1. Technical Field
Embodiments of the present disclosure relate to access authorization validation systems and methods, and more particularly to a single-point login system and a single-point login method for accessing different business systems.
2. Description of Related Art
An enterprise or organization may provide a plurality of different business systems to clients, and the different business systems are often compatible and deliberately exposed to each other for business purposes. However, to ensure data security, when a client accesses each of the different business systems, the client is required to input validation information (such as user identification and a password), which may result in repetitive and time-consuming authorization processes.
The present disclosure, including the accompanying drawings, is illustrated by way of examples and not by way of limitation. It should be noted that references to “an” or “one” embodiment in this disclosure are not necessarily to the same embodiment, and such references mean “at least one.”
In general, the word “module”, as used herein, refers to logic embodied in hardware or firmware, or to a collection of software instructions, written in a programming language. One or more software instructions in the modules may be embedded in firmware, such as in an erasable programmable read only memory (EPROM). The modules described herein may be implemented as either software and/or hardware modules and may be stored in any type of non-transitory computer-readable medium or other storage device. Some non-limiting examples of non-transitory computer-readable media include CDs, DVDs, BLU-RAY, flash memory, and hard disk drives.
In this embodiment, the first business system 20, the second business system 30, and the information list 40 are stored in different servers. In another embodiment, the first business system 10, the second business system 20, and the information list 40 may be stored in the same server.
As shown in
In step S101, when receiving a request to access the first business system 20 from a client 1 (e.g., the client 1 connects to the business server 3 and opens a webpage of the first business system 20), the access mode determination module 11 determines an access mode of the client 1 is single-point login access by determining if the first business system 20 receives a first request data packet sent from another business system (such as the second business system 20). If the first business system 20 does not receive a first request data packet from another business system, step S103 is implemented, or if the first business system 20 receives a first request data packet sent from another business system (such as the second business system 30), step S105 is implemented.
In step S103, the access mode determination module 11 determines that the access mode of the client 1 is direct access, and requests a user of the client 1 to input an identification (ID) and a password, and then the procedure goes to step S107.
In step S105, the access mode determination module 11 determines that the access mode of the client 1 is single-point login access. That is, the client 1 intends to log into the first business system 20 from a previously-logged business system (such as the second business system 30) that the client 1 previously logged. The authority validation module 12 validates if the user of client 1 has authority to access the first business system 20 according to data stored in the first request data packet and data stored in the information list 40. The data stored in the first request data packet includes an IP address of a business server in which the previously-logged business system is installed, a user name that the client 1 used to log into the previously-logged business system, and an access key for accessing the first business system 20.
In step S107, the authority validation module 12 determines if the user of client 1 has the authority to access the first business system 20 by determining if the data stored in the first request data packet is in accordance with the data stored in the information list 40. For example, on condition that the access key for accessing the first business system 20 stored in the first request data packet is the same as the access key for accessing the first business system 20 stored in the information list 40, and the user name that the client 1 used to log into the previously-logged business system is also stored in the information list 40, the authority validation module 12 determines that the user of client 1 has the authority to access the first business system 20, then step S111 is implemented. Otherwise, if the data stored in the first request data packet is not in accordance with the data stored in the information list 40, step S109 is implemented, the authority validation module 12 rejects the client 1 to access the first business system 20, and the procedure ends. For example, if the access key for accessing the first business system 20 stored in the first request data packet is different from the access key for accessing the first business system 20 stored in the information list 40, or if the user name that the client 1 used to log into the previously-logged business system is not stored in the information list 40, the authority validation module 12 rejects the client 1 to access the first business system 20.
In step S111, the authority validation module 12 allows the client 1 to access the first business system 20. The information storage module 13 stores information in relation to the client 1 in a storage device (not shown) of the business server 3.
In step S113, the system switch module 14 receives a request of switching the client 1 from the first business system 20 to the second business system 30, and sends a second request data packet to the second business system 30 to validate authority of accessing the second business system 30. The second request data packet contains data similar to the data contained in the first request data packet, such as an IP address of the business server 3 in which the first business system 20 is installed, a user name that the client 1 used to log into the first business system 20, and an access key for accessing the second business system 30.
In step S115, the authority validation module 12 stored in the second business server 4 determines if the user of client 1 has the authority to access the second business system 30 by determining if the data in the second request data packet is in accordance with the data in the information list 40. A rule for determination here is similar to that of step S107 described above.
The single-point login system and method described above allows a user/client to switch between authorized business systems without repetitious validations.
Although certain disclosed embodiments of the present disclosure have been specifically described, the present disclosure is not to be construed as being limited thereto. Various changes or modifications may be made to the present disclosure without departing from the scope and spirit of the present disclosure.
Number | Date | Country | Kind |
---|---|---|---|
2012105625537 | Dec 2012 | CN | national |