WO2023241060A1 - Procédé et appareil d'accès à des données - Google Patents

Procédé et appareil d'accès à des données Download PDF

Info

Publication number
WO2023241060A1
WO2023241060A1 PCT/CN2023/074316 CN2023074316W WO2023241060A1 WO 2023241060 A1 WO2023241060 A1 WO 2023241060A1 CN 2023074316 W CN2023074316 W CN 2023074316W WO 2023241060 A1 WO2023241060 A1 WO 2023241060A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
verification
identification information
stored
browser fingerprint
Prior art date
Application number
PCT/CN2023/074316
Other languages
English (en)
Chinese (zh)
Inventor
陈锋
卜广宝
Original Assignee
京东科技信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 京东科技信息技术有限公司 filed Critical 京东科技信息技术有限公司
Publication of WO2023241060A1 publication Critical patent/WO2023241060A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Definitions

  • the mechanism of the single Token solution cannot prevent the risk of data leakage caused by users sharing links, or the REFERER solution verification is usually used in scenarios where the number of user visits is counted. There are certain risks in using REFERER to prevent hotlinking, and some scenarios cannot be verified. Furthermore, using In the scheme of recording visitor IP or physical address, the user's IP address may change when switching networks, and there is a possibility of misjudgment if the method of recording the last user IP is chosen.
  • Some embodiments of the present disclosure provide a data access method, which method includes: receiving an access request for a data page from an integration party, where the access request includes identification information and browser setting information for accessing the data page; based on the browser setting information , generate the browser fingerprint information corresponding to the integrator; based on the pre-stored verification information, perform information verification on the identification information and browser fingerprint information, and generate verification results; based on the verification results, send the corresponding data access results to the integrator .
  • Some embodiments of the present disclosure provide a computer program product, including a computer program that, when executed by a processor, implements the data access method described in any of the above embodiments.
  • Figure 1 is an exemplary system architecture diagram in which an embodiment of the present disclosure may be applied;
  • Figure 2 is a flow chart of one embodiment of a data access method according to the present disclosure
  • Figure 3 is a schematic diagram of an application scenario of the data access method according to the present disclosure.
  • Figure 4 is a flow chart of an embodiment of information verification of identification information and browser fingerprint information according to the present disclosure
  • Figure 5 is a flow chart of another embodiment of a data access method according to the present disclosure.
  • Figure 6 is a flow chart of yet another embodiment of a data access method according to the present disclosure.
  • Figure 7 is a schematic structural diagram of an embodiment of a data access device according to the present disclosure.
  • FIG. 1 shows an exemplary system architecture 100 to which a data access method and a data access apparatus according to embodiments of the present disclosure can be applied.
  • Users can interact with servers 101, 102, 103 belonging to the same server cluster through the network 107 through the terminal devices 104, 105, 106 to receive or send information, etc.
  • Various applications can be installed on the terminal devices 104, 105, and 106, such as item display applications, data analysis applications, search applications, etc.
  • the server can be hardware or software.
  • the server can be various electronic devices that provide various services for terminal devices.
  • the server is software, it can be implemented as multiple software or software modules that provide various services for the terminal device, or it can be implemented as a single software or software module that provides various services for the terminal device. There are no specific limitations here.
  • the data access method provided by the embodiment of the present disclosure can be executed by the terminal devices 104, 105, and 106 and the servers 101, 102, and 103.
  • data access devices are provided in terminal devices 104, 105, 106 and servers 101, 102, 103.
  • the execution subject on which the data access method runs can be used as the collected Chengfang provides data access functions to the integrator so that the integrator can access the locally stored data pages.
  • the user can perform login authentication on the integrator's terminal display interface. After completing the login authentication, enter the data page in the above execution subject. access operations.
  • the integrator can determine the corresponding identification information based on the user's login authentication information. The identification information can be used to identify the user and corresponds to the user's login authentication information one-to-one.
  • the integrator further obtains the browser used when the user enters the access operation, and obtains the browser setting information corresponding to the browser.
  • Step 230 Based on the pre-stored verification information, perform information verification on the identification information and browser fingerprint information, and generate a verification result.
  • the verification information can include identification information and browser fingerprints corresponding to different integrators. information, and each integrator corresponds to an identification information and browser fingerprint information.
  • the above execution subject can perform information verification on the identification information and browser fingerprint information corresponding to the access request and the identification information and browser fingerprint information corresponding to multiple integrators in the verification information, and determine the identification information and browser fingerprint information corresponding to multiple integrators in the verification information. Whether the identification information and the browser fingerprint information include both the identification information and the browser fingerprint information corresponding to the access request, that is, it is determined whether the identification information and the browser fingerprint information corresponding to the access request both exist in the verification information.
  • this step after the above execution subject generates the corresponding verification results through information verification, it can determine the data access results corresponding to the verification results based on different verification results, and send the data access results to the integration party. , so that the integrator can display the data access results to the user through the terminal display interface.
  • the above execution subject generates a successful verification result through information verification, obtains the corresponding data page according to the access request, uses the data page as the corresponding data access result, and sends the data access result to the integration party. , so that the integrator can render the data page and display the data page to the user through the terminal display interface.
  • the above execution subject determines that the access request does not have permission to access, generates prompt information as the corresponding data access result, and sends the prompt information to the integrator so that the integrator can Prompt information is rendered, Prompt information is displayed to the user through the terminal display interface.
  • the prompt information is used to prompt the user that he or she does not have access rights to the data page.
  • the integrated party 302 can perform information verification on the identification information and the new browser fingerprint information based on the locally pre-stored verification information, and can determine that the new browser fingerprint information is different from the browser fingerprint information received last time. Then a verification result of failed verification is generated.
  • the integrated party 302 may also generate prompt information indicating that the user does not have access rights to access the data page, and send the prompt information to the terminal 303 used by user B.
  • the above-mentioned execution subject first receives an access request for the data page from the integration party.
  • the access request includes the identification information and browser setting information of the accessed data page, and then generates the integration based on the browser setting information.
  • Browser fingerprint information corresponding to the party and based on the pre-stored verification information, information verification is performed on the identification information and browser fingerprint information to generate verification results.
  • the integration party Send the corresponding data access results, use the integrator's corresponding identification information and browser fingerprint information to perform information verification at the same time, prevent other users of the integrator from using the links corresponding to the data page to share, causing security issues, and improve the security and safety of data access.
  • Reliability and using the identification information and browser fingerprint information corresponding to the integrator, on the premise that the login status between the integrator and the integrated party is the same, it can be applied to the scenario of page nested output and joint login, and can solve the problem of page data embedding. It covers the issues of secure communication in cross-domain or non-cross-domain situations, improving the accuracy and security of data access in joint login scenarios.
  • Figure 4 shows a flow chart of an embodiment of information verification of identification information and browser fingerprint information, that is, the above-mentioned step 230, based on pre-stored verification information, verification of identification information and browser fingerprint information.
  • Information verification and generating verification results may include the following steps:
  • Step 410 Determine whether at least one prestored identification information in the prestored verification information includes identification information.
  • the above-mentioned execution subject can read the locally stored pre-stored verification information.
  • the verification information can include at least one pre-stored identification information and pre-stored browser fingerprint information corresponding to the pre-stored identification information. Different pre-stored identification information can To identify different users, the pre-stored identification information corresponds to the pre-stored browser fingerprint information one-to-one, and the verification information can be stored in the distributed cache.
  • the execution subject may compare the identification information corresponding to the access request with at least one pre-stored identification information in the verification information, and determine whether the at least one pre-stored identification information in the pre-stored verification information includes identification information.
  • Step 420 In response to determining that at least one prestored identification information in the prestored verification information includes identification information, determine the prestored browser fingerprint information corresponding to the identification information from the prestored verification information.
  • the execution subject determines through judgment that at least one pre-stored identification information in the pre-stored verification information includes identification information, then the pre-stored identification information can be determined from the verification information, and the pre-stored identification information can be determined from the verification information.
  • the pre-stored browser fingerprint information corresponding to the identification information is used as the pre-stored browser fingerprint information corresponding to the identification information.
  • Step 430 Compare the pre-stored browser fingerprint information corresponding to the identification information with the browser fingerprint information.
  • the above execution subject After the above execution subject obtains the pre-stored browser fingerprint information corresponding to the identification information, it can compare the pre-stored browser fingerprint information corresponding to the identification information with the browser fingerprint information, and determine whether the pre-stored browser fingerprint information is the same as the browser fingerprint information. Whether the information is the same.
  • Step 440 In response to determining that the pre-stored browser fingerprint information corresponding to the identification information is the same as the browser fingerprint information, generate a verification result indicating that the verification is successful.
  • the above execution subject determines through comparison that the pre-stored browser fingerprint information corresponding to the identification information is the same as the browser fingerprint information, and then it is determined that the integration party corresponding to the identification information and the browser fingerprint information has the access rights to access the data page. A successful verification result can be generated.
  • step 230 based on the pre-stored verification information, performs information verification on the identification information and the browser fingerprint information, and generates the verification results, may include the following steps: Step 450, in response to determining the pre-stored identification information corresponding to The browser fingerprint information is different from the browser fingerprint information, resulting in a verification result that fails the verification.
  • the execution subject determines through judgment that the pre-stored browser fingerprint information corresponding to the identification information is different from the browser fingerprint information, and then determines that the browser fingerprint information corresponding to the access request is not the pre-stored browser fingerprint stored in the verification information. Information and generate verification results indicating that the verification failed.
  • the identification information and the browser fingerprint information are verified at the same time. If the browser fingerprint information does not meet the verification conditions, a verification result that fails the verification will be generated and the information verification will not pass, which improves the efficiency of the verification. Security and reliability of data access.
  • the above-mentioned step 230 based on the pre-stored verification information, performs information verification on the identification information and browser fingerprint information to generate a verification result, which may include the following steps: Step: Step 460, in response to determining that at least one pre-stored identification information in the pre-stored verification information does not include identification information, correspondingly store the identification information and the browser fingerprint information into the pre-stored verification information, and generate a successful verification result.
  • the above execution subject judges the pre-stored identification information and determines that at least one pre-stored identification information in the pre-stored verification information does not include identification information. Then it is determined that the user corresponding to the identification information initiates data access for the first time, and the identification information can be The information is correspondingly bound to the browser fingerprint information, stored in the corresponding pre-stored verification information, and a verification result of successful verification is generated.
  • the login status between the integrating party and the integrated party can be communicated.
  • identification information and browser fingerprint information can solve the problem of secure communication of page data nested in cross-domain or non-cross-domain situations, and improve the accuracy of data access in joint login scenarios. sex and safety.
  • Figure 5 shows a flow chart of another embodiment of a data access method, which may include the following steps:
  • Step 510 Receive the integration party's access request for the data page.
  • the above-mentioned execution subject parses the received access request and obtains the corresponding identification information.
  • the above execution subject can obtain the expiration time corresponding to the identification information in the local storage based on the identification information.
  • the expiration time can represent the duration of the valid state corresponding to the identification information.
  • the expiration time is set for the identification information when the identification information is generated. , the identification information corresponds to the expiration time one-to-one.
  • Step 540 Based on the current time and the expiration time corresponding to the identification information, determine whether the identification information is in a valid state.
  • the above execution subject can obtain the current time, compare the current time with the expiration time corresponding to the identification information, and determine whether the current time is within the expiration time, that is, determine whether the identification information is in a valid state.
  • Step 560 Based on the verification result, send the corresponding data access result to the integration party.
  • Step 560 in this embodiment can be performed in a manner similar to step 240 in the embodiment shown in FIG. 2, and will not be described again here.
  • the identification information and the browser fingerprint information will be verified, further improving the security of data access. and reliability.
  • the above data access method may also include the following steps: Step 570 , in response to determining that the identification information is in an invalid state, generate prompt information for prompting that the permission has expired.
  • Figure 6 shows a flow chart of yet another embodiment of a data access method, which may include the following steps:
  • Step 610 Receive the integration party's request for obtaining identification information.
  • the integrator can display the user login interface through the terminal display interface.
  • the user can perform login authentication on the integrator's user login interface and enter the corresponding login information.
  • the integrator can generate a request for obtaining identification information based on the user's login information. , and sends the acquisition request to the above-mentioned execution subject.
  • the acquisition request may include the login information received by the integration party.
  • the above execution subject can parse the acquisition request and obtain the login information in the acquisition request.
  • the above execution subject can generate identification information corresponding to the login information based on the login information.
  • the identification information corresponds to the login information one-to-one and is used to identify the user corresponding to the login information.
  • the above execution subject after the above execution subject generates the identification information, it can set the expiration time corresponding to the identification information according to the setting requirements and the generation time.
  • the expiration time indicates that the identification information is in an invalid state within a time after this moment and no longer has access rights.
  • the above execution subject can generate identification information and the expiration time corresponding to the identification information through any method supported by relevant technologies, and this disclosure does not specifically limit this.
  • Step 630 Receive the integration party's access request for the data page.
  • Step 640 Based on the browser setting information, generate browser fingerprint information corresponding to the integrator.
  • Step 640 in this embodiment can be performed in a similar manner to step 220 in the embodiment shown in FIG. 2, and will not be described again here.
  • Step 650 Based on the pre-stored verification information, perform information verification on the identification information and browser fingerprint information, and generate a verification result.
  • Step 660 Based on the verification result, send the corresponding data access result to the integration party.
  • Step 660 in this embodiment can be performed in a similar manner to step 240 in the embodiment shown in FIG. 2, and will not be described again here.
  • the present disclosure provides an embodiment of a data access device.
  • This device embodiment corresponds to the method embodiment shown in Figure 2.
  • the data access device 700 in this embodiment may include: a receiving module 710 , a generating module 720 , a verification module 730 and a sending module 740 .
  • the generation module 720 is configured to generate browser fingerprint information corresponding to the integration party based on the browser setting information;
  • the sending module 740 is configured to send the corresponding data access result to the integrating party based on the verification result.
  • the verification information includes at least one pre-stored identification information and pre-stored browser fingerprint information corresponding to the pre-stored identification information; and the verification module is further configured to: determine the pre-stored verification Whether at least one pre-stored identification information in the information includes identification information; in response to determining that at least one pre-stored identification information in the pre-stored verification information
  • the stored identification information includes identification information
  • the pre-stored browser fingerprint information corresponding to the identification information is determined from the pre-stored verification information; the pre-stored browser fingerprint information corresponding to the identification information is compared with the browser fingerprint information; in response to determining that the identification information corresponds to
  • the pre-stored browser fingerprint information is the same as the browser fingerprint information, and a successful verification result is generated.
  • the verification module is further configured to: in response to determining that at least one pre-stored identification information in the pre-stored verification information does not include identification information, correspond the identification information to the browser fingerprint information Store the pre-stored verification information and generate a successful verification result.
  • the verification module is further configured to: in response to determining that the pre-stored browser fingerprint information corresponding to the identification information is different from the browser fingerprint information, generate a verification result indicating that the verification fails.
  • the device further includes: an acquisition module, configured to: in response to obtaining the identification information from the access request, obtain the expiration time corresponding to the identification information; a judgment module, configured to: Based on the current time and the expiration time corresponding to the identification information, determine whether the identification information is in a valid state; and the verification module is further configured to: in response to determining that the identification information is in a valid state, based on the pre-stored verification information, compare the identification information and The browser fingerprint information is used for information verification and verification results are generated.
  • an acquisition module configured to: in response to obtaining the identification information from the access request, obtain the expiration time corresponding to the identification information
  • a judgment module configured to: Based on the current time and the expiration time corresponding to the identification information, determine whether the identification information is in a valid state
  • the verification module is further configured to: in response to determining that the identification information is in a valid state, based on the pre-stored verification information, compare the identification information and The browser fingerprint information is used for information verification and verification results are
  • the generation module is further configured to: in response to determining that the identification information is in an invalid state, generate prompt information for prompting that the permission has expired.
  • the receiving module is further configured to: receive an acquisition request for identification information from the integrator, where the acquisition request includes the login information received by the integrator; the generating module is further configured to: : Based on the login information in the acquisition request, generate the identification information and the expiration time corresponding to the identification information.
  • the above execution subject first receives an access request from the integration party for the data page.
  • the access request includes the identification information and browser setting information of the accessed data page, and then generates based on the browser setting information.
  • the browser fingerprint information corresponding to the integrator and based on the pre-stored verification information, performs information verification on the identification information and browser fingerprint information, generates verification results, and finally sends the corresponding data access results to the integrator based on the verification results.
  • using the identification information and browser corresponding to the integrator Fingerprint information is verified at the same time to prevent other users of the integrator from using the link corresponding to the data page to share, thereby improving the security and reliability of data access.
  • Terminal devices in embodiments of the present disclosure may include, but are not limited to, mobile terminals such as smart screens, laptops, PADs (tablets), PMPs (portable multimedia players), vehicle-mounted terminals (such as vehicle-mounted navigation terminals), etc., and mobile terminals such as Fixed terminals for digital TV, desktop computers, etc.
  • mobile terminals such as smart screens, laptops, PADs (tablets), PMPs (portable multimedia players), vehicle-mounted terminals (such as vehicle-mounted navigation terminals), etc.
  • mobile terminals such as Fixed terminals for digital TV, desktop computers, etc.
  • the terminal device shown in FIG. 8 is only an example and should not impose any restrictions on the functions and scope of use of the embodiments of the present disclosure.
  • the computer-readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, device or device, or any combination thereof. More specific examples of computer readable storage media may include, but are not limited to: an electrical connection having one or more wires, a portable computer disk, a hard drive, random access memory (RAM), read only memory (ROM), removable Programmd read-only memory (EPROM or flash memory), fiber optics, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
  • a computer-readable storage medium may be any tangible medium that contains or stores a program for use by or in connection with an instruction execution system, apparatus, or device.
  • each block of the block diagram and/or flowchart illustration, and combinations of blocks in the block diagram and/or flowchart illustration can be implemented by special purpose hardware-based systems that perform the specified functions or operations. , or can be implemented using a combination of specialized hardware and computer instructions.
  • the units involved in the embodiments of the present disclosure can be implemented in software or hardware.
  • the described unit can also be provided in a processor, for example, it can be described as: a processor includes a receiving module, a generating module, a checking module and a sending module, where the names of these modules do not constitute Limitations on the module itself.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

Conformément à des modes de réalisation, la présente invention concerne un procédé et un appareil d'accès à des données. Le procédé d'accès à des données consiste à : premièrement, recevoir une demande d'accès d'une partie d'intégration pour une page de données, la demande d'accès comprenant des informations d'identification d'une page de données ayant fait l'objet d'un accès et des informations de réglage de navigateur ; ensuite, sur la base des informations de réglage de navigateur, générer des informations d'empreinte digitale de navigateur correspondant à la partie d'intégration ; effectuer une vérification d'informations sur les informations d'identification et les informations d'empreinte digitale de navigateur sur la base d'informations de vérification préstockées, de façon à générer un résultat de vérification ; et enfin, envoyer à la partie d'intégration un résultat d'accès à des données correspondant sur la base du résultat de vérification.
PCT/CN2023/074316 2022-06-16 2023-02-03 Procédé et appareil d'accès à des données WO2023241060A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210684373.X 2022-06-16
CN202210684373.XA CN115102744A (zh) 2022-06-16 2022-06-16 数据访问方法和装置

Publications (1)

Publication Number Publication Date
WO2023241060A1 true WO2023241060A1 (fr) 2023-12-21

Family

ID=83290266

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/074316 WO2023241060A1 (fr) 2022-06-16 2023-02-03 Procédé et appareil d'accès à des données

Country Status (2)

Country Link
CN (1) CN115102744A (fr)
WO (1) WO2023241060A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117544322A (zh) * 2024-01-10 2024-02-09 北京雪诺科技有限公司 浏览器的辨识方法、装置、设备及存储介质

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115102744A (zh) * 2022-06-16 2022-09-23 京东科技信息技术有限公司 数据访问方法和装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109587133A (zh) * 2018-11-30 2019-04-05 武汉烽火众智智慧之星科技有限公司 一种单点登录系统及方法
CN112100603A (zh) * 2020-09-15 2020-12-18 福建天晴在线互动科技有限公司 一种网站结合图形验证码的防御方法及其系统
CN112491776A (zh) * 2019-09-11 2021-03-12 华为技术有限公司 安全认证方法及相关设备
US11240255B1 (en) * 2018-01-31 2022-02-01 Intuit Inc. System and method to recognize unauthenticated visitors
CN115102744A (zh) * 2022-06-16 2022-09-23 京东科技信息技术有限公司 数据访问方法和装置

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6253325B1 (en) * 1998-04-15 2001-06-26 Hewlett-Packard Company Apparatus and method for securing documents posted from a web resource
CN107426181B (zh) * 2017-06-20 2019-09-17 竞技世界(北京)网络技术有限公司 恶意Web访问请求的拦截方法及装置
US11288398B2 (en) * 2019-06-03 2022-03-29 Jpmorgan Chase Bank, N.A. Systems, methods, and devices for obfuscation of browser fingerprint data on the world wide web
US10628576B1 (en) * 2019-08-20 2020-04-21 Capital One Services, Llc Computer-based platforms or systems, computing devices or components and/or computing methods for technological applications involving provision of a portal for managing user accounts having a login portal configured to defend against credential replay attacks
US11539746B2 (en) * 2020-02-18 2022-12-27 Td Ameritrade Ip Company, Inc. Methods and systems for browser spoofing mitigation
CN111541665A (zh) * 2020-04-16 2020-08-14 苏州浪潮智能科技有限公司 数据访问方法、装置、存储介质及集群式的安全管理平台
CN112261012A (zh) * 2020-09-30 2021-01-22 北京鸿联九五信息产业有限公司 一种浏览器、服务器以及网页访问方法
CN113239308B (zh) * 2021-05-26 2023-07-18 杭州安恒信息技术股份有限公司 一种页面访问方法、装置、设备及存储介质
CN113556343B (zh) * 2021-07-21 2022-01-11 江南信安(北京)科技有限公司 基于浏览器指纹识别的DDoS攻击防御方法及设备
CN114257430A (zh) * 2021-12-13 2022-03-29 以萨技术股份有限公司 一种单点登录系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11240255B1 (en) * 2018-01-31 2022-02-01 Intuit Inc. System and method to recognize unauthenticated visitors
CN109587133A (zh) * 2018-11-30 2019-04-05 武汉烽火众智智慧之星科技有限公司 一种单点登录系统及方法
CN112491776A (zh) * 2019-09-11 2021-03-12 华为技术有限公司 安全认证方法及相关设备
CN112100603A (zh) * 2020-09-15 2020-12-18 福建天晴在线互动科技有限公司 一种网站结合图形验证码的防御方法及其系统
CN115102744A (zh) * 2022-06-16 2022-09-23 京东科技信息技术有限公司 数据访问方法和装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117544322A (zh) * 2024-01-10 2024-02-09 北京雪诺科技有限公司 浏览器的辨识方法、装置、设备及存储介质
CN117544322B (zh) * 2024-01-10 2024-03-22 北京雪诺科技有限公司 浏览器的辨识方法、装置、设备及存储介质

Also Published As

Publication number Publication date
CN115102744A (zh) 2022-09-23

Similar Documents

Publication Publication Date Title
CN111639319B (zh) 用户资源授权方法、装置及计算机可读存储介质
US10681028B2 (en) Controlling access to resources on a network
CN108923908B (zh) 授权处理方法、装置、设备及存储介质
US9769266B2 (en) Controlling access to resources on a network
WO2023241060A1 (fr) Procédé et appareil d'accès à des données
TWI617166B (zh) 硬體資源存取系統及技術
US9125059B2 (en) Password-free, token-based wireless access
CN108965250B (zh) 一种数字证书安装方法及系统
CN112131021B (zh) 一种访问请求处理方法及装置
CN105229987A (zh) 主动联合的移动认证
CN109408250A (zh) 调用应用程序编程接口api方法、装置、电子设备
CN113542201B (zh) 一种用于互联网业务的访问控制方法与设备
CN112866385B (zh) 接口调用方法、装置、电子设备和存储介质
WO2023193572A1 (fr) Procédé et appareil de gestion de données, serveur, et support de stockage
JP7269486B2 (ja) 情報処理装置、情報処理方法及び情報処理プログラム
CN109951487A (zh) 一种Portal认证方法和装置
CN110855655B (zh) 一种信息验证方法、装置、设备和存储介质
CN113536365B (zh) 一种文件访问方法、装置、设备及介质
CN112543194B (zh) 移动终端登录方法、装置、计算机设备和存储介质
CN109462604A (zh) 一种数据传输方法、装置、设备及存储介质
CN112261659B (zh) 终端和服务器的控制方法、装置、终端和存储介质
CN114205099B (zh) 网页鉴权方法、电子设备及系统
US20220337584A1 (en) Information processing device, information processing method, and non-transitory computer readable storage medium
CN113641966B (zh) 一种应用集成方法、系统、设备及介质
CN116702108A (zh) 鉴权方法、装置和系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23822632

Country of ref document: EP

Kind code of ref document: A1