CN112364334A - Single sign-on method and device, electronic equipment and storage medium - Google Patents
Single sign-on method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN112364334A CN112364334A CN202011238688.9A CN202011238688A CN112364334A CN 112364334 A CN112364334 A CN 112364334A CN 202011238688 A CN202011238688 A CN 202011238688A CN 112364334 A CN112364334 A CN 112364334A
- Authority
- CN
- China
- Prior art keywords
- target application
- target
- target account
- sending
- sso authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 230000008569 process Effects 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 6
- 238000004891 communication Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application discloses a single sign-on method, a single sign-on device, an electronic device and a computer readable storage medium, wherein the method comprises the following steps: receiving a login request of a target account for a target application; the login request at least comprises sso authentication information corresponding to the target account; sending the sso authentication information to an sso authentication center so as to obtain an authentication result of the sso authentication information; if the authentication is passed, the sso authentication center returns target account information which corresponds to the target account and is used for logging in the target application; and when the target account information is received, logging in the target application by calling a contact-free interface of the target application by using the target account information. Therefore, the single sign-on method provided by the application realizes the single sign-on by calling the contact-free interface of the application for the application which does not support the OAuth2.0 interface.
Description
Technical Field
The present application relates to the field of communications technologies, and in particular, to a single sign-on method and apparatus, an electronic device, and a computer-readable storage medium.
Background
With the rapid development of network informatization, enterprises gradually build and perfect the internal informatization construction of the enterprises, and on one hand, an informatization system gradually eliminates the manual arrangement, time-consuming and labor-consuming informatization management modes of paper or electronic document transmission and the like in the enterprises, and on the other hand, more comprehensively, conveniently and intelligently provides internal employees of the enterprises to be unable to go out of homes to develop a series of work matters. When a chimney type information system is established, barriers among the systems are opened step by step, interconnection and intercommunication among the systems are realized, and meanwhile, a user can conveniently realize one-stop unified login.
In the related art, due to the limitation of a self architecture system, part of applications cannot support the standard oauth2.0 interface, and single sign-on cannot be realized in a unified manner.
Therefore, how to implement single sign-on in an application that does not support the oauth2.0 interface is a technical problem to be solved by those skilled in the art.
Disclosure of Invention
The application aims to provide a single sign-on method, a single sign-on device, an electronic device and a computer readable storage medium, and realize single sign-on in applications which do not support the OAuth2.0 interface.
In order to achieve the above object, the present application provides a single sign-on method, including:
receiving a login request of a target account for a target application; the login request at least comprises sso (Chinese full name: single sign-on, English full name: SingleSignOn) authentication information corresponding to the target account;
sending the sso authentication information to an sso authentication center so as to obtain an authentication result of the sso authentication information; if the authentication is passed, the sso authentication center returns target account information which corresponds to the target account and is used for logging in the target application;
and when the target account information is received, logging in the target application by calling a contact-free interface of the target application by using the target account information.
Before sending the sso authentication information to the sso authentication center, the method further includes:
sending the login request to a server of the target application so as to obtain a judgment result of whether the target account logs in the target application;
and if the target account does not log in the target application, executing the step of sending the sso authentication information to an sso authentication center.
The login request further comprises a token corresponding to the target application; sending the login request to a server of the target application so as to obtain a judgment result of whether the target account is logged in the target application, wherein the judgment result comprises the following steps:
sending the login request to a server of the target application so as to obtain a judgment result of whether a token in the login request is expired;
correspondingly, if the target application is not logged in by the target account, the step of sending the sso authentication information to an sso authentication center is executed, and the step includes:
and if the token is expired, executing the step of sending the sso authentication information to an sso authentication center.
Wherein sending the sso authentication information to an sso authentication center comprises:
sending the sso authentication information to an sso authentication center by using identity authentication service; when the identity authentication service receives the target account information, the identity authentication service directly utilizes the target account information to log in the target application by calling a non-contact interface of the target application.
To achieve the above object, the present application provides a single sign-on apparatus, comprising:
the receiving module is used for receiving a login request of a target account to a target application; the login request at least comprises sso authentication information corresponding to the target account;
the first sending module is used for sending the sso authentication information to an sso authentication center so as to obtain an authentication result of the sso authentication information; if the authentication is passed, the sso authentication center returns target account information which corresponds to the target account and is used for logging in the target application;
and the login module is used for logging in the target application by calling the contact-free interface of the target application by utilizing the target account information when the target account information is received.
Wherein, still include:
the second sending module is used for sending the login request to a server of the target application so as to obtain a judgment result of whether the target account is logged in the target application;
and the starting module is used for starting the working process of the first sending module if the target account does not log in the target application.
The login request further comprises a token corresponding to the target application; the second sending module is specifically a module for sending the login request to the server of the target application so as to obtain a judgment result of whether a token in the login request is expired; correspondingly, the starting module specifically starts the workflow module of the first sending module if the token is expired.
The first sending module is specifically a module for sending the sso authentication information to an sso authentication center by using an identity authentication service; when the identity authentication service receives the target account information, the identity authentication service directly utilizes the target account information to log in the target application by calling a non-contact interface of the target application.
To achieve the above object, the present application provides an electronic device including:
a memory for storing a computer program;
a processor for implementing the steps of the single sign-on method as described above when executing the computer program.
To achieve the above object, the present application provides a computer-readable storage medium having stored thereon a computer program, which when executed by a processor, implements the steps of the single sign-on method as described above.
According to the scheme, the single sign-on method provided by the application comprises the following steps: receiving a login request of a target account for a target application; the login request at least comprises sso authentication information corresponding to the target account; sending the sso authentication information to an sso authentication center so as to obtain an authentication result of the sso authentication information; if the authentication is passed, the sso authentication center returns target account information which corresponds to the target account and is used for logging in the target application; and when the target account information is received, logging in the target application by calling a contact-free interface of the target application by using the target account information.
According to the single sign-on method, identity authentication is carried out on a target account requesting for logging in a target application through a sso authentication center, target account information corresponding to the target account and used for logging in the target application is returned after the identity authentication is passed, and logging in is carried out through calling a non-contact interface of the target application. Therefore, the single sign-on method provided by the application realizes the single sign-on by calling the contact-free interface of the application for the application which does not support the OAuth2.0 interface. The application also discloses a single sign-on device, an electronic device and a computer readable storage medium, which can also realize the technical effects.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts. The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure without limiting the disclosure. In the drawings:
FIG. 1 is a flow chart illustrating a method of single sign-on according to an exemplary embodiment;
FIG. 2 is a flow chart illustrating another method of single sign-on according to an exemplary embodiment;
FIG. 3 is a block diagram illustrating a single sign-on device in accordance with an exemplary embodiment;
FIG. 4 is a block diagram illustrating an electronic device in accordance with an exemplary embodiment.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The embodiment of the application discloses a single sign-on method, which realizes single sign-on in applications which do not support OAuth2.0 interfaces.
Referring to fig. 1, a flowchart of a single sign-on method according to an exemplary embodiment is shown, as shown in fig. 1, including:
s101: receiving a login request of a target account for a target application; the login request at least comprises sso authentication information corresponding to the target account;
the execution subject of the embodiment is an identity authentication service, and the purpose is to implement single sign-on of a target application. In a specific implementation, the target account may log in to the target application at a client, such as a browser, and the client sends a login request to the identity authentication service, so that the identity authentication service in the subsequent step implements a single sign-on function of the target application.
S102: sending the sso authentication information to an sso authentication center so as to obtain an authentication result of the sso authentication information; if the authentication is passed, the sso authentication center returns target account information which corresponds to the target account and is used for logging in the target application;
it will be appreciated that the sso authentication center is identity authentication for a target account requesting login to a target application. In a specific implementation, the identity authentication service sends sso authentication information in the login request to an sso authentication center, where the sso authentication information may include a user name and a password of a target account, the sso authentication center performs authentication for the sso authentication information, and after the authentication is passed, target account information corresponding to the target account and used for logging in a target application is returned to the identity authentication service.
S103: and when the target account information is received, logging in the target application by calling a contact-free interface of the target application by using the target account information.
In this step, the identity authentication service calls a lock-free interface of the target application to log in the target application by using the target account information, and the access address redirected to the target account, namely the address of the server of the target application, is realized, and the server of the target application returns a token to the client so that the client can access the target application subsequently.
In the single sign-on method provided by the embodiment of the application, the sso authentication center performs identity authentication on the target account requesting to log in the target application, returns the target account information corresponding to the target account and used for logging in the target application after the authentication is passed, and logs in by calling the non-contact interface of the target application. Therefore, the single sign-on method provided by the embodiment of the application realizes the single sign-on by calling the contact-free interface of the application for the application which does not support the oauth2.0 interface.
It should be noted that, the present application may also provide a unified login entry for all applications, that is, the proxy server, and the identity authentication service in the previous embodiment may be integrated with the proxy server or may be independent of the proxy server. The embodiment will describe in detail a technical scheme that the identity authentication service is independent of the proxy server, specifically:
referring to fig. 2, a flow chart of another single sign-on method is shown according to an exemplary embodiment, as shown in fig. 2, including:
s201: the client sends a login request of a target account to a target application to the proxy server;
in this embodiment, a unified login portal, i.e. a proxy server, e.g. nginx, is provided for all applications. The target account needs to log in the target application through the proxy server. In this step, the client sends a login request to the proxy server.
S202: the proxy server sends the login request to a server of the target application;
s203: the server of the target application judges whether the target account logs in the target application or not;
s204: the server of the target application returns a judgment result to the proxy server;
in a specific implementation, the proxy server sends the login request to the server of the target application, and the server of the target application judges whether the target account is logged in the target application. It should be noted that, the embodiment does not limit the specific determination process, and as a feasible implementation manner, the server of the target application may determine whether the target account has logged in the target application by determining whether the token in the login request is expired, that is, the login request sent to the server of the target application further includes the token corresponding to the target application; the step of sending the login request to the server of the target application so as to obtain the judgment result of whether the target account is logged in the target application comprises the following steps: and sending the login request to a server of the target application so as to obtain a judgment result of whether a token in the login request is expired. In a specific implementation, the expiration of the token in the login request indicates that the target account is not logged in to the target application, and the unexpired token indicates that the target account is logged in to the target application.
S205: if the target application is not logged in by the target account, the proxy server sends the login request to an identity authentication service;
in this step, if the target application is not logged in by the target account, the proxy server performs interface skip of the identity authentication service, that is, sends a login request to the identity authentication service.
S206: the identity authentication service sends the sso authentication information in the login request to an sso authentication center;
s207: the sso authentication center authenticates the sso authentication information;
s208: if the authentication is passed, the sso authentication center returns target account information which is corresponding to the target account and is used for logging in the target application;
s209: and logging in the target application by calling the contact-free interface of the target application by utilizing the target account information.
In specific implementation, the identity authentication service sends sso authentication information in the login request to an sso authentication center, the sso authentication center authenticates the sso authentication information, target account information corresponding to the target account and used for logging in the target application is returned to the identity authentication service after the authentication is passed, and the identity authentication service calls a non-tight interface of the target application to log in the target application by using the target account information.
It can be seen that the present embodiment provides a unified login entry, i.e., a proxy server, for all applications. When the proxy server receives a request of a target account for logging in a target application, the proxy server performs interface skipping so as to perform sso authentication by using an identity authentication service, and calls a non-contact interface of the target application to realize single sign-on.
In the following, a single sign-on apparatus provided by the embodiment of the present application is introduced, and a single sign-on apparatus described below and a single sign-on method described above may be referred to each other.
Referring to fig. 3, a block diagram of a single sign-on device according to an exemplary embodiment is shown, as shown in fig. 3, including:
a receiving module 301, configured to receive a login request of a target application from a target account; the login request at least comprises sso authentication information corresponding to the target account;
a first sending module 302, configured to send the sso authentication information to an sso authentication center, so as to obtain an authentication result of the sso authentication information; if the authentication is passed, the sso authentication center returns target account information which corresponds to the target account and is used for logging in the target application;
and the login module 303 is configured to, when the target account information is received, utilize the target account information to login the target application by calling a lock-free interface of the target application.
In the single sign-on device provided by the embodiment of the application, the sso authentication center performs identity authentication on the target account requesting to log in the target application, returns the target account information corresponding to the target account and used for logging in the target application after the authentication is passed, and logs in by calling the non-contact interface of the target application. Therefore, the single sign-on device provided by the embodiment of the application realizes single sign-on for applications which do not support the oauth2.0 interface by calling the contact-free interface of the application.
On the basis of the above embodiment, as a preferred implementation, the method further includes:
the second sending module is used for sending the login request to a server of the target application so as to obtain a judgment result of whether the target account is logged in the target application;
and the starting module is used for starting the working process of the first sending module if the target account does not log in the target application.
On the basis of the above embodiment, as a preferred implementation, the login request further includes a token corresponding to the target application; the second sending module is specifically a module for sending the login request to the server of the target application so as to obtain a judgment result of whether a token in the login request is expired; correspondingly, the starting module specifically starts the workflow module of the first sending module if the token is expired.
On the basis of the foregoing embodiment, as a preferred implementation manner, the first sending module 302 is specifically a module that sends the sso authentication information to an sso authentication center by using an identity authentication service; when the identity authentication service receives the target account information, the identity authentication service directly utilizes the target account information to log in the target application by calling a non-contact interface of the target application.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
The present application further provides an electronic device, and referring to fig. 4, a structure diagram of an electronic device 400 provided in an embodiment of the present application, as shown in fig. 4, may include a processor 11 and a memory 12. The electronic device 400 may also include one or more of a multimedia component 13, an input/output (I/O) interface 14, and a communication component 15.
The processor 11 is configured to control the overall operation of the electronic device 400, so as to complete all or part of the steps in the single sign-on method. The memory 12 is used to store various types of data to support operation at the electronic device 400, such as instructions for any application or method operating on the electronic device 400 and application-related data, such as contact data, transmitted and received messages, pictures, audio, video, and so forth. The Memory 12 may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk or optical disk. The multimedia component 13 may include a screen and an audio component. Wherein the screen may be, for example, a touch screen and the audio component is used for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may further be stored in the memory 12 or transmitted via the communication component 15. The audio assembly also includes at least one speaker for outputting audio signals. The I/O interface 14 provides an interface between the processor 11 and other interface modules, such as a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 15 is used for wired or wireless communication between the electronic device 400 and other devices. Wireless Communication, such as Wi-Fi, bluetooth, Near Field Communication (NFC), 2G, 3G or 4G, or a combination of one or more of them, so that the corresponding Communication component 15 may include: Wi-Fi module, bluetooth module, NFC module.
In an exemplary embodiment, the electronic Device 400 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic components for performing the single sign-on method described above.
In another exemplary embodiment, a computer readable storage medium comprising program instructions which, when executed by a processor, implement the steps of the single sign-on method described above is also provided. For example, the computer readable storage medium may be the memory 12 described above comprising program instructions executable by the processor 11 of the electronic device 400 to perform the single sign-on method described above.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Claims (10)
1. A single sign-on method, comprising:
receiving a login request of a target account for a target application; the login request at least comprises sso authentication information corresponding to the target account;
sending the sso authentication information to an sso authentication center so as to obtain an authentication result of the sso authentication information; if the authentication is passed, the sso authentication center returns target account information which corresponds to the target account and is used for logging in the target application;
and when the target account information is received, logging in the target application by calling a contact-free interface of the target application by using the target account information.
2. The single sign-on method of claim 1, wherein prior to sending the sso authentication information to an sso authentication center, further comprising:
sending the login request to a server of the target application so as to obtain a judgment result of whether the target account logs in the target application;
and if the target account does not log in the target application, executing the step of sending the sso authentication information to an sso authentication center.
3. The single sign-on method of claim 2, wherein the login request further comprises a token corresponding to the target application; sending the login request to a server of the target application so as to obtain a judgment result of whether the target account is logged in the target application, wherein the judgment result comprises the following steps:
sending the login request to a server of the target application so as to obtain a judgment result of whether a token in the login request is expired;
correspondingly, if the target application is not logged in by the target account, the step of sending the sso authentication information to an sso authentication center is executed, and the step includes:
and if the token is expired, executing the step of sending the sso authentication information to an sso authentication center.
4. The single sign-on method of claim 1, wherein sending the sso authentication information to an sso authentication center comprises:
sending the sso authentication information to an sso authentication center by using identity authentication service; when the identity authentication service receives the target account information, the identity authentication service directly utilizes the target account information to log in the target application by calling a non-contact interface of the target application.
5. A single sign-on device, comprising:
the receiving module is used for receiving a login request of a target account to a target application; the login request at least comprises sso authentication information corresponding to the target account;
the first sending module is used for sending the sso authentication information to an sso authentication center so as to obtain an authentication result of the sso authentication information; if the authentication is passed, the sso authentication center returns target account information which corresponds to the target account and is used for logging in the target application;
and the login module is used for logging in the target application by calling the contact-free interface of the target application by utilizing the target account information when the target account information is received.
6. The single sign-on apparatus of claim 5, further comprising:
the second sending module is used for sending the login request to a server of the target application so as to obtain a judgment result of whether the target account is logged in the target application;
and the starting module is used for starting the working process of the first sending module if the target account does not log in the target application.
7. The single sign-on apparatus of claim 6, wherein the login request further comprises a token corresponding to the target application; the second sending module is specifically a module for sending the login request to the server of the target application so as to obtain a judgment result of whether a token in the login request is expired; correspondingly, the starting module specifically starts the workflow module of the first sending module if the token is expired.
8. The single sign-on apparatus of claim 5, wherein the first sending module is specifically a module for sending the sso authentication information to an sso authentication center using an identity authentication service; when the identity authentication service receives the target account information, the identity authentication service directly utilizes the target account information to log in the target application by calling a non-contact interface of the target application.
9. An electronic device, comprising:
a memory for storing a computer program;
processor for implementing the steps of the single sign-on method of any one of claims 1 to 4 when executing said computer program.
10. A computer-readable storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the single sign-on method according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011238688.9A CN112364334A (en) | 2020-11-09 | 2020-11-09 | Single sign-on method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011238688.9A CN112364334A (en) | 2020-11-09 | 2020-11-09 | Single sign-on method and device, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112364334A true CN112364334A (en) | 2021-02-12 |
Family
ID=74509083
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011238688.9A Pending CN112364334A (en) | 2020-11-09 | 2020-11-09 | Single sign-on method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112364334A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113641972A (en) * | 2021-08-20 | 2021-11-12 | 北京达佳互联信息技术有限公司 | Account identification method and device, electronic equipment and storage medium |
CN117574349A (en) * | 2023-11-10 | 2024-02-20 | 中移互联网有限公司 | Single sign-on authentication method and device, electronic equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101202753A (en) * | 2007-11-29 | 2008-06-18 | 中国电信股份有限公司 | Method and device for accessing plug-in connector applied system by client terminal |
CN102025740A (en) * | 2010-12-14 | 2011-04-20 | 成都市华为赛门铁克科技有限公司 | Single sign-on method, fat client, server and system |
CN102111410A (en) * | 2011-01-13 | 2011-06-29 | 中国科学院软件研究所 | Agent-based single sign on (SSO) method and system |
CN103188248A (en) * | 2011-12-31 | 2013-07-03 | 卓望数码技术(深圳)有限公司 | Identity authentication system and method based on single sign-on |
CN107070880A (en) * | 2017-02-16 | 2017-08-18 | 济南浪潮高新科技投资发展有限公司 | A kind of method and system of single-sign-on, a kind of authentication center's server |
CN109309683A (en) * | 2018-10-30 | 2019-02-05 | 泰华智慧产业集团股份有限公司 | The method and system of client identity verifying based on token |
CN111147453A (en) * | 2019-12-11 | 2020-05-12 | 东软集团股份有限公司 | System login method and integrated login system |
-
2020
- 2020-11-09 CN CN202011238688.9A patent/CN112364334A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101202753A (en) * | 2007-11-29 | 2008-06-18 | 中国电信股份有限公司 | Method and device for accessing plug-in connector applied system by client terminal |
CN102025740A (en) * | 2010-12-14 | 2011-04-20 | 成都市华为赛门铁克科技有限公司 | Single sign-on method, fat client, server and system |
CN102111410A (en) * | 2011-01-13 | 2011-06-29 | 中国科学院软件研究所 | Agent-based single sign on (SSO) method and system |
CN103188248A (en) * | 2011-12-31 | 2013-07-03 | 卓望数码技术(深圳)有限公司 | Identity authentication system and method based on single sign-on |
CN107070880A (en) * | 2017-02-16 | 2017-08-18 | 济南浪潮高新科技投资发展有限公司 | A kind of method and system of single-sign-on, a kind of authentication center's server |
CN109309683A (en) * | 2018-10-30 | 2019-02-05 | 泰华智慧产业集团股份有限公司 | The method and system of client identity verifying based on token |
CN111147453A (en) * | 2019-12-11 | 2020-05-12 | 东软集团股份有限公司 | System login method and integrated login system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113641972A (en) * | 2021-08-20 | 2021-11-12 | 北京达佳互联信息技术有限公司 | Account identification method and device, electronic equipment and storage medium |
CN117574349A (en) * | 2023-11-10 | 2024-02-20 | 中移互联网有限公司 | Single sign-on authentication method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220276910A1 (en) | Dynamically integrating a client application with third-party services | |
US11218460B2 (en) | Secure authentication for accessing remote resources | |
US9288213B2 (en) | System and service providing apparatus | |
US11706217B2 (en) | Managing voice applications within a digital workspace | |
CN111160845B (en) | Service processing method and device | |
US9065817B2 (en) | Authenticating linked accounts | |
CN109815684B (en) | Identity authentication method, system, server and storage medium | |
CN108829528B (en) | Content sharing method and device, and message processing method and device | |
US11411758B2 (en) | Generating contextual compliance policies | |
US20170041504A1 (en) | Service providing system, information processing apparatus, program, and method for generating service usage information | |
CN110839087B (en) | Interface calling method and device, electronic equipment and computer readable storage medium | |
US9210159B2 (en) | Information processing system, information processing device, and authentication method | |
CN111355726A (en) | Identity authorization login method and device, electronic equipment and storage medium | |
JP2018092600A (en) | Common authorization management service | |
CN113381979B (en) | Access request proxy method and proxy server | |
US11082813B2 (en) | Message-based management service enrollment | |
KR102279582B1 (en) | Conferencing apparatus and method for switching access terminal thereof | |
CN111475795A (en) | Method and device for unified authentication and authorization facing to multiple applications | |
US11429327B2 (en) | Computer system, login screen display method, and storage medium for displaying an appropriate login screen | |
CN112364334A (en) | Single sign-on method and device, electronic equipment and storage medium | |
CN110351719B (en) | Wireless network management method, system, electronic equipment and storage medium | |
CN110413423B (en) | Data processing method, related device, equipment and storage medium | |
CN111371762B (en) | Identity authentication method and device, electronic equipment and storage medium | |
CN114090996A (en) | Multi-party system mutual trust authentication method and device | |
KR102461836B1 (en) | Apparatus and method for connecting chatbot |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210212 |