CN101697515A - Web mode-based authentication method, system and device - Google Patents

Web mode-based authentication method, system and device Download PDF

Info

Publication number
CN101697515A
CN101697515A CN200910211146A CN200910211146A CN101697515A CN 101697515 A CN101697515 A CN 101697515A CN 200910211146 A CN200910211146 A CN 200910211146A CN 200910211146 A CN200910211146 A CN 200910211146A CN 101697515 A CN101697515 A CN 101697515A
Authority
CN
China
Prior art keywords
user
information
application system
user identification
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN200910211146A
Other languages
Chinese (zh)
Inventor
杨春雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kingdee Software China Co Ltd
Original Assignee
Kingdee Software China Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kingdee Software China Co Ltd filed Critical Kingdee Software China Co Ltd
Priority to CN200910211146A priority Critical patent/CN101697515A/en
Publication of CN101697515A publication Critical patent/CN101697515A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a Web mode-based authentication method. After creating a multi-application system user authentication centre, the Web mode-based authentication method comprises the following steps that: the user authentication centre performs authentication on a user according to received user logon request information; and when the authentication is passed, an application system permits the logon of the user according to authentication passing information transmitted by the user authentication centre. Correspondingly, the embodiment of the invention provides a Web mode-based authentication system and the user authentication centre. The technical scheme provided by the embodiment of the invention can authenticate the user of a plurality of application systems through one piece of user authentication information, thereby avoiding the frequent input of logon request information when the same user log on the plurality of application systems.

Description

A kind of authentication method, system and device based on the Web pattern
Technical field
The present invention relates to field of computer technology, more particularly, relate to a kind of authentication method, system and device based on the Web pattern.
Background technology
Continuous development along with Internet technology, increasing website and network application system provide diversified network service for the user, the E-mail address service that for example a lot of websites are provided, the online query telephone expenses service that telecom operators provided etc., the user uses these services if desired, need the corresponding system of login, and in the process of this system of login, for the personal information that prevents the user is revealed, need the user to import username and password, system server is behind the username and password that receives user's input, this username and password is verified, when checking is passed through, the expression user has logined this system, the respective service that can use this system to provide.
Thus, also as can be seen, the user obtains the service that a plurality of systems provide if desired, in these systems, register, login respectively with regard to needs, and like this, the user just need stay relevant user information in a plurality of systems, and in login process, the user also need import corresponding log-on message in different systems, increased the workload of user in login process, is unfavorable for user's various network services that using system provided easily.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of authentication method based on the Web pattern, system and device, so that the user can login a plurality of different systems quickly and easily, obtains the map network service that this system provides.
The embodiment of the invention is achieved in that
The embodiment of the invention provides a kind of authentication method based on the Web pattern, after creating many application system user (asu)s authentication center, comprises step:
Described authenticating user identification center is carried out authentication according to user logging request information to the user;
When checking was passed through, application system allowed described user's login according to the checking that described authenticating user identification center is sent by information.
Described authenticating user identification center is carried out authentication to the user logging request information that receives to the user, comprising:
Described user sends logging request to described authenticating user identification center;
Described authenticating user identification center receives the landing request information that described user sends, and according to described landing request information described user is carried out authentication.
Described application system allows described user's login according to the checking that described authenticating user identification center is sent by information, comprising:
Described user sends logging request to described application system;
Described application system checks according to described logging request whether described user has the checking that described authenticating user identification center sent and pass through information;
When described user had checking that described authenticating user identification center sent by information, described application system allowed described user's login.
Described authenticating user identification center is carried out authentication according to user logging request information to the user, comprising:
Described user sends logging request to described application system;
Described application system is sent to described authenticating user identification center with described logging request;
Described authenticating user identification center receives the user logging request information that described application system sends, and according to described landing request information described user is carried out authentication.
Described application system allows described user's login according to the checking that described authenticating user identification center is sent by information, comprising:
Described application system of mind-set and described user send checking by information in the described authenticating user identification, and described application system allows described user's login according to described checking by information.
Described user logging request information comprises username and password.
Described checking comprises the Cookie of adding checking by information by information.
The embodiment of the invention provides a kind of Verification System based on the Web pattern, comprising: authenticating user identification center and application system, wherein,
Described authenticating user identification center is used for the center and according to received user logging request information the user is carried out authentication;
Described application system, the checking that is used for being sent according to described authenticating user identification center allows described user's login by information.
The embodiment of the invention provides a kind of authenticating user identification center, comprising: receiving element, authentication unit and transmitting element, wherein,
Described receiving element, the user receives user logging request information;
Described authentication unit is used for receiving to such an extent that user logging request information is carried out authentication to described user according to described receiving element;
Described transmitting element when checking is passed through, is used for sending checking and passes through information.
Described receiving element comprises first receiving element, is used to receive the landing request information that the user sends.
Described transmitting element comprises first transmitting element, when checking is passed through, sends checking to described user and passes through information.
Described receiving element comprises second receiving element, is used to receive the user logging request information that application system sends, and described user logging request information sends to described application system by described user.
Described transmitting element comprises second transmitting element, when checking is passed through, is used for sending the information of passing through of verifying to described application system and described user.
Compared with prior art, the technical scheme that the embodiment of the invention provides has the following advantages and characteristics: the embodiment of the invention is by setting up many application system user (asu)s authentication center, this authenticating user identification center is carried out authentication to the user logging request information that receives to the user, and application system can allow user's login according to the checking that this subscriber authentication center is sent by information.The technical scheme that the embodiment of the invention provided can authenticate by the user of a user's ID authentication information to a plurality of application systems, when having avoided same user to login a plurality of application system, need carry out repeatedly the input of landing request information.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below, apparently, accompanying drawing in describing below only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the related a kind of authentication method flow chart based on the Web pattern of the embodiment of the invention;
Fig. 2 is the related a kind of Verification System structural representation based on the Web pattern of the embodiment of the invention;
Fig. 3 is the related a kind of authenticating user identification division center schematic diagram of the embodiment of the invention;
Fig. 4 is the related another kind of authenticating user identification division center schematic diagram of the embodiment of the invention;
Fig. 5 is the third related authenticating user identification division center schematic diagram of the embodiment of the invention;
Fig. 6 is the related a kind of authentication method flow chart based on the Web pattern in conjunction with application scenarios of the embodiment of the invention;
Fig. 7 is the authentication method flow chart based on Web pattern of the related another kind of the embodiment of the invention in conjunction with application scenarios.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
The embodiment of the invention provides a kind of authentication method based on the Web pattern, this method at first needs to create many application system user (asu)s authentication center, this authenticating user identification center belongs to a plurality of application systems, the usefulness of this several application system is registered by this authenticating user identification center and authentication etc. per family, after creating multisystem authenticating user identification center, comprise step as shown in Figure 1:
Step 101: described authenticating user identification center is carried out authentication according to user logging request information to the user;
In step 101, the authenticating user identification center before user identity is authenticated, the user logging request information that need at first receive this user and sent, generally, can there be following two kinds of situations at the authenticating user identification center to the reception of user logging request information:
The user directly sends user logging request information to the authenticating user identification center, that is to say that this authenticating user identification center can directly receive user logging request information from the user, wherein, can comprise the predefined username and password of user etc. in this landing request information;
Another situation is, the user at first sends landing request information to a certain application system that this authenticating user identification center is belonged to, by this application system the landing request information that the user sent is forwarded to the authenticating user identification center, that is to say, the received user logging request information in authenticating user identification center this moment comes from the forwarding of application system, wherein, can comprise the predefined username and password of user etc. in this landing request information.
Step 102: when checking was passed through, application system allowed described user's login according to the checking that described authenticating user identification center is sent by information.
Because the authenticating user identification center is to the receive mode difference of user logging request information in the step 101, then in step 102, the checking that application system is sent according to this authenticating user identification center allows described user to login also to exist different by information, correspondingly also can have following two kinds of situations:
The user at first logins certain application system that this authenticating user identification center is belonged to, then this application system needs at first to check whether this user has the checking that the authenticating user identification center sent and pass through information, when checking that the result shows that this user has this checking by information, application system can allow this user's login.
Another situation then is: the authenticating user identification center will verify by information and send to the application system that the user logins that this application system receives the checking of this respective user by after the information, allows this user to login.
Wherein, the checking that is sent at the authenticating user identification center can be to add the Cookie of checking by information by information.
A kind of authentication method that the embodiment of the invention provided based on the Web pattern, by setting up many application system user (asu)s authentication center, this authenticating user identification center is carried out authentication to the user logging request information that receives to the user, and application system can allow user's login according to the checking that this subscriber authentication center is sent by information.The technical scheme that the embodiment of the invention provided can authenticate by the user of a user's ID authentication information to a plurality of application systems, when having avoided same user to login a plurality of application system, need carry out repeatedly the input of landing request information.
Correspondingly, the embodiment of the invention also provides a kind of Verification System based on the Web pattern, and this system configuration comprises as shown in Figure 2: authenticating user identification center 201 and at least one application system 202, wherein:
Authenticating user identification center 201: be used for the center and the user carried out authentication according to received user logging request information;
Application system 202: the checking that is used for being sent according to described authenticating user identification center allows described user's login by information.
A kind of Verification System based on the Web pattern that this embodiment provides can be used to carry out the authentication method based on the Web pattern that the embodiment of the invention provides.Should carry out process based on the Verification System of Web pattern, the authentication method based on the Web pattern that can provide referring to the embodiment of the invention based on the authentication of Web pattern.
A kind of Verification System that the embodiment of the invention provided based on the Web pattern, by setting up many application system user (asu)s authentication center, this authenticating user identification center is carried out authentication to the user logging request information that receives to the user, and application system can allow user's login according to the checking that this subscriber authentication center is sent by information.The technical scheme that the embodiment of the invention provided can authenticate by the user of a user's ID authentication information to a plurality of application systems, when having avoided same user to login a plurality of application system, need carry out repeatedly the input of landing request information.
In addition, the embodiment of the invention also provides a kind of authenticating user identification center, and this authenticating user identification division center comprises as shown in Figure 3: receiving element 301, authentication unit 302 and transmitting element 303, wherein:
Receiving element 301: be used to receive user logging request information;
Authentication unit 302 is used for receiving to such an extent that user logging request information is carried out authentication to described user according to described receiving element;
Transmitting element 303 when checking is passed through, is used for sending checking and passes through information.
Corresponding to the order difference of user's login in the method, then correspondingly, also there is difference in the concrete structure at authenticating user identification center:
When the mode that adopts the user directly to login this authenticating user identification center authenticated, the structure at this authenticating user identification center comprised as shown in Figure 4: first receiving element 401, authentication unit 302 and first transmitting element 403, wherein:
First receiving element 401 is used to receive the landing request information that the user sends;
Authentication unit 302 is used for according to first receiving element, 401 received user logging request information the user being carried out authentication;
First transmitting element 403 when checking is passed through, sends checking to described user and passes through information.
And when the mode that adopts the user at first to login application system authenticated, the structure at this authenticating user identification center comprised as shown in Figure 5: second receiving element 501, authentication unit 302 and second transmitting element 503, wherein:
Second receiving element 501 is used to receive the user logging request information that application system sends, and described user logging request information sends to described application system by described user;
Authentication unit 302 is used for according to second receiving element, 501 received user logging request information the user being carried out authentication;
Second transmitting element 503 when checking is passed through, is used for sending the information of passing through of verifying to described application system and described user.
A kind of authenticating user identification center that the embodiment of the invention provided can be used to carry out the authentication method based on the Web pattern that the embodiment of the invention provides.The process based on the authentication of Web pattern is carried out at this authenticating user identification center, the authentication method based on the Web pattern that can provide referring to the embodiment of the invention.
A kind of authenticating user identification center that the embodiment of the invention provided, can carry out authentication to the user to the user logging request information that receives, application system can allow user's login according to the checking that this subscriber authentication center is sent by information.The technical scheme that the embodiment of the invention provided can authenticate by the user of a user's ID authentication information to a plurality of application systems, when having avoided same user to login a plurality of application system, need carry out repeatedly the input of landing request information.
In conjunction with said method, system, device and concrete application scenarios, technical scheme involved in the present invention is described further, step as shown in Figure 6:
Step 601: the user registers to the authenticating user identification center;
In step 601, the user at first sends register requirement to the authenticating user identification center, the authenticating user identification center is after the register requirement that receives user's transmission, the relevant user information that indication user input is registered, for example essential information such as user name, password and other more detailed information of people one by one.The user is sent to the authenticating user identification center, and by the authenticating user identification center these information is stored after above-mentioned information is imported.
Need to prove that this authenticating user identification center can be that several application systems of having passed through mutual authentication are concentrated the server that carries out authenticating user identification on the network.For example, can reach an agreement between certain several website, the user only need once register, registration when can be implemented in this several website, and in the present embodiment, the authenticating user identification center promptly can be used to carry out work such as user's registration and log-on message storage.
Step 602: the user sends logging request to the authenticating user identification center;
In step 602, when the user registers at this authenticating user identification center, if the user wishes to obtain the network service that certain or a plurality of application system provided that this authenticating user identification center is belonged to, then need to authenticating user identification center input log-on message, for example Deng Lu username and password etc.
Step 603: the authenticating user identification center is carried out authentication according to the logging request that the user imported to the user;
In step 603, the authenticating user identification center authenticates user identity according to information such as user name entrained in this logging request, passwords after receiving the logging request of user's transmission, if authentication is passed through, then execution in step 604; Otherwise execution in step 605.
Step 604: the mind-set user terminal sends the information of passing through of verifying in the authenticating user identification;
In step 604, after the user was by authentication, the authenticating user identification center need be sent to user terminal by information with checking, for example added the Cookie of authorization information to the browser of user terminal, so that user terminal is preserved.
Step 605: the mind-set user returns authentication failed information in the authenticating user identification.
Step 606: the user sends logging request to certain application system that the authenticating user identification center is belonged to;
In step 606, if the user wishes to obtain the associated network services that certain application system provided that this authenticating user identification center is belonged to, then need at first to login this application system, therefore need send logging request to this application system.
Step 607: application system is checked whether this user terminal is verified and is passed through;
In step 607, after application system receives the logging request of user terminal transmission, check at first this user terminal whether by checking, for example, checks whether comprise the Cookie with authorization information in this user terminal.If the verification passes, then execution in step 608, otherwise carry out this step 609.
Step 608: the user successfully logins application system.
Step 609: application system prompting user logins again.
Present embodiment be the user after the authenticating user identification center is registered, the user at first logins at the authentication center, obtains the service of the application system that this authentication center belonged to if desired, the corresponding application system of login again is with the service of obtaining.Below, the authentication method of another kind of mode is described, this method step comprises as shown in Figure 7:
Step 701: the user registers to the authenticating user identification center;
In step 701, the user at first sends register requirement to the authenticating user identification center, the authenticating user identification center is after the register requirement that receives user's transmission, the relevant user information that indication user input is registered, for example essential information such as user name, password and other more detailed information of people one by one.The user is sent to the authenticating user identification center, and by the authenticating user identification center these information is stored after above-mentioned information is imported.
Need to prove that this authenticating user identification center can be that several application systems of having passed through mutual authentication are concentrated the server that carries out authenticating user identification on the network.For example, can reach an agreement between certain several website, the user only need once register, registration when can be implemented in this several website, and in the present embodiment, the authenticating user identification center promptly can be used to carry out work such as user's registration and log-on message storage.
Step 702: the user sends logging request to certain application system that this authentication center is belonged to;
In step 702, if the user wishes to obtain the associated network services that certain application system provided that this authentication center is belonged to, then need at first to login this application system, therefore need send logging request to this application system, and to this application system input log-on message, the username and password of predefined login etc. for example.
Step 703: application system is sent to the authenticating user identification center with the log-on message that the user imported, and carries out authentication by the authenticating user identification center;
In step 703, the authenticating user identification center authenticates user identity according to information such as user name entrained in this logging request, passwords after receiving the logging request of user's transmission, if authentication is passed through, then execution in step 704; Otherwise execution in step 705.
Step 704: this application system of mind-set is returned checking by information in the authenticating user identification, and sends the information of passing through of verifying to user terminal;
In step 704, after the user was by authentication, the authenticating user identification center need send checking by information to the application system that this user logined, so that this user can login corresponding application system smoothly; In addition, when avoiding the user to login the other system that this authenticating user identification center belonged to, still will import relevant log-on message, the authentication center also needs to send checking to this user terminal pass through information.
Step 705: the mind-set application system is returned authentication failed information in the user identity.
Step 706: the user successfully logins application system.
Need to prove,, then can carry out among the embodiment step 606 to step 609 if the user also wishes to login other application systems that this authenticating user identification center is belonged to.
In the present embodiment, the user is after registering the authenticating user identification center, at first login on a certain application system that is belonged at this authenticating user identification center, be sent to the authenticating user identification center by this application system log-on message of will being correlated with, and verify by the authenticating user identification center.
To the above-mentioned explanation of the disclosed embodiments, make this area professional and technical personnel can realize or use the present invention.Multiple modification to these embodiment will be conspicuous concerning those skilled in the art, and defined herein General Principle can realize under the situation that does not break away from the spirit or scope of the present invention in other embodiments.Therefore, the present invention will can not be restricted to these embodiment shown in this article, but will meet and principle disclosed herein and features of novelty the wideest corresponding to scope.

Claims (13)

1. the authentication method based on the Web pattern is characterized in that, after creating many application system user (asu)s authentication center, comprises step:
Described authenticating user identification center is carried out authentication according to user logging request information to the user;
When checking was passed through, application system allowed described user's login according to the checking that described authenticating user identification center is sent by information.
2. method according to claim 1 is characterized in that, described authenticating user identification center is carried out authentication according to user logging request information to the user, comprising:
Described user sends logging request to described authenticating user identification center;
Described authenticating user identification center receives the landing request information that described user sends, and according to described landing request information described user is carried out authentication.
3. method according to claim 2 is characterized in that, described application system allows described user's login according to the checking that described authenticating user identification center is sent by information, comprising:
Described user sends logging request to described application system;
Described application system checks according to described logging request whether described user has the checking that described authenticating user identification center sent and pass through information;
When described user had checking that described authenticating user identification center sent by information, described application system allowed described user's login.
4. method according to claim 1 is characterized in that, described authenticating user identification center is carried out authentication according to user logging request information to the user, comprising:
Described user sends logging request to described application system;
Described application system is sent to described authenticating user identification center with described logging request;
Described authenticating user identification center receives the user logging request information that described application system sends, and according to described landing request information described user is carried out authentication.
5. method according to claim 4 is characterized in that, described application system allows described user's login according to the checking that described authenticating user identification center is sent by information, comprising:
Described application system of mind-set and described user send checking by information in the described authenticating user identification, and described application system allows described user's login according to described checking by information.
6. according to each described method in the claim 1 to 5, it is characterized in that described user logging request information comprises username and password.
7. according to each described method in the claim 1 to 5, it is characterized in that described checking comprises the Cookie of adding checking by information by information.
8. the Verification System based on the Web pattern is characterized in that, comprising: authenticating user identification center and application system, wherein,
Described authenticating user identification center is used for according to user logging request information the user being carried out authentication;
Described application system, the checking that is used for being sent according to described authenticating user identification center allows described user's login by information.
9. an authenticating user identification center is characterized in that, comprising: receiving element, authentication unit and transmitting element, wherein,
Described receiving element is used to receive user logging request information;
Described authentication unit is used for receiving to such an extent that user logging request information is carried out authentication to described user according to described receiving element;
Described transmitting element when checking is passed through, is used for sending checking and passes through information.
10. authenticating user identification according to claim 9 center is characterized in that described receiving element comprises first receiving element, is used to receive the landing request information that the user sends.
11. authenticating user identification according to claim 10 center is characterized in that described transmitting element comprises first transmitting element, when checking is passed through, sends checking to described user and passes through information.
12. authenticating user identification according to claim 9 center, it is characterized in that, described receiving element comprises second receiving element, is used to receive the user logging request information that application system sends, and described user logging request information sends to described application system by described user.
13. authenticating user identification according to claim 12 center is characterized in that described transmitting element comprises second transmitting element, when checking is passed through, is used for sending the information of passing through of verifying to described application system and described user.
CN200910211146A 2009-11-06 2009-11-06 Web mode-based authentication method, system and device Pending CN101697515A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN200910211146A CN101697515A (en) 2009-11-06 2009-11-06 Web mode-based authentication method, system and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN200910211146A CN101697515A (en) 2009-11-06 2009-11-06 Web mode-based authentication method, system and device

Publications (1)

Publication Number Publication Date
CN101697515A true CN101697515A (en) 2010-04-21

Family

ID=42142591

Family Applications (1)

Application Number Title Priority Date Filing Date
CN200910211146A Pending CN101697515A (en) 2009-11-06 2009-11-06 Web mode-based authentication method, system and device

Country Status (1)

Country Link
CN (1) CN101697515A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469083A (en) * 2010-11-12 2012-05-23 金蝶软件(中国)有限公司 User authentication method and apparatus thereof, and enterprise system
CN102882853A (en) * 2012-09-05 2013-01-16 孙银海 System and method for internet user authentication
CN104933367A (en) * 2014-03-17 2015-09-23 联想(北京)有限公司 Information processing method and electronic device
CN105812314A (en) * 2014-12-29 2016-07-27 北京新媒传信科技有限公司 Method for logging in Internet application program by user and unified authentication platform
CN107294917A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 One kind trusts login method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469083A (en) * 2010-11-12 2012-05-23 金蝶软件(中国)有限公司 User authentication method and apparatus thereof, and enterprise system
CN102882853A (en) * 2012-09-05 2013-01-16 孙银海 System and method for internet user authentication
CN104933367A (en) * 2014-03-17 2015-09-23 联想(北京)有限公司 Information processing method and electronic device
CN105812314A (en) * 2014-12-29 2016-07-27 北京新媒传信科技有限公司 Method for logging in Internet application program by user and unified authentication platform
CN105812314B (en) * 2014-12-29 2019-11-29 北京新媒传信科技有限公司 A kind of user logs in the method and unification authentication platform of internet application
CN107294917A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 One kind trusts login method and device

Similar Documents

Publication Publication Date Title
US8495720B2 (en) Method and system for providing multifactor authentication
CN101420416B (en) Identity management platform, service server, login system and method, and federation method
CN102638473B (en) User data authorization method, device and system
CN101350720B (en) Dynamic cipher authentication system and method
CN103188207B (en) A kind of cross-domain single sign-on realization method and system
CN101626369B (en) Method, device and system for single sign-on
US20180183809A1 (en) Universal login authentication service
KR101214836B1 (en) Authentication method and authentication system
US20160269396A1 (en) Methods and Systems for Controlling Mobile Terminal Access to a Third-Party Server
US20100281530A1 (en) Authentication arrangement
CN103200150B (en) Identity identifying method and system
CN104378382A (en) Multiple client wireless authentication system and authentication method thereof
CN103414684A (en) Single sign-on method and system
TWI632798B (en) Server, mobile terminal, and network real-name authentication system and method
JP2007264835A (en) Authentication method and system
CN101355555A (en) Authentication system and authentication method
CN101552673A (en) An approach to log in single sign-on system by using OpenID account
US10630669B2 (en) Method and system for user verification
CN101656609A (en) Single sign-on method, system and device thereof
CN103023856A (en) Single sign-on method, single sign-on system, information processing method and information processing system
US20180034809A1 (en) Technique for connecting to a service
CN101697515A (en) Web mode-based authentication method, system and device
CN115022047B (en) Account login method and device based on multi-cloud gateway, computer equipment and medium
CN103379093B (en) A kind of method and device for realizing account intercommunication
JP2009118110A (en) Method and system for provisioning meta data of authentication system, its program and recording medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20100421