CN117375901B - Cross-tenant multi-terminal authentication method and system - Google Patents

Cross-tenant multi-terminal authentication method and system Download PDF

Info

Publication number
CN117375901B
CN117375901B CN202311276233.XA CN202311276233A CN117375901B CN 117375901 B CN117375901 B CN 117375901B CN 202311276233 A CN202311276233 A CN 202311276233A CN 117375901 B CN117375901 B CN 117375901B
Authority
CN
China
Prior art keywords
tenant
user
cross
service
data information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311276233.XA
Other languages
Chinese (zh)
Other versions
CN117375901A (en
Inventor
李碧浩
赵小亮
柳阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Futong Software Technology Co ltd
Original Assignee
Shanghai Futong Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Futong Software Technology Co ltd filed Critical Shanghai Futong Software Technology Co ltd
Priority to CN202311276233.XA priority Critical patent/CN117375901B/en
Publication of CN117375901A publication Critical patent/CN117375901A/en
Application granted granted Critical
Publication of CN117375901B publication Critical patent/CN117375901B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a cross-tenant multi-terminal authentication method and a system. A cross-tenant multi-terminal authentication system, comprising: the system comprises a tenant service data management center, a user subscription module, a tenant authorization module, a registration center, a user terminal authentication module, a cross-tenant data calling module and a cross-tenant service database cleaning module. The application establishes a multi-terminal authentication system based on the micro-service architecture, realizes the uniform authentication of multiple terminals, does not need to respectively authorize and authenticate the same function on different terminals, can complete the authentication on the multiple terminals only by one-time authorization, and simplifies and clearly ensures the work of service system managers.

Description

Cross-tenant multi-terminal authentication method and system
Technical Field
The application relates to the technical field of computers, in particular to a cross-tenant multi-terminal authentication method and system.
Background
In the channel distribution scene of commodities, data isolation requirements exist among upstream manufacturers (tenants), and the same downstream manufacturer corresponds to the data exchange requirements when a plurality of upstream manufacturers purchase. Each upstream manufacturer has a plurality of downstream distributors, and the distributors stand on the angle of the manufacturer and need to ensure that the business data of the system is closed and independent, but stand on the angle of the downstream distributors, each distributor has a purchasing relationship with a plurality of upstream manufacturers, and the distributors hope to uniformly manage purchasing business of a plurality of manufacturers. The contradiction between the upstream and downstream demands can only sacrifice the demands of the flow-through manufacturer, and the demands of the upstream manufacturer are met, so that the flow-through manufacturer needs to complete own purchasing business in a plurality of independent business systems (tenants), and the efficiency is low, statistics is difficult, and management is difficult.
In the conventional multi-tenant management technology, a user and an authority management system are bound with a fixed tenant, if a user wants to operate across tenants, an auxiliary account needs to be established under each tenant and the tenant is manually switched, the system re-verifies the user identity authority according to the selected tenant, and then reloads interfaces and data according to the newly selected tenant. When a user needs to summarize data of multiple tenants, conventional multi-tenant management techniques cannot call data across tenants.
Disclosure of Invention
Aiming at the problems, the application provides a cross-tenant multi-terminal authentication method and a system, which establish a multi-terminal authentication system based on a micro-service architecture, realize multi-terminal unified authentication, do not need to respectively authorize and authenticate the same function on different terminals, and can finish authentication on the multi-terminal only by one-time authorization, thereby simplifying and clearing the work of service system management personnel.
A cross-tenant multi-terminal authentication method comprises the following steps:
S1, acquiring tenant data information and tenant service data information, and establishing a tenant database to store the tenant data information and the tenant service data information;
S2, setting a tenant service authority range according to tenant data information and tenant service data information of the tenant;
S3, acquiring user data information, wherein the user data information comprises user subscription information and user identity information of a user to a tenant, and establishing a user data information database and a user authorized service database;
S4, the tenant distributes service data information authority and user terminal authority to the subscribing user, and the service data information authority and the user terminal authority distributed to the subscribing user by the tenant are stored in a user authorized service database;
S5, establishing a multi-terminal authentication system;
s6, acquiring a login request of the user terminal, and carrying out authentication processing on the user terminal based on a micro-service architecture multi-terminal authentication system.
Further, the specific method for establishing the multi-terminal authentication system in step S5 is as follows:
Creating a class Jwt GATE WAY FILTER to implement GATEWAY FILTER interface, GATEWAY FILTER interface from gateway component in micro-service architecture, in order to verify Jwt Token information in user initiated request; defining Jwt Token class by Host Authentication Token interface for identifying user identity information according to JWT data standard; a Jwt Filter class inheritance Basic Http Authentication Filter class is created for each micro-service, and a Jwt Realm class inheritance Authorizing Realm class is created.
Further, the specific authentication step in S6 is:
judging whether the login of the user terminal is successful or not, and if the login is unsuccessful, not operating; if the login is successful, issuing a token;
Acquiring a data interaction request of a user terminal, verifying the token by using Jwt GATEWAY FILTER by using a gateway, and if the verification passes the data interaction request of the user terminal;
and the service cluster uses Shiro and JWT to verify and authorize the token, releases the data interaction request of the user terminal to the limited resource, and returns the information of the limited resource to the user terminal.
Further, the method also comprises a cross-tenant service database for carrying out real-time calling on the authorized tenant service data, and the specific implementation method is as follows:
Responding to a request of cross-tenant service data calling of a user, acquiring tenant data information requested to be called by the user and assigned service data information rights according to an authorized service database of the user, matching the request of cross-tenant service data calling of the user and the assigned service data information rights one by one, judging whether the request of cross-tenant service data calling of the user is located in the assigned service data information rights, if so, calling the service data in the request of cross-tenant service data calling of the user, and adding the called service data into the cross-tenant service database; if not, rejecting the request of the user for calling the cross-tenant service data.
Further, after the user finishes the request for calling the cross-tenant service data, the user operation is monitored in real time, whether the user closes the checking window of the called cross-tenant service data is judged, and if the checking window is not closed, no operation is performed; and if the data is closed, the data in the cross-tenant service database is emptied.
Further, storing tenant data information and tenant business data information by using a Mysql database.
Furthermore, the method adopts an integrated development environment Eclipse based on Java language for development.
A cross-tenant multi-terminal authentication system is applied to the cross-tenant multi-terminal authentication method, and comprises the following steps:
The tenant service data management center is used for storing and managing tenant service data information;
The user subscription module is used for subscribing the tenant service data information by the user;
the tenant authorization module is used for assigning service data information authority and user terminal authority to the subscribing user by the tenant;
The registration center is used for registering and logging in a platform of the system by the user and the tenant and is used for storing user data information and tenant data information;
the user terminal authentication module is used for acquiring a login request of the user terminal and carrying out authentication processing on the user terminal;
the cross-tenant data calling module is used for calling authorized tenant service data in real time and storing the called service data into a cross-tenant service database;
and the cross-tenant service database cleaning module is used for cleaning the cross-tenant service database after the user uses the cross-tenant service database.
The application has the following advantages:
1. The invention breaks through the use barrier caused by the authority design of the tenant and the terminal, ensures the safety, and simultaneously ensures that the user does not need to switch and perform secondary verification in the operation of crossing the tenant, thereby being very smooth.
2. The invention simplifies the data statistics work of the cross-tenant system, does not need to build an independent data report system, and can directly use the existing data statistics function in the service system to directly carry out the data statistics of the cross-tenant system.
3. The invention establishes a multi-terminal authentication system based on the micro-service architecture, realizes the uniform authentication of multiple terminals, does not need to respectively authorize and authenticate the same function on different terminals, can complete the authentication on the multiple terminals only by one-time authorization, and simplifies and clearly ensures the work of service system managers.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to the structures shown in these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic structural diagram of a cross-tenant multi-terminal authentication system provided in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, some embodiments of the present application will be described in further detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application. However, those of ordinary skill in the art will understand that in various embodiments of the present application, numerous technical details have been set forth in order to provide a better understanding of the present application. The claimed application may be practiced without these specific details and with various changes and modifications based on the following embodiments.
Example 1
A cross-tenant multi-terminal authentication method specifically comprises the following steps:
S1, acquiring tenant data information and tenant service data information, and establishing a tenant database to store the tenant data information and the tenant service data information;
s2, setting a tenant service authority range according to tenant data information of the tenant and service data information corresponding to the tenant;
S3, acquiring user data information, wherein the user data information comprises user subscription information and user identity information of a user to a tenant, and establishing a user data information database and a user authorized service database;
S4, the tenant distributes service data information authority and user terminal authority to the subscribing user, and the service data information authority and the user terminal authority distributed to the subscribing user by the tenant are stored in a user authorized service database;
S5, establishing a multi-terminal authentication system;
s6, acquiring a login request of the user terminal, and carrying out authentication processing on the user terminal based on a micro-service architecture multi-terminal authentication system.
According to the application, the attribution relation between the user and the tenant is changed into a new equal association relation, the tenant and the user are split into two independent systems, the tenant (upstream manufacturer) can continuously keep the control on the service independence, the user (downstream fluxgate) can realize the service operation and data statistics of the cross-tenant at the same time, the use barrier caused by the authority design of the tenant and the terminal is broken through, the safety is ensured, and the user cross-tenant operation is not required to be switched and verified for the second time, so that the method is very smooth.
The specific method for establishing the multi-terminal authentication system in the step S5 is as follows:
Creating a class Jwt GATE WAY FILTER to implement GATEWAY FILTER interface, GATEWAY FILTER interface from gateway component in micro-service architecture, in order to verify Jwt Token information in user initiated request; defining Jwt Token class by Host Authentication Token interface for identifying user identity information according to JWT data standard; a Jwt Filter class inheritance Basic Http Authentication Filter class is created for each micro-service, and a Jwt Realm class inheritance Authorizing Realm class is created.
It should be explained that JWT is an open standard based on JSON, defining a set of data format standards for transferring security information between different entities, and finally, a token is sent from a client to a server to represent identity information of a user of the client, and the whole information transmission is based on an encryption algorithm, so that not only security of the token is ensured, but also the identity of the user can be identified by a server.
The specific authentication step in S6 is as follows:
judging whether the login of the user terminal is successful or not, and if the login is unsuccessful, not operating; if the login is successful, issuing a token;
Acquiring a data interaction request of a user terminal, verifying the token by using Jwt GATEWAY FILTER by using a gateway, and if the verification passes the data interaction request of the user terminal;
and the service cluster uses Shiro and JWT to verify and authorize the token, releases the data interaction request of the user terminal to the limited resource, and returns the information of the limited resource to the user terminal.
In a specific implementation, a Shiro rights management framework may be built to enable authorization and authentication.
The application establishes a multi-terminal authentication system based on the micro-service architecture, realizes the uniform authentication of multiple terminals, does not need to respectively authorize and authenticate the same function on different terminals, can complete the authentication on the multiple terminals only by one-time authorization, and simplifies and clearly ensures the work of service system managers.
The method is characterized by further comprising a cross-tenant service database for carrying out real-time calling on authorized tenant service data, and the specific implementation method is as follows:
Responding to a request of cross-tenant service data calling of a user, acquiring tenant data information requested to be called by the user and assigned service data information rights according to an authorized service database of the user, matching the request of cross-tenant service data calling of the user and the assigned service data information rights one by one, judging whether the request of cross-tenant service data calling of the user is located in the assigned service data information rights, if so, calling the service data in the request of cross-tenant service data calling of the user, and adding the called service data into the cross-tenant service database; if not, rejecting the request of the user for calling the cross-tenant service data.
The application simplifies the data statistics work of the cross-tenant system, does not need to build an independent data report system, and can directly use the existing data statistics function in the service system to directly carry out the data statistics of the cross-tenant system.
The method comprises the steps that after a user finishes a request for calling the cross-tenant service data, user operation is monitored in real time, whether the user closes a viewing window of the called cross-tenant service data is judged, and if the viewing window is not closed, no operation is performed; and if the data is closed, the data in the cross-tenant service database is emptied.
According to the method and the system for monitoring the operation of the cross-tenant service, the operation of the user is monitored in real time, and after the user uses the cross-tenant service database, the data is cleaned in time, so that the safety of the cross-tenant service data is further improved, and the possibility of data leakage is reduced to a certain extent.
It is added that the Mysql database is used for storing tenant data information and tenant service data information.
It is added that the method adopts an integrated development environment Eclipse based on Java language for development.
Program code for carrying out methods of the present invention may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
Example 2
Referring to fig. 1, a cross-tenant multi-terminal authentication system includes:
The tenant service data management center is used for storing and managing tenant service data information;
The user subscription module is used for subscribing the tenant service data information by the user;
the tenant authorization module is used for assigning service data information authority and user terminal authority to the subscribing user by the tenant;
The registration center is used for registering and logging in a platform of the system by the user and the tenant and is used for storing user data information and tenant data information;
the user terminal authentication module is used for acquiring a login request of the user terminal and carrying out authentication processing on the user terminal;
the cross-tenant data calling module is used for calling authorized tenant service data in real time and storing the called service data into a cross-tenant service database;
and the cross-tenant service database cleaning module is used for cleaning the cross-tenant service database after the user uses the cross-tenant service database.
It will be understood that modifications and variations will be apparent to those skilled in the art from the foregoing description, and it is intended that all such modifications and variations be included within the scope of the following claims. Parts of the specification not described in detail belong to the prior art known to those skilled in the art.

Claims (5)

1. The cross-tenant multi-terminal authentication method is characterized by comprising the following steps:
S1, acquiring tenant data information and tenant service data information, and establishing a tenant database to store the tenant data information and the tenant service data information;
S2, setting a tenant service authority range according to tenant data information and tenant service data information of the tenant;
S3, acquiring user data information, wherein the user data information comprises user subscription information and user identity information of a user to a tenant, and establishing a user data information database and a user authorized service database;
S4, the tenant distributes service data information authority and user terminal authority to the subscribing user, and the service data information authority and the user terminal authority distributed to the subscribing user by the tenant are stored in a user authorized service database;
S5, establishing a multi-terminal authentication system;
S6, acquiring a login request of the user terminal, and carrying out authentication processing on the user terminal based on a micro-service architecture multi-terminal authentication system;
the specific method for establishing the multi-terminal authentication system in the step S5 is as follows:
Creation class Jwt GATE WAY FILTER implements GATEWAY FILTER interface, GATEWAY FILTER interface is from gateway component in micro-service architecture; defining Jwt Token class by Host Authentication Token interface for identifying user identity information according to JWT data standard; creating Jwt Filter class inheritance Basic Http Authentication Filter classes for each micro-service, and creating Jwt Realm class inheritance Authorizing Realm classes;
the specific authentication step in S6 is as follows:
judging whether the login of the user terminal is successful or not, and if the login is unsuccessful, not operating; if the login is successful, issuing a token;
Acquiring a data interaction request of a user terminal, verifying the token by using Jwt GATEWAY FILTER by using a gateway, and if the verification passes the data interaction request of the user terminal;
The service cluster uses Shiro and JWT to verify and authorize the token, releases the data interaction request of the user terminal to the limited resource, and returns the limited resource information to the user terminal;
the method also comprises a cross-tenant service database for carrying out real-time calling on authorized tenant service data, and comprises the following specific implementation method:
Responding to a request of cross-tenant service data calling of a user, acquiring tenant data information requested to be called by the user and assigned service data information rights according to an authorized service database of the user, matching the request of cross-tenant service data calling of the user and the assigned service data information rights one by one, judging whether the request of cross-tenant service data calling of the user is located in the assigned service data information rights, if so, calling the service data in the request of cross-tenant service data calling of the user, and adding the called service data into the cross-tenant service database; if not, rejecting the request of the user for calling the cross-tenant service data.
2. The method for cross-tenant multi-terminal authentication according to claim 1, further comprising monitoring user operation in real time after a user finishes a request for cross-tenant service data retrieval, and judging whether the user closes a window for viewing the retrieved cross-tenant service data, if not, no operation is performed; and if the data is closed, the data in the cross-tenant service database is emptied.
3. The cross-tenant multi-terminal authentication method of claim 2 wherein a Mysql database is used to store tenant data information and tenant business data information.
4. The cross-tenant multi-terminal authentication method of claim 3, wherein the method is developed by adopting an integrated development environment Eclipse based on Java language.
5. A cross-tenant multi-terminal authentication system, the system being applied to the cross-tenant multi-terminal authentication method as claimed in any one of claims 1 to 4, and comprising:
The tenant service data management center is used for storing and managing tenant service data information;
The user subscription module is used for subscribing the tenant service data information by the user;
the tenant authorization module is used for assigning service data information authority and user terminal authority to the subscribing user by the tenant;
The registration center is used for registering and logging in a platform of the system by the user and the tenant and is used for storing user data information and tenant data information;
the user terminal authentication module is used for acquiring a login request of the user terminal and carrying out authentication processing on the user terminal;
the cross-tenant data calling module is used for calling authorized tenant service data in real time and storing the called service data into a cross-tenant service database;
and the cross-tenant service database cleaning module is used for cleaning the cross-tenant service database after the user uses the cross-tenant service database.
CN202311276233.XA 2023-09-30 2023-09-30 Cross-tenant multi-terminal authentication method and system Active CN117375901B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311276233.XA CN117375901B (en) 2023-09-30 2023-09-30 Cross-tenant multi-terminal authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311276233.XA CN117375901B (en) 2023-09-30 2023-09-30 Cross-tenant multi-terminal authentication method and system

Publications (2)

Publication Number Publication Date
CN117375901A CN117375901A (en) 2024-01-09
CN117375901B true CN117375901B (en) 2024-05-17

Family

ID=89399453

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311276233.XA Active CN117375901B (en) 2023-09-30 2023-09-30 Cross-tenant multi-terminal authentication method and system

Country Status (1)

Country Link
CN (1) CN117375901B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110826086A (en) * 2019-10-31 2020-02-21 深圳市泰洲科技有限公司 Cross-tenant authorization method and device, computer equipment and storage medium
CN111400676A (en) * 2020-02-28 2020-07-10 平安国际智慧城市科技股份有限公司 Service data processing method, device, equipment and medium based on sharing authority
CN111586030A (en) * 2020-04-30 2020-08-25 武汉时波网络技术有限公司 Interface authentication and permission verification method and system based on micro-service multi-tenant
CN113923020A (en) * 2021-10-09 2022-01-11 天翼物联科技有限公司 Micro-service authentication method, device and equipment of SaaS multi-tenant architecture
WO2022126968A1 (en) * 2020-12-15 2022-06-23 平安科技(深圳)有限公司 Micro-service access method, apparatus and device, and storage medium
CN114928460A (en) * 2022-02-14 2022-08-19 上海大学 Multi-tenant application integration framework system based on micro-service architecture
JP2023094179A (en) * 2021-12-23 2023-07-05 株式会社リコー Service providing system, service providing method, and program

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110826086A (en) * 2019-10-31 2020-02-21 深圳市泰洲科技有限公司 Cross-tenant authorization method and device, computer equipment and storage medium
CN111400676A (en) * 2020-02-28 2020-07-10 平安国际智慧城市科技股份有限公司 Service data processing method, device, equipment and medium based on sharing authority
CN111586030A (en) * 2020-04-30 2020-08-25 武汉时波网络技术有限公司 Interface authentication and permission verification method and system based on micro-service multi-tenant
WO2022126968A1 (en) * 2020-12-15 2022-06-23 平安科技(深圳)有限公司 Micro-service access method, apparatus and device, and storage medium
CN113923020A (en) * 2021-10-09 2022-01-11 天翼物联科技有限公司 Micro-service authentication method, device and equipment of SaaS multi-tenant architecture
JP2023094179A (en) * 2021-12-23 2023-07-05 株式会社リコー Service providing system, service providing method, and program
CN114928460A (en) * 2022-02-14 2022-08-19 上海大学 Multi-tenant application integration framework system based on micro-service architecture

Also Published As

Publication number Publication date
CN117375901A (en) 2024-01-09

Similar Documents

Publication Publication Date Title
CN113239344B (en) Access right control method and device
US9864868B2 (en) Method and apparatus for process enforced configuration management
US7877520B2 (en) Storage device and method of setting configuration information of same
CN108966216B (en) Mobile communication method and system applied to power distribution network
CN112511653B (en) Service authority activation method, configuration method and registration method of Internet of things equipment
CN112652105A (en) Parking lot offline access control method and device
KR102184928B1 (en) Total Account management System based on Token and Method
CN113111339A (en) Access control method, device, equipment and medium for application service
CN111586021B (en) Remote office business authorization method, terminal and system
CN106101054A (en) The single-point logging method of a kind of multisystem and centralized management system
CN105119886A (en) Account ownership determination method and device
KR102356474B1 (en) Systems that support smart work
CN201690475U (en) Application server access system in enterprise local area network
CN111614641A (en) Cloud account management system and application method
CN114244568A (en) Security access control method, device and equipment based on terminal access behavior
CN117375901B (en) Cross-tenant multi-terminal authentication method and system
CN101827110A (en) Application server access system in intranet
TWI617942B (en) Online trading platform account control method, device and server
CN105392112A (en) MTC device information protection method, device and system
CN111049787B (en) Information association method, device, system and computer readable storage medium
CN107819786B (en) QQ authentication-based operating system login system and method
CN112367347B (en) Encryption equipment access method, device and computer readable storage medium
CN111784328B (en) Virtual resource processing method, device, system, gateway and readable storage medium
CN113660245B (en) Terminal access right control method, device, equipment and medium
CN113673990A (en) Account state monitoring method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant