Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An access authentication method, device, electronic device and readable medium

An authentication method and access request technology, applied in the computer field, can solve the problems of not allowing multiple logins and multiple browsers not allowing simultaneous logins, etc., to achieve the effect of reducing unauthorized access, reducing storage pressure, and improving resource access efficiency

Active Publication Date: 2022-04-12
BEIJING DIANJIEZHI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in many data products that are accessed based on Uniform Resource Locator (URL) links, one account does not allow multiple logins (that is, simultaneous logins on multiple clients), and multiple browsers on a single machine do not allow simultaneous logins. Login, the existing single sign-on method does not meet the above requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An access authentication method, device, electronic device and readable medium
  • An access authentication method, device, electronic device and readable medium
  • An access authentication method, device, electronic device and readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0041] The technical terms involved in the embodiments of the present invention are explained below.

[0042] Cookie: It is a text file saved on the client, generally generated by the website server, sent to the client browser through the response, and then saved by the client browser.

[0043] figure 1 is a schematic diagram of main steps of the access authentication me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access authentication method and device, and relates to the technical field of computers. A specific implementation of the method includes: intercepting the access request, confirming that the access request is a non-login request, and obtaining cookie information from the access request; wherein, the cookie information is generated according to the login information of the user who initiated the access request and the set token Generated by rules, including the first login account and the corresponding first token; find the second login account that matches the first login account in the stored authentication data; wherein, the authentication data is based on the last login account corresponding to the first login account The login information carried by a login request and generated by the token generation rule include the second login account and the corresponding second token; determine the second token corresponding to the found second login account and the first token If they do not match, it is determined that the access request has not passed the authentication. This embodiment can restrict multiple logins of the same account.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to an access authentication method and device. Background technique [0002] Single Sign On (SSO) is currently a popular enterprise business integration solution. The definition of SSO is that in multiple application systems, users only need to log in once to access all mutually trusted application systems. However, in many data products that are accessed based on Uniform Resource Locator (URL) links, one account does not allow multiple logins (that is, simultaneous logins on multiple clients), and multiple browsers on a single machine do not allow simultaneous logins. Login, the existing single sign-on method cannot meet the above requirements. Contents of the invention [0003] In view of this, an embodiment of the present invention provides an access authentication method and device. After intercepting an access request that is not a login request, the method first ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0815H04L63/0807H04L63/083H04L63/101
Inventor 王婷
Owner BEIJING DIANJIEZHI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products