CN105429978A - Data access methods and system, and equipment - Google Patents
Data access methods and system, and equipment Download PDFInfo
- Publication number
- CN105429978A CN105429978A CN201510781737.6A CN201510781737A CN105429978A CN 105429978 A CN105429978 A CN 105429978A CN 201510781737 A CN201510781737 A CN 201510781737A CN 105429978 A CN105429978 A CN 105429978A
- Authority
- CN
- China
- Prior art keywords
- server
- application platform
- authentication information
- information
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000012795 verification Methods 0.000 claims description 63
- 238000013475 authorization Methods 0.000 claims description 18
- 238000012545 processing Methods 0.000 claims description 8
- 238000010586 diagram Methods 0.000 description 11
- 235000014510 cooky Nutrition 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 238000010276 construction Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides data access methods and system, and equipment. The method comprises the steps that an application platform acquires authentication information from a server of a first system; and the application platform accesses data on a server of a second system according to acquired authentication information. According to the method, a server of a certain system different from open systems can be used as an authorized server for generating authentication information, so that the authorized server and a resource server play their own role separately when the open system does not need establishing an authorized server alone, and the hardware cost is lowered.
Description
Technical Field
The present invention relates to the field of communications, and in particular, to a data access method, device and system.
Background
With the development of the internet, the internet system is increasingly huge, the data volume is also rapidly increased, and in order to enable third-party applications to participate in the construction of the system, the system applications are enriched, such as all large internet systems of WeChat, Xinlang microblog and the like support OAuth2.0 (open authorization) protocol to establish own ecological chain system. The oauth2.0 protocol is an open standard (allowing third party applications to access various information stored by a user at a service provider with authorization from the user).
However, in the prior art, the open internet system supporting oauth2.0 requires two servers, namely, an authorization server for generating authentication information and a resource server for storing resources, and therefore, higher software and hardware costs are required for the early development of the internet system supporting oauth 2.0.
Disclosure of Invention
In order to solve the technical problem, the invention provides a data access method, equipment and system.
In one aspect, an embodiment of the present invention provides a data access method, where the method includes:
the application platform acquires authentication information from a server of a first system;
and the application platform accesses data on the server of the second system through the acquired authentication information.
Accordingly, an embodiment of the present invention provides an application platform, where the application platform includes:
the acquisition module is used for acquiring authentication information from a server of a first system;
and the access module is used for accessing the data on the server of the second system through the authentication information acquired by the acquisition module.
In another aspect, an embodiment of the present invention provides a data access method, where the method includes:
a server of a first system generates authentication information and verification information;
the server of the first system sends the generated authentication information to an application platform and sends the generated verification information to the server of the second system so that the application platform can access data on the server of the second system through the authentication information.
In another aspect, an embodiment of the present invention provides a data access method, where the method includes:
the server of the second system receives the verification information sent by the server of the first system and the access request sent by the application platform;
the server of the second system analyzes authentication information from the access request;
the server of the second system carries out verification processing on the application platform according to the authentication information and the verification information;
and if the verification is passed, the server of the second system sends data corresponding to the access request to the application platform.
In another aspect, an embodiment of the present invention provides a data access system, where the system includes: an application platform as described above, a server located at a first system, and a server located at a second system; wherein,
the server of the first system includes:
a generating module for generating authentication information and verification information,
a sending module, configured to send the authentication information generated by the generating module to the application platform and send the verification information generated by the generating module to the server of the second system, so that the application platform accesses data on the server of the second system through the authentication information;
the server of the second system includes:
a receiving module, configured to receive authentication information sent by a server of the first system and an access request sent by the application platform,
a parsing module for parsing the authentication information from the access request received by the receiving module,
a verification module for verifying the application platform according to the authentication information analyzed by the analysis module and the verification information received by the receiving module,
and the sending module is used for sending data corresponding to the access request to the application platform when the verification module determines that the verification is passed.
By implementing the data access method, the equipment and the system provided by the invention, the server of a certain system different from the open system can be used as the authorization server for generating the authentication information, so that the role separation of the authorization server and the resource server is ensured under the condition that the open system does not need to separately establish an authorization server, and the hardware cost is reduced.
Drawings
FIG. 1 is a flow chart of a method of data access according to an embodiment of the present invention;
FIG. 2 illustrates one embodiment of the process S110 illustrated in FIG. 1;
FIG. 3 is a flow diagram of another method of data access according to an embodiment of the present invention;
FIG. 4 illustrates one embodiment of the process S210 illustrated in FIG. 3;
FIG. 5 is a flow chart of yet another method of data access according to an embodiment of the present invention;
FIG. 6 is a flow chart of yet another method of data access according to an embodiment of the present invention;
FIG. 7 is an architecture diagram of a data access system according to an embodiment of the present invention;
FIG. 8 illustrates a schematic structural diagram of the application platform 100 shown in FIG. 7;
FIG. 9 is a schematic diagram of the structure of the obtaining module 110 shown in FIG. 8;
fig. 10 shows a schematic structural diagram of the server 200 shown in fig. 7;
FIG. 11 is a schematic diagram of the structure of the generation module 210 shown in FIG. 10;
fig. 12 shows a schematic structural diagram of the server 300 shown in fig. 7.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the present invention will be further described in detail with reference to the accompanying drawings.
Fig. 1 is a flow chart of a data access method according to an embodiment of the present invention, referring to fig. 1, the method including:
s110: the application platform obtains authentication information from a server of the first system. Wherein preferably said second system may be an existing system.
S120: the application platform accesses data on a server of a second system (an open system) through the acquired authentication information.
In the embodiment of the present invention, the authentication information may be, for example, an access token or ciphertext information of the access token.
As shown in fig. 2, in the embodiment of the present invention, the above-described process S110 may be implemented by:
s111: the application platform calls a login page of the first system, so that a server of the first system receives login information of a user through the login page and judges the authorization state of the application platform according to the login information.
S112: and the application platform receives authentication information which is generated and sent by the server of the first system after the authorization state of the application platform is determined to be authorized.
FIG. 3 is a flow chart of another method of data access according to an embodiment of the present invention. Referring to fig. 3, the method includes:
s210: the server of the first system generates authentication information and verification information. Wherein preferably said second system may be an existing system.
S220: the server of the first system sends the generated authentication information to an application platform and sends the generated verification information to the server of the second system so that the application platform can access data on the server of the second system through the authentication information.
As shown in fig. 4, in the embodiment of the present invention, the above-mentioned process S210 may be implemented by:
s211: and the server of the first system receives login information of a user.
S212: and the server of the first system verifies whether the user authorizes the application platform to access at least one part of the data of the user on the server of the third system according to the received login information, if so, S213 is executed, and if not, the processing returns to S211.
S213: the server of the first system generates authentication information and verification information.
In an embodiment of the present invention, the server of the first system may generate an access token as the authentication information and the verification information; or, the access token is encrypted through a key of the application platform, ciphertext information of the access token is used as the authentication information, plaintext information of the access token is used as the verification information, and the key is sent to the server of the second system.
Fig. 5 is a flow chart of yet another data access method according to an embodiment of the present invention. Referring to fig. 5, the method includes:
s310: and the server of the second system receives the verification information sent by the server of the first system and the access request sent by the application platform. Wherein preferably said second system may be an existing system.
S320: and the server of the second system analyzes the authentication information from the access request.
S330: and the server of the second system carries out verification processing on the application platform according to the authentication information and the verification information, if the verification is passed, S340 is executed, and if the verification is failed, S350 is executed.
S340: and the server of the second system sends the data corresponding to the access request to the application platform, and returns to the processing step S310.
S350: the server of the second system identifies the current access as a false access and adjusts the number of false accesses of the application platform.
S360: the server of the second system determines whether the adjusted number of false accesses is greater than or equal to a predetermined threshold, if so, executes S370, and if not, returns to S310.
S370: and the server of the second system shields the application platform and returns to the processing S310.
Of course, the embodiment of the present invention is not limited to this, and when the verification result of the above-mentioned process S330 is a verification failure, the access of the application platform may be directly denied and corresponding information is prompted and then returned to the process S310.
The following describes a processing flow of the data access method of the present invention in detail by taking the application market in which the first system is purchased as the application platform as an example. As shown in fig. 6, the method includes:
s410: an application platform (a third party application) invokes a login page of a first system (which may be, for example, an application marketplace for purchasing the application platform) upon a user initiating a login operation.
S420: the server of the first system receives login information (including information such as a user name and a password) of the user through the login page, and judges whether the user purchases the application platform according to the login information of the user (in the embodiment of the present invention, as long as the user purchases a certain system, the user defaults that the user authorizes the system to access data stored on a service provider), if so, S430 is executed, otherwise, the operation returns to S410.
In the embodiment of the invention, the server of the first system can directly judge whether the authentication is authorized according to the login information of the user without requiring the user to perform the authorization operation before generating the authentication information each time.
S430: and the server of the first system generates an access token, encrypts the access token through a secret key of the application platform, takes the ciphertext information of the access token as authentication information, and takes the plaintext information of the access token as verification information.
In the embodiment of the present invention, the server of the first system may use, for example, an identifier of a session in which the user logs in as the access token.
S440: the server of the first system sends the authentication information to the application platform and sends the verification information and the secret key to the server of the second system (an open system).
S450: and the application platform sends an access request with the authentication information to a server of the second system.
In the embodiment of the present invention, for example, the application platform may store the authentication information as a cookie (data stored on the user local terminal), and may carry the cookie when accessing the server of the second system, and for this reason, it is necessary to ensure that the application platform, the first system, and the second system have the same secondary domain name space to overcome the problem that the cookie cannot be transmitted across domain names.
S460: the server of the second system analyzes authentication information from the access request, verifies the application platform according to the authentication information and the verification information, if the verification is passed, S470 is executed, and if the verification is failed, S480 is executed.
The verification process may be specifically implemented by: and the server of the second system decrypts the authentication information by using the secret key, matches the decrypted authentication information with the verification information, passes the verification if the matching is successful, and fails if the matching is failed.
S470: and the server of the second system sends the data corresponding to the access request to the application platform, and returns to the step S410.
S480: the server of the second system identifies the current access as a false access and adjusts the number of false accesses of the application platform.
S490: the server of the second system determines whether the adjusted number of false accesses is greater than or equal to a predetermined threshold, if so, S500 is executed, otherwise, S410 is returned to.
S500: and shielding the application platform by the server of the second system, and returning to the step S410.
FIG. 7 is an architecture diagram of a data access system according to an embodiment of the present invention. Referring to fig. 7, the system includes: an application platform (a third party application) 100, a server 200 at a first system, and a server 300 at a second system, wherein the second system is an open system supporting open standards, preferably the first system may be an existing system, in particular:
an application platform 100 for performing the following operations: acquiring authentication information from the server 200; the data on the server 300 is accessed through the acquired authentication information.
In the embodiment of the present invention, the operations to be performed by the application platform 100 are performed, for example, on the client side of the application platform 100.
A server 200 for performing the following operations: generating authentication information and verification information; the generated authentication information is transmitted to the application platform 100 and the generated verification information is transmitted to the server 300 so that the application platform 100 can access the data on the server 300 through the authentication information.
A server 300 for performing the following operations: receiving authentication information sent by the server 200 and an access request sent by the application platform 100; analyzing authentication information from the access request; verifying the application platform 100 according to the authentication information and the verification information; and if the verification is passed, sending data corresponding to the access request to the application platform 100.
Fig. 8 shows a schematic structural diagram of the application platform 100 shown in fig. 7, and referring to fig. 8, the application platform 100 includes: the obtaining module 110 and the accessing module 120 specifically:
an obtaining module 110, configured to obtain the authentication information from the server 200.
An accessing module 120, configured to access data on the server 300 through the authentication information acquired by the acquiring module 110.
In an embodiment of the present invention, the acquisition module 110 and the access module 120 may be configured on the client side, for example.
As shown in fig. 9, in an embodiment of the present invention, the obtaining module 110 may include: the calling unit 111 and the receiving unit 112 specifically:
a calling unit 111, configured to call a login page of the first system, so that the server 200 receives login information of a user through the login page and determines an authorization state of the application platform 100 according to the login information;
a receiving unit 112, configured to receive authentication information generated and sent by the server 200 after determining that the authorization status of the application platform 100 is authorized.
Fig. 10 shows a schematic structural diagram of the server 200 shown in fig. 7. Referring to fig. 10, the server 200 includes: the generating module 210 and the sending module 220 specifically:
a generating module 210, configured to generate the authentication information and the verification information.
A sending module 220, configured to send the authentication information generated by the generating module 210 to the application platform 100 and send the verification information generated by the generating module 210 to the server 300, so that the application platform 100 accesses the data on the server 300 through the authentication information.
As shown in fig. 11, in an embodiment of the present invention, the generating module 210 may include: the receiving unit 211, the verifying unit 212, and the generating unit 213 specifically:
the receiving unit 211 is configured to receive login information of a user.
An verifying unit 212, configured to verify whether the user authorizes the application platform 100 to access at least a portion of the data of the user on the server 300 according to the login information received by the receiving unit 211.
A generating unit 213, configured to generate authentication information and verification information when the verifying unit 212 verifies that the authentication is authorized.
In an embodiment of the invention, the server 200 may generate an access token; the access token is used as the authentication information and the verification information, or the access token is encrypted by a key of an application platform, ciphertext information of the access token is used as the authentication information, plaintext information of the access token is used as the verification information, and the key is sent to the server 300.
Fig. 12 shows a schematic structural diagram of the server 300 shown in fig. 7. Referring to fig. 12, the server 300 includes: the receiving module 310, the parsing module 320, the verifying module 330, the sending module 340, the identifying and adjusting module 350, the determining module 360 and the shielding module 370 specifically:
a receiving module 310, configured to receive the authentication information sent by the server 200 and the access request sent by the application platform 100.
The parsing module 320 is configured to parse the authentication information from the access request received by the receiving module 310.
A verification module 330, configured to perform verification processing on the application platform 100 according to the authentication information parsed by the parsing module 320 and the verification information received by the receiving module 310.
A sending module 340, configured to send data corresponding to the access request to the application platform 100 when the authentication module 330 determines that the authentication is passed.
An identifying and adjusting module 350, configured to identify the current access as a false access and adjust the number of false accesses of the application platform 100 when the verification module 330 determines that the verification fails.
A determining module 360, configured to determine whether the adjusted number of false accesses by the identifying and adjusting module 350 is greater than or equal to a predetermined threshold.
A shielding module 370, configured to shield the application platform 100 when the determination result of the determining module 360 is that the adjusted number of false accesses is greater than or equal to the predetermined threshold.
Of course, the embodiment of the present invention is not limited thereto, and the identification and adjustment module 350, the comparison module 360 and the shielding module 370 may be replaced by, for example, a rejection and prompt module for rejecting the access of the application platform 100 and prompting corresponding information when the verification module 330 determines that the verification fails.
By implementing the data access method, the equipment and the system provided by the invention, the server of a certain system different from the open system can be used as the authorization server for generating the authentication information, so that the role separation of the authorization server and the resource server is ensured under the condition that the open system does not need to separately establish an authorization server, and the hardware cost is reduced.
Through the above description of the embodiments, those skilled in the art will clearly understand that the present invention can be implemented by combining software and a hardware platform. With this understanding in mind, all or part of the technical solutions of the present invention that contribute to the background art may be embodied in the form of a software product, which can be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, a smart phone, or a network device, etc.) to execute the methods according to the embodiments or some parts of the embodiments.
The terms and expressions used in the specification of the present invention have been set forth for illustrative purposes only and are not meant to be limiting. It will be appreciated by those skilled in the art that changes could be made to the details of the above-described embodiments without departing from the underlying principles thereof. The scope of the invention is, therefore, indicated by the appended claims, in which all terms are intended to be interpreted in their broadest reasonable sense unless otherwise indicated.
Claims (10)
1. A method of data access, the method comprising:
the application platform acquires authentication information from a server of a first system;
and the application platform accesses data on the server of the second system through the acquired authentication information.
2. The method of claim 1, wherein the application platform obtaining the authentication information from the server of the first system comprises:
the application platform calls a login page of the first system, so that a server of the first system receives login information of a user through the login page and judges the authorization state of the application platform according to the login information;
and the application platform receives authentication information which is generated and sent by the server of the first system after the authorization state of the application platform is determined to be authorized.
3. A method of data access, the method comprising:
a server of a first system generates authentication information and verification information;
the server of the first system sends the generated authentication information to an application platform and sends the generated verification information to the server of the second system so that the application platform can access data on the server of the second system through the authentication information.
4. The method of claim 3, wherein the server of the first system generating the authentication information and the verification information comprises:
the server of the first system receives login information of a user;
the server of the first system verifies whether the user authorizes the application platform to access at least one part of the data of the user on the server of the second system according to the received login information;
and if the authentication information is authorized, the server of the first system generates authentication information and verification information.
5. The method of claim 3 or 4,
the authentication information includes: accessing ciphertext information of the token;
the authentication information includes: plaintext information of the access token.
6. A method of data access, the method comprising:
the server of the second system receives the verification information sent by the server of the first system and the access request sent by the application platform;
the server of the second system analyzes authentication information from the access request;
the server of the second system carries out verification processing on the application platform according to the authentication information and the verification information;
and if the verification is passed, the server of the second system sends data corresponding to the access request to the application platform.
7. The method of claim 6, wherein the method further comprises:
if the verification fails, the server of the second system identifies the current access as false access and adjusts the false access times of the application platform;
the server of the second system judges whether the adjusted false access times are larger than or equal to a preset threshold value;
and if the adjusted false access times are larger than or equal to the preset threshold value, shielding the application platform by the server of the second system.
8. An application platform, comprising:
the acquisition module is used for acquiring authentication information from a server of a first system;
and the access module is used for accessing the data on the server of the second system through the authentication information acquired by the acquisition module.
9. The application platform of claim 8, wherein the acquisition module comprises:
the calling unit is used for calling a login page of the first system so that a server of the first system receives login information of a user through the login page and judges the authorization state of the application platform according to the login information;
and the receiving unit is used for receiving the authentication information generated and sent by the server of the first system after the server determines that the authorization state of the application platform is authorized.
10. A data access system, the system comprising:
the application platform of claim 8 or 9, a server at a first system, and a server at a second system; wherein,
the server at the first system comprises:
a generating module for generating authentication information and verification information,
a sending module, configured to send the authentication information generated by the generating module to the application platform and send the verification information generated by the generating module to the server of the second system, so that the application platform accesses data on the server of the second system through the authentication information;
the server at the second system comprises:
a receiving module, configured to receive authentication information sent by a server of the first system and an access request sent by the application platform,
a parsing module for parsing the authentication information from the access request received by the receiving module,
a verification module for verifying the application platform according to the authentication information analyzed by the analysis module and the verification information received by the receiving module,
and the sending module is used for sending data corresponding to the access request to the application platform when the verification module determines that the verification is passed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510781737.6A CN105429978B (en) | 2015-11-13 | 2015-11-13 | Data access method, equipment and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510781737.6A CN105429978B (en) | 2015-11-13 | 2015-11-13 | Data access method, equipment and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105429978A true CN105429978A (en) | 2016-03-23 |
CN105429978B CN105429978B (en) | 2018-10-30 |
Family
ID=55507920
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510781737.6A Active CN105429978B (en) | 2015-11-13 | 2015-11-13 | Data access method, equipment and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105429978B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110022279A (en) * | 2018-01-08 | 2019-07-16 | 普天信息技术有限公司 | The method and system of authentication in a kind of micro services system |
CN110771112A (en) * | 2017-05-25 | 2020-02-07 | 脸谱公司 | System and method for preventing session pinning on a domain portal |
WO2020102974A1 (en) * | 2018-11-20 | 2020-05-28 | 深圳市欢太科技有限公司 | Data access method, data access apparatus, and mobile terminal |
CN112104588A (en) * | 2019-06-17 | 2020-12-18 | 北京车和家信息技术有限公司 | Login authentication method and system, terminal and server |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102739708A (en) * | 2011-04-07 | 2012-10-17 | 腾讯科技(深圳)有限公司 | System and method for accessing third party application based on cloud platform |
CN103685139A (en) * | 2012-08-30 | 2014-03-26 | 中兴通讯股份有限公司 | Authentication and authorization processing method and device |
-
2015
- 2015-11-13 CN CN201510781737.6A patent/CN105429978B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102739708A (en) * | 2011-04-07 | 2012-10-17 | 腾讯科技(深圳)有限公司 | System and method for accessing third party application based on cloud platform |
CN103685139A (en) * | 2012-08-30 | 2014-03-26 | 中兴通讯股份有限公司 | Authentication and authorization processing method and device |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110771112A (en) * | 2017-05-25 | 2020-02-07 | 脸谱公司 | System and method for preventing session pinning on a domain portal |
CN110771112B (en) * | 2017-05-25 | 2022-02-15 | 元平台公司 | System and method for preventing session pinning on a domain portal |
CN110022279A (en) * | 2018-01-08 | 2019-07-16 | 普天信息技术有限公司 | The method and system of authentication in a kind of micro services system |
WO2020102974A1 (en) * | 2018-11-20 | 2020-05-28 | 深圳市欢太科技有限公司 | Data access method, data access apparatus, and mobile terminal |
CN112823503A (en) * | 2018-11-20 | 2021-05-18 | 深圳市欢太科技有限公司 | Data access method, data access device and mobile terminal |
CN112823503B (en) * | 2018-11-20 | 2022-08-16 | 深圳市欢太科技有限公司 | Data access method, data access device and mobile terminal |
CN112104588A (en) * | 2019-06-17 | 2020-12-18 | 北京车和家信息技术有限公司 | Login authentication method and system, terminal and server |
Also Published As
Publication number | Publication date |
---|---|
CN105429978B (en) | 2018-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111556006B (en) | Third-party application system login method, device, terminal and SSO service platform | |
US10848310B2 (en) | Method and device for identifying user identity | |
CN104735066B (en) | A kind of single-point logging method of object web page application, device and system | |
CN104917727B (en) | A kind of method, system and device of account's authentication | |
US8661144B2 (en) | Method and system for automated user authentication for a priority communication session | |
CN104954330B (en) | A kind of methods, devices and systems to be conducted interviews to data resource | |
US9009793B2 (en) | Dynamic pin dual factor authentication using mobile device | |
CN107086979B (en) | User terminal verification login method and device | |
US20160381001A1 (en) | Method and apparatus for identity authentication between systems | |
CN103188221A (en) | Application login method, application login device and mobile terminal | |
CN103036902A (en) | Login control method and login control system based on two-dimension code | |
CN103023919A (en) | Two-dimensional code based login control method and two-dimensional code based login control system | |
CN110958119A (en) | Identity verification method and device | |
CN105119722A (en) | Identity verification method, equipment and system | |
CN105681259A (en) | Open authorization method and apparatus and open platform | |
CN105429978B (en) | Data access method, equipment and system | |
CN111132305B (en) | Method for 5G user terminal to access 5G network, user terminal equipment and medium | |
US20230254146A1 (en) | Cybersecurity guard for core network elements | |
CN104243452B (en) | A kind of cloud computing access control method and system | |
US20240364505A1 (en) | Intelligent and secure packet captures for cloud solutions | |
CN106878099B (en) | Traffic management method, terminal equipment, server and system | |
CN105635060A (en) | Method for obtaining application data, authentication certificate server and gateway | |
WO2016165443A1 (en) | Method for protecting machine type communication device, network entity, and mtc device | |
CN111835734A (en) | Information processing method, information processing device, electronic equipment, server and storage medium | |
US8578492B2 (en) | Application revocation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |