CN106612255A - A method, apparatus and system for system docking - Google Patents
A method, apparatus and system for system docking Download PDFInfo
- Publication number
- CN106612255A CN106612255A CN201510696788.9A CN201510696788A CN106612255A CN 106612255 A CN106612255 A CN 106612255A CN 201510696788 A CN201510696788 A CN 201510696788A CN 106612255 A CN106612255 A CN 106612255A
- Authority
- CN
- China
- Prior art keywords
- logging
- authentication
- user
- user profile
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/08—Protocols specially adapted for terminal emulation, e.g. Telnet
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/59—Providing operational support to end devices by off-loading in the network or by emulation, e.g. when they are unavailable
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/60—Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a method, apparatus and system for system docking, belongs to the field of Internet technology and can solve a problem of low docking efficiency of systems in the prior art. The method of the invention mainly comprises the steps of receiving a login certificate request sent by a first system, wherein the login certificate request is used for obtaining a login certificate for logging in a second system; obtaining the user information for logging in the second system according to the login certificate request, wherein the user corresponding to the user information is the same as the user who has logged into the first system; sending a login request carrying the user information to the second system through a standard interface, and the standard interface is a communication interface that is pre-set for realizing the docking operation between the first system and the second system; and receiving a login certificate sent by the second system and sending the login certificate to the first system so that the first system accesses the second system through the login certificate. The invention is suitable for scenes realizing system docking through intermediate equipment.
Description
Technical field
The present invention relates to Internet technical field, more particularly to a kind of method of system docking, device and
System.
Background technology
In actual applications, people are usually needed while carrying out daily work using multiple different systems
Make.For example, during user accesses system A, discovery needs first to access the data in system B
Or function could realize the subsequent access to system A.Now, user needs first login system B,
Then it is conducted interviews, after access is finished, then the system A of opening carries out subsequent operation, and operation is compared
It is loaded down with trivial details.Therefore, developer's user operation for convenience, employs docking technique, i.e. user and is logging in
After system A, the data or function in system B can be directly accessed.However, carrying out system docking
During, need both sides developer to be conferred, according to the Development characteristics of both sides' system, in system B
A specific interface is developed in side, and then system A can be carried out by the specific interface to system B
Access.Therefore, the exploitation of special interface needs to take a long time, less efficient, especially when system A
When needing to be docked with multiple different types of systems simultaneously, need system A developer and other
The developer of system is conferred respectively, develops the different special interfaces of correspondence different system, efficiency
Can be lower.It follows that how to improve system docking efficiency is nowadays a great problem.
The content of the invention
In view of this, the present invention provides a kind of method of system docking, apparatus and system, can solve the problem that
The low problem of system docking efficiency in prior art.
According to one aspect of the invention, there is provided a kind of method of system docking, methods described includes:
The logging on authentication request that the first system sends is received, the logging on authentication is asked for applying obtaining
Log in the logging on authentication of second system;
Asked according to the logging on authentication, obtain the user profile for logging in the second system, its
Described in the corresponding user of user profile it is identical with the user for logging in the first system;
The logging request for carrying the user profile, institute are sent to the second system by standard interface
It is to set in advance for realizing the docking operation of the first system and the second system to state standard interface
The communication interface put;
Receive the logging on authentication that the second system sends, and the logging on authentication is sent to into described the
One system, so that the first system accesses the second system by the logging on authentication.
According to another aspect of the invention, there is provided a kind of device of system docking, described device includes:
Receiving unit, for receiving the logging on authentication request of the first system transmission, the logging on authentication please
Ask and obtain the logging on authentication for logging in second system for application;
Acquiring unit, for being asked according to the logging on authentication, obtains for logging in the second system
User profile, wherein the corresponding user of the user profile with log in the user of the first system
It is identical;
Transmitting element, for sending to the second system by standard interface the acquiring unit is carried
The logging request of the user profile for obtaining, the standard interface is for realizing the first system
Docking operation with the second system and the communication interface that pre-sets;
The receiving unit, is additionally operable to receive the logging on authentication that the second system sends;
The transmitting element, is additionally operable to for the logging on authentication that the receiving unit is received to be sent to institute
The first system is stated, so that the first system accesses the second system by the logging on authentication.
Method, the apparatus and system of the system docking provided by above-mentioned technical proposal, the present invention, energy
Enough after the logging on authentication request for receiving the first system transmission, used according to the logging on authentication acquisition request
In the user profile for logging in second system, then sent to second system by standard interface and carry the use
The logging request of family information, and the logging on authentication of second system feedback is received, sending it to first is
System, so that the first system directly accesses second system by the logging on authentication.Need with prior art
The feature for combining both by developer is developed special interface and is compared so as to realize system docking, this
Bright directly to develop standard interface in second system side according to preset standard, then intermediate equipment is by being somebody's turn to do
Standard interface obtains logging on authentication, and the logging on authentication is sent to into the first system, so that first is
System directly can access second system by logging on authentication, and whole docking operation need not take a significant amount of time out
Special interface is sent out, so as to improve the efficiency of system docking.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the present invention's
Technological means, and being practiced according to the content of specification, and in order to allow the above-mentioned of the present invention and
Other objects, features and advantages can become apparent, below especially exemplified by the specific embodiment of the present invention.
Description of the drawings
By the detailed description for reading hereafter preferred embodiment, various other advantage and benefit for
Those of ordinary skill in the art will be clear from understanding.Accompanying drawing is only used for illustrating the mesh of preferred embodiment
, and it is not considered as limitation of the present invention.And in whole accompanying drawing, with identical with reference to symbol
Number represent identical part.In the accompanying drawings:
Fig. 1 shows a kind of flow chart of the method for system docking provided in an embodiment of the present invention;
Fig. 2 shows a kind of composition frame chart of the device of system docking provided in an embodiment of the present invention;
Fig. 3 shows the composition frame chart of the device of another kind of system docking provided in an embodiment of the present invention;
Fig. 4 shows a kind of system schematic of system docking provided in an embodiment of the present invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing in accompanying drawing
The exemplary embodiment of the disclosure is shown, it being understood, however, that may be realized in various forms the disclosure
And should not be limited by embodiments set forth here.On the contrary, there is provided these embodiments are able to more
Thoroughly understand the disclosure, and can be by the complete technology for conveying to this area of the scope of the present disclosure
Personnel.
A kind of method of system docking is embodiments provided, as shown in figure 1, the method includes:
101st, the logging on authentication request that the first system sends is received.
Wherein, logging on authentication asks to obtain the logging on authentication for logging in second system for application.Work as user
After logging in the first system, it is desirable to the data or function in second system are accessed by the first system, then
The connection with regard to accessing second system or button can be clicked in the first system interface, triggering first is
Unite and send logging on authentication request to intermediate equipment, so that follow-up intermediate equipment is logged in second system application
Voucher.
It should be noted that logging on authentication can be accessed directly in second system for identifying the first system
Data, the content in logging on authentication request can include the ID of the user for logging in the first system
And other information.
102nd, asked according to logging on authentication, obtain the user profile for logging in second system.
After intermediate equipment receives logging on authentication asks, can be used for according to the logging on authentication acquisition request
The user profile of second system is logged in, is so that intermediate equipment logs in second according to the user profile application
System.
It should be noted that the corresponding user of the user profile is identical with the user for logging in the first system,
The user for wanting directly to access second system by the first system is that same user (or claims same
People), but because the rule of each system user name registration may be different, institute is for logging in first
The user profile (username and password) of system may not phase with the user profile for being used to log in second system
Together.
103rd, the logging request for carrying user profile is sent to second system by standard interface.
Wherein, standard interface is for realizing that the first system sets in advance with the docking operation of second system
The communication interface put, and the standard of the standard interface exploitation is provided by intermediate equipment.Realizing
During system docking, the standard provided according to intermediate equipment is needed to develop bid in second system side
Quasi- interface, so that intermediate equipment carries out data interaction by the standard interface and second system.
When the logging on authentication request for receiving the first system transmission, and obtained according to the logging on authentication request
For after the user profile for logging in second system, intermediate equipment by the standard interface of second system side to
Second system sends the logging request for carrying user profile, to log in second system.
In actual applications, the content of the standard that intermediate equipment is provided can be by for logging in the
The user name of two system is obtaining logging on authentication, or by for logging in the user of second system
Name and password are obtaining logging on authentication.Specifically, the content of the standard for being provided when intermediate equipment is logical
Cross for logging in the user name of second system to obtain during logging on authentication, second system side can increase correspondence
The interface routine of the standard, the such as interface routine are " api/authorization/loginUser={ user } ";
The content of the standard provided when intermediate equipment is by for logging in the username and password of second system
To obtain during logging on authentication, second system side can increase to should standard interface routine, the such as interface
Program is " api/authorization/loginUser=user } &pwd={ password } ".
104th, the logging on authentication that second system sends is received, and logging on authentication is sent to into the first system,
So that the first system accesses second system by logging on authentication.
After according to user profile Successful login second system, second system can send one to intermediate equipment
Individual logging on authentication, intermediate equipment is received after the logging on authentication, the logging on authentication can be transmitted to into first
System so that the first system can according to the logging on authentication directly access data in second system or
Function, and result will be accessed feed back to user and check.
In actual applications, second system only can send a logging on authentication to intermediate equipment, also may be used
To send the feedback information of a carrying logging on authentication to intermediate equipment.For example, second system is to centre
Equipment send data can be:
From above-mentioned code, the second system that the first system application is logged in has logged on successfully, logs in
Voucher is " .... ", and now, logging on authentication is transmitted to the first system by intermediate equipment, and the first system is just
Data or function that logging on authentication is directly accessed in second system can be passed through.
It should be noted that intermediate equipment can be the equipment independently of the first system and second system,
Can also be located in the first system, or in second system, be not limited thereto.
In actual applications, the first system can be made up of the first client and first server, and centre sets
Standby to be made up of the intermediate server for being provided with middleware software, second system is made up of second server.When
User after the client of terminal logs in first, by the number between the first client and first server
Realize accessing the function of the first client according to interaction.When user wants in the operation interface of the first client
Access the data of second server or during function, the operation interface of the first client can be passed through to first
Server sends the request of data for accessing second server;First server receives this to be used to visit
After asking the request of data of second server, logging on authentication request can be sent to intermediate server;Centre clothes
Business device is received after the logging on authentication request, and logging on authentication request can be analyzed, and is therefrom used
In the user profile for logging in second server, and by the standard interface of second server side to the second clothes
Business device sends the logging request for carrying user profile;Second server obtains logging request, and checking is stepped on
User profile in record request is after its user, to intermediate equipment logging on authentication to be sent;Intermediate equipment connects
After receiving the logging on authentication, first server is forwarded it to;First server receives logging on authentication
Afterwards, second server can directly be accessed by the logging on authentication, and accessing result, to feed back to first objective
Family end is checked for user.
It should be noted that implementing scene for above-mentioned, middleware software is except may be located at independence
Outside the intermediate server of first server and second server, may be located on first server or
In second server, it is not limited thereto.
The method of system docking provided in an embodiment of the present invention, can receive the first system transmission
After logging on authentication request, it is used to log in the user profile of second system according to the logging on authentication acquisition request,
Then sent to second system by standard interface and carry the logging request of the user profile, and receive the
The logging on authentication of two system feedback, sends it to the first system, so that the first system is by the login
Voucher directly accesses second system.Open with the feature for needing to be combined both by developer in prior art
Send special interface and compare so as to realize system docking, the present invention is directly second according to preset standard
Standard interface is developed in system side, and then intermediate equipment obtains logging on authentication by the standard interface, and will
The logging on authentication is sent to the first system, so that the first system directly can access the by logging on authentication
Two system, whole docking operation need not take a significant amount of time exploitation special interface, so as to improve system
The efficiency of docking.
Further, refer in the above-described embodiments, when the logging on authentication for obtaining the first system transmission please
After asking, need to be analyzed logging on authentication request, therefrom obtain the login for logging in second system
Voucher, describes in detail below to the specific implementation of acquisition logging on authentication:
A1, from logging on authentication request extract the ID of the user for logging in the first system.
Specifically, ID can be the Real Name of user, or be for logging in first
The user profile (username and password) of system, or other are used to identify the information of user identity.
It should be noted that when Real Name of the ID for user, the first system is to centre
Equipment is sent before logging on authentication request, can be in the local log-on message for searching user, from log-on message
The middle Real Name for obtaining user, is then sent to the logging on authentication request for carrying user's Real Name
Intermediate equipment, so that intermediate equipment carries out subsequent operation.
A2, obtain user profile mapping table from local.
Before system docking is carried out, keeper can make a user profile mapping table in intermediate equipment side,
To record the corresponding relation of the user profile that same user registers in different system, and the user
ID.
A3, search from user profile mapping table it is corresponding with ID for logging in second system
User profile.
After ID and user profile mapping table is obtained, intermediate equipment can map in user profile
The user profile for logging in second system corresponding with the ID is searched in table, will pass through this
User profile application logs in second system.
It is exemplary, when ID is for logging in the user profile of the first system (user name and close
Code) when, user profile mapping table can be following form:
Table 1
If the ID for obtaining is " user name:Lisi, password Lisi666 ", then can be with table 1
User profile that the user registered in second system side is found as " user name:Lisizuibang, password:
Lisizuibang999”。
And for example, when Real Name of the ID for user, user profile mapping table can be as follows
Form:
Table 2
If the ID for obtaining is " king five ", the user can be found in table 2 second
The user profile that system side is registered is as " user name:Wangwuwangwu, password:Wangwu321”.
Further, in actual applications, if second system is definitely believed the request that intermediate equipment sends
Appoint, then intermediate equipment can send carrying for logging in stepping on for the user name of second system to second system
Record request, i.e. intermediate equipment ask the user for logging in second system for obtaining to believe according to logging on authentication
Breath can be only user name.
However, there is certain risk, i.e. intermediate equipment only according to user name login second system may
Due to by viral attack actively to (not receiving the logging on authentication request of the first system transmission) the
Two system sends the logging request for logging in certain account, so that second system logs in the account, and then
The private information under the account is caused to reveal.Therefore, in order to ensure second system under account safety,
Intermediate equipment needs to send carrying for logging in stepping on for the username and password of second system to second system
Record request, i.e. intermediate equipment ask the user for logging in second system for obtaining to believe according to logging on authentication
Breath can be username and password.
Further, in order to prevent the user profile for logging in second system from transmitting to second system
During it is stolen and cause user profile to be revealed, user profile can be encrypted.When
Two system is received after the logging request for carrying user profile, and process is first decrypted to user profile,
Carry out again judging whether the user profile is registered user profile, if so, then can use user's letter
Breath logs in second system, and sends logging on authentication to intermediate equipment, so that intermediate equipment is by logging on authentication
It is transmitted to the first system so that the first system can directly access second system by logging on authentication.
Further, intermediate equipment side is provided with general-purpose interface, and any kind of system all can directly lead to
Cross general-purpose interface access the intermediate equipment, i.e. intermediate equipment can by general-purpose interface receive the first system send out
The logging on authentication request sent, can receive the logging on authentication that second system sends by general-purpose interface.
Specifically, the parameter that general-purpose interface is related to includes:Registration method, system (the first system)
User, the application title (or IP address) of method, system, applied party's system (second system)
The result that title (or IP address) and request are returned (such as logging on authentication).
Further, it can be seen from above-described embodiment, when user wants directly to be accessed by second system
During the data of the first system, need to increase a standard interface in the first system side, then intermediate equipment
By the standard interface to the first system application logging on authentication, intermediate equipment is obtained after logging on authentication, will
Logging on authentication feeds back to second system, and now second system can directly access first be by logging on authentication
The data or function of system.
Due to the present invention's it is critical that intermediate equipment is logged in by standard interface to second system application
Voucher, as long as so the standard that second system is provided according to intermediate equipment side increases standard interface, first
System just can to apply for logging on authentication in the way of with its function that achieves a butt joint, therefore either first be
System achieves a butt joint with a second system, or achieves a butt joint with multiple second systems, and docking efficiency is all
Comparison is high.
Further, according to said method embodiment, an alternative embodiment of the invention additionally provides one
The device of system docking is planted, as shown in Fig. 2 the device includes:Receiving unit 21, acquiring unit 22
With transmitting element 23.Wherein,
Receiving unit 21, for receiving the logging on authentication request of the first system transmission, logging on authentication request
The logging on authentication for logging in second system is obtained for application;
Acquiring unit 22, for the logging on authentication request received according to receiving unit 21, obtains for stepping on
The user profile of record second system, the wherein corresponding user of user profile and the use for logging in the first system
Family is identical;
Transmitting element 23, obtains for sending carrying acquiring unit 22 to second system by standard interface
User profile logging request, standard interface is for realizing docking for the first system and second system
The communication interface for operating and pre-setting;
Receiving unit 21, is additionally operable to receive the logging on authentication that second system sends;
Transmitting element 23, is additionally operable to for the logging on authentication that receiving unit 21 is received to be sent to the first system,
So that the first system accesses second system by logging on authentication.
The device of system docking provided in an embodiment of the present invention, can receive the first system transmission
After logging on authentication request, it is used to log in the user profile of second system according to the logging on authentication acquisition request,
Then sent to second system by standard interface and carry the logging request of the user profile, and receive the
The logging on authentication of two system feedback, sends it to the first system, so that the first system is by the login
Voucher directly accesses second system.Open with the feature for needing to be combined both by developer in prior art
Send special interface and compare so as to realize system docking, the present invention is directly second according to preset standard
Standard interface is developed in system side, and then intermediate equipment obtains logging on authentication by the standard interface, and will
The logging on authentication is sent to the first system, so that the first system directly can access the by logging on authentication
Two system, whole docking operation need not take a significant amount of time exploitation special interface, so as to improve system
The efficiency of docking.
Further, as shown in figure 3, acquiring unit 22, including:
Extraction module 221, for extracting the use of the user for having logged in the first system in asking from logging on authentication
Family identifies;
Acquisition module 222, for obtaining user profile mapping table from local, user profile mapping table is used for
Record the corresponding relation of the user profile that same user registers in different system, and the user of the user
Mark;
Searching modul 223, for searching and carrying in the user profile mapping table that obtains from acquisition module 222
The corresponding user profile for logging in second system of ID that delivery block 221 is extracted.
Further, acquiring unit 22, for obtaining the user name for logging in second system.
Further, acquiring unit 22, for obtaining the username and password for logging in second system.
Further, receiving unit 21, for receiving the login that the first system sends by general-purpose interface
Request for credentials.
Further, according to said apparatus embodiment, an alternative embodiment of the invention additionally provides one
The system for planting system docking, as shown in figure 4, the system includes the first system 31, the and of second system 33
Intermediate equipment 32, wherein, intermediate equipment 32 includes device as shown in Figure 2 or Figure 3;
The first system 31, for sending logging on authentication request to intermediate equipment 32, logging on authentication request is used
The logging on authentication for logging in second system 33 is obtained in application;
The first system 31, is additionally operable to receive the logging on authentication that intermediate equipment 32 sends, will pass through login
Voucher accesses second system 33;
Second system 33, the carrying for receiving the transmission of intermediate equipment 32 is used to log in second system 33
The logging request of user profile;
Second system 33, is additionally operable to send logging on authentication to intermediate equipment 32.
The system of system docking provided in an embodiment of the present invention, can receive the first system transmission
After logging on authentication request, it is used to log in the user profile of second system according to the logging on authentication acquisition request,
Then sent to second system by standard interface and carry the logging request of the user profile, and receive the
The logging on authentication of two system feedback, sends it to the first system, so that the first system is by the login
Voucher directly accesses second system.Open with the feature for needing to be combined both by developer in prior art
Send special interface and compare so as to realize system docking, the present invention is directly second according to preset standard
Standard interface is developed in system side, and then intermediate equipment obtains logging on authentication by the standard interface, and will
The logging on authentication is sent to the first system, so that the first system directly can access the by logging on authentication
Two system, whole docking operation need not take a significant amount of time exploitation special interface, so as to improve system
The efficiency of docking.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have in certain embodiment
The part being described in detail, may refer to the associated description of other embodiment.
It is understood that said method and the correlated characteristic in device can be referred to mutually.In addition,
" first ", " second " in above-described embodiment etc. is, for distinguishing each embodiment, and not represent each enforcement
The quality of example.
Those skilled in the art can be understood that, for convenience and simplicity of description, above-mentioned
The specific work process of the system, apparatus, and unit of description, in may be referred to preceding method embodiment
Corresponding process, will not be described here.
Provided herein algorithm and show not with any certain computer, virtual system or miscellaneous equipment
It is intrinsic related.Various general-purpose systems can also be used together based on teaching in this.According to above
Description, the structure constructed required by this kind of system is obvious.Additionally, the present invention is also not for
Any certain programmed language.It is understood that, it is possible to use various programming languages realize described here
The content of invention, and the description done to language-specific above is to disclose the optimal reality of the present invention
Apply mode.
In specification mentioned herein, a large amount of details are illustrated.It is to be appreciated, however, that
Embodiments of the invention can be put into practice in the case of without these details.In some instances,
Known method, structure and technology are not been shown in detail, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand in each inventive aspect
It is individual or multiple, in above to the description of the exemplary embodiment of the present invention, each feature of the invention
Sometimes in being grouped together into single embodiment, figure or descriptions thereof.However, should be by
The method of the disclosure is construed to reflect following intention:I.e. the present invention for required protection requires ratio at each
The more features of feature being expressly recited in claim.More precisely, as following right will
As asking book to reflect, inventive aspect is all spies less than single embodiment disclosed above
Levy.Therefore, it then follows thus claims of specific embodiment are expressly incorporated in the specific embodiment party
Separate embodiments of the formula, wherein each claim as the present invention itself.
Those skilled in the art are appreciated that can be carried out to the module in the equipment in embodiment
Adaptively change and they are arranged in one or more equipment different from the embodiment.
Module or unit or component in embodiment can be combined into a module or unit or component, and
In addition multiple submodule or subelement or sub-component can be divided into.Except such feature and/or
Outside at least some in process or unit is excluded each other, can be using any combinations to this explanation
All features disclosed in book (including adjoint claim, summary and accompanying drawing) and such as the displosure
Any method or all processes or unit of equipment be combined.Unless expressly stated otherwise, originally
Each feature disclosed in specification (including adjoint claim, summary and accompanying drawing) can be by carrying
Replace for the alternative features of identical, equivalent or similar purpose.
Although additionally, it will be appreciated by those of skill in the art that some embodiments described herein include
Some included features rather than further feature in other embodiments, but the feature of different embodiments
Combination mean to be within the scope of the present invention and formed different embodiments.For example, under
In the claims in face, embodiment required for protection one of arbitrarily can be in any combination
Mode is using.
The all parts embodiment of the present invention can be realized with hardware, or with one or more
The software module run on reason device is realized, or is realized with combinations thereof.Those skilled in the art
It should be appreciated that can be realized using microprocessor or digital signal processor (DSP) in practice
The condition detection method of accompanied electronic anti-theft device according to embodiments of the present invention, equipment, server and
The some or all functions of some or all parts in system equipment.The present invention can also be realized
It is some or all equipment or program of device (example for performing method as described herein
Such as, computer program and computer program).Such program for realizing the present invention can be stored in
On computer-readable medium, or there can be the form of one or more signal.Such signal
Can download from internet website and obtain, or provide on carrier signal, or with any other
Form is provided.
It should be noted that above-described embodiment the present invention will be described rather than the present invention is limited
Make, and those skilled in the art can design without departing from the scope of the appended claims
Alternative embodiment.In the claims, any reference symbol between bracket should not be configured to
Limitations on claims.Word "comprising" does not exclude the presence of element not listed in the claims or step
Suddenly.Word "a" or "an" before element does not exclude the presence of multiple such elements.The present invention
Can come real by means of the hardware for including some different elements and by means of properly programmed computer
It is existing.If in the unit claim for listing equipment for drying, several in these devices can be logical
Cross same hardware branch to embody.The use of word first, second, and third is not indicated that
Any order.These words can be construed to title.
Claims (10)
1. a kind of method of system docking, it is characterised in that methods described includes:
The logging on authentication request that the first system sends is received, the logging on authentication is asked for applying obtaining
Log in the logging on authentication of second system;
Asked according to the logging on authentication, obtain the user profile for logging in the second system, its
Described in the corresponding user of user profile it is identical with the user for logging in the first system;
The logging request for carrying the user profile, institute are sent to the second system by standard interface
It is to set in advance for realizing the docking operation of the first system and the second system to state standard interface
The communication interface put;
Receive the logging on authentication that the second system sends, and the logging on authentication is sent to into described the
One system, so that the first system accesses the second system by the logging on authentication.
2. method according to claim 1, it is characterised in that described according to the logging on authentication
Request, obtains the user profile for logging in the second system, including:
The ID of the user for logging in the first system is extracted from logging on authentication request;
User profile mapping table is obtained from local, the user profile mapping table is used to record same user
The corresponding relation of the user profile registered in different system, and the ID of the same user;
Search from the user profile mapping table corresponding with the ID for logging in described
The user profile of two system.
3. method according to claim 1 and 2, it is characterised in that the acquisition is used to log in
The user profile of the second system, including:
Obtain the user name for logging in the second system.
4. method according to claim 1 and 2, it is characterised in that the acquisition is used to log in
The user profile of the second system, including:
Obtain the username and password for logging in the second system.
5. method according to claim 1, it is characterised in that the reception the first system sends
Logging on authentication request, including:
The logging on authentication request that the first system sends is received by general-purpose interface.
6. a kind of device of system docking, it is characterised in that described device includes:
Receiving unit, for receiving the logging on authentication request of the first system transmission, the logging on authentication please
Ask and obtain the logging on authentication for logging in second system for application;
Acquiring unit, for the logging on authentication request received according to the receiving unit, obtains and uses
In the user profile for logging in the second system, wherein the corresponding user of the user profile with log in
The user of the first system is identical;
Transmitting element, for sending to the second system by standard interface the acquiring unit is carried
The logging request of the user profile for obtaining, the standard interface is for realizing the first system
Docking operation with the second system and the communication interface that pre-sets;
The receiving unit, is additionally operable to receive the logging on authentication that the second system sends;
The transmitting element, is additionally operable to for the logging on authentication that the receiving unit is received to be sent to institute
The first system is stated, so that the first system accesses the second system by the logging on authentication.
7. device according to claim 6, it is characterised in that the acquiring unit, including:
Extraction module, for extracting the use for logging in the first system from logging on authentication request
The ID at family;
Acquisition module, for obtaining user profile mapping table from local, the user profile mapping table is used
In the corresponding relation for recording the user profile that same user registers in different system, and the same use
The ID at family;
Searching modul, for search in the user profile mapping table that obtains from the acquisition module with
The corresponding user for logging in the second system of the ID that the extraction module is extracted believes
Breath.
8. the device according to claim 6 or 7, it is characterised in that the acquiring unit, uses
It is used to log in the user name of the second system in acquisition.
9. the device according to claim 6 or 7, it is characterised in that the acquiring unit, also
For obtaining the username and password for logging in the second system.
10. a kind of system of system docking, it is characterised in that the system include the first system, the
Two system and intermediate equipment, wherein, the intermediate equipment is included such as any one of claim 6 to 9
Described device;
The first system, for the intermediate equipment send logging on authentication request, it is described log in
Card request obtains the logging on authentication for logging in the second system for application;
The first system, is additionally operable to receive the logging on authentication that the intermediate equipment sends, will pass through
The logging on authentication accesses the second system;
The second system, is used to log in described second for receiving the carrying that the intermediate equipment sends
The logging request of system user information;
The second system, is additionally operable to send the logging on authentication to the intermediate equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510696788.9A CN106612255A (en) | 2015-10-23 | 2015-10-23 | A method, apparatus and system for system docking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510696788.9A CN106612255A (en) | 2015-10-23 | 2015-10-23 | A method, apparatus and system for system docking |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106612255A true CN106612255A (en) | 2017-05-03 |
Family
ID=58613089
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510696788.9A Pending CN106612255A (en) | 2015-10-23 | 2015-10-23 | A method, apparatus and system for system docking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106612255A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114697109A (en) * | 2022-03-30 | 2022-07-01 | 中国银行股份有限公司 | Login information processing method, first system, terminal and second system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102111410A (en) * | 2011-01-13 | 2011-06-29 | 中国科学院软件研究所 | Agent-based single sign on (SSO) method and system |
CN102868702A (en) * | 2012-09-28 | 2013-01-09 | 用友软件股份有限公司 | System login device and system login method |
CN103053132A (en) * | 2012-07-25 | 2013-04-17 | 华为技术有限公司 | User access business system or network method, system and device |
CN103560885A (en) * | 2013-11-01 | 2014-02-05 | 金蝶软件(中国)有限公司 | Method and system for authenticating domain agency |
CN104396290A (en) * | 2012-07-02 | 2015-03-04 | Sk普兰尼特有限公司 | Single certificate service system and operational method thereof |
-
2015
- 2015-10-23 CN CN201510696788.9A patent/CN106612255A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102111410A (en) * | 2011-01-13 | 2011-06-29 | 中国科学院软件研究所 | Agent-based single sign on (SSO) method and system |
CN104396290A (en) * | 2012-07-02 | 2015-03-04 | Sk普兰尼特有限公司 | Single certificate service system and operational method thereof |
CN103053132A (en) * | 2012-07-25 | 2013-04-17 | 华为技术有限公司 | User access business system or network method, system and device |
CN102868702A (en) * | 2012-09-28 | 2013-01-09 | 用友软件股份有限公司 | System login device and system login method |
CN103560885A (en) * | 2013-11-01 | 2014-02-05 | 金蝶软件(中国)有限公司 | Method and system for authenticating domain agency |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114697109A (en) * | 2022-03-30 | 2022-07-01 | 中国银行股份有限公司 | Login information processing method, first system, terminal and second system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8281381B2 (en) | Techniques for environment single sign on | |
CN105007280B (en) | A kind of application login method and device | |
US9600679B2 (en) | Techniques for resource operation based on usage, sharing, and recommendations with modular authentication | |
CA2570045C (en) | Network security and fraud detection system and method | |
US9525684B1 (en) | Device-specific tokens for authentication | |
EP3092775B1 (en) | Method and system for determining whether a terminal logging into a website is a mobile terminal | |
CN105141605B (en) | Session method, Website server and browser | |
US20150256514A1 (en) | Automatic detection of authentication methods by a gateway | |
US20110154439A1 (en) | Secure application network | |
US20100107240A1 (en) | Network location determination for direct access networks | |
US20070220605A1 (en) | Identifying unauthorized access to a network resource | |
US20070244989A1 (en) | Remote Automated Volume Mounting | |
US20130074164A1 (en) | Method and system of securing accounts | |
USRE47533E1 (en) | Method and system of securing accounts | |
CN105323253A (en) | Identity verification method and device | |
US20100306833A1 (en) | Autonomous intelligent user identity manager with context recognition capabilities | |
US9059987B1 (en) | Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network | |
CN106685949A (en) | Container access method, container access device and container access system | |
US20090138950A1 (en) | Two-factor anti-phishing authentication systems and methods | |
US7895644B1 (en) | Method and apparatus for accessing computers in a distributed computing environment | |
CN108259457A (en) | A kind of WEB authentication methods and device | |
CN105337739B (en) | Safe login method, device, server and terminal | |
CN105791249A (en) | Third-party application processing method, device and system | |
CN108009439A (en) | The method, apparatus and system of resource request | |
US10250778B2 (en) | Distributed smart card reader for multifunction printer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 100083 No. 401, 4th Floor, Haitai Building, 229 North Fourth Ring Road, Haidian District, Beijing Applicant after: Beijing Guoshuang Technology Co.,Ltd. Address before: 100086 Cuigong Hotel, 76 Zhichun Road, Shuangyushu District, Haidian District, Beijing Applicant before: Beijing Guoshuang Technology Co.,Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170503 |