CN112788019A - Application fusion scheme under zero trust concept - Google Patents
Application fusion scheme under zero trust concept Download PDFInfo
- Publication number
- CN112788019A CN112788019A CN202011625802.3A CN202011625802A CN112788019A CN 112788019 A CN112788019 A CN 112788019A CN 202011625802 A CN202011625802 A CN 202011625802A CN 112788019 A CN112788019 A CN 112788019A
- Authority
- CN
- China
- Prior art keywords
- session
- zero trust
- application
- scheme under
- zero
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000004927 fusion Effects 0.000 title claims abstract description 17
- 238000000034 method Methods 0.000 claims abstract description 26
- 235000014510 cooky Nutrition 0.000 claims abstract description 14
- 238000012795 verification Methods 0.000 claims abstract description 12
- 238000007499 fusion processing Methods 0.000 claims description 7
- 230000000052 comparative effect Effects 0.000 claims 1
- 238000011161 development Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000001133 acceleration Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses an application fusion scheme under a zero trust concept, which comprises the following steps: and an authentication process, namely checking cookies for all http flow through the zero trust gateway, judging whether a middle-session field exists in the cookies, verifying and judging whether a middle-session certificate is legal or not, logging in the process, submitting a user password and the account number in the IAM by the user after the certificate is legal through the authentication process, and comparing and checking through the zero trust gateway. The invention realizes the check and verification of all http flow flowing through the zero trust gateway, realizes the comparison and verification of the user password and the account password in the IAM, simultaneously realizes the idea that the page element is the service, and completes the creation of a new single-page application.
Description
Technical Field
The invention relates to the technical field of application fusion, in particular to an application fusion scheme under a zero trust concept.
Background
Zero trust represents a new generation of network security protection concept, and the key point of the method is to break default 'trust', generalize the concept by a colloquial word, namely 'continuous verification and never trust'. Anyone, equipment and a system inside and outside the default untrusted enterprise network rebuild the trust basis of access control based on identity authentication and authorization, thereby ensuring identity trust, equipment trust, application trust and link trust. Based on the zero trust principle, the safety of the office system terminal, the safety of the link and the safety of access control can be guaranteed.
With the acceleration of information and digitization processes of Chinese enterprises, more and more internal applications and systems are developed, the internal applications are developed by different departments based on different requirement backgrounds, the development time points are different, a series of generations are poor, used account number systems are scattered and trivial, enterprise office and application management scene data with high maintenance cost and Gartner statistics are maintained, and a protection centralization, human and authentication core and dynamic self-adaptive quick response system is urgently needed in enterprises.
Disclosure of Invention
The invention aims to provide an application fusion scheme under the zero trust concept so as to overcome the defects in the prior art.
In order to achieve the purpose, the invention adopts the following technical scheme: an application fusion scheme under a zero trust concept comprises the following steps:
s1: the authentication process comprises the steps that all http traffic flowing through is checked for cookies through the zero trust gateway, whether a middle-session field exists in the cookies or not is judged, and whether middle-session certificates are legal or not is judged through verification;
s2: logging in the process, after the authentication process determines that the certificate is legal, the user submits a user password and an account number in the IAM, and the user password and the account number are compared and verified through the zero trust gateway;
s3: and (4) a logout flow, wherein after the zero-trust gateway receives the hijacked logout request, the middle-session in the cache is cleared and redirected to a login page.
As a further description of the above technical solution:
in step S1, the zero-trust gateway checks cookies for all http traffic flowing through, determines whether a midle-session field exists, and redirects to a login page if the midle-session field does not exist, indicating that the credential is illegal.
As a further description of the above technical solution:
the specific method for verifying and judging whether the middle-session voucher is legal in step S1 is to take out the value of the middle-session in the cookie and perform comparison, retrieval and analysis in the cache.
As a further description of the above technical solution:
when a value corresponding to the value of the middle-session is retrieved from the cache, the voucher is legal, and the voucher is passed and recorded.
As a further description of the above technical solution:
and when the value corresponding to the value of the midle-session is not retrieved from the cache, the certificate is illegal, and the login page is redirected.
As a further description of the above technical solution:
in the step S2, the zero trust gateway performs comparison and verification, and if the verification is passed, an access credential corresponding to the application is generated according to an authentication algorithm configured correspondingly to the application, and the access credential is returned to the browser through the set-cookie, and a new midle-session is generated and stored in the cache.
As a further description of the above technical solution:
the method further comprises a fusion process, wherein the fusion process specifically comprises the following steps:
s4.1: generating an empty main dom-tree by templating;
s4.2: extracting div \ table \ form in html of respective application through Xpath as a basic element,
s4.3: and mounting the extracted basic elements into the main dom-tree in the form of iframe.
The invention provides an application fusion scheme under a zero trust concept. The method has the following beneficial effects:
the application fusion scheme under the zero trust concept realizes the check and verification of all http flow flowing through the zero trust gateway, realizes the comparison and verification of a user password and an account password in an IAM, simultaneously realizes the idea that page elements are services, and completes the creation of a new single-page application.
Drawings
FIG. 1 is a schematic diagram of an authentication process in the present invention;
FIG. 2 is a schematic diagram of a login process in the present invention;
FIG. 3 is a diagram illustrating a logout procedure according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
Referring to fig. 1-3, an application fusion scheme under the zero trust concept includes the following steps:
s1: the authentication process comprises the steps that all http traffic flowing through is checked for cookies through the zero trust gateway, whether a middle-session field exists in the cookies or not is judged, and whether middle-session certificates are legal or not is judged through verification;
s2: logging in the process, after the authentication process determines that the certificate is legal, the user submits a user password and an account number in the IAM, and the user password and the account number are compared and verified through the zero trust gateway;
s3: and (4) a logout flow, wherein after the zero-trust gateway receives the hijacked logout request, the middle-session in the cache is cleared and redirected to a login page.
In step S1, the zero-trust gateway checks cookies for all http traffic flowing through, determines whether a middle-session field exists, and redirects to a login page if no middle-session field exists, which indicates that the credential is illegal.
In step S1, the specific method for verifying and determining whether the midle-session credential is legitimate is to take out the value of the midle-session in the cookie and perform a comparison, retrieval and analysis in the cache.
When a value corresponding to the value of the middle-session is retrieved from the cache, the voucher is legal, and the voucher passes and is recorded;
and when the value corresponding to the value of the midle-session is not retrieved from the cache, the certificate is illegal, and the login page is redirected.
And step S2, comparing and checking through the zero trust gateway, if the check is passed, generating an access certificate corresponding to the application according to the authentication algorithm correspondingly configured to the application, returning the access certificate to the browser through the set-cookie, and generating a new midle-session to be stored in the cache.
The method further comprises a fusion process, wherein the fusion process specifically comprises the following steps:
s4.1: generating an empty main dom-tree by templating;
s4.2: div \ table \ form in html of respective application is extracted through XPath to be used as a basic element, wherein XPath is XML path language which is used for determining the language of a certain part of position in an XML document, and html is hypertext markup language and is markup language. The document format on the network can be unified through the labels, so that the scattered Internet resources are connected into a logic whole.
S4.3: and mounting the extracted basic elements into the main dom-tree in the form of iframe, wherein the iframe is an html tag.
Specifically, the zero-trust gateway in the authentication process, the login process and the logout process realizes single sign-on of all applications, on the basis, an empty main dom-tree is generated by templating according to needs, div \ table \ form in html of each application is extracted through Xpath and is used as a basic element, the basic element is mounted in the main dom-tree in the form of iframe, the creation of new single-page applications is completed by the idea that page elements are services,
in the new single-page application, a user can log in at one time, the login state endowment in all iframe areas is realized, smooth operation is carried out, the customization development cost of the application can be greatly reduced in the fusion process, and repeated multi-head development is avoided.
In the description herein, references to the description of "one embodiment," "an example," "a specific example," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.
Claims (7)
1. An application fusion scheme under a zero trust concept is characterized by comprising the following steps:
s1: the authentication process comprises the steps that all http traffic flowing through is checked for cookies through the zero trust gateway, whether a middle-session field exists in the cookies or not is judged, and whether middle-session certificates are legal or not is judged through verification;
s2: logging in the process, after the authentication process determines that the certificate is legal, the user submits a user password and an account number in the IAM, and the user password and the account number are compared and verified through the zero trust gateway;
s3: and (4) a logout flow, wherein after the zero-trust gateway receives the hijacked logout request, the middle-session in the cache is cleared and redirected to a login page.
2. The application fusion scheme under the zero trust concept of claim 1, wherein in step S1, the zero trust gateway checks cookies for all http traffic flowing through, determines whether a midle-session field exists, and redirects to a login page if no midle-session field exists, which indicates that the credential is illegal.
3. The application fusion scheme under the zero trust concept of claim 1, wherein the specific method for verifying and judging whether the midle-session voucher is legal in step S1 is to extract a value of the midle-session in the cookie and perform a comparative retrieval analysis in a cache.
4. The application fusion scheme under the zero trust concept of claim 3, wherein when a value corresponding to the value of the middle-session is retrieved from the cache, it indicates that the credential is legal, and the credential is passed and recorded.
5. The application fusion scheme under the zero trust concept of claim 3, wherein when the value corresponding to the value of the middle-session is not retrieved from the cache, it indicates that the credential is illegal, and the credential is redirected to the login page.
6. The application fusion scheme under the zero trust concept as claimed in claim 1, wherein in step S2, the zero trust gateway performs comparison and verification, and if the verification is passed, according to the authentication algorithm configured correspondingly to the application, generates an access credential corresponding to the application, and returns the access credential to the browser through the set-cookie, and generates a new midle-session to be stored in the cache.
7. The application fusion scheme under the zero trust concept as claimed in claim 1, further comprising a fusion process, wherein the fusion process specifically comprises the following steps:
s4.1: generating an empty main dom-tree by templating;
s4.2: extracting div \ table \ form in html of respective application through Xpath as a basic element,
s4.3: and mounting the extracted basic elements into the main dom-tree in the form of iframe.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202011625802.3A CN112788019B (en) | 2020-12-30 | 2020-12-30 | Application fusion scheme under zero trust concept |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202011625802.3A CN112788019B (en) | 2020-12-30 | 2020-12-30 | Application fusion scheme under zero trust concept |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN112788019A true CN112788019A (en) | 2021-05-11 |
| CN112788019B CN112788019B (en) | 2023-04-07 |
Family
ID=75754479
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202011625802.3A Active CN112788019B (en) | 2020-12-30 | 2020-12-30 | Application fusion scheme under zero trust concept |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN112788019B (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2023069129A1 (en) * | 2021-10-18 | 2023-04-27 | Sophos Limited | Network appliances for secure enterprise resources |
| US11663030B2 (en) | 2021-10-18 | 2023-05-30 | Sophos Limited | Extending expiration of user sessions with authentication refresh |
Citations (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1205058A2 (en) * | 1999-08-05 | 2002-05-15 | Sun Microsystems, Inc. | Access management system and method |
| CN101572608A (en) * | 2009-06-17 | 2009-11-04 | 杭州华三通信技术有限公司 | Method and device for acquiring once-login parameters |
| CN103078912A (en) * | 2012-12-27 | 2013-05-01 | 北京思特奇信息技术股份有限公司 | Single-point logging method and system |
| CN103179134A (en) * | 2013-04-19 | 2013-06-26 | 中国建设银行股份有限公司 | Single sign on method and system based on Cookie and application server thereof |
| CN103188295A (en) * | 2011-12-28 | 2013-07-03 | 上海格尔软件股份有限公司 | WEB single sign-on method completely transparent to user and application |
| CN105592003A (en) * | 2014-10-22 | 2016-05-18 | 北京拓尔思信息技术股份有限公司 | Cross-domain single sign-on method and system based on notification |
| CN107835248A (en) * | 2017-11-13 | 2018-03-23 | 暴风集团股份有限公司 | Cookie information sharing method, device and terminal |
| CN109165500A (en) * | 2018-09-04 | 2019-01-08 | 山东浪潮云投信息科技有限公司 | A kind of single sign-on authentication system and method based on cross-domain technology |
| WO2019157333A1 (en) * | 2018-02-08 | 2019-08-15 | Nussbaum Jared | Peeirs:passive evaluation of endpoint identity and risk as a surrogate authentication factor |
| CN110661798A (en) * | 2019-09-23 | 2020-01-07 | 紫光云(南京)数字技术有限公司 | Authentication method based on authentication platform |
| CN110753045A (en) * | 2019-10-14 | 2020-02-04 | 紫光云(南京)数字技术有限公司 | Single sign-on method between different domains |
| CN110909290A (en) * | 2019-12-05 | 2020-03-24 | 杭州安恒信息技术股份有限公司 | Method and system for combining multiple systems into large single-page applications |
| CN111212095A (en) * | 2020-04-20 | 2020-05-29 | 国网电子商务有限公司 | Authentication method, server, client and system for identity information |
| CN111245791A (en) * | 2019-12-31 | 2020-06-05 | 熵加网络科技(北京)有限公司 | Single sign-on method for realizing management and IT service through reverse proxy |
| US20200236112A1 (en) * | 2019-01-18 | 2020-07-23 | Cisco Technology, Inc. | Machine learning-based application posture for zero trust networking |
| CN111581631A (en) * | 2020-05-12 | 2020-08-25 | 西安腾营信息科技有限公司 | Single sign-on method based on redis |
| CN112118102A (en) * | 2020-10-21 | 2020-12-22 | 国网天津市电力公司 | A power-specific zero-trust network system |
| CN112149105A (en) * | 2020-10-21 | 2020-12-29 | 腾讯科技(深圳)有限公司 | Data processing system, method, related equipment and storage medium |
-
2020
- 2020-12-30 CN CN202011625802.3A patent/CN112788019B/en active Active
Patent Citations (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1205058A2 (en) * | 1999-08-05 | 2002-05-15 | Sun Microsystems, Inc. | Access management system and method |
| CN101572608A (en) * | 2009-06-17 | 2009-11-04 | 杭州华三通信技术有限公司 | Method and device for acquiring once-login parameters |
| CN103188295A (en) * | 2011-12-28 | 2013-07-03 | 上海格尔软件股份有限公司 | WEB single sign-on method completely transparent to user and application |
| CN103078912A (en) * | 2012-12-27 | 2013-05-01 | 北京思特奇信息技术股份有限公司 | Single-point logging method and system |
| CN103179134A (en) * | 2013-04-19 | 2013-06-26 | 中国建设银行股份有限公司 | Single sign on method and system based on Cookie and application server thereof |
| CN105592003A (en) * | 2014-10-22 | 2016-05-18 | 北京拓尔思信息技术股份有限公司 | Cross-domain single sign-on method and system based on notification |
| CN107835248A (en) * | 2017-11-13 | 2018-03-23 | 暴风集团股份有限公司 | Cookie information sharing method, device and terminal |
| WO2019157333A1 (en) * | 2018-02-08 | 2019-08-15 | Nussbaum Jared | Peeirs:passive evaluation of endpoint identity and risk as a surrogate authentication factor |
| CN109165500A (en) * | 2018-09-04 | 2019-01-08 | 山东浪潮云投信息科技有限公司 | A kind of single sign-on authentication system and method based on cross-domain technology |
| US20200236112A1 (en) * | 2019-01-18 | 2020-07-23 | Cisco Technology, Inc. | Machine learning-based application posture for zero trust networking |
| CN110661798A (en) * | 2019-09-23 | 2020-01-07 | 紫光云(南京)数字技术有限公司 | Authentication method based on authentication platform |
| CN110753045A (en) * | 2019-10-14 | 2020-02-04 | 紫光云(南京)数字技术有限公司 | Single sign-on method between different domains |
| CN110909290A (en) * | 2019-12-05 | 2020-03-24 | 杭州安恒信息技术股份有限公司 | Method and system for combining multiple systems into large single-page applications |
| CN111245791A (en) * | 2019-12-31 | 2020-06-05 | 熵加网络科技(北京)有限公司 | Single sign-on method for realizing management and IT service through reverse proxy |
| CN111212095A (en) * | 2020-04-20 | 2020-05-29 | 国网电子商务有限公司 | Authentication method, server, client and system for identity information |
| CN111581631A (en) * | 2020-05-12 | 2020-08-25 | 西安腾营信息科技有限公司 | Single sign-on method based on redis |
| CN112118102A (en) * | 2020-10-21 | 2020-12-22 | 国网天津市电力公司 | A power-specific zero-trust network system |
| CN112149105A (en) * | 2020-10-21 | 2020-12-29 | 腾讯科技(深圳)有限公司 | Data processing system, method, related equipment and storage medium |
Non-Patent Citations (5)
| Title |
|---|
| 冀托: "【零信任】详解零信任架构中的安全网关", 《HTTP://WWW.CHINAAET.COM/ARTICLE/3000123465》 * |
| 冀托: "详解零信任架构中的安全网关", 《HTTPS://ZHUANLAN.ZHIHU.COM/P/265865597》 * |
| 张宇,张妍: "零信任研究综述", 《信息安全研究》 * |
| 蔺旭冉,毛天宇: "零信任安全架构技术研究和应用思考", 《中国核电》 * |
| 金瀚信安: "详解零信任架构中的安全网关", 《HTTP://WWW.JINHANSAFE.COM/2105.HTML》 * |
Cited By (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2023069129A1 (en) * | 2021-10-18 | 2023-04-27 | Sophos Limited | Network appliances for secure enterprise resources |
| US11663030B2 (en) | 2021-10-18 | 2023-05-30 | Sophos Limited | Extending expiration of user sessions with authentication refresh |
| US12153948B2 (en) | 2021-10-18 | 2024-11-26 | Sophos Limited | Distributed zero trust network access |
| US12159158B2 (en) | 2021-10-18 | 2024-12-03 | Sophos Limited | Extending expiration of user sessions with authentication refresh |
| US12210895B2 (en) | 2021-10-18 | 2025-01-28 | Sophos Limited | Updating a cluster of nodes in a network appliance |
| US12299472B2 (en) | 2021-10-18 | 2025-05-13 | Sophos Limited | Executable policy declarations for network security |
| US12321771B2 (en) | 2021-10-18 | 2025-06-03 | Sophos Limited | Software rollback of cluster of network devices |
| US12474945B2 (en) | 2021-10-18 | 2025-11-18 | Sophos Limited | Network configuration update |
Also Published As
| Publication number | Publication date |
|---|---|
| CN112788019B (en) | 2023-04-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR100884714B1 (en) | An application protection method, a method for preventing an application from running outside an authorized operating range, an application security layer implementation system, and a computer-readable recording medium | |
| EP2005698B1 (en) | Method for providing web application security | |
| US7302480B2 (en) | Monitoring the flow of a data stream | |
| Damiani et al. | Fine grained access control for SOAP e-services | |
| US7882555B2 (en) | Application layer security method and system | |
| EP1361723B1 (en) | Maintaining authentication states for resources accessed in a stateless environment | |
| US20120090030A1 (en) | Identifying bots | |
| US20040123144A1 (en) | Method and system for authentication using forms-based single-sign-on operations | |
| CN111431838A (en) | Method and device for single-point login and single-point logout in cluster and API gateway | |
| WO2005069823A2 (en) | Centralized transactional security audit for enterprise systems | |
| US20040010710A1 (en) | Method and system for filtering requests to a web site | |
| CN109688105A (en) | A method and system for generating threat alarm information | |
| EP3926926B1 (en) | Method and system for delivering restricted-access resources using a content delivery network | |
| CN111181924A (en) | Web application firewall method and system based on application gateway | |
| CN112929391B (en) | Method for realizing cross-platform identity authentication based on single sign-on | |
| CN109936565A (en) | Method, apparatus, computer equipment and storage medium for logging in to multiple service clusters | |
| CN112788019B (en) | Application fusion scheme under zero trust concept | |
| CN111818088A (en) | Authorization mode management method and device, computer equipment and readable storage medium | |
| CN107992771A (en) | A kind of data desensitization method and device | |
| CN110753045A (en) | Single sign-on method between different domains | |
| CN117240533A (en) | A unified authentication method and device based on enterprise service gateway | |
| CN112491895A (en) | Identity authentication method, storage medium and system based on micro-service | |
| CN119583099A (en) | Service scheduling method, scheduling component, device and medium based on scheduling component | |
| Duraisamy et al. | A server side solution for protection of web applications from cross-site scripting attacks | |
| CN117527377A (en) | A method to identify whether there is an authentication mechanism on a system interface based on traffic data |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |