Nothing Special   »   [go: up one dir, main page]

CN110489957A - The management method and computer storage medium of access request - Google Patents

The management method and computer storage medium of access request Download PDF

Info

Publication number
CN110489957A
CN110489957A CN201910716280.9A CN201910716280A CN110489957A CN 110489957 A CN110489957 A CN 110489957A CN 201910716280 A CN201910716280 A CN 201910716280A CN 110489957 A CN110489957 A CN 110489957A
Authority
CN
China
Prior art keywords
token
website
user
information
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910716280.9A
Other languages
Chinese (zh)
Other versions
CN110489957B (en
Inventor
陈健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing second hand Artificial Intelligence Technology Co.,Ltd.
Original Assignee
Jingshuo Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jingshuo Technology Beijing Co Ltd filed Critical Jingshuo Technology Beijing Co Ltd
Priority to CN201910716280.9A priority Critical patent/CN110489957B/en
Publication of CN110489957A publication Critical patent/CN110489957A/en
Application granted granted Critical
Publication of CN110489957B publication Critical patent/CN110489957B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the present application discloses the management method and device of a kind of access request.The described method includes: obtaining the site information for allowing the user to access after detecting that user initiates to the access request of website;According to the site information, token information needed for accessing each website is obtained for the user;Send the token information.

Description

The management method and computer storage medium of access request
Technical field
The invention relates to field of information processing, the management method and computer of espespecially a kind of access request, which store, to be situated between Matter.
Background technique
When accessing website using browser, user is by sending access request to server-side request data.Server-side according to Different business natures, needs to judge whether user has permission to access this data, is that can just respond judging that user has permission Access request.Therefore, when access request is initiated, the detection that needs user to log in and authorize.
It in the related technology, can be using the method this method of single-sign-on (Single Sign On, SSO) in detection user When accessing website for the first time, SSO system returns to token to front end, and front end is made to access operation system with token.Operation system is obtaining To after token, request SSO system is gone to judge token permission, after SSO system judges that token passes through, operation system returns to number of request According to.In addition, when jumping to the second website from the first website, need the server of the first website based on arranging with the second website Token create-rule generate it is new log in token, above-mentioned access process, interaction times are excessive, reduce the processing to access request and imitate Rate.
Summary of the invention
In order to solve any of the above-described technical problem, the embodiment of the present application provide a kind of access request management method and Computer storage medium.
In order to reach the embodiment of the present application purpose, the embodiment of the present application provides a kind of management method of access request, packet It includes:
After detecting that user initiates to the access request of website, the site information for allowing the user to access is obtained;
According to the site information, token information needed for accessing each website is obtained for the user;
Send the token information.
It is in one exemplary embodiment, described to obtain the site information for allowing the user to access, comprising:
Obtain the targeted website requested access in access request;
After determining that the targeted website allows the user to access, obtaining allows the user to hold on the targeted website Row jumps the website of access, using the targeted website and the user is allowed to execute the website for jumping access as the permission use The website of family access.
In one exemplary embodiment, described according to the site information, it is obtained for the user and accesses each website Required token information, comprising:
Apply for the user for token information needed for accessing each website;
Application result is received, the corresponding token in each website is obtained;
It is described to send the token information, comprising:
Send the correspondence relationship information of the token and each token and website.
In one exemplary embodiment, described according to the site information, it is obtained for the user and accesses each website Required token information, comprising:
According to pre-set token generation strategy, corresponding token is generated for each website;
It is described to send the token information, comprising:
Send the token, each token and website correspondence relationship information and be used to indicate each token generation strategy Instruction information.
A kind of management method of access request, comprising:
Token information is obtained, wherein the token information includes token needed for allowing each website of user's access Information;
When initiating access request to targeted website, from obtained token information, it is corresponding to obtain the targeted website Target spoke;
Send the target spoke.
A kind of computer storage medium, including processor and memory, wherein memory is stored with computer program, wherein The processor is to call the computer program in the memory to realize following operation, comprising:
After detecting that user initiates to the access request of website, the site information for allowing the user to access is obtained;
According to the site information, token information needed for accessing each website is obtained for the user;
Send the token information.
In one exemplary embodiment, the processor is to call the computer program in the memory to realize The operation for obtaining the site information for allowing the user to access, comprising:
Obtain the targeted website requested access in access request;
After determining that the targeted website allows the user to access, obtaining allows the user to hold on the targeted website Row jumps the website of access, using the targeted website and the user is allowed to execute the website for jumping access as the permission use The website of family access.
In one exemplary embodiment, the processor is to call the computer program in the memory to realize It is described according to the site information, the operation of token information needed for accessing each website is obtained for the user, comprising:
Apply for the user for token information needed for accessing each website;
Application result is received, the corresponding token in each website is obtained;
The processor realizes the transmission token information to call the computer program in the memory Operation, comprising:
Send the correspondence relationship information of the token and each token and website.
In one exemplary embodiment, the processor is to call the computer program in the memory to realize It is described according to the site information, the operation of token information needed for accessing each website is obtained for the user, comprising:
According to pre-set token generation strategy, corresponding token is generated for each website;
The processor realizes the transmission token information to call the computer program in the memory Operation, comprising:
Send the token, each token and website correspondence relationship information and be used to indicate each token generation strategy Instruction information.
A kind of computer storage medium, including processor and memory, wherein memory is stored with computer program, wherein The processor is to call the computer program in the memory to realize following operation, comprising:
Token information is obtained, wherein the token information includes token needed for allowing each website of user's access Information;
When initiating access request to targeted website, from obtained token information, it is corresponding to obtain the targeted website Target spoke;
Send the target spoke.
Technical solution provided by the embodiments of the present application, by for one group of token of user configuration, allowing users to user's difference Token access different websites, improve the access efficiency of website;In addition, when mutually being jumped between multiple websites, nothing It need to regenerate and log in token, improve the treatment effeciency that website jumps.
The other feature and advantage of the embodiment of the present application will illustrate in the following description, also, partly from explanation It becomes apparent in book, or is understood and implementing the embodiment of the present application.The purpose of the embodiment of the present application and other advantages It can be achieved and obtained by structure specifically noted in the specification, claims and drawings.
Detailed description of the invention
Attached drawing is used to provide one for further understanding the embodiment of the present application technical solution, and constituting specification Point, it is used to explain the technical solution of the embodiment of the present application together with embodiments herein, does not constitute to the embodiment of the present application The limitation of technical solution.
Fig. 1 is a kind of flow chart of the management method of access request provided by the embodiments of the present application;
Fig. 2 is the flow chart of the management method of another access request provided by the embodiments of the present application;
Fig. 3 is the flow chart of the management method of another access request provided by the embodiments of the present application.
Specific embodiment
For the purposes, technical schemes and advantages of the embodiment of the present application are more clearly understood, below in conjunction with attached drawing pair The embodiment of the embodiment of the present application is described in detail.It should be noted that in the absence of conflict, the implementation in the application Feature in example and embodiment can mutual any combination.
Step shown in the flowchart of the accompanying drawings can be in a computer system such as a set of computer executable instructions It executes.Also, although logical order is shown in flow charts, and it in some cases, can be to be different from herein suitable Sequence executes shown or described step.
Realize the application technical solution during, inventor discovery in the prior art at least there is a problem in that:
1, to provide SSO service, stand-alone development SSO system is needed, development cost is higher;
2, when user initiates access request, operation system requires the legitimacy for first removing sso verifying token every time, drags slow The response time of website;
Once delay machine occurs in 3, SSO service, the multiple websites interacted will be unable to the access request outside normal response.
It is analyzed in view of above-mentioned technology, inventor provides following solution, comprising:
Fig. 1 is a kind of flow chart of the management method of access request provided by the embodiments of the present application.Method packet shown in Fig. 1 It includes:
Step 101, after detecting that user initiates to the access request of website, obtain the website for allowing the user to access Information;
In one exemplary embodiment, to the access request of website can be detect user apply online license, or Person is resolved to the request of Client-initiated website visiting.
In one exemplary embodiment, the website for allowing user's access can be pre-set website;If When allowing the Websites quantity of user's access very much, site information relevant to the website of current accessed can also be obtained.Tool Body is accomplished by
It is described to obtain the site information for allowing the user to access, comprising:
Obtain the targeted website requested access in access request;
After determining that the targeted website allows the user to access, obtaining allows the user to hold on the targeted website Row jumps the website of access, using the targeted website and the user is allowed to execute the website for jumping access as the permission use The website of family access.
In practical applications, if the website for the shopping that user logs in, the user is allowed to jump in shopping website execution Be paying website corresponding with the shopping website.
Step 102, according to the site information, token information needed for accessing each website is obtained for the user;
In one exemplary embodiment, unlike the relevant technologies, scheme provided by the present application is for user's acquisition Token needed for each website is used for user in access;
Wherein, the mode for generating token is divided according to executing subject, can there is following two ways, comprising:
Mode one: it is described that token information needed for accessing each website is obtained for the user according to the site information, Include:
Apply for the user for token information needed for accessing each website;
Application result is received, the corresponding token in each website is obtained.
Mode two: it is described that token information needed for accessing each website is obtained for the user according to the site information, Include:
According to pre-set token generation strategy, corresponding token is generated for each website.
Step 103 sends the token information.
In one exemplary embodiment, based on different token generating modes, when sending token information, the letter of transmission Breath is also corresponding different.
In employing mode a period of time, the correspondence relationship information of the token and each token and website is sent.
In employing mode two, send the token, each token and website correspondence relationship information and be used to indicate The instruction information of each token generation strategy.
Wherein, each token and the corresponding relationship of website be for user selected when accessing website it is matched with the website Token.The instruction information of token generation strategy can serve to indicate that server carries out token authentication operation.
The identity of the executing subject of number information or generation token that the instruction information of token generation strategy can be tactful Information.
Method provided by the embodiments of the present application, after detecting that user initiates to the access request of website, obtaining allows institute The site information for stating user's access obtains token needed for accessing each website for the user and believes according to the site information Breath, and sends the token information, by being one group of token of user configuration, allows users to the different token access difference of user Website, improve the access efficiency of website;In addition, being logged in when mutually being jumped between multiple websites without regenerating Token improves the treatment effeciency that website jumps.
Fig. 2 is the flow chart of the management method of another access request provided by the embodiments of the present application.Method packet shown in Fig. 2 It includes:
Step 201 obtains token information, wherein the token information includes allowing each website institute of user's access The token information needed;
In one exemplary embodiment, token information may include the corresponding relationship of token and each token and website Information;Alternatively, token information may include token, token and the correspondence relationship information of website and to be used to indicate each token raw At the instruction information of strategy.
Step 202, to targeted website initiate access request when, from obtained token information, obtain the target network It stands corresponding target spoke;
In one exemplary embodiment, according to the corresponding relationship of the token and website that obtain in advance, the targeted website Corresponding target spoke;Alternatively, inquiring corresponding token to token sender.
Step 203 sends the target spoke.
In one exemplary embodiment, if target spoke is that token sender applies obtaining from outside, directly The token is sent, is generated if it is token sender, also to send the instruction information of token generation strategy.
Method provided by the embodiments of the present application obtains token information, wherein the token information includes allowing the user Token information needed for each website of access from obtained token information, is obtained when initiating access request to targeted website The corresponding target spoke in the targeted website is taken, and sends the target spoke, by making user for one group of token of user configuration Can the different token of user access different websites, improve the access efficiency of website;In addition, mutually being jumped between multiple websites When turning, token is logged in without regenerating, improves the treatment effeciency that website jumps.
Method provided by the embodiments of the present application is illustrated below:
Fig. 3 is the flow chart of the processing method of access request provided by the embodiments of the present application.As shown in figure 3, the method Include:
Step 301, when detecting that user requests to initiate website visiting request, access control system obtains the user and permits Perhaps the Website login accessed;
In one exemplary embodiment, the identity for Web vector graphic can be increased in client used by a user Certification page determines that the user initiates network access and asks in detection user in the Verify Your Identity page that logging in online accesses It asks.
In one exemplary embodiment, the website accessed can be allowed for user configuration according to the identity information of user Information.When detecting that user requests to initiate access request, according to the identity information of the user, determining allows the user to visit The site information asked.Wherein identity information can be user name.
According to the identity information of user, determine that the website that user allows to access is A, B, C;
In one exemplary embodiment, the access website of permission can click the website of access for user and request is visited Other websites for allowing to jump on the website asked, if user requests access to website A, from website, A jumps to website B and website C.
Step 302, access control system are token needed for the user obtains each website of access;
In one exemplary embodiment, the acquisition request of token needed for access control system initiates each website, passes through The token information for receiving feedback obtains the token of the user;Alternatively, negotiating determining token according to the server of each website Generation strategy generates corresponding token for the user, voluntarily generates token by local, can shorten the acquisition time of token;
In one exemplary embodiment, token information has corresponding validity period, has in the use duration of token more than this After the effect phase, which will fail, to effectively improve the safety of access.
Step 303, access control system send token information to the user;
It in one exemplary embodiment, can direct military order when the token information is by obtaining at server Board is sent to user;When token is generated by access control system, while sending token, it is also necessary to send the access control The identity of system processed, so that website carries out authentication.
In one exemplary embodiment, token information includes the corresponding relationship of token and token and website.
In one exemplary embodiment, token information can also include the instruction letter for being used to indicate token generating mode Breath, the instruction information can be flag bit, and the server for website determines the generating mode of token, determines matched order Board verification mode.
Step 304, user send access request after obtaining token information;
Step 305, first server obtain corresponding first net of first server after receiving access request, from user Token needed for standing;
In one exemplary embodiment, user can be with the token of active transmission website A;Alternatively, receiving website After the token acquisition request that server is sent, according to the corresponding relationship of token and website, corresponding token is provided to website.
In one exemplary embodiment, the token transmission between user and first server is encryption, improves letter Cease the safety of transmission;After first server receives encrypted token, operation is decrypted, obtains token information.
Step 306, first server verify token;
In one exemplary embodiment, first server determines the generating mode of the token, can pass through the order of carrying The instruction information of board generating mode determines, alternatively, determined by inquiring to access control system, alternatively, according to whether taking Identification information with access control system determines.
If the generating mode of token is what server generated, at token authentication mode in the related technology Reason;
If the generating mode of token is what access control system generated, believed first according to the mark of access control system Breath, determines the generation strategy of token;Server determines according to token generation strategy and is used to verify the benchmark token used, then presses It is handled according to token authentication mode in the related technology.
In one exemplary embodiment, if token information further includes validity period information, when carrying out token, root is also wanted According to the validity period of token, judge whether token is effective.
If the verification passes, 307 are thened follow the steps;Otherwise, process terminates.
Step 307, the access request of first server response user.
When detecting that user jumps to corresponding second website of second server from the corresponding web site requests of first server When, step 305 need to be only executed to step 306, be based on and the second net with the server of the first website is needed in the related technology The token create-rule for agreement of standing generates the new token that logs in and compares, and the can be directly selected from the one group of token obtained The token of two websites just directly initiates access request, saves access time, improve the treatment effeciency of access request.
From the above, it can be seen that the primary login of user generates a group access token, accessed with different tokens different Website logs in token without regenerating when mutually jumping between multiple websites, user's access easily, system response time Fastly, program development is at low cost.
A kind of computer storage medium, including processor and memory, wherein memory is stored with computer program, wherein The processor is to call the computer program in the memory to realize following operation, comprising:
After detecting that user initiates to the access request of website, the site information for allowing the user to access is obtained;
According to the site information, token information needed for accessing each website is obtained for the user;
Send the token information.
In one exemplary embodiment, the processor is to call the computer program in the memory to realize The operation for obtaining the site information for allowing the user to access, comprising:
Obtain the targeted website requested access in access request;
After determining that the targeted website allows the user to access, obtaining allows the user to hold on the targeted website Row jumps the website of access, using the targeted website and the user is allowed to execute the website for jumping access as the permission use The website of family access.
In one exemplary embodiment, the processor is to call the computer program in the memory to realize It is described according to the site information, the operation of token information needed for accessing each website is obtained for the user, comprising:
Apply for the user for token information needed for accessing each website;
Application result is received, the corresponding token in each website is obtained;
The processor realizes the transmission token information to call the computer program in the memory Operation, comprising:
Send the correspondence relationship information of the token and each token and website.
In one exemplary embodiment, the processor is to call the computer program in the memory to realize It is described according to the site information, the operation of token information needed for accessing each website is obtained for the user, comprising:
According to pre-set token generation strategy, corresponding token is generated for each website;
The processor realizes the transmission token information to call the computer program in the memory Operation, comprising:
Send the token, each token and website correspondence relationship information and be used to indicate each token generation strategy Instruction information.
Computer storage medium provided by the embodiments of the present application, after detecting that user initiates to the access request of website, The site information for allowing the user to access is obtained, according to the site information, is obtained for the user and accesses each website institute The token information needed, and sends the token information, by allowing users to the different order of user for one group of token of user configuration Board accesses different websites, improves the access efficiency of website;In addition, when mutually being jumped between multiple websites, without weight It is newly-generated to log in token, improve the treatment effeciency that website jumps.
A kind of computer storage medium, including processor and memory, wherein memory is stored with computer program, wherein The processor is to call the computer program in the memory to realize following operation, comprising:
Token information is obtained, wherein the token information includes token needed for allowing each website of user's access Information;
When initiating access request to targeted website, from obtained token information, it is corresponding to obtain the targeted website Target spoke;
Send the target spoke.
Computer storage medium provided by the embodiments of the present application obtains token information, wherein the token information includes permitting Perhaps token information needed for each website of described user's access, when initiating access request to targeted website, from obtained order In board information, the corresponding target spoke in the targeted website is obtained, and send the target spoke, by being one group of user configuration Token allows users to the different token of user and accesses different websites, improves the access efficiency of website;In addition, in multiple nets When mutually jumping between standing, token is logged in without regenerating, improves the treatment effeciency that website jumps.
Those of ordinary skill in the art will appreciate that computer journey can be used in all or part of the steps of above-described embodiment Sequence process realizes that the computer program can be stored in a computer readable storage medium, the computer program exists (such as system, unit, device) executes on corresponding hardware platform, when being executed, include the steps that embodiment of the method it One or combinations thereof.
Optionally, integrated circuit can be used also to realize in all or part of the steps of above-described embodiment, these steps can To be fabricated to integrated circuit modules one by one respectively, or make multiple modules or steps in them to single integrated electricity Road module is realized.It is combined in this way, the embodiment of the present application is not limited to any specific hardware and software.
Each device/functional module/functional unit in above-described embodiment, which can be adopted, is realized with general computing device realization, it Can be concentrated on a single computing device, can also be distributed over a network of multiple computing devices.
Each device/functional module/functional unit in above-described embodiment realized in the form of software function module and as Independent product when selling or using, can store in a computer readable storage medium.Computer mentioned above Read/write memory medium can be read-only memory, disk or CD etc..
The above, the only specific embodiment of the embodiment of the present application, but the protection scope of the embodiment of the present application is not It is confined to this, anyone skilled in the art can think easily in the technical scope that the embodiment of the present application discloses To change or replacement, should all cover within the protection scope of the embodiment of the present application.Therefore, the protection scope of the embodiment of the present application It should be subject to protection scope described in claim.

Claims (10)

1. a kind of management method of access request characterized by comprising
After detecting that user initiates to the access request of website, the site information for allowing the user to access is obtained;
According to the site information, token information needed for accessing each website is obtained for the user;
Send the token information.
2. the method according to claim 1, wherein described obtain the site information for allowing the user to access, Include:
Obtain the targeted website requested access in access request;
After determining that the targeted website allows the user to access, obtaining allows the user to execute jump on the targeted website The website for turning access using the targeted website and allows the user to execute to jump the website of access as allowing user's visit The website asked.
3. according to the method described in claim 1, it is characterized by:
It is described according to the site information, token information needed for accessing each website is obtained for the user, comprising:
Apply for the user for token information needed for accessing each website;
Application result is received, the corresponding token in each website is obtained;
It is described to send the token information, comprising:
Send the correspondence relationship information of the token and each token and website.
4. according to the method described in claim 1, it is characterized by:
It is described according to the site information, token information needed for accessing each website is obtained for the user, comprising:
According to pre-set token generation strategy, corresponding token is generated for each website;
It is described to send the token information, comprising:
Send the token, each token and website correspondence relationship information and be used to indicate the finger of each token generation strategy Show information.
5. a kind of management method of access request characterized by comprising
Token information is obtained, wherein the token information includes that token needed for allowing each website of user's access is believed Breath;
When initiating access request to targeted website, from obtained token information, the corresponding target in the targeted website is obtained Token;
Send the target spoke.
6. a kind of computer storage medium, which is characterized in that including processor and memory, wherein memory is stored with computer Program, wherein the processor is to call the computer program in the memory to realize following operation, comprising:
After detecting that user initiates to the access request of website, the site information for allowing the user to access is obtained;
According to the site information, token information needed for accessing each website is obtained for the user;
Send the token information.
7. computer storage medium according to claim 6, which is characterized in that the processor is to call the storage Computer program in device is to realize the operation for obtaining the site information for allowing the user to access, comprising:
Obtain the targeted website requested access in access request;
After determining that the targeted website allows the user to access, obtaining allows the user to execute jump on the targeted website The website for turning access using the targeted website and allows the user to execute to jump the website of access as allowing user's visit The website asked.
8. computer storage medium according to claim 6, it is characterised in that:
The processor realized to call the computer program in the memory it is described according to the site information, for institute State the operation of token information needed for user obtains each website of access, comprising:
Apply for the user for token information needed for accessing each website;
Application result is received, the corresponding token in each website is obtained;
The processor realizes the behaviour for sending the token information to call the computer program in the memory Make, comprising:
Send the correspondence relationship information of the token and each token and website.
9. computer storage medium according to claim 6, it is characterised in that:
The processor realized to call the computer program in the memory it is described according to the site information, for institute State the operation of token information needed for user obtains each website of access, comprising:
According to pre-set token generation strategy, corresponding token is generated for each website;
The processor realizes the behaviour for sending the token information to call the computer program in the memory Make, comprising:
Send the token, each token and website correspondence relationship information and be used to indicate the finger of each token generation strategy Show information.
10. a kind of computer storage medium, which is characterized in that including processor and memory, wherein memory is stored with calculating Machine program, wherein the processor is to call the computer program in the memory to realize following operation, comprising:
Token information is obtained, wherein the token information includes that token needed for allowing each website of user's access is believed Breath;
When initiating access request to targeted website, from obtained token information, the corresponding target in the targeted website is obtained Token;
Send the target spoke.
CN201910716280.9A 2019-08-05 2019-08-05 Management method of access request and computer storage medium Active CN110489957B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910716280.9A CN110489957B (en) 2019-08-05 2019-08-05 Management method of access request and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910716280.9A CN110489957B (en) 2019-08-05 2019-08-05 Management method of access request and computer storage medium

Publications (2)

Publication Number Publication Date
CN110489957A true CN110489957A (en) 2019-11-22
CN110489957B CN110489957B (en) 2021-09-14

Family

ID=68549399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910716280.9A Active CN110489957B (en) 2019-08-05 2019-08-05 Management method of access request and computer storage medium

Country Status (1)

Country Link
CN (1) CN110489957B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111371743A (en) * 2020-02-21 2020-07-03 上海红神信息技术有限公司 Security defense method, device and system
CN112507320A (en) * 2020-12-10 2021-03-16 东莞市盟大塑化科技有限公司 Access control method, device, system, electronic equipment and storage medium
CN113158198A (en) * 2020-01-22 2021-07-23 华为技术有限公司 Access control method, device, terminal equipment and storage medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348612A (en) * 2013-07-23 2015-02-11 腾讯科技(深圳)有限公司 Third-party website login method based on mobile terminal and mobile terminal
CN104378376A (en) * 2014-11-18 2015-02-25 深圳中兴网信科技有限公司 SOA-based single-point login method, authentication server and browser
CN105007280A (en) * 2015-08-05 2015-10-28 郑州悉知信息技术有限公司 Application sign-on method and device
CN105430102A (en) * 2015-12-28 2016-03-23 东软集团股份有限公司 Integration method and system of SaaS (Software as a Service) website and third-party system and device thereof
CN106101134A (en) * 2016-07-13 2016-11-09 十九楼网络股份有限公司 User's multiple domain is under one's name across the method for station roaming checking logging status
CN106302324A (en) * 2015-05-20 2017-01-04 北京神州泰岳软件股份有限公司 The user authen method of device within the domain and device
CN106470186A (en) * 2015-08-17 2017-03-01 工业和信息化部电信研究院 A kind of to redirect the method that mode accesses third party's resource
CN106534143A (en) * 2016-11-28 2017-03-22 上海斐讯数据通信技术有限公司 Method and system capable of realizing cross-application authentication authorization
CN106559384A (en) * 2015-09-25 2017-04-05 阿里巴巴集团控股有限公司 A kind of utilization public number realizes the method and device for logging in
CN107196892A (en) * 2016-03-15 2017-09-22 阿里巴巴集团控股有限公司 A kind of Website logging method and device
CN107359996A (en) * 2016-05-09 2017-11-17 阿里巴巴集团控股有限公司 Automatic logging method and device between more websites
CN107786571A (en) * 2017-11-07 2018-03-09 昆山云景商务服务有限公司 A kind of method of user's unified certification
CN108881232A (en) * 2018-06-21 2018-11-23 北京海泰方圆科技股份有限公司 Sign-on access method, apparatus, storage medium and the processor of operation system
CN109409043A (en) * 2018-09-03 2019-03-01 中国平安人寿保险股份有限公司 Login method, terminal device and the medium of application system
CN109543376A (en) * 2018-11-30 2019-03-29 高新兴科技集团股份有限公司 Debarkation authentication method, computer storage medium and electronic equipment

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348612A (en) * 2013-07-23 2015-02-11 腾讯科技(深圳)有限公司 Third-party website login method based on mobile terminal and mobile terminal
CN104378376A (en) * 2014-11-18 2015-02-25 深圳中兴网信科技有限公司 SOA-based single-point login method, authentication server and browser
CN106302324A (en) * 2015-05-20 2017-01-04 北京神州泰岳软件股份有限公司 The user authen method of device within the domain and device
CN105007280A (en) * 2015-08-05 2015-10-28 郑州悉知信息技术有限公司 Application sign-on method and device
CN106470186A (en) * 2015-08-17 2017-03-01 工业和信息化部电信研究院 A kind of to redirect the method that mode accesses third party's resource
CN106559384A (en) * 2015-09-25 2017-04-05 阿里巴巴集团控股有限公司 A kind of utilization public number realizes the method and device for logging in
CN105430102A (en) * 2015-12-28 2016-03-23 东软集团股份有限公司 Integration method and system of SaaS (Software as a Service) website and third-party system and device thereof
CN107196892A (en) * 2016-03-15 2017-09-22 阿里巴巴集团控股有限公司 A kind of Website logging method and device
CN107359996A (en) * 2016-05-09 2017-11-17 阿里巴巴集团控股有限公司 Automatic logging method and device between more websites
SG11201809238PA (en) * 2016-05-09 2018-11-29 Alibaba Group Holding Ltd Automatic login method and device between multiple websites
CN106101134A (en) * 2016-07-13 2016-11-09 十九楼网络股份有限公司 User's multiple domain is under one's name across the method for station roaming checking logging status
CN106534143A (en) * 2016-11-28 2017-03-22 上海斐讯数据通信技术有限公司 Method and system capable of realizing cross-application authentication authorization
CN107786571A (en) * 2017-11-07 2018-03-09 昆山云景商务服务有限公司 A kind of method of user's unified certification
CN108881232A (en) * 2018-06-21 2018-11-23 北京海泰方圆科技股份有限公司 Sign-on access method, apparatus, storage medium and the processor of operation system
CN109409043A (en) * 2018-09-03 2019-03-01 中国平安人寿保险股份有限公司 Login method, terminal device and the medium of application system
CN109543376A (en) * 2018-11-30 2019-03-29 高新兴科技集团股份有限公司 Debarkation authentication method, computer storage medium and electronic equipment

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113158198A (en) * 2020-01-22 2021-07-23 华为技术有限公司 Access control method, device, terminal equipment and storage medium
WO2021147442A1 (en) * 2020-01-22 2021-07-29 华为技术有限公司 Access control method and apparatus, terminal device, and storage medium
CN113158198B (en) * 2020-01-22 2024-07-05 华为技术有限公司 Access control method, device, terminal equipment and storage medium
CN111371743A (en) * 2020-02-21 2020-07-03 上海红神信息技术有限公司 Security defense method, device and system
CN112507320A (en) * 2020-12-10 2021-03-16 东莞市盟大塑化科技有限公司 Access control method, device, system, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110489957B (en) 2021-09-14

Similar Documents

Publication Publication Date Title
US11089011B2 (en) Algorithm hardening in background context and external from the browser to prevent malicious intervention with the browser
CN105007280B (en) A kind of application login method and device
CN101764819B (en) For detecting the method and system of man-in-the-browser attacks
CN105072123B (en) A kind of single sign-on under cluster environment exits method and system
JP5147336B2 (en) Method, system, and program for authenticating a user attempting to perform an electronic service request
JP6533871B2 (en) System and method for controlling sign-on to web applications
CN104320423B (en) Single-sign-on lightweight implementation method based on Cookie
CN102480490B (en) Method for preventing CSRF attack and equipment thereof
US9246907B2 (en) Confidence-based authentication discovery for an outbound proxy
CN105337949B (en) A kind of SSO authentication method, web server, authentication center and token verify center
US10778668B2 (en) HTTP session validation module
US9584615B2 (en) Redirecting access requests to an authorized server system for a cloud service
CN107948201A (en) The purview certification method and system in Docker mirror images warehouse
CN104158818B (en) A kind of single-point logging method and system
CN103428179B (en) A kind of log in the method for many domain names website, system and device
CN105430102B (en) The integrated approach of the websites SaaS and third party system, system and its apparatus
CN107172054A (en) A kind of purview certification method based on CAS, apparatus and system
CN110489957A (en) The management method and computer storage medium of access request
CN107659577A (en) Account management method and system for multiple websites
CN106790063A (en) A kind of method of isomery WEB system single-sign-ons
CN110036387A (en) Integrated agreement system
CN110020043B (en) Page crawling method, device, storage medium and processor
CN112688937A (en) Login method for system single sign-on under cross-application heterogeneous application
CN108322427A (en) A kind of method and apparatus carrying out air control to access request
CN103634111B (en) Single-point logging method and system and single sign-on client-side

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210105

Address after: A108, 1 / F, curling hall, winter training center, 68 Shijingshan Road, Shijingshan District, Beijing 100041

Applicant after: Beijing second hand Artificial Intelligence Technology Co.,Ltd.

Address before: 100080 area C, 3rd floor, building 2, zone B, Dongsheng Science Park, Zhongguancun, Haidian District, Beijing

Applicant before: ADMASTER TECHNOLOGY (BEIJING) Co.,Ltd.

GR01 Patent grant
GR01 Patent grant