CN107276966A - The control method and login system of a kind of distributed system - Google Patents
The control method and login system of a kind of distributed system Download PDFInfo
- Publication number
- CN107276966A CN107276966A CN201610213133.6A CN201610213133A CN107276966A CN 107276966 A CN107276966 A CN 107276966A CN 201610213133 A CN201610213133 A CN 201610213133A CN 107276966 A CN107276966 A CN 107276966A
- Authority
- CN
- China
- Prior art keywords
- operation system
- client
- login
- server
- bag
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a kind of control method of distributed system, the distributed system includes login system and operation system, and this method includes:Login system receives the operation system information of input, and after confirming that examination & verification passes through, dynamic generation carries the client logging program bag that the operation system is identified, and the client logging program bag includes being used for logging in the cookie decryption program bags that cookie values are decrypted;The cookie decryption programs bag is pushed on each server of the operation system by login system, and the cookie decryption programs bag is loaded after starting for the operation system, and decryption logs in cookie values.The invention also discloses the login system in a kind of distributed system.The login safety of system is able to ensure that using the present invention.
Description
Technical field
The present invention relates to distributed system technical field, more particularly to a kind of controlling party of distributed system
Method and login system.
Background technology
With flourishing for network, distributed system has become the necessary means of large scale system website, will
Complicated operation system is split, and splits into several function systems, forms large-scale distributed system
Using.So, the unified login problem of several function systems, i.e. single-sign-on are related to.I.e. from stepping on
After recording system is logged in, can no longer it be logged in when accessing other operation systems, you can access corresponding function.
Prior art is that user is each by single-node login system, and input account number cipher carries out login authentication,
Encryption information (logging in cookie values) can be generated by unique key by being proved to be successful rear login system, meanwhile, will
Encryption information, which is placed into cookie, returns to subscription client browser.Afterwards, user passes through browser again
When accessing each operation system, each operation system can obtain login cookie values from the request of user,
Decrypted with cookie values are carried out with single-node login system identical key, and whether verify decrypted result legal.
If illegal, rebound login page is logged in again;If legal, the request of normal process user.
It should be noted that each business is required for accessing single-node login system, the mode of access is by visitor
Family end logging program bag introduces the operation system, and client logging program bag includes being used for logging in cookie values
The cookie decryption program bags being decrypted, are the client-side program for carrying out cookie decryption, with login
The cookie values encryption logic of system is reverse process.
Prior art exist client logging program coating operation system can arbitrarily obtain, decompiling, can
Cookie decrypted codes are logged in analyze, meanwhile, obtaining method, address of cookie keys etc. can be held
Change places and get, login system has very big security risk.
The content of the invention
, can be true it is an object of the invention to provide a kind of control method of distributed system and login system
The login safety of insurance system.
For achieving the above object, it is described the invention provides a kind of control method of distributed system
Distributed system includes login system and operation system, and this method includes:Login system receives input
Operation system information, and after confirming that examination & verification passes through, dynamic generation carries the client that the operation system is identified
Logging program bag is held, the client logging program bag includes being used for what is be decrypted to logging in cookie values
Cookie decryption program bags;The cookie decryption programs bag is pushed to the operation system by login system
Each server on, for the operation system start after load the cookie decryption programs bag, solve
Close login cookie values.
For achieving the above object, present invention also offers the login system in a kind of distributed system,
The login system includes:Generation unit, receives the operation system information of input, and confirms that examination & verification passes through
Afterwards, dynamic generation carries the client logging program bag that the operation system is identified, and the client is logged in
Program bag includes being used for logging in the cookie decryption program bags that cookie values are decrypted;Push unit,
The cookie decryption programs bag is pushed on each server of the operation system by system, for described
Operation system loads the cookie decryption programs bag after starting, decryption logs in cookie values.
In summary, the control method of the distributed system of the embodiment of the present invention, the distributed system bag
Login system and operation system are included, this method includes:Login system receives the operation system information of input,
And after confirming that examination & verification passes through, dynamic generation carries the client logging program bag that the operation system is identified,
The client logging program bag includes being used for logging in the cookie decryption programs that cookie values are decrypted
Bag;The cookie decryption programs bag is pushed on each server of the operation system by login system,
The cookie decryption programs bag is loaded after starting for the operation system, decryption logs in cookie values.
It can thus be seen that in the solution of the present invention, login system is confirming operation system signal auditing by rear,
Automatically client logging program bag is pushed to operation system.The developer of operation system not will recognize that,
It can prevent malicious persons from obtaining client logging program bag and carrying out the behaviour such as cookie is cracked, key is stolen
Make, therefore improve the security of operation system.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the control method of distributed system of the embodiment of the present invention.
Fig. 2 is the structural representation of login system of the embodiment of the present invention.
Embodiment
For the objects, technical solutions and advantages of the present invention are more clearly understood, develop simultaneously referring to the drawings
Embodiment, is described in further detail to scheme of the present invention.
The solution of the present invention is managed collectively client for defect present in existing system using login system
The mode of logging program bag, and by client logging program bag automatic push to the server where operation system
It is upper so to isolate logging program and business procedure (such as on Tomcat, Jboss), allow business development personnel
Client logging program bag can not be got, it is ensured that isolation of the login system to developer.
The schematic flow sheet of the control method of distributed system of the embodiment of the present invention as shown in figure 1, wherein,
The distributed system includes login system and operation system, and this method comprises the following steps:
Step 11, login system receive the operation system information of input, and after confirming that examination & verification passes through, move
The client logging program bag that state generation is identified with the operation system, the client logging program bag
Including for logging in the cookie decryption program bags that cookie values are decrypted.
The cookie decryption programs bag is pushed to each of the operation system by step 12, login system
On server, the cookie decryption programs bag is loaded after starting for the operation system, decryption is logged in
Cookie values.
Further, in a step 11, the client logging program bag of dynamic generation also includes being used for business
The program bag of system dynamic access cipher key list;In step 12, login system pushes the cookie
While decryption program bag, also the program bag for operation system dynamic access cipher key list is pushed
Onto each server of the operation system, so that the server of operation system is used for business according to described
The program bag timing of system dynamic access cipher key list sends asking for dynamic access cipher key list to login system
Ask.
Wherein, the operation system information input is in client records table, including the operation system mark
Know, and multiple server ip address where operation system;The login system is according to each server
IP address, the journey by the cookie decryption programs bag or for operation system dynamic access cipher key list
Sequence bag is pushed on each server of the operation system.
Further, multiple server ip address in the client records table where each operation system
Form an IP list;This method further comprises:The server that login system receives operation system is determined
When the request of dynamic access cipher key list that sends after, obtain mark and service of the operation system
The IP address of device, and by the mark inquiring client terminal record sheet of the operation system, confirm the server
IP address whether there is and identified in the operation system in corresponding IP lists, if it is present will
Login system current key list synchronization is on the server.
Preferably, the client records table also includes client logging program bag version, and this method enters one
Step includes:After the upgrading of client logging program bag, login system is by the client logging program after upgrading
Bag is pushed on each server of the operation system, and updates client login in client records table
Package version number.
Preferably, the client records table also includes the examination & verification state to operation system information, client
Logging program bag pushes the mark whether completed;This method further comprises:Confirm in login system to industry
After the examination & verification of business system information passes through, the examination & verification state of the operation system information in client records table is updated
To pass through;After the push that login system completes client logging program bag, update in client records table
Push is masked as completing.
To sum up, the present invention pushes client logging program bag by login system from trend operation system, and
Login system obtains cipher key list to operation system according to business system server IP lists to login system
Mode limited, effectively increase the login security of system.
For the clear explanation present invention, concrete scene is set forth below and illustrates.
1) developer of operation system this operation system of typing in the client records table of login system
Information.Multiple services where the mark of operation system, operation system can be included in client records table
The IP lists of device IP address formation.
For example, operation system A, corresponding IP lists (IP1, IP2, IP3).Certainly, client
The information othered on operation system, such as director of each operation system can also be included in record sheet
Etc. information.
2) after auditor passes through to above-mentioned operation system A information progress examination & verification, login system is more
The examination & verification state of the operation system information is to pass through in new client records table.
3) login system dynamic generation client logging program bag, the mark A of the operation system is squeezed into
In the client logging program bag.
4) client logging program bag is pushed on operation system A each server by login system,
It is pushed on IP address respectively IP1, IP2, IP3 server.Login system updates client note
The corresponding push of operation system A is masked as completing in record table.
Wherein, client logging program bag includes being used for logging in the cookie that cookie values are decrypted
Decryption program bag, in addition to the program bag for operation system dynamic access cipher key list.
Cookie decryption program bags are the client-side program for carrying out cookie decryption, with login system
Cookie values encryption logic is reverse process.Operation system loads the cookie decryption programs bag after starting,
Then cookie values are logged in using key and cookie decryption programs bag decryption.
For the program bag of operation system dynamic access cipher key list, be make the server of operation system according to
The program bag timing for operation system dynamic access cipher key list sends dynamic access to login system
The request of cipher key list.
Client records table is as shown in table 1.
Operation system is identified | IP lists | Examination & verification state | Client logging program bag version | Whether push completes |
Operation system A | IP1,IP2,IP3 | Pass through | V1 | It is |
Operation system B | IP11,IP12,IP13 | Pass through | V2 | It is no |
Table 1
In the embodiment of the present invention, client records table also includes client logging program bag version, in client
Hold after the upgrading of logging program bag, the client logging program bag after upgrading is pushed to the industry by login system
On each server of business system, and update client logging program bag version number in client records table.
Wherein, in client records table on operation system B information forming process and operation system A
Principle is identical.Operation system B, corresponding IP lists (IP11, IP12, IP13), examination & verification state is
Pass through, client logging program bag version is V2, client logging program bag, which is pushed, not to be completed.
It is noted herein that, login system and in the absence of cipher key list, only one of which in the prior art
Unique key is used for generating login cookie values, and the key is also that operation system is used for decrypting login
Cookie values.And then, in the prior art, the client logging program bag for introducing operation system is also not required to
To include the program bag for operation system dynamic access cipher key list.And system is logged in the solution of the present invention
System employs the cipher key list of real time modifying, and the cipher key list includes multiple key values, each key value pair
Should there are key state and key version.That is, login system administrative staff's maintenance key list, because
This cipher key list can be carried out crash handling etc. to existing key, can also be increased newly with real time modifying
Key.Moreover, importantly, the solution of the present invention client logging program bag, which is included, is used for business system
The program bag for dynamic access cipher key list of uniting, the program bag is logged system and is pushed to after operation system, industry
Business system is used for the program bag Timing Synchronization login system of operation system dynamic access cipher key list according to described
Current key list.Simply, the side of the present invention further to timing acquisition login system current key list
Formula is limited, and is specifically described below.
Login system receives the dynamic that operation system A server (IP address is IP1) timing is sent
After the request for obtaining cipher key list, the mark A and the server of the operation system are obtained from request
IP address (IP1), and pass through the mark A inquiring client terminal record sheets of the operation system, confirm
The IP address of the server whether there is in the corresponding IP lists of operation system mark A, if
In the presence of then by login system current key list synchronization to the server.If it does not exist, then terminating
Flow.
According to foregoing description, the login validation method of distributed system of the present invention may comprise steps of:
Step S1, login system checking client account number cipher success after, using in cipher key list most
Login cookie value of effective key generation with the highest version number of highest version, and logged in described
Cookie values return to client;
Step S2, operation system receive the service request that client carries the login cookie values
Afterwards, the key version for logging in cookie values is obtained, by the key version in the key column synchronously obtained
Corresponding key is inquired about in table;The cookie decryption programs bag obtained using the key and push, which is decrypted, to be logged in
Cookie values, after verification decrypted result is legal, handle normal service request.
Wherein, the cipher key list of operation system is after operation system startup, according to being used for that push is obtained
The program bag of operation system dynamic access cipher key list, Timing Synchronization login system current key list, and
And verify what IP address was obtained after.
It should be noted that the present invention by client logging program bag except being pushed to business system server
It is upper outer, client logging program bag can also be pushed on some path of server, afterwards by the road
Footpath is added to system path, is easy to business procedure to be able to access that the program bag, using local method call
The mode mode of method (such as JAVA by the light of nature), consistent effect can also be reached.
Based on same inventive concept, the invention discloses a kind of login system, structural representation such as Fig. 2
It is shown.The login system includes:
Generation unit 201, receives the operation system information of input, and after confirming that examination & verification passes through, dynamic
The client logging program bag that generation is identified with the operation system, the client logging program bag
Include for logging in the cookie decryption program bags that cookie values are decrypted;
Push unit 202, the cookie decryption programs bag is pushed to each clothes of the operation system
It is engaged on device, the cookie decryption programs bag is loaded after starting for the operation system, decryption is logged in
Cookie values.
The client logging program bag also includes the program for operation system dynamic access cipher key list
Bag;
The push unit 202, while pushing the cookie decryption programs bag, is also used for described
The program bag of operation system dynamic access cipher key list is pushed on each server of the operation system,
So that the server of operation system is determined according to the program bag for operation system dynamic access cipher key list
When to login system send dynamic access cipher key list request.
The operation system information input is in client records table, including operation system mark, and
Multiple server ip address where operation system;
The push unit 202, according to the IP address of each server, by the cookie decryption programs
Bag is pushed to each of the operation system for the program bag of operation system dynamic access cipher key list
On server.
Multiple server ip address formation one in the client records table where each operation system
IP lists;
The login system also includes processing unit 203, and the server timing for receiving operation system is sent
Dynamic access cipher key list request after, obtain the mark of the operation system and the IP of the server
Address, and by the mark inquiring client terminal record sheet of the operation system, with confirming the IP of the server
Location whether there is to be identified in corresponding IP lists in the operation system, if it is present by login system
Current key list synchronization is on the server.
The client records table also includes client logging program bag version,
The push unit 202, after the upgrading of client logging program bag, login system is by after upgrading
Client logging program bag is pushed on each server of the operation system, and updates client records
Client logging program bag version number in table.
The client records table also includes the examination & verification state to operation system information, client logging program
Bag pushes the mark whether completed;
The push unit 202,
After examination & verification of the login system confirmation to operation system information passes through, updating should in client records table
The examination & verification state of operation system information is to pass through;
After the push that login system completes client logging program bag, update in client records table and push
It is masked as completing.
The beneficial effects of the present invention are:
First, the present invention using operation system login mechanism come the operation system of administrative login, using business system
The mode of system server ip white list limits come the acquisition to key.Both malicious persons can be prevented
Obtain client logging program bag and carry out the operations such as cookie is cracked, key is stolen, system can be carried out again
Monitoring management, white list control of single-sign-on etc., can effectively improve the login safety of single-node login system
Coefficient.
2nd, the present invention dynamically manages cipher key list by login system administrative staff, and operation system timing acquisition is arrived
The cipher key list of login system, and the developer of operation system not will recognize that, therefore further increase
The security of operation system.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the protection of the present invention
Scope.Within the spirit and principles of the invention, any modification, equivalent substitution and improvements made
Deng should be included in the scope of the protection.
Claims (13)
1. a kind of control method of distributed system, the distributed system includes login system and business system
System, this method includes:
Login system receives the operation system information of input, and after confirming that examination & verification passes through, dynamic generation band
There is the client logging program bag of the operation system mark, the client logging program bag includes being used for
To logging in the cookie decryption program bags that cookie values are decrypted;
The cookie decryption programs bag is pushed to each server of the operation system by login system
On, the cookie decryption programs bag is loaded after starting for the operation system, decryption logs in cookie
Value.
2. the method as described in claim 1, it is characterised in that the client logging program bag is also wrapped
Include the program bag for operation system dynamic access cipher key list;
While login system pushes the cookie decryption programs bag, also moved described for operation system
The program bag that state obtains cipher key list is pushed on each server of the operation system, so that business system
The server of system is according to the program bag for operation system dynamic access cipher key list regularly to login system
System sends the request of dynamic access cipher key list.
3. method as claimed in claim 1 or 2, it is characterised in that the operation system information input
In client records table, including operation system mark, and multiple servers where operation system
IP address;
The login system according to the IP address of each server, by the cookie decryption programs bag or
Person is pushed to each service of the operation system for the program bag of operation system dynamic access cipher key list
On device.
4. method as claimed in claim 3, it is characterised in that each industry in the client records table
Multiple server ip address one IP list of formation where business system;This method further comprises:
The request for the dynamic access cipher key list that the server timing that login system receives operation system is sent
Afterwards, the mark of the operation system and the IP address of the server are obtained, and passes through the operation system
Mark inquiring client terminal record sheet, confirm the server IP address whether there is in the operation system
Identify in corresponding IP lists, if it is present by login system current key list synchronization to the service
On device.
5. method as claimed in claim 3, it is characterised in that the client records table also includes visitor
Family end logging program bag version, this method further comprises:After the upgrading of client logging program bag, step on
Client logging program bag after upgrading is pushed on each server of the operation system by recording system,
And update client logging program bag version number in client records table.
6. method as claimed in claim 3, it is characterised in that the client records table also includes pair
The examination & verification state of operation system information, client logging program bag pushes the mark whether completed;This method
Further comprise:
After examination & verification of the login system confirmation to operation system information passes through, updating should in client records table
The examination & verification state of operation system information is to pass through;
After the push that login system completes client logging program bag, update in client records table and push
It is masked as completing.
7. method as claimed in claim 2, it is characterised in that the login system is employed repaiies in real time
The cipher key list changed, the cipher key list include multiple key values, each key value to should have key state and
Key version.
8. a kind of login system in distributed system, the login system includes:
Generation unit, receives the operation system information of input, and after confirming that examination & verification passes through, dynamic generation
The client logging program bag identified with the operation system, the client logging program bag includes using
In to logging in the cookie decryption program bags that cookie values are decrypted;
Push unit, the cookie decryption programs bag is pushed to each server of the operation system
On, the cookie decryption programs bag is loaded after starting for the operation system, decryption logs in cookie
Value.
9. login system as claimed in claim 8, it is characterised in that the client logging program bag
Also include the program bag for operation system dynamic access cipher key list;
The push unit, while pushing the cookie decryption programs bag, also described will be used for business
The program bag of system dynamic access cipher key list is pushed on each server of the operation system, so that
The server of operation system according to the program bag timing for operation system dynamic access cipher key list to
Login system sends the request of dynamic access cipher key list.
10. login system as claimed in claim 8 or 9, it is characterised in that the operation system letter
Breath input is in client records table, including operation system mark, and multiple where operation system
Server ip address;
The push unit, according to the IP address of each server, by the cookie decryption programs bag
Or it is pushed to each clothes of the operation system for the program bag of operation system dynamic access cipher key list
It is engaged on device.
11. login system as claimed in claim 10, it is characterised in that in the client records table
Multiple server ip address one IP list of formation where each operation system;
The login system also includes processing unit, and receive that the server timing of operation system sends is dynamic
State is obtained after the request of cipher key list, with obtaining the mark of the operation system and the IP of the server
Location, and by the mark inquiring client terminal record sheet of the operation system, confirm the IP address of the server
Identified with the presence or absence of in the operation system in corresponding IP lists, if it is present login system is worked as
Preceding cipher key list is synchronized on the server.
12. login system as claimed in claim 10, it is characterised in that the client records table is also
Including client logging program bag version,
The push unit, after the upgrading of client logging program bag, login system is by the client after upgrading
End logging program bag is pushed on each server of the operation system, and is updated in client records table
Client logging program bag version number.
13. login system as claimed in claim 10, it is characterised in that the client records table is also
Including the examination & verification state to operation system information, client logging program bag pushes the mark whether completed;
The push unit,
After examination & verification of the login system confirmation to operation system information passes through, updating should in client records table
The examination & verification state of operation system information is to pass through;
After the push that login system completes client logging program bag, update in client records table and push
It is masked as completing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610213133.6A CN107276966B (en) | 2016-04-07 | 2016-04-07 | Control method and login system of distributed system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610213133.6A CN107276966B (en) | 2016-04-07 | 2016-04-07 | Control method and login system of distributed system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107276966A true CN107276966A (en) | 2017-10-20 |
CN107276966B CN107276966B (en) | 2020-03-03 |
Family
ID=60052370
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610213133.6A Active CN107276966B (en) | 2016-04-07 | 2016-04-07 | Control method and login system of distributed system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107276966B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111065097A (en) * | 2019-10-11 | 2020-04-24 | 上海交通大学 | Channel protection method and system based on shared secret key in mobile internet |
CN112738030A (en) * | 2020-12-16 | 2021-04-30 | 重庆扬成大数据科技有限公司 | Data acquisition and sharing working method for agricultural technicians through big data analysis |
CN113037702A (en) * | 2020-12-16 | 2021-06-25 | 重庆扬成大数据科技有限公司 | Agricultural worker login system safe working method based on big data analysis |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101202753A (en) * | 2007-11-29 | 2008-06-18 | 中国电信股份有限公司 | Method and device for accessing plug-in connector applied system by client terminal |
US20110126220A1 (en) * | 2000-02-01 | 2011-05-26 | Charles Schwab & Co., Inc. | Method and Apparatus for Integrating Distributed Shared Services System |
US20110277027A1 (en) * | 2010-05-07 | 2011-11-10 | Richard Hayton | Systems and Methods for Providing a Single Click Access to Enterprise, SAAS and Cloud Hosted Application |
CN103841117A (en) * | 2014-03-21 | 2014-06-04 | 北京京东尚科信息技术有限公司 | JAAS login method and server based on Cookie mechanism |
CN104394172A (en) * | 2014-12-12 | 2015-03-04 | 用友软件股份有限公司 | Single sign-on device and method |
CN105049448A (en) * | 2015-08-24 | 2015-11-11 | 用友网络科技股份有限公司 | Single sign-on device and method |
-
2016
- 2016-04-07 CN CN201610213133.6A patent/CN107276966B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110126220A1 (en) * | 2000-02-01 | 2011-05-26 | Charles Schwab & Co., Inc. | Method and Apparatus for Integrating Distributed Shared Services System |
CN101202753A (en) * | 2007-11-29 | 2008-06-18 | 中国电信股份有限公司 | Method and device for accessing plug-in connector applied system by client terminal |
US20110277027A1 (en) * | 2010-05-07 | 2011-11-10 | Richard Hayton | Systems and Methods for Providing a Single Click Access to Enterprise, SAAS and Cloud Hosted Application |
CN103841117A (en) * | 2014-03-21 | 2014-06-04 | 北京京东尚科信息技术有限公司 | JAAS login method and server based on Cookie mechanism |
CN104394172A (en) * | 2014-12-12 | 2015-03-04 | 用友软件股份有限公司 | Single sign-on device and method |
CN105049448A (en) * | 2015-08-24 | 2015-11-11 | 用友网络科技股份有限公司 | Single sign-on device and method |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111065097A (en) * | 2019-10-11 | 2020-04-24 | 上海交通大学 | Channel protection method and system based on shared secret key in mobile internet |
CN111065097B (en) * | 2019-10-11 | 2021-08-10 | 上海交通大学 | Channel protection method and system based on shared secret key in mobile internet |
CN112738030A (en) * | 2020-12-16 | 2021-04-30 | 重庆扬成大数据科技有限公司 | Data acquisition and sharing working method for agricultural technicians through big data analysis |
CN113037702A (en) * | 2020-12-16 | 2021-06-25 | 重庆扬成大数据科技有限公司 | Agricultural worker login system safe working method based on big data analysis |
CN112738030B (en) * | 2020-12-16 | 2021-09-14 | 重庆扬成大数据科技有限公司 | Data acquisition and sharing working method for agricultural technicians through big data analysis |
CN113037702B (en) * | 2020-12-16 | 2021-11-09 | 重庆扬成大数据科技有限公司 | Agricultural worker login system safe working method based on big data analysis |
Also Published As
Publication number | Publication date |
---|---|
CN107276966B (en) | 2020-03-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100544361C (en) | The method and apparatus that is used for managing session identifiers | |
EP1953950B1 (en) | A method for protecting network service application account, the system, and the apparatus thereof | |
CN106899570A (en) | The processing method of Quick Response Code, apparatus and system | |
CN105210076B (en) | Elastic, recoverable dynamic device identification | |
CN105100084B (en) | It is a kind of to prevent the method and system across station request forgery attack | |
JP2004015530A5 (en) | ||
CN108259502A (en) | For obtaining the identification method of interface access rights, server-side and storage medium | |
CN111753014B (en) | Identity authentication method and device based on block chain | |
CN107851143A (en) | Apparatus and method for using customer equipment certificate in equipment | |
CN106331042B (en) | Single sign-on method and device for heterogeneous user system | |
CN108028840A (en) | Realize the peer to peer connection for establishing safety | |
CN103905395A (en) | WEB access control method and system based on redirection | |
CN105915537A (en) | Token generation method, token calibration method and token authentication server | |
CN106549909A (en) | A kind of authority checking method and apparatus | |
CN108810003A (en) | A kind of safety verification scheme of multi-service side's message access | |
CN106330441A (en) | Method, equipment and system for processing trusted time information | |
CN107276966A (en) | The control method and login system of a kind of distributed system | |
CN106815734B (en) | Information transmission method and device | |
CN104618356B (en) | Auth method and device | |
CN103825906B (en) | Enterprise private key self-encryption and self-arrangement method based on content distribution network | |
CN105187417B (en) | Authority acquiring method and apparatus | |
CN101325493B (en) | Method and system for authenticating a user | |
CN106888200B (en) | Identification association method, information sending method and device | |
JP6783527B2 (en) | Electronic key re-registration system, electronic key re-registration method and program | |
CN107276967A (en) | A kind of distributed system and its login validation method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |