[go: up one dir, main page]

CN106453396A - Double token account login method and login verification device - Google Patents

Double token account login method and login verification device Download PDF

Info

Publication number
CN106453396A
CN106453396A CN201611014792.3A CN201611014792A CN106453396A CN 106453396 A CN106453396 A CN 106453396A CN 201611014792 A CN201611014792 A CN 201611014792A CN 106453396 A CN106453396 A CN 106453396A
Authority
CN
China
Prior art keywords
token
user
session token
session
login
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611014792.3A
Other languages
Chinese (zh)
Inventor
晏贤权
陈学文
梁治刚
林岳
顾思斌
潘柏宇
王冀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chuanxian Network Technology Shanghai Co Ltd
Original Assignee
Chuanxian Network Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chuanxian Network Technology Shanghai Co Ltd filed Critical Chuanxian Network Technology Shanghai Co Ltd
Priority to CN201611014792.3A priority Critical patent/CN106453396A/en
Publication of CN106453396A publication Critical patent/CN106453396A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a double token account login method and a login verification device. The method comprises the following steps: according to whether a user login request includes a long-term login request, generating a session token and a persistent token, or only generating the session token; receiving a content request of a user; and judging whether the content request includes the session token, if yes, carrying out verification on the session token, if no, judging whether the persistent token is included and generating a new session token by employing the persistent token; the method disclosed by the invention further comprises the step of updating a time of the session token. According to the double token account login method and the login verification device disclosed by the invention, as a token verification manner is adopted, the information stored in a client is irrelevant to user sensitive information; even through the client information is got, the authentication information of the user still cannot be obtained; as a double token mechanism is adopted, the user login friendliness is improved; the user authentication information all only can be stored at a server and user sensitive businesses all can be accessed after passing through a uniform verification center, so not only is the security guaranteed, but the friendliness of user use is also improved.

Description

Double token account logon methods and login authentication device
Technical field
The present invention relates to Internet technical field, particularly, is related to a kind of using close friend, double token account logon methods And device.
Background technology
In prior art, Internet technology has more and more intervened daily life, and user is needed in mobile phone or electricity Various websites or APP application are frequently logged on brain, and the method for various logins should meet safety, and meeting user again makes Convenience.
Current conventional account login mode includes several as follows:
First kind of way, login is only effective within a period of time, most one days, more than this period, access same site Need to log in again.
The second way is that website can allow user select to log in permanently effective, generally one month this effect duration, During this, which kind of situation accesses current site all without the need for logging in again.
The third mode be logged on permanently effective, but website can be determined according to the liveness of user user whether need weight New login.
Above-mentioned scheme haves the shortcomings that as follows:
1. safety and two aspect of user friendly are all short of consideration
The first login mode is just all short of consideration at this two aspects.First, using this login mode effect duration ratio Shorter, severe needs to frequently enter user name password using the user of this website and is logged in, although modern browser all may be used To remember that account and password conveniently can log in, but still needing to click on login button is logged in, and account and password quilt Browser is remembered and there is risk;After this kind of mode is logged in again, can be in subscription client kind one and User logs in phase Cookie, the cookie of pass is exactly a file, once this file is obtained by other users, can do station before the deadline Point does any business.
2. user friendly has been looked after, but Information Security is poor
Second login mode is exactly the Typical Representative of this kind of situation, once user click permanently effective, then log in In month afterwards, user need not be input into username and password and be logged in, and the interactive friendly of user is obtained really Look after;But the safety of this kind of mode is poor, because the cookie file for producing in client after logging in easily is stolen by tripartite, Once stealing service end to perceive, only customer complaint allows service side's manual intervention or wait login to expire.
3. the problem of secure context is take into account, has lacked user friendly
The general process of the third login mode is as follows, and although user has logged in website, but because has other things one The section time is without any access or other behaviors on this website, and website is because user no accesses in being provided with a period of time In the case of access site users again and no matter do any access and be required for the rule that logs in again, although at this moment log in cookie Effectively but still need to log in again, this mode safety is that have certain guarantee, but user friendly is inadequate.
Content of the invention
It is an object of the invention to a kind of pair of token account logon method and device is proposed, to solve user friendly and peace The contradiction of full property.
For reaching this purpose, the present invention is employed the following technical solutions:
A kind of pair of token account logon method, comprises the steps:
Step 110:Receive user login authentication is asked, and contains the accounts information of user in login authentication request;
Step 120:Judge whether comprising long-term logging request in User logs in request, if there are the long-term login Request, then generate session token (session token) and lasting token (long-term token), otherwise only generates session token (session token);
Step 130:The token for generating in the step 120 is sent to user, and User logs in is allowed, send follow-up letter Breath.
Preferably, step 140:The content requests of receive user, carry in the content requests that user obtains is all Token;
Step 150:Judge whether comprising session token in the content requests, if there are session token, then to the session Token is verified, if the verification passes, then enters step 160, if without session token, is judged whether comprising persistently order Board, if there are lasting token, then verifies to the lasting token, if the verification passes, then generates new session token, go forward side by side Enter step 160, otherwise authentication failed, again login authentication;
Step 160:Token after checking is updated is sent to user, and allows User logs in, sends follow-up.
Preferably, in step 150, if it is determined that have session token, and session token checking does not pass through, then proceed to persistently Token authentication.
Preferably, after step 150, it is allowed to before User logs in, also include step 155, logical in session token checking Later, or persistently token authentication passes through, and after generating new session token, all the expired time of session token is updated.
Preferably, after step 150, it is allowed to before User logs in, can also be according to the needs of institute's accession page, it is desirable to User re-enters user and password and carries out secondary checking.
The invention also discloses a kind of pair of token Account Logon verifies device, it is characterised in that include:
First receiver module:Ask for receive user login authentication, in login authentication request, contain the account of user Information;
First judge module:For judging whether comprising long-term logging request in User logs in request, if Long-term logging request is stated, then session token (session token) and lasting token (long-term token) is generated, otherwise only generate session Token (session token);
First sending module:For the token for generating in the step 120 being sent to user, and allowing User logs in, sends out Send follow-up.
Preferably, the second receiver module:For the content requests of receive user, user is carried in the content requests and obtain The all of token for arriving;
Second judge module:For judging in the content requests whether comprising session token, if there are session token, then The session token is verified, if the verification passes, then using the second sending module, it is allowed to User logs in, sends follow-up letter Breath, if without session token, judges whether comprising lasting token, if there are lasting token, then the lasting token is carried out Checking, if the verification passes, then generates new session token, and utilizes the second sending module, it is allowed to User logs in, send follow-up Information, otherwise authentication failed, login authentication again;
Second sending module:Token after checking is updated is sent to user, and allows User logs in, sends follow-up letter Breath.
Preferably, second judge module, if it is determined that have session token, and session token checking does not pass through, then turn Enter lasting token authentication.
Preferably, also include update module, after session token is verified, or persistently token authentication passes through, and generates After new session token, the expired time of session token is updated.
Preferably for second judge module, it is allowed to before User logs in, always according to the needs of institute's accession page, It is required that user re-enters user and password and carries out secondary checking.
The present invention have selected the mode of token authentication, and the information of client storage is unrelated with user sensitive information, and In the case of taking client-side information, the authentication information of user cannot be still obtained.When user selects long-term login, using double The mechanism of token, it is ensured that generate session token all the time within a period of time, and in the higher service of safety, still select defeated Access customer name and password, all user authentication informations all can only be stored in server end, and all user's sensitive traffic are required for leading to Cross and can just access after unifying authentication center, system can friendly identifying user be passively to log in or be actively entered authentication information Login afterwards, both ensure that safety, improve the friendly that user uses again.
Description of the drawings
Fig. 1 is the flow chart of one embodiment of the double token login methods according to the specific embodiment of the invention;
Fig. 2 is the flow chart of another embodiment of the double token login methods according to the specific embodiment of the invention;
Fig. 3 is the module map of the double token login authentication devices according to the specific embodiment of the invention.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment that states is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that, in order to just Part related to the present invention rather than entire infrastructure is illustrate only in description, accompanying drawing.
The invention provides a kind of using close friend, and the higher double token account logon methods of safety and device,
Referring to Fig. 1, one embodiment of the double token login methods according to the specific embodiment of the invention is shown:
Step 110:Receive user login authentication is asked, and contains the accounts information of user in login authentication request;
In the present embodiment, the step represents according to the accounts information of user name, password etc., user thinks that server is sent out User log-in authentication request is played, and service end have received the user log-in authentication request.
The step is generally used for user always without logged current site, and website shows the login page of standard, comprising The page of the input frame of username and password and other identifying codes etc;And user can select direct login, it is also possible to select The mode of later stage automated log on is selected, that such as " remembers me " etc chooses.
Step 120:Judge whether comprising long-term logging request in User logs in request, if there are the long-term login Request, then generate session token (session token) and lasting token (long-term token), otherwise only generates session token (session token);
In the present embodiment, the step represents service end for judging the time length of User logs in request, for example, user Choice box of such as " remembeing me " can be chosen, is logged in request for a long time, if user does not choose such as and " remembers me " and select Frame, then the User logs in request does not include long-term logging request, then being merely representative of carries out the login of short-term.Please according to different Ask, the token difference of generation, session token is only used for determining whether the login of short-term, such as several hours, or whether Website or APP is exited, when through corresponding event, or after exiting website, then session token then fails;And lasting token is then The long-term login of permission, such as 1 month.Wherein session token and lasting token all with the information association such as the account of user, and Caching is in the server.
Step 130:The token for generating in the step 120 is sent to user, and User logs in is allowed, send follow-up letter Breath.
In the present embodiment, the step represents after user's initial authentication success, and service end sends corresponding token, and allows User logs in.
Therefore, using the method, session token is only saved in client, and whether carry out the lasting of lasting login Token, above- mentioned information is unrelated with the sensitive information of user, even if taking the information of client, cannot also obtain the certification letter of user Breath.
Further, another reality of the double token login methods according to the specific embodiment of the invention, referring to Fig. 2, is shown Apply example:
Step 140:Receive the content requests of user, in the content requests, carry all of token that user obtains;
In the present embodiment, the step represents after service end enters token in client kind, and user accesses any of website Content, is required for carrying corresponding token and conversates checking.
Step 150:Judge, whether comprising session token in the content requests, if there are session token, then to conversate Token authentication, for example, corresponding for this session token value (Value) is compared with value in caching server, if checking Pass through, then step 160 is entered, if without session token, judge whether comprising lasting token, if there are lasting token, then Lasting token authentication is carried out, for example, this lasting token corresponding value (Value) is compared with value in caching server, If the verification passes, then new session token is generated, and step 160 is entered, otherwise authentication failed, again login authentication.
In the present embodiment, the step represents after session token and lasting token all plant client, and user accesses Any content of website is required for first doing session authentication service, and only session authentication is desired access to by can just go access user afterwards Content.Represent whether user logs in for a long time by lasting token.After session token fails, conversational services can be according to persistently order Board is generating new session token, and session token at this time is marked as passive session token, expression be by after logging in The token for holding request and generating, first logs into session token (the session order of the token alternatively referred to as active of generation with difference Board).
Step 160:Token after checking is updated is sent to user, and allows User logs in, sends follow-up.
In the present embodiment, the step represents the token after checking renewal, only can include to first log into the master of generation Dynamic session token, it is also possible to including lasting token and newly-generated passive session token.
Further, in step 150, if it is determined that have session token, and session token checking does not pass through, then proceed to and hold Long token authentication.
So, in any token authentication, mechanism of remedying ensures to carry out lasting token authentication, to ensure all the time can Judge whether user has chosen " remembeing me ", select long-term login.
Further, after step 150, it is allowed to before User logs in, also include step 155, verify in session token By rear, or persistently token authentication passes through, and after generating new session token, all the expired time of session token is carried out more Newly.
The step can also be verified in session token, only the expired time of the session token after checking is carried out more Newly, this is passed through due to lasting token authentication, and the expired time for generating new session token is newest, need not be updated. It will be appreciated by those skilled in the art that above-mentioned deformation effect is the same.
In the present embodiment, the step represents session token before the deadline, and its effect duration can be with the continuous visit of user Ask and elapse backward, so as to allow user to access all the time.
Additionally, after step 150, it is allowed to before User logs in, can also be according to the needs of institute's accession page, it is desirable to use Family is re-entered user and password and carries out secondary checking.
In the present embodiment, the step represents can need flexible arrangement re-authentication according to safe class demand.
Now, service end can require after new passive session token is only generated to carry out secondary checking, it is also possible to The either session token checking of active, or generate new passive session token, be required to user re-enter user and Password carries out secondary checking.So, though the cookie file equipped with two tokens be stolen also it does not matter whether, equal energy Enough ensure the safety of system and the access of concerning security matters business.
Therefore, embodiments in accordance with the present invention, all authentication informations of user all can only be stored in server end;All are used Family sensitive traffic is required for just accessing after unified authentication center, and system can by identification be passive log in or It is actively entered the login after authentication information.
In order to make it easy to understand, entering to double token account logon methods of the present invention below by specific application scenarios Row description:
As a example by it have selected " remembeing me ", illustrate.User logs in some websites, " remembeing me ", logging request is sent, Then now, after service end receives logging request, judge there is long-term logging request, according to user account and password, generate session Token and lasting token, and User logs in is allowed, after User logs in, after carrying out any other page or service request, It is required to conversate the service for checking credentials, when session token is also within effect duration, service using the session token that obtains End can then be continued to access, and update the expired time of the session token to the session token checking if the verification passes, and will Session token after renewal returns to user, it is ensured that user can carry out follow-up access;If checking does not pass through, finding is No have lasting token, if also without lasting token, authentication failed, it is impossible to continues to access.If session token is due to exceeding The scheduled time and after failing, then directly carry out the checking of lasting token, if the persistently authentication failed of token, cannot continue to visit Ask, need username and password is re-entered, if persistently token authentication passes through, regenerate new session token (quite In passive session token), it is allowed to continue to access, and the session token after renewal is returned to user, it is ensured that user can enter The follow-up access of row.
If, the option of user's non-selected " remembeing me ", User logs in some websites, " remembeing me ", logging request is sent, Then now, after service end receives logging request, judge there is no long-term logging request, according to user account and password, only generate Session token, and User logs in is allowed, after User logs in, after carrying out any other page or service request, it is required to Conversated the service for checking credentials using the session token for obtaining, when session token is also within effect duration, service end can To the session token checking, then continue if the verification passes to access, and the expired time of the session token is updated, and after updating Session token return to user, it is ensured that user can carry out follow-up access;If checking does not pass through, look for whether to hold Long token, due to without lasting token, then authentication failed, it is impossible to continue to access.If session token is due to exceeding the scheduled time And after failing, then the checking of lasting token is directly carried out, and due to without lasting token, then authentication failed.
Wherein it is possible to call SESSIONS that interface is generated, active session token and lasting token is generated, so can be called to add Close active session token and/or lasting token, and the content after encryption is returned to client by json.
Therefore, the present invention have selected the mode of token authentication, and the information of client storage is unrelated with user sensitive information, and In the case of client-side information is taken, the authentication information of user cannot be still obtained.When user selects long-term login, adopt Mechanism with double tokens, it is ensured that generate session token all the time within a period of time, and in the higher service of safety, still select Input username and password is selected, all user authentication informations all can only be stored in server end, all user's sensitive traffic are all needed Can just be accessed after unified authentication center, system can friendly identifying user be passively to log in or be actively entered certification Login after information, both ensure that safety, improve the friendly that user uses again.
Below double token Account Logon checking device of the present invention is described in detail, refers to Fig. 3, in the figure 1 it is shown that root According to double token account authentication devices of the specific embodiment of the invention, the device is arranged on server end, and what user was sent is various Logging request, or content requests are verified.
A kind of pair of token Account Logon verifies device, including:
First receiver module 210:Ask for receive user login authentication, in login authentication request, contain the account of user Family information;
First judge module 220:For judging whether include long-term logging request in User logs in request, if there are The long-term logging request, then generate session token (session token) and lasting token (long-term token), otherwise only generates meeting Words token (session token);
First sending module 230:For the token for generating in the step 120 being sent to user, and allow User logs in, Send follow-up.
Further, also include the second receiver module 240:For the content requests of receive user, in the content requests Carry all of token that user obtains;
Second judge module 250:For judging, whether comprising session token in the content requests, to make if there are session Board, then verify to the session token, if the verification passes, then using the second sending module, it is allowed to User logs in, after transmission Continuous information, if without session token, judges whether comprising lasting token, if there are lasting token, then to the lasting token Verified, if the verification passes, then new session token is generated, and utilizes the second sending module, it is allowed to User logs in, send Follow-up, otherwise authentication failed, login authentication again;
Second sending module 260:Token after checking is updated is sent to user, and allows User logs in, after transmission Continuous information.
Further, second judge module 250, if it is determined that have session token, and session token checking does not pass through, Lasting token authentication is then proceeded to.
Further, also include update module 255, after session token is verified, or persistently token authentication passes through, After generating new session token, the expired time of session token is updated.
Further, for second judge module 250, it is allowed to before User logs in, always according to institute's accession page Need, it is desirable to which user re-enters user and password and carries out secondary checking.
Obviously, it will be understood by those skilled in the art that each unit of the above-mentioned present invention or each step can be with general Computing device is realizing, and they can concentrate on single computing device, alternatively, and they can be executable with computer installation Program code realizing, such that it is able to be stored in storage device being executed by computing device, or by they point Each integrated circuit modules is not fabricated to, or the multiple modules in them or step are fabricated to single integrated circuit module Realize.So, the present invention is not restricted to the combination of any specific hardware and software.
Above content is further description made for the present invention with reference to specific preferred implementation, it is impossible to assert The specific embodiment of the present invention is only limitted to this, for general technical staff of the technical field of the invention, is not taking off On the premise of present inventive concept, some simple deduction or replace can also be made, the present invention should be all considered as belonging to by institute Claims of submission determine protection domain.

Claims (10)

1. a kind of pair of token account logon method, comprises the steps:
Step 110:Receive user login authentication is asked, and contains the accounts information of user in login authentication request;
Step 120:Judge whether comprising long-term logging request in User logs in request, please if there are the long-term login Ask, then session token (session token) and lasting token (long-term token) is generated, otherwise only generate session token (session token);
Step 130:The token for generating in the step 120 is sent to user, and User logs in is allowed, send follow-up.
2. according to claim 1 pair of token account logon method, it is characterised in that:
Step 140:The content requests of receive user, carry all of token that user obtains in the content requests;
Step 150:Judge whether comprising session token in the content requests, if there are session token, then to the session token Verified, if the verification passes, then step 160 entered, if without session token, judge whether comprising lasting token, If there are lasting token, then the lasting token is verified, if the verification passes, then new session token is generated, and is entered Step 160, otherwise authentication failed, login authentication again;
Step 160:Token after checking is updated is sent to user, and allows User logs in, sends follow-up.
3. according to claim 2 pair of token account logon method, it is characterised in that:
In step 150, if it is determined that have session token, and session token checking does not pass through, then proceed to lasting token authentication.
4. according to claim 2 pair of token account logon method, it is characterised in that:
After step 150, it is allowed to before User logs in, also include step 155, after session token is verified, Huo Zhechi Token authentication passes through long, after generating new session token, all the expired time of session token is updated.
5. according to claim 2 pair of token account logon method, it is characterised in that:
After step 150, it is allowed to before User logs in, can also be according to the needs of institute's accession page, it is desirable to which user is again defeated Access customer and password carry out secondary checking.
6. a kind of pair of token Account Logon verifies device, it is characterised in that include:
First receiver module:Ask for receive user login authentication, in login authentication request, contain the accounts information of user;
First judge module:For judging whether comprising long-term logging request in User logs in request, if there are the length Phase logging request, then generate session token (session token) and lasting token (long-term token), otherwise only generates session token (session token);
First sending module:For the token for generating in the step 120 being sent to user, and allow User logs in, after transmission Continuous information.
7. according to claim 6 pair of token Account Logon verifies device, it is characterised in that:
Second receiver module:For the content requests of receive user, carry in the content requests that user obtains is all of Token;
Second judge module:For judging whether comprising session token in the content requests, if there are session token, then to this Session token is verified, if the verification passes, then using the second sending module, it is allowed to User logs in, sends follow-up, such as Fruit does not have session token, then judge whether comprising lasting token, if there are lasting token, then the lasting token is verified, If the verification passes, then new session token is generated, and utilizes the second sending module, it is allowed to User logs in, follow-up is sent, Otherwise authentication failed, login authentication again;
Second sending module:Token after checking is updated is sent to user, and allows User logs in, sends follow-up.
8. according to claim 7 pair of token Account Logon verifies device, it is characterised in that:
Second judge module, if it is determined that have session token, and session token checking does not pass through, then proceed to lasting token and test Card.
9. according to claim 7 pair of token Account Logon verifies device, it is characterised in that:
Also include update module, after session token is verified, or persistently token authentication passes through, and generates new session token Afterwards, the expired time of session token is updated.
10. according to claim 7 pair of token Account Logon verifies device, it is characterised in that:
For second judge module, it is allowed to before User logs in, always according to the needs of institute's accession page, it is desirable to which user is again Input user and password carry out secondary checking.
CN201611014792.3A 2016-11-18 2016-11-18 Double token account login method and login verification device Pending CN106453396A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611014792.3A CN106453396A (en) 2016-11-18 2016-11-18 Double token account login method and login verification device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611014792.3A CN106453396A (en) 2016-11-18 2016-11-18 Double token account login method and login verification device

Publications (1)

Publication Number Publication Date
CN106453396A true CN106453396A (en) 2017-02-22

Family

ID=58220254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611014792.3A Pending CN106453396A (en) 2016-11-18 2016-11-18 Double token account login method and login verification device

Country Status (1)

Country Link
CN (1) CN106453396A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109218326A (en) * 2018-10-10 2019-01-15 广州虎牙信息科技有限公司 Login validation method, device, storage medium and server
CN109379192A (en) * 2018-09-21 2019-02-22 广州小鹏汽车科技有限公司 A kind of login authentication processing method, system and device
CN109413053A (en) * 2018-10-09 2019-03-01 四川长虹电器股份有限公司 A kind of method of User Status verifying in service grid environment
CN111092864A (en) * 2019-11-29 2020-05-01 苏州浪潮智能科技有限公司 Session protection method, device, equipment and readable storage medium
CN111698264A (en) * 2020-06-28 2020-09-22 京东数字科技控股有限公司 Method and apparatus for maintaining user authentication sessions
CN112422528A (en) * 2020-11-03 2021-02-26 北京锐安科技有限公司 Client login method, device, system, electronic equipment and storage medium
CN112491778A (en) * 2019-09-11 2021-03-12 北京京东尚科信息技术有限公司 Authentication method, device, system and medium
CN112688773A (en) * 2019-10-17 2021-04-20 浙江大搜车软件技术有限公司 Token generation and verification method and device
CN113839966A (en) * 2021-11-26 2021-12-24 北京慧点科技有限公司 Security management system based on micro-service
CN115664660A (en) * 2022-10-31 2023-01-31 上海中通吉网络技术有限公司 Method, device, equipment and system for keeping communication token of mobile terminal

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231716A (en) * 2011-06-30 2011-11-02 重庆新媒农信科技有限公司 Instant communication service login method
CN102611709A (en) * 2012-03-31 2012-07-25 奇智软件(北京)有限公司 Access control method and system for third party resources
CN103457738A (en) * 2013-08-30 2013-12-18 优视科技有限公司 Method and system for login processing based on browser
CN103491084A (en) * 2013-09-17 2014-01-01 天脉聚源(北京)传媒科技有限公司 Authentication processing method and device of client side
US20140075513A1 (en) * 2012-09-10 2014-03-13 Adobe Systems Incorporated Device token protocol for authorization and persistent authentication shared across applications
US20150007299A1 (en) * 2012-09-19 2015-01-01 Secureauth Corporation Mobile multifactor single-sign-on authentication
CN104702562A (en) * 2013-12-05 2015-06-10 中国电信股份有限公司 Terminal fusion service access method, terminal fusion service access system, and terminal
CN105516134A (en) * 2015-12-08 2016-04-20 浪潮(北京)电子信息产业有限公司 Authentication method and system for system integration
CN105744518A (en) * 2015-04-24 2016-07-06 维沃移动通信有限公司 Wireless connection authentication method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102231716A (en) * 2011-06-30 2011-11-02 重庆新媒农信科技有限公司 Instant communication service login method
CN102611709A (en) * 2012-03-31 2012-07-25 奇智软件(北京)有限公司 Access control method and system for third party resources
US20140075513A1 (en) * 2012-09-10 2014-03-13 Adobe Systems Incorporated Device token protocol for authorization and persistent authentication shared across applications
US20150007299A1 (en) * 2012-09-19 2015-01-01 Secureauth Corporation Mobile multifactor single-sign-on authentication
CN103457738A (en) * 2013-08-30 2013-12-18 优视科技有限公司 Method and system for login processing based on browser
CN103491084A (en) * 2013-09-17 2014-01-01 天脉聚源(北京)传媒科技有限公司 Authentication processing method and device of client side
CN104702562A (en) * 2013-12-05 2015-06-10 中国电信股份有限公司 Terminal fusion service access method, terminal fusion service access system, and terminal
CN105744518A (en) * 2015-04-24 2016-07-06 维沃移动通信有限公司 Wireless connection authentication method and device
CN105516134A (en) * 2015-12-08 2016-04-20 浪潮(北京)电子信息产业有限公司 Authentication method and system for system integration

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109379192A (en) * 2018-09-21 2019-02-22 广州小鹏汽车科技有限公司 A kind of login authentication processing method, system and device
CN109413053A (en) * 2018-10-09 2019-03-01 四川长虹电器股份有限公司 A kind of method of User Status verifying in service grid environment
CN109413053B (en) * 2018-10-09 2021-10-29 四川长虹电器股份有限公司 Method for user state verification in service grid
CN109218326A (en) * 2018-10-10 2019-01-15 广州虎牙信息科技有限公司 Login validation method, device, storage medium and server
CN112491778A (en) * 2019-09-11 2021-03-12 北京京东尚科信息技术有限公司 Authentication method, device, system and medium
CN112688773A (en) * 2019-10-17 2021-04-20 浙江大搜车软件技术有限公司 Token generation and verification method and device
CN111092864A (en) * 2019-11-29 2020-05-01 苏州浪潮智能科技有限公司 Session protection method, device, equipment and readable storage medium
CN111698264A (en) * 2020-06-28 2020-09-22 京东数字科技控股有限公司 Method and apparatus for maintaining user authentication sessions
CN112422528A (en) * 2020-11-03 2021-02-26 北京锐安科技有限公司 Client login method, device, system, electronic equipment and storage medium
CN112422528B (en) * 2020-11-03 2022-10-14 北京锐安科技有限公司 Client login method, device, system, electronic equipment and storage medium
CN113839966A (en) * 2021-11-26 2021-12-24 北京慧点科技有限公司 Security management system based on micro-service
CN113839966B (en) * 2021-11-26 2022-02-22 北京慧点科技有限公司 Security management system based on micro-service
CN115664660A (en) * 2022-10-31 2023-01-31 上海中通吉网络技术有限公司 Method, device, equipment and system for keeping communication token of mobile terminal

Similar Documents

Publication Publication Date Title
CN106453396A (en) Double token account login method and login verification device
CN109309683B (en) Token-based client identity authentication method and system
US12063208B2 (en) Single sign-on for unmanaged mobile devices
US10652282B2 (en) Brokered authentication with risk sharing
US8898752B2 (en) Efficiently throttling user authentication
US9300653B1 (en) Delivery of authentication information to a RESTful service using token validation scheme
US10171448B2 (en) Single sign-on for unmanaged mobile devices
US8141140B2 (en) Methods and systems for single sign on with dynamic authentication levels
US9391978B2 (en) Multiple access authentication
US7716469B2 (en) Method and system for providing a circle of trust on a network
CN109815656A (en) Login authentication method, apparatus, device, and computer-readable storage medium
US11356261B2 (en) Apparatus and methods for secure access to remote content
CN111062023B (en) Method and device for realizing single sign-on of multi-application system
US9143501B2 (en) Reauthentication to a web service without disruption
US20100077467A1 (en) Authentication service for seamless application operation
CN102469075A (en) Integrated authentication method based on WEB single sign-on
US20170279798A1 (en) Multi-factor authentication system and method
CN113742676A (en) Login management method, device, server, system and storage medium
US10601809B2 (en) System and method for providing a certificate by way of a browser extension
CN106161348A (en) A single sign-on method, system and terminal
CN110365684A (en) Access control method, device and the electronic equipment of application cluster
CN111371725A (en) Method for improving security of session mechanism, terminal equipment and storage medium
CN103634111B (en) Single-point logging method and system and single sign-on client-side
JP2018037025A (en) Program, authentication system and authentication linkage system
US12388656B2 (en) Systems methods and devices for dynamic authentication and identification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222