) Data auditing method, system, computer equipment and storage medium
US20150341292A1 (en) System and method of data and command request processing
CN108650123B (en) Fault information recording method, device, equipment and storage medium
CN112685077A (en) Data modification method, system, computer device and computer readable storage medium
CN112015715A (en) Industrial Internet data management service testing method and system
CN114422586B (en) Event notification method, event notification device, computer equipment and storage medium
CN115242403A (en) Unified login system and method for intelligent application warehouse
CN115905640A (en) Information management method, system and device
CN112583890B (en) Message pushing method and device based on enterprise office system and computer equipment
CN111901299A (en) Application authentication method and device, electronic equipment and storage medium
CN107704557B (en) Processing method and device for operating mutually exclusive data, computer equipment and storage medium
CN111667210A (en) Intelligent warehouse management method and device
CN111651429B (en) Big data scheduling parameter management method, device and distributed platform
CN114362960B (en) Resource account data supervision method and device, computer equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination