User login authentication method based on two-stage deployment

A login authentication, user technology, applied in the field of user login authentication based on two-level deployment, can solve the problems of increasing user troubles and increasing development costs, and achieve a good effect of popularization and application value

Inactive Publication Date: 2021-03-05
山东健康医疗大数据有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This will not only increase the development cost for developers to maintain multiple user systems, but also cause users to log in again when using different business systems, adding unnecessary trouble to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User login authentication method based on two-stage deployment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0032] Such as figure 1 As shown, the user login authentication method based on two-level deployment of the present invention includes the following steps:

[0033] S1. The user accesses BN node resources.

[0034] S2. Judging whether to carry the token, if it is carried out, step S3 is executed, otherwise, step S4 is executed.

[0035] S3, whether the token is valid, if so, execute step S9, otherwise, execute step S4.

[0036] S4. Whether to carry ST, if yes, execute step S5; otherwise, execute step S6.

[0037] S5. Visit the BN node, and execute step S9.

[0038] S6. Whether the jump to the CA login page with the BN page is successful, if so, execute step S7, otherwise execute step S8.

[0039] S7. Call back the BN page, carry ST, and return to step S5.

[0040] S8. Prompt the user to log in again, and return to step S7.

[0041] S9. Return the resource.

[0042] BN stands for Business Node, which is the business node of each autonomous region.

[0043] CA is the CAS...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user login authentication method based on two-stage deployment, and belongs to the technical field of user login authentication. The user login authentication method based ontwo-stage deployment comprises the following steps: S1, accessing BN node resources by a user; S2, judging whether a token is carried or not, if so, executing the step S3, or otherwise, executing thestep S4; S3, judging whether the token is valid or not, if yes, executing the step S9, or otherwise, executing the step S4; S4, whether ST is carried or not is judged, if yes, executing the step S5,and if not, executing the step S6; S5, accessing the BN node, and executing the step S9; S6, judging whether the page carrying the BN skips to the CA login page successfully or not, if yes, executingthe step S7, or otherwise, executing the step S8; S7, calling back the BN page, carrying ST, and returning to the step S5; S8, prompting the user to log in again, and returning to execute the step S7;and S9, returning resources. The method has a good application and popularization value.

Description

technical field [0001] The invention relates to the technical field of user login authentication, and specifically provides a user login authentication method based on two-level deployment. Background technique [0002] As the pace of social modernization and intelligence continues to accelerate, the number of users and businesses of various APPs is also growing rapidly. How to efficiently manage users of each app becomes a key issue. In the past development, most of them are accustomed to establishing their own user system for each app or Internet application. This means that each app and each business system must establish its own user system. This will not only increase the development cost for developers to maintain multiple user systems, but also cause users to log in again when using different business systems, adding unnecessary trouble to users. [0003] In order to solve the above problems, the establishment of a unified user system has become a key point, so tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/46G06F16/955
CPCG06F21/31G06F21/46G06F16/955
Inventor 黎文志赵印
Owner 山东健康医疗大数据有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products