[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109274685A - Multisystem login method, device, computer equipment and storage medium - Google Patents

Multisystem login method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109274685A
CN109274685A CN201811302719.5A CN201811302719A CN109274685A CN 109274685 A CN109274685 A CN 109274685A CN 201811302719 A CN201811302719 A CN 201811302719A CN 109274685 A CN109274685 A CN 109274685A
Authority
CN
China
Prior art keywords
user
logging
authentication
account
number cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811302719.5A
Other languages
Chinese (zh)
Other versions
CN109274685B (en
Inventor
方思行
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201811302719.5A priority Critical patent/CN109274685B/en
Priority to PCT/CN2019/070885 priority patent/WO2020087778A1/en
Publication of CN109274685A publication Critical patent/CN109274685A/en
Application granted granted Critical
Publication of CN109274685B publication Critical patent/CN109274685B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

This application involves information security technologies, specifically design a kind of multisystem login method, device, computer equipment and storage medium.The described method includes: receiving the first logging request from the first system;First logging request carries the first user account and the first account number cipher;After first user account and the first account number cipher are by verifying, generate user's logging on authentication and issue;Determine user information associated with first user account and the first account number cipher;User's logging on authentication and the user information described in associated storage;Receive the second logging request from second system;Second logging request carries user's logging on authentication;It verifies user right corresponding to user information associated with user's logging on authentication and completes the login of the second system after verification passes through.More decorum can be improved using this method and log in efficiency.

Description

Multisystem login method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, more particularly to a kind of multisystem method, apparatus, computer equipment and deposit Storage media.
Background technique
With the development of computer technology, more and more business all can be realized and be completed by computer equipment.It is right It usually requires to log in corresponding operation system in different business, just can be carried out corresponding operation.And each operation system System login, authentication and authentication method etc. be usually that each system independently executes.
Traditional multisystem logs in, and usually for different operation systems, inputs corresponding user respectively when logging in Account and account number cipher could log in corresponding operation system after certification passes through.Although multiple business systems can be logged in this way System, but when the operation system that user need to log in is excessive, logs in each operation system and require to input corresponding user Name and password, it is cumbersome, cause multisystem to log in low efficiency.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of multisystem that can be realized multisystem and fast log in Login method, device, computer equipment and storage medium.
A kind of multisystem login method is applied to certificate server, which comprises
Receive the first logging request from the first system;First logging request carries the first user account and the One account number cipher;
After first user account and the first account number cipher are by verifying, generate user's logging on authentication and issue;
Determine user information associated with first user account and the first account number cipher;
User's logging on authentication and the user information described in associated storage;
Receive the second logging request from second system;Second logging request carries user's logging on authentication;
User right corresponding to user information associated with user's logging on authentication is verified, after verification passes through, Complete the login of the second system.
A kind of multisystem entering device, described device include:
Receiving module, for receiving the first logging request from the first system;First logging request carries the One user account and the first account number cipher;
Generation module, for generating user's login after first user account and the first account number cipher are by verifying Voucher simultaneously issues;
Determining module, for determining user information associated with first user account and the first account number cipher;
Associated storage module, for user's logging on authentication and the user information described in associated storage;
The receiving module is also used to receive the second logging request from second system;Second logging request is taken Band user's logging on authentication;
Correction verification module, for verifying user right corresponding to user information associated with user's logging on authentication, After verification passes through, the login of the second system is completed.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing Device performs the steps of when executing the computer program
Receive the first logging request from the first system;First logging request carries the first user account and the One account number cipher;
After first user account and the first account number cipher are by verifying, generate user's logging on authentication and issue;
Determine user information associated with first user account and the first account number cipher;
User's logging on authentication and the user information described in associated storage;
Receive the second logging request from second system;Second logging request carries user's logging on authentication;
User right corresponding to user information associated with user's logging on authentication is verified, after verification passes through, Complete the login of the second system.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor It is performed the steps of when row
Receive the first logging request from the first system;First logging request carries the first user account and the One account number cipher;
After first user account and the first account number cipher are by verifying, generate user's logging on authentication and issue;
Determine user information associated with first user account and the first account number cipher;
User's logging on authentication and the user information described in associated storage;
Receive the second logging request from second system;Second logging request carries user's logging on authentication;
User right corresponding to user information associated with user's logging on authentication is verified, after verification passes through, Complete the login of the second system.
Above-mentioned multisystem login method, device, computer equipment and storage medium, when the first system passes through login authentication Afterwards, certificate server generates user's logging on authentication and issues.User information is associated with user's logging on authentication and deposits by certificate server Storage, so that user when logging in second system, can be logged in by user's logging on authentication.In this way, certificate server only needs Verifying user right corresponding to user information associated with user's logging on authentication can be completed second after verification passes through The login of system.In this way, operation system and certificate server is independent, when user need to log in multiple and different systems, Without inputting user account and account number cipher when logging in each system, need to can only be logged in by user's logging on authentication multiple System reduces the operation for logging in multiple systems, substantially increases polyphyly under the premise of ensureing the safety that multisystem logs in The efficiency that system logs in.
Detailed description of the invention
Fig. 1 is the application scenario diagram of multisystem login method in one embodiment;
Fig. 2 is the flow diagram of multisystem login method in one embodiment;
Fig. 3 is the timing diagram of multisystem login method in one embodiment;
Fig. 4 is the structural block diagram of multisystem entering device in one embodiment;
Fig. 5 is the structural block diagram of multisystem entering device in another embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Multisystem login method provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, terminal 110 are communicated with operation system 120 by network by network.Wherein, operation system 120 includes multiple systems, and such as first System 121 and second system 122 etc..Operation system 120 and certificate server 130 pass through network connection.Terminal 110 is to the first system System 121 sends the first logging request for carrying the first user account and the first account number cipher, and the first system 121 is logged in first Request is forwarded to certificate server 130.Certificate server 130 verifies the first user account and the first account number cipher, tests Card generates user's logging on authentication and is issued to terminal 110 after passing through.Terminal 110 carries user to the transmission of second system 122 and steps on The second logging request of voucher is recorded, the second logging request is forwarded to certificate server 130 by second system 122.Certificate server 130 pairs verify with the associated user information of user's logging on authentication, after verification passes through, complete the login of second system.
Wherein, terminal 110 can be, but not limited to be various personal computers, laptop, smart phone, tablet computer With portable wearable device.Operation system 120 can be independent server or server cluster to realize.Wherein, first System and second system are used to distinguish different operation systems, and the first system and second system be all under the premise of not causing ambiguity It is properly termed as operation system.Certificate server 130 can use the server of the either multiple server compositions of independent server Cluster is realized.
In one embodiment, as shown in Fig. 2, providing a kind of multisystem login method, it is applied in Fig. 1 in this way Certificate server 130 for be illustrated, comprising the following steps:
S202 receives the first logging request from the first system;First logging request carry the first user account and First account number cipher.
Wherein, the first system is operation system, specifically can be the first service server.First logging request is to pass through use Family account logs in the logging request triggered when the first service server.Certificate server is corresponding with multiple operation systems And for providing the server to the user account progress service for checking credentials for logging in each system.
Specifically, user can trigger the first logging request for logging in the first system by terminal, and the first system will receive The first logging request be forwarded to certificate server.Certificate server can receive the from the first system by network connection One logging request.Wherein, the first logging request carries the first user account and the first account number cipher.
In one embodiment, operation has browser application in terminal, and terminal can be entered and first by browser application Login interface corresponding to system.User inputs the first user account and the first account number cipher in login interface.Terminal according to First user account and the first account number cipher generate logging request.The detectable triggering of terminal sends the trigger action of logging request, When detecting trigger action, logging request is sent to the first system.
Wherein, wherein trigger action is the predetermined registration operation for acting on login interface, detects that trigger action sends triggering Logging request.Trigger action specifically can be touch operation, cursor operations, button operation or voice operating.Wherein, behaviour is touched It can be and touch clicking operation, touch pressing operation or touch slide, touch operation can be single-touch operation Or multiple point touching operation;The behaviour that cursor operations can be the operation that control cursor is clicked or control cursor is pressed Make;Button operation can be operation of virtual key or physical button operation etc..
S204 generates user's logging on authentication and simultaneously issues after the first user account and the first account number cipher are by verifying.
Wherein, user's logging on authentication is the voucher for verifying user identity, specifically can letter, number, Chinese character or word Symbol string etc..Certificate server receives the logging request corresponding to the different user account, generate different users log in Card.What user's logging on authentication can be randomly generated, in this way, can ensure that certificate server one time first login of every reception is asked It asks, just generates unique user's logging on authentication.
Specifically, certificate server receive carry the first user account and the first account number cipher first log in ask After asking, verifying is compared according to the user account of storage and corresponding account number cipher.When the first user account and the first account After number password is verified by account, certificate server then generates corresponding user's logging on authentication at random.It logs in and asks in response to first It asks, user's logging on authentication is issued to the first system by certificate server, and user's logging on authentication is forwarded to terminal again by the first system. Terminal stores the user's logging on authentication received into the cookie of browser.
In one embodiment, in user's registration account, certificate server can by user account, account number cipher and User information (for example, with information such as 6 after the cell-phone number of user account binding or the identity card of user) is associated storage.When After certificate server receives the first logging request, can user account and account number cipher according to the pre-stored data checked.Core To just generating user's logging on authentication after passing through.
S206 determines user information associated with the first user account and the first account number cipher.
Wherein, user information is information relevant with user identity, specifically can be phone number, the unique identities of user The character string etc. that card number, latter six of unique identity card number and user uniquely bind.Specifically, in user's registration account, recognize User account, account number cipher and user information can be associated by card server, and be stored into database.Authentication service Device can search user information associated with the first user account and the first account number cipher from database.
It is understood that user information is the information that user must input when registering multiple associated systems, and For the same user, in the corresponding user account of the multiple systems of registration, the user information inputted is the same.This Sample verifies the identity of user according to user information after being just convenient for.
S208, associated storage user logging on authentication and user information.
Specifically, certificate server can obtain use associated with the first user account after generating user's logging on authentication Family information, user's logging on authentication and corresponding user information can be associated by certificate server, and the user after association is stepped on Record authority and user information store that (Redis database is one to Redis database in the form of key-value (key-value) The storage system of kind key-value) in.Wherein, Redis database can also be existed with framework in certificate server with framework In other associated servers.
S210 receives the second logging request from second system;Second logging request carries user's logging on authentication.
Wherein, second system is operation system, specifically can be the second service server.Second logging request is to pass through use Family logging on authentication logs in the logging request triggered when the second service server.Specifically, certificate server can be connected by network Receive the second logging request from second system.Wherein, the second logging request carries user's logging on authentication.
In one embodiment, operation has browser application in terminal, and terminal can be entered and second by browser application Login interface corresponding to system.When user logs in second system by browser application, cookie of the terminal from browser User's logging on authentication is obtained in (caching).Terminal sends the second logging request for carrying user's logging on authentication to second system. The logging request is forwarded to certificate server by second system.
In one embodiment, the generation step of the second logging request includes: that terminal receives the use that certificate server issues Family logging on authentication;Terminal stores user's logging on authentication into browser rs cache;Terminal receives what user was triggered by browser It is directed to the log-in instruction of second system;Terminal searches user's logging on authentication according to log-in instruction from browser rs cache;Work as end When end finds user's logging on authentication, the second logging request for carrying user's logging on authentication is sent to certificate server.
In one embodiment, when user successfully logs in the first system by terminal with the first user account, it can receive and recognize User's logging on authentication that card server issues.Terminal can store user's logging on authentication into browser rs cache.When user passes through When browser logs in second system, terminal receives the log-in instruction for being directed to second system that user is triggered by browser, and According to log-in instruction, user's logging on authentication is searched from browser rs cache.When finding user's logging on authentication, logged according to user Voucher generates the second logging request.Second logging request is sent to second system by terminal, and second system is by the second logging request It is forwarded to certificate server.
In above-described embodiment, when logging in second system by browser, then without user input corresponding user account and Account number cipher only needs terminal to find user's logging on authentication, can log in second system by user's logging on authentication, convenient fast It is prompt.
S212 verifies user right corresponding to user information associated with user's logging on authentication, after verification passes through, Complete the login of second system.
Specifically, certificate server is stepped on when receiving the second logging request for carrying user's logging on authentication from second User's logging on authentication is extracted in record request.Certificate server is locally searching user's logging on authentication.It is stepped on when finding the user After recording voucher, user information associated with user's logging on authentication is determined.
Further, certificate server can determine with user right corresponding to the user information, when with the user information Corresponding user right is when allowing access authority, then verification passes through, and completes the login of second system.And pass through verification Information feeds back to second system.Second system receives the access that the terminal is allowed after the information that passes through of verification.
In one embodiment, after terminal successfully logs in the first system by user account, certificate server generates user Logging on authentication, and user's logging on authentication and user information correlation are stored into Redis database.At this point it is possible to think Redis User's logging on authentication in database is effective.User corresponding with the user information can directly pass through user's logging on authentication It logs in second system (user account after login is second user account associated with user information).Therefore, when certification takes When business device finds user information corresponding with user's logging on authentication according to user's logging on authentication in Redis database User right corresponding to the user information is thought to allow access authority.
In one embodiment, step S212, that is, verification user information institute associated with user's logging on authentication are right The user right answered, after verification passes through, the step of completing the login of second system, is specifically includes the following steps: determine and second The associated user information of user's logging on authentication entrained by logging request;According to user information, search opposite with second system The second user account answered and the second account number cipher;When finding second user account and the second account number cipher, then school is determined Test by and complete the login of second system.
Specifically, certificate server can search user's letter associated with user's logging on authentication from Redis database Breath.User account according to the pre-stored data and associated user information determine second user account corresponding with the user information With the second account number cipher.Wherein, second user account and the second account number cipher are for logging in second system.When certificate server from When locally finding second user account and the second account number cipher, then determine that verification passes through, passes through to the feedback certification of the second business Feedback information, to complete the login of second system.
It is understood that the first system and second system the premise for not causing ambiguity under can be referred to as business system System.Wherein, multiple operation systems are associated, when user logs in multiple associated operation systems with user account and account number cipher In an operation system when, which can be referred to as the first operation system.It is somebody's turn to do when user is logged in user's logging on authentication When other operation systems in multiple systems, which can be referred to as second system.It is understood that second System can have multiple and the first system and second system not unique.
Above-mentioned multisystem login method, when the first system pass through login authentication after, certificate server generate user log in It demonstrate,proves and issues.Certificate server is by user information and user's logging on authentication associated storage, so that user is when logging in second system, It can be logged in by user's logging on authentication.In this way, certificate server need to only verify use associated with user's logging on authentication The login of second system can be completed after verification passes through in user right corresponding to the information of family.In this way, by operation system and Certificate server is independent, when user need to log in multiple and different systems, without inputting use when logging in each system Family account and account number cipher only need to can log in multiple systems by user's logging on authentication, in the safety for ensureing that multisystem logs in Property under the premise of, reduce the operation for logging in multiple systems, substantially increase multisystem login efficiency.
In one embodiment, before step S202, that is, the first logging request from the first system is received The step of before, the multisystem login method further include the steps that account register, which includes: to be received respectively from first First account registration request of system and the second account registration request from second system;First account registration request Carry the first user account, the first account number cipher and user information;Second account registration request carrying second user account, Second account number cipher and user information;Verify the legitimacy of the first user account, the first account number cipher and user information; After being verified, the first user account corresponding with the first system, the first account number cipher and user information are associated Storage;Verify the legitimacy of second user account, the second account number cipher and user information;It, will be with second after being verified The corresponding second user account of system, the second account number cipher and user information are associated storage.
Specifically, for user before logging in any system in multisystem, user must hold user's account of the system first Number.User need to register the user account of the system before any system in first login multisystem.When user need to register it is more When account corresponding to any system in a interconnected system, user can input user in the account register interface of terminal display Account, account number cipher and user information.User account, account number cipher and the user information that terminal is inputted according to user are raw At account registration request, and it is sent to corresponding operation system.Account registration request is forwarded to certificate server by operation system.
It is understood that when user's registration account corresponding with the first system, that user can provide in the first system, And the first user account, the first account number cipher and user information are inputted in the account register interface of terminal display.And pass through Terminal generates the first account registration request, by the first account according to the first user account, the first account number cipher and user information Number registration request is sent to the first system.First account registration request is forwarded to certificate server by the first system.
When user's registration account corresponding with second system, user can second system provide and in terminal display Account register interface in input second user account, the second account number cipher and user information.And by terminal, according to the Two user accounts, the second account number cipher and user information generate the second account registration request, by the second account registration request It is sent to second system.Second account registration request is forwarded to certificate server by second system.
Further, when certificate server is respectively received and corresponding to the first operation system and the second operation system After one account registration request and the second account registration request, corresponding first user account, the first account number cipher and user are verified The legitimacy of information, and the corresponding second user account of verifying, the legitimacy of the second account number cipher and user information.
Further, after the legitimate verification of the first user account, the first account number cipher and user information passes through, The first user account corresponding with the first system, the first account number cipher and user information can be associated by certificate server, And it is stored in a storage medium.When the legitimate verification of second user account, the second account number cipher and user information passes through Afterwards, certificate server can close second user account corresponding with second system, the second account number cipher and user information Connection, and be stored in a storage medium.
It is understood that after certificate server receives the first account registration request from the first system The legitimacy of the first user account, the first account number cipher and user information is verified, and after being verified, it will be with the first system Corresponding first user account, the first account number cipher and the user information of uniting are associated storage.When certificate server receives After the second account registration request from second system, that is, it can verify that second user account, the second account number cipher and user's letter The legitimacy of breath, and after being verified, it will second user account corresponding with second system, the second account number cipher, Yi Jiyong Family information is associated storage.Wherein, the verification step to the first account registration request and storing step, infuse with to the second account The execution order of the verification step of volume request and storing step without limitation, to the verification step of the first account registration request and is deposited Storage step can be before with the verification step and storing step to the second account registration request, simultaneously or later execute.
In one embodiment, whether certificate server can separately verify the first user account and/or second user account It is repeated with existing account, that whether the first account number cipher and/or the second account number cipher meet preset requirement, user information is no wrong Deng.Wherein, whether account number cipher meets preset requirement, for example, whether account number cipher contains in number, letter, character etc. extremely It is two kinds few;Or whether the digit of account number cipher reaches presetting digit capacity etc..User information is no wrong, for example, the digit of user information It is whether true etc. whether presetting digit capacity, user information are reached.
In above-described embodiment, in account registration process, it is corresponding with the first system that storage can be respectively associated in certificate server The first user account, the first account number cipher and user information and second user account corresponding with second system, the second account Number password and user information, login authentication when system corresponding convenient for subsequent login.
In one embodiment, step S202, that is, after the first user account and the first account number cipher are by verifying, The step of generating user's logging on authentication and issuing is specifically includes the following steps: when the first user account and the first account number cipher pass through After verifying, system level corresponding to the first system is determined;When system level is main system level, then user is generated at random and is stepped on Record voucher;In response to the first logging request, feedback user logging on authentication.
In one embodiment, after the first user account and the first account number cipher are by verifying, certificate server can be to The feedback information that the first system feedback validation passes through.And.Certificate server can determine system level belonging to the first system.When When the first system is main system, just produces user's logging on authentication and issue.Otherwise, the first user account and first are only fed back The feedback information that account number cipher is verified.
In one embodiment, certificate server can preset system level corresponding to each operation system.Wherein it is Irrespective of size does not include main system rank and auxiliary system level etc..It can also be formulated according to the corresponding business tine of each operation system more detailed Thin system level, the present embodiment is it is not limited here.In turn, certificate server can be preset, and only pass through user's account Number and account number cipher log in main system rank operation system after, certificate server can just generate user's logging on authentication.Namely It only logs in just exempt to pay a secret visit after the main business system and asks other associated operation systems, if first login is auxiliary business system System, then will still need to input user account and account number cipher when logging in other interconnected systems could log in.
It is understood that the operation system in main system rank can have one or more;In auxiliary system level Operation system can also have one or more, the present embodiment is it is not limited here.
In above-described embodiment, certificate server is only being verified corresponding to main system and is carrying user account After the logging request of account number cipher, user's logging on authentication can be just generated, in this way, user can just make when logging in other systems With close efficiently login mode is exempted from, the safety of multisystem login is substantially increased.
In one embodiment, which further includes the steps that removing user's logging on authentication, step tool Body includes: to receive user's logging on authentication clearance order;User's logging on authentication clearance order carries user's logging on authentication to be cleaned; According to user's logging on authentication clearance order, corresponding user's logging on authentication is searched from local;It is removed in response to user's logging on authentication Instruction, deletes the user's logging on authentication found and the user information with user's logging on authentication associated storage.
Specifically, user's logging on authentication has validity period.After expiring the validity period of user's logging on authentication, terminal can be touched Hair family logging on authentication clearance order.Certificate server can receive user's logging on authentication clearance order of terminal triggering, the user Logging on authentication clearance order carries user's logging on authentication to be cleaned.Certificate server according to user's logging on authentication clearance order, Corresponding user's logging on authentication is searched from Redis database.After finding user's logging on authentication, the user found is deleted Logging on authentication and the user information with user's logging on authentication associated storage stored in Redis database.
In one embodiment, start timing after terminal receives user's logging on authentication that certificate server issues, when When period at the time of current time timing to reaches preset duration, having for user's logging on authentication can determine that The effect phase expires.At this point, terminal can automatic trigger user's logging on authentication clearance order.
In one embodiment, the triggering step of user's logging on authentication clearance order includes: that terminal monitoring user triggers behaviour Make;When user's trigger action is not detected in terminal in preset period of time, user's logging on authentication to be cleaned is obtained;Terminal triggering The step of sending user's logging on authentication clearance order to certificate server;User's logging on authentication clearance order carries use to be cleaned Family logging on authentication.
In one embodiment, terminal can detect the triggering behaviour from user in browser interface periodically or in real time Make.When user's trigger action is not detected in terminal in preset period of time, user's logging on authentication can be searched from browser rs cache, User's logging on authentication is user's logging on authentication to be cleaned.Terminal can automatic trigger to certificate server send user log in The step of voucher clearance order, wherein user's logging on authentication clearance order carries user's logging on authentication to be cleaned.In this way, working as When user's trigger action is not detected in terminal in preset period of time, just trigger user's logging on authentication clearance order, that is, when with User's logging on authentication clearance order is just triggered when not using operation system in family, has ensured the safety that multisystem uses.
In above-described embodiment, corresponding user's logging on authentication, Yi Jiyu can be deleted according to user's logging on authentication clearance order The user information of user's logging on authentication associated storage, that is, failed when secondary multisystem fast logs in, in this way by limited Timeliness can effectively ensure quick safety when logging in multisystem.
With reference to Fig. 3, Fig. 3 is the timing diagram that multisystem logs in, in one specifically embodiment, the multisystem login method Described below: user can trigger the first logging request for logging in the first system by terminal first, and the first logging request carries User account and account number cipher.First logging request is forwarded to certificate server by the first system.Certificate server verifies user Account and account number cipher generate user's logging on authentication after being verified.User's logging on authentication is fed back to by certificate server One system, the first system are forwarded to terminal.User triggers the second logging on authentication for logging in second system by terminal, and second logs in Voucher carries user's the proof of Register.Second logging request is forwarded to certificate server by second system, and certificate server is searched The feedback information being verified is returned when finding user information with the associated user information of user's logging on authentication.Second system System receives feedback information, and authorization terminal accesses, and user logins successfully.
It should be understood that although each step in the flow chart of Fig. 2 is successively shown according to the instruction of arrow, this A little steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein, these steps It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least part in Fig. 2 Step may include that perhaps these sub-steps of multiple stages or stage are executed in synchronization to multiple sub-steps It completes, but can execute at different times, the execution sequence in these sub-steps or stage, which is also not necessarily, successively to be carried out, But it can be executed in turn or alternately at least part of the sub-step or stage of other steps or other steps.
In one embodiment, as shown in figure 4, providing a kind of multisystem entering device 400, comprising: receiving module 401, generation module 402, determining module 403, associated storage module 404 and correction verification module 405, in which:
Receiving module 401, for receiving the first logging request from the first system;First logging request carries first User account and the first account number cipher.
Generation module 402, for after the first user account and the first account number cipher are by verifying, generate user's login with It demonstrate,proves and issues.
Determining module 403, for determining user information associated with the first user account and the first account number cipher.
Associated storage module 404 is used for associated storage user logging on authentication and user information.
Receiving module 401 is also used to receive the second logging request from second system;Second logging request, which carries, to be used Family logging on authentication.
Correction verification module 405, for verifying user right corresponding to user information associated with user's logging on authentication, when After verification passes through, the login of second system is completed.
In one embodiment, receiving module 401 is also used to receive the first account registration from the first system respectively Request and from second system the second account registration request;First account registration request carries the first user account, the One account number cipher and user information;Second account registration request carries second user account, the second account number cipher, Yi Jiyong Family information.
Correction verification module 405 is also used to verify the legitimacy of the first user account, the first account number cipher and user information.
Associated storage module 404 is also used to after being verified, will the first user account corresponding with the first system, first Account number cipher and user information are associated storage.
Correction verification module 405 is also used to verify the legitimacy of second user account, the second account number cipher and user information.
Associated storage module 404 is also used to after being verified, will second user account corresponding with second system, second Account number cipher and user information are associated storage.
In one embodiment, generation module 402 is also used to pass through verifying when the first user account and the first account number cipher Afterwards, system level corresponding to the first system is determined;When system level be main system level when, then at random generate user log in Card;In response to the first logging request, feedback user logging on authentication.
In one embodiment, the user's logging on authentication issued is used to indicate terminal and receives the user that certificate server issues Logging on authentication;Terminal stores user's logging on authentication into browser rs cache;Terminal receives the needle that user is triggered by browser For the log-in instruction of second system;Terminal searches user's logging on authentication according to log-in instruction from browser rs cache;Work as terminal When finding user's logging on authentication, the second logging request for carrying user's logging on authentication is sent to certificate server.
In one embodiment, correction verification module 405 be also used to it is determining log in user entrained by the second logging request with Demonstrate,prove associated user information;According to user information, second user account corresponding with second system and the second account are searched Password;When finding second user account and the second account number cipher, then determine that verification passes through and complete the login of second system.
In one embodiment, as shown in figure 5, the multisystem entering device 400 further includes searching module 406, deletes mould Block 407.
Receiving module 401 is also used to receive user's logging on authentication clearance order;User's logging on authentication clearance order carry to User's logging on authentication of removing.
Searching module 406, for according to user's logging on authentication clearance order, from it is local search corresponding user log in Card.
Removing module 407, in response to user's logging on authentication clearance order, delete the user's logging on authentication found, And the user information with user's logging on authentication associated storage.
In one embodiment, the user's logging on authentication issued is used to indicate terminal monitoring user's trigger action;Work as terminal When user's trigger action being not detected in preset period of time, user's logging on authentication to be cleaned is obtained;Terminal is triggered to be taken to certification The step of device transmission user's logging on authentication clearance order of being engaged in;User's logging on authentication clearance order carry user to be cleaned log in Card.
Above-mentioned multisystem entering device, when the first system pass through login authentication after, certificate server generate user log in It demonstrate,proves and issues.Certificate server is by user information and user's logging on authentication associated storage, so that user is when logging in second system, It can be logged in by user's logging on authentication.In this way, certificate server need to only verify use associated with user's logging on authentication The login of second system can be completed after verification passes through in user right corresponding to the information of family.In this way, by operation system and Certificate server is independent, when user need to log in multiple and different systems, without inputting use when logging in each system Family account and account number cipher only need to can log in multiple systems by user's logging on authentication, in the safety for ensureing that multisystem logs in Property under the premise of, reduce the operation for logging in multiple systems, substantially increase multisystem login efficiency.
Specific about multisystem entering device limits the restriction that may refer to above for multisystem login method, This is repeated no more.Modules in above-mentioned multisystem entering device can come fully or partially through software, hardware and combinations thereof It realizes.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with software Form is stored in the memory in computer equipment, executes the corresponding operation of the above modules in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 6.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is for storing data.The network interface of the computer equipment is used to pass through network connection with external terminal Communication.To realize a kind of multisystem login method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, the processor are performed the steps of to receive when executing computer program and be logged in from the first of the first system Request;First logging request carries the first user account and the first account number cipher;When the first user account and the first account number cipher After verifying, generates user's logging on authentication and issue;Determine use associated with the first user account and the first account number cipher Family information;Associated storage user logging on authentication and user information;Receive the second logging request from second system;Second steps on Record request carries user's logging on authentication;User right corresponding to user information associated with user's logging on authentication is verified, when After verification passes through, the login of second system is completed.
In one embodiment, it also performs the steps of and receives respectively from the when processor executes computer program First account registration request of one system and the second account registration request from second system;The registration of first account is asked It asks and carries the first user account, the first account number cipher and user information;Second account registration request carries second user account Number, the second account number cipher and user information;Verify the legal of the first user account, the first account number cipher and user information Property;After being verified, the first user account corresponding with the first system, the first account number cipher and user information are carried out Associated storage;Verify the legitimacy of second user account, the second account number cipher and user information;It, will be with after being verified The corresponding second user account of second system, the second account number cipher and user information are associated storage.
In one embodiment, also perform the steps of when processor executes computer program when the first user account and After first account number cipher is by verifying, system level corresponding to the first system is determined;When system level is main system level, User's logging on authentication is then generated at random;In response to the first logging request, feedback user logging on authentication.
In one embodiment, the user's logging on authentication issued is used to indicate terminal and receives the user that certificate server issues Logging on authentication;Terminal stores user's logging on authentication into browser rs cache;Terminal receives the needle that user is triggered by browser For the log-in instruction of second system;Terminal searches user's logging on authentication according to log-in instruction from browser rs cache;Work as terminal When finding user's logging on authentication, the second logging request for carrying user's logging on authentication is sent to certificate server.
In one embodiment, determining log in second is also performed the steps of when processor executes computer program to ask Seek the entrained associated user information of user's logging on authentication;According to user information, corresponding with second system the is searched Two user accounts and the second account number cipher;When finding second user account and the second account number cipher, then determine that verification passes through And complete the login of second system.
In one embodiment, it is also performed the steps of when processor executes computer program and receives user's logging on authentication Clearance order;User's logging on authentication clearance order carries user's logging on authentication to be cleaned;Referred to according to the removing of user's logging on authentication It enables, searches corresponding user's logging on authentication from local;In response to user's logging on authentication clearance order, deletes the user found and step on Record voucher and the user information with user's logging on authentication associated storage.
In one embodiment, the user's logging on authentication issued is used to indicate terminal monitoring user's trigger action;Work as terminal When user's trigger action being not detected in preset period of time, user's logging on authentication to be cleaned is obtained;Terminal is triggered to be taken to certification The step of device transmission user's logging on authentication clearance order of being engaged in;User's logging on authentication clearance order carry user to be cleaned log in Card.
Above-mentioned computer equipment, after the first system passes through login authentication, certificate server generates user's logging on authentication simultaneously It issues.Certificate server is by user information and user's logging on authentication associated storage, so that user can lead to when logging in second system User's logging on authentication is crossed to log in.In this way, certificate server need to only verify user's letter associated with user's logging on authentication The login of second system can be completed after verification passes through in the corresponding user right of breath.In this way, by operation system and certification Server is independent, when user need to log in multiple and different systems, without inputting user's account when logging in each system Number and account number cipher, only multiple systems need to can be logged in by user's logging on authentication, in the safety for ensureing that multisystem logs in Under the premise of, reduce the operation for logging in multiple systems, substantially increases the efficiency of multisystem login.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of the first logging request received from the first system when being executed by processor;First login is asked It asks and carries the first user account and the first account number cipher;After the first user account and the first account number cipher are by verifying, generate User's logging on authentication simultaneously issues;Determine user information associated with the first user account and the first account number cipher;Associated storage User's logging on authentication and user information;Receive the second logging request from second system;Second logging request carries user Logging on authentication;User right corresponding to user information associated with user's logging on authentication is verified, after verification passes through, is completed The login of second system.
In one embodiment, it also performs the steps of and receives respectively from the when processor executes computer program First account registration request of one system and the second account registration request from second system;The registration of first account is asked It asks and carries the first user account, the first account number cipher and user information;Second account registration request carries second user account Number, the second account number cipher and user information;Verify the legal of the first user account, the first account number cipher and user information Property;After being verified, the first user account corresponding with the first system, the first account number cipher and user information are carried out Associated storage;Verify the legitimacy of second user account, the second account number cipher and user information;It, will be with after being verified The corresponding second user account of second system, the second account number cipher and user information are associated storage.
In one embodiment, also perform the steps of when processor executes computer program when the first user account and After first account number cipher is by verifying, system level corresponding to the first system is determined;When system level is main system level, User's logging on authentication is then generated at random;In response to the first logging request, feedback user logging on authentication.
In one embodiment, the user's logging on authentication issued is used to indicate terminal and receives the user that certificate server issues Logging on authentication;Terminal stores user's logging on authentication into browser rs cache;Terminal receives the needle that user is triggered by browser For the log-in instruction of second system;Terminal searches user's logging on authentication according to log-in instruction from browser rs cache;Work as terminal When finding user's logging on authentication, the second logging request for carrying user's logging on authentication is sent to certificate server.
In one embodiment, determining log in second is also performed the steps of when processor executes computer program to ask Seek the entrained associated user information of user's logging on authentication;According to user information, corresponding with second system the is searched Two user accounts and the second account number cipher;When finding second user account and the second account number cipher, then determine that verification passes through And complete the login of second system.
In one embodiment, it is also performed the steps of when processor executes computer program and receives user's logging on authentication Clearance order;User's logging on authentication clearance order carries user's logging on authentication to be cleaned;Referred to according to the removing of user's logging on authentication It enables, searches corresponding user's logging on authentication from local;In response to user's logging on authentication clearance order, deletes the user found and step on Record voucher and the user information with user's logging on authentication associated storage.
In one embodiment, the user's logging on authentication issued is used to indicate terminal monitoring user's trigger action;Work as terminal When user's trigger action being not detected in preset period of time, user's logging on authentication to be cleaned is obtained;Terminal is triggered to be taken to certification The step of device transmission user's logging on authentication clearance order of being engaged in;User's logging on authentication clearance order carry user to be cleaned log in Card.
Above-mentioned computer readable storage medium, after the first system passes through login authentication, certificate server generates user and steps on Record voucher simultaneously issues.Certificate server is by user information and user's logging on authentication associated storage, so that user is logging in the second system When system, it can be logged in by user's logging on authentication.In this way, certificate server need to only verify it is associated with user's logging on authentication User information corresponding to user right the login of second system can be completed after verification passes through.In this way, by business system System and certificate server are independent, when user need to log in multiple and different systems, without defeated when logging in each system Access customer account and account number cipher only need to can log in multiple systems by user's logging on authentication, ensure what multisystem logged in Under the premise of safety, reduce the operation for logging in multiple systems, substantially increases the efficiency of multisystem login.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of multisystem login method is applied to certificate server, which comprises
Receive the first logging request from the first system;First logging request carries the first user account and the first account Number password;
After first user account and the first account number cipher are by verifying, generate user's logging on authentication and issue;
Determine user information associated with first user account and the first account number cipher;
User's logging on authentication and the user information described in associated storage;
Receive the second logging request from second system;Second logging request carries user's logging on authentication;
User right corresponding to user information associated with user's logging on authentication is verified, after verification passes through, is completed The login of the second system.
2. the method according to claim 1, wherein the method also includes:
It is received respectively from the first account registration request of the first system and from the second of the second system Account registration request;The first account registration request carries the first user account, the first account number cipher and user information; The second account registration request carries second user account, the second account number cipher and user information;
Verify the legitimacy of first user account, the first account number cipher and user information;
It, will the first user account corresponding with the first system, the first account number cipher and user information after being verified It is associated storage;
Verify the legitimacy of the second user account, the second account number cipher and user information;
It, will second user account corresponding with the second system, the second account number cipher and user information after being verified It is associated storage.
3. the method according to claim 1, wherein described work as first user account and the first account number cipher After verifying, generates user's logging on authentication and issues, comprising:
After first user account and the first account number cipher are by verifying, determine system-level corresponding to the first system Not;
When the system level is main system level, then user's logging on authentication is generated at random;
In response to first logging request, user's logging on authentication is fed back.
4. the method according to claim 1, wherein the generation step of second logging request includes:
Terminal receives user's logging on authentication that the certificate server issues;
The terminal stores user's logging on authentication into browser rs cache;
The terminal receives the log-in instruction for being directed to the second system that user is triggered by browser;
The terminal searches user's logging on authentication according to the log-in instruction from the browser rs cache;
When the terminal finds user's logging on authentication, user's logging on authentication is carried to certificate server transmission The second logging request.
5. according to the method described in claim 2, it is characterized in that, the verification use associated with user's logging on authentication User right corresponding to the information of family completes the login of the second system after verification passes through, comprising:
Determine user information associated with user's logging on authentication entrained by second logging request;
According to the user information, second user account corresponding with the second system and the second account number cipher are searched;
When finding the second user account and the second account number cipher, then determine that verification passes through and completes the second system Login.
6. the method according to any one of claims 1 to 5, which is characterized in that the method also includes:
Receive user's logging on authentication clearance order;User's logging on authentication clearance order carry user to be cleaned log in Card;
According to user's logging on authentication clearance order, corresponding user's logging on authentication is searched from local;
In response to user's logging on authentication clearance order, deletes the user's logging on authentication found and stepped on the user Record the user information of voucher associated storage.
7. according to the method described in claim 6, it is characterized in that, the triggering step packet of user's logging on authentication clearance order It includes:
Terminal monitoring user's trigger action;
When user's trigger action is not detected in the terminal in preset period of time, obtain user to be cleaned log in Card;
The terminal triggers the step of sending user's logging on authentication clearance order to the certificate server;The user log in Card clearance order carries user's logging on authentication to be cleaned.
8. a kind of multisystem entering device, which is characterized in that described device includes:
Receiving module, for receiving the first logging request from the first system;First logging request carries first and uses Family account and the first account number cipher;
Generation module, for after first user account and the first account number cipher are by verifying, generation user's logging on authentication And it issues;
Determining module, for determining user information associated with first user account and the first account number cipher;
Associated storage module, for user's logging on authentication and the user information described in associated storage;
The receiving module is also used to receive the second logging request from second system;Second logging request, which carries, to be used Family logging on authentication;
Correction verification module works as school for verifying user right corresponding to user information associated with user's logging on authentication It tests by rear, completes the login of the second system.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
CN201811302719.5A 2018-11-02 2018-11-02 Multi-system login method and device, computer equipment and storage medium Active CN109274685B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811302719.5A CN109274685B (en) 2018-11-02 2018-11-02 Multi-system login method and device, computer equipment and storage medium
PCT/CN2019/070885 WO2020087778A1 (en) 2018-11-02 2019-01-08 Multiple system login method, apparatus, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811302719.5A CN109274685B (en) 2018-11-02 2018-11-02 Multi-system login method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109274685A true CN109274685A (en) 2019-01-25
CN109274685B CN109274685B (en) 2021-09-17

Family

ID=65192541

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811302719.5A Active CN109274685B (en) 2018-11-02 2018-11-02 Multi-system login method and device, computer equipment and storage medium

Country Status (2)

Country Link
CN (1) CN109274685B (en)
WO (1) WO2020087778A1 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111200593A (en) * 2019-12-20 2020-05-26 北京你财富计算机科技有限公司 Application login method and device and electronic equipment
CN111291353A (en) * 2020-02-05 2020-06-16 深信服科技股份有限公司 Account number association method and device and computer storage medium
WO2020155492A1 (en) * 2019-01-31 2020-08-06 平安科技(深圳)有限公司 Device id-based login state sharing method and device
CN111552936A (en) * 2020-04-26 2020-08-18 国电南瑞科技股份有限公司 Cross-system access right control method and system based on scheduling mechanism level
CN111814130A (en) * 2020-07-06 2020-10-23 新华智云科技有限公司 Single sign-on method and system
CN111865938A (en) * 2020-06-30 2020-10-30 上海东普信息科技有限公司 Login method and device
CN111970282A (en) * 2020-08-19 2020-11-20 工银科技有限公司 Authentication method and device for heterogeneous module in system
CN112235246A (en) * 2020-09-14 2021-01-15 上海硬通网络科技有限公司 Cross-terminal account login method and device and electronic equipment
CN112272171A (en) * 2020-10-20 2021-01-26 侯亦兵 Mobile internet cross-platform user management method and device
CN112417401A (en) * 2020-11-26 2021-02-26 深圳创维-Rgb电子有限公司 Account verification method, device and system and computer readable storage medium
CN112948814A (en) * 2021-03-19 2021-06-11 合肥京东方光电科技有限公司 Account password management method and device and storage medium
CN112968862A (en) * 2020-12-31 2021-06-15 南京联创互联网技术有限公司 Single sign-on method and device based on redis
CN113599833A (en) * 2021-08-03 2021-11-05 深圳市乐天堂科技有限公司 Account login method and device, computing equipment and storage medium
CN114011079A (en) * 2021-10-29 2022-02-08 上海米哈游天命科技有限公司 Cloud game login method and device, electronic equipment and storage medium
CN114095263A (en) * 2021-11-24 2022-02-25 上海派拉软件股份有限公司 Communication method, device and system
CN114697109A (en) * 2022-03-30 2022-07-01 中国银行股份有限公司 Login information processing method, first system, terminal and second system
WO2024193160A1 (en) * 2023-03-17 2024-09-26 支付宝(杭州)信息技术有限公司 Login process triggering method and apparatus, device, and medium

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581071B (en) * 2020-05-09 2023-12-19 北京百度网讯科技有限公司 Data processing method, device, equipment and storage medium
CN113645263B (en) * 2020-05-11 2024-04-16 广州汽车集团股份有限公司 Account binding method and device
CN111651741B (en) * 2020-06-05 2024-05-07 腾讯科技(深圳)有限公司 User identity recognition method, device, computer equipment and storage medium
CN111831990B (en) * 2020-07-17 2024-08-23 深圳市丰巢科技有限公司 Express delivery person account management method and device, electronic equipment and storage medium
CN112087425B (en) * 2020-07-30 2022-11-29 浪潮通用软件有限公司 Login method, equipment and medium of ERP software system
CN112115454B (en) * 2020-09-28 2023-09-05 中国银行股份有限公司 Single sign-on method, first server and electronic equipment
CN113761490A (en) * 2020-10-22 2021-12-07 北京沃东天骏信息技术有限公司 Data processing method and device
CN113761511A (en) * 2020-11-17 2021-12-07 北京沃东天骏信息技术有限公司 Screen locking management method and device
CN112491890A (en) * 2020-11-27 2021-03-12 中国农业银行股份有限公司 Access method and device
CN112769754B (en) * 2020-12-18 2023-10-24 中国平安财产保险股份有限公司 Client access method, device, equipment and storage medium
CN113568652A (en) * 2021-06-29 2021-10-29 深圳云之家网络有限公司 Application system processing method and device, computer equipment and storage medium
CN113568726B (en) * 2021-07-23 2024-03-26 中信银行股份有限公司 Multi-service system processing method, operation platform, electronic equipment and storage medium
CN113660229B (en) * 2021-07-30 2023-04-07 未鲲(上海)科技服务有限公司 Multi-system single sign-on method, device, equipment and medium based on RPA
CN114430346B (en) * 2022-01-27 2023-09-05 亿咖通(湖北)技术有限公司 Login method and device and electronic equipment
CN114201778B (en) * 2022-02-18 2022-05-17 汇元银通(北京)在线支付技术有限公司 Authority authentication method, system, medium and equipment based on Redis
CN114697074A (en) * 2022-02-23 2022-07-01 深圳爱捷云科技有限公司 Authority verification method, electronic device and storage medium
CN114567475B (en) * 2022-02-23 2024-11-08 平安国际智慧城市科技股份有限公司 Method and device for logging in multiple systems, electronic equipment and storage medium
CN114978702B (en) * 2022-05-24 2024-03-19 上海哔哩哔哩科技有限公司 Account management method, platform and system, computing device and readable storage medium
CN115086052B (en) * 2022-06-23 2023-07-18 全知科技(杭州)有限责任公司 Method for automatically analyzing account based on HTTP (hyper text transport protocol) traffic
CN115208664B (en) * 2022-07-15 2024-04-23 平安科技(深圳)有限公司 Method, device, equipment and storage medium for unified identification of multiple platform users
CN115242511B (en) * 2022-07-22 2024-04-12 成都中科大旗软件股份有限公司 Multi-environment application management platform and management method
CN117896393A (en) * 2022-10-13 2024-04-16 华为技术有限公司 Account synchronization method, device and system among devices and storage medium
CN118338289B (en) * 2024-06-13 2024-08-13 杭州中焯信息技术股份有限公司 Verification device and method based on multiple access sites

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355527A (en) * 2008-08-15 2009-01-28 深圳市中兴移动通信有限公司 Method for implementing single-point LOG striding domain name
CN101719238A (en) * 2009-11-30 2010-06-02 中国建设银行股份有限公司 Method and system for managing, authenticating and authorizing unified identities
CN102469075A (en) * 2010-11-09 2012-05-23 中科正阳信息安全技术有限公司 Integrated authentication method based on WEB single sign-on
CN102546570A (en) * 2010-12-31 2012-07-04 国际商业机器公司 Processing method and system for single sign-on
US8683562B2 (en) * 2011-02-03 2014-03-25 Imprivata, Inc. Secure authentication using one-time passwords

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8959608B2 (en) * 2012-12-26 2015-02-17 Cellco Partnership Single sign-on for a native application and a web application on a mobile device
CN105592003B (en) * 2014-10-22 2019-08-09 北京拓尔思信息技术股份有限公司 A kind of cross-domain single login method and system based on notice

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355527A (en) * 2008-08-15 2009-01-28 深圳市中兴移动通信有限公司 Method for implementing single-point LOG striding domain name
CN101719238A (en) * 2009-11-30 2010-06-02 中国建设银行股份有限公司 Method and system for managing, authenticating and authorizing unified identities
CN102469075A (en) * 2010-11-09 2012-05-23 中科正阳信息安全技术有限公司 Integrated authentication method based on WEB single sign-on
CN102546570A (en) * 2010-12-31 2012-07-04 国际商业机器公司 Processing method and system for single sign-on
US8683562B2 (en) * 2011-02-03 2014-03-25 Imprivata, Inc. Secure authentication using one-time passwords

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020155492A1 (en) * 2019-01-31 2020-08-06 平安科技(深圳)有限公司 Device id-based login state sharing method and device
CN111200593A (en) * 2019-12-20 2020-05-26 北京你财富计算机科技有限公司 Application login method and device and electronic equipment
CN111291353A (en) * 2020-02-05 2020-06-16 深信服科技股份有限公司 Account number association method and device and computer storage medium
CN111552936A (en) * 2020-04-26 2020-08-18 国电南瑞科技股份有限公司 Cross-system access right control method and system based on scheduling mechanism level
CN111552936B (en) * 2020-04-26 2022-10-14 国电南瑞科技股份有限公司 Cross-system access right control method and system based on scheduling mechanism level
CN111865938A (en) * 2020-06-30 2020-10-30 上海东普信息科技有限公司 Login method and device
CN111814130A (en) * 2020-07-06 2020-10-23 新华智云科技有限公司 Single sign-on method and system
CN111814130B (en) * 2020-07-06 2024-03-26 新华智云科技有限公司 Single sign-on method and system
CN111970282A (en) * 2020-08-19 2020-11-20 工银科技有限公司 Authentication method and device for heterogeneous module in system
CN111970282B (en) * 2020-08-19 2022-09-30 中国工商银行股份有限公司 Authentication method and device for heterogeneous module in system
CN112235246A (en) * 2020-09-14 2021-01-15 上海硬通网络科技有限公司 Cross-terminal account login method and device and electronic equipment
CN112272171A (en) * 2020-10-20 2021-01-26 侯亦兵 Mobile internet cross-platform user management method and device
CN112417401A (en) * 2020-11-26 2021-02-26 深圳创维-Rgb电子有限公司 Account verification method, device and system and computer readable storage medium
CN112968862A (en) * 2020-12-31 2021-06-15 南京联创互联网技术有限公司 Single sign-on method and device based on redis
CN112948814A (en) * 2021-03-19 2021-06-11 合肥京东方光电科技有限公司 Account password management method and device and storage medium
CN113599833B (en) * 2021-08-03 2024-03-12 深圳市乐天堂科技有限公司 Account login method, account login device, computing equipment and storage medium
CN113599833A (en) * 2021-08-03 2021-11-05 深圳市乐天堂科技有限公司 Account login method and device, computing equipment and storage medium
CN114011079A (en) * 2021-10-29 2022-02-08 上海米哈游天命科技有限公司 Cloud game login method and device, electronic equipment and storage medium
CN114095263A (en) * 2021-11-24 2022-02-25 上海派拉软件股份有限公司 Communication method, device and system
CN114697109A (en) * 2022-03-30 2022-07-01 中国银行股份有限公司 Login information processing method, first system, terminal and second system
WO2024193160A1 (en) * 2023-03-17 2024-09-26 支付宝(杭州)信息技术有限公司 Login process triggering method and apparatus, device, and medium

Also Published As

Publication number Publication date
WO2020087778A1 (en) 2020-05-07
CN109274685B (en) 2021-09-17

Similar Documents

Publication Publication Date Title
CN109274685A (en) Multisystem login method, device, computer equipment and storage medium
CN111917773B (en) Service data processing method and device and server
CN109325342B (en) Identity information management method, device, computer equipment and storage medium
US8615794B1 (en) Methods and apparatus for increased security in issuing tokens
CN105591743B (en) Method and device for identity authentication through equipment operation characteristics of user terminal
CN111475795A (en) Method and device for unified authentication and authorization facing to multiple applications
US8650405B1 (en) Authentication using dynamic, client information based PIN
CN111241555B (en) Access method and device for simulating user login, computer equipment and storage medium
US11431699B2 (en) Method and device for processing user operation
CN107196909B (en) Invitation registration method and device
CN111541546B (en) Multi-platform login method, device, equipment and readable medium
CN111988295A (en) Database auditing method and device, WEB server, database auditing system and storage medium
US20160103988A1 (en) Secure automatic authorized access to any application through a third party
CN112528268B (en) Cross-channel applet login management method and device and related equipment
CN110163658A (en) Virtual resource data processing method, device, computer equipment and storage medium
CN108769059B (en) Verification method, device, medium and computing equipment
CN106533685B (en) Identity authentication method, device and system
CN117014138A (en) Data interaction method, system, device, electronic equipment and storage medium
CN110490005B (en) Method, device and computer readable storage medium for processing resource transfer request
CN114448722A (en) Cross-browser login method and device, computer equipment and storage medium
CN114172716A (en) Login method, login device, electronic equipment and storage medium
CN106685938A (en) Method for generating protection configuration for login page and apparatus thereof
CN107689964B (en) Method for preventing replay attack of embedded WEB server
JP2002132727A (en) Method and system device for authenticating user
CN114157483B (en) Login method, login device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1260668

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant