CN110688643A - Processing method for platform identity identification and authority authentication - Google Patents
Processing method for platform identity identification and authority authentication Download PDFInfo
- Publication number
- CN110688643A CN110688643A CN201911069015.2A CN201911069015A CN110688643A CN 110688643 A CN110688643 A CN 110688643A CN 201911069015 A CN201911069015 A CN 201911069015A CN 110688643 A CN110688643 A CN 110688643A
- Authority
- CN
- China
- Prior art keywords
- user
- calling
- identity
- authority
- menu
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a processing method for platform identity identification and authority authentication, which comprises the following steps: after a user is detected to log in with a user name and a password, a background acquires user information and generates a token; according to the acquired user information, calling a function to check the identity of the user so as to verify whether the identity of the user is legal or not; after the identity of the user is verified to be legal, inquiring the role corresponding to the user and determining the access resource authority of the user; generating a tree structure authority menu; the user is presented with an authorized interface so that the user has access to, and only to, the resource for which the user is authorized. The invention solves the problems of platform user identity authentication and authority management, avoids multi-end login, prevents identity impersonation and illegal resource access, protects user information and has strong practicability.
Description
Technical Field
The invention relates to the technical field of identity verification, in particular to a processing method for platform identity identification and authority authentication.
Background
The problems of identity authentication, authority management and the like always occur in enterprises, a user account is logged in by others, multiple ends of a user log in at the same time, information leakage is caused, and authorized resources of user roles with different authorities are difficult to divide.
Disclosure of Invention
The object of the present invention is to solve at least one of the technical drawbacks mentioned.
Therefore, the invention aims to provide a processing method for platform identity identification and authority authentication.
In order to achieve the above object, an embodiment of the present invention provides a processing method for platform identity identification and authority authentication, including the following steps:
step S1, after detecting that the user logs in with the user name and the password, the background acquires the user information and generates a token;
step S2, according to the acquired user information, calling a function to check the user identity so as to verify whether the user identity is legal;
step S3, after the identity of the user is verified to be legal, the role corresponding to the user is inquired, and the access resource authority of the user is determined;
step S4, generating a tree structure authority menu;
step S5, an authorized interface is presented to the user, so that the user can access and only access the own authorized resource.
Further, in step S2, the invoking function checks the identity of the user, including the following steps:
get the Subject object by calling the securityuils.
Call subject () method, pass token parameter;
and calling an internal logic function of the shiro framework to realize user identification and password encryption comparison.
Further, in the step S2, the verifying whether the identity of the user is legal includes the following steps:
acquiring a Subject object;
a method of subject is called, and a token parameter is transmitted;
judging whether the user identity is overdue or not according to the user information;
and judging whether the user is forbidden according to the user information.
Logic, comprising the steps of:
calling a logic method of a securityManager security manager, transferring a token parameter and a generated Subject object, wherein a modular real indicator () is called to generate the authenticator object; calling the authenticator's authenticator method, passing the parameter token.
Further, the calling the authenticator method of the authenticator includes:
calling the doAuthenticate method;
calling a getmessages () method to obtain Realms ();
and calling a dosignle RealmAutomation method of the ModularRealmAutomation, and transferring a Realm object and token parameters.
Further, the invoking a dosigne real analysis method of the modular real analysis comprises:
calling the geauthentiationinfo method of realm; the token parameter is passed by calling the getAutothenationInfo method of Autothenticanggrease.
Further, the getAuthenticationInfo method of calling authenticangclearm includes:
calling a getCachedAuthentiationInfo () method, transferring a token parameter, and obtaining an AutothenationInfo object;
judging whether the AutothenationInfo object is empty or not, if the Automation object is the initial login, the information is empty,
calling a domGetAuthenticationInfo method of realm, transmitting a token parameter, and returning to an AuthenticationInfo object;
judging whether the AutothenationInfo object is empty or not, and calling an assertcredentialsMatch method to perform password matching if the AutothenationInfo object is not empty.
Further, in step S3, the determining the access resource right of the user includes the following steps:
calling a getrole and permission method to acquire a user role and a permission set thereof;
the getmenusist method is called to obtain the permission menu menusist.
Further, in the step S4, the generating the tree structure permission menu includes the following steps:
acquiring a permission menu list;
generating a tree structure resource menu;
and updating the login time and the login times of the user.
Further, the generating the tree structure resource menu includes the following steps:
constructing a tree structure menu TreeMenuVo according to the menuList parameters;
calling a build method to realize tree arrangement;
and calling a Collection method according to the ID size to realize the sequential arrangement of the menus.
In the processing method for platform identity identification and authority authentication of the embodiment of the invention, a user logs in a system by using a user name and a password; and receiving by the back end according to the user login information, calling a corresponding login function, and verifying the user identity. According to the verification information of the user identity, inquiring whether the current user is forbidden or the identity is overdue, and verifying the legality of the user identity; inquiring the current user role and the authority set thereof according to the verification information of the user identity, and generating an authority menu; generating a permission menu with a tree structure according to the inquired user permission information, and updating the login time and login times of the user; returning the user identity information and the authority set corresponding to the front end according to the verification result; and displaying the corresponding authorization function according to the user identity information and the user permission set returned by the back end.
The invention solves the problems of platform user identity authentication and authority management, avoids multi-end login, prevents identity impersonation and illegal resource access, protects user information and has strong practicability.
The invention is based on the technique of Shiro authority management, mainly solves the problems that the authentication of the user identity is realized when the user logs in, the legality of the user identity is verified, the authority authentication realizes the control of the user to access a system, the user can access and only can access the authorized resources, and the resources are displayed in a tree-shaped menu. Only one user is allowed to log in at the same time, thereby avoiding multi-terminal login and preventing identity impersonation and illegal resource access.
The embodiment of the invention provides a processing method for platform identity identification and authority authentication, a user logs in by using a user name and password mode, the back end verifies the identity of the user through shiro authority management, the method comprises the steps of using a Subject class to realize the association of user information, calling a logic method of a securityManager safety manager to realize specific identity verification, inquiring and obtaining the authorized resource authority of the user through the verification of the user identity information, storing an authority menu in a tree structure, and finally displaying the authorized function of the user at the front end. Therefore, the present invention is based on the technique of Shiro authority management. The method is used for realizing the authentication of the user identity when the user logs in, verifying the legality of the user identity, realizing the control of the user to access the system by the authority authentication, and only allowing one user to log in at the same time. The problem of platform user authentication and authority management is solved, multi-end login is avoided, counterfeit identity and illegal resource access are prevented, user information is protected, and the practicability is high.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a flow chart of a processing method of platform identification and authorization authentication according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a processing method of platform identity identification and authority authentication according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
As shown in fig. 1, the processing method for platform identity identification and authority authentication according to the embodiment of the present invention includes the following steps:
step S1, after the user is detected to log in with the user name and the password, the background acquires the user information and generates a token.
Specifically, the user opens the login website, inputs the user name and the password, and then clicks the login confirmation key. The front end transmits user information into the back end through an interface; and receiving user information to generate a token, and synthesizing a user name and password into a user name and password object.
And step S2, according to the acquired user information, calling a function to check the identity of the user so as to verify whether the identity of the user is legal.
Specifically, the step of verifying whether the user identity is legal includes: get the Subject object by calling the securityuils. Call subject () method, pass token parameter; calling an internal logic function of the shiro framework to realize user identification and password encryption comparison, and judging whether the user identity is overdue or not according to the user information; and judging whether the user is forbidden according to the user information.
Get the Subject object by calling the securityuils method, including: login's method is invoked, passing the token parameter.
A step of invoking a method of subject, comprising: and calling a logic method of the securityManager security manager, and transferring the token parameter and the generated Subject object.
The step of calling logic method of securityManager security manager includes:
calling ModularRealmAuthenticator () to generate an authenticator object;
calling the authenticator's authenticator method, passing the parameter token. A step of calling an author method of an author, comprising: the authentication method of Abstract Autothenticator is called to pass the token parameter.
A step of calling an authentite method of an abstractact authenticator, comprising: calling the doAuthenticate method; calling a getmessages () method to obtain Realms (); calling a dosignle RealmAutomation method of a modular RealmAutomation, and transferring a Realm object and a token parameter; a step of invoking a method of modular realm interpretation, comprising: calling the geauthentiationinfo method of realm; the token parameter is passed by calling the getAutothenationInfo method of Autothenticanggrease.
A step of calling getAuthenticationInfo method of autocatingtearlm, comprising: calling a getCachedAuthentiationInfo () method, transferring a token parameter, and obtaining an AutothenationInfo object; judging whether the AutothenationInfo object is empty, if the AutothenationInfo object is initially logged in, the information is empty, calling a healm DoGetAuthenationInfo method, transmitting a token parameter, and returning to the AutothenationInfo object; judging whether the AutothenationInfo object is empty or not, and calling an assertcredentialsMatch method to perform password matching if the AutothenationInfo object is not empty.
The step of calling the assertcreditialsmatch method comprises: calling getCredent Matcher () to obtain a Credent Matcher voucher matcher, and calculating and encrypting the obtained password; and judging whether the credentialed mather is empty or not, calling a doridentials math method of the credentialed mather, and transmitting the token parameter and the AutothenationInfo object.
The step of invoking the doridentialmatch method of the credentialalsatcher comprises: and calling an equals method to compare the encrypted password in the token with the password in the AutothenationInfo object taken out from the database, and returning the info to the defaultSecurityManager.
Step S3, after verifying that the identity of the user is legal, querying a role corresponding to the user, and determining the access resource authority of the user.
Specifically, the step of determining the user access resource authority includes: and judging whether the user identity is legal to acquire the user role and the authority set thereof. Then, calling a getrole and permission method to acquire a user role and a permission set thereof; the getmenusist method is called to obtain the permission menu menusist.
In step S4, a tree-structured authority menu is generated.
Specifically, a permission menu list is obtained, and a getmenelist () method is called to obtain the permission menu list. Constructing a tree menu structure, transmitting a permission menu list, and realizing the integration of the permission menu and the tree menu; calling a build function to realize tree arrangement; the menus are ordered from small to large according to the ID.
Constructing a tree structure menu TreeMenuVo according to the menuList parameters; calling a build method to realize tree arrangement; invoking a collections method according to the ID size to realize the sequential arrangement of the menus, which comprises the following steps: sort method is called to sort by ID size.
Updating user login time and login times
Step S5, an authorized interface is presented to the user, so that the user can access and only access the own authorized resource.
Specifically, the front-end page is correspondingly displayed according to the user role and the authority information thereof returned by the back end.
In the processing method for platform identity identification and authority authentication of the embodiment of the invention, a user logs in a system by using a user name and a password; and receiving by the back end according to the user login information, calling a corresponding login function, and verifying the user identity. According to the verification information of the user identity, inquiring whether the current user is forbidden or the identity is overdue, and verifying the legality of the user identity; inquiring the current user role and the authority set thereof according to the verification information of the user identity, and generating an authority menu; generating a permission menu with a tree structure according to the inquired user permission information, and updating the login time and login times of the user; returning the user identity information and the authority set corresponding to the front end according to the verification result; and displaying the corresponding authorization function according to the user identity information and the user permission set returned by the back end.
The invention solves the problems of platform user identity authentication and authority management, avoids multi-end login, prevents identity impersonation and illegal resource access, protects user information and has strong practicability.
The invention is based on the technique of Shiro authority management, mainly solves the problems that the authentication of the user identity is realized when the user logs in, the legality of the user identity is verified, the authority authentication realizes the control of the user to access a system, the user can access and only can access the authorized resources, and the resources are displayed in a tree-shaped menu. Only one user is allowed to log in at the same time, thereby avoiding multi-terminal login and preventing identity impersonation and illegal resource access.
The embodiment of the invention provides a processing method for platform identity identification and authority authentication, a user logs in by using a user name and password mode, the back end verifies the identity of the user through shiro authority management, the method comprises the steps of using a Subject class to realize the association of user information, calling a logic method of a securityManager safety manager to realize specific identity verification, inquiring and obtaining the authorized resource authority of the user through the verification of the user identity information, storing an authority menu in a tree structure, and finally displaying the authorized function of the user at the front end. Therefore, the present invention is based on the technique of Shiro authority management. The method is used for realizing the authentication of the user identity when the user logs in, verifying the legality of the user identity, realizing the control of the user to access the system by the authority authentication, and only allowing one user to log in at the same time. The problem of platform user authentication and authority management is solved, multi-end login is avoided, counterfeit identity and illegal resource access are prevented, user information is protected, and the practicability is high.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made in the above embodiments by those of ordinary skill in the art without departing from the principle and spirit of the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (10)
1. A processing method for platform identity identification and authority authentication is characterized by comprising the following steps:
step S1, after detecting that the user logs in with the user name and the password, the background acquires the user information and generates a token;
step S2, according to the acquired user information, calling a function to check the user identity so as to verify whether the user identity is legal;
step S3, after the identity of the user is verified to be legal, the role corresponding to the user is inquired, and the access resource authority of the user is determined;
step S4, generating a tree structure authority menu;
step S5, an authorized interface is presented to the user, so that the user can access and only access the own authorized resource.
2. The processing method of platform identification and authority authentication according to claim 1, wherein in the step S2, the calling function verifies the identity of the user, including the following steps:
get the Subject object by calling the securityuils.
Call subject () method, pass token parameter;
and calling an internal logic function of the shiro framework to realize user identification and password encryption comparison.
3. The processing method of platform identification and authority authentication according to claim 1, wherein in the step S2, the verifying whether the user' S identity is legal includes the following steps:
acquiring a Subject object;
a method of subject is called, and a token parameter is transmitted;
judging whether the user identity is overdue or not according to the user information;
and judging whether the user is forbidden according to the user information.
4. The method for processing platform identification and authority authentication according to claim 3, wherein the method for calling subject.
Calling a logic method of a securityManager security manager, transferring a token parameter and a generated Subject object, wherein a modular real indicator () is called to generate the authenticator object; calling the authenticator's authenticator method, passing the parameter token.
5. The method for processing platform identification and authority authentication according to claim 4, wherein the calling the authenticator authentication method comprises:
calling the doAuthenticate method;
calling a getmessages () method to obtain Realms ();
and calling a dosignle RealmAutomation method of the ModularRealmAutomation, and transferring a Realm object and token parameters.
6. The method of claim 4, wherein the invoking of the DoSingleRealmAutomation method of modular RealmAutomation comprises:
calling the geauthentiationinfo method of realm; the token parameter is passed by calling the getAutothenationInfo method of Autothenticanggrease.
7. The processing method for platform identification and privilege authentication as claimed in claim 6, wherein the invoking getAuthenticationInfo method of authenitracealmas comprises:
calling a getCachedAuthentiationInfo () method, transferring a token parameter, and obtaining an AutothenationInfo object;
judging whether the AutothenationInfo object is empty or not, if the Automation object is the initial login, the information is empty,
calling a domGetAuthenticationInfo method of realm, transmitting a token parameter, and returning to an AuthenticationInfo object;
judging whether the AutothenationInfo object is empty or not, and calling an assertcredentialsMatch method to perform password matching if the AutothenationInfo object is not empty.
8. The processing method of platform identification and authority authentication according to claim 1, wherein in the step S3, the determining the access resource authority of the user includes the following steps:
calling a getrole and permission method to acquire a user role and a permission set thereof;
the getmenusist method is called to obtain the permission menu menusist.
9. The platform identification and authority authentication processing method according to claim 1, wherein in the step S4, the generating tree-structured authority menu includes the following steps:
acquiring a permission menu list;
generating a tree structure resource menu;
and updating the login time and the login times of the user.
10. The method for processing platform identification and authority authentication of claim 9, wherein the generating the tree-structured resource menu comprises the following steps:
constructing a tree structure menu TreeMenuVo according to the menuList parameters;
calling a build method to realize tree arrangement;
and calling a Collection method according to the ID size to realize the sequential arrangement of the menus.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911069015.2A CN110688643A (en) | 2019-11-05 | 2019-11-05 | Processing method for platform identity identification and authority authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911069015.2A CN110688643A (en) | 2019-11-05 | 2019-11-05 | Processing method for platform identity identification and authority authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110688643A true CN110688643A (en) | 2020-01-14 |
Family
ID=69116181
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911069015.2A Pending CN110688643A (en) | 2019-11-05 | 2019-11-05 | Processing method for platform identity identification and authority authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110688643A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111488095A (en) * | 2020-04-07 | 2020-08-04 | 中国人民财产保险股份有限公司 | User login management method and device |
CN112069475A (en) * | 2020-09-14 | 2020-12-11 | 杭州熙菱信息技术有限公司 | Identity safety management system |
CN112118237A (en) * | 2020-09-04 | 2020-12-22 | 紫光云(南京)数字技术有限公司 | Resource access management method |
CN112307446A (en) * | 2020-10-30 | 2021-02-02 | 杭州当虹科技股份有限公司 | User authority verification method based on application platform |
CN112446047A (en) * | 2020-11-26 | 2021-03-05 | 长沙树根互联技术有限公司 | Data processing method and device, server and storage medium |
CN112818361A (en) * | 2021-01-21 | 2021-05-18 | 广州汇通国信科技有限公司 | Platform authority resource and project authority resource independent double-authority method and device |
CN113660192A (en) * | 2021-06-23 | 2021-11-16 | 云南昆钢电子信息科技有限公司 | Web system identity authentication system and method |
CN113792310A (en) * | 2021-09-01 | 2021-12-14 | 百融至信(北京)征信有限公司 | Automatic data matching system and method |
CN114995879A (en) * | 2022-06-28 | 2022-09-02 | 北京慧点科技有限公司 | Information processing method and system based on low-coding platform |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000308479A (en) * | 1999-04-27 | 2000-11-07 | Hitachi Zosen Corp | Method and apparatus for detecting blurry part of welsh onion |
CN101436195A (en) * | 2008-10-30 | 2009-05-20 | 东软集团股份有限公司 | Method and system for generating resource access entrance in Web user interface |
CN103701801A (en) * | 2013-12-26 | 2014-04-02 | 四川九洲电器集团有限责任公司 | Resource access control method |
CN104363211A (en) * | 2014-10-31 | 2015-02-18 | 北京思特奇信息技术股份有限公司 | Method and system for managing authority |
CN107423223A (en) * | 2017-08-10 | 2017-12-01 | 中国民航信息网络股份有限公司 | Test and management system |
CN109669718A (en) * | 2018-09-26 | 2019-04-23 | 深圳壹账通智能科技有限公司 | System permission configuration method, device, equipment and storage medium |
CN110096858A (en) * | 2019-05-20 | 2019-08-06 | 云南电网有限责任公司带电作业分公司 | Livewire work storehouse Rights Management System |
CN110287660A (en) * | 2019-05-21 | 2019-09-27 | 深圳壹账通智能科技有限公司 | Access right control method, device, equipment and storage medium |
-
2019
- 2019-11-05 CN CN201911069015.2A patent/CN110688643A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000308479A (en) * | 1999-04-27 | 2000-11-07 | Hitachi Zosen Corp | Method and apparatus for detecting blurry part of welsh onion |
CN101436195A (en) * | 2008-10-30 | 2009-05-20 | 东软集团股份有限公司 | Method and system for generating resource access entrance in Web user interface |
CN103701801A (en) * | 2013-12-26 | 2014-04-02 | 四川九洲电器集团有限责任公司 | Resource access control method |
CN104363211A (en) * | 2014-10-31 | 2015-02-18 | 北京思特奇信息技术股份有限公司 | Method and system for managing authority |
CN107423223A (en) * | 2017-08-10 | 2017-12-01 | 中国民航信息网络股份有限公司 | Test and management system |
CN109669718A (en) * | 2018-09-26 | 2019-04-23 | 深圳壹账通智能科技有限公司 | System permission configuration method, device, equipment and storage medium |
CN110096858A (en) * | 2019-05-20 | 2019-08-06 | 云南电网有限责任公司带电作业分公司 | Livewire work storehouse Rights Management System |
CN110287660A (en) * | 2019-05-21 | 2019-09-27 | 深圳壹账通智能科技有限公司 | Access right control method, device, equipment and storage medium |
Non-Patent Citations (2)
Title |
---|
ACHERIE: "Shiro登录认证源码详解", 《HTTPS://BLOG.CSDN.NET/W1196726224/ARTICLE/DETAILS/53560385》 * |
LACKER: "shiro实现APP、web统一登录认证和权限管理", 《HTTPS://BLOG.CSDN.NET/ZCH1990S/ARTICLE/DETAILS/88836104》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111488095A (en) * | 2020-04-07 | 2020-08-04 | 中国人民财产保险股份有限公司 | User login management method and device |
CN112118237A (en) * | 2020-09-04 | 2020-12-22 | 紫光云(南京)数字技术有限公司 | Resource access management method |
CN112069475A (en) * | 2020-09-14 | 2020-12-11 | 杭州熙菱信息技术有限公司 | Identity safety management system |
CN112069475B (en) * | 2020-09-14 | 2023-10-24 | 杭州领信数科信息技术有限公司 | Identity security management system |
CN112307446A (en) * | 2020-10-30 | 2021-02-02 | 杭州当虹科技股份有限公司 | User authority verification method based on application platform |
CN112446047A (en) * | 2020-11-26 | 2021-03-05 | 长沙树根互联技术有限公司 | Data processing method and device, server and storage medium |
CN112818361A (en) * | 2021-01-21 | 2021-05-18 | 广州汇通国信科技有限公司 | Platform authority resource and project authority resource independent double-authority method and device |
CN113660192A (en) * | 2021-06-23 | 2021-11-16 | 云南昆钢电子信息科技有限公司 | Web system identity authentication system and method |
CN113792310A (en) * | 2021-09-01 | 2021-12-14 | 百融至信(北京)征信有限公司 | Automatic data matching system and method |
CN114995879A (en) * | 2022-06-28 | 2022-09-02 | 北京慧点科技有限公司 | Information processing method and system based on low-coding platform |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110688643A (en) | Processing method for platform identity identification and authority authentication | |
CN105763521B (en) | A kind of device authentication method and device | |
US8151328B1 (en) | Accessing secure network areas by utilizing mobile-device authentication | |
US8572689B2 (en) | Apparatus and method for making access decision using exceptions | |
US8726339B2 (en) | Method and apparatus for emergency session validation | |
US8572714B2 (en) | Apparatus and method for determining subject assurance level | |
US8752123B2 (en) | Apparatus and method for performing data tokenization | |
CN107231346A (en) | A kind of method of cloud platform identification | |
US8752124B2 (en) | Apparatus and method for performing real-time authentication using subject token combinations | |
CN102144193B (en) | Method for granting authorization to access a computer-based object in an automation system, computer program, and automation system | |
CN109448271A (en) | A kind of no card withdrawal method, computer readable storage medium and server | |
CN112187931A (en) | Session management method, device, computer equipment and storage medium | |
US8726341B2 (en) | Apparatus and method for determining resource trust levels | |
CN107196943B (en) | A kind of security display implementation method of private data in third-party platform | |
US20130047245A1 (en) | Apparatus and Method for Performing Session Validation to Access Confidential Resources | |
CN108920919A (en) | Control method, the device and system of interactive intelligence equipment | |
CN103428698B (en) | Mobile interchange participant's identity strong authentication method | |
EP3407241B1 (en) | User authentication and authorization system for a mobile application | |
US8584202B2 (en) | Apparatus and method for determining environment integrity levels | |
WO2007038283A2 (en) | Web page approval and authentication application incorporating multi-factor user authentication component | |
CN105071993B (en) | Encrypted state detection method and system | |
US7134017B2 (en) | Method for providing a trusted path between a client and a system | |
US9159065B2 (en) | Method and apparatus for object security session validation | |
US8584201B2 (en) | Method and apparatus for session validation to access from uncontrolled devices | |
CN108809904A (en) | A kind of checking method and system of domain name registration |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200114 |
|
RJ01 | Rejection of invention patent application after publication |