CN109274685A - Multisystem login method, device, computer equipment and storage medium - Google Patents
Multisystem login method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109274685A CN109274685A CN201811302719.5A CN201811302719A CN109274685A CN 109274685 A CN109274685 A CN 109274685A CN 201811302719 A CN201811302719 A CN 201811302719A CN 109274685 A CN109274685 A CN 109274685A
- Authority
- CN
- China
- Prior art keywords
- user
- logging
- authentication
- account
- number cipher
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
This application involves information security technologies, specifically design a kind of multisystem login method, device, computer equipment and storage medium.The described method includes: receiving the first logging request from the first system;First logging request carries the first user account and the first account number cipher;After first user account and the first account number cipher are by verifying, generate user's logging on authentication and issue;Determine user information associated with first user account and the first account number cipher;User's logging on authentication and the user information described in associated storage;Receive the second logging request from second system;Second logging request carries user's logging on authentication;It verifies user right corresponding to user information associated with user's logging on authentication and completes the login of the second system after verification passes through.More decorum can be improved using this method and log in efficiency.
Description
Technical field
This application involves field of computer technology, more particularly to a kind of multisystem method, apparatus, computer equipment and deposit
Storage media.
Background technique
With the development of computer technology, more and more business all can be realized and be completed by computer equipment.It is right
It usually requires to log in corresponding operation system in different business, just can be carried out corresponding operation.And each operation system
System login, authentication and authentication method etc. be usually that each system independently executes.
Traditional multisystem logs in, and usually for different operation systems, inputs corresponding user respectively when logging in
Account and account number cipher could log in corresponding operation system after certification passes through.Although multiple business systems can be logged in this way
System, but when the operation system that user need to log in is excessive, logs in each operation system and require to input corresponding user
Name and password, it is cumbersome, cause multisystem to log in low efficiency.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of multisystem that can be realized multisystem and fast log in
Login method, device, computer equipment and storage medium.
A kind of multisystem login method is applied to certificate server, which comprises
Receive the first logging request from the first system;First logging request carries the first user account and the
One account number cipher;
After first user account and the first account number cipher are by verifying, generate user's logging on authentication and issue;
Determine user information associated with first user account and the first account number cipher;
User's logging on authentication and the user information described in associated storage;
Receive the second logging request from second system;Second logging request carries user's logging on authentication;
User right corresponding to user information associated with user's logging on authentication is verified, after verification passes through,
Complete the login of the second system.
A kind of multisystem entering device, described device include:
Receiving module, for receiving the first logging request from the first system;First logging request carries the
One user account and the first account number cipher;
Generation module, for generating user's login after first user account and the first account number cipher are by verifying
Voucher simultaneously issues;
Determining module, for determining user information associated with first user account and the first account number cipher;
Associated storage module, for user's logging on authentication and the user information described in associated storage;
The receiving module is also used to receive the second logging request from second system;Second logging request is taken
Band user's logging on authentication;
Correction verification module, for verifying user right corresponding to user information associated with user's logging on authentication,
After verification passes through, the login of the second system is completed.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
Device performs the steps of when executing the computer program
Receive the first logging request from the first system;First logging request carries the first user account and the
One account number cipher;
After first user account and the first account number cipher are by verifying, generate user's logging on authentication and issue;
Determine user information associated with first user account and the first account number cipher;
User's logging on authentication and the user information described in associated storage;
Receive the second logging request from second system;Second logging request carries user's logging on authentication;
User right corresponding to user information associated with user's logging on authentication is verified, after verification passes through,
Complete the login of the second system.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
It is performed the steps of when row
Receive the first logging request from the first system;First logging request carries the first user account and the
One account number cipher;
After first user account and the first account number cipher are by verifying, generate user's logging on authentication and issue;
Determine user information associated with first user account and the first account number cipher;
User's logging on authentication and the user information described in associated storage;
Receive the second logging request from second system;Second logging request carries user's logging on authentication;
User right corresponding to user information associated with user's logging on authentication is verified, after verification passes through,
Complete the login of the second system.
Above-mentioned multisystem login method, device, computer equipment and storage medium, when the first system passes through login authentication
Afterwards, certificate server generates user's logging on authentication and issues.User information is associated with user's logging on authentication and deposits by certificate server
Storage, so that user when logging in second system, can be logged in by user's logging on authentication.In this way, certificate server only needs
Verifying user right corresponding to user information associated with user's logging on authentication can be completed second after verification passes through
The login of system.In this way, operation system and certificate server is independent, when user need to log in multiple and different systems,
Without inputting user account and account number cipher when logging in each system, need to can only be logged in by user's logging on authentication multiple
System reduces the operation for logging in multiple systems, substantially increases polyphyly under the premise of ensureing the safety that multisystem logs in
The efficiency that system logs in.
Detailed description of the invention
Fig. 1 is the application scenario diagram of multisystem login method in one embodiment;
Fig. 2 is the flow diagram of multisystem login method in one embodiment;
Fig. 3 is the timing diagram of multisystem login method in one embodiment;
Fig. 4 is the structural block diagram of multisystem entering device in one embodiment;
Fig. 5 is the structural block diagram of multisystem entering device in another embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Multisystem login method provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, terminal
110 are communicated with operation system 120 by network by network.Wherein, operation system 120 includes multiple systems, and such as first
System 121 and second system 122 etc..Operation system 120 and certificate server 130 pass through network connection.Terminal 110 is to the first system
System 121 sends the first logging request for carrying the first user account and the first account number cipher, and the first system 121 is logged in first
Request is forwarded to certificate server 130.Certificate server 130 verifies the first user account and the first account number cipher, tests
Card generates user's logging on authentication and is issued to terminal 110 after passing through.Terminal 110 carries user to the transmission of second system 122 and steps on
The second logging request of voucher is recorded, the second logging request is forwarded to certificate server 130 by second system 122.Certificate server
130 pairs verify with the associated user information of user's logging on authentication, after verification passes through, complete the login of second system.
Wherein, terminal 110 can be, but not limited to be various personal computers, laptop, smart phone, tablet computer
With portable wearable device.Operation system 120 can be independent server or server cluster to realize.Wherein, first
System and second system are used to distinguish different operation systems, and the first system and second system be all under the premise of not causing ambiguity
It is properly termed as operation system.Certificate server 130 can use the server of the either multiple server compositions of independent server
Cluster is realized.
In one embodiment, as shown in Fig. 2, providing a kind of multisystem login method, it is applied in Fig. 1 in this way
Certificate server 130 for be illustrated, comprising the following steps:
S202 receives the first logging request from the first system;First logging request carry the first user account and
First account number cipher.
Wherein, the first system is operation system, specifically can be the first service server.First logging request is to pass through use
Family account logs in the logging request triggered when the first service server.Certificate server is corresponding with multiple operation systems
And for providing the server to the user account progress service for checking credentials for logging in each system.
Specifically, user can trigger the first logging request for logging in the first system by terminal, and the first system will receive
The first logging request be forwarded to certificate server.Certificate server can receive the from the first system by network connection
One logging request.Wherein, the first logging request carries the first user account and the first account number cipher.
In one embodiment, operation has browser application in terminal, and terminal can be entered and first by browser application
Login interface corresponding to system.User inputs the first user account and the first account number cipher in login interface.Terminal according to
First user account and the first account number cipher generate logging request.The detectable triggering of terminal sends the trigger action of logging request,
When detecting trigger action, logging request is sent to the first system.
Wherein, wherein trigger action is the predetermined registration operation for acting on login interface, detects that trigger action sends triggering
Logging request.Trigger action specifically can be touch operation, cursor operations, button operation or voice operating.Wherein, behaviour is touched
It can be and touch clicking operation, touch pressing operation or touch slide, touch operation can be single-touch operation
Or multiple point touching operation;The behaviour that cursor operations can be the operation that control cursor is clicked or control cursor is pressed
Make;Button operation can be operation of virtual key or physical button operation etc..
S204 generates user's logging on authentication and simultaneously issues after the first user account and the first account number cipher are by verifying.
Wherein, user's logging on authentication is the voucher for verifying user identity, specifically can letter, number, Chinese character or word
Symbol string etc..Certificate server receives the logging request corresponding to the different user account, generate different users log in
Card.What user's logging on authentication can be randomly generated, in this way, can ensure that certificate server one time first login of every reception is asked
It asks, just generates unique user's logging on authentication.
Specifically, certificate server receive carry the first user account and the first account number cipher first log in ask
After asking, verifying is compared according to the user account of storage and corresponding account number cipher.When the first user account and the first account
After number password is verified by account, certificate server then generates corresponding user's logging on authentication at random.It logs in and asks in response to first
It asks, user's logging on authentication is issued to the first system by certificate server, and user's logging on authentication is forwarded to terminal again by the first system.
Terminal stores the user's logging on authentication received into the cookie of browser.
In one embodiment, in user's registration account, certificate server can by user account, account number cipher and
User information (for example, with information such as 6 after the cell-phone number of user account binding or the identity card of user) is associated storage.When
After certificate server receives the first logging request, can user account and account number cipher according to the pre-stored data checked.Core
To just generating user's logging on authentication after passing through.
S206 determines user information associated with the first user account and the first account number cipher.
Wherein, user information is information relevant with user identity, specifically can be phone number, the unique identities of user
The character string etc. that card number, latter six of unique identity card number and user uniquely bind.Specifically, in user's registration account, recognize
User account, account number cipher and user information can be associated by card server, and be stored into database.Authentication service
Device can search user information associated with the first user account and the first account number cipher from database.
It is understood that user information is the information that user must input when registering multiple associated systems, and
For the same user, in the corresponding user account of the multiple systems of registration, the user information inputted is the same.This
Sample verifies the identity of user according to user information after being just convenient for.
S208, associated storage user logging on authentication and user information.
Specifically, certificate server can obtain use associated with the first user account after generating user's logging on authentication
Family information, user's logging on authentication and corresponding user information can be associated by certificate server, and the user after association is stepped on
Record authority and user information store that (Redis database is one to Redis database in the form of key-value (key-value)
The storage system of kind key-value) in.Wherein, Redis database can also be existed with framework in certificate server with framework
In other associated servers.
S210 receives the second logging request from second system;Second logging request carries user's logging on authentication.
Wherein, second system is operation system, specifically can be the second service server.Second logging request is to pass through use
Family logging on authentication logs in the logging request triggered when the second service server.Specifically, certificate server can be connected by network
Receive the second logging request from second system.Wherein, the second logging request carries user's logging on authentication.
In one embodiment, operation has browser application in terminal, and terminal can be entered and second by browser application
Login interface corresponding to system.When user logs in second system by browser application, cookie of the terminal from browser
User's logging on authentication is obtained in (caching).Terminal sends the second logging request for carrying user's logging on authentication to second system.
The logging request is forwarded to certificate server by second system.
In one embodiment, the generation step of the second logging request includes: that terminal receives the use that certificate server issues
Family logging on authentication;Terminal stores user's logging on authentication into browser rs cache;Terminal receives what user was triggered by browser
It is directed to the log-in instruction of second system;Terminal searches user's logging on authentication according to log-in instruction from browser rs cache;Work as end
When end finds user's logging on authentication, the second logging request for carrying user's logging on authentication is sent to certificate server.
In one embodiment, when user successfully logs in the first system by terminal with the first user account, it can receive and recognize
User's logging on authentication that card server issues.Terminal can store user's logging on authentication into browser rs cache.When user passes through
When browser logs in second system, terminal receives the log-in instruction for being directed to second system that user is triggered by browser, and
According to log-in instruction, user's logging on authentication is searched from browser rs cache.When finding user's logging on authentication, logged according to user
Voucher generates the second logging request.Second logging request is sent to second system by terminal, and second system is by the second logging request
It is forwarded to certificate server.
In above-described embodiment, when logging in second system by browser, then without user input corresponding user account and
Account number cipher only needs terminal to find user's logging on authentication, can log in second system by user's logging on authentication, convenient fast
It is prompt.
S212 verifies user right corresponding to user information associated with user's logging on authentication, after verification passes through,
Complete the login of second system.
Specifically, certificate server is stepped on when receiving the second logging request for carrying user's logging on authentication from second
User's logging on authentication is extracted in record request.Certificate server is locally searching user's logging on authentication.It is stepped on when finding the user
After recording voucher, user information associated with user's logging on authentication is determined.
Further, certificate server can determine with user right corresponding to the user information, when with the user information
Corresponding user right is when allowing access authority, then verification passes through, and completes the login of second system.And pass through verification
Information feeds back to second system.Second system receives the access that the terminal is allowed after the information that passes through of verification.
In one embodiment, after terminal successfully logs in the first system by user account, certificate server generates user
Logging on authentication, and user's logging on authentication and user information correlation are stored into Redis database.At this point it is possible to think Redis
User's logging on authentication in database is effective.User corresponding with the user information can directly pass through user's logging on authentication
It logs in second system (user account after login is second user account associated with user information).Therefore, when certification takes
When business device finds user information corresponding with user's logging on authentication according to user's logging on authentication in Redis database
User right corresponding to the user information is thought to allow access authority.
In one embodiment, step S212, that is, verification user information institute associated with user's logging on authentication are right
The user right answered, after verification passes through, the step of completing the login of second system, is specifically includes the following steps: determine and second
The associated user information of user's logging on authentication entrained by logging request;According to user information, search opposite with second system
The second user account answered and the second account number cipher;When finding second user account and the second account number cipher, then school is determined
Test by and complete the login of second system.
Specifically, certificate server can search user's letter associated with user's logging on authentication from Redis database
Breath.User account according to the pre-stored data and associated user information determine second user account corresponding with the user information
With the second account number cipher.Wherein, second user account and the second account number cipher are for logging in second system.When certificate server from
When locally finding second user account and the second account number cipher, then determine that verification passes through, passes through to the feedback certification of the second business
Feedback information, to complete the login of second system.
It is understood that the first system and second system the premise for not causing ambiguity under can be referred to as business system
System.Wherein, multiple operation systems are associated, when user logs in multiple associated operation systems with user account and account number cipher
In an operation system when, which can be referred to as the first operation system.It is somebody's turn to do when user is logged in user's logging on authentication
When other operation systems in multiple systems, which can be referred to as second system.It is understood that second
System can have multiple and the first system and second system not unique.
Above-mentioned multisystem login method, when the first system pass through login authentication after, certificate server generate user log in
It demonstrate,proves and issues.Certificate server is by user information and user's logging on authentication associated storage, so that user is when logging in second system,
It can be logged in by user's logging on authentication.In this way, certificate server need to only verify use associated with user's logging on authentication
The login of second system can be completed after verification passes through in user right corresponding to the information of family.In this way, by operation system and
Certificate server is independent, when user need to log in multiple and different systems, without inputting use when logging in each system
Family account and account number cipher only need to can log in multiple systems by user's logging on authentication, in the safety for ensureing that multisystem logs in
Property under the premise of, reduce the operation for logging in multiple systems, substantially increase multisystem login efficiency.
In one embodiment, before step S202, that is, the first logging request from the first system is received
The step of before, the multisystem login method further include the steps that account register, which includes: to be received respectively from first
First account registration request of system and the second account registration request from second system;First account registration request
Carry the first user account, the first account number cipher and user information;Second account registration request carrying second user account,
Second account number cipher and user information;Verify the legitimacy of the first user account, the first account number cipher and user information;
After being verified, the first user account corresponding with the first system, the first account number cipher and user information are associated
Storage;Verify the legitimacy of second user account, the second account number cipher and user information;It, will be with second after being verified
The corresponding second user account of system, the second account number cipher and user information are associated storage.
Specifically, for user before logging in any system in multisystem, user must hold user's account of the system first
Number.User need to register the user account of the system before any system in first login multisystem.When user need to register it is more
When account corresponding to any system in a interconnected system, user can input user in the account register interface of terminal display
Account, account number cipher and user information.User account, account number cipher and the user information that terminal is inputted according to user are raw
At account registration request, and it is sent to corresponding operation system.Account registration request is forwarded to certificate server by operation system.
It is understood that when user's registration account corresponding with the first system, that user can provide in the first system,
And the first user account, the first account number cipher and user information are inputted in the account register interface of terminal display.And pass through
Terminal generates the first account registration request, by the first account according to the first user account, the first account number cipher and user information
Number registration request is sent to the first system.First account registration request is forwarded to certificate server by the first system.
When user's registration account corresponding with second system, user can second system provide and in terminal display
Account register interface in input second user account, the second account number cipher and user information.And by terminal, according to the
Two user accounts, the second account number cipher and user information generate the second account registration request, by the second account registration request
It is sent to second system.Second account registration request is forwarded to certificate server by second system.
Further, when certificate server is respectively received and corresponding to the first operation system and the second operation system
After one account registration request and the second account registration request, corresponding first user account, the first account number cipher and user are verified
The legitimacy of information, and the corresponding second user account of verifying, the legitimacy of the second account number cipher and user information.
Further, after the legitimate verification of the first user account, the first account number cipher and user information passes through,
The first user account corresponding with the first system, the first account number cipher and user information can be associated by certificate server,
And it is stored in a storage medium.When the legitimate verification of second user account, the second account number cipher and user information passes through
Afterwards, certificate server can close second user account corresponding with second system, the second account number cipher and user information
Connection, and be stored in a storage medium.
It is understood that after certificate server receives the first account registration request from the first system
The legitimacy of the first user account, the first account number cipher and user information is verified, and after being verified, it will be with the first system
Corresponding first user account, the first account number cipher and the user information of uniting are associated storage.When certificate server receives
After the second account registration request from second system, that is, it can verify that second user account, the second account number cipher and user's letter
The legitimacy of breath, and after being verified, it will second user account corresponding with second system, the second account number cipher, Yi Jiyong
Family information is associated storage.Wherein, the verification step to the first account registration request and storing step, infuse with to the second account
The execution order of the verification step of volume request and storing step without limitation, to the verification step of the first account registration request and is deposited
Storage step can be before with the verification step and storing step to the second account registration request, simultaneously or later execute.
In one embodiment, whether certificate server can separately verify the first user account and/or second user account
It is repeated with existing account, that whether the first account number cipher and/or the second account number cipher meet preset requirement, user information is no wrong
Deng.Wherein, whether account number cipher meets preset requirement, for example, whether account number cipher contains in number, letter, character etc. extremely
It is two kinds few;Or whether the digit of account number cipher reaches presetting digit capacity etc..User information is no wrong, for example, the digit of user information
It is whether true etc. whether presetting digit capacity, user information are reached.
In above-described embodiment, in account registration process, it is corresponding with the first system that storage can be respectively associated in certificate server
The first user account, the first account number cipher and user information and second user account corresponding with second system, the second account
Number password and user information, login authentication when system corresponding convenient for subsequent login.
In one embodiment, step S202, that is, after the first user account and the first account number cipher are by verifying,
The step of generating user's logging on authentication and issuing is specifically includes the following steps: when the first user account and the first account number cipher pass through
After verifying, system level corresponding to the first system is determined;When system level is main system level, then user is generated at random and is stepped on
Record voucher;In response to the first logging request, feedback user logging on authentication.
In one embodiment, after the first user account and the first account number cipher are by verifying, certificate server can be to
The feedback information that the first system feedback validation passes through.And.Certificate server can determine system level belonging to the first system.When
When the first system is main system, just produces user's logging on authentication and issue.Otherwise, the first user account and first are only fed back
The feedback information that account number cipher is verified.
In one embodiment, certificate server can preset system level corresponding to each operation system.Wherein it is
Irrespective of size does not include main system rank and auxiliary system level etc..It can also be formulated according to the corresponding business tine of each operation system more detailed
Thin system level, the present embodiment is it is not limited here.In turn, certificate server can be preset, and only pass through user's account
Number and account number cipher log in main system rank operation system after, certificate server can just generate user's logging on authentication.Namely
It only logs in just exempt to pay a secret visit after the main business system and asks other associated operation systems, if first login is auxiliary business system
System, then will still need to input user account and account number cipher when logging in other interconnected systems could log in.
It is understood that the operation system in main system rank can have one or more;In auxiliary system level
Operation system can also have one or more, the present embodiment is it is not limited here.
In above-described embodiment, certificate server is only being verified corresponding to main system and is carrying user account
After the logging request of account number cipher, user's logging on authentication can be just generated, in this way, user can just make when logging in other systems
With close efficiently login mode is exempted from, the safety of multisystem login is substantially increased.
In one embodiment, which further includes the steps that removing user's logging on authentication, step tool
Body includes: to receive user's logging on authentication clearance order;User's logging on authentication clearance order carries user's logging on authentication to be cleaned;
According to user's logging on authentication clearance order, corresponding user's logging on authentication is searched from local;It is removed in response to user's logging on authentication
Instruction, deletes the user's logging on authentication found and the user information with user's logging on authentication associated storage.
Specifically, user's logging on authentication has validity period.After expiring the validity period of user's logging on authentication, terminal can be touched
Hair family logging on authentication clearance order.Certificate server can receive user's logging on authentication clearance order of terminal triggering, the user
Logging on authentication clearance order carries user's logging on authentication to be cleaned.Certificate server according to user's logging on authentication clearance order,
Corresponding user's logging on authentication is searched from Redis database.After finding user's logging on authentication, the user found is deleted
Logging on authentication and the user information with user's logging on authentication associated storage stored in Redis database.
In one embodiment, start timing after terminal receives user's logging on authentication that certificate server issues, when
When period at the time of current time timing to reaches preset duration, having for user's logging on authentication can determine that
The effect phase expires.At this point, terminal can automatic trigger user's logging on authentication clearance order.
In one embodiment, the triggering step of user's logging on authentication clearance order includes: that terminal monitoring user triggers behaviour
Make;When user's trigger action is not detected in terminal in preset period of time, user's logging on authentication to be cleaned is obtained;Terminal triggering
The step of sending user's logging on authentication clearance order to certificate server;User's logging on authentication clearance order carries use to be cleaned
Family logging on authentication.
In one embodiment, terminal can detect the triggering behaviour from user in browser interface periodically or in real time
Make.When user's trigger action is not detected in terminal in preset period of time, user's logging on authentication can be searched from browser rs cache,
User's logging on authentication is user's logging on authentication to be cleaned.Terminal can automatic trigger to certificate server send user log in
The step of voucher clearance order, wherein user's logging on authentication clearance order carries user's logging on authentication to be cleaned.In this way, working as
When user's trigger action is not detected in terminal in preset period of time, just trigger user's logging on authentication clearance order, that is, when with
User's logging on authentication clearance order is just triggered when not using operation system in family, has ensured the safety that multisystem uses.
In above-described embodiment, corresponding user's logging on authentication, Yi Jiyu can be deleted according to user's logging on authentication clearance order
The user information of user's logging on authentication associated storage, that is, failed when secondary multisystem fast logs in, in this way by limited
Timeliness can effectively ensure quick safety when logging in multisystem.
With reference to Fig. 3, Fig. 3 is the timing diagram that multisystem logs in, in one specifically embodiment, the multisystem login method
Described below: user can trigger the first logging request for logging in the first system by terminal first, and the first logging request carries
User account and account number cipher.First logging request is forwarded to certificate server by the first system.Certificate server verifies user
Account and account number cipher generate user's logging on authentication after being verified.User's logging on authentication is fed back to by certificate server
One system, the first system are forwarded to terminal.User triggers the second logging on authentication for logging in second system by terminal, and second logs in
Voucher carries user's the proof of Register.Second logging request is forwarded to certificate server by second system, and certificate server is searched
The feedback information being verified is returned when finding user information with the associated user information of user's logging on authentication.Second system
System receives feedback information, and authorization terminal accesses, and user logins successfully.
It should be understood that although each step in the flow chart of Fig. 2 is successively shown according to the instruction of arrow, this
A little steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein, these steps
It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least part in Fig. 2
Step may include that perhaps these sub-steps of multiple stages or stage are executed in synchronization to multiple sub-steps
It completes, but can execute at different times, the execution sequence in these sub-steps or stage, which is also not necessarily, successively to be carried out,
But it can be executed in turn or alternately at least part of the sub-step or stage of other steps or other steps.
In one embodiment, as shown in figure 4, providing a kind of multisystem entering device 400, comprising: receiving module
401, generation module 402, determining module 403, associated storage module 404 and correction verification module 405, in which:
Receiving module 401, for receiving the first logging request from the first system;First logging request carries first
User account and the first account number cipher.
Generation module 402, for after the first user account and the first account number cipher are by verifying, generate user's login with
It demonstrate,proves and issues.
Determining module 403, for determining user information associated with the first user account and the first account number cipher.
Associated storage module 404 is used for associated storage user logging on authentication and user information.
Receiving module 401 is also used to receive the second logging request from second system;Second logging request, which carries, to be used
Family logging on authentication.
Correction verification module 405, for verifying user right corresponding to user information associated with user's logging on authentication, when
After verification passes through, the login of second system is completed.
In one embodiment, receiving module 401 is also used to receive the first account registration from the first system respectively
Request and from second system the second account registration request;First account registration request carries the first user account, the
One account number cipher and user information;Second account registration request carries second user account, the second account number cipher, Yi Jiyong
Family information.
Correction verification module 405 is also used to verify the legitimacy of the first user account, the first account number cipher and user information.
Associated storage module 404 is also used to after being verified, will the first user account corresponding with the first system, first
Account number cipher and user information are associated storage.
Correction verification module 405 is also used to verify the legitimacy of second user account, the second account number cipher and user information.
Associated storage module 404 is also used to after being verified, will second user account corresponding with second system, second
Account number cipher and user information are associated storage.
In one embodiment, generation module 402 is also used to pass through verifying when the first user account and the first account number cipher
Afterwards, system level corresponding to the first system is determined;When system level be main system level when, then at random generate user log in
Card;In response to the first logging request, feedback user logging on authentication.
In one embodiment, the user's logging on authentication issued is used to indicate terminal and receives the user that certificate server issues
Logging on authentication;Terminal stores user's logging on authentication into browser rs cache;Terminal receives the needle that user is triggered by browser
For the log-in instruction of second system;Terminal searches user's logging on authentication according to log-in instruction from browser rs cache;Work as terminal
When finding user's logging on authentication, the second logging request for carrying user's logging on authentication is sent to certificate server.
In one embodiment, correction verification module 405 be also used to it is determining log in user entrained by the second logging request with
Demonstrate,prove associated user information;According to user information, second user account corresponding with second system and the second account are searched
Password;When finding second user account and the second account number cipher, then determine that verification passes through and complete the login of second system.
In one embodiment, as shown in figure 5, the multisystem entering device 400 further includes searching module 406, deletes mould
Block 407.
Receiving module 401 is also used to receive user's logging on authentication clearance order;User's logging on authentication clearance order carry to
User's logging on authentication of removing.
Searching module 406, for according to user's logging on authentication clearance order, from it is local search corresponding user log in
Card.
Removing module 407, in response to user's logging on authentication clearance order, delete the user's logging on authentication found,
And the user information with user's logging on authentication associated storage.
In one embodiment, the user's logging on authentication issued is used to indicate terminal monitoring user's trigger action;Work as terminal
When user's trigger action being not detected in preset period of time, user's logging on authentication to be cleaned is obtained;Terminal is triggered to be taken to certification
The step of device transmission user's logging on authentication clearance order of being engaged in;User's logging on authentication clearance order carry user to be cleaned log in
Card.
Above-mentioned multisystem entering device, when the first system pass through login authentication after, certificate server generate user log in
It demonstrate,proves and issues.Certificate server is by user information and user's logging on authentication associated storage, so that user is when logging in second system,
It can be logged in by user's logging on authentication.In this way, certificate server need to only verify use associated with user's logging on authentication
The login of second system can be completed after verification passes through in user right corresponding to the information of family.In this way, by operation system and
Certificate server is independent, when user need to log in multiple and different systems, without inputting use when logging in each system
Family account and account number cipher only need to can log in multiple systems by user's logging on authentication, in the safety for ensureing that multisystem logs in
Property under the premise of, reduce the operation for logging in multiple systems, substantially increase multisystem login efficiency.
Specific about multisystem entering device limits the restriction that may refer to above for multisystem login method,
This is repeated no more.Modules in above-mentioned multisystem entering device can come fully or partially through software, hardware and combinations thereof
It realizes.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with software
Form is stored in the memory in computer equipment, executes the corresponding operation of the above modules in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 6.The computer equipment include by system bus connect processor, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The database of machine equipment is for storing data.The network interface of the computer equipment is used to pass through network connection with external terminal
Communication.To realize a kind of multisystem login method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with
Computer program, the processor are performed the steps of to receive when executing computer program and be logged in from the first of the first system
Request;First logging request carries the first user account and the first account number cipher;When the first user account and the first account number cipher
After verifying, generates user's logging on authentication and issue;Determine use associated with the first user account and the first account number cipher
Family information;Associated storage user logging on authentication and user information;Receive the second logging request from second system;Second steps on
Record request carries user's logging on authentication;User right corresponding to user information associated with user's logging on authentication is verified, when
After verification passes through, the login of second system is completed.
In one embodiment, it also performs the steps of and receives respectively from the when processor executes computer program
First account registration request of one system and the second account registration request from second system;The registration of first account is asked
It asks and carries the first user account, the first account number cipher and user information;Second account registration request carries second user account
Number, the second account number cipher and user information;Verify the legal of the first user account, the first account number cipher and user information
Property;After being verified, the first user account corresponding with the first system, the first account number cipher and user information are carried out
Associated storage;Verify the legitimacy of second user account, the second account number cipher and user information;It, will be with after being verified
The corresponding second user account of second system, the second account number cipher and user information are associated storage.
In one embodiment, also perform the steps of when processor executes computer program when the first user account and
After first account number cipher is by verifying, system level corresponding to the first system is determined;When system level is main system level,
User's logging on authentication is then generated at random;In response to the first logging request, feedback user logging on authentication.
In one embodiment, the user's logging on authentication issued is used to indicate terminal and receives the user that certificate server issues
Logging on authentication;Terminal stores user's logging on authentication into browser rs cache;Terminal receives the needle that user is triggered by browser
For the log-in instruction of second system;Terminal searches user's logging on authentication according to log-in instruction from browser rs cache;Work as terminal
When finding user's logging on authentication, the second logging request for carrying user's logging on authentication is sent to certificate server.
In one embodiment, determining log in second is also performed the steps of when processor executes computer program to ask
Seek the entrained associated user information of user's logging on authentication;According to user information, corresponding with second system the is searched
Two user accounts and the second account number cipher;When finding second user account and the second account number cipher, then determine that verification passes through
And complete the login of second system.
In one embodiment, it is also performed the steps of when processor executes computer program and receives user's logging on authentication
Clearance order;User's logging on authentication clearance order carries user's logging on authentication to be cleaned;Referred to according to the removing of user's logging on authentication
It enables, searches corresponding user's logging on authentication from local;In response to user's logging on authentication clearance order, deletes the user found and step on
Record voucher and the user information with user's logging on authentication associated storage.
In one embodiment, the user's logging on authentication issued is used to indicate terminal monitoring user's trigger action;Work as terminal
When user's trigger action being not detected in preset period of time, user's logging on authentication to be cleaned is obtained;Terminal is triggered to be taken to certification
The step of device transmission user's logging on authentication clearance order of being engaged in;User's logging on authentication clearance order carry user to be cleaned log in
Card.
Above-mentioned computer equipment, after the first system passes through login authentication, certificate server generates user's logging on authentication simultaneously
It issues.Certificate server is by user information and user's logging on authentication associated storage, so that user can lead to when logging in second system
User's logging on authentication is crossed to log in.In this way, certificate server need to only verify user's letter associated with user's logging on authentication
The login of second system can be completed after verification passes through in the corresponding user right of breath.In this way, by operation system and certification
Server is independent, when user need to log in multiple and different systems, without inputting user's account when logging in each system
Number and account number cipher, only multiple systems need to can be logged in by user's logging on authentication, in the safety for ensureing that multisystem logs in
Under the premise of, reduce the operation for logging in multiple systems, substantially increases the efficiency of multisystem login.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of the first logging request received from the first system when being executed by processor;First login is asked
It asks and carries the first user account and the first account number cipher;After the first user account and the first account number cipher are by verifying, generate
User's logging on authentication simultaneously issues;Determine user information associated with the first user account and the first account number cipher;Associated storage
User's logging on authentication and user information;Receive the second logging request from second system;Second logging request carries user
Logging on authentication;User right corresponding to user information associated with user's logging on authentication is verified, after verification passes through, is completed
The login of second system.
In one embodiment, it also performs the steps of and receives respectively from the when processor executes computer program
First account registration request of one system and the second account registration request from second system;The registration of first account is asked
It asks and carries the first user account, the first account number cipher and user information;Second account registration request carries second user account
Number, the second account number cipher and user information;Verify the legal of the first user account, the first account number cipher and user information
Property;After being verified, the first user account corresponding with the first system, the first account number cipher and user information are carried out
Associated storage;Verify the legitimacy of second user account, the second account number cipher and user information;It, will be with after being verified
The corresponding second user account of second system, the second account number cipher and user information are associated storage.
In one embodiment, also perform the steps of when processor executes computer program when the first user account and
After first account number cipher is by verifying, system level corresponding to the first system is determined;When system level is main system level,
User's logging on authentication is then generated at random;In response to the first logging request, feedback user logging on authentication.
In one embodiment, the user's logging on authentication issued is used to indicate terminal and receives the user that certificate server issues
Logging on authentication;Terminal stores user's logging on authentication into browser rs cache;Terminal receives the needle that user is triggered by browser
For the log-in instruction of second system;Terminal searches user's logging on authentication according to log-in instruction from browser rs cache;Work as terminal
When finding user's logging on authentication, the second logging request for carrying user's logging on authentication is sent to certificate server.
In one embodiment, determining log in second is also performed the steps of when processor executes computer program to ask
Seek the entrained associated user information of user's logging on authentication;According to user information, corresponding with second system the is searched
Two user accounts and the second account number cipher;When finding second user account and the second account number cipher, then determine that verification passes through
And complete the login of second system.
In one embodiment, it is also performed the steps of when processor executes computer program and receives user's logging on authentication
Clearance order;User's logging on authentication clearance order carries user's logging on authentication to be cleaned;Referred to according to the removing of user's logging on authentication
It enables, searches corresponding user's logging on authentication from local;In response to user's logging on authentication clearance order, deletes the user found and step on
Record voucher and the user information with user's logging on authentication associated storage.
In one embodiment, the user's logging on authentication issued is used to indicate terminal monitoring user's trigger action;Work as terminal
When user's trigger action being not detected in preset period of time, user's logging on authentication to be cleaned is obtained;Terminal is triggered to be taken to certification
The step of device transmission user's logging on authentication clearance order of being engaged in;User's logging on authentication clearance order carry user to be cleaned log in
Card.
Above-mentioned computer readable storage medium, after the first system passes through login authentication, certificate server generates user and steps on
Record voucher simultaneously issues.Certificate server is by user information and user's logging on authentication associated storage, so that user is logging in the second system
When system, it can be logged in by user's logging on authentication.In this way, certificate server need to only verify it is associated with user's logging on authentication
User information corresponding to user right the login of second system can be completed after verification passes through.In this way, by business system
System and certificate server are independent, when user need to log in multiple and different systems, without defeated when logging in each system
Access customer account and account number cipher only need to can log in multiple systems by user's logging on authentication, ensure what multisystem logged in
Under the premise of safety, reduce the operation for logging in multiple systems, substantially increases the efficiency of multisystem login.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of multisystem login method is applied to certificate server, which comprises
Receive the first logging request from the first system;First logging request carries the first user account and the first account
Number password;
After first user account and the first account number cipher are by verifying, generate user's logging on authentication and issue;
Determine user information associated with first user account and the first account number cipher;
User's logging on authentication and the user information described in associated storage;
Receive the second logging request from second system;Second logging request carries user's logging on authentication;
User right corresponding to user information associated with user's logging on authentication is verified, after verification passes through, is completed
The login of the second system.
2. the method according to claim 1, wherein the method also includes:
It is received respectively from the first account registration request of the first system and from the second of the second system
Account registration request;The first account registration request carries the first user account, the first account number cipher and user information;
The second account registration request carries second user account, the second account number cipher and user information;
Verify the legitimacy of first user account, the first account number cipher and user information;
It, will the first user account corresponding with the first system, the first account number cipher and user information after being verified
It is associated storage;
Verify the legitimacy of the second user account, the second account number cipher and user information;
It, will second user account corresponding with the second system, the second account number cipher and user information after being verified
It is associated storage.
3. the method according to claim 1, wherein described work as first user account and the first account number cipher
After verifying, generates user's logging on authentication and issues, comprising:
After first user account and the first account number cipher are by verifying, determine system-level corresponding to the first system
Not;
When the system level is main system level, then user's logging on authentication is generated at random;
In response to first logging request, user's logging on authentication is fed back.
4. the method according to claim 1, wherein the generation step of second logging request includes:
Terminal receives user's logging on authentication that the certificate server issues;
The terminal stores user's logging on authentication into browser rs cache;
The terminal receives the log-in instruction for being directed to the second system that user is triggered by browser;
The terminal searches user's logging on authentication according to the log-in instruction from the browser rs cache;
When the terminal finds user's logging on authentication, user's logging on authentication is carried to certificate server transmission
The second logging request.
5. according to the method described in claim 2, it is characterized in that, the verification use associated with user's logging on authentication
User right corresponding to the information of family completes the login of the second system after verification passes through, comprising:
Determine user information associated with user's logging on authentication entrained by second logging request;
According to the user information, second user account corresponding with the second system and the second account number cipher are searched;
When finding the second user account and the second account number cipher, then determine that verification passes through and completes the second system
Login.
6. the method according to any one of claims 1 to 5, which is characterized in that the method also includes:
Receive user's logging on authentication clearance order;User's logging on authentication clearance order carry user to be cleaned log in
Card;
According to user's logging on authentication clearance order, corresponding user's logging on authentication is searched from local;
In response to user's logging on authentication clearance order, deletes the user's logging on authentication found and stepped on the user
Record the user information of voucher associated storage.
7. according to the method described in claim 6, it is characterized in that, the triggering step packet of user's logging on authentication clearance order
It includes:
Terminal monitoring user's trigger action;
When user's trigger action is not detected in the terminal in preset period of time, obtain user to be cleaned log in
Card;
The terminal triggers the step of sending user's logging on authentication clearance order to the certificate server;The user log in
Card clearance order carries user's logging on authentication to be cleaned.
8. a kind of multisystem entering device, which is characterized in that described device includes:
Receiving module, for receiving the first logging request from the first system;First logging request carries first and uses
Family account and the first account number cipher;
Generation module, for after first user account and the first account number cipher are by verifying, generation user's logging on authentication
And it issues;
Determining module, for determining user information associated with first user account and the first account number cipher;
Associated storage module, for user's logging on authentication and the user information described in associated storage;
The receiving module is also used to receive the second logging request from second system;Second logging request, which carries, to be used
Family logging on authentication;
Correction verification module works as school for verifying user right corresponding to user information associated with user's logging on authentication
It tests by rear, completes the login of the second system.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811302719.5A CN109274685B (en) | 2018-11-02 | 2018-11-02 | Multi-system login method and device, computer equipment and storage medium |
PCT/CN2019/070885 WO2020087778A1 (en) | 2018-11-02 | 2019-01-08 | Multiple system login method, apparatus, computer device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811302719.5A CN109274685B (en) | 2018-11-02 | 2018-11-02 | Multi-system login method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109274685A true CN109274685A (en) | 2019-01-25 |
CN109274685B CN109274685B (en) | 2021-09-17 |
Family
ID=65192541
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811302719.5A Active CN109274685B (en) | 2018-11-02 | 2018-11-02 | Multi-system login method and device, computer equipment and storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109274685B (en) |
WO (1) | WO2020087778A1 (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111200593A (en) * | 2019-12-20 | 2020-05-26 | 北京你财富计算机科技有限公司 | Application login method and device and electronic equipment |
CN111291353A (en) * | 2020-02-05 | 2020-06-16 | 深信服科技股份有限公司 | Account number association method and device and computer storage medium |
WO2020155492A1 (en) * | 2019-01-31 | 2020-08-06 | 平安科技(深圳)有限公司 | Device id-based login state sharing method and device |
CN111552936A (en) * | 2020-04-26 | 2020-08-18 | 国电南瑞科技股份有限公司 | Cross-system access right control method and system based on scheduling mechanism level |
CN111814130A (en) * | 2020-07-06 | 2020-10-23 | 新华智云科技有限公司 | Single sign-on method and system |
CN111865938A (en) * | 2020-06-30 | 2020-10-30 | 上海东普信息科技有限公司 | Login method and device |
CN111970282A (en) * | 2020-08-19 | 2020-11-20 | 工银科技有限公司 | Authentication method and device for heterogeneous module in system |
CN112235246A (en) * | 2020-09-14 | 2021-01-15 | 上海硬通网络科技有限公司 | Cross-terminal account login method and device and electronic equipment |
CN112272171A (en) * | 2020-10-20 | 2021-01-26 | 侯亦兵 | Mobile internet cross-platform user management method and device |
CN112417401A (en) * | 2020-11-26 | 2021-02-26 | 深圳创维-Rgb电子有限公司 | Account verification method, device and system and computer readable storage medium |
CN112948814A (en) * | 2021-03-19 | 2021-06-11 | 合肥京东方光电科技有限公司 | Account password management method and device and storage medium |
CN112968862A (en) * | 2020-12-31 | 2021-06-15 | 南京联创互联网技术有限公司 | Single sign-on method and device based on redis |
CN113599833A (en) * | 2021-08-03 | 2021-11-05 | 深圳市乐天堂科技有限公司 | Account login method and device, computing equipment and storage medium |
CN114011079A (en) * | 2021-10-29 | 2022-02-08 | 上海米哈游天命科技有限公司 | Cloud game login method and device, electronic equipment and storage medium |
CN114095263A (en) * | 2021-11-24 | 2022-02-25 | 上海派拉软件股份有限公司 | Communication method, device and system |
CN114697109A (en) * | 2022-03-30 | 2022-07-01 | 中国银行股份有限公司 | Login information processing method, first system, terminal and second system |
WO2024193160A1 (en) * | 2023-03-17 | 2024-09-26 | 支付宝(杭州)信息技术有限公司 | Login process triggering method and apparatus, device, and medium |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111581071B (en) * | 2020-05-09 | 2023-12-19 | 北京百度网讯科技有限公司 | Data processing method, device, equipment and storage medium |
CN113645263B (en) * | 2020-05-11 | 2024-04-16 | 广州汽车集团股份有限公司 | Account binding method and device |
CN111651741B (en) * | 2020-06-05 | 2024-05-07 | 腾讯科技(深圳)有限公司 | User identity recognition method, device, computer equipment and storage medium |
CN111831990B (en) * | 2020-07-17 | 2024-08-23 | 深圳市丰巢科技有限公司 | Express delivery person account management method and device, electronic equipment and storage medium |
CN112087425B (en) * | 2020-07-30 | 2022-11-29 | 浪潮通用软件有限公司 | Login method, equipment and medium of ERP software system |
CN112115454B (en) * | 2020-09-28 | 2023-09-05 | 中国银行股份有限公司 | Single sign-on method, first server and electronic equipment |
CN113761490A (en) * | 2020-10-22 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | Data processing method and device |
CN113761511A (en) * | 2020-11-17 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | Screen locking management method and device |
CN112491890A (en) * | 2020-11-27 | 2021-03-12 | 中国农业银行股份有限公司 | Access method and device |
CN112769754B (en) * | 2020-12-18 | 2023-10-24 | 中国平安财产保险股份有限公司 | Client access method, device, equipment and storage medium |
CN113568652A (en) * | 2021-06-29 | 2021-10-29 | 深圳云之家网络有限公司 | Application system processing method and device, computer equipment and storage medium |
CN113568726B (en) * | 2021-07-23 | 2024-03-26 | 中信银行股份有限公司 | Multi-service system processing method, operation platform, electronic equipment and storage medium |
CN113660229B (en) * | 2021-07-30 | 2023-04-07 | 未鲲(上海)科技服务有限公司 | Multi-system single sign-on method, device, equipment and medium based on RPA |
CN114430346B (en) * | 2022-01-27 | 2023-09-05 | 亿咖通(湖北)技术有限公司 | Login method and device and electronic equipment |
CN114201778B (en) * | 2022-02-18 | 2022-05-17 | 汇元银通(北京)在线支付技术有限公司 | Authority authentication method, system, medium and equipment based on Redis |
CN114697074A (en) * | 2022-02-23 | 2022-07-01 | 深圳爱捷云科技有限公司 | Authority verification method, electronic device and storage medium |
CN114567475B (en) * | 2022-02-23 | 2024-11-08 | 平安国际智慧城市科技股份有限公司 | Method and device for logging in multiple systems, electronic equipment and storage medium |
CN114978702B (en) * | 2022-05-24 | 2024-03-19 | 上海哔哩哔哩科技有限公司 | Account management method, platform and system, computing device and readable storage medium |
CN115086052B (en) * | 2022-06-23 | 2023-07-18 | 全知科技(杭州)有限责任公司 | Method for automatically analyzing account based on HTTP (hyper text transport protocol) traffic |
CN115208664B (en) * | 2022-07-15 | 2024-04-23 | 平安科技(深圳)有限公司 | Method, device, equipment and storage medium for unified identification of multiple platform users |
CN115242511B (en) * | 2022-07-22 | 2024-04-12 | 成都中科大旗软件股份有限公司 | Multi-environment application management platform and management method |
CN117896393A (en) * | 2022-10-13 | 2024-04-16 | 华为技术有限公司 | Account synchronization method, device and system among devices and storage medium |
CN118338289B (en) * | 2024-06-13 | 2024-08-13 | 杭州中焯信息技术股份有限公司 | Verification device and method based on multiple access sites |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101355527A (en) * | 2008-08-15 | 2009-01-28 | 深圳市中兴移动通信有限公司 | Method for implementing single-point LOG striding domain name |
CN101719238A (en) * | 2009-11-30 | 2010-06-02 | 中国建设银行股份有限公司 | Method and system for managing, authenticating and authorizing unified identities |
CN102469075A (en) * | 2010-11-09 | 2012-05-23 | 中科正阳信息安全技术有限公司 | Integrated authentication method based on WEB single sign-on |
CN102546570A (en) * | 2010-12-31 | 2012-07-04 | 国际商业机器公司 | Processing method and system for single sign-on |
US8683562B2 (en) * | 2011-02-03 | 2014-03-25 | Imprivata, Inc. | Secure authentication using one-time passwords |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8959608B2 (en) * | 2012-12-26 | 2015-02-17 | Cellco Partnership | Single sign-on for a native application and a web application on a mobile device |
CN105592003B (en) * | 2014-10-22 | 2019-08-09 | 北京拓尔思信息技术股份有限公司 | A kind of cross-domain single login method and system based on notice |
-
2018
- 2018-11-02 CN CN201811302719.5A patent/CN109274685B/en active Active
-
2019
- 2019-01-08 WO PCT/CN2019/070885 patent/WO2020087778A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101355527A (en) * | 2008-08-15 | 2009-01-28 | 深圳市中兴移动通信有限公司 | Method for implementing single-point LOG striding domain name |
CN101719238A (en) * | 2009-11-30 | 2010-06-02 | 中国建设银行股份有限公司 | Method and system for managing, authenticating and authorizing unified identities |
CN102469075A (en) * | 2010-11-09 | 2012-05-23 | 中科正阳信息安全技术有限公司 | Integrated authentication method based on WEB single sign-on |
CN102546570A (en) * | 2010-12-31 | 2012-07-04 | 国际商业机器公司 | Processing method and system for single sign-on |
US8683562B2 (en) * | 2011-02-03 | 2014-03-25 | Imprivata, Inc. | Secure authentication using one-time passwords |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020155492A1 (en) * | 2019-01-31 | 2020-08-06 | 平安科技(深圳)有限公司 | Device id-based login state sharing method and device |
CN111200593A (en) * | 2019-12-20 | 2020-05-26 | 北京你财富计算机科技有限公司 | Application login method and device and electronic equipment |
CN111291353A (en) * | 2020-02-05 | 2020-06-16 | 深信服科技股份有限公司 | Account number association method and device and computer storage medium |
CN111552936A (en) * | 2020-04-26 | 2020-08-18 | 国电南瑞科技股份有限公司 | Cross-system access right control method and system based on scheduling mechanism level |
CN111552936B (en) * | 2020-04-26 | 2022-10-14 | 国电南瑞科技股份有限公司 | Cross-system access right control method and system based on scheduling mechanism level |
CN111865938A (en) * | 2020-06-30 | 2020-10-30 | 上海东普信息科技有限公司 | Login method and device |
CN111814130A (en) * | 2020-07-06 | 2020-10-23 | 新华智云科技有限公司 | Single sign-on method and system |
CN111814130B (en) * | 2020-07-06 | 2024-03-26 | 新华智云科技有限公司 | Single sign-on method and system |
CN111970282A (en) * | 2020-08-19 | 2020-11-20 | 工银科技有限公司 | Authentication method and device for heterogeneous module in system |
CN111970282B (en) * | 2020-08-19 | 2022-09-30 | 中国工商银行股份有限公司 | Authentication method and device for heterogeneous module in system |
CN112235246A (en) * | 2020-09-14 | 2021-01-15 | 上海硬通网络科技有限公司 | Cross-terminal account login method and device and electronic equipment |
CN112272171A (en) * | 2020-10-20 | 2021-01-26 | 侯亦兵 | Mobile internet cross-platform user management method and device |
CN112417401A (en) * | 2020-11-26 | 2021-02-26 | 深圳创维-Rgb电子有限公司 | Account verification method, device and system and computer readable storage medium |
CN112968862A (en) * | 2020-12-31 | 2021-06-15 | 南京联创互联网技术有限公司 | Single sign-on method and device based on redis |
CN112948814A (en) * | 2021-03-19 | 2021-06-11 | 合肥京东方光电科技有限公司 | Account password management method and device and storage medium |
CN113599833B (en) * | 2021-08-03 | 2024-03-12 | 深圳市乐天堂科技有限公司 | Account login method, account login device, computing equipment and storage medium |
CN113599833A (en) * | 2021-08-03 | 2021-11-05 | 深圳市乐天堂科技有限公司 | Account login method and device, computing equipment and storage medium |
CN114011079A (en) * | 2021-10-29 | 2022-02-08 | 上海米哈游天命科技有限公司 | Cloud game login method and device, electronic equipment and storage medium |
CN114095263A (en) * | 2021-11-24 | 2022-02-25 | 上海派拉软件股份有限公司 | Communication method, device and system |
CN114697109A (en) * | 2022-03-30 | 2022-07-01 | 中国银行股份有限公司 | Login information processing method, first system, terminal and second system |
WO2024193160A1 (en) * | 2023-03-17 | 2024-09-26 | 支付宝(杭州)信息技术有限公司 | Login process triggering method and apparatus, device, and medium |
Also Published As
Publication number | Publication date |
---|---|
WO2020087778A1 (en) | 2020-05-07 |
CN109274685B (en) | 2021-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109274685A (en) | Multisystem login method, device, computer equipment and storage medium | |
CN111917773B (en) | Service data processing method and device and server | |
CN109325342B (en) | Identity information management method, device, computer equipment and storage medium | |
US8615794B1 (en) | Methods and apparatus for increased security in issuing tokens | |
CN105591743B (en) | Method and device for identity authentication through equipment operation characteristics of user terminal | |
CN111475795A (en) | Method and device for unified authentication and authorization facing to multiple applications | |
US8650405B1 (en) | Authentication using dynamic, client information based PIN | |
CN111241555B (en) | Access method and device for simulating user login, computer equipment and storage medium | |
US11431699B2 (en) | Method and device for processing user operation | |
CN107196909B (en) | Invitation registration method and device | |
CN111541546B (en) | Multi-platform login method, device, equipment and readable medium | |
CN111988295A (en) | Database auditing method and device, WEB server, database auditing system and storage medium | |
US20160103988A1 (en) | Secure automatic authorized access to any application through a third party | |
CN112528268B (en) | Cross-channel applet login management method and device and related equipment | |
CN110163658A (en) | Virtual resource data processing method, device, computer equipment and storage medium | |
CN108769059B (en) | Verification method, device, medium and computing equipment | |
CN106533685B (en) | Identity authentication method, device and system | |
CN117014138A (en) | Data interaction method, system, device, electronic equipment and storage medium | |
CN110490005B (en) | Method, device and computer readable storage medium for processing resource transfer request | |
CN114448722A (en) | Cross-browser login method and device, computer equipment and storage medium | |
CN114172716A (en) | Login method, login device, electronic equipment and storage medium | |
CN106685938A (en) | Method for generating protection configuration for login page and apparatus thereof | |
CN107689964B (en) | Method for preventing replay attack of embedded WEB server | |
JP2002132727A (en) | Method and system device for authenticating user | |
CN114157483B (en) | Login method, login device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1260668 Country of ref document: HK |
|
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |