CN107277076A - The authentication method and device of a kind of network legal power - Google Patents

The authentication method and device of a kind of network legal power Download PDF

Info

Publication number
CN107277076A
CN107277076A CN201710720018.2A CN201710720018A CN107277076A CN 107277076 A CN107277076 A CN 107277076A CN 201710720018 A CN201710720018 A CN 201710720018A CN 107277076 A CN107277076 A CN 107277076A
Authority
CN
China
Prior art keywords
reference address
user
network
legal power
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710720018.2A
Other languages
Chinese (zh)
Other versions
CN107277076B (en
Inventor
师洪波
钱力
谢靖
黄向阳
李涵昱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Science Library Chinese Academy Of Sciences
Original Assignee
National Science Library Chinese Academy Of Sciences
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Science Library Chinese Academy Of Sciences filed Critical National Science Library Chinese Academy Of Sciences
Priority to CN201710720018.2A priority Critical patent/CN107277076B/en
Publication of CN107277076A publication Critical patent/CN107277076A/en
Application granted granted Critical
Publication of CN107277076B publication Critical patent/CN107277076B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention provides a kind of authentication method of network legal power and device, it is related to field of information processing, methods described includes:By obtaining user's the first reference address to be accessed, first reference address needs first network authority;Judge whether the user has first network authority;If the user does not have first network authority, judge whether the user has the second network legal power;If the user has the second network legal power, second reference address is obtained according to first reference address, second reference address includes making the first parameter that second reference address is able to access that, second reference address includes the content of first reference address.Solve that purview certification method in the prior art is inconvenient for use, identifying procedure is cumbersome, cause validated user service can not normally use the technical problem of resource.Having reached makes user automatic jump to authentication interface, and certification automatic jumps to resource interfaces after finishing.User uses simple smooth technique effect.

Description

The authentication method and device of a kind of network legal power
Technical field
The present invention relates to the authentication method and device of technical field of information processing, more particularly to a kind of network legal power.
Background technology
In Internet service field, particularly Document Service field, user's access certain resources generally require to enter user Row authentication, different resource provider is not near identical to authentication mode, the certification entrance of user.
Conventional publisher, which is provided, to carry out authentication with the IP of automatic identification user, can be made for the user of IP scopes It is authenticated with mailbox.
But purview certification method is inconvenient for use in the prior art, user can not also remember identifying procedure.Cause legal use Family service can not normally use resource.
The content of the invention
The embodiments of the invention provide a kind of authentication method of network legal power and device, solve authority in the prior art and recognize Card method is inconvenient for use, and identifying procedure is cumbersome.Validated user service is caused can not normally to use the technical problem of resource.
In view of the above problems, it is proposed that the embodiment of the present application is to provide the authentication method and device of a kind of network legal power.
In a first aspect, the invention provides a kind of authentication method of network legal power, methods described includes:Obtaining user will visit The first reference address asked, first reference address needs first network authority;Judge whether the user has the first net Network authority;If the user does not have first network authority, judge whether the user has the second network legal power, wherein The first network authority is different from second network legal power;If the user has the second network legal power, according to described First reference address obtains the second reference address, wherein, second reference address includes the first parameter, wherein, described first Parameter is able to access that second reference address, and second reference address includes the content of first reference address.
It is preferred that, methods described also includes:First publisher is obtained according to first reference address, wherein, described the The authority of the content of one reference address belongs to first publisher;First parameter is obtained according to first publisher.
It is preferred that, first parameter also includes:Obtain the verification mode of first publisher.
It is preferred that, methods described also includes:If the user has first network authority, the user obtains described The content of first reference address.
It is preferred that, methods described also includes:If the user does not have second network legal power, the user is not The content of the second model essay address can be obtained.
Second aspect, the invention provides a kind of authentication device of network legal power, described device includes:
First obtains unit, the first obtains unit is used to obtain user's the first reference address to be accessed, and described the One reference address needs first network authority;
First judging unit, first judging unit is used to judge whether the user has first network authority;
Second judging unit, if second judging unit is used for the user and does not have first network authority, sentences Whether the user of breaking has the second network legal power, wherein the first network authority is different from second network legal power;
Second obtaining unit, if second obtaining unit is used for the user and has the second network legal power, according to institute State the first reference address and obtain the second reference address, wherein, second reference address includes the first parameter, wherein, described the One parameter is able to access that second reference address, and second reference address includes the interior of first reference address Hold.
It is preferred that, described device also includes:
3rd obtaining unit, the 3rd obtaining unit is used to obtain the first publisher according to first reference address, Wherein, the authority of the content of first reference address belongs to first publisher;
4th obtaining unit, the 4th obtaining unit is used to obtain the first parameter according to first publisher.
It is preferred that, first parameter also includes:
5th obtaining unit, the 5th obtaining unit is used for the verification mode for obtaining first publisher.
It is preferred that, described device also includes:
6th obtaining unit, it is described if the 6th obtaining unit is used for the user and has first network authority User obtains the content of first reference address.
It is preferred that, described device also includes:
7th obtaining unit, if the 7th obtaining unit is used for the user and does not have second network legal power, Then the user can not obtain the content of the second model essay address.
The third aspect, the invention provides a kind of computer-readable recording medium, is stored thereon with computer program, the journey Following steps are realized when sequence is executed by processor:User's the first reference address to be accessed is obtained, first reference address is needed Want first network authority;Judge whether the user has first network authority;If the user weighs without first network Limit, then judge whether the user has the second network legal power, wherein the first network authority is different from second network Authority;If the user has the second network legal power, the second reference address is obtained according to first reference address, wherein, Second reference address includes the first parameter, wherein, first parameter is able to access that second reference address, described Second reference address includes the content of first reference address.
Fourth aspect, the invention provides a kind of authentication device of network legal power, including memory, processor and is stored in On memory and the computer program that can run on a processor, following steps are realized during the computing device described program: User's the first reference address to be accessed is obtained, first reference address needs first network authority;Judging the user is It is no that there is first network authority;If the user does not have first network authority, judge whether the user has second Network legal power, wherein the first network authority is different from second network legal power;If the user has the second network Authority, the second reference address is obtained according to first reference address, wherein, second reference address includes the first parameter, Wherein, first parameter is able to access that second reference address, and second reference address includes described first and visited Ask the content of address.
Said one or multiple technical schemes in the embodiment of the present application, are at least imitated with following one or more technologies Really:
1. the authentication method and device of a kind of network legal power that the embodiment of the present application is provided, to be accessed by obtaining user First reference address, first reference address needs first network authority;Judge whether the user has first network power Limit;If the user does not have first network authority, judge whether the user has the second network legal power, wherein described First network authority is different from second network legal power;If the user has the second network legal power, according to described first Reference address obtains the second reference address, wherein, second reference address includes the first parameter, wherein, first parameter It is able to access that second reference address, second reference address includes the content of first reference address.Solve Purview certification method is inconvenient for use in the prior art, and identifying procedure is cumbersome.Cause validated user service can not be normally using money The technical problem in source.Having reached makes user automatic jump to authentication interface, and certification automatic jumps to resource interfaces after finishing.User Use simple smooth technique effect.
2. the embodiment of the present application according to first reference address by obtaining the first publisher, wherein, described first visits Ask that the authority of the content of address belongs to first publisher;First parameter, described first are obtained according to first publisher Parameter also includes the verification mode for obtaining first publisher.Purview certification method in the prior art is further solved to use Inconvenience, identifying procedure is cumbersome.Validated user service is caused can not normally to use the technical problem of resource.Further reach directly The verification mode of first publisher is supplied to user, enables the user to directly carry out authentication, so as to save The flow that cumbersome switching is searched, enable IP address not the in-house validated user of the first reference address easily, It is efficient to access required resource address, the normal technique effect using resource.
If the 3, the embodiment of the present application does not have second network legal power by the user, the user can not obtain Obtain the content of the second model essay address.The technique effect that can protect resource not by invalid user stealing is reached.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
Fig. 1 is a kind of schematic flow sheet of the authentication method of network legal power in the embodiment of the present invention;
Fig. 2 is a kind of structural representation of the authentication device of network legal power in the embodiment of the present invention;
Fig. 3 is the structural representation of the authentication device of another network legal power in the embodiment of the present invention.
Embodiment
It is existing in the prior art for solving the embodiments of the invention provide a kind of authentication method of network legal power and device Have in technology that purview certification method is inconvenient for use, identifying procedure is cumbersome.Cause validated user service can not be normally using resource Technical problem.The technical scheme general thought that the present invention is provided is as follows:
In the technical scheme of the embodiment of the present invention, user's the first reference address to be accessed is obtained, described first accesses Address needs first network authority;Judge whether the user has first network authority;If the user does not have first Network legal power, then judge whether the user has the second network legal power, wherein the first network authority is different from described the Two network legal powers;If the user has the second network legal power, the second reference address is obtained according to first reference address, Wherein, second reference address includes the first parameter, wherein, first parameter enables second reference address to visit Ask, second reference address includes the content of first reference address.Solve purview certification method in the prior art Inconvenient for use, identifying procedure is cumbersome.Validated user service is caused can not normally to use the technical problem of resource.Having reached makes user Authentication interface is automatic jumped to, certification automatic jumps to resource interfaces after finishing.User uses simple smooth technique effect.
Technical solution of the present invention is described in detail below by accompanying drawing and specific embodiment, it should be understood that the application Specific features in embodiment and embodiment are the detailed description to technical scheme, rather than to present techniques The restriction of scheme, in the case where not conflicting, the technical characteristic in the embodiment of the present application and embodiment can be mutually combined.
The terms "and/or", only a kind of incidence relation for describing affiliated partner, represents there may be three kinds of passes System, for example, A and/or B, can be represented:Individualism A, while there is A and B, these three situations of individualism B.In addition, herein Middle character "/", it is a kind of relation of "or" to typically represent forward-backward correlation object.
Embodiment one
Fig. 1 is a kind of schematic flow sheet of the authentication method of network legal power in the embodiment of the present invention.As shown in figure 1, described Method includes:
Step 110, user's the first reference address to be accessed is obtained, first reference address needs first network to weigh Limit;
Specifically, first reference address is with specific resources, so as to need to carry out authentication to user Reference address, the website such as middle National IP Network, Wanfang Database, dimension are general, the first network authority is referred specifically to in institute State the in-house IP address of the first reference address.That is, only when the IP address of user is in the first reference address machine In structure, first reference address can be conducted interviews.
Step 120, judge whether the user has first network authority;
Further, if the user has first network authority, the user obtains first reference address Content.
Specifically, obtain after first reference address, if it is desired to access first reference address, it is necessary to first sentence Whether disconnected user has the first network authority, that is, judge the IP address of user whether in first reference address In mechanism, if the user has the first network authority, first reference address, but big portion can be smoothly accessed Divide the IP address of user not in the mechanism of first reference address, in the prior art for being weighed without the first network The user of limit, it is necessary to carry out cumbersome certification, can the first reference address described in successful access, in order to solve the above problems, The embodiment of the present application provides following steps to solve the problem of certification is complicated.
Step 130, if the user does not have first network authority, judge whether the user has the second network Authority, wherein the first network authority is different from second network legal power;
Specifically, for the user without the first network authority, i.e., the IP address of described user is not described In the mechanism of first reference address, identity can be carried out by way of judging whether the user has the second network legal power and tested Card, second network legal power is other network legal powers different from the first network authority, and second network legal power can To be email address, phone number, wechat number or other social platform accounts etc..
Step 140, if the user has the second network legal power, obtain second according to first reference address and access Address, wherein, second reference address includes the first parameter, wherein, first parameter enables second reference address Enough to access, second reference address includes the content of first reference address.
Specifically, if user selection is verified using second network legal power, if that is, described user Selection is verified using modes such as mailbox, phone numbers, just obtains second reference address, institute according to first reference address The second reference address is stated for other reference address with all the elements in first reference address, in other words, described second The content of reference address is identical with the content of first reference address, meanwhile, second reference address also has described the One parameter, first parameter is the final authentication mode that owning user accesses second reference address, in other words, when described When user is verified using mailbox or phone number etc., second reference address can be automatically opened up with the described first ginseng Several certification pages, after the completion of the user authentication, can automatic jump to the resource page that the user needs to access.
Further, according to first reference address obtain the first publisher, wherein, first reference address it is interior The authority of appearance belongs to first publisher;First parameter is obtained according to first publisher.First parameter also includes: Obtain the verification mode of first publisher.
Specifically, the content rights of first reference address belong to first publisher and owned, so as to pass through institute The first reference address is stated, first publisher is obtained, so that obtain first publisher verification mode, i.e., described first ginseng Number.If for example, user desires access to the electronic edition of reader's magazine, and the content rights of reader's magazine belong to Gansu people publication Society owns, and the Gansu People's Press has oneself internal verification mode to reader's electronic edition, and if user desires access to it His content, other guide belongs to an other publishing house, and the verification mode of the publishing house is different from testing for the Gansu People's Press Card mode, in this case, prior art are to be collected the verification mode of different publishers, and the user needs to carry out Switching is searched, and user can not also remember identifying procedure, and process is cumbersome, then, and the application passes through the institute with first parameter The second reference address is stated, the verification mode of first publisher is directly supplied to user, enables the user to directly enter Row authentication, so as to save the flow that cumbersome switching is searched, reaching makes IP address not in the first reference address mechanism Interior validated user can easily, efficiently access required resource address, the normal technique effect using resource.
Further, if the user does not have second network legal power, the user can not obtain described the The content of two reference address.
Specifically, in order to be provided easily to validated user meanwhile, it is capable to protect resource not by invalid user stealing, such as Really described user does not have second network legal power, if that is, described user can without using mailbox, phone number etc. Prove that identity is verified, will be unable to obtain the resource content of second reference address.
Embodiment 2
Based on the inventive concept same with a kind of authentication method of network legal power in previous embodiment, the present invention also provides one The authentication device of network legal power is planted, as shown in Fig. 2 including:
First obtains unit 11, the first obtains unit 11 is used to obtain user's the first reference address to be accessed, institute Stating the first reference address needs first network authority;
First judging unit 12, described first judges that single 12 yuan are used to judge whether the user has first network power Limit;
Second judging unit 13, if second judging unit 13 is used for the user and does not have first network authority, Then judge whether the user has the second network legal power, wherein the first network authority is different from second network weight Limit;
Second obtaining unit 14, if second obtaining unit 14 is used for the user and has the second network legal power, root The second reference address is obtained according to first reference address, wherein, second reference address includes the first parameter, wherein, institute Stating the first parameter is able to access that second reference address, and second reference address includes first reference address Content.
It is preferred that, described device also includes:
3rd obtaining unit, the 3rd obtaining unit is used to obtain the first publisher according to first reference address, Wherein, the authority of the content of first reference address belongs to first publisher;
4th obtaining unit, the 4th obtaining unit is used to obtain the first parameter according to first publisher.
It is preferred that, first parameter also includes:
5th obtaining unit, the 5th obtaining unit is used for the verification mode for obtaining first publisher.
It is preferred that, described device also includes:
6th obtaining unit, it is described if the 6th obtaining unit is used for the user and has first network authority User obtains the content of first reference address.
It is preferred that, described device also includes:
7th obtaining unit, if the 7th obtaining unit is used for the user and does not have second network legal power, Then the user can not obtain the content of the second model essay address.
The various change mode and instantiation of a kind of authentication method of network legal power in the embodiment 1 of earlier figures 1 are same Suitable for a kind of authentication device of network legal power of the present embodiment, by foregoing to a kind of the detailed of authentication method of network legal power Description, those skilled in the art are clear that a kind of implementation of the authentication device of network legal power in the present embodiment, So it is succinct for specification, it will not be described in detail herein.
Embodiment 3
Based on the inventive concept same with a kind of authentication method of network legal power in previous embodiment, the present invention also provides one Computer-readable recording medium is planted, computer program is stored thereon with, the program realizes described previously one when being executed by processor The step of either method for the authentication method for planting network legal power.
Wherein, in figure 3, bus architecture (being represented with bus 300), bus 300 can include any number of interconnection Bus and bridge, bus 300 is by depositing that the one or more processors including being represented by processor 302 and memory 304 are represented The various circuits of reservoir are linked together.Bus 300 can also by ancillary equipment, voltage-stablizer and management circuit etc. it Various other circuits of class are linked together, and these are all it is known in the art, therefore, no longer being carried out further to it herein Description.EBI 306 provides interface between bus 300 and receiver 301 and transmitter 303.Receiver 301 and transmitter 303 can be that there is provided the unit for being communicated over a transmission medium with various other devices for same element, i.e. transceiver.
Processor 302 is responsible for bus 300 and common processing, and memory 304 can be used to store processor 302 perform operation when used data.
Said one or multiple technical schemes in the embodiment of the present application, are at least imitated with following one or more technologies Really:
1. the authentication method and device of a kind of network legal power that the embodiment of the present application is provided, to be accessed by obtaining user First reference address, first reference address needs first network authority;Judge whether the user has first network power Limit;If the user does not have first network authority, judge whether the user has the second network legal power, wherein described First network authority is different from second network legal power;If the user has the second network legal power, according to described first Reference address obtains the second reference address, wherein, second reference address includes the first parameter, wherein, first parameter It is able to access that second reference address, second reference address includes the content of first reference address.Solve Purview certification method is inconvenient for use in the prior art, and identifying procedure is cumbersome.Cause validated user service can not be normally using money The technical problem in source.Having reached makes user automatic jump to authentication interface, and certification automatic jumps to resource interfaces after finishing.User Use simple smooth technique effect.
2. the embodiment of the present application according to first reference address by obtaining the first publisher, wherein, described first visits Ask that the authority of the content of address belongs to first publisher;First parameter, described first are obtained according to first publisher Parameter also includes the verification mode for obtaining first publisher.Purview certification method in the prior art is further solved to use Inconvenience, identifying procedure is cumbersome.Validated user service is caused can not normally to use the technical problem of resource.Further reach directly The verification mode of first publisher is supplied to user, enables the user to directly carry out authentication, so as to save The flow that cumbersome switching is searched, enable IP address not the in-house validated user of the first reference address easily, It is efficient to access required resource address, the normal technique effect using resource.
If the 3, the embodiment of the present application does not have second network legal power by the user, the user can not obtain Obtain the content of the second model essay address.The technique effect that can protect resource not by invalid user stealing is reached.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can be used in one or more computers for wherein including computer usable program code The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram are described.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which is produced, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that in meter Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, thus in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these changes and modification.

Claims (8)

1. a kind of authentication method of network legal power, it is characterised in that methods described includes:
User's the first reference address to be accessed is obtained, first reference address needs first network authority;
Judge whether the user has first network authority;
If the user does not have first network authority, judge whether the user has the second network legal power, wherein institute First network authority is stated different from second network legal power;
If the user has the second network legal power, the second reference address is obtained according to first reference address, wherein, institute The second reference address is stated including the first parameter, wherein, first parameter is able to access that second reference address, and described the Two reference address include the content of first reference address.
2. the method as described in claim 1, it is characterised in that methods described also includes:
First publisher is obtained according to first reference address, wherein, the authority of the content of first reference address belongs to First publisher;
First parameter is obtained according to first publisher.
3. the method as described in claim 1, it is characterised in that first parameter also includes:
Obtain the verification mode of first publisher.
4. the method as described in claim 1, it is characterised in that methods described also includes:If the user has the first net The content of network authority, then user's acquisition first reference address.
5. the method as described in claim 1, it is characterised in that methods described also includes:If the user is without described Second network legal power, then the user can not obtain the content of the second model essay address.
6. a kind of authentication device of network legal power, it is characterised in that described device includes:
First obtains unit, the first obtains unit is used to obtain user's the first reference address to be accessed, and described first visits Ask that address needs first network authority;
First judging unit, first judging unit is used to judge whether the user has first network authority;
Second judging unit, if second judging unit is used for the user and does not have first network authority, judges institute State whether user has the second network legal power, wherein the first network authority is different from second network legal power;
Second obtaining unit, if second obtaining unit is used for the user and has the second network legal power, according to described the One reference address obtains the second reference address, wherein, second reference address includes the first parameter, wherein, first ginseng Number is able to access that second reference address, and second reference address includes the content of first reference address.
7. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is held by processor Following steps are realized during row:
User's the first reference address to be accessed is obtained, first reference address needs first network authority;
Judge whether the user has first network authority;
If the user does not have first network authority, judge whether the user has the second network legal power, wherein institute First network authority is stated different from second network legal power;
If the user has the second network legal power, the second reference address is obtained according to first reference address, wherein, institute The second reference address is stated including the first parameter, wherein, first parameter is able to access that second reference address, and described the Two reference address include the content of first reference address.
8. a kind of authentication device of network legal power, including memory, processor and store on a memory and can be on a processor The computer program of operation, it is characterised in that realize following steps during the computing device described program:
User's the first reference address to be accessed is obtained, first reference address needs first network authority;
Judge whether the user has first network authority;
If the user does not have first network authority, judge whether the user has the second network legal power, wherein institute First network authority is stated different from second network legal power;
If the user has the second network legal power, the second reference address is obtained according to first reference address, wherein, institute The second reference address is stated including the first parameter, wherein, first parameter is able to access that second reference address, and described the Two reference address include the content of first reference address.
CN201710720018.2A 2017-08-21 2017-08-21 Network authority authentication method and device Active CN107277076B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710720018.2A CN107277076B (en) 2017-08-21 2017-08-21 Network authority authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710720018.2A CN107277076B (en) 2017-08-21 2017-08-21 Network authority authentication method and device

Publications (2)

Publication Number Publication Date
CN107277076A true CN107277076A (en) 2017-10-20
CN107277076B CN107277076B (en) 2020-07-14

Family

ID=60076357

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710720018.2A Active CN107277076B (en) 2017-08-21 2017-08-21 Network authority authentication method and device

Country Status (1)

Country Link
CN (1) CN107277076B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101458797A (en) * 2008-12-22 2009-06-17 腾讯科技(深圳)有限公司 Transaction system and method
US20130151411A1 (en) * 2011-12-09 2013-06-13 Worldpasskey, Inc. Digital authentication and security method and system
CN103618652A (en) * 2013-12-17 2014-03-05 沈阳觉醒软件有限公司 Audit and depth analysis system and audit and depth analysis method of business data
CN103701783A (en) * 2013-12-17 2014-04-02 沈阳觉醒软件有限公司 Preprocessing unit, data processing system consisting of same, and processing method
CN103906063A (en) * 2012-12-29 2014-07-02 ***通信集团福建有限公司 Terminal WLAN authentication method and terminal
CN106302303A (en) * 2015-05-11 2017-01-04 林友哲 A kind of for across application user profile transmission log in agreement operation method
CN106657052A (en) * 2016-12-16 2017-05-10 湖南国科微电子股份有限公司 Access management method and system for storage data
CN106850636A (en) * 2017-02-13 2017-06-13 深圳市沃特沃德股份有限公司 A kind of authority acquiring method, authority opening method, terminal and server

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101458797A (en) * 2008-12-22 2009-06-17 腾讯科技(深圳)有限公司 Transaction system and method
US20130151411A1 (en) * 2011-12-09 2013-06-13 Worldpasskey, Inc. Digital authentication and security method and system
CN103906063A (en) * 2012-12-29 2014-07-02 ***通信集团福建有限公司 Terminal WLAN authentication method and terminal
CN103618652A (en) * 2013-12-17 2014-03-05 沈阳觉醒软件有限公司 Audit and depth analysis system and audit and depth analysis method of business data
CN103701783A (en) * 2013-12-17 2014-04-02 沈阳觉醒软件有限公司 Preprocessing unit, data processing system consisting of same, and processing method
CN106302303A (en) * 2015-05-11 2017-01-04 林友哲 A kind of for across application user profile transmission log in agreement operation method
CN106657052A (en) * 2016-12-16 2017-05-10 湖南国科微电子股份有限公司 Access management method and system for storage data
CN106850636A (en) * 2017-02-13 2017-06-13 深圳市沃特沃德股份有限公司 A kind of authority acquiring method, authority opening method, terminal and server

Also Published As

Publication number Publication date
CN107277076B (en) 2020-07-14

Similar Documents

Publication Publication Date Title
Light et al. The walkthrough method: An approach to the study of apps
CN104603793B (en) Secure data container for web application
JP5651112B2 (en) Form entry and automatic password generation using digital ID
US20180196875A1 (en) Determining repeat website users via browser uniqueness tracking
WO2018156641A1 (en) Method for determining news veracity
CN106022826A (en) Cheating user recognition method and system in webcast platform
Yardi et al. Photo-based authentication using social networks
CN107729246A (en) For the auxiliary test methods of intended application, device, equipment and storage medium
Ausloos et al. Researching with data rights
CN110348471A (en) Exception object recognition methods, device, medium and electronic equipment
JP2007249578A (en) Attribute presumption program and attribute information providing system
CN109582560A (en) Test file edit methods, device, equipment and computer readable storage medium
Wirtz et al. A systematic method to describe and identify security threats based on functional requirements
CN113705792A (en) Personalized recommendation method, device, equipment and medium based on deep learning model
JP2006268304A (en) Contributed data evaluation device
Le et al. A crowdsourcing methodology to measure algorithmic bias in black-box systems: A case study with COVID-related searches
CN104753758B (en) A kind of information attribute recognition methods and device
CN103442016B (en) The method and system of white list are pushed based on website fingerprint
JP2006268303A (en) Contributed data evaluation system
CN111813816B (en) Data processing method, device, computer readable storage medium and computer equipment
JP6037460B2 (en) Service providing apparatus, program, and method
CN107277076A (en) The authentication method and device of a kind of network legal power
CN111008835A (en) Method, apparatus, computer-readable storage medium and computer program product for determining transaction verification node of blockchain
CN109857753A (en) User data verification method, device, electronic equipment and storage medium
JP6517521B2 (en) Intellectual Property Rating System

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant