CN106302606B - Across the application access method and device of one kind - Google Patents
Across the application access method and device of one kind Download PDFInfo
- Publication number
- CN106302606B CN106302606B CN201510308538.3A CN201510308538A CN106302606B CN 106302606 B CN106302606 B CN 106302606B CN 201510308538 A CN201510308538 A CN 201510308538A CN 106302606 B CN106302606 B CN 106302606B
- Authority
- CN
- China
- Prior art keywords
- application
- user
- bill
- identities
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/567—Integrating service provisioning from a plurality of service providers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses across the application access method and devices of one kind.The method includes receiving the access request that the request that the first application is sent allows the user of the second application to access first application;It include the user identifier of the user of the described first application identities applied and second application in the access request;According to the application identities of first application, authentication is carried out to first application;If authentication passes through, according to the user identifier of the user of second application, account information is inquired, the account information belongs to the user of second application, logs in described first using required account information;The account information that will acquire is sent to first application, indicates that first application allows the user of second application to access first application.User's operation can be simplified by means of the present invention, improve the safety of account information.
Description
Technical field
The present invention relates to video coding and decoding technology fields, more particularly to a kind of across application access method and device.
Background technique
Multiple applications are had in a usual enterprise, different functions is realized by different applications.Under normal conditions, in order to
The safety of resource information in protection application could access application after user needs to carry out login authentication.
For the centralized management for realizing application, the login authentication to each application is usually completed by centralized management platform and is worked.Example
Such as, after inputting account information in the login interface of application A when user's access is using A, the account information is sent to using A
Centralized management platform is authenticated;After certification passes through, using A, then the message that certification passes through is sent to by centralized management platform
Resource in its extent of competence is provided using A for the user according to the account information of user.When user wants that the interface from application A asks
Ask access using B, i.e., when user wants directly to jump access using B from application A, user then needs to enter the login interface using B,
Then input logs in the account information for applying B, and after equally completing certification by centralized management platform, user is just accessible to apply B.
As it can be seen that user needs to remember the account information of different applications in the prior art, and accessing each application
When be required to input account information, this be only user make troubles, but also may be because user input account information when, hold
It is easily stolen by unauthorized person, and causes account information dangerous.
Summary of the invention
The embodiment of the invention provides across the application access method and device of one kind, to solve presently, there are access application
It makes troubles to user and the unsafe problem of account information.
The embodiment of the invention provides across the application access methods of one kind, comprising:
Receive the access request that the request that the first application is sent allows the user of the second application to access first application;Its
In, the access request is the user of second application when the interface of second application requests access to the described first application
Trigger what first application generated;It include the application identities and described second of first application in the access request
The user identifier of the user of application;
According to the application identities of first application, authentication is carried out to first application;
If authentication passes through, according to the user identifier of the user of second application, account information, the account are inquired
Number information belongs to the user of second application, logs in described first and apply required account information;
The account information that will acquire is sent to first application, indicates that first application allows described second to answer
User's access first application.
Further, the embodiment of the invention also provides across the application access devices of one kind, comprising:
First receiving module allows the user of the second application to access described first for receiving the request that the first application is sent
The access request of application;Wherein, the access request is that the user of second application requests at the interface of second application
It accesses and triggers what first application generated when the described first application;It include the application of first application in the access request
The user identifier of the user of mark and second application;
Authentication module carries out identity to first application and recognizes for the application identities according to first application
Card;
Enquiry module, according to the user identifier of the user of second application, inquires account if passing through for authentication
Number information, the account information belong to the user of second application, log in described first and apply required account information;
First sending module, the account information for will acquire are sent to first application, instruction described first
It is applied using allowing the user of second application to access described first.
The present invention has the beneficial effect that:
In inventive embodiments, after user's successful access one application, another in access authority is in application, be not necessarily to
User inputs account information, so can simplify user's operation, accesses application for user and brings convenience;Because inputting account without user
Number information, can also be improved the safety of account information.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this
For the those of ordinary skill in field, without creative efforts, it can also be obtained according to these attached drawings other
Attached drawing.
Fig. 1 show one of flow diagram across application access method in the embodiment of the present invention one;
Fig. 2 show two of the flow diagram across application access method in the embodiment of the present invention two;
Fig. 3 show one of schematic diagram across application access device in the embodiment of the present invention three;
Fig. 4 show two of the schematic diagram across application access device in the embodiment of the present invention three.
Specific embodiment
The embodiment of the invention provides across the application access method of one kind, in the technical solution described in the embodiment of the present invention, by
In user from the second application access first in application, from first application to centralized management platform request allow the user access, and
Confirm in identity of the centralized management platform to the first application, when the first application of confirmation is credible, just user is allowed to access first
Using.So when across application access, inputting account information, letter without user in technical solution provided in an embodiment of the present invention
User's operation is changed, also, has also avoided because user inputs account information caused by the account information of account information agency not
The problem of safety.
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into
It is described in detail to one step, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole implementation
Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts
All other embodiment, shall fall within the protection scope of the present invention.
Embodiment one:
As shown in Figure 1, it is the flow diagram across application access method in the embodiment of the present invention one, institute's this method can be wrapped
Include following steps:
Step 101: receiving the visit that the request that the first application is sent allows the user of the second application to access first application
Ask request;Wherein, the access request is described in the described second user applied requests access at the interface of second application
Trigger what first application generated when the first application;It include the application identities of first application in the access request, with
And the user identifier of the user of second application.
Wherein, user identifier can be the account information that user logs in the second application.
Wherein, if user can log in centralized management platform, each in access authority in centralized management platform in application,
User is logged in the account of the application in its extent of competence as primary account number by the account that user can be logged in centralized management platform
It is considered as from account, and establishes primary account number and respectively from the corresponding relationship between account, then the user identifier in step 101 is to use
The primary account number at family.
Certainly, it should be noted that any can uniquely indicate that the information of user identity can be used as user identifier, this hair
It is bright not limit this.
Step 102: according to the application identities of first application, authentication being carried out to first application.
Step 103: if authentication passes through, according to the user identifier of the user of second application, inquiry account letter
Breath, the account information belong to the user of second application, log in described first using required account information.
Wherein, to any user, the user identifier and the account respectively applied within the scope of the user right that are stored with the user
The corresponding relationship of number information can inquire the account information for logging in the first application according to the corresponding relationship.
Step 104: the account information that will acquire is sent to first application, indicates that first application allows institute
State user's access first application of the second application.
Further, to realize the authentication to the first application, step 102, specifically includes the following steps:
Step A1: according to the application identities of first application, the bill of first application is generated, is wrapped in the bill
Include the application identities and password information of first application.
Wherein, in one embodiment, application identities can be application numbers and/or Apply Names, and password information can be with
The information being randomly generated, such as the character generated at random;Password information can also be timestamp when generating bill.Any use
In the application of verifying first, whether believable information is suitable for the embodiment of the present invention, and which is not limited by the present invention.
Step A2: the bill of generation is sent to first application, indicates ticket described in first analytic application
According to and return parsing after application identities, and parsing after password information.
Step A3: the application identities after receiving the parsing that first application returns, and the password information after parsing.
Step A4: judge whether parsing after application identities it is identical with the application identities in the bill and parsing after
Password information it is identical as the password information in the bill.
Step A5: if parsing after application identities it is identical with the application identities in the bill and parsing after password
Information is identical as the password information in the bill, it is determined that the first application identity certification passes through;Otherwise, it determines described
The certification of one application identity does not pass through.
Further, in order to improve the safety that access first is applied, including the resource in the first application, in step A1
After generating bill, the bill can also be encrypted;Step A2 then can be performed to send the encrypted bill
To first application.Can reach in this way prevents unauthorized access caused by due to bill is maliciously intercepted and captured or forged.
Further, for convenient for the first application understand authentication as a result, after executing step 102, and in step
According to the user identifier of the user of second application in 103, inquires before account information, following steps can also be performed:
Step B1: the authentication result for carrying out authentication to first application is sent to first application.
Step B2: receive described first apply confirm authentication result be authentication by when the account information that sends obtain
Take request.
After executing step B2, it is after receiving the account information acquisition request, according to described that step 103, which can be performed,
The user identifier of the user of second application, inquires account information.
It further, is the safety for guaranteeing account information, the account letter that step 104 can be executed specifically to will acquire
After encryption for information, it is sent to first application.
To sum up, another application in the embodiment of the present invention, after user's successful access one application, in access authority
When, account information is inputted without user, so can simplify user's operation, application is accessed for user and brings convenience;Because without using
Family inputs account information, can also be improved the safety of account information.
Embodiment two
As shown in Fig. 2, the embodiment of the present invention by user from application A access using for B, to provided in an embodiment of the present invention
Across application access method is illustrated, method includes the following steps:
Step 201: user P sends the jump request that B is applied in access in application A.
Wherein, which is, for example, user using the connection triggering clicked to enter in A using B.
Step 202: after receiving jump request using B, sending request to centralized management platform allows user P to access application
The access request of B includes the user identifier of the application identities and user P using B in the access request.
Step 203: centralized management platform receives access request.
Step 204: centralized management platform generates the bill for applying B, the bill according to the application identities using B
In include application identities and password information using B.
Step 205: centralized management platform encrypts the bill of generation.
Step 206: encrypted bill is sent to using B by centralized management platform.
Step 207: bill being decrypted after receiving the bill that centralized management platform is sent using B, and is parsed in bill
Application identities and password information.
Step 208: the password information after the application identities and parsing after parsing being sent to centralized management platform using B.
Step 209: centralized management platform receives the application identities after the parsing sent using B, and the password after parsing
Information.
Step 210: centralized management platform judges whether the application identities after parsing and the application identities phase in the bill
With and parse after password information it is identical as the password information in the bill;If so, determining logical using B authentication
It crosses, applies B authentication difference mistake if otherwise determining, and send identity authentication result to using B.
Step 211: after receiving identity authentication result using B, if identity authentication result passes through for authentication, sending
Account information acquisition request gives centralized management platform, is to step on if authentication does not pass through to application A transmission if identity authentication result
The login interface of B is applied in record.
Step 212: after centralized management platform receives the account information acquisition request sent using B, according to the user P
User identifier, inquiry belong to user P, log in using account information needed for B.
Step 213: centralized management platform will be sent to after the account information inquired encryption using B.
Step 214: after receiving the encrypted account information that centralized management platform is sent using B, account information being carried out
Decryption, and the resource in the extent of competence of user P is provided for user P according to the account information after decryption.
In the embodiment of the present invention, when across application access, account information is inputted without user, user's operation can be simplified,
It can be improved the safety of access by the encryption of encryption and account information to bill.
Embodiment three
Based on identical inventive concept, the embodiment of the present invention also provides a kind of across application access device, as shown in figure 3, being
The schematic diagram of the device, the device include:
First receiving module 301 allows described in user's access of the second application for receiving first using the request sent
The access request of first application;Wherein, the access request is the user of second application at the interface of second application
It requests access to and triggers what first application generated when the described first application;It include first application in the access request
The user identifier of the user of application identities and second application;
Authentication module 302 carries out identity to first application for the application identities according to first application
Certification;
Enquiry module 303, according to the user identifier of the user of second application, is looked into if passing through for authentication
Account information is ask, the account information belongs to the user of second application, logs in described first using required account
Information;
First sending module 304, the account information for will acquire are sent to first application, indicate described the
One application allows the user of second application to access first application.
Preferably, the authentication module 302, specifically includes:
Generation unit 305 generates the bill of first application, institute for the application identities according to first application
Stating in bill includes the described first application identities and password information applied;
Transmission unit 306 indicates the first application solution for the bill generated to be sent to first application
It analyses the bill and returns to the application identities after parsing, and the password information after parsing;
Receiving unit 307, the application identities after parsing for receiving the first application return, and the mouth after parsing
Enable information;
Judging unit 308, for judging whether that the application identities after parsing are identical as the application identities in the bill, simultaneously
And the password information after parsing is identical as the password information in the bill;
Authentication unit 309, if identical as the application identities in the bill for the application identities after parsing and parse
Password information afterwards is identical as the password information in the bill, it is determined that the first application identity certification passes through;Otherwise, really
The fixed first application identity certification does not pass through.
Preferably, as shown in figure 4, described device further include:
Encrypting module 310, after the bill that described first applies is generated for the generation unit 305, to the bill
It is encrypted;
First sending module 304, specifically for the encrypted bill is sent to first application.
Preferably, as shown in figure 4, described device further include:
Second sending module 311, it is right for the authentication module 302 according to the application identities of first application
After first application carries out authentication, the user identifier for the user that the enquiry module 303 is applied according to described second,
It inquires before account information, the authentication result for carrying out authentication to first application is sent to first application;
Second receiving module 312 applies the hair when confirming that authentication result passes through for authentication for receiving described first
The account information acquisition request sent;
The enquiry module 303, after receiving the account information acquisition request, according to second application
User user identifier, inquire account information.
Preferably, described to send the first sending module 304 after encrypting specifically for the account information that will acquire
To first application.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
It will be understood by those skilled in the art that the embodiment of the present invention can provide as method, apparatus (device) or computer journey
Sequence product.Therefore, complete hardware embodiment, complete software embodiment or combining software and hardware aspects can be used in the present invention
The form of embodiment.Moreover, it wherein includes the calculating of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the flow chart of device (device) and computer program product
And/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions
And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to
Enable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing units to generate
One machine so that by the instruction that the processor of computer or other programmable data processing units executes generate for realizing
The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing units with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing units, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.
Claims (10)
1. a kind of across application access method, which is characterized in that the described method includes:
Centralized management platform receives the visit that the request that the first application is sent allows the user of the second application to access first application
Ask request;Wherein, the access request is described in the described second user applied requests access at the interface of second application
Trigger what first application generated when the first application;It include the application identities of first application in the access request, with
And the user identifier of the user of second application;Wherein, it is described first application and second application be same enterprise difference
The application, the centralized management platform are used to carry out login authentication to first application and the second application;
According to the application identities of first application, authentication is carried out to first application;
If authentication passes through, according to the user identifier of the user of second application, account information, the account letter are inquired
Breath belongs to the user of second application, logs in described first using required account information;
The account information that will acquire is sent to first application, indicates that first application allows second application
User's access first application.
2. the method according to claim 1, wherein it is described according to it is described first application application identities, to institute
It states the first application and carries out authentication, specifically include:
According to the application identities of first application, the bill of first application is generated, includes described first in the bill
The application identities and password information of application;
The bill of generation is sent to first application, bill described in first analytic application is indicated and returns to parsing
Password information after application identities afterwards, and parsing;
Application identities after receiving the parsing that first application returns, and the password information after parsing;
Judge whether parsing after application identities it is identical with the application identities in the bill and parse after password information and
Password information in the bill is identical;
If parsing after application identities it is identical with the application identities in the bill and parse after password information and the ticket
Password information in is identical, it is determined that the first application identity certification passes through;Otherwise, it determines first application identity is recognized
Card does not pass through.
3. according to the method described in claim 2, it is characterized in that, it is described generate it is described first application bill after, it is described
Method further include:
The bill is encrypted;
It is described that the bill of generation is sent to first application, it specifically includes:
The encrypted bill is sent to first application.
4. the method according to claim 1, wherein it is described according to it is described first application application identities, to institute
After stating the first application progress authentication, the user identifier of the user according to second application inquires account information
Before, the method also includes:
The authentication result for carrying out authentication to first application is sent to first application;And
Receive described first apply confirm authentication result be authentication by when the account information acquisition request that sends;
The user identifier of the user according to second application, inquires account information, specifically includes:
After receiving the account information acquisition request, according to the user identifier of the user of second application, inquiry account letter
Breath.
5. method according to any one of claims 1-4, which is characterized in that the account information that will acquire is sent
To first application, specifically include:
After the account information encryption that will acquire, it is sent to first application.
6. a kind of across application access device, which is characterized in that described device includes:
First receiving module allows the user of the second application to access first application for receiving the request that the first application is sent
Access request;Wherein, the access request is that the user of second application requests access at the interface of second application
Trigger what first application generated when the described first application;It include the application mark of first application in the access request
The user identifier of the user of knowledge and second application;
Authentication module carries out authentication to first application for the application identities according to first application;
Enquiry module, if passing through for authentication, according to the user identifier of the user of second application, inquiry account letter
Breath, the account information belong to the user of second application, log in described first using required account information;
First sending module, the account information for will acquire are sent to first application, indicate first application
Allow user's access of second application first application.
7. device according to claim 6, which is characterized in that the authentication module specifically includes:
Generation unit generates the bill of first application, in the bill for the application identities according to first application
Application identities and password information including first application;
Transmission unit indicates described in first analytic application for the bill generated to be sent to first application
Bill simultaneously returns to the application identities after parsing, and the password information after parsing;
Receiving unit, the application identities after parsing for receiving the first application return, and the password information after parsing;
Judging unit, for judging whether that the application identities after parsing are identical as the application identities in the bill and parse
Password information afterwards is identical as the password information in the bill;
Authentication unit, if the mouth after and parsing identical as the application identities in the bill for the application identities after parsing
Enable information identical as the password information in the bill, it is determined that the first application identity certification passes through;Otherwise, it determines described
The certification of first application identity does not pass through.
8. device according to claim 7, which is characterized in that described device further include:
Encrypting module encrypts the bill after generating the bill that described first applies for the generation unit;
First sending module, specifically for the encrypted bill is sent to first application.
9. device according to claim 6, which is characterized in that described device further include:
Second sending module is answered for the authentication module according to the application identities of first application described first
After carrying out authentication, the enquiry module inquires account information according to the user identifier of the user of second application
Before, the authentication result for carrying out authentication to first application is sent to first application;
Second receiving module, for receive described first apply confirm authentication result be authentication by when the account that sends
Information acquisition request;
The enquiry module, after receiving the account information acquisition request, according to the user of second application
User identifier, inquire account information.
10. according to the device any in claim 6-9, which is characterized in that first sending module, being specifically used for will
After the account information encryption obtained, it is sent to first application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510308538.3A CN106302606B (en) | 2015-06-08 | 2015-06-08 | Across the application access method and device of one kind |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510308538.3A CN106302606B (en) | 2015-06-08 | 2015-06-08 | Across the application access method and device of one kind |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106302606A CN106302606A (en) | 2017-01-04 |
CN106302606B true CN106302606B (en) | 2019-11-29 |
Family
ID=57659156
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510308538.3A Active CN106302606B (en) | 2015-06-08 | 2015-06-08 | Across the application access method and device of one kind |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106302606B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10659464B2 (en) * | 2017-05-10 | 2020-05-19 | Microsoft Technology Licensing, Llc | Securely authenticating a bot user |
CN107920060B (en) * | 2017-10-11 | 2020-06-05 | 北京京东尚科信息技术有限公司 | Data access method and device based on account |
CN108965331B (en) * | 2018-08-29 | 2021-01-05 | 腾讯科技(深圳)有限公司 | Login verification method, device and system |
CN109660563A (en) * | 2019-02-02 | 2019-04-19 | 北京奇安信科技有限公司 | A kind of application access control method, system and medium |
CN110868467B (en) * | 2019-11-12 | 2022-06-03 | 广州大白互联网科技有限公司 | Network certificate synchronization method, system and storage medium based on network certificate platform |
CN113487328A (en) * | 2021-07-27 | 2021-10-08 | 中国银行股份有限公司 | Service identity switching method and device |
CN114553573B (en) * | 2022-02-23 | 2024-05-28 | 中国工商银行股份有限公司 | Identity authentication method and device |
CN114301717B (en) * | 2022-03-08 | 2022-07-05 | 苏州万店掌网络科技有限公司 | Single sign-on method, device, equipment and storage medium |
CN115189975B (en) * | 2022-09-14 | 2022-12-27 | 中化现代农业有限公司 | Login method, login device, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103384254A (en) * | 2013-07-19 | 2013-11-06 | 北京小米科技有限责任公司 | Application account login method, server, client and system |
CN103544220A (en) * | 2013-09-29 | 2014-01-29 | 北京航空航天大学 | Method and device for recommending applications |
CN104065616A (en) * | 2013-03-20 | 2014-09-24 | 中国移动通信集团公司 | Single sign-on method and system |
CN104113533A (en) * | 2014-07-02 | 2014-10-22 | 百度在线网络技术(北京)有限公司 | Login authorization method and device |
CN104618364A (en) * | 2015-01-23 | 2015-05-13 | 联想(北京)有限公司 | Information processing method, electronic device and server |
CN104660557A (en) * | 2013-11-19 | 2015-05-27 | 腾讯科技(深圳)有限公司 | Operation processing method and device |
-
2015
- 2015-06-08 CN CN201510308538.3A patent/CN106302606B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104065616A (en) * | 2013-03-20 | 2014-09-24 | 中国移动通信集团公司 | Single sign-on method and system |
CN103384254A (en) * | 2013-07-19 | 2013-11-06 | 北京小米科技有限责任公司 | Application account login method, server, client and system |
CN103544220A (en) * | 2013-09-29 | 2014-01-29 | 北京航空航天大学 | Method and device for recommending applications |
CN104660557A (en) * | 2013-11-19 | 2015-05-27 | 腾讯科技(深圳)有限公司 | Operation processing method and device |
CN104113533A (en) * | 2014-07-02 | 2014-10-22 | 百度在线网络技术(北京)有限公司 | Login authorization method and device |
CN104618364A (en) * | 2015-01-23 | 2015-05-13 | 联想(北京)有限公司 | Information processing method, electronic device and server |
Also Published As
Publication number | Publication date |
---|---|
CN106302606A (en) | 2017-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106302606B (en) | Across the application access method and device of one kind | |
CN106850699B (en) | A kind of mobile terminal login authentication method and system | |
CN103795692B (en) | Open authorization method, system and certification authority server | |
CN109274652B (en) | Identity information verification system, method and device and computer storage medium | |
CN107239688B (en) | The purview certification method and system in Docker mirror image warehouse | |
CN104980477B (en) | Data access control method and system under cloud storage environment | |
CN102457509B (en) | Cloud computing resources safety access method, Apparatus and system | |
CN106790183A (en) | Logging on authentication method of calibration, device | |
CN111800378B (en) | Login authentication method, device, system and storage medium | |
CN106060078B (en) | User information encryption method, register method and verification method applied to cloud platform | |
CN108347428B (en) | Registration system, method and device of application program based on block chain | |
CN110430065B (en) | Application service calling method, device and system | |
CN111753014B (en) | Identity authentication method and device based on block chain | |
CN102098162A (en) | Method for performing safety management of operation and maintenance based on security token | |
KR101817152B1 (en) | Method for providing trusted right information, method for issuing user credential including trusted right information, and method for obtaining user credential | |
CN108768963A (en) | The communication means and system of trusted application and safety element | |
CN111541542A (en) | Request sending and verifying method, device and equipment | |
EP3552131A1 (en) | Password security | |
CN106992859B (en) | Bastion machine private key management method and device | |
CN109862009A (en) | A kind of client identity method of calibration and device | |
CN113505353B (en) | Authentication method, authentication device, authentication equipment and storage medium | |
CN109587098B (en) | Authentication system and method, and authorization server | |
CN106529216B (en) | Software authorization system and software authorization method based on public storage platform | |
CN109802927A (en) | A kind of security service providing method and device | |
CN117807567A (en) | Software function authorization method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |