CN112332993A - Industrial cloud application store system authentication method and system based on U-currency integration - Google Patents

Industrial cloud application store system authentication method and system based on U-currency integration Download PDF

Info

Publication number
CN112332993A
CN112332993A CN202011208722.8A CN202011208722A CN112332993A CN 112332993 A CN112332993 A CN 112332993A CN 202011208722 A CN202011208722 A CN 202011208722A CN 112332993 A CN112332993 A CN 112332993A
Authority
CN
China
Prior art keywords
login request
user information
user
party application
receiving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011208722.8A
Other languages
Chinese (zh)
Inventor
赵铭远
李大斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ziguang Cloud Engine Technology Suzhou Co Ltd
Original Assignee
Ziguang Cloud Engine Technology Suzhou Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ziguang Cloud Engine Technology Suzhou Co Ltd filed Critical Ziguang Cloud Engine Technology Suzhou Co Ltd
Priority to CN202011208722.8A priority Critical patent/CN112332993A/en
Publication of CN112332993A publication Critical patent/CN112332993A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Medical Informatics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for providing industrial cloud application store system authentication based on U-currency integration, wherein the method comprises the following steps: receiving at least one login request or a user login request through a third-party application; performing security authentication on the login request, and if the login request passes the security authentication, allowing the cloud application store system to be accessed; and receiving user information, and processing the user information according to the login request. Therefore, by adopting a unified single sign-on mechanism, the account login process of a user is simplified, the safety of the account and the password is protected, and the unified management of the account is realized.

Description

Industrial cloud application store system authentication method and system based on U-currency integration
Technical Field
The invention relates to the technical field of industrial internet security, in particular to a method and a system for providing industrial cloud application store system authentication based on U-currency integration.
Background
At present, an industrial cloud application store mainly provides SaaS type applications, a terminal user selects a required application through the cloud application store, applies a U application to deploy the application, passes through the examination and approval of a management end, generates an access address, an account and a password of the application, issues the application to the user, and the user logs in an application system through the access.
The industrial cloud application store provides relatively single application types, if multiple types of applications (downloading type, SaaS type, downloading type and the like) need to be supported, the complexity of the system is increased, meanwhile, great hidden dangers exist in the safety and stability of the system, and in addition, when a user applies for multiple applications, the problems that repeated verification is needed for logging in each application system for multiple times exist.
Aiming at the situation, the invention provides the authentication method and the authentication system for the industrial cloud application store system based on the U-currency integral, which can effectively improve the prior art and overcome the defects of the prior art.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a method and a system for providing an industrial cloud application store system authentication based on U-currency integration, aiming at solving the problems in the prior art, and the specific scheme is as follows:
in a first aspect, the invention provides an industrial cloud application store system authentication method based on U-currency integration, which is characterized by comprising the following steps:
receiving at least one login request;
performing security authentication on the login request, and if the login request passes the security authentication, allowing the cloud application store system to be accessed;
and receiving user information, and processing the user information according to the login request.
Preferably, the login request carries the user information, the user information is received, and the user information is processed according to the login request, the method includes:
and the main system encrypts the user information to obtain Token and sends the Token to the sub-application.
Preferably, the method further comprises:
the subsystem receives the Token and decrypts the Token to acquire the user information;
and the subsystem verifies whether the user exists or not according to the user information, if not, stores the user information and gives the user initial role and authority.
Preferably, the method further comprises:
and the subsystem verifies whether the user exists or not according to the user information, and if so, uses the existing role and authority of the user in the sub-application.
In a second aspect, the invention provides a method for providing authentication of an industrial cloud application store system based on a U-currency integral, which is characterized by comprising the following steps:
receiving a user login request through a third-party application;
performing security authentication on the login request, and if the login request passes the security authentication, allowing the cloud application store system to be accessed;
and receiving user information, and processing the user information according to the login request.
Preferably, the login request carries third party application information and user information, the user information is received, and the user information is processed according to the login request, the method includes:
and the host system verifies the third-party application login request, and returns an authorization code to the third-party application if the verification is passed.
Preferably, the third party application information includes: client identification, client password username and password.
Preferably, the method further comprises:
the third party application exchanges the user for effective access to Token from the main system through the authorization code;
the third-party application acquires user information from the main system by using a user effective access Token;
and the third-party application verifies whether the user exists or not according to the user information, if not, stores the user information and gives the user initial role and authority.
Preferably, the method further comprises:
and the third-party application verifies whether the user exists according to the user information, and if so, uses the existing role and authority of the user in the third-party application.
In a third aspect, the present invention provides an industrial cloud application store system authentication system based on a U-currency score, the system comprising:
the receiving module is used for receiving at least one login request or receiving a user login request through a third-party application;
the authentication module is used for carrying out security authentication on the login request, and if the login request passes the security authentication, the cloud application store system is allowed to be accessed;
and the processing module is used for receiving the user information and processing the user information according to the login request.
In a fourth aspect, the present invention provides an industrial cloud application store system authentication system based on a U-currency score, the system comprising:
the communication bus is used for realizing the connection communication between the processor and the memory;
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of:
receiving at least one login request or a user login request through a third-party application;
performing security authentication on the login request, and if the login request passes the security authentication, allowing the cloud application store system to be accessed;
and receiving user information, and processing the user information according to the login request.
In a fifth aspect, the invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method according to the first or second aspect.
Has the advantages that: according to the method and the system for providing the industrial cloud application store system authentication based on the U-currency integral, a unified single sign-on mechanism is adopted, so that the process that a user uses an account to log in is simplified, the safety of the account and a password is protected, and the unified management of the account is realized.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, it is obvious that the drawings in the following description are only some embodiments of the present invention, the embodiments in the drawings do not constitute any limitation to the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flow chart of an embodiment of the authentication method for providing the industrial cloud application store system based on the U-currency integration.
Fig. 2 is a schematic flow chart of an embodiment of the authentication method for providing the industrial cloud application store system based on the U-currency integration.
Fig. 3 is a schematic structural diagram of an embodiment of the system for providing authentication of the industrial cloud application store based on the U-currency integration.
Fig. 4 is a schematic structural diagram of an embodiment of the system for providing authentication of the industrial cloud application store based on the U-currency integration.
Detailed Description
The technical solution of the present invention will be further described in detail with reference to the accompanying drawings and embodiments, which are preferred embodiments of the present invention. It is to be understood that the described embodiments are merely a subset of the embodiments of the invention, and not all embodiments; it should be noted that the embodiments and features of the embodiments may be combined with each other without conflict. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The main idea of the technical scheme of the embodiment of the invention is as follows: receiving at least one login request or a user login request through a third-party application; performing security authentication on the login request, and if the login request passes the security authentication, allowing the cloud application store system to be accessed; and receiving user information and processing the user information according to the login request.
In order to better understand the technical solutions, the technical solutions will be described in detail below with reference to the drawings and specific embodiments.
Example one
An embodiment of the present invention provides an authentication method for providing an industrial cloud application store system based on a U-currency integral, as shown in fig. 1, the authentication method may specifically include the following steps:
step S101, receiving at least one login request;
specifically, the host system receives login requests from one or more users. In this embodiment, the login request carries the user information.
And step S102, carrying out security authentication on the login request, and if the login request passes the security authentication, allowing the cloud application store system to be accessed.
In this embodiment, the host system may perform digital signature verification on the login request by using a public key, and if the verification passes, the validity of the login request passes verification.
The verified content may include: security of the login request, entitlement to authorize access to the host system, and legitimacy of the contents of the login request.
In the case where the login request processing of the embodiment of the present invention is applied to a computer, a data processing worker inputs a login request command to a predetermined area set by the above-described processing method through an input interface such as a keyboard.
To ensure security, when a data processing worker is to log in to a request, the data processing worker is required to enter legitimate authentication information to determine whether the login request has permission to access a data file of the host system.
If the digital signature passes the verification, the login request of the initiating user can be confirmed to be legal, and the subsequent steps are executed after the validity is verified; if the digital signature is not verified, the login request of the initiating user can be confirmed to be illegal, and in order to ensure the initiating safety, the main system can return a message with potential safety hazard to the initiating user.
Step S103, receiving user information, and processing the user information according to the login request.
Specifically, the main system receives user information, encrypts the user information to obtain Token, and sends the Token to the sub-application; the subsystem receives the Token and decrypts the Token to acquire the user information; the subsystem verifies whether the user exists or not according to the user information, if not, the user information is stored, and initial roles and permissions are given to the user; and the subsystem verifies whether the user exists or not according to the user information, and if so, uses the existing role and authority of the user in the sub-application.
Example two
An embodiment of the present invention provides an authentication method for providing an industrial cloud application store system based on a U-currency integral, as shown in fig. 2, the authentication method may specifically include the following steps:
step S201, receiving a user login request through a third-party application;
specifically, the host system receives login requests of one or more users through a third party application. In this embodiment, the login request carries third-party application information and user information.
And step S202, performing security authentication on the login request, and if the login request passes the security authentication, allowing access to the cloud application store system.
In this embodiment, the host system may perform digital signature verification on the login request by using a public key, and if the verification passes, the validity of the login request passes verification.
The verified content may include: security of the login request, entitlement to authorize access to the host system, and legitimacy of the contents of the login request.
In the case where the login request processing of the embodiment of the present invention is applied to a computer, a data processing worker inputs a login request command to a predetermined area set by the above-described processing method through an input interface such as a keyboard.
To ensure security, when a data processing worker is to log in to a request, the data processing worker is required to enter legitimate authentication information to determine whether the login request has permission to access a data file of the host system.
If the digital signature passes the verification, the login request of the initiating user can be confirmed to be legal, and the subsequent steps are executed after the validity is verified; if the digital signature is not verified, the login request of the initiating user can be confirmed to be illegal, and in order to ensure the initiating safety, the main system can return a message with potential safety hazard to the initiating user.
Step S203, receiving user information, and processing the user information according to the login request.
Specifically, the host system receives user information, verifies the third-party application login request, and returns an authorization code to the third-party application if the verification is passed; the third party application exchanges the user from the main system for effective access to Token through the authorization code; the third-party application acquires user information from the main system by using a user effective access Token; the third-party application verifies whether the user exists or not according to the user information, if not, the user information is stored, and initial roles and permissions are given to the user; and the third-party application verifies whether the user exists or not according to the user information, and if so, uses the existing role and authority of the user in the third-party application.
The third-party application information of this embodiment includes: client identification, client password username and password.
EXAMPLE III
An embodiment of the present invention provides an authentication system for providing an industrial cloud application store system based on a U-currency integral, and as shown in fig. 3, the authentication system may specifically include the following modules:
and the receiving module is used for receiving at least one login request or receiving a user login request through a third-party application.
In an alternative embodiment, the host system receives login requests from one or more users. In this embodiment, the login request carries the user information.
In another alternative embodiment, the host system receives login requests for one or more users through a third party application. In this embodiment, the login request carries third-party application information and user information.
And the authentication module is used for performing security authentication on the login request, and if the login request passes the security authentication, the cloud application store system is allowed to be accessed.
In this embodiment, the host system may perform digital signature verification on the login request by using a public key, and if the verification passes, the validity of the login request passes verification.
The verified content may include: security of the login request, entitlement to authorize access to the host system, and legitimacy of the contents of the login request.
In the case where the login request processing of the embodiment of the present invention is applied to a computer, a data processing worker inputs a login request command to a predetermined area set by the above-described processing method through an input interface such as a keyboard.
To ensure security, when a data processing worker is to log in to a request, the data processing worker is required to enter legitimate authentication information to determine whether the login request has permission to access a data file of the host system.
If the digital signature passes the verification, the login request of the initiating user can be confirmed to be legal, and the subsequent steps are executed after the validity is verified; if the digital signature is not verified, the login request of the initiating user can be confirmed to be illegal, and in order to ensure the initiating safety, the main system can return a message with potential safety hazard to the initiating user.
And the processing module is used for receiving the user information and processing the user information according to the login request.
In an optional embodiment, the main system receives user information, encrypts the user information to obtain Token, and sends the Token to the sub-application; the subsystem receives the Token and decrypts the Token to acquire the user information; the subsystem verifies whether the user exists or not according to the user information, if not, the user information is stored, and initial roles and permissions are given to the user; and the subsystem verifies whether the user exists or not according to the user information, and if so, uses the existing role and authority of the user in the sub-application.
In another optional embodiment, the host system receives user information, verifies the third-party application login request, and returns the authorization code to the third-party application if the verification is passed; the third party application exchanges the user from the main system for effective access to Token through the authorization code; the third-party application acquires user information from the main system by using a user effective access Token; the third-party application verifies whether the user exists or not according to the user information, if not, the user information is stored, and initial roles and permissions are given to the user; and the third-party application verifies whether the user exists or not according to the user information, and if so, uses the existing role and authority of the user in the third-party application.
Example four
An embodiment of the present invention provides an authentication system for providing an industrial cloud application store system based on a U-currency integral, and as shown in fig. 4, the authentication system may specifically include the following modules:
the communication bus is used for realizing the connection communication between the processor and the memory;
a memory for storing a computer program; the memory may comprise high-speed RAM memory and may also comprise non-volatile memory, such as at least one disk memory. The memory may optionally comprise at least one memory device.
A processor for executing the computer program to implement the steps of:
first, at least one login request is received or a user login request is received through a third party application.
In an alternative embodiment, the host system receives login requests from one or more users. In this embodiment, the login request carries the user information.
In another alternative embodiment, the host system receives login requests for one or more users through a third party application. In this embodiment, the login request carries third-party application information and user information.
And then, performing security authentication on the login request, and if the login request passes the security authentication, allowing the cloud application store system to be accessed.
In this embodiment, the host system may perform digital signature verification on the login request by using a public key, and if the verification passes, the validity of the login request passes verification.
The verified content may include: security of the login request, entitlement to authorize access to the host system, and legitimacy of the contents of the login request.
In the case where the login request processing of the embodiment of the present invention is applied to a computer, a data processing worker inputs a login request command to a predetermined area set by the above-described processing method through an input interface such as a keyboard.
To ensure security, when a data processing worker is to log in to a request, the data processing worker is required to enter legitimate authentication information to determine whether the login request has permission to access a data file of the host system.
If the digital signature passes the verification, the login request of the initiating user can be confirmed to be legal, and the subsequent steps are executed after the validity is verified; if the digital signature is not verified, the login request of the initiating user can be confirmed to be illegal, and in order to ensure the initiating safety, the main system can return a message with potential safety hazard to the initiating user.
And finally, receiving user information and processing the user information according to the login request.
In an optional embodiment, the main system receives user information, encrypts the user information to obtain Token, and sends the Token to the sub-application; the subsystem receives the Token and decrypts the Token to acquire the user information; the subsystem verifies whether the user exists or not according to the user information, if not, the user information is stored, and initial roles and permissions are given to the user; and the subsystem verifies whether the user exists or not according to the user information, and if so, uses the existing role and authority of the user in the sub-application.
In another optional embodiment, the host system receives user information, verifies the third-party application login request, and returns the authorization code to the third-party application if the verification is passed; the third party application exchanges the user from the main system for effective access to Token through the authorization code; the third-party application acquires user information from the main system by using a user effective access Token; the third-party application verifies whether the user exists or not according to the user information, if not, the user information is stored, and initial roles and permissions are given to the user; and the third-party application verifies whether the user exists or not according to the user information, and if so, uses the existing role and authority of the user in the third-party application.
The processor in this embodiment may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The processor described above may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. The processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in the processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
EXAMPLE five
An embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the above-described authentication method.
In summary, the method and system for providing authentication of the industrial cloud application store system based on the U-currency integration provided by the embodiments of the present invention: receiving at least one login request or a user login request through a third-party application; performing security authentication on the login request, and if the login request passes the security authentication, allowing the cloud application store system to be accessed; and receiving user information, and processing the user information according to the login request. Therefore, by adopting a unified single sign-on mechanism, the account login process of a user is simplified, the safety of the account and the password is protected, and the unified management of the account is realized.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are exemplary embodiments and that the acts and modules illustrated are not necessarily required to practice the invention.
The above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the present application are generated in whole or in part when the computer program instructions are loaded or executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains one or more collections of available media. The available media may be magnetic media (e.g., floppy disks, hard disks, tapes), optical media (e.g., DVDs), or semiconductor media. The semiconductor medium may be a solid state disk.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (12)

1. A method for providing industrial cloud application store system authentication based on U-currency integration is characterized by comprising the following steps:
receiving at least one login request;
performing security authentication on the login request, and if the login request passes the security authentication, allowing the cloud application store system to be accessed;
and receiving user information, and processing the user information according to the login request.
2. The method according to claim 1, wherein the login request carries the user information, the user information is received, and the user information is processed according to the login request, the method comprising:
and the main system encrypts the user information to obtain Token and sends the Token to the sub-application.
3. The method of claim 2, further comprising:
the subsystem receives the Token and decrypts the Token to acquire the user information;
and the subsystem verifies whether the user exists or not according to the user information, if not, stores the user information and gives the user initial role and authority.
4. The method of claim 3, further comprising:
and the subsystem verifies whether the user exists or not according to the user information, and if so, uses the existing role and authority of the user in the sub-application.
5. A method for providing industrial cloud application store system authentication based on U-currency integration is characterized by comprising the following steps:
receiving a user login request through a third-party application;
performing security authentication on the login request, and if the login request passes the security authentication, allowing the cloud application store system to be accessed;
and receiving user information, and processing the user information according to the login request.
6. The method according to claim 5, wherein the login request carries third party application information and user information, the user information is received, and the user information is processed according to the login request, the method comprising:
and the host system verifies the third-party application login request, and returns an authorization code to the third-party application if the verification is passed.
7. The method of claim 6, wherein the third party application information comprises: client identification, client password username and password.
8. The method according to any one of claims 6 or 7, further comprising:
the third party application exchanges the user for effective access to Token from the main system through the authorization code;
the third-party application acquires user information from the main system by using a user effective access Token;
and the third-party application verifies whether the user exists or not according to the user information, if not, stores the user information and gives the user initial role and authority.
9. The method of claim 8, further comprising:
and the third-party application verifies whether the user exists according to the user information, and if so, uses the existing role and authority of the user in the third-party application.
10. An industrial cloud application store system authentication system provided based on U-currency integration, the system comprising:
the receiving module is used for receiving at least one login request or receiving a user login request through a third-party application;
the authentication module is used for carrying out security authentication on the login request, and if the login request passes the security authentication, the cloud application store system is allowed to be accessed;
and the processing module is used for receiving the user information and processing the user information according to the login request.
11. An industrial cloud application store system authentication system provided based on U-currency integration, the system comprising:
the communication bus is used for realizing the connection communication between the processor and the memory;
a memory for storing a computer program;
a processor for executing the computer program to implement the steps of:
receiving at least one login request or a user login request through a third-party application;
performing security authentication on the login request, and if the login request passes the security authentication, allowing the cloud application store system to be accessed;
and receiving user information, and processing the user information according to the login request.
12. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-4 or 5-9.
CN202011208722.8A 2020-11-03 2020-11-03 Industrial cloud application store system authentication method and system based on U-currency integration Pending CN112332993A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011208722.8A CN112332993A (en) 2020-11-03 2020-11-03 Industrial cloud application store system authentication method and system based on U-currency integration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011208722.8A CN112332993A (en) 2020-11-03 2020-11-03 Industrial cloud application store system authentication method and system based on U-currency integration

Publications (1)

Publication Number Publication Date
CN112332993A true CN112332993A (en) 2021-02-05

Family

ID=74322808

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011208722.8A Pending CN112332993A (en) 2020-11-03 2020-11-03 Industrial cloud application store system authentication method and system based on U-currency integration

Country Status (1)

Country Link
CN (1) CN112332993A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109379369A (en) * 2018-11-09 2019-02-22 中国平安人寿保险股份有限公司 Single-point logging method, device, server and storage medium
CN110516454A (en) * 2019-08-13 2019-11-29 苏州浪潮智能科技有限公司 Exchange method, system, device and the computer readable storage medium of more equipment
CN111556006A (en) * 2019-12-31 2020-08-18 远景智能国际私人投资有限公司 Third-party application system login method, device, terminal and SSO service platform

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109379369A (en) * 2018-11-09 2019-02-22 中国平安人寿保险股份有限公司 Single-point logging method, device, server and storage medium
CN110516454A (en) * 2019-08-13 2019-11-29 苏州浪潮智能科技有限公司 Exchange method, system, device and the computer readable storage medium of more equipment
CN111556006A (en) * 2019-12-31 2020-08-18 远景智能国际私人投资有限公司 Third-party application system login method, device, terminal and SSO service platform

Similar Documents

Publication Publication Date Title
CN111756753B (en) Authority verification method and system
US11818272B2 (en) Methods and systems for device authentication
US10567385B2 (en) System and method for provisioning a security token
CN108463982B (en) System and method for authenticating online users using a secure authorization server
CN111353903B (en) Network identity protection method and device, electronic equipment and storage medium
CN110149328B (en) Interface authentication method, device, equipment and computer readable storage medium
US9332007B2 (en) Method for secure, entryless login using internet connected device
CN107426235B (en) Authority authentication method, device and system based on equipment fingerprint
US8452980B1 (en) Defeating real-time trojan login attack with delayed interaction with fraudster
JP6034995B2 (en) Method and system for authenticating services
JP6538872B2 (en) Common identification data replacement system and method
CN113841145A (en) Lexus software in inhibit integration, isolation applications
US20160171187A1 (en) Registration of devices in a digital rights management environment
TW201507430A (en) Authentication and authorization with a bundled token
CN112291279A (en) Router intranet access method, system and equipment and readable storage medium
CN110535884B (en) Method, device and storage medium for cross-enterprise inter-system access control
US20150244695A1 (en) Network authentication method for secure user identity verification
KR101741917B1 (en) Apparatus and method for authenticating using speech recognition
CN111818088A (en) Authorization mode management method and device, computer equipment and readable storage medium
CN111669351B (en) Authentication method, service server, client and computer readable storage medium
CN110704820A (en) Login processing method and device, electronic equipment and computer readable storage medium
CN109286620B (en) User right management method, system, device and computer readable storage medium
CN110661779A (en) Block chain network-based electronic certificate management method, system, device and medium
CN105612731A (en) Roaming internet-accessible application state across trusted and untrusted platforms
US20150101059A1 (en) Application License Verification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210205