WO2017193742A1 - 多网站间的自动登录方法及装置 - Google Patents

多网站间的自动登录方法及装置 Download PDF

Info

Publication number
WO2017193742A1
WO2017193742A1 PCT/CN2017/079868 CN2017079868W WO2017193742A1 WO 2017193742 A1 WO2017193742 A1 WO 2017193742A1 CN 2017079868 W CN2017079868 W CN 2017079868W WO 2017193742 A1 WO2017193742 A1 WO 2017193742A1
Authority
WO
WIPO (PCT)
Prior art keywords
login
website
token
client
automatic
Prior art date
Application number
PCT/CN2017/079868
Other languages
English (en)
French (fr)
Inventor
龚磊
Original Assignee
阿里巴巴集团控股有限公司
龚磊
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司, 龚磊 filed Critical 阿里巴巴集团控股有限公司
Priority to SG11201809238PA priority Critical patent/SG11201809238PA/en
Priority to MYPI2018001860A priority patent/MY199771A/en
Priority to KR1020187035563A priority patent/KR102429633B1/ko
Priority to JP2018559233A priority patent/JP6921121B2/ja
Priority to EP17795360.1A priority patent/EP3457627B1/en
Publication of WO2017193742A1 publication Critical patent/WO2017193742A1/zh
Priority to PH12018502333A priority patent/PH12018502333A1/en
Priority to US16/184,679 priority patent/US10785206B2/en
Priority to US16/722,591 priority patent/US10785207B2/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present application relates to the field of communications, and in particular, to an automatic login method and apparatus between multiple websites.
  • the user can usually directly access the target page on the second website by using the local client of the first website; for example, it can be added in the local client of the first website.
  • the access link of the target page on the second website the user can click to access the corresponding link to access the corresponding target page.
  • the second website usually requires the user to log in to the second website by using the login account and password on the second website, in order to obtain the The access to the target page jumps to the target page, so the operation is very inconvenient.
  • the present application proposes an automatic login method between multiple websites, the method comprising:
  • the first automatic login link including a url address of the automatic login entry of the second website and the automatic login token to enable the client to access
  • the first automatic login link to the automatic login portal of the second website Sending an access request for the target page that carries the automatic login token, and authorizing the client to use the first login after the server of the second website verifies the automatic login token
  • the second login account in which the account has a binding relationship performs an automatic login at the second website and jumps to the target page.
  • the method further includes:
  • the second automatic login link includes a url address of the local automatic login entry. And the url address of the target page on the second website where the resource requested by the client is located, so that the client accesses the second automatic login link to send the access request for the target page to the local automatic login portal.
  • the method further includes:
  • the client sends a url address of the local active login entry to the client to trigger the client to jump to the login page corresponding to the url address of the local active login entry.
  • the active login is completed using the first login account.
  • the token generation rule agreed with the second website includes a preset encryption algorithm and a key stored in the login domain configuration information of the second website;
  • the generating the automatic login token based on the token generation rule agreed with the second website includes:
  • the token generation parameter includes a combination of one or more of the following contents:
  • the first login account the login domain name of the first website, and the generation time of the automatic login token.
  • the application also proposes an automatic login method between multiple websites, which is applied to the server of the second website.
  • the method includes:
  • the client When the automatic login token is verified, the client is authorized to perform automatic login locally using the second login account, and after the login is successful, the page data of the target page is sent to the client to trigger the location. The client jumps to the target page.
  • the method further includes:
  • the page data of the target page is sent to the client to trigger the client to jump to the target page.
  • the method further includes:
  • the url address of the local active login entry is sent to the client, so as to trigger the client to jump to the login page corresponding to the url address of the local active login entry.
  • the active login is completed using the second login account.
  • the token verification rule agreed with the first website is a preset decryption algorithm and a key stored in the local login domain configuration information
  • the verifying the automatic login token based on the token verification rule agreed with the first website includes:
  • the token generation parameter includes a combination of one or more of the following contents:
  • the first login account the login domain name of the first website, and the generation time of the automatic login token.
  • the application also proposes an automatic login device between multiple websites, which is applied to a server of a first website, and the device comprises:
  • a first query module configured to query a login status of the first login account of the user on the first website when receiving an access request from the user side client for the target page on the second website;
  • a generating module configured to generate an automatic login token based on a token generation rule agreed with the second website, in the first login account being in a logged-in state;
  • a sending module configured to build and deliver a first automatic login link for the client, where the first automatic login link includes a url address of the automatic login entry of the second website and the automatic login token, And causing the client to access the first automatic login link to send an access request for the target page carrying the automatic login token to an automatic login portal of the second website, and the server at the second website is configured to After the automatic login token verification is passed, the client is authorized to perform automatic login on the second website and jump to the target page by using the second login account that has a binding relationship with the first login account.
  • the sending module is further used to:
  • the second automatic login link includes a url address of the local automatic login entry. And the url address of the target page on the second website where the resource requested by the client is located, so that the client accesses the second automatic login link to send the access request for the target page to the local automatic login portal.
  • the sending module is further used to:
  • the local initiative is sent to the client.
  • the url address of the login entry is used to trigger the client to jump to the login page corresponding to the url address of the local active login portal, and use the first login account to complete the active login.
  • the token generation rule agreed with the second website includes a preset encryption algorithm and a key stored in the login domain configuration information of the second website;
  • the generating module is specifically configured to:
  • the token generation parameter includes a combination of one or more of the following contents:
  • the first login account the login domain name of the first website, and the generation time of the automatic login token.
  • the application also proposes an automatic login device between multiple websites, which is applied to a server of a second website, and the device comprises:
  • a second query module configured to: when receiving an access request for a local target page from a user-side client of the first website, the query has a binding relationship with the first login account of the user on the first website a login status of the second login account; wherein the access request carries an automatic login token generated by the server of the first website based on the agreed token generation rule;
  • a verification module configured to perform verification on the automatic login token based on a token verification rule agreed with the first website if the second login account is in an unlogged state
  • An authorization module configured to authorize the client to perform automatic login locally using the second login account when the automatic login token is verified, and send the target page to the client after the login is successful.
  • Page data to trigger the client to jump to the target page.
  • the authorization module is further configured to include:
  • the page data of the target page is sent to the client to trigger the client to jump to the target page.
  • the verification module is further used to:
  • the url address of the local active login entry is sent to the client, so as to trigger the client to jump to the login page corresponding to the url address of the local active login entry.
  • the active login is completed using the second login account.
  • the token verification rule agreed with the first website is a preset decryption algorithm and a key stored in the local login domain configuration information
  • the verification module is specifically configured to:
  • the token generation parameter includes a combination of one or more of the following contents:
  • the first login account the login domain name of the first website, and the generation time of the automatic login token.
  • the server of the first website when the server of the first website receives the access request from the user client for the target page of the second website, if the first login account of the user on the first website is logged in, it may be based on The token generation rule agreed with the second website generates an automatic login token, and builds and delivers a url address of the automatic login entry of the second website and a login link of the automatic login token for the client; the client receives After the login link, the login link may be accessed, and an access request for the target url address carrying the automatic login token is sent to the automatic login portal of the second website, and the server of the second website receives the access request. After the second login account that has a binding relationship with the first login account is logged in, the automatic login token in the access request is performed.
  • Verifying, and after the verification is passed authorizing the client to perform automatic login locally using the second login account, and sending the page data corresponding to the target url address to the client after the login is successful, to trigger the
  • the client jumps to the target page corresponding to the target url; the application realizes that when the client using the first website accesses the target page on the second website, the user can directly jump to the target page on the second website.
  • the user does not need to manually input the second login account and password on the second website to perform manual login, thereby reducing the operation complexity and greatly optimizing the user experience.
  • FIG. 1 is a flowchart of a method for automatically logging in between multiple websites according to an embodiment of the present application
  • FIG. 2 is a structural diagram of a core component provided by an embodiment of the present application.
  • FIG. 3 is a logic block diagram of an automatic login device between multiple websites according to an embodiment of the present application.
  • FIG. 4 is a hardware structural diagram of a server hosting a first website of the automatic login device between the multiple websites according to an embodiment of the present application;
  • FIG. 5 is a logic block diagram of another multi-site automatic login device according to an embodiment of the present application.
  • FIG. 6 is a hardware structural diagram of a server hosting a second website of the automatic login device between the other multi-sites according to an embodiment of the present application.
  • the present application proposes an automatic login method between multiple websites, when the server of the first website receives the access request from the user client for the target page of the second website, if the user is queried first
  • the first login account on the website is in the logged-in state, and the automatic login token can be generated based on the token generation rule agreed with the second website, and the url address of the automatic login portal containing the second website is constructed and delivered for the client and a login link of the automatic login token; after receiving the login link, the client may access the login link, and send the automatic login entry of the second website to the target url address carrying the automatic login token.
  • the automatic login is performed in the access request.
  • the token is authenticated, and after the verification is passed, the client is authorized to use the second login account to perform automatic login locally. And transmitting page data to the target address corresponding to url after successful login to the client, the client is triggered to jump to the target corresponding to the target page url;
  • the application realizes that when the client using the first website accesses the target page on the second website, the user can directly jump to the target page on the second website without manually inputting the second page on the second website.
  • Log in to the account and password to perform manual login which can reduce the complexity of the operation and greatly optimize the user experience.
  • FIG. 1 is a method for automatically logging in between multiple websites according to an embodiment of the present application. The method performs the following steps:
  • Step 101 When the server of the first website receives the access request from the user side client for the target page on the second website, query the login status of the first login account of the user on the first website;
  • the user client described above may include a web client (such as a browser) of the first website.
  • a web client such as a browser
  • the access link may include a url address of an automatic login portal of the first website, and a query parameter that is required to be delivered to the automatic login portal of the first website when the client accesses the resource on the second website;
  • the client may be triggered to send a resource access request for the second website to the server of the first website by clicking the above-mentioned access link.
  • the client can construct a resource access request based on the query parameter in the access link and the first login account of the user on the first website, and then access the automatic login of the first website.
  • the url address of the portal which sends the completed resource access request to the automatic login entry on the server of the first website.
  • the access link for accessing the resources on the second website may be a service query link in the application scenario in which the user queries the service resource on the second website in the user side client of the first website;
  • the query parameter may include information such as a service identifier corresponding to the service resource that the user needs to query; and the resource access request constructed by the client may be a service query request.
  • the first website is Alipay and the second website is Taobao.
  • the user needs to query the Alipay client for details of the Taobao transaction completed by Alipay. It may be a business query request for the transaction, and the query parameter may be the transaction number of the Taobao transaction.
  • the above business query link may be the following link:
  • the Alipay client can add a "View Transaction Details" tag to the corresponding location of the transaction in the user interface and point the tag to the above business query link.
  • the client can read the tradeNo (ie, the transaction number) in the above service query link, and construct a service carrying the transaction number and the user's Alipay account.
  • the url address of Alipay's automatic login entry can be accessed, and the business query request is sent to the automatic login portal of the Alipay server.
  • the service query parameter in the service query request can be read, and the corresponding service is performed in the local service database. Resource query.
  • the server of the first website queries the corresponding service detail information in the local service database, indicating that the service resource corresponding to the service query request is the local service resource of the first website
  • the server of the first website can check the service query.
  • the login status of the first login account carried in the request if the first login account is in the logged in state, indicating that the user has logged in to the first website using the first login account, the server of the first website may directly access the local client
  • the terminal returns the corresponding service resource.
  • the service resource corresponding to the service query request is a non-local service resource belonging to the third-party website.
  • a mapping relationship between the service resource and a target url address of a target page on a third-party website where the service resource is located is usually pre-stored on the server of the first website;
  • Target url address which is the first website The url address of the target page on the second website that the user-side client needs to access when querying the non-local business resource on the second website.
  • the server of the first website does not query the service resource corresponding to the service query request in the local service database
  • the url of the target page of the second website corresponding to the service resource that needs to be queried may be determined based on the mapping relationship.
  • the address is then constructed and issued for the client an automatic login link (ie, a second login link) for performing an automatic login in the login domain of the first website.
  • the above login domain refers to the target system that the user wishes to log in to.
  • the server of the first website multiple login domains can be maintained.
  • the server of the first website can interact with servers of other websites (such as other websites that have a cooperative relationship with the first website), and periodically synchronize the configuration information of the respective login domains to the servers of other websites.
  • Alipay's server can interact with Taobao and Dangdang servers respectively, and synchronize the configuration information of each login domain to each other. Therefore, the Alipay server can simultaneously maintain the configuration information of the login domain to which multiple e-commerce platforms such as Taobao and Dangdang belong.
  • the server of the first website constructs and delivers the above-mentioned automatic login link for performing automatic login in the login domain of the first website, which may include the url address of the automatic login entry of the first website.
  • the client needs to send the service query parameter to the automatic login entry of the first website when accessing the target page on the second website.
  • the name of the login domain of the service request source, the url address of the target page of the second website, the login domain name of the second website, and the first login account used by the user when logging in at the first website may be included.
  • the client may construct an access request for the url address of the target page of the second website based on the service query parameter included in the automatic login link, and then Accessing the url address of the automatic login portal of the first website, and sending the completed access request for the url address of the target page of the second website to the automatic login portal of the first website; wherein the built-in access request is carried in the access request
  • the parameters will be consistent with the business query parameters contained in the above automatic login link.
  • the first website is Alipay
  • the second website is Taobao
  • the user needs to query the Alipay client for details of the Taobao transaction completed by Alipay.
  • Alipay's automatic login portal url address is “ Http://www.alipay.com/auto_login.htm”
  • the url address of the target page of Taobao that the user wants to visit is "www.taobao.com/trade/list.htm”
  • Alipay's server is built for Alipay client and
  • the automatic login link issued for performing automatic login in Alipay's login domain can be linked as follows:
  • the peer login domain name is called taobao.
  • the Alipay client may construct an access request for the target url address of the second website based on the service query parameters included in the automatic login link, and then access the Alipay.
  • the url address of the portal is automatically logged in, and the access request is sent to the server of Alipay.
  • the server of the first website receives the access request for the url address of the target page of the second website sent by the local client through the local automatic login portal, since the destination of the access request is local The login is automatically entered, so that the local client needs to log in to the login domain of the first website by using the first login account described above, and then can obtain the access right with the target url address for the second website.
  • the server of the first website may read the first login account from the access request, and then locally Query the login status of the first login account;
  • the server of the first website may use the first login account as a query index, and query whether the login result of the login corresponding to the first login account is stored locally, if the first login is not stored locally. If the authentication result of the successful login is successful, the first login account may be confirmed as being not logged in. If the login result of the login corresponding to the first login account is found, the first login account may be confirmed as not. Login status.
  • Step 102 If the first login account is in the logged in state, the server of the first website generates an automatic login token for performing automatic login for the second website based on the token generation rule agreed with the second website.
  • the server of the first website may be based on The token generation rule agreed with the second website generates an automatic login token (Token).
  • Token an automatic login token
  • the automatic login token is used to share the successful authentication result between the login domains of different websites; the server of the first website may pass the generated automatic login token to the server of the second website, and the first The login account is successfully shared with the login result in the login domain of the first website to the second website.
  • the token generation rule agreed by the first website and the second website may be used as the login domain configuration information, and the login domain configuration of the second website maintained locally by the server of the first website is pre-stored. Information.
  • the login domain configuration information includes the url of the active login entry of the login domain and the url of the automatic login entry, and the token generation rule may specifically include an agreed encryption algorithm and a key. Therefore, if the token generation rule agreed between the websites is also stored in the login domain configuration information, the login domain configuration information includes information other than the url of the active login entry of the login domain and the url of the automatic login portal. It can also contain information such as the encryption algorithm agreed between the websites and the way the keys or keys are obtained.
  • the encryption algorithm used to generate the automatic login token that is agreed by the first website and the second website is not specifically limited in this example; for example, the foregoing encryption algorithm may include a DSA algorithm, RSA. Algorithm, MD5 algorithm or other type of symmetric encryption algorithm.
  • the server of the first website may read the encryption algorithm and the key from the login domain configuration information of the second website when generating the automatic login token based on the token generation rule agreed with the second website, and based on the read
  • the encryption algorithm and the key are calculated for the token generation parameters agreed with the second website to generate a random string, and then the generated random string is made Store for automatic login tokens.
  • the token generation parameter may include a combination of one or more of the first login account, the login domain name of the first website, the generation time of the automatic login token, and the like. That is, in this example, when the automatic login token is generated, the token generation parameter may be information that is completely unrelated to the second login account of the user on the second website.
  • the token generation parameter may include other types of information in addition to the first login account, the login domain name of the first website, and the generation time of the automatic login token. This example is not listed one by one.
  • the server of the first website queries that the first login account is not logged in, indicating that the user has not used the first login account to perform login in the system of the first website, in this case, the first website
  • the server can send the url address of the local active login entry to the local client.
  • the client When the client receives the url address of the active login entry, the client can access the url address, and then jump to the login page corresponding to the url address, and then the user manually inputs the first login account in the login page. And the corresponding login password to perform active login.
  • Step 103 The server of the first website constructs and delivers a first automatic login link for the client, where the first automatic login link includes a url address of the automatic login entry of the second website and the automatic login token. .
  • Step 104 After receiving the first login link, the user-side client of the first website accesses the first login link, and sends an access request for the target page to the automatic login portal of the second website; the access request carries The automatic login token;
  • the server of the first website determines that the first login account is in the logged in state and generates the above automatic login token
  • the user side client may be built and down. Sending an automatic login link (ie, a first login link) for performing an automatic login in a login domain of the second website to redirect the local client's access request for the target page of the second website to the second website Automatic login entry.
  • an automatic login link ie, a first login link
  • the automatic login link for performing automatic login in the login domain of the second website which is built and delivered by the server of the first website for the user side client, may include the url address of the automatic login portal of the second website, and the above automatic generation is generated.
  • the client may need to include the login of the service request source in the service query parameter that needs to be transferred to the automatic login portal of the second website when accessing the target page of the second website.
  • the client may construct an access request for the target url address of the second website based on the service query parameter included in the automatic login link, and then access the first
  • the url address of the automatic login portal of the second website redirects the completed access request for the url address of the target page of the second website to the automatic login entry of the second website.
  • the parameter carried in the access request that is completed is consistent with the service query parameter included in the automatic login link.
  • the first website is Alipay
  • the second website is Taobao
  • the user needs to query the Alipay client for details of the Taobao transaction completed by Alipay.
  • Taobao's automatic login portal url address is “ Http://www.taobao.com/auto_login.htm”
  • the url address of the target page of Taobao that the user wants to visit is "www.taobao.com/trade/list.htm”
  • the server of Alipay is supported.
  • the automatic login link that is built and delivered by the Paypal client to perform automatic login in the login domain of Taobao can be as follows:
  • the peer login domain name is called alipay;
  • the Alipay client After receiving the above automatic login link sent by the Alipay server, the Alipay client can construct an access request for the url address of the target page on the Taobao based on the service query parameters included in the automatic login link, and then the Alipay client.
  • the terminal can access the url address of Taobao's automatic login portal and send the access request to the Taobao server.
  • Step 105 When the server of the second website receives the access request for the local target page from the user side client of the first website, the query is bound to the first login account of the user on the first website.
  • the user may log in to the first login account of the first website, and the user may log in to the second login account of the second website to perform account binding.
  • the binding relationship may be separately stored in the first website and On the server of the second website;
  • the first website is Alipay
  • the second website is Taobao.
  • the first login account is the Alipay account of the Alipay system test_123@alipay.com
  • the second login account is the Taobao account of the user logging into the Taobao system as test_123. @taobao.com
  • the Alipay and Taobao servers can save the binding relationship between the account test_123@alipay.com and test_123@taobao.com.
  • the server of the second website When the server of the second website receives the access request for the url address of the local target page sent by the local client of the first website, the first login account in the access request may be read, based on the established binding Determining a relationship, querying a second login account bound to the first login account. When the second login account bound to the first login account is queried, the server of the second website may locally query the login status of the second login account.
  • Step 106 If the second login account is in an unlogged state, the server of the second website authenticates the automatic login token based on a token verification rule agreed with the first website;
  • the automatic login token carried in the access request may be read, and based on the token verification rule agreed with the first website. Verify the automatic login token.
  • the token verification rule agreed by the second website and the first website corresponds to the token generation rule used when the first website generates the automatic login token.
  • the token verification rule may still be used as the login domain configuration information, and is pre-stored in the login domain configuration information of the second website.
  • the token verification rule may include an agreed encryption algorithm and a key, where the token is used as a token.
  • the encryption algorithm and key of the verification rule need to be consistent with the encryption algorithm and key used by the server of the first website to generate the automatic login token.
  • the encryption algorithm and the key may be read from the local login domain configuration information, and based on the read encryption calculation.
  • the method and the key perform reverse decryption calculation on the automatic login token to obtain a plurality of parameters, and then the server of the second website can verify the parameters obtained by the decryption calculation, and the first website agrees to generate the automatic login token. Whether the token generation parameters are consistent;
  • the token generation parameter used is information such as the first login account, the login domain name of the first website, and the generation time of the automatic login token (token).
  • the generating parameter may be carried in the access request sent by the client, and the server of the second website may perform reverse decryption on the automatic login token based on the same algorithm and key when verifying the automatic login token. a plurality of parameters, and then the server of the second website may compare the parameters obtained by the reverse decryption with the token generation parameters used by the server of the first website to generate the automatic login token, when the first When the login account, the login domain name of the first website, and the generation time of the automatic login token all match, it is determined that the automatic login token is verified. On the other hand, if any of the above parameters does not match, it can be determined that the automatic login token verification fails.
  • Step 107 When the automatic login token is verified, the server of the second website authorizes the client to perform automatic login locally using the second login account, and sends the notification to the client after the login is successful.
  • the page data of the target page triggers the client to jump to the target page.
  • the server of the second website can directly recognize the first login account in the login domain of the first website in the local login domain. Successful login authentication results. That is, the server of the second website can verify whether the login result of the user on the first website can be directly shared in the login domain of the second website by verifying the automatic login token.
  • the server of the second website may perform a login authorization for the second login account in the login domain of the second website, and authorize the client to use the second login that has a binding relationship with the first login account.
  • the account is automatically registered in the login domain of the second website. record.
  • the server of the second website does not need to perform any form of login verification for the second login account described above.
  • the client After the automatic login succeeds, the client has obtained access rights to the target url address on the second website, and the server of the second website may send the page data corresponding to the target url address to the client to trigger The client jumps to the corresponding target page
  • the server of the second website can send the url address of the local active login entry to the local client.
  • the client can access the url address, and then jump to the login page corresponding to the url address, and then the user manually enters the second login account in the login page. And the corresponding login password to perform active login.
  • Step 108 After receiving the page data of the target page, the user-side client of the first website jumps to the target page.
  • the received page data may be loaded in the browser, and then jumped. To the target page corresponding to the above target url address.
  • the user completes the access to the target page on the second website through the user side client of the first website.
  • the user side client of the first website accesses the target page of the second website, it only needs to verify whether the user successfully logs in to the first website using the first login account; if the user has logged in using the first login account
  • the first website can share the authentication result of the user's successful login on the first website to the second website by generating an automatic login token, and after the second website verifies the automatic login token, the first login account is used.
  • the second login account that is bound can perform automatic login, and the entire login process does not need to perform any form of verification on the second login account.
  • the cross-site When accessing the target page on the second website, if the first login account of the user on the first website has completed the login in the login domain of the first website, the server of the first website may be based on the order agreed with the server of the second website.
  • the card generation rule generates an automatic login token, and by transmitting the automatic login token to the server of the second website, the authentication result of the login of the first login account in the login domain of the first website is successfully shared to the second website. .
  • the server of the second website can verify the automatic login token. If the verification is successful, the client can be directly authorized to log in to the login domain of the second website by using the second login account that has a binding relationship with the first login account. The user can directly jump to the above target page by using the above client, without repeatedly inputting the second login account and the login password repeatedly to log in to the second website in the login interface, because the entire login process is There is no need to perform any form of verification for the second login account, so the operation complexity can be reduced and the user experience can be greatly optimized.
  • a browser hereinafter referred to as a browser
  • an Alipay server an Alipay server
  • a Taobao server that carry the Alipay client
  • Alipay can act as a third-party payment company to provide online payment solutions for Taobao.
  • users can usually view all the transaction information related to the payment, and the transaction information in Alipay usually only contains the transaction.
  • the summary information may only include the name of the transaction, etc., so if the user needs to view the details of the transaction, it is necessary to jump to the Taobao website for inquiry.
  • the Taobao system when the user jumps to the Taobao website through the browser to query the detailed information of the transaction, the Taobao system usually requires the user to input the login account and password registered by the user in Taobao to perform the login, and after the login is successful. Only have permission to view transaction details, so the operation is very inconvenient.
  • the browser in order to realize the user to view the details of the Taobao transaction in Alipay's consumption record, the browser automatically jumps to the function of viewing the target page of the transaction details information, and the same core can be integrated in the website structure of Alipay and Taobao. Component.
  • FIG. 2 is a structural diagram of a core component shown in this example.
  • the automatic login process controller In the core component architecture shown in FIG. 2, the automatic login process controller, the Token (automatic login token) generation component, the Token verification component, the login component, and the login domain configuration information are included.
  • the above-mentioned automatic login service controller (Auto Login Service, hereinafter referred to as ALS) is the total entry of the automatic login, and is used for all processes of controlling the automatic login once.
  • the user can access the url address of the automatic login portal through the browser. Access the automatic login process controller to pass parameters to the automatic login process controller for automatic login.
  • the Token Generate Service (hereinafter referred to as the TGS component) runs on the side of the logged-in system to generate a Token based on the Token generation rule agreed with the peer login system.
  • the main parameters of the generated token may include the logged in. Account number, the name of the remote login domain, and the time the token was generated.
  • Token generation rules are mutually agreed by websites and may include symmetric encryption algorithms and keys such as DSA, RSA, or MD5.
  • the Token Validate Service (hereinafter referred to as TVS component) runs on the side of the system to be logged in, and is used to verify the Token passed by the login system based on the agreed Token verification rule, wherein the verification method and the Token generation component generate a Token. Time The generation rules correspond.
  • the above login component (Login Service, hereinafter referred to as LS component) is used to check whether the account that needs to be logged in has already completed login in the system, and perform an automatic login for the account that needs to be logged in.
  • the configuration information of the login domain is responsible for managing the configuration information of each login domain, including the url address of each login domain actively logging in, the url address of the automatic login portal, the encryption algorithm, and the key or key acquisition manner.
  • Alipay's consumption record including a summary information of Taobao's transaction, in the preset position of the summary information, a "View transaction details" tag is added in advance, and the tag points to the url address of the Alipay automatic login portal http ://www.alipay.com/auto_login.htm.
  • the browser sends a request for the transaction details to the Alipay server.
  • the Alipay server receives the query request, based on the mapping relationship, after finding the url address of the Taobao transaction interface is www.taobao.com/trade/list.htm, the first automatic login link can be sent to the browser:
  • the browser After receiving the first automatic login link, the browser constructs an access request for the url address of the transaction interface of Taobao, and accesses the url address of the automatic login portal of Alipay, and sends the access request to the automatic login portal of the Alipay server.
  • the information carried in the access request includes: the access request is derived from the url address of Alipay, the transaction page of Taobao, the login domain name of Taobao, and the Alipay account test_123@alipay.com that the user needs to log in.
  • the ALS component on the Alipay server processes the access request, first discovering that the access request originates from the local login domain, and triggers the token generation.
  • the ALS component invokes the LS component to query the login status of the login account test_123@alipay.com. If test_123@alipay.com is logged in, continue to call the TGS component to generate a token.
  • the ALS component reads the configuration information of the login domain of Taobao, constructs and issues a second automatic login link for the Alipay client, and redirects the access request of the Alipay client to the url of the Taobao transaction page to Taobao. Automatic login entry;
  • the browser After receiving the second automatic login link, the browser reconstructs the access request for the url address of the Taobao transaction interface, and accesses the url address of Taobao's automatic login portal, and redirects the reconstructed access request to Taobao's automatic Log entry.
  • the information carried in the access request at this time includes: the access request originates from the url address of the transaction page of Alipay, Taobao, the login domain name of Alipay (the change of the login domain after the redirect), and the Alipay account that the user needs to log in. Test_123@alipay.com, generated Token and Token generation time.
  • the ALS component on the Taobao server processes the access request, first discovering that the access request originates from the login domain of Alipay, and the Token authentication is triggered.
  • the ALS component invokes the LS component to query the login account test_123 that has a binding relationship with test_123@alipay.com. @taobao.com login status, if you log in to account test_123@taobao.com In the logged in state, the TVS component is continuously called to verify the Token.
  • the Taobao system After the Token verification is passed, it indicates that the Taobao system approves the user to successfully log in to the Alipay login domain using test_123@alipay.com.
  • the ALS component can invoke the LS component to authorize the login account test_123@taobao.com. auto login.
  • Taobao's server can send the page data of the transaction page corresponding to www.taobao.com/trade/list.htm to the browser where the Alipay client is located. .
  • the browser can load the page data, and then automatically jump to the Taobao transaction page to display the details of the Taobao transaction to the user.
  • the present application also provides an embodiment of the device.
  • the present application proposes an automatic login device 30 between multiple websites, which is applied to a server of a first website; wherein, referring to FIG. 4, it is involved as a server that carries the automatic login device 30 between the multiple websites.
  • the hardware architecture generally includes a CPU, a memory, a non-volatile memory, a network interface, an internal bus, and the like.
  • the automatic login device 30 between multiple websites can be generally understood as a computer loaded in a memory.
  • the first query module 301 is configured to query a login status of the first login account of the user on the first website when receiving an access request from the user side client for the target page on the second website;
  • a generating module 302 configured to: when the first login account is in a logged-in state, based on The token generation rule agreed by the second website generates an automatic login token;
  • a sending module 303 configured to build and deliver a first automatic login link for the client, where the first automatic login link includes a url address of the automatic login entry of the second website, and the automatic login token, Sending, by the client accessing the first automatic login link, an access request for the target page carrying the automatic login token to an automatic login portal of the second website, and targeting the server at the second website
  • the client is authorized to perform automatic login on the second website and jump to the target page by using the second login account that has a binding relationship with the first login account.
  • the sending module 303 is further configured to:
  • the second automatic login link includes a url address of the local automatic login entry. And the url address of the target page on the second website where the resource requested by the client is located, so that the client accesses the second automatic login link to send the access request for the target page to the local automatic login portal.
  • the sending module 303 is further configured to:
  • the client sends a url address of the local active login entry to the client to trigger the client to jump to the login page corresponding to the url address of the local active login entry.
  • the active login is completed using the first login account.
  • the token generation rule agreed with the second website includes a preset encryption algorithm and a key stored in the login domain configuration information of the second website;
  • the generating module 302 is specifically configured to:
  • the token generation parameter includes a combination of one or more of the following contents:
  • the first login account the login domain name of the second website, and the generation time of the automatic login token.
  • the present application proposes another multi-site automatic login device 50, which is applied to a server of a second website; wherein, referring to FIG. 6, as a server that carries the automatic login device 50 between the multiple websites.
  • the hardware architecture involved usually includes a CPU, a memory, a non-volatile memory, a network interface, and an internal bus.
  • the automatic login device 50 between the multiple websites can be generally understood to be loaded in the memory.
  • the second query module 501 is configured to: when receiving an access request for the local target page from the user side client of the first website, the query is bound to the first login account of the user on the first website. a login status of the second login account of the relationship; wherein the access request carries an automatic login token generated by the server of the first website based on the agreed token generation rule;
  • the verification module 502 is configured to perform verification on the automatic login token based on a token verification rule agreed with the first website if the second login account is in an unlogged state;
  • the authorization module 503 is configured to authorize the client to perform automatic login locally using the second login account when the automatic login token is verified, and send the target page to the client after the login is successful. Page data to trigger the client to jump to the target page.
  • the authorization module 503 is further configured to include:
  • the page data of the target page is sent to the client to trigger the client to jump to the target page.
  • the verification module 502 is further configured to:
  • the url address of the local active login entry is sent to the client, so as to trigger the client to jump to the local active login portal.
  • the login page corresponding to the url address completes the active login by using the second login account.
  • the token verification rule agreed with the first website is a preset decryption algorithm and a key stored in the local login domain configuration information
  • the verification module 502 is specifically configured to:
  • the token generation parameter includes a combination of one or more of the following contents:
  • the first login account the local login domain name, and the generation time of the automatic login token.

Abstract

本申请提供一种多网站间的自动登录方法及装置,包括:第一网站的服务器接收到来自客户端的针对第二网站上的目标页面的访问请求时,查询用户在第一网站上的第一登录账户的登录状态;如果第一登录账户为已登录状态,基于与第二网站约定的令牌生成规则生成自动登录令牌;为客户端构建并下发包含第二网站的自动登录入口url地址以及自动登录令牌的自动登录链接,客户端访问自动登录链接向第二网站的自动登录入口发送携带自动登陆令牌的针对目标页面的访问请求,第二网站的服务器验证自动登录令牌通过后,授权客户端使用与第一登录账户存在绑定关系的第二登录账户在第二网站执行自动登录并跳转至目标页面。本申请可以优化用户体验。

Description

多网站间的自动登录方法及装置 技术领域
本申请涉及通信领域,尤其涉及一种多网站间的自动登录方法及装置。
背景技术
在相关技术中,对于存在合作关系的不同网站之间,用户通常可以使用第一网站的本地客户端来直接访问第二网站上的目标页面;例如,可以在第一网站的本地客户端中添加第二网站上的目标页面的访问链接,用户可以通过点击该访问链接跳转至对应的目标页面进行访问。
然后,用户在使用第一网站的本地客户端访问第二网站上的目标页面时,第二网站通常会要求用户使用在第二网站上的登录账户和密码登录第二网站后,才能能获得该目标页面的访问权限跳转至该目标页面,因此操作非常不方便。
发明内容
本申请提出一种多网站间的自动登录方法,该方法包括:
当接收到来自用户侧客户端的针对第二网站上的目标页面的访问请求时,查询用户在所述第一网站上的第一登录账户的登录状态;
如果所述第一登录账户为已登录状态,基于与第二网站约定的令牌生成规则生成自动登录令牌;
为所述客户端构建并下发第一自动登录链接,所述第一自动登录链接包含所述第二网站的自动登录入口的url地址以及所述自动登录令牌,以使所述客户端访问该第一自动登录链接向第二网站的自动登录入口 发送携带所述自动登陆令牌的针对所述目标页面的访问请求,并在所述第二网站的服务器针对所述自动登录令牌验证通过后,授权所述客户端使用与所述第一登录账户存在绑定关系的第二登录账户在第二网站执行自动登录并跳转至所述目标页面。
在本例中,所述方法还包括:
在接收到来自所述用户侧客户端的针对第二网站的资源访问请求时,为所述客户端构建并下发第二自动登录链接,所述第二自动登录链接包含本地自动登录入口的url地址以及所述客户端请求的资源所在的第二网站上的目标页面的url地址,以使所述客户端访问该第二自动登录链接向本地自动登录入口发送所述针对所述目标页面的访问请求。
在本例中,所述方法还包括:
如果所述第一登录账户为未登录状态,向所述客户端下发本地主动登录入口的url地址,以触发所述客户端跳转至与所述本地主动登录入口的url地址对应的登录页面,使用所述第一登录账户完成主动登录。
在本例中,所述与第二网站约定的令牌生成规则包括存储在第二网站的登陆域配置信息中的预设加密算法以及密钥;
所述基于与第二网站约定的令牌生成规则生成自动登录令牌包括:
从第二网站的登陆域配置信息中读取预设加密算法以及密钥;
基于读取到的所述预设加密算法以及密钥针对与第二网站约定的令牌生成参数进行计算生成作为所述自动登录令牌的随机字符串;
其中,所述令牌生成参数包括以下内容中的一个或者多个的组合:
所述第一登录账户、第一网站的登录域名称、自动登录令牌的生成时间。
本申请还提出一种多网站间的自动登录方法,应用于第二网站的服务器
,该方法包括:
当接收到来自第一网站的用户侧客户端的针对本地的目标页面的访问请求时,查询与所述用户在所述第一网站上的第一登录账户存在绑定关系的第二登录账户的登录状态;其中,所述访问请求携带所述第一网站的服务器基于约定的令牌生成规则生成的自动登录令牌;
如果所述第二登录账户为未登录状态,基于与所述第一网站约定的令牌验证规则针对所述自动登录令牌进行验证;
当所述自动登录令牌验证通过时,授权所述客户端使用所述第二登录账户在本地执行自动登录,并在登录成功后向所述客户端发送所述目标页面的页面数据以触发所述客户端跳转至所述目标页面。
在本例中,所述方法还包括:
如果所述第二登录账户为已登录状态,向所述客户端发送所述目标页面的页面数据以触发所述客户端跳转至所述目标页面。
在本例中,所述方法还包括:
当所述自动登录令牌验证失败时,向所述客户端下发本地主动登录入口的url地址,以触发所述客户端跳转至与所述本地主动登录入口的url地址对应的登录页面,使用所述第二登录账户完成主动登录。
在本例中,所述与第一网站约定的令牌验证规则为存储在本地登陆域配置信息中的预设解密算法以及密钥;
所述基于与所述第一网站约定的令牌验证规则针对所述自动登录令牌进行验证包括:
从本地的登陆域配置信息中读取预设解密算法以及密钥;
基于读取到的预设解密算法以及密钥针对所述自动登录令牌进行解密,并验证解密后生成的参数是否为与所述第一网站约定的令牌生成参数;如果是,则所述自动登录令牌验证通过;
其中,所述令牌生成参数包括以下内容中的一个或者多个的组合:
所述第一登录账户、第一网站的登录域名称、自动登录令牌的生成时间。
本申请还提出一种多网站间的自动登录装置,应用于第一网站的服务器,该装置包括:
第一查询模块,用于当接收到来自用户侧客户端的针对第二网站上的目标页面的访问请求时,查询用户在所述第一网站上的第一登录账户的登录状态;
生成模块,用于在所述第一登录账户为已登录状态,基于与第二网站约定的令牌生成规则生成自动登录令牌;
下发模块,用于为所述客户端构建并下发第一自动登录链接,所述第一自动登录链接包含所述第二网站的自动登录入口的url地址以及所述自动登录令牌,以使所述客户端访问该第一自动登录链接向第二网站的自动登录入口发送携带所述自动登陆令牌的针对所述目标页面的访问请求,并在所述第二网站的服务器针对所述自动登录令牌验证通过后,授权所述客户端使用与所述第一登录账户存在绑定关系的第二登录账户在第二网站执行自动登录并跳转至所述目标页面。
在本例中,所述下发模块进一步用于:
在接收到来自所述用户侧客户端的针对第二网站的资源访问请求时,为所述客户端构建并下发第二自动登录链接,所述第二自动登录链接包含本地自动登录入口的url地址以及所述客户端请求的资源所在的第二网站上的目标页面的url地址,以使所述客户端访问该第二自动登录链接向本地自动登录入口发送所述针对所述目标页面的访问请求。
在本例中,所述下发模块进一步用于:
如果所述第一登录账户为未登录状态,向所述客户端下发本地主动 登录入口的url地址,以触发所述客户端跳转至与所述本地主动登录入口的url地址对应的登录页面,使用所述第一登录账户完成主动登录。
在本例中,所述与第二网站约定的令牌生成规则包括存储在第二网站的登陆域配置信息中的预设加密算法以及密钥;
所述生成模块具体用于:
从第二网站的登陆域配置信息中读取预设加密算法以及密钥;
基于读取到的所述预设加密算法以及密钥针对与第二网站约定的令牌生成参数进行计算生成作为所述自动登录令牌的随机字符串;
其中,所述令牌生成参数包括以下内容中的一个或者多个的组合:
所述第一登录账户、第一网站的登录域名称、自动登录令牌的生成时间。
本申请还提出一种多网站间的自动登录装置,应用于第二网站的服务器,该装置包括:
第二查询模块,用于当接收到来自第一网站的用户侧客户端的针对本地的目标页面的访问请求时,查询与所述用户在所述第一网站上的第一登录账户存在绑定关系的第二登录账户的登录状态;其中,所述访问请求携带所述第一网站的服务器基于约定的令牌生成规则生成的自动登录令牌;
验证模块,用于如果所述第二登录账户为未登录状态,基于与所述第一网站约定的令牌验证规则针对所述自动登录令牌进行验证;
授权模块,用于当所述自动登录令牌验证通过时,授权所述客户端使用所述第二登录账户在本地执行自动登录,并在登录成功后向所述客户端发送所述目标页面的页面数据以触发所述客户端跳转至所述目标页面。
在本例中,所述授权模块进一步用于包括:
如果所述第二登录账户为已登录状态,向所述客户端发送所述目标页面的页面数据以触发所述客户端跳转至所述目标页面。
在本例中,所述验证模块进一步用于:
当所述自动登录令牌验证失败时,向所述客户端下发本地主动登录入口的url地址,以触发所述客户端跳转至与所述本地主动登录入口的url地址对应的登录页面,使用所述第二登录账户完成主动登录。
在本例中,所述与第一网站约定的令牌验证规则为存储在本地登陆域配置信息中的预设解密算法以及密钥;
所述验证模块具体用于:
从本地的登陆域配置信息中读取预设解密算法以及密钥;
基于读取到的预设解密算法以及密钥针对所述自动登录令牌进行解密,并验证解密后生成的参数是否为与所述第一网站约定的令牌生成参数;如果是,则所述自动登录令牌验证通过;
其中,所述令牌生成参数包括以下内容中的一个或者多个的组合:
所述第一登录账户、第一网站的登录域名称、自动登录令牌的生成时间。
本申请中,第一网站的服务器在接收到来自用户客户端的针对第二网站的目标页面的访问请求时,如果查询到该用户在第一网站上的第一登录账户为已登录状态,可以基于与第二网站约定的令牌生成规则生成自动登录令牌,并为客户端构建并下发包含第二网站的自动登录入口的url地址以及所述自动登录令牌的登录链接;客户端在收到该登录链接后,可以访问该登录链接,向第二网站的自动登录入口发送携带所述自动登录令牌的针对所述目标url地址的访问请求,第二网站的服务器在接收到该访问请求后,如果查询到与所述第一登录账户存在绑定关系的第二登录账户为未登录状态时,则对该访问请求中的自动登录令牌进行 验证,并在验证通过后,授权所述客户端使用该第二登录账户在本地执行自动登录,以及在登录成功后向所述客户端发送与所述目标url地址对应的页面数据,来触发该客户端跳转至与该目标url对应的目标页面;本申请实现了用户在使用第一网站的客户端访问第二网站上的目标页面时,可以直接跳转至第二网站上的目标页面,而不需要用户手动输入在第二网站上的第二登录账户和密码来执行手动登录,从而可以降低操作复杂度,极大的优化用户体验。
附图说明
图1是本申请一实施例提供的一种多网站间的自动登录方法的流程图;
图2是本申请一实施例提供的一种核心组件架构图;
图3是本申请一实施例提供的一种多网站间的自动登录装置的逻辑框图;
图4是本申请一实施例提供的承载所述一种多网站间的自动登录装置的第一网站的服务器的硬件结构图;
图5是本申请一实施例提供的另一种多网站间的自动登录装置的逻辑框图;
图6是本申请一实施例提供的承载所述另一种多网站间的自动登录装置的第二网站的服务器的硬件结构图。
具体实施方式
在相关技术中,用户在使用第一网站的用户侧客户端访问第二网站上的目标页面时,通常需要输入用户在第二网站上的登录账户和密码登录第二网站,并在登陆成功后才能获得该目标页面的访问权限并跳转至该目标页面,因此操作非常不方便。
为了解决上述问题,本申请提出一种多网站间的自动登录方法,第一网站的服务器在接收到来自用户客户端的针对第二网站的目标页面的访问请求时,如果查询到该用户在第一网站上的第一登录账户为已登录状态,可以基于与第二网站约定的令牌生成规则生成自动登录令牌,并为客户端构建并下发包含第二网站的自动登录入口的url地址以及所述自动登录令牌的登录链接;客户端在收到该登录链接后,可以访问该登录链接,向第二网站的自动登录入口发送携带所述自动登录令牌的针对所述目标url地址的访问请求,第二网站的服务器在接收到该访问请求后,如果查询到与所述第一登录账户存在绑定关系的第二登录账户为未登录状态时,则对该访问请求中的自动登录令牌进行验证,并在验证通过后,授权所述客户端使用该第二登录账户在本地执行自动登录,以及在登录成功后向所述客户端发送与所述目标url地址对应的页面数据,来触发该客户端跳转至与该目标url对应的目标页面;
本申请实现了用户在使用第一网站的客户端访问第二网站上的目标页面时,可以直接跳转至第二网站上的目标页面,而不需要用户手动输入在第二网站上的第二登录账户和密码来执行手动登录,从而可以降低操作复杂度,极大的优化用户体验。
下面通过具体实施例并结合具体的应用场景对本申请进行描述。
请参考图1,图1是本申请一实施例提供的一种多网站间的自动登录方法,所述方法执行以下步骤:
步骤101,第一网站的服务器接收到来自用户侧客户端的针对第二网站上的目标页面的访问请求时,查询用户在所述第一网站上的第一登录账户的登录状态;
在本例中,上述用户客户端可以包括第一网站的web客户端(比如浏览器)。在上述客户端的用户界面中,可以预先添加指向第一网站的 自动登录入口的用于访问第二网站上的资源的访问链接;
其中,上述访问链接可以包括第一网站的自动登录入口的url地址以及上述客户端在访问第二网站上的资源时,需要向第一网站的自动登录入口传递的查询参数;
当用户需要使用第一网站的用户侧客户端来请求访问第二网站上的资源时,可以通过点击上述访问链接,来触发该客户端向第一网站的服务器发送针对第二网站的资源访问请求。
当用户“点击”该上述访问链接后,上述客户端可以基于该访问链接中的查询参数以及用户在第一网站上的第一登录账户,来构建资源访问请求,然后访问第一网站的自动登录入口的url地址,将构建完成的该资源访问请求发往第一网站的服务器上的自动登录入口。
其中,在用户通过在第一网站的用户侧客户端中,查询第二网站上的业务资源的应用场景中,上述用于访问第二网站上的资源的访问链接可以是一业务查询链接;上述查询参数可以包括与用户需要查询的业务资源对应的业务标识等信息;而上述客户端构建的上述资源访问请求则可以是一业务查询请求。
例如,以第一网站为支付宝(alipay),第二网站为淘宝(taobao)为例,用户需要在支付宝客户端中查询一笔由支付宝完成支付的淘宝交易的详情信息,此时上述资源访问请求可以是针对该笔交易的业务查询请求,上述查询参数则可以是该笔淘宝交易的交易号。
假设该笔淘宝交易的交易号为“20150411252031”,支付宝的自动登录入口url地址为“http://www.alipay.com/auto_login.htm”,此时上述业务查询链接可以是如下链接:
“http://www.alipay.com/auto_login.htm?tradeNo=20150411252031”
在上述链接中,“?”为上述业务查询链接中的参数传递标识符, 该参数传递标识符后面的内容即为支付宝客户端在查询交易号为20150411252031的淘宝交易的详情信息时,需要向支付宝的自动登录入口传递的业务查询参数。
支付宝客户端可以在用户界面中与该笔交易的对应位置上添加一个“查看交易详情”的标记,并将该标记指向上述业务查询链接。当用户在支付宝客户端中点击“查询交易详情”的标记时,此时客户端可以读取上述业务查询链接中的tradeNo(即交易号),构建一个携带该交易号以及用户的支付宝账号的业务查询请求,然后可以访问支付宝的自动登录入口的url地址,将业务查询请求该发往支付宝服务器的自动登录入口。以下以用户通过第一网站的用户侧客户端查询第二网站上的业务资源的应用场景为例进行说明。
在本例中,当第一网站的服务器通过自动登录入口接收到用户侧客户端发送的业务查询请求后,可以读取该业务查询请求中的业务查询参数,在本地业务数据库中进行相应的业务资源查询。
如果第一网站的服务器在本地业务数据库中查询到了对应的业务详情信息,表明与该业务查询请求对应的业务资源为第一网站的本地业务资源,此时第一网站的服务器可以检查该业务查询请求中携带的第一登录账户的登录状态;如果该第一登录账户为已登录状态,此时表明用户已使用第一登录账户登录了第一网站,第一网站的服务器可以直接向该本地客户端返回对应的业务资源即可。
如果在本地业务数据库中未查询到对应的业务资源,表明与该业务查询请求对应的业务资源为属于第三方网站的非本地业务资源。
对于属于第三方网站的非本地业务资源,在第一网站的服务器上通常会预存储该业务资源与该业务资源所在的第三方网站上的目标页面的目标url地址之间的映射关系;其中该目标url地址,即为第一网站 的用户侧客户端在查询第二网站上的非本地业务资源时,需要访问的第二网站上的目标页面的url地址。
如果第一网站的服务器在本地业务数据库中未查询到与上述业务查询请求对应的业务资源,则可以基于上述映射关系来确定出与需要查询的该业务资源对应的第二网站的目标页面的url地址,然后为该客户端构建并下发一个用于在第一网站的登陆域中执行自动登录的自动登录链接(即第二登录链接)。
在本例中,上述登陆域是指用户希望登录的目标系统。在第一网站的服务器上,可以维护多个登录域。在实际应用中,第一网站的服务器可以和其它网站(比如与第一网站存在合作关系的其它网站)的服务器进行交互,将各自登录域的配置信息周期性的互相同步至其它网站的服务器。
例如,假设第一网站为支付宝,支付宝为淘宝、当当等电商平台提供第三方支付解决方案,那么支付宝的服务器可以与淘宝、当当的服务器分别进行交互,将各自登陆域的配置信息同步给对方,从而使得支付宝的服务器上可以同时维护淘宝、当当等多个电商平台所属登陆域的配置信息。
在本例中,第一网站的服务器为上述客户端构建并下发的上述用于在第一网站的登录域中执行自动登录的自动登录链接,可以包括第一网站的自动登录入口的url地址,用户需要访问的业务资源所在的第二网站的目标页面的url地址,以及上述客户端在访问第二网站上的目标页面的url地址时,需要向第一网站的自动登录入口的传递的业务查询参数。
其中,在示出的一种实施方式中,上述客户端在访问第二网站上的目标页面时,需要向第一网站的自动登录入口的传递的业务查询参数中, 可以包括该业务请求来源的登陆域名称,第二网站的目标页面的url地址,第二网站的登陆域名称,用户在第一网站登录时所使用的第一登录账户等信息。
上述客户端在接收到第一网站的服务器下发的上述自动登录链接后,可以基于上述自动登录链接中包含的业务查询参数,构建一个针对第二网站的目标页面的url地址的访问请求,然后访问第一网站的自动登录入口的url地址,将构建完成的针对第二网站的目标页面的url地址的访问请求发送至第一网站的自动登录入口;其中,构建完成的该访问请求中携带的参数,将与上述自动登录链接中包含的业务查询参数保持一致。
例如,仍然以第一网站为支付宝,第二网站为淘宝,以及用户需要在支付宝客户端中查询一笔由支付宝完成支付的淘宝交易的详情信息为例,假设支付宝的自动登录入口url地址为“http://www.alipay.com/auto_login.htm”,用户要访问的淘宝的目标页面的url地址为“www.taobao.com/trade/list.htm”,支付宝的服务器为支付宝客户端构建并下发的用于在支付宝的登陆域中执行自动登录的自动登录链接可以为如下链接:
http://www.alipay.com/auto_login.htm?loginRequestFrom=Alipay&t arget=http%3A%2F%2Ftaobao.com%2Ftrade%2Flist.htm&domain=taobao&loginAccount=test_123@alipay.com;
在以上自动登录链接中,“?”为上述自动登录链接中的参数传递标识符,该参数传递标识符后面的内容即为支付宝客户端在访问淘宝上的上述目标url地址时,需要向支付宝的自动登录入口传递的业务查询参数。
其中,“loginRequestFrom=Alipay”表示支付宝客户端基于该参数构建的访问请求来源于支付宝的登陆域; “loginAccount=test_123@alipay.com”表示用户登录支付系统所使用的支付宝账户的名称为test_123@alipay.com;
“target=http%3A%2F%2Fae.com%2Ftrade%2Flist.htm”即为编码处理后的支付宝客户端访问的淘宝中的目标页面的url地址;“domain=taobao”表示与支付宝系统对接的对端登陆域名称为taobao。
支付宝客户端在接收到支付宝的服务器下发的上述自动登录链接后,可以基于上述自动登录链接中包含的业务查询参数,来构建一个针对第二网站的目标url地址的访问请求,然后访问支付宝的自动登录入口的url地址,将该访问请求发送至支付宝的服务器。
在本例中,当第一网站的服务器通过本地的自动登录入口,接收到本地客户端发送的针对第二网站的目标页面的url地址的访问请求时,由于该访问请求的目的端为本地的自动登录入口,因此表明该本地客户端需要使用上述第一登录账户登录第一网站的登陆域后,才能够取得具有针对第二网站的目标url地址的访问权限。
在这种情况下,第一网站的服务器在接收到客户端发送的针对第二网站的目标页面的url地址的访问请求后,可以从该访问请求中读取上述第一登录账号,然后在本地查询该第一登录账户的登录状态;
例如,在实现时,第一网站的服务器可以将该第一登录账户作为查询索引,查询本地是否存储了与该第一登录账户对应的登录成功的鉴权结果,如果本地未存储该第一登录账户的登录成功的鉴权结果,则可以确认第一登录账户为未登录状态;反之,如果查询到了与该第一登录账户对应的登录成功的鉴权结果,则可以确认第一登录账户为未登录状态。
步骤102,如果所述第一登录账户为已登录状态,第一网站的服务器基于与第二网站约定的令牌生成规则生成用于针对第二网站执行自动登录的自动登录令牌。
在本例中,如果第一网站的服务器查询到第一登录账户为已登录状态,表明用户已经使用第一登录账户在第一网站的系统中执行了登录,此时第一网站的服务器可以基于与第二网站约定的令牌生成规则生成自动登录令牌(Token)。
其中,该自动登录令牌用于在不同网站的登录域之间共享登录成功的鉴权结果;第一网站的服务器可以通过将生成的自动登录令牌传递至第二网站的服务器,将第一登录账户在第一网站的登陆域中登录成功的鉴权结果共享至第二网站。
在示出的一种实施方式中,第一网站与第二网站约定的令牌生成规则,可以作为登陆域配置信息,预先存储在第一网站的服务器在本地维护的第二网站的登录域配置信息中。
上述登陆域配置信息通常包括该登陆域的主动登录入口的url以及自动登录入口的url,而上述令牌生成规则具体可以包括约定的加密算法和密钥。因此,如果将网站之间约定的令牌生成规则也存储在登陆域配置信息中,那么该登录域配置信息中除了该登陆域的主动登录入口的url以及自动登录入口的url等信息以外,则还可以包含网站之间约定的加密算法以及密钥或者密钥的获取方式等信息。
其中,需要说明的是,第一网站和第二网站约定的用于生成自动登录令牌的加密算法,在本例中不进行特别限定;例如,上述预设的加密算法可以包括DSA算法、RSA算法、MD5算法或者其它类型的对称加密算法。
第一网站的服务器在基于与第二网站约定的令牌生成规则生成自动登录令牌时,可以从第二网站的登陆域配置信息中读取加密算法和密钥,并基于读取到的该加密算法和密钥针对与第二网站约定的令牌生成参数进行计算,以生成一个随机字符串,然后将生成的该随机字符串作 为自动登录令牌进行存储。
其中,在示出的一种实施方式中,上述令牌生成参数可以包括:第一登录账户、第一网站的登录域名称、自动登录令牌的生成时间等信息中的一个或者多个的组合。即在本例中,在生成上述自动登录令牌时,上述令牌生成参数可以是与用户在第二网站上的第二登录账户完全无关的信息。
当然,在实际应用中,上述令牌生成参数除了以上示出的第一登录账户、第一网站的登录域名称、自动登录令牌的生成时间等信息以外,也可以包括其它类型的信息,在本例中不再一一列举。
在本例中,如果第一网站的服务器查询到第一登录账户为未登录状态,表明用户尚未使用第一登录账户在第一网站的系统中执行登录,在这种情况下,第一网站的服务器可以将本地的主动登录入口的url地址下发给本地客户端。
当该客户端接收到该主动登录入口的url地址时,可以访问该url地址,然后跳转至与该url地址对应的登录页面,然后由用户在该登录页面中手动输入上述第一登录账户,以及对应的登录密码来执行主动登录。
步骤103,第一网站的服务器为所述客户端构建并下发第一自动登录链接,所述第一自动登录链接包含所述第二网站的自动登录入口的url地址以及所述自动登录令牌。
步骤104,第一网站的用户侧客户端接收到该第一登录链接后,访问该第一登录链接,向第二网站的自动登录入口发送针对所述目标页面的访问请求;该访问请求中携带所述自动登录令牌;
在本例中,当第一网站的服务器在确定上述第一登录账户为已登录状态,并且生成了上述自动登录令牌后,可以为用户侧客户端构建并下 发一个用于在第二网站的登陆域中执行自动登录的自动登录链接(即第一登录链接),以将该本地客户端针对第二网站的目标页面的访问请求,重定向至第二网站的自动登录入口。
第一网站的服务器为用户侧客户端构建并下发的上述用于在第二网站的登录域执行自动登录的自动登录链接,可以包括第二网站的自动登录入口的url地址,生成的上述自动登录令牌,以及上述客户端在访问第二网站的目标页面的url地址时,需要向第二网站的自动登录入口的传递的业务查询参数。
其中,在示出的一种实施方式中,上述客户端在访问第二网站的目标页面时,需要向第二网站的自动登录入口的传递的业务查询参数中,可以包括该业务请求来源的登陆域名称,第二网站的目标页面的url地址,第二网站的登陆域名称,用户在第一网站登录时所使用的第一登录账户,以及第一网站的服务器生成的上述自动登录令牌和该自动登录令牌的生成时间(用于第二网站的服务器验证自动登录令牌)。
上述客户端在接收到第一网站的服务器下发的上述自动登录链接后,可以基于上述自动登录链接中包含的业务查询参数,构建一个针对第二网站的目标url地址的访问请求,然后访问第二网站的自动登录入口的url地址,将构建完成的针对第二网站的目标页面的url地址的访问请求重定向至第二网站的自动登录入口。其中,构建完成的该访问请求中携带的参数,与上述自动登录链接中包含的业务查询参数保持一致。
例如,仍然以第一网站为支付宝,第二网站为淘宝,以及用户需要在支付宝客户端中查询一笔由支付宝完成支付的淘宝交易的详情信息为例,假设淘宝的自动登录入口url地址为“http://www.taobao.com/auto_login.htm”,用户要访问的淘宝的目标页面的url地址为“www.taobao.com/trade/list.htm”,支付宝的服务器为支 付宝客户端构建并下发的,用于在淘宝的登陆域中执行自动登录的自动登录链接可以为如下链接:
http://www.taobao.com/auto_login.htm?loginRequestFrom=Alipay&t arget=http%3A%2F%2Ftaobao.com%2Ftrade%2Flist.htm&domain=taobao&loginAccount=test_123@alipay.com&token=432085320498320841fjkdsl jfdsj&tokentime=201504111104;
其中,“loginRequestFrom=Alipay”表示支付宝客户端基于该参数构建的访问请求来源于支付宝的登陆域;“loginAccount=test_123@alipay.com”表示用户登录支付系统所使用的支付宝账户的名称为test_123@alipay.com;
“target=http%3A%2F%2Fae.com%2Ftrade%2Flist.htm”即为编码处理后的支付宝客户端访问的淘宝中的目标页面的url地址;“domain=alipay”表示与淘宝系统对接的对端登陆域名称为alipay;“token=432085320498320841fjkdsljfdsj”表示支付宝的服务器生成的上述自动登录令牌;“tokentime=201504111104”表示上述自动登录令牌的生成时间。
支付宝客户端在接收到支付宝的服务器下发的上述自动登录链接后,可以基于上述自动登录链接中包含的业务查询参数,来构建一个针对淘宝上的目标页面的url地址的访问请求,然后支付宝客户端可以访问淘宝的自动登录入口的url地址,将该访问请求发送至淘宝的服务器。
步骤105,第二网站的服务器在接收到来自第一网站的用户侧客户端的针对本地的目标页面的访问请求时,查询与所述用户在所述第一网站上的第一登录账户存在绑定关系的第二登录账户的登录状态;
在本例中,用户登录第一网站的上述第一登录账户,与用户登录第二网站的第二登录账户之间可以预先进行账户绑定,该绑定关系可以预先分别存储在第一网站和第二网站的服务器上;
例如,以第一网站为支付宝,第二网站为淘宝为例,假设第一登录账户为用户登录支付宝系统的支付宝账户test_123@alipay.com,第二登录账户为用户登录淘宝系统的淘宝账户为test_123@taobao.com,则支付宝和淘宝的服务器上可以分别保存账户test_123@alipay.com和test_123@taobao.com的绑定关系。
当第二网站的服务器在接收到第一网站的本地客户端发送的针对本地的目标页面的url地址的访问请求时,可以读取该访问请求中的上述第一登录账户,基于建立的上述绑定关系,查询与该第一登录账户绑定的第二登录账户。当查询到与第一登录账户绑定的第二登录账户时,第二网站的服务器可以在本地查询第二登录账户的登录状态。
步骤106,如果所述第二登录账户为未登录状态,第二网站的服务器基于与所述第一网站约定的令牌验证规则针对所述自动登录令牌进行验证;
在本例中,如果第二网站的服务器查询到上述第二登录账户为未登录状态,则可以读取上述访问请求中携带的自动登录令牌,并基于与第一网站约定的令牌验证规则对该自动登录令牌进行验证。
其中,第二网站与第一网站约定的令牌验证规则与第一网站生成自动登录令牌时采用的令牌生成规则互相对应。
在本例中,上述令牌验证规则仍然可以作为登陆域配置信息,预先存储在第二网站的登录域配置信息中,上述令牌验证规则可以包括约定的加密算法和密钥,其中作为令牌验证规则的加密算法和密钥需要与第一网站的服务器在生成自动登录令牌时采用的加密算法和密钥保持一致。
第二网站的服务器在针对上述自动登录令牌进行验证时,可以从本地的登陆域配置信息中读取加密算法和密钥,并基于读取到的该加密算 法和密钥针对该自动登录令牌进行反向解密计算,得到若干参数,然后第二网站的服务器可以验证解密计算得到的该些参数,与第一网站约定的用于生成上述自动登录令牌的令牌生成参数是否一致;
例如,假设第一网站的服务器在生成上述自动登录令牌时,使用的令牌生成参数为上述第一登录账户、第一网站的登录域名称、自动登录令牌的生成时间等信息(令牌生成参数可以携带在上述客户端发送的访问请求中),第二网站的服务器在针对该自动登录令牌进行验证时,可以基于相同的算法和密钥对该自动登录令牌进行反向解密得到若干参数,然后第二网站的服务器可以将反向解密计算得到的该些参数,与第一网站的服务器生成上述自动登录令牌时使用的令牌生成参数一一进行比对,当第一登录账户、第一网站的登录域名称、自动登录令牌的生成时间等信息全部匹配时,则确定该自动登录令牌验证通过。反之,以上参数中的任一参数不匹配时,则可以确定该自动登录令牌验证失败。
步骤107,当所述自动登录令牌验证通过时,第二网站的服务器授权所述客户端使用所述第二登录账户在本地执行自动登录,并在登录成功后向所述客户端发送所述目标页面的页面数据以触发所述客户端跳转至所述目标页面。
在本例中,如果第二网站的服务器针对上述自动登录令牌验证通过,此时第二网站的服务器可以在本地的登录域中,直接认可上述第一登录账户在第一网站的登陆域中登录成功的鉴权结果。即第二网站的服务器可以通过验证自动登录令牌,来确定是否可以直接将用户在第一网站的登录结果直接在第二网站的登录域中进行共享。
在这种情况下,第二网站的服务器可以针对该第二登录账户在第二网站的登陆域中执行登录授权,授权上述客户端使用与上述第一登录账户存在绑定关系的该第二登录账户在第二网站的登陆域中执行自动登 录。在整个过程中,第二网站的服务器不需要针对上述第二登录账户执行任何形式的登录验证。
当自动登录成功后,此时上述客户端已经取得针对第二网站上的上述目标url地址的访问权限,第二网站的服务器可以向该客户端发送与上述目标url地址对应的页面数据,以触发所述客户端跳转至对应的目标页面
当然,如果上述自动登录令牌验证失败,此时第二网站的服务器可以将本地的主动登录入口的url地址下发给上述本地客户端。当该客户端接收到该主动登录入口的url地址时,可以访问该url地址,然后跳转至与该url地址对应的登录页面,然后由用户在该登录页面中手动输入上述第二登录账户,以及对应的登录密码来执行主动登录。
步骤108,第一网站的用户侧客户端接收到与所述目标页面的页面数据后,跳转至所述目标页面。
在本例中,当第一网站的用户侧客户端接收到由第二网站的服务器发送的与上述目标url地址对应的页面数据后,可以在浏览器中加载接收到的页面数据,然后跳转至与上述目标url地址对应的目标页面。
至此,用户通过第一网站的用户侧客户端针对第二网站上的目标页面的访问完成。在整个过程中,当第一网站的用户侧客户端在访问第二网站的目标页面时,只需要验证用户是否使用第一登录账户成功登录了第一网站;如果用户已使用第一登录账户登录了第一网站,则可以通过生成自动登录令牌将用户在第一网站登录成功的鉴权结果共享至第二网站,由第二网站对自动登录令牌验证通过后,使用与第一登录账户绑定的第二登录账户执行自动登录即可,整个登录流程中,不需要对第二登录账户执行任何形式的验证。
通过以上实施例可见,当用户通过第一网站的用户客户端,跨网站 访问第二网站上的目标页面时,如果用户在第一网站上的第一登录账户在第一网站的登陆域中已完成登录,第一网站的服务器可以基于与第二网站的服务器约定的令牌生成规则生成一个自动登录令牌,并通过将该自动登录令牌发送至第二网站的服务器,将第一登录账户在第一网站的登陆域中登录成功的鉴权结果共享至第二网站。
第二网站的服务器可以对该自动登录令牌进行验证,如果验证通过,可以直接授权上述客户端使用与上述第一登录账户存在绑定关系的第二登录账户自动登录第二网站的登陆域,使得用户通过上述客户端可以直接跳转至与上述目标页面进行访问,而不需要在登录界面中重复输入上述第二登录账户和登录密码重复登录第二网站,由于在整个跳转登录的过程中,不需要针对第二登录账户执行任何形式的验证,因此可以降低操作复杂度,极大的优化用户体验。
另外,需要说明的是,以上实施例中描述了用户通过第一网站的用户侧客户端,来跨网站访问第二网站的目标页面的详细过程,在实际应用中,用户也可以通过第二网站的用户侧客户端,来跨网站访问第一网站上的目标页面,其具体的实施过程本申请中不再赘述,本领域技术人员在付诸实现时,可以参考以上实施例中的描述。
以下以上述第一网站为支付宝(Alipay)、第二网站为淘宝(Taobao)为例,并结合用户通过支付宝客户端查看淘宝的交易详情信息的应用场景对以上实施例中的技术方案进行详细描述。
在本例中示出的场景中,包括承载支付宝客户端的浏览器(以下简称浏览器)、支付宝服务器以及淘宝服务器。
在本例中,支付宝可以作为一个第三方支付公司,为淘宝提供在线的支付解决方案。在支付宝的消费记录中,用户通常能查看到所有与支付相关的第三方的交易信息,而支付宝中的交易信息通常只包含交易的 摘要信息,比如可能仅包括交易的名称等,因此如果用户需要查看交易的详情信息,则需要跳转到淘宝的网站中进行查询。
在相关技术中,用户在通过浏览器跳转到淘宝的网站查询交易的详情信息时,淘宝的系统通常会要求用户输入用户在淘宝中已注册的登录账号和密码执行登录,并在登录成功后才有查看交易详情信息的权限,因此操作非常不方便。
在本例中,为了实现用户在支付宝的消费记录查看淘宝交易的详情信息时,浏览器自动跳转至查看交易详情信息的目标页面的功能,在支付宝和淘宝的网站架构中可以集成相同的核心组件。
请参见图2,图2为本例示出的一种核心组件架构图。
在图2示出的核心组件架构中,包括自动登录流程控制器、Token(自动登录令牌)生成组件、Token验证组件、登录组件以及登陆域的配置信息。
其中,上述自动登录流程控制器(Auto Login Service,以下简称ALS),为自动登陆的总入口,用于负责总控一次自动登陆的所有流程,用户可以通过浏览器访问自动登录入口的url地址,访问自动登录流程控制器,向自动登录流程控制器传递参数,来实现自动登录。
上述Token生成组件(Token Generate Service,以下简称TGS组件),运行于已登录系统一侧,用于基于与对端登录系统约定的Token生成规则生成Token;其中生成token的主要参数可以包括已登陆的账号、对端登陆域名称以及生成token的时间。Token生成规则由网站之间相互约定,可以包括DSA、RSA或者MD5等对称加密算法和密钥。
上述Token验证组件(Token Validate Service,以下简称TVS组件):运行于待登录系统一侧,用于基于约定的Token验证规则验证已登陆系统传递过来的Token,其中验证的方式与Token生成组件生成Token时 的生成规则相对应。
上述登陆组件(Login Service,以下简称LS组件):用于检查当前需要登陆的账号是否已经在本系统中完成登陆,以及为需要登陆的账号执行一次自动登陆。
上述登陆域的配置信息:负责管理各登陆域的配置信息,包括各登陆域主动登陆入口的url地址、自动登陆入口的url地址、加密算法以及密钥或者密钥的获取方式等信息。
在本例中,假设用户登录支付宝的第一登录账户为test_123@alipay.com,用户登录淘宝的第二登录账户为test_123@taobao.com;在淘宝的服务器上可以预先保存登录账户test_123@alipay.com与test_123@taobao.com的绑定关系。
在支付宝的消费记录中,包含一笔淘宝的交易的摘要信息,在该摘要信息的预设位置,预先添加了一个“查看交易详情”的标记,该标记指向支付宝的自动登录入口的url地址http://www.alipay.com/auto_login.htm。
当用户点击该“查看交易详情”的标记希望跳转至淘宝的交易界面,查询该笔淘宝交易的详情信息时,浏览器会向支付宝的服务器发送一个针对该笔交易详情信息的查询请求。支付宝的服务器收到该查询请求后,基于映射关系,查找到淘宝的交易界面的url地址为www.taobao.com/trade/list.htm后,可以向浏览器下发第一自动登录链接:
http://www.alipay.com/auto_login.htm?loginRequestFrom=Alipay&target=http%3A%2F%2Ftaobao.com%2Ftrade%2Flist.htm&domain=taobao&loginAccount=test_123@alipay.com;
浏览器接收到该第一自动登录链接后,构建针对淘宝的交易界面的url地址的访问请求,并访问支付宝的自动登录入口的url地址,将该访问请求发送至支付宝服务器的自动登录入口。
此时该访问请求中携带的信息包括:该访问请求来源于Alipay、淘宝的交易页面的url地址、淘宝的登陆域名称以及用户需要登录的支付宝账户test_123@alipay.com。
支付宝服务器上的ALS组件处理该访问请求,首先发现该访问请求来源于本地的登陆域,此时会触发Token生成,ALS组件调用LS组件查询登录账户test_123@alipay.com的登录状态,如果登录账户test_123@alipay.com为已登录状态,则继续调用TGS组件生成Token。
当生成Token后,ALS组件读取淘宝的登陆域的配置信息,为支付宝客户端构建并下发第二自动登录链接,以对支付宝客户端针对淘宝的交易页面的url的访问请求重定向至淘宝的自动登录入口;
此时第二自动登录链接为:
http://www.taobao.com/auto_login.htm?loginRequestFrom=Alipay&target=http%3A%2F%2Ftaobao.com%2Ftrade%2Flist.htm&domain=taobao&loginAccount=test_123@alipay.com&token=432085320498320841fjkdsljfdsj&tokentime=201504111104;
浏览器接收到该第二自动登录链接后,重新构建针对淘宝的交易界面的url地址的访问请求,并访问淘宝的自动登录入口的url地址,将重新构建的该访问请求重定向至淘宝的自动登录入口。
此时该访问请求中携带的信息包括:该访问请求来源于Alipay、淘宝的交易页面的url地址、支付宝的登陆域名称(重定向后对端登陆域发生了变化)、用户需要登录的支付宝账户test_123@alipay.com、生成的Token以及Token的生成时间。
淘宝服务器上的ALS组件处理该访问请求,首先发现该访问请求来源于支付宝的登陆域,此时会触发Token验证,ALS组件调用LS组件查询与test_123@alipay.com存在绑定关系的登录账户test_123@taobao.com的登录状态,如果登录账户test_123@taobao.com 为已登录状态,则继续调用TVS组件验证该Token。
当该Token验证通过后,表明淘宝的系统认可用户使用test_123@alipay.com在支付宝的登陆域中登录成功的鉴权结果,此时ALS组件可以调用LS组件为登录账户test_123@taobao.com授权一次自动登录。
当登录账户test_123@taobao.com自动登录淘宝的登陆域后,淘宝的服务器可以将与www.taobao.com/trade/list.htm对应的交易页面的页面数据下发至支付宝客户端所在的浏览器。浏览器收到淘宝的服务器下发的页面数据后,可以加载该页面数据,然后自动跳转至淘宝的交易页面,向用户显示该笔淘宝交易的详情信息。
至此,用户在支付宝的消费记录中查看该笔淘宝交易的详情信息的操作完成时,在整个过程中,用户不需要在界面中输入淘宝的登陆账户test_123@taobao.com以及登录密码登录淘宝的登陆域,浏览器将自动跳转至淘宝的交易界面向用户输出交易的详情信息。
与上述方法实施例相对应,本申请还提供了装置的实施例。
请参见图3,本申请提出一种多网站间的自动登录装置30,应用于第一网站的服务器;其中,请参见图4,作为承载所述多网站间的自动登录装置30的服务器所涉及的硬件架构中,通常包括CPU、内存、非易失性存储器、网络接口以及内部总线等;以软件实现为例,所述多网站间的自动登录装置30通常可以理解为加载在内存中的计算机程序,通过CPU运行之后形成的软硬件相结合的逻辑装置,所述装置30包括:
第一查询模块301,用于当接收到来自用户侧客户端的针对第二网站上的目标页面的访问请求时,查询用户在所述第一网站上的第一登录账户的登录状态;
生成模块302,用于在所述第一登录账户为已登录状态,基于与第 二网站约定的令牌生成规则生成自动登录令牌;
下发模块303,用于为所述客户端构建并下发第一自动登录链接,所述第一自动登录链接包含所述第二网站的自动登录入口的url地址以及所述自动登录令牌,以使所述客户端访问该第一自动登录链接向第二网站的自动登录入口发送携带所述自动登陆令牌的针对所述目标页面的访问请求,并在所述第二网站的服务器针对所述自动登录令牌验证通过后,授权所述客户端使用与所述第一登录账户存在绑定关系的第二登录账户在第二网站执行自动登录并跳转至所述目标页面。
在本例中,所述下发模块303进一步用于:
在接收到来自所述用户侧客户端的针对第二网站的资源访问请求时,为所述客户端构建并下发第二自动登录链接,所述第二自动登录链接包含本地自动登录入口的url地址以及所述客户端请求的资源所在的第二网站上的目标页面的url地址,以使所述客户端访问该第二自动登录链接向本地自动登录入口发送所述针对所述目标页面的访问请求。
在本例中,所述下发模块303进一步用于:
如果所述第一登录账户为未登录状态,向所述客户端下发本地主动登录入口的url地址,以触发所述客户端跳转至与所述本地主动登录入口的url地址对应的登录页面,使用所述第一登录账户完成主动登录。
在本例中,所述与第二网站约定的令牌生成规则包括存储在第二网站的登陆域配置信息中的预设加密算法以及密钥;
所述生成模块302具体用于:
从第二网站的登陆域配置信息中读取预设加密算法以及密钥;
基于读取到的所述预设加密算法以及密钥针对与第二网站约定的令牌生成参数进行计算生成作为所述自动登录令牌的随机字符串;
其中,所述令牌生成参数包括以下内容中的一个或者多个的组合:
所述第一登录账户、第二网站的登录域名称、自动登录令牌的生成时间。
请参见图5,本申请提出另一种多网站间的自动登录装置50,应用于第二网站的服务器;其中,请参见图6,作为承载所述多网站间的自动登录装置50的服务器所涉及的硬件架构中,通常包括CPU、内存、非易失性存储器、网络接口以及内部总线等;以软件实现为例,所述多网站间的自动登录装置50通常可以理解为加载在内存中的计算机程序,通过CPU运行之后形成的软硬件相结合的逻辑装置,所述装置50包括:
第二查询模块501,用于当接收到来自第一网站的用户侧客户端的针对本地的目标页面的访问请求时,查询与所述用户在所述第一网站上的第一登录账户存在绑定关系的第二登录账户的登录状态;其中,所述访问请求携带所述第一网站的服务器基于约定的令牌生成规则生成的自动登录令牌;
验证模块502,用于如果所述第二登录账户为未登录状态,基于与所述第一网站约定的令牌验证规则针对所述自动登录令牌进行验证;
授权模块503,用于当所述自动登录令牌验证通过时,授权所述客户端使用所述第二登录账户在本地执行自动登录,并在登录成功后向所述客户端发送所述目标页面的页面数据以触发所述客户端跳转至所述目标页面。
在本例中,所述授权模块503进一步用于包括:
如果所述第二登录账户为已登录状态,向所述客户端发送所述目标页面的页面数据以触发所述客户端跳转至所述目标页面。
在本例中,所述验证模块502进一步用于:
当所述自动登录令牌验证失败时,向所述客户端下发本地主动登录入口的url地址,以触发所述客户端跳转至与所述本地主动登录入口的 url地址对应的登录页面,使用所述第二登录账户完成主动登录。
在本例中,所述与第一网站约定的令牌验证规则为存储在本地登陆域配置信息中的预设解密算法以及密钥;
所述验证模块502具体用于:
从本地的登陆域配置信息中读取预设解密算法以及密钥;
基于读取到的预设解密算法以及密钥针对所述自动登录令牌进行解密,并验证解密后生成的参数是否为与所述第一网站约定的令牌生成参数;如果是,则所述自动登录令牌验证通过;
其中,所述令牌生成参数包括以下内容中的一个或者多个的组合:
所述第一登录账户、本地登录域名称、自动登录令牌的生成时间。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本申请的其它实施方案。本申请旨在涵盖本申请的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本申请的一般性原理并包括本申请未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本申请的真正范围和精神由下面的权利要求指出。
应当理解的是,本申请并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本申请的范围仅由所附的权利要求来限制。
以上所述仅为本申请的较佳实施例而已,并不用以限制本申请,凡在本申请的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本申请保护的范围之内。

Claims (16)

  1. 一种多网站间的自动登录方法,应用于第一网站的服务器,其特征在于,该方法包括:
    当接收到来自用户侧客户端的针对第二网站上的目标页面的访问请求时,查询用户在所述第一网站上的第一登录账户的登录状态;
    如果所述第一登录账户为已登录状态,基于与第二网站约定的令牌生成规则生成自动登录令牌;
    为所述客户端构建并下发第一自动登录链接,所述第一自动登录链接包含所述第二网站的自动登录入口的url地址以及所述自动登录令牌,以使所述客户端访问该第一自动登录链接向第二网站的自动登录入口发送携带所述自动登陆令牌的针对所述目标页面的访问请求,并在所述第二网站的服务器针对所述自动登录令牌验证通过后,授权所述客户端使用与所述第一登录账户存在绑定关系的第二登录账户在第二网站执行自动登录并跳转至所述目标页面。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    在接收到来自所述用户侧客户端的针对第二网站的资源访问请求时,为所述客户端构建并下发第二自动登录链接,所述第二自动登录链接包含本地自动登录入口的url地址以及所述客户端请求的资源所在的第二网站上的目标页面的url地址,以使所述客户端访问该第二自动登录链接向本地自动登录入口发送所述针对所述目标页面的访问请求。
  3. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    如果所述第一登录账户为未登录状态,向所述客户端下发本地主动登录入口的url地址,以触发所述客户端跳转至与所述本地主动登录入口的url地址对应的登录页面,使用所述第一登录账户完成主动登录。
  4. 根据权利要求1所述的方法,其特征在于,所述与第二网站约 定的令牌生成规则包括存储在第二网站的登陆域配置信息中的预设加密算法以及密钥;
    所述基于与第二网站约定的令牌生成规则生成自动登录令牌包括:
    从第二网站的登陆域配置信息中读取预设加密算法以及密钥;
    基于读取到的所述预设加密算法以及密钥针对与第二网站约定的令牌生成参数进行计算生成作为所述自动登录令牌的随机字符串;
    其中,所述令牌生成参数包括以下内容中的一个或者多个的组合:
    所述第一登录账户、第一网站的登录域名称、自动登录令牌的生成时间。
  5. 一种多网站间的自动登录方法,应用于第二网站的服务器,其特征在于,该方法包括:
    当接收到来自第一网站的用户侧客户端的针对本地的目标页面的访问请求时,查询与所述用户在所述第一网站上的第一登录账户存在绑定关系的第二登录账户的登录状态;其中,所述访问请求携带所述第一网站的服务器基于约定的令牌生成规则生成的自动登录令牌;
    如果所述第二登录账户为未登录状态,基于与所述第一网站约定的令牌验证规则针对所述自动登录令牌进行验证;
    当所述自动登录令牌验证通过时,授权所述客户端使用所述第二登录账户在本地执行自动登录,并在登录成功后向所述客户端发送所述目标页面的页面数据以触发所述客户端跳转至所述目标页面。
  6. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    如果所述第二登录账户为已登录状态,向所述客户端发送所述目标页面的页面数据以触发所述客户端跳转至所述目标页面。
  7. 根据权利要求5所述的方法,其特征在于,所述方法还包括:
    当所述自动登录令牌验证失败时,向所述客户端下发本地主动登录 入口的url地址,以触发所述客户端跳转至与所述本地主动登录入口的url地址对应的登录页面,使用所述第二登录账户完成主动登录。
  8. 根据权利要求5所述的方法,其特征在于,所述与第一网站约定的令牌验证规则为存储在本地登陆域配置信息中的预设解密算法以及密钥;
    所述基于与所述第一网站约定的令牌验证规则针对所述自动登录令牌进行验证包括:
    从本地的登陆域配置信息中读取预设解密算法以及密钥;
    基于读取到的预设解密算法以及密钥针对所述自动登录令牌进行解密,并验证解密后生成的参数是否为与所述第一网站约定的令牌生成参数;如果是,则所述自动登录令牌验证通过;
    其中,所述令牌生成参数包括以下内容中的一个或者多个的组合:
    所述第一登录账户、第一网站的登录域名称、自动登录令牌的生成时间。
  9. 一种多网站间的自动登录装置,应用于第一网站的服务器,其特征在于,该装置包括:
    第一查询模块,用于当接收到来自用户侧客户端的针对第二网站上的目标页面的访问请求时,查询用户在所述第一网站上的第一登录账户的登录状态;
    生成模块,用于在所述第一登录账户为已登录状态,基于与第二网站约定的令牌生成规则生成自动登录令牌;
    下发模块,用于为所述客户端构建并下发第一自动登录链接,所述第一自动登录链接包含所述第二网站的自动登录入口的url地址以及所述自动登录令牌,以使所述客户端访问该第一自动登录链接向第二网站的自动登录入口发送携带所述自动登陆令牌的针对所述目标页面的访 问请求,并在所述第二网站的服务器针对所述自动登录令牌验证通过后,授权所述客户端使用与所述第一登录账户存在绑定关系的第二登录账户在第二网站执行自动登录并跳转至所述目标页面。
  10. 根据权利要求9所述的装置,其特征在于,所述下发模块进一步用于:
    在接收到来自所述用户侧客户端的针对第二网站的资源访问请求时,为所述客户端构建并下发第二自动登录链接,所述第二自动登录链接包含本地自动登录入口的url地址以及所述客户端请求的资源所在的第二网站上的目标页面的url地址,以使所述客户端访问该第二自动登录链接向本地自动登录入口发送所述针对所述目标页面的访问请求。
  11. 根据权利要求9所述的装置,其特征在于,所述下发模块进一步用于:
    如果所述第一登录账户为未登录状态,向所述客户端下发本地主动登录入口的url地址,以触发所述客户端跳转至与所述本地主动登录入口的url地址对应的登录页面,使用所述第一登录账户完成主动登录。
  12. 根据权利要求9所述的装置,其特征在于,所述与第二网站约定的令牌生成规则包括存储在第二网站的登陆域配置信息中的预设加密算法以及密钥;
    所述生成模块具体用于:
    从第二网站的登陆域配置信息中读取预设加密算法以及密钥;
    基于读取到的所述预设加密算法以及密钥针对与第二网站约定的令牌生成参数进行计算生成作为所述自动登录令牌的随机字符串;
    其中,所述令牌生成参数包括以下内容中的一个或者多个的组合:
    所述第一登录账户、第一网站的登录域名称、自动登录令牌的生成时间。
  13. 一种多网站间的自动登录装置,应用于第二网站的服务器,其特征在于,该装置包括:
    第二查询模块,用于当接收到来自第一网站的用户侧客户端的针对本地的目标页面的访问请求时,查询与所述用户在所述第一网站上的第一登录账户存在绑定关系的第二登录账户的登录状态;其中,所述访问请求携带所述第一网站的服务器基于约定的令牌生成规则生成的自动登录令牌;
    验证模块,用于如果所述第二登录账户为未登录状态,基于与所述第一网站约定的令牌验证规则针对所述自动登录令牌进行验证;
    授权模块,用于当所述自动登录令牌验证通过时,授权所述客户端使用所述第二登录账户在本地执行自动登录,并在登录成功后向所述客户端发送所述目标页面的页面数据以触发所述客户端跳转至所述目标页面。
  14. 根据权利要求13所述的装置,其特征在于,所述授权模块进一步用于包括:
    如果所述第二登录账户为已登录状态,向所述客户端发送所述目标页面的页面数据以触发所述客户端跳转至所述目标页面。
  15. 根据权利要求13所述的装置,其特征在于,所述验证模块进一步用于:
    当所述自动登录令牌验证失败时,向所述客户端下发本地主动登录入口的url地址,以触发所述客户端跳转至与所述本地主动登录入口的url地址对应的登录页面,使用所述第二登录账户完成主动登录。
  16. 根据权利要求13所述的装置,其特征在于,所述与第一网站约定的令牌验证规则为存储在本地登陆域配置信息中的预设解密算法以及密钥;
    所述验证模块具体用于:
    从本地的登陆域配置信息中读取预设解密算法以及密钥;
    基于读取到的预设解密算法以及密钥针对所述自动登录令牌进行解密,并验证解密后生成的参数是否为与所述第一网站约定的令牌生成参数;如果是,则所述自动登录令牌验证通过;
    其中,所述令牌生成参数包括以下内容中的一个或者多个的组合:
    所述第一登录账户、第一网站的登录域名称、自动登录令牌的生成时间。
PCT/CN2017/079868 2016-05-09 2017-04-10 多网站间的自动登录方法及装置 WO2017193742A1 (zh)

Priority Applications (8)

Application Number Priority Date Filing Date Title
SG11201809238PA SG11201809238PA (en) 2016-05-09 2017-04-10 Automatic login method and device between multiple websites
MYPI2018001860A MY199771A (en) 2016-05-09 2017-04-10 Automatic login method and device between multiple websites
KR1020187035563A KR102429633B1 (ko) 2016-05-09 2017-04-10 다수의 웹사이트들 간의 자동 로그인 방법 및 장치
JP2018559233A JP6921121B2 (ja) 2016-05-09 2017-04-10 自動ログイン方法及び複数のウェブサイト間のデバイス
EP17795360.1A EP3457627B1 (en) 2016-05-09 2017-04-10 Automatic login method and device between multiple websites
PH12018502333A PH12018502333A1 (en) 2016-05-09 2018-11-06 Automatic login method and device between multiple websites
US16/184,679 US10785206B2 (en) 2016-05-09 2018-11-08 Automatic login method and device between multiple websites
US16/722,591 US10785207B2 (en) 2016-05-09 2019-12-20 Automatic login method and device between multiple websites

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610302819.2A CN107359996B (zh) 2016-05-09 2016-05-09 多网站间的自动登录方法及装置
CN201610302819.2 2016-05-09

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/184,679 Continuation US10785206B2 (en) 2016-05-09 2018-11-08 Automatic login method and device between multiple websites

Publications (1)

Publication Number Publication Date
WO2017193742A1 true WO2017193742A1 (zh) 2017-11-16

Family

ID=60266194

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/079868 WO2017193742A1 (zh) 2016-05-09 2017-04-10 多网站间的自动登录方法及装置

Country Status (10)

Country Link
US (2) US10785206B2 (zh)
EP (1) EP3457627B1 (zh)
JP (1) JP6921121B2 (zh)
KR (1) KR102429633B1 (zh)
CN (2) CN107359996B (zh)
MY (1) MY199771A (zh)
PH (1) PH12018502333A1 (zh)
SG (2) SG11201809238PA (zh)
TW (1) TWI659313B (zh)
WO (1) WO2017193742A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109933734A (zh) * 2019-02-28 2019-06-25 广州华多网络科技有限公司 一种页面的跳转方法、装置、系统及存储介质

Families Citing this family (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516135B (zh) * 2015-12-08 2020-02-21 腾讯科技(深圳)有限公司 用于账号登录的方法和装置
CN107196892B (zh) * 2016-03-15 2020-03-06 阿里巴巴集团控股有限公司 一种网站登录方法和装置
US10587618B2 (en) * 2017-11-14 2020-03-10 Microsoft Technology Licensing, Llc Dual binding
CN107743134A (zh) * 2017-11-28 2018-02-27 湖北三新文化传媒有限公司 登录信息处理方法、客户端、服务器及存储介质
CN107995214B (zh) * 2017-12-19 2021-07-20 深圳市创梦天地科技有限公司 一种网站登录方法及相关设备
CN107948214A (zh) * 2018-01-17 2018-04-20 北京网信云服信息科技有限公司 一种共享登录方法及装置
CN108776923A (zh) * 2018-06-05 2018-11-09 深圳壹账通智能科技有限公司 订单支付方法、系统、计算机设备和存储介质
CN108769041A (zh) * 2018-06-06 2018-11-06 深圳壹账通智能科技有限公司 登录方法、系统、计算机设备和存储介质
CN109165498A (zh) * 2018-08-01 2019-01-08 成都康赛信息技术有限公司 一种去中心化式点对点统一认证方法
CN109379324B (zh) * 2018-08-21 2021-12-14 中至数据集团股份有限公司 网站访问方法、装置、可读存储介质及计算机设备
CN109246094B (zh) * 2018-08-27 2021-03-19 中国联合网络通信集团有限公司 用户终端的验证方法、装置及存储介质
CN109359446B (zh) * 2018-09-27 2019-11-05 天涯社区网络科技股份有限公司 一种互联网跨域登录验证方法
CN111104651A (zh) * 2018-10-29 2020-05-05 中国移动通信集团云南有限公司 多岗位用户不同应用系统间互访方法及装置
CN109842616B (zh) * 2018-12-29 2021-09-17 卓米私人有限公司 账号绑定方法、装置及服务器
CN111385267B (zh) * 2018-12-29 2022-06-21 金联汇通信息技术有限公司 应用的授权控制方法、装置及电子设备
US11245684B2 (en) * 2019-02-12 2022-02-08 Verizon Patent And Licensing Inc. User enrollment and authentication across providers having trusted authentication and identity management services
CN109936579A (zh) * 2019-03-21 2019-06-25 广东瑞恩科技有限公司 单点登录方法、装置、设备及计算机可读存储介质
CN109962919A (zh) * 2019-03-29 2019-07-02 联想(北京)有限公司 系统访问方法及网络系统
CN110162943A (zh) * 2019-04-16 2019-08-23 上海达龙信息科技有限公司 一种账号自动登录方法及系统、存储介质及服务器
US20220209271A1 (en) 2019-05-08 2022-06-30 Kolon Industries, Inc. Radical scavenger, method for preparing same, and membrane-electrode assembly containing same
CN110247901A (zh) * 2019-05-29 2019-09-17 苏宁云计算有限公司 跨平台免密登录访问的方法、系统及设备
CN110489957B (zh) * 2019-08-05 2021-09-14 北京秒针人工智能科技有限公司 访问请求的管理方法和计算机存储介质
CN111079129B (zh) * 2019-12-11 2023-02-28 中国电子科技集团公司第三十八研究所 一种智慧城市综合管理指挥系统
CN111343189A (zh) * 2020-03-05 2020-06-26 安徽科大国创软件科技有限公司 一种实现多个既有web系统统一登录的方法
CN113497708B (zh) * 2020-03-18 2022-11-08 大唐移动通信设备有限公司 一种证书申请方法及装置
US11283802B2 (en) * 2020-03-30 2022-03-22 International Business Machines Corporation Autonomous application programming interface claim requirements discovery
CN111464533A (zh) * 2020-03-31 2020-07-28 山东浪潮通软信息科技有限公司 访问问题界面的系统及方法
CN111444551B (zh) * 2020-04-25 2023-06-13 中信银行股份有限公司 账户的注册与登录方法、装置、电子设备及可读存储介质
CN111581071B (zh) * 2020-05-09 2023-12-19 北京百度网讯科技有限公司 数据处理方法、装置、设备以及存储介质
CN111600888B (zh) * 2020-05-18 2022-08-26 海尔优家智能科技(北京)有限公司 用于登录验证的方法、装置和登录验证系统
CN113765869B (zh) * 2020-08-18 2023-06-30 北京沃东天骏信息技术有限公司 一种登录方法、装置、服务端及存储介质
CN112231691A (zh) * 2020-09-29 2021-01-15 新华三信息安全技术有限公司 一种设备登录方法、装置及系统
US20220103556A1 (en) * 2020-09-30 2022-03-31 Goodwell Technologies, Inc. Secure private network navigation
CN112231674A (zh) * 2020-10-20 2021-01-15 北京思特奇信息技术股份有限公司 一种url地址的跳转验证方法、系统及电子设备
CN112507320A (zh) * 2020-12-10 2021-03-16 东莞市盟大塑化科技有限公司 访问控制方法、装置、系统、电子设备和存储介质
CN114844657B (zh) * 2021-01-15 2023-06-27 华为技术有限公司 网站登录方法、通信系统和电子设备
CN113392386B (zh) * 2021-06-30 2022-11-04 未鲲(上海)科技服务有限公司 业务系统的登录方法、装置、计算机设备和存储介质
CN113761509B (zh) * 2021-09-18 2024-01-19 中国银行股份有限公司 iframe验证登录方法及装置
CN113569229B (zh) * 2021-09-18 2021-12-24 北京金堤科技有限公司 同步登录方法和装置、以及存储介质和电子设备
CN114157434A (zh) * 2021-11-30 2022-03-08 中国光大银行股份有限公司 登录验证方法、装置、电子设备及存储介质
CN115037545A (zh) * 2022-06-14 2022-09-09 江苏银承网络科技股份有限公司 一种免密授权登陆网站的方法、装置及存储介质
CN115242511B (zh) * 2022-07-22 2024-04-12 成都中科大旗软件股份有限公司 一种多环境应用管理平台及管理方法
CN116257840B (zh) * 2022-12-28 2023-10-20 南京邮电大学盐城大数据研究院有限公司 一种基于大数据的登录信息查询管理系统及方法
CN115865379B (zh) * 2023-02-27 2023-05-30 广东省信息工程有限公司 无状态分布式鉴权方法、客户端、鉴权服务器及介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102882903A (zh) * 2011-07-12 2013-01-16 腾讯科技(深圳)有限公司 一种多网站应用信息获取方法及系统
US20130081125A1 (en) * 2011-09-23 2013-03-28 Loyal3 Holdings, Inc. User Login With Redirect To Home Network
CN103053174A (zh) * 2010-06-17 2013-04-17 Lg电子株式会社 图像显示设备和操作图像显示设备的方法
CN103457738A (zh) * 2013-08-30 2013-12-18 优视科技有限公司 基于浏览器的登陆处理方法及系统
CN103533447A (zh) * 2013-10-30 2014-01-22 乐视致新电子科技(天津)有限公司 一种访问网站页面的方法和装置

Family Cites Families (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7055091B1 (en) * 1999-01-20 2006-05-30 Avaya Inc. System and method for establishing relationships between hypertext reference and electronic mail program incorporating the same
ATE370458T1 (de) * 2000-11-09 2007-09-15 Ibm Verfahren und system zur web-basierten cross- domain berechtigung mit einmaliger anmeldung
JP4615247B2 (ja) * 2004-05-07 2011-01-19 株式会社日立製作所 コンピュータシステム
US8490168B1 (en) * 2005-10-12 2013-07-16 At&T Intellectual Property I, L.P. Method for authenticating a user within a multiple website environment to provide secure access
US8700788B2 (en) * 2006-08-18 2014-04-15 Smarticon Technologies, Llc Method and system for automatic login initiated upon a single action with encryption
US8276190B1 (en) * 2008-08-19 2012-09-25 Google Inc. Cross-domain authentication
CN101771534B (zh) * 2008-12-30 2012-02-29 财团法人工业技术研究院 网络浏览器的单一登录方法及其系统
US9124566B2 (en) * 2009-06-23 2015-09-01 Microsoft Technology Licensing, Llc Browser plug-in for secure credential submission
TW201209623A (en) * 2010-08-24 2012-03-01 Hon Hai Prec Ind Co Ltd Verification system and method for login
KR101770297B1 (ko) * 2010-09-07 2017-09-05 삼성전자주식회사 온라인 서비스 접속 방법 및 그 장치
US8261090B1 (en) * 2011-09-28 2012-09-04 Google Inc. Login to a computing device based on facial recognition
KR20130055116A (ko) * 2011-11-18 2013-05-28 주식회사 네오위즈인터넷 자동 로그인 기능을 제공하는 방법 및 서버
US9325696B1 (en) * 2012-01-31 2016-04-26 Google Inc. System and method for authenticating to a participating website using locally stored credentials
CN103428179B (zh) * 2012-05-18 2016-09-28 阿里巴巴集团控股有限公司 一种登录多域名网站的方法、系统以及装置
US9203829B1 (en) * 2012-07-18 2015-12-01 Google Inc. Unified user login
US9027097B2 (en) * 2013-02-06 2015-05-05 Dropbox, Inc. Client application assisted automatic user log in
US20140245411A1 (en) * 2013-02-22 2014-08-28 Nokia Corporation Method and apparatus for providing account-less access via an account connector platform
JP5846143B2 (ja) * 2013-03-11 2016-01-20 株式会社リコー 自動ログイン処理システム、自動ログイン処理装置及び自動ログイン処理プログラム
US20140279444A1 (en) * 2013-03-15 2014-09-18 @Pay Ip Holdings Llc Peer to peer email based financial transactions
CN104348612A (zh) * 2013-07-23 2015-02-11 腾讯科技(深圳)有限公司 一种基于移动终端的第三方网站登录方法和移动终端
CN104348777B (zh) * 2013-07-24 2019-04-09 腾讯科技(深圳)有限公司 一种移动终端对第三方服务器的访问控制方法及系统
CN104580074B (zh) * 2013-10-14 2018-08-24 阿里巴巴集团控股有限公司 客户端应用的登录方法及其相应的服务器
CN104038503B (zh) * 2014-06-24 2018-01-02 北京奇虎科技有限公司 跨网站登录的方法,装置和系统
JP2017521934A (ja) * 2014-06-27 2017-08-03 ジェラード リンGerard Lin クライアントとサーバとの間の相互検証の方法
CN105472052B (zh) * 2014-09-03 2019-12-31 阿里巴巴集团控股有限公司 一种跨域服务器的登录方法和系统
CN104378376B (zh) * 2014-11-18 2019-02-26 深圳中兴网信科技有限公司 基于soa的单点登录方法、认证服务器和浏览器
CN104869127B (zh) * 2015-06-24 2018-09-04 郑州悉知信息科技股份有限公司 一种网站登录方法、扫码客户端及服务器
CN105430102B (zh) * 2015-12-28 2018-11-06 东软集团股份有限公司 SaaS网站与第三方系统的集成方法、系统及其装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103053174A (zh) * 2010-06-17 2013-04-17 Lg电子株式会社 图像显示设备和操作图像显示设备的方法
CN102882903A (zh) * 2011-07-12 2013-01-16 腾讯科技(深圳)有限公司 一种多网站应用信息获取方法及系统
US20130081125A1 (en) * 2011-09-23 2013-03-28 Loyal3 Holdings, Inc. User Login With Redirect To Home Network
CN103457738A (zh) * 2013-08-30 2013-12-18 优视科技有限公司 基于浏览器的登陆处理方法及系统
CN103533447A (zh) * 2013-10-30 2014-01-22 乐视致新电子科技(天津)有限公司 一种访问网站页面的方法和装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109933734A (zh) * 2019-02-28 2019-06-25 广州华多网络科技有限公司 一种页面的跳转方法、装置、系统及存储介质
CN109933734B (zh) * 2019-02-28 2021-04-30 广州方硅信息技术有限公司 一种页面的跳转方法、装置、系统及存储介质

Also Published As

Publication number Publication date
EP3457627A1 (en) 2019-03-20
MY199771A (en) 2023-11-22
EP3457627B1 (en) 2021-08-04
EP3457627A4 (en) 2019-10-16
SG10202101952XA (en) 2021-04-29
US10785206B2 (en) 2020-09-22
CN107359996A (zh) 2017-11-17
CN107359996B (zh) 2020-05-05
US10785207B2 (en) 2020-09-22
US20190097996A1 (en) 2019-03-28
JP6921121B2 (ja) 2021-08-18
SG11201809238PA (en) 2018-11-29
JP2019522261A (ja) 2019-08-08
KR102429633B1 (ko) 2022-08-04
PH12018502333A1 (en) 2019-07-29
KR20190003764A (ko) 2019-01-09
CN111783067A (zh) 2020-10-16
TWI659313B (zh) 2019-05-11
TW201740285A (zh) 2017-11-16
CN111783067B (zh) 2023-09-08
US20200127995A1 (en) 2020-04-23

Similar Documents

Publication Publication Date Title
WO2017193742A1 (zh) 多网站间的自动登录方法及装置
WO2017157177A1 (zh) 一种网站登录方法和装置
TWI439883B (zh) 在聯合環境中供識別提供者用之數位權利管理(drm)致能之策略管理
KR101929598B1 (ko) 운영체제 및 애플리케이션 사이에서 사용자 id의 공유 기법
JP4746266B2 (ja) ネットワーク・ロケーション中のサブ・ロケーションについてのユーザの認証の方法およびシステム
US11019068B2 (en) Quorum-based access management
US10003587B2 (en) Authority transfer system, method, and authentication server system by determining whether endpoints are in same or in different web domain
CN112136303B (zh) 用于耗时操作的刷新令牌的安全委托
US9923906B2 (en) System, method and computer program product for access authentication
US10291605B2 (en) Validation for requests
US20070234410A1 (en) Enhanced security for electronic communications
US20180091490A1 (en) Authentication framework for a client of a remote database
TW201025068A (en) Digital rights management (DRM)-enabled policy management for a service provider in a federated environment
EP3483760A1 (en) Brokered delegation of credentials using trusted execution environments
US9210155B2 (en) System and method of extending a host website
CN112883357A (zh) 无状态登录鉴权方法和装置
WO2022262322A1 (zh) 认证方法、装置、系统、电子设备及存储介质
US20140007197A1 (en) Delegation within a computing environment
CN105656856A (zh) 资源管理方法和装置
US9521146B2 (en) Proof of possession for web browser cookie based security tokens
KR101066729B1 (ko) 네트워크 위치의 하위 위치에 대한 사용자의 인증을 위한 방법 및 시스템
Buranasaksee et al. A generalized model for internet-based access control systems with delegation support
Paul et al. Serverless Web Applications with AWS Amplify

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 2018559233

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17795360

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 20187035563

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2017795360

Country of ref document: EP

Effective date: 20181210