CN117319033A - Unified authentication method, system, and computer-readable storage medium - Google Patents

Unified authentication method, system, and computer-readable storage medium Download PDF

Info

Publication number
CN117319033A
CN117319033A CN202311267100.6A CN202311267100A CN117319033A CN 117319033 A CN117319033 A CN 117319033A CN 202311267100 A CN202311267100 A CN 202311267100A CN 117319033 A CN117319033 A CN 117319033A
Authority
CN
China
Prior art keywords
account
password
application system
authentication
sap
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311267100.6A
Other languages
Chinese (zh)
Inventor
杨昌坤
谢朝辉
舒畅
许海春
邹家辉
陈利刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongke Yungu Technology Co Ltd
Original Assignee
Zhongke Yungu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongke Yungu Technology Co Ltd filed Critical Zhongke Yungu Technology Co Ltd
Priority to CN202311267100.6A priority Critical patent/CN117319033A/en
Publication of CN117319033A publication Critical patent/CN117319033A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Abstract

The invention provides a unified authentication method and a unified authentication system, comprising the following steps: judging whether an account password corresponding to a target account in a second application system exists or not based on an account password authentication request sent by a first application system, wherein the account password authentication request comprises a first password; if the account password exists, comparing and verifying the first password with the account password; if the account password does not exist, invoking a password authentication interface of the second application system to verify the first password; and when the first password verification is passed, sending a sign-on-free label of the second application system to the first application system, so that the first application system logs in the second application system or jumps to a second application system page based on the sign-on-free label. The invention can use the account number password of the same application system to enter other different application systems without password, thereby realizing the skip-free login between the systems.

Description

Unified authentication method, system, and computer-readable storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a unified authentication method, system, and computer readable storage medium.
Background
SAP is a well-established set of business software that many companies purchase to manage production sales. But the system is relatively closed. Because the company uses the SAP account password for logging in for a long time, and the main business of the company is concentrated in the SAP, the SAP system and each business system in the company are free from climbing and jumping in order to ensure the stability of the related system business of the current SAP, and the problem which needs to be solved currently is solved urgently.
The current unified authentication method mainly comprises the following two steps: 1. all newly developed systems access the SAP authentication interfaces to meet the requirement of unified authentication, but each system needs to be independently connected with the SAP authentication interfaces; 2. all newly developed systems are accessed to a brand new authentication system, and interact with the SAP system through the authentication system. But have their own limitations both in the first way and in the second way. The first way can have a great influence on the running performance of the existing SAP, the response time delay is longer under the condition that the accessed system is increased continuously, meanwhile, because the micro services are in butt joint with the SAP system interface, the SAP system interface needs to be customized on the SAP for some special service demands, and the development cost is high. In the second way, the service system and the SAP are completely stripped, and the data between the systems is troublesome to open and support without login, such as single jump SAP service documents, etc.
Accordingly, there is a need for a unified authentication method, system, computer readable storage medium to solve the above problems.
Disclosure of Invention
The invention solves the technical problem of providing a unified authentication method, a system and a computer readable storage medium, which can realize the skip-free between different systems through the same account number and password.
The invention solves the technical problems by adopting the following technical scheme:
a unified authentication method, comprising: judging whether an account password corresponding to a target account in a second application system exists or not based on an account password authentication request sent by a first application system, wherein the account password authentication request comprises a first password; if the account password exists, comparing and verifying the first password with the account password; if the account password does not exist, invoking a password authentication interface of the second application system to verify the first password; and when the first password verification is passed, sending a sign-on-free label of the second application system to the first application system, so that the first application system logs in the second application system or jumps to a second application system page based on the sign-on-free label.
In a preferred embodiment of the present invention, the step of determining whether the account password corresponding to the target account in the second application system exists based on the account password authentication request sent by the first application system includes: and responding to an account import operation or an account newly-added operation of the second application system, and storing the account of the second application system and the corresponding account password into a database.
In a preferred embodiment of the present invention, the step of determining whether the account password corresponding to the target account in the second application system exists based on the account password authentication request sent by the first application system includes: acquiring a first account of the first application system based on the account password authentication request; matching the first account with all accounts of the second application system; if the same target account number exists, judging whether an account number password corresponding to the target account number exists.
In a preferred embodiment of the present invention, the step of comparing and verifying the first password with the account password if the account password is obtained includes: responding to account changing information of the second application system, updating the corresponding account of the second application system, wherein the account changing information comprises: account status change and account password change.
In a preferred embodiment of the present invention, the step of updating the account number of the corresponding second application system in response to the account number change information of the second application system includes: and responding to the account state change information, and changing the account state of the second application system, wherein the account state comprises locking, freezing and normal.
In a preferred embodiment of the present invention, the step of updating the account number of the corresponding second application system in response to the account number change information of the second application system further includes: responding to the account password change information of the second application system, and acquiring an updated second account password; verifying the second account password through a password authentication interface of the second application system; and when the verification is passed, replacing the original first account password of the second application system account by using the second account password.
In a preferred embodiment of the present invention, the step of calling the password authentication interface of the second application system to verify the first password if the account password is not obtained includes: and when the first password passes the verification, the first password and the target account number are stored.
In a preferred embodiment of the present invention, the step of calling the password authentication interface of the second application system to verify the first password if the account password is not obtained includes: and sending the target account number and the first password to a password authentication interface of the second application system for verification.
A SAP-based unified authentication system, comprising: the first application system is used for sending an account password authentication request to the authentication server, wherein the account password authentication request comprises a first password; the second application system is used for sending the sign-on-free label to the authentication server; the authentication server acquires an account password corresponding to the target account based on the account password authentication request, if the account password is acquired, the first password is compared with the account password, if the account password is not acquired, a password authentication interface of the second application system is called to authenticate the first password, and when the first password authentication is passed, a login-free tag of the second application system is sent to the first application system, so that the first application system logs in the second application system or jumps to a second application system page based on the login-free tag.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the unified authentication method as claimed in any one of the preceding claims.
The technical effects achieved by adopting the technical scheme are as follows: accessing the first application system and the second application system to an authentication server, and carrying out password authentication through the authentication server; when the password authentication is passed, issuing a sign-on-free label to the corresponding application system, so that the first application system can enter the second application system based on the sign-on-free label; by logging in all the systems by using the account password of one application system, the intercommunication of data and the skip-free between the systems are realized.
The foregoing description is only an overview of the present invention, and is intended to be implemented in accordance with the teachings of the present invention, as well as the preferred embodiments thereof, together with the following detailed description of the invention, given by way of illustration only, together with the accompanying drawings.
Drawings
FIG. 1 is a flow chart illustrating steps of a unified authentication method according to the present invention;
FIG. 2 is an overall flow chart of a unified authentication method according to the present invention;
FIG. 3 is a schematic diagram of an SAP account information change procedure according to the present invention;
fig. 4 is a logic diagram of login authentication according to the present invention.
Detailed Description
In order to further illustrate the technical means and efficacy of the present invention as utilized to achieve the intended purpose, embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below are only some, but not all, embodiments of the invention. All other embodiments, which can be made by one of ordinary skill in the art without undue burden on the person of ordinary skill in the art based on the embodiments of the present invention, are within the scope of the embodiments of the present invention. While the invention may be susceptible to further details of embodiment and specific details of construction and operation for achieving the desired purpose, there is shown in the drawings a form a further embodiment which may be used herein before to provide a further understanding of the invention.
The SAP ERP system is enterprise management software developed by SAP company, integrates enterprise core business, including finance, purchasing, inventory, production, sales, operation management, etc. and is developed in self-developed ABAP language and has one independent identity authentication mechanism. The current micro-service architecture becomes the mainstream, and many new systems need login authentication, so that a unified authentication system is needed, so that a user can log in all systems by using one set of account passwords, and meanwhile, the repeated construction of login authentication is reduced, and the development efficiency is improved. Unified authentication is aimed at establishing unified user management, identity allocation and identity authentication system, implementing single sign-on of all applications, implementing dynamic synchronization of user identity and authority, enhancing information security early warning and audit and raising availability, security and convenience of user.
Referring to fig. 1, fig. 1 is a flowchart illustrating steps of a unified authentication method according to the present invention.
As shown in fig. 1, the unified authentication method provided in this embodiment is applied to an authentication server, and includes the following steps:
s11: based on an account password authentication request sent by a first application system, detecting an account password corresponding to a target account in a second application system in a database, wherein the account password authentication request comprises a first password.
In an embodiment, the account password used by the first application system and the second application system are the same. The first application system is a business system of a company except an SAP system, and the second application system is the SAP system. The SAP system and other business systems of the company are accessed to the same authentication server, the authentication server can set a unified account number and password for all the accessed other business systems, and the SAP system and the business systems can perform account number and password authentication through the authentication server in a unified way.
In an embodiment, the account password authentication request includes a first account and a first password, where the first account and the first password may be the same as a login account and a login password in the SAP system. At this time, the first account number and the first password may be account numbers and passwords of the service system itself. In another embodiment, the first account number and the first password are not the same as the login account number and the login password in the SAP system, and the first account number and the first password are account numbers of the second application system input from the first application system.
In this embodiment, the authentication server provides a signature authentication mechanism that can support no-login hopping (both parties agree on signature rules and parameters). The signature is generated in the SAP system, and the signature parameter is carried on the target address to jump to other business systems accessing the authentication server.
S12: and if the account password is obtained, comparing and verifying the first password with the account password.
In one embodiment, comparing and verifying the account passwords corresponding to the target account numbers in the SAP system cached in the first password authentication server to confirm whether the account passwords are consistent with the account passwords of the SAP system; if the login request is consistent, allowing the user to avoid logging into an SAP system or an SAP page; if not, it is not allowed to log into the SAP system or SAP page.
S13: and if the account password is not obtained, invoking a password authentication interface of the second application system to verify the first password.
In an embodiment, when the account password of the SAP system corresponding to the target account does not exist in the authentication server, or the first password is inconsistent with the account password cached by the authentication server, the authentication server invokes a password authentication interface of the SAP system to verify the first password, so as to confirm whether the first password is consistent with the account password of the target account stored in the SAP system. For example, when the account passwords used by the first application system and the second application system are the same, after the SAP system modifies the passwords, the account passwords of the first account in the service system and the target account in the SAP system may be different.
S14: and when the first password verification is passed, sending a sign-on-free label of the second application system to the first application system, so that the first application system logs in the second application system or jumps to a second application system page based on the sign-on-free label.
In one embodiment, the user account is imported into the authentication server by the SAP system, and a logon-free tag (TICKET) is also sent to the authentication server. Thus, after the first password authentication is passed, the authentication server may send the login-free label of the SAP system to the service system.
As shown in fig. 2, both the SAP and the service system access the authentication server. The authentication server is responsible for interfacing with the SAP system and providing a unified authentication interface for other service systems, namely, when the service system sends SAP account password authentication each time, the authentication server firstly checks whether the SAP password corresponding to the user account is cached or not; if the user account passes the authentication, the local password comparison verification is carried out, if the user account passes the authentication, the SAP authentication interface is called, and the SAP password of the user account is cached after the user account passes the authentication. After the password authentication is passed, the service system requesting authentication can obtain the login-free TICKET of the SAP system through the authentication server, and the user can log into the SAP page by carrying the login-free TICKET parameter on the SAP related page. Meanwhile, the authentication server provides a signature authentication mechanism, so that the SAP can avoid logging into the service system only by generating a signature and adding a signature parameter to the service system address.
By the mode, all systems in the company can be logged in by directly using a set of account passwords of the SAP system. For the SAP system and the non-SAP system, because the SAP system and the non-SAP system are connected into a unified authentication, the systems are not mutually isolated, and the data intercommunication and the skip-free between the systems can be realized.
Optionally, based on the account password authentication request sent by the first application system, the step of obtaining the account password corresponding to the target account includes: and responding to an account import operation or an account newly-added operation of the second application system, and storing the account of the second application system and the corresponding account password into a database.
In one embodiment, the synchronization of users is divided into first stock user one-time import and user added event monitoring. The SAP administrator exports the stock user EXCEL, and the authentication server is responsible for processing the EXCEL importing user, and meanwhile monitors the new event of the user to finish the dynamic addition of the user. The authentication server may generate account passwords for other service systems accessing the authentication server for the user based on the account passwords of the SAP system, so that the SAP system uses the same account passwords as other service systems.
Optionally, based on the account password authentication request sent by the first application system, the step of detecting the account password corresponding to the target account in the second application system includes: acquiring a first account of the first application system based on the account password authentication request; matching the first account with the account of the second application system; if the same account exists, judging whether an account password corresponding to the target account exists.
In an embodiment, the account passwords of the first application system and the second application system are the same, and the account password information in the account password authentication request sent by the first application system is a login account number and a password of the first application system.
In other embodiments, the account password of the first application system is different from the account password of the second application system, and the account password information included in the account password authentication request sent by the first application system is a login account number and a password of the second application system.
Optionally, if the account password is obtained, the step of comparing and verifying the first password with the account password includes: responding to account changing information of the second application system, updating the corresponding account of the second application system, wherein the account changing information comprises: account status change and account password change.
In one embodiment, when the account of the SAP system is changed (e.g., the user modifies his own account information, the administrator resets the account password, the system monitors that the account password expires and the account is locked and frozen, etc.), a message is sent to the authentication server, which listens for the message and completes the updating of the account or clears the user password cache. If the account passwords generated by the authentication server for other accessed service systems are the same, the passwords of the corresponding accounts in other service systems may be updated synchronously to be new passwords, so that the user can still log in the SAP system and other service systems through the same account passwords. If the account numbers of the other service systems are different from those of the SAP system, the account numbers of the other service systems do not need to be changed.
Optionally, the step of updating the account number of the corresponding second application system in response to the account number change information of the second application system includes: and responding to the account state change information, and changing the account state of the second application system, wherein the account state comprises locking, freezing and normal.
Optionally, in response to the account changing information of the second application system, the step of updating the corresponding account of the second application system further includes: responding to the account password change information of the second application system, and acquiring an updated second account password; verifying the new account password through a password authentication interface of the second application system; and when the verification is passed, replacing the original first account password of the second application system account by using the second account password.
As shown in fig. 3, when the authentication server monitors the user account change information of the SAP system, it is necessary to make a corresponding change to the user account cached/stored in the database. Illustratively, the user account change information is divided into the following categories: the SAP user information is updated, the SAP account is locked, frozen and thawed, and the SAP account password expires. The account change information of the SAP system is stored in the database of the SAP system, so that when the SAP user information is updated, the authentication server needs to update the information of the mobile phone number, the work number and the like of the corresponding account in the database based on the acquired update information (such as the mobile phone number, the work number and the like). When the SAP system is detected to lock, freeze and defrost the SAP account, changing the state of the corresponding account in the database into locking, freezing or normal, when the account is in the locking, freezing state, even if password verification passes through an authentication server, the password verification does not send a sign-on-free label to the service system, and only when the account state is normal and password authentication passes, the sign-on-free label is sent to the service system.
Optionally, if the account password is not obtained, the step of calling the password authentication interface of the second application system to verify the first password includes: and when the first password passes the verification, the first password and the target account number are stored.
In one embodiment, the highest frequency function in the authentication server is used for completing login and password management by the unified authentication responsible for interfacing with the SAP interface when the password checksum is reset. SAP needs to provide 3 interfaces: SAP account password checking interface, SAP sends short message identifying code interface, SAP resets password interface.
Optionally, the step of calling the password authentication interface of the second application system to verify the first password if the account password is not obtained includes: transmitting the target account number and the first password to a password authentication interface of the second application system for verification; and when the verification is passed, acquiring the login-free label sent by the second application system.
Illustratively, after the password authentication is passed, the service system may obtain the login-free time of the SAP user through the authentication server. The user can avoid jumping to the SAP system by using the TICKET parameter attached with the SAP user on the SAP page.
As shown in fig. 4, after the SAP system and the service system are accessed to the authentication server, the account passwords of the SAP system are set as the account passwords of other service systems, so that the company can log in all the systems through one account password, and when the account passwords of the SAP system are changed, the authentication server can correspondingly adjust the account passwords of other service systems so as to keep the consistency of the account passwords.
Optionally, the authentication server also provides a signature authentication mechanism, so that the SAP is prevented from jumping to other service systems by the fact that the signature rules and parameters are agreed by the two parties. The signature is generated in the SAP system, and the signature parameter is carried on the target address to jump to the system accessing the authentication server.
The unified authentication method provided by the embodiment ensures that a set of SAP account passwords can be used for logging in all systems in a company, ensures the stability of SAP related system services, powerfully supports SAP services, enables SAP systems and service systems to avoid logging in and jumping, does not cause trouble to user logging in, and is not mutually isolated any more, and can realize data intercommunication and no logging in and jumping between systems; the authentication system account is synchronized with the SAP account in real time, and account synchronization is increased, updated, locked, frozen, etc.
The present invention also provides a unified authentication system based on SAP, comprising: the first application system is used for sending an account password authentication request to the authentication server, wherein the account password authentication request comprises a first password; the second application system is used for sending the sign-on-free label to the authentication server; the authentication server acquires an account password corresponding to the target account based on the account password authentication request, if the account password is acquired, the first password is compared with the account password, if the account password is not acquired, a password authentication interface of the second application system is called to authenticate the first password, and when the first password authentication is passed, a login-free tag of the second application system is sent to the first application system, so that the first application system logs in the second application system or jumps to a second application system page based on the login-free tag.
The SAP-based unified authentication system provided in this embodiment has the following implementation effects: all systems of the company can log in by using SAP account passwords; the authentication system account and the SAP account are synchronized in real time, and account synchronization is increased, updated, locked, frozen and the like; the business system supporting the micro-service and the SAP system are free from the jump.
The present invention also provides a computer readable storage medium, wherein a computer program is stored on the readable storage medium, and the computer program realizes the steps of the unified authentication method according to any one of the above when being executed by a processor.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, or the order of their execution may not necessarily be sequential, but may be performed in rotation or alternating with at least some of the other steps or sub-steps of other steps.
From the foregoing description of the embodiments, those skilled in the art will readily appreciate that embodiments of the present invention may be implemented in hardware, or by means of software plus a necessary general purpose hardware platform. Based on such understanding, the technical solution of the embodiments of the present invention may be embodied in the form of a software product, where the software product may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.), and includes several instructions for causing a computer device (may be a personal computer, a server, or a network device, etc.) to execute the method described in the respective implementation scenario of the embodiments of the present invention.
The preferred embodiments of the present invention have been described in detail above with reference to the accompanying drawings, but the present invention is not limited to the specific details of the embodiments, the above examples and the accompanying drawings are exemplary, and the modules or processes in the drawings are not necessarily required to implement the embodiments of the present invention, and should not be construed as limiting the present invention, and various simple modifications and combinations of the technical solutions of the present invention may be made within the scope of the technical concept of the present invention, and all of the simple modifications and combinations are within the scope of the protection of the present invention.

Claims (10)

1. A unified authentication method, comprising:
judging whether an account password corresponding to a target account in a second application system exists or not based on an account password authentication request sent by a first application system, wherein the account password authentication request comprises a first password;
if the account password exists, comparing and verifying the first password with the account password;
if the account password does not exist, invoking a password authentication interface of the second application system to verify the first password;
and when the first password verification is passed, sending a sign-on-free label of the second application system to the first application system, so that the first application system logs in the second application system or jumps to a second application system page based on the sign-on-free label.
2. The unified authentication method according to claim 1, wherein the step of determining whether the account password corresponding to the target account in the second application system exists based on the account password authentication request sent by the first application system comprises:
and responding to an account import operation or an account newly-added operation of the second application system, and storing the account of the second application system and the corresponding account password into a database.
3. The unified authentication method of claim 2, wherein the step of determining whether the account password corresponding to the target account in the second application system exists based on the account password authentication request sent by the first application system comprises:
acquiring a first account of the first application system based on the account password authentication request;
matching the first account with all accounts of the second application system;
if the same target account number exists, judging whether an account number password corresponding to the target account number exists.
4. The unified authentication method according to claim 1 or 2, wherein, if the account password is obtained, the step of comparing and verifying the first password with the account password includes:
responding to account changing information of the second application system, updating the corresponding account of the second application system, wherein the account changing information comprises: account status change and account password change.
5. The unified authentication method of claim 4, wherein the step of updating the corresponding account of the second application system in response to account change information of the second application system comprises:
and responding to the account state change information, and changing the account state of the second application system, wherein the account state comprises locking, freezing and normal.
6. The unified authentication method of claim 4, wherein the step of updating the corresponding account of the second application system in response to account change information of the second application system further comprises:
responding to the account password change information of the second application system, and acquiring an updated second account password;
verifying the second account password through a password authentication interface of the second application system;
and when the verification is passed, replacing the original first account password of the second application system account by using the second account password.
7. The unified authentication method of claim 1, wherein the step of invoking the password authentication interface of the second application system to verify the first password if the account password is not obtained comprises:
and when the first password passes the verification, the first password and the target account number are stored.
8. The unified authentication method of claim 1, wherein if the account password is not obtained, the step of invoking a password authentication interface of the second application system to verify the first password comprises:
and sending the target account number and the first password to a password authentication interface of the second application system for verification.
9. A unified authentication system based on SAP, comprising:
the first application system is used for sending an account password authentication request to the authentication server, wherein the account password authentication request comprises a first password;
the second application system is used for sending a sign-on-free label to the authentication server and verifying the first password through a password authentication interface;
and the authentication server acquires an account password corresponding to the target account based on the account password authentication request, if the account password exists, the first password is compared with the account password, if the account password does not exist, a password authentication interface of the second application system is called to authenticate the first password, and when the first password authentication passes, a login-free label of the second application system is sent to the first application system, so that the first application system logs in the second application system or jumps to a second application system page based on the login-free label.
10. A computer readable storage medium, characterized in that the readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the unified authentication method according to any of claims 1 to 8.
CN202311267100.6A 2023-09-27 2023-09-27 Unified authentication method, system, and computer-readable storage medium Pending CN117319033A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311267100.6A CN117319033A (en) 2023-09-27 2023-09-27 Unified authentication method, system, and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311267100.6A CN117319033A (en) 2023-09-27 2023-09-27 Unified authentication method, system, and computer-readable storage medium

Publications (1)

Publication Number Publication Date
CN117319033A true CN117319033A (en) 2023-12-29

Family

ID=89245747

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311267100.6A Pending CN117319033A (en) 2023-09-27 2023-09-27 Unified authentication method, system, and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN117319033A (en)

Similar Documents

Publication Publication Date Title
AU2019206006B2 (en) System and method for biometric protocol standards
US10887081B2 (en) Audit trail configuration in a blockchain
CN102947797B (en) The online service using directory feature extending transversely accesses and controls
CN109286632B (en) Block chain-based big data authorization and evidence-storing method and system
CN101277180B (en) Web services intermediary
WO2019032089A1 (en) Blockchain architecture with record security
US10936294B2 (en) Blockchain-based software compliance system
US11647026B2 (en) Automatically executing responsive actions based on a verification of an account lineage chain
CN110049048B (en) Data access method, equipment and readable medium for government affair public service
CN113271311B (en) Digital identity management method and system in cross-link network
CN111368330B (en) Ethernet intelligent contract auditing system and method based on block chain
US20230362263A1 (en) Automatically Executing Responsive Actions Upon Detecting an Incomplete Account Lineage Chain
US20210099339A1 (en) Template-based onboarding of internet-connectible devices
EP2795522B1 (en) Techniques to store secret information for global data centers
US20200228345A1 (en) Self-governed secure attestation policy for server data privacy logs
CN110189440A (en) A kind of smart lock monitoring equipment and its method based on block chain
US20100030805A1 (en) Propagating information from a trust chain processing
CN111243715A (en) Login method for unifying business system to integrated platform
CN117319033A (en) Unified authentication method, system, and computer-readable storage medium
CN117118640A (en) Data processing method, device, computer equipment and readable storage medium
WO2008125391A1 (en) Managing wireless devices using access control
JP2016502203A (en) Control your online trading platform account
CA2986731A1 (en) A blockchain based smart home security solution
KR20020032892A (en) Integrated Management System And Method For User Password Of Multi UNIX Server
CN114003877A (en) Data access method, device, medium and electronic equipment of multi-tenant system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination