[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106302606B - Across the application access method and device of one kind - Google Patents

Across the application access method and device of one kind Download PDF

Info

Publication number
CN106302606B
CN106302606B CN201510308538.3A CN201510308538A CN106302606B CN 106302606 B CN106302606 B CN 106302606B CN 201510308538 A CN201510308538 A CN 201510308538A CN 106302606 B CN106302606 B CN 106302606B
Authority
CN
China
Prior art keywords
application
user
bill
identities
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510308538.3A
Other languages
Chinese (zh)
Other versions
CN106302606A (en
Inventor
王泽成
杜普洲
王滔
贺嘉
罗向阳
陶亚勋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Hunan Co Ltd
Original Assignee
China Mobile Group Hunan Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Hunan Co Ltd filed Critical China Mobile Group Hunan Co Ltd
Priority to CN201510308538.3A priority Critical patent/CN106302606B/en
Publication of CN106302606A publication Critical patent/CN106302606A/en
Application granted granted Critical
Publication of CN106302606B publication Critical patent/CN106302606B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/567Integrating service provisioning from a plurality of service providers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses across the application access method and devices of one kind.The method includes receiving the access request that the request that the first application is sent allows the user of the second application to access first application;It include the user identifier of the user of the described first application identities applied and second application in the access request;According to the application identities of first application, authentication is carried out to first application;If authentication passes through, according to the user identifier of the user of second application, account information is inquired, the account information belongs to the user of second application, logs in described first using required account information;The account information that will acquire is sent to first application, indicates that first application allows the user of second application to access first application.User's operation can be simplified by means of the present invention, improve the safety of account information.

Description

Across the application access method and device of one kind
Technical field
The present invention relates to video coding and decoding technology fields, more particularly to a kind of across application access method and device.
Background technique
Multiple applications are had in a usual enterprise, different functions is realized by different applications.Under normal conditions, in order to The safety of resource information in protection application could access application after user needs to carry out login authentication.
For the centralized management for realizing application, the login authentication to each application is usually completed by centralized management platform and is worked.Example Such as, after inputting account information in the login interface of application A when user's access is using A, the account information is sent to using A Centralized management platform is authenticated;After certification passes through, using A, then the message that certification passes through is sent to by centralized management platform Resource in its extent of competence is provided using A for the user according to the account information of user.When user wants that the interface from application A asks Ask access using B, i.e., when user wants directly to jump access using B from application A, user then needs to enter the login interface using B, Then input logs in the account information for applying B, and after equally completing certification by centralized management platform, user is just accessible to apply B.
As it can be seen that user needs to remember the account information of different applications in the prior art, and accessing each application When be required to input account information, this be only user make troubles, but also may be because user input account information when, hold It is easily stolen by unauthorized person, and causes account information dangerous.
Summary of the invention
The embodiment of the invention provides across the application access method and device of one kind, to solve presently, there are access application It makes troubles to user and the unsafe problem of account information.
The embodiment of the invention provides across the application access methods of one kind, comprising:
Receive the access request that the request that the first application is sent allows the user of the second application to access first application;Its In, the access request is the user of second application when the interface of second application requests access to the described first application Trigger what first application generated;It include the application identities and described second of first application in the access request The user identifier of the user of application;
According to the application identities of first application, authentication is carried out to first application;
If authentication passes through, according to the user identifier of the user of second application, account information, the account are inquired Number information belongs to the user of second application, logs in described first and apply required account information;
The account information that will acquire is sent to first application, indicates that first application allows described second to answer User's access first application.
Further, the embodiment of the invention also provides across the application access devices of one kind, comprising:
First receiving module allows the user of the second application to access described first for receiving the request that the first application is sent The access request of application;Wherein, the access request is that the user of second application requests at the interface of second application It accesses and triggers what first application generated when the described first application;It include the application of first application in the access request The user identifier of the user of mark and second application;
Authentication module carries out identity to first application and recognizes for the application identities according to first application Card;
Enquiry module, according to the user identifier of the user of second application, inquires account if passing through for authentication Number information, the account information belong to the user of second application, log in described first and apply required account information;
First sending module, the account information for will acquire are sent to first application, instruction described first It is applied using allowing the user of second application to access described first.
The present invention has the beneficial effect that:
In inventive embodiments, after user's successful access one application, another in access authority is in application, be not necessarily to User inputs account information, so can simplify user's operation, accesses application for user and brings convenience;Because inputting account without user Number information, can also be improved the safety of account information.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill in field, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 show one of flow diagram across application access method in the embodiment of the present invention one;
Fig. 2 show two of the flow diagram across application access method in the embodiment of the present invention two;
Fig. 3 show one of schematic diagram across application access device in the embodiment of the present invention three;
Fig. 4 show two of the schematic diagram across application access device in the embodiment of the present invention three.
Specific embodiment
The embodiment of the invention provides across the application access method of one kind, in the technical solution described in the embodiment of the present invention, by In user from the second application access first in application, from first application to centralized management platform request allow the user access, and Confirm in identity of the centralized management platform to the first application, when the first application of confirmation is credible, just user is allowed to access first Using.So when across application access, inputting account information, letter without user in technical solution provided in an embodiment of the present invention User's operation is changed, also, has also avoided because user inputs account information caused by the account information of account information agency not The problem of safety.
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into It is described in detail to one step, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole implementation Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts All other embodiment, shall fall within the protection scope of the present invention.
Embodiment one:
As shown in Figure 1, it is the flow diagram across application access method in the embodiment of the present invention one, institute's this method can be wrapped Include following steps:
Step 101: receiving the visit that the request that the first application is sent allows the user of the second application to access first application Ask request;Wherein, the access request is described in the described second user applied requests access at the interface of second application Trigger what first application generated when the first application;It include the application identities of first application in the access request, with And the user identifier of the user of second application.
Wherein, user identifier can be the account information that user logs in the second application.
Wherein, if user can log in centralized management platform, each in access authority in centralized management platform in application, User is logged in the account of the application in its extent of competence as primary account number by the account that user can be logged in centralized management platform It is considered as from account, and establishes primary account number and respectively from the corresponding relationship between account, then the user identifier in step 101 is to use The primary account number at family.
Certainly, it should be noted that any can uniquely indicate that the information of user identity can be used as user identifier, this hair It is bright not limit this.
Step 102: according to the application identities of first application, authentication being carried out to first application.
Step 103: if authentication passes through, according to the user identifier of the user of second application, inquiry account letter Breath, the account information belong to the user of second application, log in described first using required account information.
Wherein, to any user, the user identifier and the account respectively applied within the scope of the user right that are stored with the user The corresponding relationship of number information can inquire the account information for logging in the first application according to the corresponding relationship.
Step 104: the account information that will acquire is sent to first application, indicates that first application allows institute State user's access first application of the second application.
Further, to realize the authentication to the first application, step 102, specifically includes the following steps:
Step A1: according to the application identities of first application, the bill of first application is generated, is wrapped in the bill Include the application identities and password information of first application.
Wherein, in one embodiment, application identities can be application numbers and/or Apply Names, and password information can be with The information being randomly generated, such as the character generated at random;Password information can also be timestamp when generating bill.Any use In the application of verifying first, whether believable information is suitable for the embodiment of the present invention, and which is not limited by the present invention.
Step A2: the bill of generation is sent to first application, indicates ticket described in first analytic application According to and return parsing after application identities, and parsing after password information.
Step A3: the application identities after receiving the parsing that first application returns, and the password information after parsing.
Step A4: judge whether parsing after application identities it is identical with the application identities in the bill and parsing after Password information it is identical as the password information in the bill.
Step A5: if parsing after application identities it is identical with the application identities in the bill and parsing after password Information is identical as the password information in the bill, it is determined that the first application identity certification passes through;Otherwise, it determines described The certification of one application identity does not pass through.
Further, in order to improve the safety that access first is applied, including the resource in the first application, in step A1 After generating bill, the bill can also be encrypted;Step A2 then can be performed to send the encrypted bill To first application.Can reach in this way prevents unauthorized access caused by due to bill is maliciously intercepted and captured or forged.
Further, for convenient for the first application understand authentication as a result, after executing step 102, and in step According to the user identifier of the user of second application in 103, inquires before account information, following steps can also be performed:
Step B1: the authentication result for carrying out authentication to first application is sent to first application.
Step B2: receive described first apply confirm authentication result be authentication by when the account information that sends obtain Take request.
After executing step B2, it is after receiving the account information acquisition request, according to described that step 103, which can be performed, The user identifier of the user of second application, inquires account information.
It further, is the safety for guaranteeing account information, the account letter that step 104 can be executed specifically to will acquire After encryption for information, it is sent to first application.
To sum up, another application in the embodiment of the present invention, after user's successful access one application, in access authority When, account information is inputted without user, so can simplify user's operation, application is accessed for user and brings convenience;Because without using Family inputs account information, can also be improved the safety of account information.
Embodiment two
As shown in Fig. 2, the embodiment of the present invention by user from application A access using for B, to provided in an embodiment of the present invention Across application access method is illustrated, method includes the following steps:
Step 201: user P sends the jump request that B is applied in access in application A.
Wherein, which is, for example, user using the connection triggering clicked to enter in A using B.
Step 202: after receiving jump request using B, sending request to centralized management platform allows user P to access application The access request of B includes the user identifier of the application identities and user P using B in the access request.
Step 203: centralized management platform receives access request.
Step 204: centralized management platform generates the bill for applying B, the bill according to the application identities using B In include application identities and password information using B.
Step 205: centralized management platform encrypts the bill of generation.
Step 206: encrypted bill is sent to using B by centralized management platform.
Step 207: bill being decrypted after receiving the bill that centralized management platform is sent using B, and is parsed in bill Application identities and password information.
Step 208: the password information after the application identities and parsing after parsing being sent to centralized management platform using B.
Step 209: centralized management platform receives the application identities after the parsing sent using B, and the password after parsing Information.
Step 210: centralized management platform judges whether the application identities after parsing and the application identities phase in the bill With and parse after password information it is identical as the password information in the bill;If so, determining logical using B authentication It crosses, applies B authentication difference mistake if otherwise determining, and send identity authentication result to using B.
Step 211: after receiving identity authentication result using B, if identity authentication result passes through for authentication, sending Account information acquisition request gives centralized management platform, is to step on if authentication does not pass through to application A transmission if identity authentication result The login interface of B is applied in record.
Step 212: after centralized management platform receives the account information acquisition request sent using B, according to the user P User identifier, inquiry belong to user P, log in using account information needed for B.
Step 213: centralized management platform will be sent to after the account information inquired encryption using B.
Step 214: after receiving the encrypted account information that centralized management platform is sent using B, account information being carried out Decryption, and the resource in the extent of competence of user P is provided for user P according to the account information after decryption.
In the embodiment of the present invention, when across application access, account information is inputted without user, user's operation can be simplified, It can be improved the safety of access by the encryption of encryption and account information to bill.
Embodiment three
Based on identical inventive concept, the embodiment of the present invention also provides a kind of across application access device, as shown in figure 3, being The schematic diagram of the device, the device include:
First receiving module 301 allows described in user's access of the second application for receiving first using the request sent The access request of first application;Wherein, the access request is the user of second application at the interface of second application It requests access to and triggers what first application generated when the described first application;It include first application in the access request The user identifier of the user of application identities and second application;
Authentication module 302 carries out identity to first application for the application identities according to first application Certification;
Enquiry module 303, according to the user identifier of the user of second application, is looked into if passing through for authentication Account information is ask, the account information belongs to the user of second application, logs in described first using required account Information;
First sending module 304, the account information for will acquire are sent to first application, indicate described the One application allows the user of second application to access first application.
Preferably, the authentication module 302, specifically includes:
Generation unit 305 generates the bill of first application, institute for the application identities according to first application Stating in bill includes the described first application identities and password information applied;
Transmission unit 306 indicates the first application solution for the bill generated to be sent to first application It analyses the bill and returns to the application identities after parsing, and the password information after parsing;
Receiving unit 307, the application identities after parsing for receiving the first application return, and the mouth after parsing Enable information;
Judging unit 308, for judging whether that the application identities after parsing are identical as the application identities in the bill, simultaneously And the password information after parsing is identical as the password information in the bill;
Authentication unit 309, if identical as the application identities in the bill for the application identities after parsing and parse Password information afterwards is identical as the password information in the bill, it is determined that the first application identity certification passes through;Otherwise, really The fixed first application identity certification does not pass through.
Preferably, as shown in figure 4, described device further include:
Encrypting module 310, after the bill that described first applies is generated for the generation unit 305, to the bill It is encrypted;
First sending module 304, specifically for the encrypted bill is sent to first application.
Preferably, as shown in figure 4, described device further include:
Second sending module 311, it is right for the authentication module 302 according to the application identities of first application After first application carries out authentication, the user identifier for the user that the enquiry module 303 is applied according to described second, It inquires before account information, the authentication result for carrying out authentication to first application is sent to first application;
Second receiving module 312 applies the hair when confirming that authentication result passes through for authentication for receiving described first The account information acquisition request sent;
The enquiry module 303, after receiving the account information acquisition request, according to second application User user identifier, inquire account information.
Preferably, described to send the first sending module 304 after encrypting specifically for the account information that will acquire To first application.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
It will be understood by those skilled in the art that the embodiment of the present invention can provide as method, apparatus (device) or computer journey Sequence product.Therefore, complete hardware embodiment, complete software embodiment or combining software and hardware aspects can be used in the present invention The form of embodiment.Moreover, it wherein includes the calculating of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the flow chart of device (device) and computer program product And/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to Enable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing units to generate One machine so that by the instruction that the processor of computer or other programmable data processing units executes generate for realizing The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing units with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing units, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (10)

1. a kind of across application access method, which is characterized in that the described method includes:
Centralized management platform receives the visit that the request that the first application is sent allows the user of the second application to access first application Ask request;Wherein, the access request is described in the described second user applied requests access at the interface of second application Trigger what first application generated when the first application;It include the application identities of first application in the access request, with And the user identifier of the user of second application;Wherein, it is described first application and second application be same enterprise difference The application, the centralized management platform are used to carry out login authentication to first application and the second application;
According to the application identities of first application, authentication is carried out to first application;
If authentication passes through, according to the user identifier of the user of second application, account information, the account letter are inquired Breath belongs to the user of second application, logs in described first using required account information;
The account information that will acquire is sent to first application, indicates that first application allows second application User's access first application.
2. the method according to claim 1, wherein it is described according to it is described first application application identities, to institute It states the first application and carries out authentication, specifically include:
According to the application identities of first application, the bill of first application is generated, includes described first in the bill The application identities and password information of application;
The bill of generation is sent to first application, bill described in first analytic application is indicated and returns to parsing Password information after application identities afterwards, and parsing;
Application identities after receiving the parsing that first application returns, and the password information after parsing;
Judge whether parsing after application identities it is identical with the application identities in the bill and parse after password information and Password information in the bill is identical;
If parsing after application identities it is identical with the application identities in the bill and parse after password information and the ticket Password information in is identical, it is determined that the first application identity certification passes through;Otherwise, it determines first application identity is recognized Card does not pass through.
3. according to the method described in claim 2, it is characterized in that, it is described generate it is described first application bill after, it is described Method further include:
The bill is encrypted;
It is described that the bill of generation is sent to first application, it specifically includes:
The encrypted bill is sent to first application.
4. the method according to claim 1, wherein it is described according to it is described first application application identities, to institute After stating the first application progress authentication, the user identifier of the user according to second application inquires account information Before, the method also includes:
The authentication result for carrying out authentication to first application is sent to first application;And
Receive described first apply confirm authentication result be authentication by when the account information acquisition request that sends;
The user identifier of the user according to second application, inquires account information, specifically includes:
After receiving the account information acquisition request, according to the user identifier of the user of second application, inquiry account letter Breath.
5. method according to any one of claims 1-4, which is characterized in that the account information that will acquire is sent To first application, specifically include:
After the account information encryption that will acquire, it is sent to first application.
6. a kind of across application access device, which is characterized in that described device includes:
First receiving module allows the user of the second application to access first application for receiving the request that the first application is sent Access request;Wherein, the access request is that the user of second application requests access at the interface of second application Trigger what first application generated when the described first application;It include the application mark of first application in the access request The user identifier of the user of knowledge and second application;
Authentication module carries out authentication to first application for the application identities according to first application;
Enquiry module, if passing through for authentication, according to the user identifier of the user of second application, inquiry account letter Breath, the account information belong to the user of second application, log in described first using required account information;
First sending module, the account information for will acquire are sent to first application, indicate first application Allow user's access of second application first application.
7. device according to claim 6, which is characterized in that the authentication module specifically includes:
Generation unit generates the bill of first application, in the bill for the application identities according to first application Application identities and password information including first application;
Transmission unit indicates described in first analytic application for the bill generated to be sent to first application Bill simultaneously returns to the application identities after parsing, and the password information after parsing;
Receiving unit, the application identities after parsing for receiving the first application return, and the password information after parsing;
Judging unit, for judging whether that the application identities after parsing are identical as the application identities in the bill and parse Password information afterwards is identical as the password information in the bill;
Authentication unit, if the mouth after and parsing identical as the application identities in the bill for the application identities after parsing Enable information identical as the password information in the bill, it is determined that the first application identity certification passes through;Otherwise, it determines described The certification of first application identity does not pass through.
8. device according to claim 7, which is characterized in that described device further include:
Encrypting module encrypts the bill after generating the bill that described first applies for the generation unit;
First sending module, specifically for the encrypted bill is sent to first application.
9. device according to claim 6, which is characterized in that described device further include:
Second sending module is answered for the authentication module according to the application identities of first application described first After carrying out authentication, the enquiry module inquires account information according to the user identifier of the user of second application Before, the authentication result for carrying out authentication to first application is sent to first application;
Second receiving module, for receive described first apply confirm authentication result be authentication by when the account that sends Information acquisition request;
The enquiry module, after receiving the account information acquisition request, according to the user of second application User identifier, inquire account information.
10. according to the device any in claim 6-9, which is characterized in that first sending module, being specifically used for will After the account information encryption obtained, it is sent to first application.
CN201510308538.3A 2015-06-08 2015-06-08 Across the application access method and device of one kind Active CN106302606B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510308538.3A CN106302606B (en) 2015-06-08 2015-06-08 Across the application access method and device of one kind

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510308538.3A CN106302606B (en) 2015-06-08 2015-06-08 Across the application access method and device of one kind

Publications (2)

Publication Number Publication Date
CN106302606A CN106302606A (en) 2017-01-04
CN106302606B true CN106302606B (en) 2019-11-29

Family

ID=57659156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510308538.3A Active CN106302606B (en) 2015-06-08 2015-06-08 Across the application access method and device of one kind

Country Status (1)

Country Link
CN (1) CN106302606B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10659464B2 (en) * 2017-05-10 2020-05-19 Microsoft Technology Licensing, Llc Securely authenticating a bot user
CN107920060B (en) * 2017-10-11 2020-06-05 北京京东尚科信息技术有限公司 Data access method and device based on account
CN108965331B (en) * 2018-08-29 2021-01-05 腾讯科技(深圳)有限公司 Login verification method, device and system
CN109660563A (en) * 2019-02-02 2019-04-19 北京奇安信科技有限公司 A kind of application access control method, system and medium
CN110868467B (en) * 2019-11-12 2022-06-03 广州大白互联网科技有限公司 Network certificate synchronization method, system and storage medium based on network certificate platform
CN113487328A (en) * 2021-07-27 2021-10-08 中国银行股份有限公司 Service identity switching method and device
CN114553573B (en) * 2022-02-23 2024-05-28 中国工商银行股份有限公司 Identity authentication method and device
CN114301717B (en) * 2022-03-08 2022-07-05 苏州万店掌网络科技有限公司 Single sign-on method, device, equipment and storage medium
CN115189975B (en) * 2022-09-14 2022-12-27 中化现代农业有限公司 Login method, login device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103384254A (en) * 2013-07-19 2013-11-06 北京小米科技有限责任公司 Application account login method, server, client and system
CN103544220A (en) * 2013-09-29 2014-01-29 北京航空航天大学 Method and device for recommending applications
CN104065616A (en) * 2013-03-20 2014-09-24 中国移动通信集团公司 Single sign-on method and system
CN104113533A (en) * 2014-07-02 2014-10-22 百度在线网络技术(北京)有限公司 Login authorization method and device
CN104618364A (en) * 2015-01-23 2015-05-13 联想(北京)有限公司 Information processing method, electronic device and server
CN104660557A (en) * 2013-11-19 2015-05-27 腾讯科技(深圳)有限公司 Operation processing method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104065616A (en) * 2013-03-20 2014-09-24 中国移动通信集团公司 Single sign-on method and system
CN103384254A (en) * 2013-07-19 2013-11-06 北京小米科技有限责任公司 Application account login method, server, client and system
CN103544220A (en) * 2013-09-29 2014-01-29 北京航空航天大学 Method and device for recommending applications
CN104660557A (en) * 2013-11-19 2015-05-27 腾讯科技(深圳)有限公司 Operation processing method and device
CN104113533A (en) * 2014-07-02 2014-10-22 百度在线网络技术(北京)有限公司 Login authorization method and device
CN104618364A (en) * 2015-01-23 2015-05-13 联想(北京)有限公司 Information processing method, electronic device and server

Also Published As

Publication number Publication date
CN106302606A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
CN106302606B (en) Across the application access method and device of one kind
CN106850699B (en) A kind of mobile terminal login authentication method and system
CN103795692B (en) Open authorization method, system and certification authority server
CN109274652B (en) Identity information verification system, method and device and computer storage medium
CN107239688B (en) The purview certification method and system in Docker mirror image warehouse
CN104980477B (en) Data access control method and system under cloud storage environment
CN102457509B (en) Cloud computing resources safety access method, Apparatus and system
CN106790183A (en) Logging on authentication method of calibration, device
CN111800378B (en) Login authentication method, device, system and storage medium
CN106060078B (en) User information encryption method, register method and verification method applied to cloud platform
CN108347428B (en) Registration system, method and device of application program based on block chain
CN110430065B (en) Application service calling method, device and system
CN111753014B (en) Identity authentication method and device based on block chain
CN102098162A (en) Method for performing safety management of operation and maintenance based on security token
KR101817152B1 (en) Method for providing trusted right information, method for issuing user credential including trusted right information, and method for obtaining user credential
CN108768963A (en) The communication means and system of trusted application and safety element
CN111541542A (en) Request sending and verifying method, device and equipment
EP3552131A1 (en) Password security
CN106992859B (en) Bastion machine private key management method and device
CN109862009A (en) A kind of client identity method of calibration and device
CN113505353B (en) Authentication method, authentication device, authentication equipment and storage medium
CN109587098B (en) Authentication system and method, and authorization server
CN106529216B (en) Software authorization system and software authorization method based on public storage platform
CN109802927A (en) A kind of security service providing method and device
CN117807567A (en) Software function authorization method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant