CN110688643A - Processing method for platform identity identification and authority authentication - Google Patents

Processing method for platform identity identification and authority authentication Download PDF

Info

Publication number
CN110688643A
CN110688643A CN201911069015.2A CN201911069015A CN110688643A CN 110688643 A CN110688643 A CN 110688643A CN 201911069015 A CN201911069015 A CN 201911069015A CN 110688643 A CN110688643 A CN 110688643A
Authority
CN
China
Prior art keywords
user
calling
identity
authority
menu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911069015.2A
Other languages
Chinese (zh)
Inventor
崔晶晶
张小雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING GEO POLYMERIZATION TECHNOLOGY Co Ltd
Original Assignee
BEIJING GEO POLYMERIZATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING GEO POLYMERIZATION TECHNOLOGY Co Ltd filed Critical BEIJING GEO POLYMERIZATION TECHNOLOGY Co Ltd
Priority to CN201911069015.2A priority Critical patent/CN110688643A/en
Publication of CN110688643A publication Critical patent/CN110688643A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a processing method for platform identity identification and authority authentication, which comprises the following steps: after a user is detected to log in with a user name and a password, a background acquires user information and generates a token; according to the acquired user information, calling a function to check the identity of the user so as to verify whether the identity of the user is legal or not; after the identity of the user is verified to be legal, inquiring the role corresponding to the user and determining the access resource authority of the user; generating a tree structure authority menu; the user is presented with an authorized interface so that the user has access to, and only to, the resource for which the user is authorized. The invention solves the problems of platform user identity authentication and authority management, avoids multi-end login, prevents identity impersonation and illegal resource access, protects user information and has strong practicability.

Description

Processing method for platform identity identification and authority authentication
Technical Field
The invention relates to the technical field of identity verification, in particular to a processing method for platform identity identification and authority authentication.
Background
The problems of identity authentication, authority management and the like always occur in enterprises, a user account is logged in by others, multiple ends of a user log in at the same time, information leakage is caused, and authorized resources of user roles with different authorities are difficult to divide.
Disclosure of Invention
The object of the present invention is to solve at least one of the technical drawbacks mentioned.
Therefore, the invention aims to provide a processing method for platform identity identification and authority authentication.
In order to achieve the above object, an embodiment of the present invention provides a processing method for platform identity identification and authority authentication, including the following steps:
step S1, after detecting that the user logs in with the user name and the password, the background acquires the user information and generates a token;
step S2, according to the acquired user information, calling a function to check the user identity so as to verify whether the user identity is legal;
step S3, after the identity of the user is verified to be legal, the role corresponding to the user is inquired, and the access resource authority of the user is determined;
step S4, generating a tree structure authority menu;
step S5, an authorized interface is presented to the user, so that the user can access and only access the own authorized resource.
Further, in step S2, the invoking function checks the identity of the user, including the following steps:
get the Subject object by calling the securityuils.
Call subject () method, pass token parameter;
and calling an internal logic function of the shiro framework to realize user identification and password encryption comparison.
Further, in the step S2, the verifying whether the identity of the user is legal includes the following steps:
acquiring a Subject object;
a method of subject is called, and a token parameter is transmitted;
judging whether the user identity is overdue or not according to the user information;
and judging whether the user is forbidden according to the user information.
Logic, comprising the steps of:
calling a logic method of a securityManager security manager, transferring a token parameter and a generated Subject object, wherein a modular real indicator () is called to generate the authenticator object; calling the authenticator's authenticator method, passing the parameter token.
Further, the calling the authenticator method of the authenticator includes:
calling the doAuthenticate method;
calling a getmessages () method to obtain Realms ();
and calling a dosignle RealmAutomation method of the ModularRealmAutomation, and transferring a Realm object and token parameters.
Further, the invoking a dosigne real analysis method of the modular real analysis comprises:
calling the geauthentiationinfo method of realm; the token parameter is passed by calling the getAutothenationInfo method of Autothenticanggrease.
Further, the getAuthenticationInfo method of calling authenticangclearm includes:
calling a getCachedAuthentiationInfo () method, transferring a token parameter, and obtaining an AutothenationInfo object;
judging whether the AutothenationInfo object is empty or not, if the Automation object is the initial login, the information is empty,
calling a domGetAuthenticationInfo method of realm, transmitting a token parameter, and returning to an AuthenticationInfo object;
judging whether the AutothenationInfo object is empty or not, and calling an assertcredentialsMatch method to perform password matching if the AutothenationInfo object is not empty.
Further, in step S3, the determining the access resource right of the user includes the following steps:
calling a getrole and permission method to acquire a user role and a permission set thereof;
the getmenusist method is called to obtain the permission menu menusist.
Further, in the step S4, the generating the tree structure permission menu includes the following steps:
acquiring a permission menu list;
generating a tree structure resource menu;
and updating the login time and the login times of the user.
Further, the generating the tree structure resource menu includes the following steps:
constructing a tree structure menu TreeMenuVo according to the menuList parameters;
calling a build method to realize tree arrangement;
and calling a Collection method according to the ID size to realize the sequential arrangement of the menus.
In the processing method for platform identity identification and authority authentication of the embodiment of the invention, a user logs in a system by using a user name and a password; and receiving by the back end according to the user login information, calling a corresponding login function, and verifying the user identity. According to the verification information of the user identity, inquiring whether the current user is forbidden or the identity is overdue, and verifying the legality of the user identity; inquiring the current user role and the authority set thereof according to the verification information of the user identity, and generating an authority menu; generating a permission menu with a tree structure according to the inquired user permission information, and updating the login time and login times of the user; returning the user identity information and the authority set corresponding to the front end according to the verification result; and displaying the corresponding authorization function according to the user identity information and the user permission set returned by the back end.
The invention solves the problems of platform user identity authentication and authority management, avoids multi-end login, prevents identity impersonation and illegal resource access, protects user information and has strong practicability.
The invention is based on the technique of Shiro authority management, mainly solves the problems that the authentication of the user identity is realized when the user logs in, the legality of the user identity is verified, the authority authentication realizes the control of the user to access a system, the user can access and only can access the authorized resources, and the resources are displayed in a tree-shaped menu. Only one user is allowed to log in at the same time, thereby avoiding multi-terminal login and preventing identity impersonation and illegal resource access.
The embodiment of the invention provides a processing method for platform identity identification and authority authentication, a user logs in by using a user name and password mode, the back end verifies the identity of the user through shiro authority management, the method comprises the steps of using a Subject class to realize the association of user information, calling a logic method of a securityManager safety manager to realize specific identity verification, inquiring and obtaining the authorized resource authority of the user through the verification of the user identity information, storing an authority menu in a tree structure, and finally displaying the authorized function of the user at the front end. Therefore, the present invention is based on the technique of Shiro authority management. The method is used for realizing the authentication of the user identity when the user logs in, verifying the legality of the user identity, realizing the control of the user to access the system by the authority authentication, and only allowing one user to log in at the same time. The problem of platform user authentication and authority management is solved, multi-end login is avoided, counterfeit identity and illegal resource access are prevented, user information is protected, and the practicability is high.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a flow chart of a processing method of platform identification and authorization authentication according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a processing method of platform identity identification and authority authentication according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
As shown in fig. 1, the processing method for platform identity identification and authority authentication according to the embodiment of the present invention includes the following steps:
step S1, after the user is detected to log in with the user name and the password, the background acquires the user information and generates a token.
Specifically, the user opens the login website, inputs the user name and the password, and then clicks the login confirmation key. The front end transmits user information into the back end through an interface; and receiving user information to generate a token, and synthesizing a user name and password into a user name and password object.
And step S2, according to the acquired user information, calling a function to check the identity of the user so as to verify whether the identity of the user is legal.
Specifically, the step of verifying whether the user identity is legal includes: get the Subject object by calling the securityuils. Call subject () method, pass token parameter; calling an internal logic function of the shiro framework to realize user identification and password encryption comparison, and judging whether the user identity is overdue or not according to the user information; and judging whether the user is forbidden according to the user information.
Get the Subject object by calling the securityuils method, including: login's method is invoked, passing the token parameter.
A step of invoking a method of subject, comprising: and calling a logic method of the securityManager security manager, and transferring the token parameter and the generated Subject object.
The step of calling logic method of securityManager security manager includes:
calling ModularRealmAuthenticator () to generate an authenticator object;
calling the authenticator's authenticator method, passing the parameter token. A step of calling an author method of an author, comprising: the authentication method of Abstract Autothenticator is called to pass the token parameter.
A step of calling an authentite method of an abstractact authenticator, comprising: calling the doAuthenticate method; calling a getmessages () method to obtain Realms (); calling a dosignle RealmAutomation method of a modular RealmAutomation, and transferring a Realm object and a token parameter; a step of invoking a method of modular realm interpretation, comprising: calling the geauthentiationinfo method of realm; the token parameter is passed by calling the getAutothenationInfo method of Autothenticanggrease.
A step of calling getAuthenticationInfo method of autocatingtearlm, comprising: calling a getCachedAuthentiationInfo () method, transferring a token parameter, and obtaining an AutothenationInfo object; judging whether the AutothenationInfo object is empty, if the AutothenationInfo object is initially logged in, the information is empty, calling a healm DoGetAuthenationInfo method, transmitting a token parameter, and returning to the AutothenationInfo object; judging whether the AutothenationInfo object is empty or not, and calling an assertcredentialsMatch method to perform password matching if the AutothenationInfo object is not empty.
The step of calling the assertcreditialsmatch method comprises: calling getCredent Matcher () to obtain a Credent Matcher voucher matcher, and calculating and encrypting the obtained password; and judging whether the credentialed mather is empty or not, calling a doridentials math method of the credentialed mather, and transmitting the token parameter and the AutothenationInfo object.
The step of invoking the doridentialmatch method of the credentialalsatcher comprises: and calling an equals method to compare the encrypted password in the token with the password in the AutothenationInfo object taken out from the database, and returning the info to the defaultSecurityManager.
Step S3, after verifying that the identity of the user is legal, querying a role corresponding to the user, and determining the access resource authority of the user.
Specifically, the step of determining the user access resource authority includes: and judging whether the user identity is legal to acquire the user role and the authority set thereof. Then, calling a getrole and permission method to acquire a user role and a permission set thereof; the getmenusist method is called to obtain the permission menu menusist.
In step S4, a tree-structured authority menu is generated.
Specifically, a permission menu list is obtained, and a getmenelist () method is called to obtain the permission menu list. Constructing a tree menu structure, transmitting a permission menu list, and realizing the integration of the permission menu and the tree menu; calling a build function to realize tree arrangement; the menus are ordered from small to large according to the ID.
Constructing a tree structure menu TreeMenuVo according to the menuList parameters; calling a build method to realize tree arrangement; invoking a collections method according to the ID size to realize the sequential arrangement of the menus, which comprises the following steps: sort method is called to sort by ID size.
Updating user login time and login times
Step S5, an authorized interface is presented to the user, so that the user can access and only access the own authorized resource.
Specifically, the front-end page is correspondingly displayed according to the user role and the authority information thereof returned by the back end.
In the processing method for platform identity identification and authority authentication of the embodiment of the invention, a user logs in a system by using a user name and a password; and receiving by the back end according to the user login information, calling a corresponding login function, and verifying the user identity. According to the verification information of the user identity, inquiring whether the current user is forbidden or the identity is overdue, and verifying the legality of the user identity; inquiring the current user role and the authority set thereof according to the verification information of the user identity, and generating an authority menu; generating a permission menu with a tree structure according to the inquired user permission information, and updating the login time and login times of the user; returning the user identity information and the authority set corresponding to the front end according to the verification result; and displaying the corresponding authorization function according to the user identity information and the user permission set returned by the back end.
The invention solves the problems of platform user identity authentication and authority management, avoids multi-end login, prevents identity impersonation and illegal resource access, protects user information and has strong practicability.
The invention is based on the technique of Shiro authority management, mainly solves the problems that the authentication of the user identity is realized when the user logs in, the legality of the user identity is verified, the authority authentication realizes the control of the user to access a system, the user can access and only can access the authorized resources, and the resources are displayed in a tree-shaped menu. Only one user is allowed to log in at the same time, thereby avoiding multi-terminal login and preventing identity impersonation and illegal resource access.
The embodiment of the invention provides a processing method for platform identity identification and authority authentication, a user logs in by using a user name and password mode, the back end verifies the identity of the user through shiro authority management, the method comprises the steps of using a Subject class to realize the association of user information, calling a logic method of a securityManager safety manager to realize specific identity verification, inquiring and obtaining the authorized resource authority of the user through the verification of the user identity information, storing an authority menu in a tree structure, and finally displaying the authorized function of the user at the front end. Therefore, the present invention is based on the technique of Shiro authority management. The method is used for realizing the authentication of the user identity when the user logs in, verifying the legality of the user identity, realizing the control of the user to access the system by the authority authentication, and only allowing one user to log in at the same time. The problem of platform user authentication and authority management is solved, multi-end login is avoided, counterfeit identity and illegal resource access are prevented, user information is protected, and the practicability is high.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made in the above embodiments by those of ordinary skill in the art without departing from the principle and spirit of the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (10)

1. A processing method for platform identity identification and authority authentication is characterized by comprising the following steps:
step S1, after detecting that the user logs in with the user name and the password, the background acquires the user information and generates a token;
step S2, according to the acquired user information, calling a function to check the user identity so as to verify whether the user identity is legal;
step S3, after the identity of the user is verified to be legal, the role corresponding to the user is inquired, and the access resource authority of the user is determined;
step S4, generating a tree structure authority menu;
step S5, an authorized interface is presented to the user, so that the user can access and only access the own authorized resource.
2. The processing method of platform identification and authority authentication according to claim 1, wherein in the step S2, the calling function verifies the identity of the user, including the following steps:
get the Subject object by calling the securityuils.
Call subject () method, pass token parameter;
and calling an internal logic function of the shiro framework to realize user identification and password encryption comparison.
3. The processing method of platform identification and authority authentication according to claim 1, wherein in the step S2, the verifying whether the user' S identity is legal includes the following steps:
acquiring a Subject object;
a method of subject is called, and a token parameter is transmitted;
judging whether the user identity is overdue or not according to the user information;
and judging whether the user is forbidden according to the user information.
4. The method for processing platform identification and authority authentication according to claim 3, wherein the method for calling subject.
Calling a logic method of a securityManager security manager, transferring a token parameter and a generated Subject object, wherein a modular real indicator () is called to generate the authenticator object; calling the authenticator's authenticator method, passing the parameter token.
5. The method for processing platform identification and authority authentication according to claim 4, wherein the calling the authenticator authentication method comprises:
calling the doAuthenticate method;
calling a getmessages () method to obtain Realms ();
and calling a dosignle RealmAutomation method of the ModularRealmAutomation, and transferring a Realm object and token parameters.
6. The method of claim 4, wherein the invoking of the DoSingleRealmAutomation method of modular RealmAutomation comprises:
calling the geauthentiationinfo method of realm; the token parameter is passed by calling the getAutothenationInfo method of Autothenticanggrease.
7. The processing method for platform identification and privilege authentication as claimed in claim 6, wherein the invoking getAuthenticationInfo method of authenitracealmas comprises:
calling a getCachedAuthentiationInfo () method, transferring a token parameter, and obtaining an AutothenationInfo object;
judging whether the AutothenationInfo object is empty or not, if the Automation object is the initial login, the information is empty,
calling a domGetAuthenticationInfo method of realm, transmitting a token parameter, and returning to an AuthenticationInfo object;
judging whether the AutothenationInfo object is empty or not, and calling an assertcredentialsMatch method to perform password matching if the AutothenationInfo object is not empty.
8. The processing method of platform identification and authority authentication according to claim 1, wherein in the step S3, the determining the access resource authority of the user includes the following steps:
calling a getrole and permission method to acquire a user role and a permission set thereof;
the getmenusist method is called to obtain the permission menu menusist.
9. The platform identification and authority authentication processing method according to claim 1, wherein in the step S4, the generating tree-structured authority menu includes the following steps:
acquiring a permission menu list;
generating a tree structure resource menu;
and updating the login time and the login times of the user.
10. The method for processing platform identification and authority authentication of claim 9, wherein the generating the tree-structured resource menu comprises the following steps:
constructing a tree structure menu TreeMenuVo according to the menuList parameters;
calling a build method to realize tree arrangement;
and calling a Collection method according to the ID size to realize the sequential arrangement of the menus.
CN201911069015.2A 2019-11-05 2019-11-05 Processing method for platform identity identification and authority authentication Pending CN110688643A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911069015.2A CN110688643A (en) 2019-11-05 2019-11-05 Processing method for platform identity identification and authority authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911069015.2A CN110688643A (en) 2019-11-05 2019-11-05 Processing method for platform identity identification and authority authentication

Publications (1)

Publication Number Publication Date
CN110688643A true CN110688643A (en) 2020-01-14

Family

ID=69116181

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911069015.2A Pending CN110688643A (en) 2019-11-05 2019-11-05 Processing method for platform identity identification and authority authentication

Country Status (1)

Country Link
CN (1) CN110688643A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111488095A (en) * 2020-04-07 2020-08-04 中国人民财产保险股份有限公司 User login management method and device
CN112069475A (en) * 2020-09-14 2020-12-11 杭州熙菱信息技术有限公司 Identity safety management system
CN112118237A (en) * 2020-09-04 2020-12-22 紫光云(南京)数字技术有限公司 Resource access management method
CN112307446A (en) * 2020-10-30 2021-02-02 杭州当虹科技股份有限公司 User authority verification method based on application platform
CN112446047A (en) * 2020-11-26 2021-03-05 长沙树根互联技术有限公司 Data processing method and device, server and storage medium
CN112818361A (en) * 2021-01-21 2021-05-18 广州汇通国信科技有限公司 Platform authority resource and project authority resource independent double-authority method and device
CN113660192A (en) * 2021-06-23 2021-11-16 云南昆钢电子信息科技有限公司 Web system identity authentication system and method
CN113792310A (en) * 2021-09-01 2021-12-14 百融至信(北京)征信有限公司 Automatic data matching system and method
CN114995879A (en) * 2022-06-28 2022-09-02 北京慧点科技有限公司 Information processing method and system based on low-coding platform

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000308479A (en) * 1999-04-27 2000-11-07 Hitachi Zosen Corp Method and apparatus for detecting blurry part of welsh onion
CN101436195A (en) * 2008-10-30 2009-05-20 东软集团股份有限公司 Method and system for generating resource access entrance in Web user interface
CN103701801A (en) * 2013-12-26 2014-04-02 四川九洲电器集团有限责任公司 Resource access control method
CN104363211A (en) * 2014-10-31 2015-02-18 北京思特奇信息技术股份有限公司 Method and system for managing authority
CN107423223A (en) * 2017-08-10 2017-12-01 中国民航信息网络股份有限公司 Test and management system
CN109669718A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 System permission configuration method, device, equipment and storage medium
CN110096858A (en) * 2019-05-20 2019-08-06 云南电网有限责任公司带电作业分公司 Livewire work storehouse Rights Management System
CN110287660A (en) * 2019-05-21 2019-09-27 深圳壹账通智能科技有限公司 Access right control method, device, equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000308479A (en) * 1999-04-27 2000-11-07 Hitachi Zosen Corp Method and apparatus for detecting blurry part of welsh onion
CN101436195A (en) * 2008-10-30 2009-05-20 东软集团股份有限公司 Method and system for generating resource access entrance in Web user interface
CN103701801A (en) * 2013-12-26 2014-04-02 四川九洲电器集团有限责任公司 Resource access control method
CN104363211A (en) * 2014-10-31 2015-02-18 北京思特奇信息技术股份有限公司 Method and system for managing authority
CN107423223A (en) * 2017-08-10 2017-12-01 中国民航信息网络股份有限公司 Test and management system
CN109669718A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 System permission configuration method, device, equipment and storage medium
CN110096858A (en) * 2019-05-20 2019-08-06 云南电网有限责任公司带电作业分公司 Livewire work storehouse Rights Management System
CN110287660A (en) * 2019-05-21 2019-09-27 深圳壹账通智能科技有限公司 Access right control method, device, equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ACHERIE: "Shiro登录认证源码详解", 《HTTPS://BLOG.CSDN.NET/W1196726224/ARTICLE/DETAILS/53560385》 *
LACKER: "shiro实现APP、web统一登录认证和权限管理", 《HTTPS://BLOG.CSDN.NET/ZCH1990S/ARTICLE/DETAILS/88836104》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111488095A (en) * 2020-04-07 2020-08-04 中国人民财产保险股份有限公司 User login management method and device
CN112118237A (en) * 2020-09-04 2020-12-22 紫光云(南京)数字技术有限公司 Resource access management method
CN112069475A (en) * 2020-09-14 2020-12-11 杭州熙菱信息技术有限公司 Identity safety management system
CN112069475B (en) * 2020-09-14 2023-10-24 杭州领信数科信息技术有限公司 Identity security management system
CN112307446A (en) * 2020-10-30 2021-02-02 杭州当虹科技股份有限公司 User authority verification method based on application platform
CN112446047A (en) * 2020-11-26 2021-03-05 长沙树根互联技术有限公司 Data processing method and device, server and storage medium
CN112818361A (en) * 2021-01-21 2021-05-18 广州汇通国信科技有限公司 Platform authority resource and project authority resource independent double-authority method and device
CN113660192A (en) * 2021-06-23 2021-11-16 云南昆钢电子信息科技有限公司 Web system identity authentication system and method
CN113792310A (en) * 2021-09-01 2021-12-14 百融至信(北京)征信有限公司 Automatic data matching system and method
CN114995879A (en) * 2022-06-28 2022-09-02 北京慧点科技有限公司 Information processing method and system based on low-coding platform

Similar Documents

Publication Publication Date Title
CN110688643A (en) Processing method for platform identity identification and authority authentication
CN105763521B (en) A kind of device authentication method and device
US8151328B1 (en) Accessing secure network areas by utilizing mobile-device authentication
US8572689B2 (en) Apparatus and method for making access decision using exceptions
US8726339B2 (en) Method and apparatus for emergency session validation
US8572714B2 (en) Apparatus and method for determining subject assurance level
US8752123B2 (en) Apparatus and method for performing data tokenization
CN107231346A (en) A kind of method of cloud platform identification
US8752124B2 (en) Apparatus and method for performing real-time authentication using subject token combinations
CN102144193B (en) Method for granting authorization to access a computer-based object in an automation system, computer program, and automation system
CN109448271A (en) A kind of no card withdrawal method, computer readable storage medium and server
CN112187931A (en) Session management method, device, computer equipment and storage medium
US8726341B2 (en) Apparatus and method for determining resource trust levels
CN107196943B (en) A kind of security display implementation method of private data in third-party platform
US20130047245A1 (en) Apparatus and Method for Performing Session Validation to Access Confidential Resources
CN108920919A (en) Control method, the device and system of interactive intelligence equipment
CN103428698B (en) Mobile interchange participant's identity strong authentication method
EP3407241B1 (en) User authentication and authorization system for a mobile application
US8584202B2 (en) Apparatus and method for determining environment integrity levels
WO2007038283A2 (en) Web page approval and authentication application incorporating multi-factor user authentication component
CN105071993B (en) Encrypted state detection method and system
US7134017B2 (en) Method for providing a trusted path between a client and a system
US9159065B2 (en) Method and apparatus for object security session validation
US8584201B2 (en) Method and apparatus for session validation to access from uncontrolled devices
CN108809904A (en) A kind of checking method and system of domain name registration

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200114

RJ01 Rejection of invention patent application after publication