[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109936565A - Log in the method, apparatus, computer equipment and storage medium of multiple service clusters - Google Patents

Log in the method, apparatus, computer equipment and storage medium of multiple service clusters Download PDF

Info

Publication number
CN109936565A
CN109936565A CN201910080752.6A CN201910080752A CN109936565A CN 109936565 A CN109936565 A CN 109936565A CN 201910080752 A CN201910080752 A CN 201910080752A CN 109936565 A CN109936565 A CN 109936565A
Authority
CN
China
Prior art keywords
account
terminal
service cluster
service
authorization token
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910080752.6A
Other languages
Chinese (zh)
Inventor
王建华
马琳
张晓东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910080752.6A priority Critical patent/CN109936565A/en
Publication of CN109936565A publication Critical patent/CN109936565A/en
Priority to PCT/CN2019/117705 priority patent/WO2020155761A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application belongs to cloud field, is related to logging in the method, apparatus, computer equipment and storage medium of multiple service clusters.This method comprises: interlock account set is created in the relevant database of Account Logon server, the account information of at least one account in the interlock account set comprising same user's registration;When receiving the logging request for the terminal that first service cluster redirection comes, judge whether the terminal logs in any service cluster;The first authorization token is created when the terminal has logged in any service cluster;The terminal is redirected to the first service cluster, and sends first authorization token to the first service cluster;Verify the second authorization token that the first service cluster provides;When second authorization token passes through verification, confirm that the terminal is successfully logged in the first service cluster.This method can be convenient and safely logs in multiple service clusters.

Description

Log in the method, apparatus, computer equipment and storage medium of multiple service clusters
Technical field
The application belongs to cloud field, is related to logging in the method, apparatus of multiple service clusters, computer equipment and deposit Storage media.
Background technique
Along with the extension of software product business, the software product/service derived can also be accordingly increased, general logical Multiple service clusters are crossed to realize multiple software product/service operation.It is independently opened with a scattered manner by multiple service clusters What hair and deployment multiple software product/service were constituted is an open architecture, and open port is more, and user logs in and access Process become increasingly complex.
Under existing technical conditions, for user by terminal log in different service clusters often respectively authorization and Management, all there is certain deficiency in safety and failure rate.For example, being attacked since open port is more by network A possibility that hitting can be bigger.In addition, if there are problems that network problem or service itself be easy cause service call failure or Person's delay can excessively cause to service snowslide when serious because service is overstock.
Summary of the invention
The embodiment of the present application discloses method, apparatus, computer equipment and the storage medium for logging in multiple service clusters, Purport is convenient and safely logs in multiple service clusters.
Some embodiments of the present application disclose a kind of method for logging in multiple service clusters.
The method for logging in multiple service clusters includes: to create in the relevant database of Account Logon server Interlock account set, the account information of at least one account in the interlock account set comprising same user's registration;When connecing When receiving the logging request for the terminal that first service cluster redirection comes, judge whether the terminal logs in any services set Group;The first authorization token is created when the terminal has logged in any service cluster;The terminal is redirected to described First service cluster, and send first authorization token to the first service cluster;Verify the first service cluster The second authorization token provided;When second authorization token passes through verification, confirm the terminal in the first service collection Group successfully logs in.
It is described that association is created in the relevant database of Account Logon server in some embodiments of the present application The step of account aggregation includes: to obtain characteristic information in the account information of each account from least one dimension;It will be with one-dimensional Degree is included into the same interlock account set comprising the account of the identical characteristic information.
In some embodiments of the present application, the dimension includes: User ID dimension, finger print information dimension, face information Dimension, voiceprint dimension and iris information dimension.
It is described to judge whether the terminal logs in any service cluster in some embodiments of the present application further include: when When the terminal is not logged on any service cluster, Xiang Suoshu terminal sends login page;It receives the terminal and is based on institute State the logon form of login page return;In conjunction with the relevant database to the first account information in the logon form It is verified;When first account information passes through verification, the terminal is redirected to the first service cluster.
In some embodiments of the present application, relevant database described in the combination is in the logon form The step of one account information is verified includes: by each account in first account information and the interlock account set Second account information is compared one by one;When the institute of any account in first account information and the interlock account set State the second account information it is consistent when, first account information passes through verification.
In some embodiments of the present application, third authorization token is created when first account information passes through verification, And the third authorization token is sent to the first service when the terminal is redirected to the first service cluster Cluster.
In some embodiments of the present application, the second authorization token of the verification first service cluster offer Step includes: that second authorization token is compared with first authorization token;When second authorization token and institute State the first authorization token it is consistent when, second authorization token passes through verification.
The embodiment of the application discloses a kind of device for logging in multiple service clusters.
The device for logging in multiple service clusters includes: interlock account set creation module, in login service device Relevant database in create interlock account set, include at least the one of same user's registration in the interlock account set The account information of a account;Judgment module is logged in, for when the login for receiving the terminal that first service cluster redirection comes When request, judge whether the terminal logs in any service cluster;Token creation module, for having logged in institute when the terminal The first authorization token is created when stating any service cluster;First redirection module, for the terminal to be redirected to described One service cluster, and send first authorization token to the first service cluster;Token correction verification module, for verifying The second authorization token that the first service cluster provides;Token check results feedback module, for working as second warrant When board passes through verification, confirm that the terminal is successfully logged in the first service cluster.
In some embodiments of the present application, the interlock account set creation module includes: that characteristic information obtains submodule Block, for obtaining characteristic information in the account information of each account from least one dimension;Account is included into submodule, will be same Dimension includes that the account of the identical characteristic information is included into the same interlock account set.
In some embodiments of the present application, the device for logging in multiple service clusters further include: the page sends mould Block, for when the terminal is not logged on any service cluster, Xiang Suoshu terminal to send login page;List receives Module, the logon form returned for receiving the terminal based on the login page;Account information correction verification module, in conjunction with institute Relevant database is stated to verify the first account information in the logon form;Second redirection module, for working as institute When stating the first account information and passing through verification, the terminal is redirected to the first service cluster.
In some embodiments of the present application, the token creation module is also used to pass through when first account information Third authorization token is created when verification.The device for logging in multiple service clusters is by second redirection module in handle The third authorization token is sent to the first service cluster when terminal is redirected to the first service cluster.
In some embodiments of the present application, the account information correction verification module includes: that account information compares submodule, For first account information to be compared one by one with the second account information of each account in the interlock account set; Account information check results judging submodule, for when any account in first account information and the interlock account set When second account information at family is consistent, judgement show that first account information passes through verification.
In some embodiments of the present application, the token correction verification module includes: that token compares submodule, is used for institute The second authorization token is stated to be compared with first authorization token;Token comparison result judging submodule, for when described the When two authorization token are consistent with first authorization token, judgement show that second authorization token passes through verification.
In some embodiments of the present application, the device for logging in multiple service clusters further includes global session creation Module;The global session creation module be used for when first account information in the logon form passes through verification and Global session is created when first account information in the logon form is not over verification.
Some embodiments of the present application disclose a kind of computer equipment, including memory and processor, the memory In be stored with computer program, the processor realizes that any of the above-described kind logs in multiple services when executing the computer program The step of method of cluster.
Some embodiments of the present application disclose a kind of computer readable storage medium, the computer-readable storage medium Computer program is stored in matter, the computer program realizes that any of the above-described kind logs in multiple services when being executed by processor The step of method of cluster.
Compared with prior art, technical solution disclosed in the present application mainly have it is following the utility model has the advantages that
In embodiments herein, which the method for logging in multiple service clusters logs in regardless of the terminal request One service cluster is redirected to the Account Logon server.Judge that the terminal is by the Account Logon server It is no to log in any service cluster.So that the Account Logon server is managed concentratedly to multiple service clusters are logged in, union Middle authorization.Therefore the port by the method opening for logging in multiple service clusters is less, a possibility that by network attack It is lower.Since any service cluster is not verified in the account individually provided the terminal, but by the account The centralized processing of login service device, it is ensured that the response speed of any service cluster, so that any service cluster It is not easy to overstock service.When the terminal has logged in any service cluster, the Account Logon server is by the terminal It is redirected to the service cluster that request logs in.Therefore reduce unnecessary log-on message verification under the premise of ensuring safety Link, the process for being conducive to that the terminal request is allowed to log in multiple service clusters are more convenient.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for this For the those of ordinary skill of field, without any creative labor, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is the schematic diagram that the method for multiple service clusters is logged in described in the embodiment of the application;
Fig. 2 is the schematic diagram for creating interlock account set in the embodiment of the application in the relevant database.
Fig. 3 be the application an embodiment in 6 accounts are included into the schematic diagrames of 3 interlock account set;
Fig. 4 be the application an embodiment in verify the schematic diagram of the second authorization token that the service cluster provides;
Fig. 5 is the schematic diagram that the method for multiple service clusters is logged in described in another embodiment of the application;
Fig. 6 is marriage relation type database described in the embodiment of the application to the first account in the logon form The schematic diagram that family information is verified;
Fig. 7 is terminal a, service cluster A, service cluster B and Account Logon server se in the embodiment of the application Between interaction schematic diagram;
Fig. 8 is the schematic diagram that the device of multiple service clusters is logged in described in the embodiment of the application;
Fig. 9 is the schematic diagram of interlock account set creation module 10 described in the embodiment of the application;
Figure 10 is the schematic diagram of token correction verification module 50 described in the embodiment of the application;
Figure 11 is the schematic diagram that the device of multiple service clusters is logged in described in another embodiment of the application;
Figure 12 is the schematic diagram of account information correction verification module 90 described in the another embodiment of the application.
Description of symbols:
Specific embodiment
The application in order to facilitate understanding is described more fully the application below with reference to relevant drawings.In attached drawing Give the preferred embodiment of the application.But the application can realize in many different forms, however it is not limited to herein Described embodiment.On the contrary, purpose of providing these embodiments is keeps the understanding to disclosure of this application more saturating It is thorough comprehensive.
Unless otherwise defined, all technical and scientific terms used herein and the technical field for belonging to the application The normally understood meaning of technical staff it is identical.The term used in the description of the present application is intended merely to retouch herein State the purpose of specific embodiment, it is not intended that in limitation the application.
The embodiment of the application discloses a kind of method for logging in multiple service clusters.
One service cluster usually runs an individual software product.The terminal accesses the service first Cluster, and when the service cluster receives the access of the terminal, the terminal is redirected to Account Logon server. The terminal is redirected to Account Logon server by the service cluster to be sent to the account for the address parameter of oneself Login service device.
It is the schematic diagram that the method for multiple service clusters is logged in described in the embodiment of the application with reference to Fig. 1.
It anticipates as shown in fig. 1, the terminal logs in multiple service clusters by Account Logon server request, The Account Logon server execute the step of include:
S1: interlock account set, the interlock account set are created in the relevant database of Account Logon server In comprising same user's registration at least one account account information.
With reference to Fig. 2, to create showing for interlock account set in the relevant database in the embodiment of the application It is intended to.
It anticipates as shown in Figure 2, it is described to be created in the relevant database in some embodiments of the application The step of building interlock account set include:
S11: characteristic information is obtained in the account information of each account from least one dimension.
S12: the same interlock account set will be included into the account for including the identical characteristic information with dimension.
The dimension includes: User ID dimension, finger print information dimension, face information dimension, voiceprint dimension and rainbow Film information dimension.The User ID dimension generates with uniqueness when mainly including the ID card No. of user, registration ID, phone number etc..The finger print information dimension is usually user by believing when account typing as the fingerprint of login password Breath.The face information dimension is usually that user passes through face information when account typing as login password.The vocal print letter Breath dimension is usually that user passes through voiceprint when account typing as login password.The iris information dimension is usually Iris information when user passes through account typing as login password.
When characteristic information can be obtained in the account information of all accounts from multiple dimensions, to the multiple dimension It is ranked up.Specifically, counting the quantity for the account that each dimension is related in all accounts.When a dimension relates to And account quantity it is more when, characteristic information is preferentially obtained in the account information of all accounts according to the dimension, will be at this Dimension includes that the account of same characteristic features information is included into same interlock account set.
Citing is illustrated S11 and S12 below:
With reference to Fig. 3, for the schematic diagram that 6 accounts are included into 3 interlock account set in the embodiment of the application.Fig. 3 In the account informations of 6 accounts be intended only as schematically illustrating.
It anticipates as shown in Figure 3, account NO1 and account NO4 contains same characteristic features information in the voiceprint dimension Swmm58974 (code name as voiceprint, identical code name are shown to be all voiceprints of the same person), therefore institute Interlock account set j1 can be included by stating account NO1 and the account NO4.Account NO2 and account NO3 are tieed up in the User ID Degree contains same characteristic features information 154236, therefore the account NO2 and the account NO3 can be included into interlock account set j2.Account NO3 and account NO5 contains same characteristic features information zwmm00265811 in the finger print information dimension and (uses fingerprint The code name of information, identical code name are shown to be all finger print informations of the same person), therefore the account NO5 can also be included into Interlock account set j2.Account NO6 and account NO1 to account NO5 do not include same characteristic features information, therefore the account NO6 Individually it is included into interlock account set j3.
S2: when receiving the logging request for the terminal that first service cluster redirection comes, whether judge the terminal Log in any service cluster.
When the terminal logs in any service cluster to the Account Logon server successful request, the clothes Business cluster can generate global session.The global session record has Account Logon server described in the terminal access to generate Data.By parsing the global session, just can judge to show whether the terminal logs in any service cluster.
S3: the first authorization token is created when the terminal has logged in any service cluster.
S4: the terminal is redirected to the first service cluster, and sends the authorization token to described first Service cluster.
Due to the terminal is redirected to the Account Logon server by the first service cluster can be by the ground of oneself Location parameter is sent to the Account Logon server, therefore the Account Logon server can pass through the first service collection The address parameter of group, is redirected to the first service cluster for the terminal.
S5: the second authorization token that the first service cluster provides is verified.
Second authorization token is supplied to the Account Logon server, the account by the first service cluster Login service device verifies second authorization token that the service cluster provides.By verifying the service cluster Second authorization token provided can prevent the terminal from providing the authorization token forged and realize in the service cluster Login, be conducive to the security performance for improving the service cluster.
With reference to Fig. 4, for the signal for verifying the second authorization token that the service cluster provides in the embodiment of the application Figure.
As schematically shown in figure 4, in some embodiments of the application, what the verification service cluster provided The step of authorization token includes:
S51: second authorization token is compared with first authorization token.
S52: when second authorization token is consistent with first authorization token, second authorization token passes through Verification.
S6: when second authorization token passes through verification, confirm that the terminal is successfully stepped in the first service cluster Record.
For the first service cluster, when the first service cluster passes through Account Logon server school Test to obtain second authorization token it is effective when, the terminal is logined successfully in the first service cluster.The Account Logon Server can generate global session when confirming the service cluster that the terminal success logging request logs in.
It is the schematic diagram that the method for multiple service clusters is logged in described in another embodiment of the application with reference to Fig. 5.
It anticipates as shown in Figure 5, the terminal logs in multiple service clusters by Account Logon server request When, the Account Logon server also executes following steps other than executing S1 to S5:
S7: when the terminal is not logged on any service cluster, Xiang Suoshu terminal sends login page.
S8: the logon form that the terminal is returned based on the login page is received.
S9: the first account information in the logon form is verified in conjunction with the relevant database.
S7 to S9 it is described judge the step of whether terminal logs in any service cluster after.
It is marriage relation type database described in the embodiment of the application to the in the logon form with reference to Fig. 6 The schematic diagram that one account information is verified.
As schematically represented in fig. 6, relevant database described in the combination believes the first account in the logon form Ceasing the step of being verified includes:
S91: by the second account information of each account in first account information and the interlock account set one by one into Row compares.
S92: when second account information of any account in first account information and the interlock account set When consistent, first account information passes through verification.
In some embodiments of the present application, third authorization token is created when first account information passes through verification, And the third authorization token is sent to the first service when the terminal is redirected to the first service cluster Cluster.
S10: when first account information passes through verification, the terminal is redirected to the first service cluster.
It is that terminal a, service cluster A, service cluster B and Account Logon take in the embodiment of the application with reference to Fig. 7 Interaction schematic diagram between business device se.
The process of terminal a request login service device se login service cluster A and service cluster B is summarized below, with into one The step explanation method for logging in multiple service clusters.
Anticipate as shown in Figure 7, the terminal a respectively with the service cluster A, the service cluster B and the account Family login service device se communication connection, the service cluster A and the service cluster B also with the Account Logon server se Communication connection.
The terminal a request logs in the service cluster A, to access certain resources of the service cluster A.The clothes Cluster A be engaged in when receiving the logging request of the terminal a, the terminal a is redirected to the Account Logon server se, And the address parameter of the service cluster A is attached in the logging request of the terminal a and is sent to the Account Logon server se。
The Account Logon server se parses the logging request of the terminal a, and institute is inquired in the global session of storage State whether terminal a logs in the service cluster A or service cluster B.The service had both been not logged in the terminal a Cluster A, and when being not logged on the service cluster B, Xiang Suoshu terminal a sends login page.It can be by the terminal a The login page inserts the first account information, can also be registered.
The Account Logon server se receives the logon form that the terminal a is returned based on the login page, then Marriage relation type database verifies first account information in the logon form.Specifically, the account Login service device se is by second of each account in first account information of the logon form and the interlock account set Account information is compared one by one.The Account Logon server se compares first account for obtaining the logon form When information is consistent with second account information of any account in the interlock account set, first account information Pass through verification.When first account information in the logon form passes through verification, the Account Logon server se will The terminal a is redirected to the service cluster A.
When the Account Logon server se show that the terminal a has logged in any service cluster, the account Login service device se can log in the service cluster A for this time request of the terminal a and generate the first authorization token and global meeting First authorization token, is then attached in the logging request of the terminal a by words.It is incited somebody to action in the Account Logon server se When the terminal a is redirected to the service cluster A, first authorization token can be supplied to the service cluster A.
Second authorization token is sent the Account Logon server se and verified by the service cluster A.Described When two authorization token are not forged, first authorization token of second authorization token and service cluster A acquisition It is identical.When second authorization token is forged, second authorization token be will be unable to through the Account Logon server The verification of se.By verifying second authorization token in the Account Logon server se, the end can be prevented End a is held as a hostage and logs in the service cluster A with second authorization token of forgery, illegally obtains the service cluster A's Data resource.
When verification of second authorization token by the Account Logon server se, the terminal a is in the clothes Business cluster A is logined successfully.The terminal a is generated at the rear service cluster A in service cluster A login and is stored local Session records the logon data of the terminal a.When second authorization token is not over the Account Logon server se Verification when, the service cluster A to the terminal a feed back login failure.Specifically, second authorization token is often With certain time-bounded, the second authorization token described in the time limit more than setting will fail.So if in the time limit of setting The interior terminal a could not enough success service cluster A will to will cause second authorization token expired so that described second Authorization token can not pass through the verification of the Account Logon server se.In addition, the terminal a can be to forge when being held as a hostage The second authorization token log in the service cluster A, the terminal a is provided by the Account Logon server se at this time Second authorization token verified, be beneficial to prevent the data resource for illegally obtaining the service cluster A.
When the terminal a requests to log in the service cluster B, the terminal a is redirected to by the service cluster B The Account Logon server se.The Account Logon server se is being stored according to the account information in the logging request Global session in inquire whether the terminal a logs in the service cluster A or service cluster B.
Since the terminal a has successfully logged in the service cluster A, the Account Logon server se can Inquiry obtains the record that the terminal a logs in the service cluster A in the global session.At this time due to the terminal a Through logging in the service cluster A, therefore the terminal a logs in the process of the service cluster B, can exist with reference to the terminal a Request logs in the process of the service cluster A when having logged on any service cluster.
In embodiments herein, which the method for logging in multiple service clusters logs in regardless of the terminal request One service cluster is redirected to the Account Logon server.Judge that the terminal is by the Account Logon server It is no to log in any service cluster.So that the Account Logon server is managed concentratedly to multiple service clusters are logged in, union Middle authorization.Therefore the port by the method opening for logging in multiple service clusters is less, a possibility that by network attack It is lower.When Account Logon server judgement show that the terminal is not logged on any service cluster, by the account Family login service device sends login page to the terminal, receives the log form that the terminal is returned based on the login page It is single, and marriage relation type database verifies the first account information in the logon form, it is ensured that the terminal Logging request is safe request.Since the account that any service cluster no longer individually provides the terminal is tested Card, but handled by the Account Logon server centered, it is ensured that the response speed of any service cluster, makes Any service cluster is obtained to be not easy to overstock service.When the terminal has logged in any service cluster, the account is stepped on The terminal is redirected to the service cluster that request logs in by record server.Therefore reduce not under the premise of ensuring safety Necessary log-on message calibration link, the process for being conducive to that the terminal request is allowed to log in multiple service clusters are more convenient.
The embodiment of the application discloses a kind of device for logging in multiple service clusters.
It is the schematic diagram that the device of multiple service clusters is logged in described in the embodiment of the application with reference to Fig. 8.
It anticipates as shown in Figure 8, the device for logging in multiple service clusters includes:
Interlock account set creation module 10, for creating interlock account in the relevant database of login service device Gather, the account information of at least one account in the interlock account set comprising same user's registration.
Log in judgment module 20, for when receive first service cluster redirect come terminal logging request when, Judge whether the terminal logs in any service cluster.
Token creation module 30, for creating the first warrant when the terminal has logged in any service cluster Board.
First redirection module 40, for the terminal to be redirected to the first service cluster, and by described first Authorization token sends the first service cluster to.
Token correction verification module 50, the second authorization token provided for verifying the first service cluster.
Token check results feedback module 60, for confirming the terminal when second authorization token passes through verification It is successfully logged in the first service cluster.
It is the schematic diagram of interlock account set creation module 10 described in the embodiment of the application with reference to Fig. 9.Such as Fig. 9 Shown in meaning, in some embodiments of the present application, the interlock account set creation module 10 includes: that characteristic information obtains Submodule 11 is taken, for obtaining characteristic information in the account information of each account from least one dimension.Account is included into submodule 12, the same interlock account set will be included into the account for including the identical characteristic information with dimension.
It is the schematic diagram of token correction verification module 50 described in the embodiment of the application with reference to Figure 10.As shown in Figure 10 Meaning, in some embodiments of the present application, the token correction verification module 50 includes: that token compares submodule 51, is used for institute The second authorization token is stated to be compared with first authorization token.Token comparison result judging submodule 52, for when described When second authorization token is consistent with first authorization token, judgement show that second authorization token passes through verification.
It is the schematic diagram that the device of multiple service clusters is logged in described in another embodiment of the application with reference to Figure 11.Such as Meaning shown in Figure 11, in some embodiments of the present application, the device for logging in multiple service clusters further include: the page Sending module 70, for when the terminal is not logged on any service cluster, Xiang Suoshu terminal to send login page. List receiving module 80, the logon form returned for receiving the terminal based on the login page.Account information calibration mode Block 90, for being verified in conjunction with the relevant database to the first account information in the logon form.Second resets To module 100, for when the account information in the logon form passes through verification, the terminal to be redirected to described One service cluster.
It is the schematic diagram of account information correction verification module 90 described in the embodiment of the application with reference to Figure 12.
It anticipates as shown in Figure 12, in some embodiments of the present application, the account information correction verification module 90 includes: Account information compares submodule 91, for by second of each account in first account information and the interlock account set Account information is compared one by one.Account information check results judging submodule 92, for working as first account information and institute State any account in interlock account set second account information it is consistent when, judgement show that first account information is logical Cross verification.
In some embodiments of the present application, the token creation module 30 is also used to when first account information is logical Third authorization token is created when crossing verification.The device for logging in multiple service clusters passes through second redirection module 100 The third authorization token is sent to the first service collection when the terminal is redirected to the first service cluster Group.
In some embodiments of the present application, the device for logging in multiple service clusters further includes global session creation Module.The global session creation module be used for when first account information in the logon form passes through verification and Global session is created when first account information in the logon form is not over verification.
The embodiment of the application discloses a kind of computer equipment.
The computer equipment includes that connection memory, processor, network interface are in communication with each other by system bus.This Technical field it will be appreciated by the skilled person that computer equipment here be it is a kind of can according to the instruction for being previously set or storing, The automatic equipment for carrying out numerical value calculating and/or information processing, hardware includes but is not limited to microprocessor, specific integrated circuit (Application Specific Integrated Circuit, ASIC), programmable gate array (Field- Programmable Gate Array, FPGA), digital processing unit (Digital Signal Processor, DSP), insertion Formula equipment etc..
The computer equipment can be the calculating such as desktop PC, notebook, palm PC and cloud server and set It is standby.The computer equipment can carry out people by modes such as keyboard, mouse, remote controler, touch tablet or voice-operated devices with user Machine interaction.
The memory 201 includes at least a type of readable storage medium storing program for executing, and the readable storage medium storing program for executing includes dodging Deposit, hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), it is static with Machine accesses memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable Read memory (PROM), magnetic storage, disk, CD etc..In some embodiments, the memory 201 can be described The internal storage unit of computer equipment 200, such as the hard disk or memory of the computer equipment 200.In other embodiments In, the memory 201 is also possible to the External memory equipment of the computer equipment 200, such as the computer equipment 200 The plug-in type hard disk of upper outfit, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) block, flash card (Flash Card) etc..Certainly, the memory 201 can also both include the computer equipment 200 Internal storage unit also includes its External memory equipment.In the present embodiment, the memory 201 is installed on commonly used in storage The operating system and types of applications software of the computer equipment 200, such as the method for the multiple service clusters of above-mentioned login Program code etc..It has exported or will export all kinds of in addition, the memory 201 can be also used for temporarily storing Data.
The processor 202 can be in some embodiments central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chips.The processor 202 is commonly used in described in control The overall operation of computer equipment 200.In the present embodiment, the processor 202 is stored for running in the memory 201 Program code or processing data, such as run the program code of the method for the multiple service clusters of above-mentioned login.
The network interface 203 may include radio network interface or wired network interface, which usually uses It is communicated to connect in being established between the computer equipment 200 and other electronic equipments.
Present invention also provides another embodiments, that is, provide a kind of computer readable storage medium, the computer Readable storage medium storing program for executing is stored with the program for logging in multiple service clusters, and the multiple service cluster programs of login can be by least one A processor executes, so that at least one described processor executes the method that any one of the above logs in multiple service clusters Step.
Finally it should be noted that, it is clear that embodiments described above is only some embodiments of the present application, rather than Whole embodiments gives the preferred embodiment of the application in attached drawing, but is not intended to limit the scope of the patents of the application.This Shen It can please realize in many different forms, on the contrary, purpose of providing these embodiments is makes in disclosure herein The understanding of appearance is more thorough and comprehensive.Although the application is described in detail with reference to the foregoing embodiments, for this field For technical staff comes, it can still modify to technical solution documented by aforementioned each specific embodiment or right Part of technical characteristic carries out equivalence replacement.All equivalent structures done using present specification and accompanying drawing content, directly It connects or is used in other related technical areas indirectly, similarly within the application scope of patent protection.

Claims (10)

1. a kind of method for logging in multiple service clusters characterized by comprising
Interlock account set is created in the relevant database of Account Logon server, includes same in the interlock account set The account information of at least one account of one user's registration;
When receiving the logging request for the terminal that first service cluster redirection comes, it is any to judge whether the terminal logs in Service cluster;
The first authorization token is created when the terminal has logged in any service cluster;
The terminal is redirected to the first service cluster, and sends first authorization token to the first service Cluster;
Verify the second authorization token that the first service cluster provides;When second authorization token passes through verification, confirmation The terminal is successfully logged in the first service cluster.
2. logging in the method for multiple service clusters according to claim 1, which is characterized in that described in Account Logon server Relevant database in create interlock account set the step of include:
Characteristic information is obtained in the account information of each account from least one dimension;
The same interlock account set will be included into the account for including the identical characteristic information with dimension.
3. logging in the method for multiple service clusters according to claim 2, which is characterized in that the dimension includes: User ID Dimension, finger print information dimension, face information dimension, voiceprint dimension and iris information dimension.
4. logging in the method for multiple service clusters according to claim 1, which is characterized in that described whether to judge the terminal Log in any service cluster further include:
When the terminal is not logged on any service cluster, Xiang Suoshu terminal sends login page;
Receive the logon form that the terminal is returned based on the login page;
The first account information in the logon form is verified in conjunction with the relevant database;
When first account information passes through verification, the terminal is redirected to the first service cluster.
5. logging in the method for multiple service clusters according to claim 4, which is characterized in that relationship type number described in the combination The step of verifying according to library to the first account information in the logon form include:
First account information is compared one by one with the second account information of each account in the interlock account set;
When first account information is consistent with second account information of any account in the interlock account set, institute It states the first account information and passes through verification.
6. the method according to claim 4 or 5 for logging in multiple service clusters, which is characterized in that when first account is believed Third authorization token is created when breath passes through verification, and when the terminal is redirected to the first service cluster by described the Three authorization token send the first service cluster to.
7. logging in the method for multiple service clusters according to claim 1, which is characterized in that the verification first service Cluster provide the second authorization token the step of include:
Second authorization token is compared with first authorization token;
When second authorization token is consistent with first authorization token, second authorization token passes through verification.
8. a kind of device for logging in multiple service clusters characterized by comprising
Interlock account set creation module, for creating interlock account set, institute in the relevant database of login service device State the account information of at least one account in interlock account set comprising same user's registration;
Judgment module is logged in, for judging institute when receiving the logging request for the terminal that first service cluster redirection comes State whether terminal logs in any service cluster;
Token creation module, for creating the first authorization token when the terminal has logged in any service cluster;
First redirection module, for the terminal to be redirected to the first service cluster, and by first warrant Board sends the first service cluster to;
Token correction verification module, the second authorization token provided for verifying the first service cluster;
Token check results feedback module, for confirming the terminal described when second authorization token passes through verification First service cluster successfully logs in.
9. a kind of computer equipment, including memory and processor, which is characterized in that be stored with computer journey in the memory Sequence, the processor is realized when executing the computer program logs in multiple services sets as described in any one of claims 1 to 7 The step of method of group.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program is realized when the computer program is executed by processor and logs in multiple services sets as described in any one of claims 1 to 7 The step of method of group.
CN201910080752.6A 2019-01-28 2019-01-28 Log in the method, apparatus, computer equipment and storage medium of multiple service clusters Pending CN109936565A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910080752.6A CN109936565A (en) 2019-01-28 2019-01-28 Log in the method, apparatus, computer equipment and storage medium of multiple service clusters
PCT/CN2019/117705 WO2020155761A1 (en) 2019-01-28 2019-11-12 Method for logging into multiple service clusters, apparatus, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910080752.6A CN109936565A (en) 2019-01-28 2019-01-28 Log in the method, apparatus, computer equipment and storage medium of multiple service clusters

Publications (1)

Publication Number Publication Date
CN109936565A true CN109936565A (en) 2019-06-25

Family

ID=66985271

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910080752.6A Pending CN109936565A (en) 2019-01-28 2019-01-28 Log in the method, apparatus, computer equipment and storage medium of multiple service clusters

Country Status (2)

Country Link
CN (1) CN109936565A (en)
WO (1) WO2020155761A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111147496A (en) * 2019-12-27 2020-05-12 北京奇艺世纪科技有限公司 Data processing method and device
WO2020155761A1 (en) * 2019-01-28 2020-08-06 平安科技(深圳)有限公司 Method for logging into multiple service clusters, apparatus, computer device and storage medium
CN112714166A (en) * 2020-12-22 2021-04-27 新华三大数据技术有限公司 Multi-cluster management method and device for distributed storage system
CN113127846A (en) * 2021-05-17 2021-07-16 济南博观智能科技有限公司 Software authorization method, device, equipment and storage medium
CN113395326A (en) * 2021-05-20 2021-09-14 网易(杭州)网络有限公司 Network service-based login method, device and computer-readable storage medium
CN113886800A (en) * 2020-07-01 2022-01-04 杭州晨熹多媒体科技有限公司 Account management system, method and device
CN113949710A (en) * 2021-10-15 2022-01-18 北京奇艺世纪科技有限公司 Data processing method and server cluster

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113259342A (en) * 2021-05-11 2021-08-13 鸬鹚科技(深圳)有限公司 Login verification method, device, computer equipment and medium
CN113810468B (en) * 2021-08-13 2023-04-18 济南浪潮数据技术有限公司 Method, system, equipment and storage medium for distributing requests by gateway under K8s architecture

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102065131A (en) * 2010-12-03 2011-05-18 湖南大学 Single-point logging way and logging authentication
CN102469075A (en) * 2010-11-09 2012-05-23 中科正阳信息安全技术有限公司 Integrated authentication method based on WEB single sign-on
EP2919435A1 (en) * 2014-03-10 2015-09-16 Fujitsu Limited Communication terminal and secure log-in method and program
CN105024975A (en) * 2014-04-23 2015-11-04 腾讯科技(北京)有限公司 Account number login method, device and system
CN105577667A (en) * 2015-12-28 2016-05-11 上海赞越软件服务中心 Multi-account one-key login and authentication mechanism
US20160366119A1 (en) * 2015-06-15 2016-12-15 Airwatch Llc Single sign-on for unmanaged mobile devices
CN106375259A (en) * 2015-07-20 2017-02-01 阿里巴巴集团控股有限公司 Same-user account identification method and apparatus

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105472052B (en) * 2014-09-03 2019-12-31 阿里巴巴集团控股有限公司 Cross-domain server login method and system
CN106375270B (en) * 2015-07-24 2020-12-08 华为技术有限公司 Token generation and authentication method and authentication server
US10846390B2 (en) * 2016-09-14 2020-11-24 Oracle International Corporation Single sign-on functionality for a multi-tenant identity and data security management cloud service
CN109936565A (en) * 2019-01-28 2019-06-25 平安科技(深圳)有限公司 Log in the method, apparatus, computer equipment and storage medium of multiple service clusters

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469075A (en) * 2010-11-09 2012-05-23 中科正阳信息安全技术有限公司 Integrated authentication method based on WEB single sign-on
CN102065131A (en) * 2010-12-03 2011-05-18 湖南大学 Single-point logging way and logging authentication
EP2919435A1 (en) * 2014-03-10 2015-09-16 Fujitsu Limited Communication terminal and secure log-in method and program
CN105024975A (en) * 2014-04-23 2015-11-04 腾讯科技(北京)有限公司 Account number login method, device and system
US20160366119A1 (en) * 2015-06-15 2016-12-15 Airwatch Llc Single sign-on for unmanaged mobile devices
CN106375259A (en) * 2015-07-20 2017-02-01 阿里巴巴集团控股有限公司 Same-user account identification method and apparatus
CN105577667A (en) * 2015-12-28 2016-05-11 上海赞越软件服务中心 Multi-account one-key login and authentication mechanism

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020155761A1 (en) * 2019-01-28 2020-08-06 平安科技(深圳)有限公司 Method for logging into multiple service clusters, apparatus, computer device and storage medium
CN111147496A (en) * 2019-12-27 2020-05-12 北京奇艺世纪科技有限公司 Data processing method and device
CN111147496B (en) * 2019-12-27 2022-04-08 北京奇艺世纪科技有限公司 Data processing method and device
CN113886800A (en) * 2020-07-01 2022-01-04 杭州晨熹多媒体科技有限公司 Account management system, method and device
CN112714166A (en) * 2020-12-22 2021-04-27 新华三大数据技术有限公司 Multi-cluster management method and device for distributed storage system
CN112714166B (en) * 2020-12-22 2022-03-29 新华三大数据技术有限公司 Multi-cluster management method and device for distributed storage system
CN113127846A (en) * 2021-05-17 2021-07-16 济南博观智能科技有限公司 Software authorization method, device, equipment and storage medium
CN113395326A (en) * 2021-05-20 2021-09-14 网易(杭州)网络有限公司 Network service-based login method, device and computer-readable storage medium
CN113949710A (en) * 2021-10-15 2022-01-18 北京奇艺世纪科技有限公司 Data processing method and server cluster
CN113949710B (en) * 2021-10-15 2024-04-05 北京奇艺世纪科技有限公司 Data processing method and server cluster

Also Published As

Publication number Publication date
WO2020155761A1 (en) 2020-08-06

Similar Documents

Publication Publication Date Title
CN109936565A (en) Log in the method, apparatus, computer equipment and storage medium of multiple service clusters
KR100294969B1 (en) Computer devices and methods that provide a common user interface for software applications accessed through the World Wide Web.
CN108683604B (en) Concurrent access control method, terminal device, and medium
CN110310205B (en) Block chain data monitoring method, device, equipment and medium
US9680815B2 (en) Method and system for transmitting authentication context information
CN110401655A (en) Access control right management system based on user and role
CN108965480A (en) Cloud desktop login management-control method, device and computer readable storage medium
CN112651011B (en) Login verification method, device and equipment for operation and maintenance system and computer storage medium
US20130298212A1 (en) Using windows authentication in a workgroup to manage application users
CN111490981B (en) Access management method and device, bastion machine and readable storage medium
JP2001067315A (en) Distributed authentication mechanism to handle plural different authentication system in enterprise computer system
WO2021164459A1 (en) Identity verification method and apparatus, computer device, and readable storage medium
CN109446788A (en) A kind of identity identifying method and device, computer storage medium of equipment
CN110138767B (en) Transaction request processing method, device, equipment and storage medium
US10192262B2 (en) System for periodically updating backings for resource requests
CN102510338B (en) System, device and method for security certificate for multi-organization interconnection system
US10013237B2 (en) Automated approval
CN114567600A (en) Traffic management method and related equipment
CN110086826A (en) Information processing method
CN112953951B (en) User login verification and security detection method and system based on domestic CPU
CN110430211B (en) Virtualization cloud desktop system and operation method
CN113949578A (en) Automatic detection method and device for unauthorized vulnerability based on flow and computer equipment
CN110278248A (en) Testament message distributing method, device and computer readable storage medium
KR100639992B1 (en) Security apparatus for distributing client module and method thereof
CN109840693A (en) It attends a banquet behavior safety monitoring method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190625