CN106612255A - A method, apparatus and system for system docking - Google Patents

A method, apparatus and system for system docking Download PDF

Info

Publication number
CN106612255A
CN106612255A CN201510696788.9A CN201510696788A CN106612255A CN 106612255 A CN106612255 A CN 106612255A CN 201510696788 A CN201510696788 A CN 201510696788A CN 106612255 A CN106612255 A CN 106612255A
Authority
CN
China
Prior art keywords
logging
authentication
user
user profile
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510696788.9A
Other languages
Chinese (zh)
Inventor
任志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gridsum Technology Co Ltd
Original Assignee
Beijing Gridsum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Gridsum Technology Co Ltd filed Critical Beijing Gridsum Technology Co Ltd
Priority to CN201510696788.9A priority Critical patent/CN106612255A/en
Publication of CN106612255A publication Critical patent/CN106612255A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/59Providing operational support to end devices by off-loading in the network or by emulation, e.g. when they are unavailable
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method, apparatus and system for system docking, belongs to the field of Internet technology and can solve a problem of low docking efficiency of systems in the prior art. The method of the invention mainly comprises the steps of receiving a login certificate request sent by a first system, wherein the login certificate request is used for obtaining a login certificate for logging in a second system; obtaining the user information for logging in the second system according to the login certificate request, wherein the user corresponding to the user information is the same as the user who has logged into the first system; sending a login request carrying the user information to the second system through a standard interface, and the standard interface is a communication interface that is pre-set for realizing the docking operation between the first system and the second system; and receiving a login certificate sent by the second system and sending the login certificate to the first system so that the first system accesses the second system through the login certificate. The invention is suitable for scenes realizing system docking through intermediate equipment.

Description

The method of system docking, apparatus and system
Technical field
The present invention relates to Internet technical field, more particularly to a kind of method of system docking, device and System.
Background technology
In actual applications, people are usually needed while carrying out daily work using multiple different systems Make.For example, during user accesses system A, discovery needs first to access the data in system B Or function could realize the subsequent access to system A.Now, user needs first login system B, Then it is conducted interviews, after access is finished, then the system A of opening carries out subsequent operation, and operation is compared It is loaded down with trivial details.Therefore, developer's user operation for convenience, employs docking technique, i.e. user and is logging in After system A, the data or function in system B can be directly accessed.However, carrying out system docking During, need both sides developer to be conferred, according to the Development characteristics of both sides' system, in system B A specific interface is developed in side, and then system A can be carried out by the specific interface to system B Access.Therefore, the exploitation of special interface needs to take a long time, less efficient, especially when system A When needing to be docked with multiple different types of systems simultaneously, need system A developer and other The developer of system is conferred respectively, develops the different special interfaces of correspondence different system, efficiency Can be lower.It follows that how to improve system docking efficiency is nowadays a great problem.
The content of the invention
In view of this, the present invention provides a kind of method of system docking, apparatus and system, can solve the problem that The low problem of system docking efficiency in prior art.
According to one aspect of the invention, there is provided a kind of method of system docking, methods described includes:
The logging on authentication request that the first system sends is received, the logging on authentication is asked for applying obtaining Log in the logging on authentication of second system;
Asked according to the logging on authentication, obtain the user profile for logging in the second system, its Described in the corresponding user of user profile it is identical with the user for logging in the first system;
The logging request for carrying the user profile, institute are sent to the second system by standard interface It is to set in advance for realizing the docking operation of the first system and the second system to state standard interface The communication interface put;
Receive the logging on authentication that the second system sends, and the logging on authentication is sent to into described the One system, so that the first system accesses the second system by the logging on authentication.
According to another aspect of the invention, there is provided a kind of device of system docking, described device includes:
Receiving unit, for receiving the logging on authentication request of the first system transmission, the logging on authentication please Ask and obtain the logging on authentication for logging in second system for application;
Acquiring unit, for being asked according to the logging on authentication, obtains for logging in the second system User profile, wherein the corresponding user of the user profile with log in the user of the first system It is identical;
Transmitting element, for sending to the second system by standard interface the acquiring unit is carried The logging request of the user profile for obtaining, the standard interface is for realizing the first system Docking operation with the second system and the communication interface that pre-sets;
The receiving unit, is additionally operable to receive the logging on authentication that the second system sends;
The transmitting element, is additionally operable to for the logging on authentication that the receiving unit is received to be sent to institute The first system is stated, so that the first system accesses the second system by the logging on authentication.
Method, the apparatus and system of the system docking provided by above-mentioned technical proposal, the present invention, energy Enough after the logging on authentication request for receiving the first system transmission, used according to the logging on authentication acquisition request In the user profile for logging in second system, then sent to second system by standard interface and carry the use The logging request of family information, and the logging on authentication of second system feedback is received, sending it to first is System, so that the first system directly accesses second system by the logging on authentication.Need with prior art The feature for combining both by developer is developed special interface and is compared so as to realize system docking, this Bright directly to develop standard interface in second system side according to preset standard, then intermediate equipment is by being somebody's turn to do Standard interface obtains logging on authentication, and the logging on authentication is sent to into the first system, so that first is System directly can access second system by logging on authentication, and whole docking operation need not take a significant amount of time out Special interface is sent out, so as to improve the efficiency of system docking.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the present invention's Technological means, and being practiced according to the content of specification, and in order to allow the above-mentioned of the present invention and Other objects, features and advantages can become apparent, below especially exemplified by the specific embodiment of the present invention.
Description of the drawings
By the detailed description for reading hereafter preferred embodiment, various other advantage and benefit for Those of ordinary skill in the art will be clear from understanding.Accompanying drawing is only used for illustrating the mesh of preferred embodiment , and it is not considered as limitation of the present invention.And in whole accompanying drawing, with identical with reference to symbol Number represent identical part.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of the method for system docking provided in an embodiment of the present invention;
Fig. 2 shows a kind of composition frame chart of the device of system docking provided in an embodiment of the present invention;
Fig. 3 shows the composition frame chart of the device of another kind of system docking provided in an embodiment of the present invention;
Fig. 4 shows a kind of system schematic of system docking provided in an embodiment of the present invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing in accompanying drawing The exemplary embodiment of the disclosure is shown, it being understood, however, that may be realized in various forms the disclosure And should not be limited by embodiments set forth here.On the contrary, there is provided these embodiments are able to more Thoroughly understand the disclosure, and can be by the complete technology for conveying to this area of the scope of the present disclosure Personnel.
A kind of method of system docking is embodiments provided, as shown in figure 1, the method includes:
101st, the logging on authentication request that the first system sends is received.
Wherein, logging on authentication asks to obtain the logging on authentication for logging in second system for application.Work as user After logging in the first system, it is desirable to the data or function in second system are accessed by the first system, then The connection with regard to accessing second system or button can be clicked in the first system interface, triggering first is Unite and send logging on authentication request to intermediate equipment, so that follow-up intermediate equipment is logged in second system application Voucher.
It should be noted that logging on authentication can be accessed directly in second system for identifying the first system Data, the content in logging on authentication request can include the ID of the user for logging in the first system And other information.
102nd, asked according to logging on authentication, obtain the user profile for logging in second system.
After intermediate equipment receives logging on authentication asks, can be used for according to the logging on authentication acquisition request The user profile of second system is logged in, is so that intermediate equipment logs in second according to the user profile application System.
It should be noted that the corresponding user of the user profile is identical with the user for logging in the first system, The user for wanting directly to access second system by the first system is that same user (or claims same People), but because the rule of each system user name registration may be different, institute is for logging in first The user profile (username and password) of system may not phase with the user profile for being used to log in second system Together.
103rd, the logging request for carrying user profile is sent to second system by standard interface.
Wherein, standard interface is for realizing that the first system sets in advance with the docking operation of second system The communication interface put, and the standard of the standard interface exploitation is provided by intermediate equipment.Realizing During system docking, the standard provided according to intermediate equipment is needed to develop bid in second system side Quasi- interface, so that intermediate equipment carries out data interaction by the standard interface and second system.
When the logging on authentication request for receiving the first system transmission, and obtained according to the logging on authentication request For after the user profile for logging in second system, intermediate equipment by the standard interface of second system side to Second system sends the logging request for carrying user profile, to log in second system.
In actual applications, the content of the standard that intermediate equipment is provided can be by for logging in the The user name of two system is obtaining logging on authentication, or by for logging in the user of second system Name and password are obtaining logging on authentication.Specifically, the content of the standard for being provided when intermediate equipment is logical Cross for logging in the user name of second system to obtain during logging on authentication, second system side can increase correspondence The interface routine of the standard, the such as interface routine are " api/authorization/loginUser={ user } "; The content of the standard provided when intermediate equipment is by for logging in the username and password of second system To obtain during logging on authentication, second system side can increase to should standard interface routine, the such as interface Program is " api/authorization/loginUser=user } &pwd={ password } ".
104th, the logging on authentication that second system sends is received, and logging on authentication is sent to into the first system, So that the first system accesses second system by logging on authentication.
After according to user profile Successful login second system, second system can send one to intermediate equipment Individual logging on authentication, intermediate equipment is received after the logging on authentication, the logging on authentication can be transmitted to into first System so that the first system can according to the logging on authentication directly access data in second system or Function, and result will be accessed feed back to user and check.
In actual applications, second system only can send a logging on authentication to intermediate equipment, also may be used To send the feedback information of a carrying logging on authentication to intermediate equipment.For example, second system is to centre Equipment send data can be:
From above-mentioned code, the second system that the first system application is logged in has logged on successfully, logs in Voucher is " .... ", and now, logging on authentication is transmitted to the first system by intermediate equipment, and the first system is just Data or function that logging on authentication is directly accessed in second system can be passed through.
It should be noted that intermediate equipment can be the equipment independently of the first system and second system, Can also be located in the first system, or in second system, be not limited thereto.
In actual applications, the first system can be made up of the first client and first server, and centre sets Standby to be made up of the intermediate server for being provided with middleware software, second system is made up of second server.When User after the client of terminal logs in first, by the number between the first client and first server Realize accessing the function of the first client according to interaction.When user wants in the operation interface of the first client Access the data of second server or during function, the operation interface of the first client can be passed through to first Server sends the request of data for accessing second server;First server receives this to be used to visit After asking the request of data of second server, logging on authentication request can be sent to intermediate server;Centre clothes Business device is received after the logging on authentication request, and logging on authentication request can be analyzed, and is therefrom used In the user profile for logging in second server, and by the standard interface of second server side to the second clothes Business device sends the logging request for carrying user profile;Second server obtains logging request, and checking is stepped on User profile in record request is after its user, to intermediate equipment logging on authentication to be sent;Intermediate equipment connects After receiving the logging on authentication, first server is forwarded it to;First server receives logging on authentication Afterwards, second server can directly be accessed by the logging on authentication, and accessing result, to feed back to first objective Family end is checked for user.
It should be noted that implementing scene for above-mentioned, middleware software is except may be located at independence Outside the intermediate server of first server and second server, may be located on first server or In second server, it is not limited thereto.
The method of system docking provided in an embodiment of the present invention, can receive the first system transmission After logging on authentication request, it is used to log in the user profile of second system according to the logging on authentication acquisition request, Then sent to second system by standard interface and carry the logging request of the user profile, and receive the The logging on authentication of two system feedback, sends it to the first system, so that the first system is by the login Voucher directly accesses second system.Open with the feature for needing to be combined both by developer in prior art Send special interface and compare so as to realize system docking, the present invention is directly second according to preset standard Standard interface is developed in system side, and then intermediate equipment obtains logging on authentication by the standard interface, and will The logging on authentication is sent to the first system, so that the first system directly can access the by logging on authentication Two system, whole docking operation need not take a significant amount of time exploitation special interface, so as to improve system The efficiency of docking.
Further, refer in the above-described embodiments, when the logging on authentication for obtaining the first system transmission please After asking, need to be analyzed logging on authentication request, therefrom obtain the login for logging in second system Voucher, describes in detail below to the specific implementation of acquisition logging on authentication:
A1, from logging on authentication request extract the ID of the user for logging in the first system.
Specifically, ID can be the Real Name of user, or be for logging in first The user profile (username and password) of system, or other are used to identify the information of user identity.
It should be noted that when Real Name of the ID for user, the first system is to centre Equipment is sent before logging on authentication request, can be in the local log-on message for searching user, from log-on message The middle Real Name for obtaining user, is then sent to the logging on authentication request for carrying user's Real Name Intermediate equipment, so that intermediate equipment carries out subsequent operation.
A2, obtain user profile mapping table from local.
Before system docking is carried out, keeper can make a user profile mapping table in intermediate equipment side, To record the corresponding relation of the user profile that same user registers in different system, and the user ID.
A3, search from user profile mapping table it is corresponding with ID for logging in second system User profile.
After ID and user profile mapping table is obtained, intermediate equipment can map in user profile The user profile for logging in second system corresponding with the ID is searched in table, will pass through this User profile application logs in second system.
It is exemplary, when ID is for logging in the user profile of the first system (user name and close Code) when, user profile mapping table can be following form:
Table 1
If the ID for obtaining is " user name:Lisi, password Lisi666 ", then can be with table 1 User profile that the user registered in second system side is found as " user name:Lisizuibang, password: Lisizuibang999”。
And for example, when Real Name of the ID for user, user profile mapping table can be as follows Form:
Table 2
If the ID for obtaining is " king five ", the user can be found in table 2 second The user profile that system side is registered is as " user name:Wangwuwangwu, password:Wangwu321”.
Further, in actual applications, if second system is definitely believed the request that intermediate equipment sends Appoint, then intermediate equipment can send carrying for logging in stepping on for the user name of second system to second system Record request, i.e. intermediate equipment ask the user for logging in second system for obtaining to believe according to logging on authentication Breath can be only user name.
However, there is certain risk, i.e. intermediate equipment only according to user name login second system may Due to by viral attack actively to (not receiving the logging on authentication request of the first system transmission) the Two system sends the logging request for logging in certain account, so that second system logs in the account, and then The private information under the account is caused to reveal.Therefore, in order to ensure second system under account safety, Intermediate equipment needs to send carrying for logging in stepping on for the username and password of second system to second system Record request, i.e. intermediate equipment ask the user for logging in second system for obtaining to believe according to logging on authentication Breath can be username and password.
Further, in order to prevent the user profile for logging in second system from transmitting to second system During it is stolen and cause user profile to be revealed, user profile can be encrypted.When Two system is received after the logging request for carrying user profile, and process is first decrypted to user profile, Carry out again judging whether the user profile is registered user profile, if so, then can use user's letter Breath logs in second system, and sends logging on authentication to intermediate equipment, so that intermediate equipment is by logging on authentication It is transmitted to the first system so that the first system can directly access second system by logging on authentication.
Further, intermediate equipment side is provided with general-purpose interface, and any kind of system all can directly lead to Cross general-purpose interface access the intermediate equipment, i.e. intermediate equipment can by general-purpose interface receive the first system send out The logging on authentication request sent, can receive the logging on authentication that second system sends by general-purpose interface.
Specifically, the parameter that general-purpose interface is related to includes:Registration method, system (the first system) User, the application title (or IP address) of method, system, applied party's system (second system) The result that title (or IP address) and request are returned (such as logging on authentication).
Further, it can be seen from above-described embodiment, when user wants directly to be accessed by second system During the data of the first system, need to increase a standard interface in the first system side, then intermediate equipment By the standard interface to the first system application logging on authentication, intermediate equipment is obtained after logging on authentication, will Logging on authentication feeds back to second system, and now second system can directly access first be by logging on authentication The data or function of system.
Due to the present invention's it is critical that intermediate equipment is logged in by standard interface to second system application Voucher, as long as so the standard that second system is provided according to intermediate equipment side increases standard interface, first System just can to apply for logging on authentication in the way of with its function that achieves a butt joint, therefore either first be System achieves a butt joint with a second system, or achieves a butt joint with multiple second systems, and docking efficiency is all Comparison is high.
Further, according to said method embodiment, an alternative embodiment of the invention additionally provides one The device of system docking is planted, as shown in Fig. 2 the device includes:Receiving unit 21, acquiring unit 22 With transmitting element 23.Wherein,
Receiving unit 21, for receiving the logging on authentication request of the first system transmission, logging on authentication request The logging on authentication for logging in second system is obtained for application;
Acquiring unit 22, for the logging on authentication request received according to receiving unit 21, obtains for stepping on The user profile of record second system, the wherein corresponding user of user profile and the use for logging in the first system Family is identical;
Transmitting element 23, obtains for sending carrying acquiring unit 22 to second system by standard interface User profile logging request, standard interface is for realizing docking for the first system and second system The communication interface for operating and pre-setting;
Receiving unit 21, is additionally operable to receive the logging on authentication that second system sends;
Transmitting element 23, is additionally operable to for the logging on authentication that receiving unit 21 is received to be sent to the first system, So that the first system accesses second system by logging on authentication.
The device of system docking provided in an embodiment of the present invention, can receive the first system transmission After logging on authentication request, it is used to log in the user profile of second system according to the logging on authentication acquisition request, Then sent to second system by standard interface and carry the logging request of the user profile, and receive the The logging on authentication of two system feedback, sends it to the first system, so that the first system is by the login Voucher directly accesses second system.Open with the feature for needing to be combined both by developer in prior art Send special interface and compare so as to realize system docking, the present invention is directly second according to preset standard Standard interface is developed in system side, and then intermediate equipment obtains logging on authentication by the standard interface, and will The logging on authentication is sent to the first system, so that the first system directly can access the by logging on authentication Two system, whole docking operation need not take a significant amount of time exploitation special interface, so as to improve system The efficiency of docking.
Further, as shown in figure 3, acquiring unit 22, including:
Extraction module 221, for extracting the use of the user for having logged in the first system in asking from logging on authentication Family identifies;
Acquisition module 222, for obtaining user profile mapping table from local, user profile mapping table is used for Record the corresponding relation of the user profile that same user registers in different system, and the user of the user Mark;
Searching modul 223, for searching and carrying in the user profile mapping table that obtains from acquisition module 222 The corresponding user profile for logging in second system of ID that delivery block 221 is extracted.
Further, acquiring unit 22, for obtaining the user name for logging in second system.
Further, acquiring unit 22, for obtaining the username and password for logging in second system.
Further, receiving unit 21, for receiving the login that the first system sends by general-purpose interface Request for credentials.
Further, according to said apparatus embodiment, an alternative embodiment of the invention additionally provides one The system for planting system docking, as shown in figure 4, the system includes the first system 31, the and of second system 33 Intermediate equipment 32, wherein, intermediate equipment 32 includes device as shown in Figure 2 or Figure 3;
The first system 31, for sending logging on authentication request to intermediate equipment 32, logging on authentication request is used The logging on authentication for logging in second system 33 is obtained in application;
The first system 31, is additionally operable to receive the logging on authentication that intermediate equipment 32 sends, will pass through login Voucher accesses second system 33;
Second system 33, the carrying for receiving the transmission of intermediate equipment 32 is used to log in second system 33 The logging request of user profile;
Second system 33, is additionally operable to send logging on authentication to intermediate equipment 32.
The system of system docking provided in an embodiment of the present invention, can receive the first system transmission After logging on authentication request, it is used to log in the user profile of second system according to the logging on authentication acquisition request, Then sent to second system by standard interface and carry the logging request of the user profile, and receive the The logging on authentication of two system feedback, sends it to the first system, so that the first system is by the login Voucher directly accesses second system.Open with the feature for needing to be combined both by developer in prior art Send special interface and compare so as to realize system docking, the present invention is directly second according to preset standard Standard interface is developed in system side, and then intermediate equipment obtains logging on authentication by the standard interface, and will The logging on authentication is sent to the first system, so that the first system directly can access the by logging on authentication Two system, whole docking operation need not take a significant amount of time exploitation special interface, so as to improve system The efficiency of docking.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have in certain embodiment The part being described in detail, may refer to the associated description of other embodiment.
It is understood that said method and the correlated characteristic in device can be referred to mutually.In addition, " first ", " second " in above-described embodiment etc. is, for distinguishing each embodiment, and not represent each enforcement The quality of example.
Those skilled in the art can be understood that, for convenience and simplicity of description, above-mentioned The specific work process of the system, apparatus, and unit of description, in may be referred to preceding method embodiment Corresponding process, will not be described here.
Provided herein algorithm and show not with any certain computer, virtual system or miscellaneous equipment It is intrinsic related.Various general-purpose systems can also be used together based on teaching in this.According to above Description, the structure constructed required by this kind of system is obvious.Additionally, the present invention is also not for Any certain programmed language.It is understood that, it is possible to use various programming languages realize described here The content of invention, and the description done to language-specific above is to disclose the optimal reality of the present invention Apply mode.
In specification mentioned herein, a large amount of details are illustrated.It is to be appreciated, however, that Embodiments of the invention can be put into practice in the case of without these details.In some instances, Known method, structure and technology are not been shown in detail, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand in each inventive aspect It is individual or multiple, in above to the description of the exemplary embodiment of the present invention, each feature of the invention Sometimes in being grouped together into single embodiment, figure or descriptions thereof.However, should be by The method of the disclosure is construed to reflect following intention:I.e. the present invention for required protection requires ratio at each The more features of feature being expressly recited in claim.More precisely, as following right will As asking book to reflect, inventive aspect is all spies less than single embodiment disclosed above Levy.Therefore, it then follows thus claims of specific embodiment are expressly incorporated in the specific embodiment party Separate embodiments of the formula, wherein each claim as the present invention itself.
Those skilled in the art are appreciated that can be carried out to the module in the equipment in embodiment Adaptively change and they are arranged in one or more equipment different from the embodiment. Module or unit or component in embodiment can be combined into a module or unit or component, and In addition multiple submodule or subelement or sub-component can be divided into.Except such feature and/or Outside at least some in process or unit is excluded each other, can be using any combinations to this explanation All features disclosed in book (including adjoint claim, summary and accompanying drawing) and such as the displosure Any method or all processes or unit of equipment be combined.Unless expressly stated otherwise, originally Each feature disclosed in specification (including adjoint claim, summary and accompanying drawing) can be by carrying Replace for the alternative features of identical, equivalent or similar purpose.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include Some included features rather than further feature in other embodiments, but the feature of different embodiments Combination mean to be within the scope of the present invention and formed different embodiments.For example, under In the claims in face, embodiment required for protection one of arbitrarily can be in any combination Mode is using.
The all parts embodiment of the present invention can be realized with hardware, or with one or more The software module run on reason device is realized, or is realized with combinations thereof.Those skilled in the art It should be appreciated that can be realized using microprocessor or digital signal processor (DSP) in practice The condition detection method of accompanied electronic anti-theft device according to embodiments of the present invention, equipment, server and The some or all functions of some or all parts in system equipment.The present invention can also be realized It is some or all equipment or program of device (example for performing method as described herein Such as, computer program and computer program).Such program for realizing the present invention can be stored in On computer-readable medium, or there can be the form of one or more signal.Such signal Can download from internet website and obtain, or provide on carrier signal, or with any other Form is provided.
It should be noted that above-described embodiment the present invention will be described rather than the present invention is limited Make, and those skilled in the art can design without departing from the scope of the appended claims Alternative embodiment.In the claims, any reference symbol between bracket should not be configured to Limitations on claims.Word "comprising" does not exclude the presence of element not listed in the claims or step Suddenly.Word "a" or "an" before element does not exclude the presence of multiple such elements.The present invention Can come real by means of the hardware for including some different elements and by means of properly programmed computer It is existing.If in the unit claim for listing equipment for drying, several in these devices can be logical Cross same hardware branch to embody.The use of word first, second, and third is not indicated that Any order.These words can be construed to title.

Claims (10)

1. a kind of method of system docking, it is characterised in that methods described includes:
The logging on authentication request that the first system sends is received, the logging on authentication is asked for applying obtaining Log in the logging on authentication of second system;
Asked according to the logging on authentication, obtain the user profile for logging in the second system, its Described in the corresponding user of user profile it is identical with the user for logging in the first system;
The logging request for carrying the user profile, institute are sent to the second system by standard interface It is to set in advance for realizing the docking operation of the first system and the second system to state standard interface The communication interface put;
Receive the logging on authentication that the second system sends, and the logging on authentication is sent to into described the One system, so that the first system accesses the second system by the logging on authentication.
2. method according to claim 1, it is characterised in that described according to the logging on authentication Request, obtains the user profile for logging in the second system, including:
The ID of the user for logging in the first system is extracted from logging on authentication request;
User profile mapping table is obtained from local, the user profile mapping table is used to record same user The corresponding relation of the user profile registered in different system, and the ID of the same user;
Search from the user profile mapping table corresponding with the ID for logging in described The user profile of two system.
3. method according to claim 1 and 2, it is characterised in that the acquisition is used to log in The user profile of the second system, including:
Obtain the user name for logging in the second system.
4. method according to claim 1 and 2, it is characterised in that the acquisition is used to log in The user profile of the second system, including:
Obtain the username and password for logging in the second system.
5. method according to claim 1, it is characterised in that the reception the first system sends Logging on authentication request, including:
The logging on authentication request that the first system sends is received by general-purpose interface.
6. a kind of device of system docking, it is characterised in that described device includes:
Receiving unit, for receiving the logging on authentication request of the first system transmission, the logging on authentication please Ask and obtain the logging on authentication for logging in second system for application;
Acquiring unit, for the logging on authentication request received according to the receiving unit, obtains and uses In the user profile for logging in the second system, wherein the corresponding user of the user profile with log in The user of the first system is identical;
Transmitting element, for sending to the second system by standard interface the acquiring unit is carried The logging request of the user profile for obtaining, the standard interface is for realizing the first system Docking operation with the second system and the communication interface that pre-sets;
The receiving unit, is additionally operable to receive the logging on authentication that the second system sends;
The transmitting element, is additionally operable to for the logging on authentication that the receiving unit is received to be sent to institute The first system is stated, so that the first system accesses the second system by the logging on authentication.
7. device according to claim 6, it is characterised in that the acquiring unit, including:
Extraction module, for extracting the use for logging in the first system from logging on authentication request The ID at family;
Acquisition module, for obtaining user profile mapping table from local, the user profile mapping table is used In the corresponding relation for recording the user profile that same user registers in different system, and the same use The ID at family;
Searching modul, for search in the user profile mapping table that obtains from the acquisition module with The corresponding user for logging in the second system of the ID that the extraction module is extracted believes Breath.
8. the device according to claim 6 or 7, it is characterised in that the acquiring unit, uses It is used to log in the user name of the second system in acquisition.
9. the device according to claim 6 or 7, it is characterised in that the acquiring unit, also For obtaining the username and password for logging in the second system.
10. a kind of system of system docking, it is characterised in that the system include the first system, the Two system and intermediate equipment, wherein, the intermediate equipment is included such as any one of claim 6 to 9 Described device;
The first system, for the intermediate equipment send logging on authentication request, it is described log in Card request obtains the logging on authentication for logging in the second system for application;
The first system, is additionally operable to receive the logging on authentication that the intermediate equipment sends, will pass through The logging on authentication accesses the second system;
The second system, is used to log in described second for receiving the carrying that the intermediate equipment sends The logging request of system user information;
The second system, is additionally operable to send the logging on authentication to the intermediate equipment.
CN201510696788.9A 2015-10-23 2015-10-23 A method, apparatus and system for system docking Pending CN106612255A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510696788.9A CN106612255A (en) 2015-10-23 2015-10-23 A method, apparatus and system for system docking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510696788.9A CN106612255A (en) 2015-10-23 2015-10-23 A method, apparatus and system for system docking

Publications (1)

Publication Number Publication Date
CN106612255A true CN106612255A (en) 2017-05-03

Family

ID=58613089

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510696788.9A Pending CN106612255A (en) 2015-10-23 2015-10-23 A method, apparatus and system for system docking

Country Status (1)

Country Link
CN (1) CN106612255A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114697109A (en) * 2022-03-30 2022-07-01 中国银行股份有限公司 Login information processing method, first system, terminal and second system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102111410A (en) * 2011-01-13 2011-06-29 中国科学院软件研究所 Agent-based single sign on (SSO) method and system
CN102868702A (en) * 2012-09-28 2013-01-09 用友软件股份有限公司 System login device and system login method
CN103053132A (en) * 2012-07-25 2013-04-17 华为技术有限公司 User access business system or network method, system and device
CN103560885A (en) * 2013-11-01 2014-02-05 金蝶软件(中国)有限公司 Method and system for authenticating domain agency
CN104396290A (en) * 2012-07-02 2015-03-04 Sk普兰尼特有限公司 Single certificate service system and operational method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102111410A (en) * 2011-01-13 2011-06-29 中国科学院软件研究所 Agent-based single sign on (SSO) method and system
CN104396290A (en) * 2012-07-02 2015-03-04 Sk普兰尼特有限公司 Single certificate service system and operational method thereof
CN103053132A (en) * 2012-07-25 2013-04-17 华为技术有限公司 User access business system or network method, system and device
CN102868702A (en) * 2012-09-28 2013-01-09 用友软件股份有限公司 System login device and system login method
CN103560885A (en) * 2013-11-01 2014-02-05 金蝶软件(中国)有限公司 Method and system for authenticating domain agency

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114697109A (en) * 2022-03-30 2022-07-01 中国银行股份有限公司 Login information processing method, first system, terminal and second system

Similar Documents

Publication Publication Date Title
US8281381B2 (en) Techniques for environment single sign on
CN105007280B (en) A kind of application login method and device
US9600679B2 (en) Techniques for resource operation based on usage, sharing, and recommendations with modular authentication
CA2570045C (en) Network security and fraud detection system and method
US9525684B1 (en) Device-specific tokens for authentication
EP3092775B1 (en) Method and system for determining whether a terminal logging into a website is a mobile terminal
CN105141605B (en) Session method, Website server and browser
US20150256514A1 (en) Automatic detection of authentication methods by a gateway
US20110154439A1 (en) Secure application network
US20100107240A1 (en) Network location determination for direct access networks
US20070220605A1 (en) Identifying unauthorized access to a network resource
US20070244989A1 (en) Remote Automated Volume Mounting
US20130074164A1 (en) Method and system of securing accounts
USRE47533E1 (en) Method and system of securing accounts
CN105323253A (en) Identity verification method and device
US20100306833A1 (en) Autonomous intelligent user identity manager with context recognition capabilities
US9059987B1 (en) Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network
CN106685949A (en) Container access method, container access device and container access system
US20090138950A1 (en) Two-factor anti-phishing authentication systems and methods
US7895644B1 (en) Method and apparatus for accessing computers in a distributed computing environment
CN108259457A (en) A kind of WEB authentication methods and device
CN105337739B (en) Safe login method, device, server and terminal
CN105791249A (en) Third-party application processing method, device and system
CN108009439A (en) The method, apparatus and system of resource request
US10250778B2 (en) Distributed smart card reader for multifunction printer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100083 No. 401, 4th Floor, Haitai Building, 229 North Fourth Ring Road, Haidian District, Beijing

Applicant after: Beijing Guoshuang Technology Co.,Ltd.

Address before: 100086 Cuigong Hotel, 76 Zhichun Road, Shuangyushu District, Haidian District, Beijing

Applicant before: Beijing Guoshuang Technology Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170503