CN104717187A - Login method and device - Google Patents

Login method and device Download PDF

Info

Publication number
CN104717187A
CN104717187A CN201310689640.3A CN201310689640A CN104717187A CN 104717187 A CN104717187 A CN 104717187A CN 201310689640 A CN201310689640 A CN 201310689640A CN 104717187 A CN104717187 A CN 104717187A
Authority
CN
China
Prior art keywords
automatic
client
authentication
login
service end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310689640.3A
Other languages
Chinese (zh)
Other versions
CN104717187B (en
Inventor
高强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201310689640.3A priority Critical patent/CN104717187B/en
Publication of CN104717187A publication Critical patent/CN104717187A/en
Application granted granted Critical
Publication of CN104717187B publication Critical patent/CN104717187B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a login method. A server side verifies an automatic login sequence of a client side based on the corresponding relation between a self stored client-side ID and an automatic login voucher, the automatic login sequence is generated by using a last time login time and the automatic login voucher, and the server side and the client side update the last time login time synchronously after verification succeeds. Therefore, on the premise of the compatibility of client sides with different platform versions, the problem that user authentication information or an automatic login mark is illegally obtained and used due to the crack of a transmitting procedure is solved, and the login security is further improved.

Description

A kind of login method and equipment
Technical field
The present invention relates to communication technical field, particularly a kind of login method.The present invention also relates to a kind of network equipment simultaneously.
Background technology
At present, terminal is as mainly following in the client software in mobile phone and panel computer logs in automatically two kinds of modes:
Method 1: log in mark in client records, service end also records this mark.Login mark, when sending automatic logging request to service end, sends by client in the lump; When service end verification mark is effective, allow client logs success.Log in mark and can arrange certain term of validity, when exceeding the term of validity, client is carried original mark that logs in and is marked to the login that client application is new.
Method 2: client preserve user cipher, in time automatically logging in, client when sending automatic logging request to service end, the user cipher that automatic filling has been preserved; Service end authentication of users name passwords etc. are effective, allow client logs success.
Inventor is realizing finding in process of the present invention, the mode of above-mentioned automatic login of client side not only cannot general for the client on each operating platform (namely needing for client corresponding to each platform development), and all there are security breaches: the login stored in method 1 in the terminal marks easily by illegal acquisition, and after this mark of acquisition, in other clients, the client account number of this user can be logged in by falsely using this mark.In method 2, terminal needs to store the password of user or other authentication informations, is so directly acquired and the risk falsely used is higher.
As can be seen here, how under the prerequisite of the various platform of compatibility, avoid user profile to be illegally accessed and to falsely use in the transmitting procedure automatically logged in, become the technical problem that those skilled in the art are urgently to be resolved hurrily.
Summary of the invention
The invention provides a kind of login method, be applied in the system comprising client and service end, be illegally accessed in order to avoid user profile and falsely use in the transmitting procedure automatically logged in, be provided with the mark ID of client and the mapping table of automatic logging on authentication in described service end, the method also comprises:
Described service end receives the automatic logging request that described client sends, described automatic logging request carries mark ID and the automatic login sequence of end side of described client, and the automatic logging on authentication that the automatic login sequence of described end side is stored according to self by described client and the last login time generate;
Described service end is according to automatic logging on authentication corresponding with described ID in described mapping table, and the last login time of the described client of local record, verifies the automatic login sequence of described end side;
If be verified, described service end sends to described client and logins successfully response, upgrades described the last login time to make described client and described server synchronization.
Accordingly, the invention allows for a kind of network equipment, for be applied to as service end comprise client and service end system in, this network equipment is provided with the mark ID of client and the mapping table of automatic logging on authentication, also comprises:
Receiver module, for receiving the automatic logging request that described client sends, described automatic logging request carries mark ID and the automatic login sequence of end side of described client, and the automatic logging on authentication that the automatic login sequence of described end side is stored according to self by described client and the last login time generate;
Authentication module, for according to automatic logging on authentication corresponding with described ID in described mapping table, and the last login time of the described client of local record, the automatic login sequence of described end side is verified;
Sending module, for after described authentication module is verified the automatic login sequence of described end side, sends to described client and logins successfully response, upgrade described the last login time to make described client and described server synchronization.
As can be seen here, by applying above technical scheme, service end is based on the corresponding relation of the client id self stored and automatic logging on authentication, utilize the last login time and automatic logging on authentication to generate automatic login sequence to client to verify, and upgrade the last login time with client synchronization after being proved to be successful.Thus under the prerequisite of the client of compatible different platform version, avoid and be cracked by transmitting procedure and cause user authentication information or automatically log in the problem that mark is illegally accessed use, improve the fail safe of login further.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of a kind of login method that the present invention proposes;
Fig. 2 is a kind of automatic logging method schematic flow sheet that the specific embodiment of the invention proposes;
Fig. 3 is the structural representation of a kind of network equipment that the present invention proposes.
Embodiment
For solving in existing automatic login process because direct authentication information can maliciously be obtained and the problem falsely used, the present invention proposes a kind of login method, when user uses client to communicate with service end, for client distributes ID, for marking client software, in follow-up login with when automatically logging in, client id is as the foundation of identification software, simultaneously, in the process automatically logged in, client does not store automatic login sequence, but automatic logging on authentication and Successful login time are separated store, when needing automatically to log in, assembled automatic login sequence again, due to the perturbation action of login time, each login sequence is all not quite similar, take precautions against transmitting procedure to be cracked, the problem that login sequence is stolen.
As shown in Figure 1, the method comprises the following steps:
S101, described service end receives the automatic logging request that described client sends, described automatic logging request carries mark ID and the automatic login sequence of end side of described client, and the automatic logging on authentication that the automatic login sequence of described end side is stored according to self by described client and the last login time generate.
Because automatic logging on authentication must at ordinary authentication by just issuing afterwards, therefore before automatically logging in, service end can distribute a unique mark ID for each client, client needs to utilize the authentication information (as user name, password etc.) of user to send initial registration request to service end simultaneously, carries ID and the user authentication information of described client in this initial registration request.
After receiving initial registration request, service end carries out certification to described user authentication information, if authentication success, described service end generates the automatic logging on authentication corresponding with described ID, and after described ID and described automatic logging on authentication are stored to described mapping table, described automatic logging on authentication is carried to login successfully in response and is back to described client, preserve described automatic logging on authentication to make described client and upgrade described the last login time with described server synchronization.
S102, described service end is according to automatic logging on authentication corresponding with described ID in described mapping table, and the last login time of the described client of local record, verifies the automatic login sequence of described end side.
Particularly, the present invention proposes the verification operation that following two kinds of modes realize this step:
(1) the automatic login sequence of service end assembling network side
Described service end inquires about corresponding automatic logging on authentication according to described ID in described mapping table;
Described service end is according to the automatic login sequence in the last login time generating network side of the automatic logging on authentication inquired and described client;
Described service end judges that whether the automatic login sequence of described network side is identical with the automatic login sequence of described end side; If so, then described service end confirms to be verified.
(2) service end is disassembled the automatic login sequence of end side
Described service end resolves the automatic login sequence of described end side, obtains the automatic logging on authentication and the login time that generate the automatic login sequence of described end side;
If described automatic logging on authentication is identical with automatic logging on authentication corresponding with described ID in described mapping table, and described login time differs with the last login time of the described client of local record and is no more than default interval threshold, described service end confirms to be verified.
Although above two kinds of mode processing modes are different, can both realize the checking for client side, concrete which kind of mode that adopts can be selected flexibly according to actual conditions, and this does not affect protection scope of the present invention.
S103, if be verified, described service end sends to described client and logins successfully response, upgrades described the last login time to make described client and described server synchronization.
Particularly, this step has the mode of following two kinds of synchronous landing times:
(1) to be as the criterion notice client with the service end time
The described the last login time logining successfully in response the described client also carrying described service end local record, stores as the last login time in order to make client.Any one verification mode in the adaptive S102 of the method.
(2) client is as the criterion to receive the moment logging in success response
Described logining successfully in response also carries synchronic command, is used to indicate described client and is stored as the last login time in the moment logining successfully response described in reception.Poor due to the time of collecting of client and the writing time of service end may the regular hour be there is, therefore need to specify a threshold interval in advance, and the mode that in S102, service end is disassembled the automatic login sequence of end side can only be applied.
In order to set forth technological thought of the present invention further, now in conjunction with concrete application scenarios, technical scheme of the present invention is described.As shown in Figure 2, be a kind of automatic logging method schematic flow sheet of specific embodiment of the invention proposition.Its flow process is roughly as follows:
First, when client communicates for the first time with service end, service end is that client issues unique client id, this client id when user does not delete this application, forever effectively.Client id is preserved separately in the terminal, and is encrypted, and can increase suitable interfere information for improving fail safe.
Then, user uses client to carry out common login, and carries user name, password and client id.If user have selected automatically log in option, then service end generates automatic logging on authentication and the corresponding relation of recording user name, client id, automatically logging on authentication.Then, service end issues automatic logging on authentication, and records login time.Client also records login time.Automatic logging on authentication and login time separate in terminal and store, and encrypt.
After arranging above, client, when automatically logging in, (considers terminal capabilities by internal cryptographic algorithm, adopt lightweight algorithm as far as possible, for improving fail safe further, privately owned cryptographic algorithm can regularly replace), generate the automatic login sequence of automatic logging on authentication, last login time composition.Client is sent out client id and automatically log in hash and carry out automatic logging request.Service end calculates automatic login sequence equally, and to mate with automatic login sequence client id and verify.Automatically, after logining successfully, client and service end upgrade login time.
In addition, the specific embodiment of the invention also proposed a kind of automatic login sequence algorithm specifically: suppose that the date and time of last login is (each letter represents a numeral) YYMMDD HHNNSS; Automatic logging on authentication is ABCEFGIJK.Form is as follows:
Date and time:
Y1 Y2 M1 M2 D1 D2 H1 H2 N1 N2 S1 S2
Wherein, corresponding relation is YY corresponding year, MM corresponding month, the DD corresponding date, corresponding minute of corresponding hour of HH, NN, SS corresponding second.
Automatic logging on authentication:
A B C E F G I J K
So, automatic login sequence is:
Wherein A+B etc. adopt character to be added.
In concrete verification algorithm, service end needs whether whether identical with the automatic logging on authentication of service end record and the YYMMDDHHNNSS of simultaneous verification ABCEFGIJK is legal date and time, or contrasts according to the automatic login sequence of above algorithm and local information network consisting side.
For reaching above technical purpose, the invention allows for a kind of network equipment, for be applied to as service end comprise client and service end system in, as shown in Figure 3, be provided with the mark ID of client and the mapping table 310 of automatic logging on authentication, also comprise:
Receiver module 320, for receiving the automatic logging request that described client sends, described automatic logging request carries mark ID and the automatic login sequence of end side of described client, and the automatic logging on authentication that the automatic login sequence of described end side is stored according to self by described client and the last login time generate;
Authentication module 330, for according to automatic logging on authentication corresponding with described ID in described mapping table, and the last login time of the described client of local record, the automatic login sequence of described end side is verified;
Sending module 340, for after described authentication module is verified the automatic login sequence of described end side, sends to described client and logins successfully response, upgrade described the last login time to make described client and described server synchronization.
In concrete application scenarios, described authentication module 330 specifically for inquiring about corresponding automatic logging on authentication in described mapping table according to described ID, according to the automatic login sequence in the last login time generating network side of the automatic logging on authentication inquired and described client, and judge that whether the automatic login sequence of described network side is identical with the automatic login sequence of described end side;
If so, described authentication module 330 confirms to be verified.
In concrete application scenarios, described authentication module 330, specifically for resolving the automatic login sequence of described end side, obtains the automatic logging on authentication and the login time that generate the automatic login sequence of described end side; If described automatic logging on authentication is identical with automatic logging on authentication corresponding with described ID in described mapping table, and described login time differs with the last login time of the described client of local record and is no more than default interval threshold, described authentication module 330 confirms to be verified.
In concrete application scenarios, described in login successfully in response the last login time of the described client also carrying described network equipment local record, store as the last login time in order to make client.
In concrete application scenarios, described in login successfully in response and also carry synchronic command, be used to indicate described client and the moment logining successfully response described in receiving stored as the last login time.
In concrete application scenarios, described receiver module, also for before the automatic logging request receiving the transmission of described client, receive the initial registration request that described client sends, in described initial registration request, carry ID and the user authentication information of described client;
Described authentication module 330, also for carrying out certification to described user authentication information;
Described generation module 340, also at described authentication module to described user authentication information certification by the rear generation automatic logging on authentication corresponding with described ID, after described ID and described automatic logging on authentication are stored to described mapping table, described automatic logging on authentication is carried to login successfully in response and is back to described client, preserve described automatic logging on authentication to make described client and upgrade described the last login time with described server synchronization.
By applying above technical scheme, service end is based on the corresponding relation of the client id self stored and automatic logging on authentication, utilize the last login time and automatic logging on authentication to generate automatic login sequence to client to verify, and upgrade the last login time with client synchronization after being proved to be successful.Thus under the prerequisite of the client of compatible different platform version, avoid and be cracked by transmitting procedure and cause user authentication information or automatically log in the problem that mark is illegally accessed use, improve the fail safe of login further.
Through the above description of the embodiments, those skilled in the art can be well understood to the present invention can by hardware implementing, and the mode that also can add necessary general hardware platform by software realizes.Based on such understanding, technical scheme of the present invention can embody with the form of software product, it (can be CD-ROM that this software product can be stored in a non-volatile memory medium, USB flash disk, portable hard drive etc.) in, comprise some instructions and perform each method implementing described in scene of the present invention in order to make a computer equipment (can be personal computer, server, or the network equipment etc.).
It will be appreciated by those skilled in the art that accompanying drawing is a schematic diagram preferably implementing scene, the module in accompanying drawing or flow process might not be that enforcement the present invention is necessary.
It will be appreciated by those skilled in the art that the module in the device implemented in scene can carry out being distributed in the device of enforcement scene according to implementing scene description, also can carry out respective change and being arranged in the one or more devices being different from this enforcement scene.The module of above-mentioned enforcement scene can merge into a module, also can split into multiple submodule further.
The invention described above sequence number, just to describing, does not represent the quality implementing scene.
Be only several concrete enforcement scene of the present invention above, but the present invention is not limited thereto, the changes that any person skilled in the art can think of all should fall into protection scope of the present invention.

Claims (12)

1. a login method, is applied in the system comprising client and service end, it is characterized in that, be provided with the mark ID of client and the mapping table of automatic logging on authentication in described service end, the method also comprises:
Described service end receives the automatic logging request that described client sends, described automatic logging request carries mark ID and the automatic login sequence of end side of described client, and the automatic logging on authentication that the automatic login sequence of described end side is stored according to self by described client and the last login time generate;
Described service end is according to automatic logging on authentication corresponding with described ID in described mapping table, and the last login time of the described client of local record, verifies the automatic login sequence of described end side;
If be verified, described service end sends to described client and logins successfully response, upgrades described the last login time to make described client and described server synchronization.
2. the method for claim 1, it is characterized in that, described service end is according to automatic logging on authentication corresponding with described ID in described mapping table, and the last login time of the described client of local record, the automatic login sequence of described end side is verified, is specially:
Described service end inquires about corresponding automatic logging on authentication according to described ID in described mapping table;
Described service end is according to the automatic login sequence in the last login time generating network side of the automatic logging on authentication inquired and described client;
Described service end judges that whether the automatic login sequence of described network side is identical with the automatic login sequence of described end side;
If so, described service end confirms to be verified.
3. the method for claim 1, it is characterized in that, described service end is according to automatic logging on authentication corresponding with described ID in described mapping table, and the last login time of the described client of local record, the automatic login sequence of described end side is verified, is specially:
Described service end resolves the automatic login sequence of described end side, obtains the automatic logging on authentication and the login time that generate the automatic login sequence of described end side;
If described automatic logging on authentication is identical with automatic logging on authentication corresponding with described ID in described mapping table, and described login time differs with the last login time of the described client of local record and is no more than default interval threshold, described service end confirms to be verified.
4. the method as described in any one of claims 1 to 3, is characterized in that,
The described the last login time logining successfully in response the described client also carrying described service end local record, stores as the last login time in order to make client.
5. the method as described in any one of claim 1,3, is characterized in that,
Described logining successfully in response also carries synchronic command, is used to indicate described client and is stored as the last login time in the moment logining successfully response described in reception.
6. the method for claim 1, is characterized in that, before receiving the automatic logging request of described client transmission, also comprises in described service end:
Described service end receives the initial registration request that described client sends, and carries ID and the user authentication information of described client in described initial registration request;
Described service end carries out certification to described user authentication information;
If authentication success, described service end generates the automatic logging on authentication corresponding with described ID, and after described ID and described automatic logging on authentication are stored to described mapping table, described automatic logging on authentication is carried to login successfully in response and is back to described client, preserve described automatic logging on authentication to make described client and upgrade described the last login time with described server synchronization.
7. a network equipment, for be applied to as service end comprise client and service end system in, it is characterized in that, be provided with the mark ID of client and the mapping table of automatic logging on authentication, also comprise:
Receiver module, for receiving the automatic logging request that described client sends, described automatic logging request carries mark ID and the automatic login sequence of end side of described client, and the automatic logging on authentication that the automatic login sequence of described end side is stored according to self by described client and the last login time generate;
Authentication module, for according to automatic logging on authentication corresponding with described ID in described mapping table, and the last login time of the described client of local record, the automatic login sequence of described end side is verified;
Sending module, for after described authentication module is verified the automatic login sequence of described end side, sends to described client and logins successfully response, upgrade described the last login time to make described client and described server synchronization.
8. the network equipment as claimed in claim 7, is characterized in that, described authentication module specifically for:
In described mapping table, corresponding automatic logging on authentication is inquired about according to described ID, according to the automatic login sequence in the last login time generating network side of the automatic logging on authentication inquired and described client, and judge that whether the automatic login sequence of described network side is identical with the automatic login sequence of described end side;
If so, described authentication module confirms to be verified.
9. the network equipment as claimed in claim 7, is characterized in that, described authentication module specifically for:
Resolve the automatic login sequence of described end side, obtain the automatic logging on authentication and the login time that generate the automatic login sequence of described end side;
If described automatic logging on authentication is identical with automatic logging on authentication corresponding with described ID in described mapping table, and described login time differs with the last login time of the described client of local record and is no more than default interval threshold, described authentication module confirms to be verified.
10. the network equipment as described in any one of claim 7-9, it is characterized in that, the described the last login time logining successfully in response the described client also carrying described network equipment local record, stores as the last login time in order to make client.
11. network equipments as described in any one of claim 7,9, it is characterized in that, described logining successfully in response also carries synchronic command, is used to indicate described client and is stored as the last login time in the moment logining successfully response described in reception.
12. network equipments as claimed in claim 7, is characterized in that,
Described receiver module, also for before the automatic logging request receiving the transmission of described client, receives the initial registration request that described client sends, carries ID and the user authentication information of described client in described initial registration request;
Described authentication module, also for carrying out certification to described user authentication information;
Described generation module, also at described authentication module to described user authentication information certification by the rear generation automatic logging on authentication corresponding with described ID, after described ID and described automatic logging on authentication are stored to described mapping table, described automatic logging on authentication is carried to login successfully in response and is back to described client, preserve described automatic logging on authentication to make described client and upgrade described the last login time with described server synchronization.
CN201310689640.3A 2013-12-16 2013-12-16 A kind of login method and equipment Active CN104717187B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310689640.3A CN104717187B (en) 2013-12-16 2013-12-16 A kind of login method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310689640.3A CN104717187B (en) 2013-12-16 2013-12-16 A kind of login method and equipment

Publications (2)

Publication Number Publication Date
CN104717187A true CN104717187A (en) 2015-06-17
CN104717187B CN104717187B (en) 2018-11-23

Family

ID=53416158

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310689640.3A Active CN104717187B (en) 2013-12-16 2013-12-16 A kind of login method and equipment

Country Status (1)

Country Link
CN (1) CN104717187B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357205A (en) * 2015-11-17 2016-02-24 贵阳朗玛信息技术股份有限公司 Login method, access server and gatekeeper server
CN106611118A (en) * 2015-10-27 2017-05-03 北京国双科技有限公司 Login credential applying method and apparatus
CN108881130A (en) * 2017-05-16 2018-11-23 ***通信集团重庆有限公司 The method of controlling security and device of session control information
CN109711140A (en) * 2018-12-18 2019-05-03 平安科技(深圳)有限公司 Website logging state control method, device, computer equipment and storage medium
CN110753036A (en) * 2019-09-27 2020-02-04 苏州浪潮智能科技有限公司 Method and system for client quick authentication under CS framework

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101047504A (en) * 2006-03-29 2007-10-03 腾讯科技(深圳)有限公司 Network log-in authorization method and authorization system
CN101815291A (en) * 2010-03-22 2010-08-25 中兴通讯股份有限公司 Method and system for logging on client automatically
US20120079574A1 (en) * 2004-10-13 2012-03-29 International Business Machines Corporation Predictive Mechanism for Multi-Party Strengthening of Authentication Credentials with Non-Real Time Synchronization
CN102739686A (en) * 2012-07-05 2012-10-17 无锡中科泛在信息技术研发中心有限公司 Method for restricting users to login at multiple locations simultaneously
CN103139200A (en) * 2013-01-06 2013-06-05 深圳市元征科技股份有限公司 Single sign-on method of web service

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120079574A1 (en) * 2004-10-13 2012-03-29 International Business Machines Corporation Predictive Mechanism for Multi-Party Strengthening of Authentication Credentials with Non-Real Time Synchronization
CN101047504A (en) * 2006-03-29 2007-10-03 腾讯科技(深圳)有限公司 Network log-in authorization method and authorization system
CN101815291A (en) * 2010-03-22 2010-08-25 中兴通讯股份有限公司 Method and system for logging on client automatically
CN102739686A (en) * 2012-07-05 2012-10-17 无锡中科泛在信息技术研发中心有限公司 Method for restricting users to login at multiple locations simultaneously
CN103139200A (en) * 2013-01-06 2013-06-05 深圳市元征科技股份有限公司 Single sign-on method of web service

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106611118A (en) * 2015-10-27 2017-05-03 北京国双科技有限公司 Login credential applying method and apparatus
CN106611118B (en) * 2015-10-27 2020-05-12 北京国双科技有限公司 Method and device for applying login credentials
CN105357205A (en) * 2015-11-17 2016-02-24 贵阳朗玛信息技术股份有限公司 Login method, access server and gatekeeper server
CN105357205B (en) * 2015-11-17 2019-01-04 贵阳朗玛信息技术股份有限公司 A kind of login method, access server and gatekeeper's server
CN108881130A (en) * 2017-05-16 2018-11-23 ***通信集团重庆有限公司 The method of controlling security and device of session control information
CN109711140A (en) * 2018-12-18 2019-05-03 平安科技(深圳)有限公司 Website logging state control method, device, computer equipment and storage medium
CN110753036A (en) * 2019-09-27 2020-02-04 苏州浪潮智能科技有限公司 Method and system for client quick authentication under CS framework

Also Published As

Publication number Publication date
CN104717187B (en) 2018-11-23

Similar Documents

Publication Publication Date Title
US10402797B2 (en) Secured authentication and transaction authorization for mobile and internet-of-things devices
JP6856626B2 (en) Methods and equipment for multi-user cluster identity authentication
US8984295B2 (en) Secure access to electronic devices
US20180288021A1 (en) Systems and Methods for Smartkey Information Management
EP2657871B1 (en) Secure configuration of mobile application
US9088557B2 (en) Encryption key management program, data management system
US9419799B1 (en) System and method to provide secure credential
CN103607284B (en) Identity authentication method and equipment and server
US11943350B2 (en) Systems and methods for re-using cold storage keys
US9374360B2 (en) System and method for single-sign-on in virtual desktop infrastructure environment
CN103532966A (en) Device and method supporting USB-KEY-based SSO (single sign on) of virtual desktop
CN101321064A (en) Information system access control method and apparatus based on digital certificate technique
CN103297403A (en) Method and system for achieving dynamic password authentication
WO2014048749A1 (en) Inter-domain single sign-on
CN105516163A (en) Login method, terminal device and communication system
CN104717187A (en) Login method and device
CN107408185A (en) Output device, program, output system and output intent
CN104735065A (en) Data processing method, electronic device and server
CN112422500B (en) Cross-platform data transmission method and device, storage medium and electronic device
CN106533693B (en) Access method and device of railway vehicle monitoring and overhauling system
CN107872532B (en) Method and system for storing and downloading third-party cloud storage platform
CN102143131B (en) User logout method and authentication server
CN105516135A (en) Method and device used for account login
CN109120611B (en) User authentication method, apparatus, system and medium for address generation server
CN103812837A (en) Electronic certificate sending method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant