CN109190352B - Method and device for verifying accuracy of authorization text - Google Patents

Method and device for verifying accuracy of authorization text Download PDF

Info

Publication number
CN109190352B
CN109190352B CN201810716237.8A CN201810716237A CN109190352B CN 109190352 B CN109190352 B CN 109190352B CN 201810716237 A CN201810716237 A CN 201810716237A CN 109190352 B CN109190352 B CN 109190352B
Authority
CN
China
Prior art keywords
authorization
text
party service
user
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810716237.8A
Other languages
Chinese (zh)
Other versions
CN109190352A (en
Inventor
郑鸿咚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201810716237.8A priority Critical patent/CN109190352B/en
Publication of CN109190352A publication Critical patent/CN109190352A/en
Application granted granted Critical
Publication of CN109190352B publication Critical patent/CN109190352B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/30Semantic analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The specification provides an authorization text accuracy verification method and device, which are applied to a platform for providing a third-party service interface for a user. Firstly, obtaining an authorization text to be verified, performing semantic analysis on the authorization text to be verified, determining a user identifier, a third-party service identifier and user information required to be provided for a third-party service, which are contained in the authorization text to be verified, retrieving according to the user identifier and the third-party service identifier in an information output record generated after authorization is successful, and determining actual user information output to the third-party service; and comparing the user information required to be provided for the third-party service in the authorization text to be verified with the actual user information output to the third-party service, and determining the accuracy of the authorization text according to the comparison result.

Description

Method and device for verifying accuracy of authorization text
Technical Field
The specification relates to the field of internet, in particular to an authorization text accuracy verification method and device.
Background
The platform can provide user information to the third-party service through related API, SDK and other services so that the user can use the related services of the third-party service. In order to guarantee the user rights, the authorization of the user needs to be directly or indirectly acquired in the process of providing the user information to the third-party service. Specifically, in providing information to a third party, authorized content and authorized objects must be listed to the user to obtain explicit authorization of the user.
The third-party service that requires authorization may include a mobile application, an applet, a web application, etc., and the user information that needs to be provided to the third-party service may include client information, phone number information, identification card information, etc. of the user. Because the third-party service needing authorization and the user information needing authorization are various, if the document writing error occurs in the text requesting authorization from the user, or the actual authorization information changes but the document is not updated in time, the traditional method relying on manual checking of the authorization text may not be found and modified in time.
Disclosure of Invention
In view of the above technical problems, embodiments of the present specification provide a method and an apparatus for verifying accuracy of an authorization text, and a technical scheme is as follows:
according to a first aspect of embodiments of the present specification, there is provided an authorization text accuracy verification method applied to a platform providing a third-party service interface to a user, the method including:
obtaining an authorization text to be verified, wherein the authorization text to be verified is a display text which lists authorization information to a user to enable the user to perform authorization operation when the third-party service requests authorization from the user;
performing semantic analysis on the authorization text to be verified, and determining a user identifier, a third-party service identifier and user information required to be provided for a third-party service, which are contained in the authorization text to be verified;
retrieving in an information output record generated after successful authorization according to the user identification and the third-party service identification, and determining actual user information output to the third-party service;
and comparing the user information required to be provided for the third-party service in the authorization text to be verified with the actual user information output to the third-party service, and determining the accuracy of the authorization text according to the comparison result.
According to a second aspect of the embodiments of the present specification, there is provided an apparatus for verifying accuracy of an authorization document, applied to a platform for providing a third-party service interface to a user, the apparatus including:
a text acquisition module: the display text is used for acquiring the authorization text to be verified, and when the authorization text to be verified requests authorization from the user for the third-party service, the display text lists authorization information for the user so that the user can perform authorization operation;
a text analysis module: the system comprises a text analysis module, a verification module and a verification module, wherein the text analysis module is used for performing semantic analysis on the authorized text to be verified, and determining a user identifier, a third-party service identifier and user information required to be provided for a third-party service, which are contained in the authorized text to be verified;
an output acquisition module: the system comprises a third-party service identifier, a user identification and a third-party service identifier, wherein the third-party service identifier is used for identifying the user identification and the third-party service identifier;
a text comparison module: and the system is used for comparing the user information which needs to be provided for the third-party service in the authorization text to be verified with the actual user information output to the third-party service, and determining the accuracy of the authorization text according to the comparison result.
According to a third aspect of the embodiments of the present specification, there is provided a computer device including a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements an authorization text accuracy verification method when executing the program, and the method is applied to a platform providing a third-party service interface for a user, and the method includes:
obtaining an authorization text to be verified, wherein the authorization text to be verified is a display text which lists authorization information to a user to enable the user to perform authorization operation when the third-party service requests authorization from the user;
performing semantic analysis on the authorization text to be verified, and determining a user identifier, a third-party service identifier and user information required to be provided for a third-party service, which are contained in the authorization text to be verified;
retrieving in an information output record generated after successful authorization according to the user identification and the third-party service identification, and determining actual user information output to the third-party service;
and comparing the user information required to be provided for the third-party service in the authorization text to be verified with the actual user information output to the third-party service, and determining the accuracy of the authorization text according to the comparison result.
According to the technical scheme provided by the embodiment of the specification, the platform determines the authorized text content displayed to the user by acquiring the flow message generated when the authorization is requested to the user, monitors the user information actually output to the third-party application by the platform, and verifies whether the authorized text content displayed to the user is wrong or not by comparing the authorized text content displayed to the user with the user information actually output to the third-party application.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of embodiments of the invention.
In addition, any one of the embodiments in the present specification is not required to achieve all of the effects described above.
Drawings
In order to more clearly illustrate the embodiments of the present specification or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present specification, and other drawings can be obtained by those skilled in the art according to the drawings.
FIG. 1 is a flow chart of an authorization text accuracy verification method shown in an exemplary embodiment of the present description;
fig. 2 is a flowchart illustrating a method for adding third party subscription information to an authorization text accuracy verification according to an exemplary embodiment of the present specification;
FIG. 3 is another flow chart diagram illustrating a method for authorization text accuracy verification in an exemplary embodiment of the present description;
FIG. 4 is a schematic diagram of an authorization document accuracy verification device shown in an exemplary embodiment of the present description;
fig. 5 is a schematic structural diagram of a computer device according to an exemplary embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the specification, as detailed in the appended claims.
The terminology used in the description herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the description. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of the present specification. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The platform can provide user information to the third-party service through related API, SDK and other services, so that the user can use the related services of the third-party service. In order to guarantee the user rights, the authorization of the user needs to be directly or indirectly acquired in the process of providing the user information to the third-party service. Specifically, in providing information to a third party, authorized content and authorized objects must be listed to the user to obtain explicit authorization of the user.
The third-party service requiring authorization may include a mobile-side application, an applet, a web application, etc., and the user information required to be provided to the third-party service may include client information, phone number information, identification card information, etc. of the user. Because the third-party service needing authorization and the user information needing authorization are various, if the document writing error occurs in the text requesting authorization from the user, or the actual authorization information changes but the document is not updated in time, the traditional method relying on manual checking of the authorization text may not be found and modified in time.
In view of the above problems, embodiments of the present specification provide an authorization text accuracy verification method and a risk rule generation device for executing the method. The method mentioned in the embodiment of the present specification is mainly applied to a platform for providing a third-party service interface for a user, and specifically, the platform may include an ant golden service open platform, a sesame credit open platform, and the like.
The following describes in detail the method for verifying the accuracy of an authorization document according to this embodiment, and as shown in fig. 1, the method may include the following steps:
s101, obtaining an authorization text to be verified, wherein the authorization text to be verified is a display text which lists authorization information to a user to enable the user to perform authorization operation when the third-party service requests authorization from the user;
the platform will typically aggregate a variety of third-party services for the user to select and use, and the user may then use the third-party services through the interface of the operating platform that is provided to the third-party services, such as: the user clicks the icon 'medical treatment' on the platform interface, and can enter a third-party service interface, so that medical health services such as diagnosis, registration and the like provided by a third party are used.
Still taking the third-party service "medical care" as an example, when a user wants to use the third-party service, for example, when the user wants to perform "registration" through the third-party service, the third-party service needs to obtain information such as the name, identification number, and the like of the user through the platform to complete the registration operation, the platform needs to request the authorization of the user before providing the user information, and usually, an authorization interface is displayed to the user, and the interface includes a display text which lists the authorization information for the user to perform the authorization operation.
The method for acquiring the display text may be as follows: the method comprises the steps of obtaining a flow message generated when a user requests authorization, and determining an authorization text contained in the flow message as an authorization text to be verified.
Further, obtaining a traffic message generated when requesting authorization from a user, and determining an authorization text included in the traffic message as an authorization text to be verified may be: the method comprises the steps of obtaining a flow message generated when a user requests authorization, extracting a text page displayed to the user, positioning in the text page according to preset keywords to extract an authorization text contained in the text page, and determining the authorization text as an authorization text to be verified.
Authorization texts are usually in a similar text format, even written in a preset text format, for example, the beginning of the authorization text is usually: the "XX service needs to acquire … …" information that one or more keywords are preset based on similar words in the authorized text and locate the authorized text among all the texts in the text page based on the keywords.
Further, the manner of acquiring the traffic message generated when requesting authorization from the user and extracting the text page displayed to the user may be: acquiring a flow message generated when a user requests authorization, and extracting and storing a key message in the flow message; and normalizing the key message to obtain a text page displayed for the user.
The normalization processing is to sort the message contents in the chaotic format and output the message contents according to a uniform style so as to compare the texts in the following process.
S102, performing semantic analysis on the authorized text to be verified, and determining a user identifier, a third-party service identifier and user information required to be provided for a third-party service, wherein the user identifier, the third-party service identifier and the user information are contained in the authorized text to be verified;
the user identification at least comprises unique information which can be used by the platform for identifying the user, and the user identification can be ID information which is distributed to the user by the platform; the third-party service identification at least comprises unique information which can be used by the platform for identifying the third-party service, and the third-party service identification can be ID information which is generated and distributed to the third-party service by the platform when the third-party service enters the platform.
S103, retrieving according to the user identifier and the third-party service identifier in an information output record generated after successful authorization, and determining actual user information output to the third-party service;
and S104, comparing the user information which needs to be provided for the third-party service in the authorization text to be verified with the actual user information output to the third-party service, and determining the accuracy of the authorization text according to the comparison result.
If the comparison result shows that the user information needing to be provided for the third-party service in the authorization text to be verified is the same as the actual user information output to the third-party service in type, the accuracy of the authorization text can be verified to be correct, and if the user information and the actual user information are different, the accuracy of the authorization text is wrong.
The method provided by the specification can quickly find the inaccurate authorization text, further correct the authorization text in time, and can search the user who provides the inaccurate authorization text for the user when requesting authorization in the history record according to the discovery time of the inaccurate authorization text and the corresponding third-party service so as to provide the user with relevant processing such as authorized supplementary requests and the like.
In order to further ensure the accuracy of verification, in addition to the user information required to be provided to the third-party service in the authorization text to be verified and the actual user information output to the third-party service, third-party subscription information may be added for joint verification, where the third-party subscription information is subscription information related to the third-party service and stored by the platform when the third-party service is docked on the platform, and the subscription information is usually stored in a third-party subscription table, which may include the name, identifier ID, classification, user information required to be obtained, and the like of the third-party service. When the user information required by the third-party service is changed, the platform needs to be informed and the subscription information needs to be modified. For example: the third party service is updated and added with new service content, besides the original user information, the requirement for obtaining the user address information is newly added, at this time, the subscription information needs to be revised, and the requirement item related to the user address information is added.
Referring to fig. 2, a flowchart of a method for adding third party subscription information to an authorization text accuracy verification method may include the following steps:
s201, acquiring a third party subscription table prestored by the user, and retrieving in the third party subscription table according to the third party service identifier to extract a subscription record of the third party service, wherein the subscription record contains user information required to be acquired by the third party service;
s202, comparing the user information required to be acquired by the third-party service in the signing record with the actual user information output to the third-party service, and verifying whether the user information and the actual user information are the same;
s203, comparing the user information required to be acquired by the third-party service in the signing record with the user information required to be provided for the third-party service in the authorization text to be verified, and verifying whether the user information and the user information are the same.
The embodiment of the present specification further provides a more specific method for verifying the accuracy of the authorization text, which is shown in fig. 3 and may include the following steps:
s301, acquiring a flow message generated when a user requests authorization, and extracting and storing a key message in the flow message;
s302, normalizing the key message to obtain a text page displayed to a user;
s303, positioning in a text page according to preset keywords to extract an authorization text contained in the text page, and determining the authorization text as an authorization text to be verified;
s304, performing semantic analysis on the authorized text to be verified, and determining a user identifier, a third-party service identifier and user information required to be provided for a third-party service, which are contained in the authorized text to be verified;
s305, retrieving according to the user identifier and the third-party service identifier in an information output record generated after successful authorization, and determining actual user information output to the third-party service;
s306, comparing the user information which needs to be provided for the third-party service in the authorization text to be verified with the actual user information output to the third-party service, and determining the accuracy of the authorization text according to the comparison result;
corresponding to the above method embodiment, an embodiment of the present specification further provides an apparatus for verifying accuracy of an authorization document, and referring to fig. 4, the apparatus may include: a text acquisition module 410, a text analysis module 420, an output acquisition module 430, and a text comparison module 440.
The text acquisition module 410: the display text is used for acquiring the authorization text to be verified, and when the authorization text to be verified requests authorization from the user for the third-party service, the display text lists authorization information for the user so that the user can perform authorization operation;
the text analysis module 420: the system comprises a text analysis module, a verification module and a verification module, wherein the text analysis module is used for performing semantic analysis on the authorized text to be verified, and determining a user identifier, a third-party service identifier and user information required to be provided for a third-party service, which are contained in the authorized text to be verified;
the output acquisition module 430: the system comprises a third-party service identifier, a user identification and a third-party service identifier, wherein the third-party service identifier is used for identifying the user identification and the third-party service identifier;
text comparison module 440: and the system is used for comparing the user information which needs to be provided for the third-party service in the authorization text to be verified with the actual user information output to the third-party service, and determining the accuracy of the authorization text according to the comparison result.
Embodiments of the present specification also provide a computer device, which at least includes a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the aforementioned authorization text accuracy verification method when executing the program, and the method at least includes:
obtaining an authorization text to be verified, wherein the authorization text to be verified is a display text which lists authorization information to a user to enable the user to perform authorization operation when the third-party service requests authorization from the user;
performing semantic analysis on the authorization text to be verified, and determining a user identifier, a third-party service identifier and user information required to be provided for a third-party service, which are contained in the authorization text to be verified;
retrieving in an information output record generated after successful authorization according to the user identification and the third-party service identification, and determining actual user information output to the third-party service;
and comparing the user information required to be provided for the third-party service in the authorization text to be verified with the actual user information output to the third-party service, and determining the accuracy of the authorization text according to the comparison result.
Fig. 5 is a schematic diagram illustrating a more specific hardware structure of a computing device according to an embodiment of the present disclosure, where the computing device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. Wherein the processor 1010, memory 1020, input/output interface 1030, and communication interface 1040 are communicatively coupled to each other within the device via bus 1050.
The processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solutions provided in the embodiments of the present disclosure.
The Memory 1020 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random Access Memory), a static storage device, a dynamic storage device, or the like. The memory 1020 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 1020 and called to be executed by the processor 1010.
The input/output interface 1030 is used for connecting an input/output module to input and output information. The i/o module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 1040 is used for connecting a communication module (not shown in the drawings) to implement communication interaction between the present apparatus and other apparatuses. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
The bus 1050 includes a path to transfer information between various components of the device, such as the processor 1010, memory 1020, input/output interface 1030, and communication interface 1040.
It should be noted that although the above-mentioned device only shows the processor 1010, the memory 1020, the input/output interface 1030, the communication interface 1040 and the bus 1050, in a specific implementation, the device may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only those components necessary to implement the embodiments of the present description, and not necessarily all of the components shown in the figures.
Embodiments of the present specification further provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the foregoing authorization text accuracy verification method, where the method at least includes:
obtaining an authorization text to be verified, wherein the authorization text to be verified is a display text which lists authorization information to a user to enable the user to perform authorization operation when the third-party service requests authorization from the user;
performing semantic analysis on the authorization text to be verified, and determining a user identifier, a third-party service identifier and user information required to be provided for a third-party service, which are contained in the authorization text to be verified;
retrieving in an information output record generated after successful authorization according to the user identification and the third-party service identification, and determining actual user information output to the third-party service;
and comparing the user information required to be provided for the third-party service in the authorization text to be verified with the actual user information output to the third-party service, and determining the accuracy of the authorization text according to the comparison result.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in the specification. One of ordinary skill in the art can understand and implement it without inventive effort.
From the above description of the embodiments, it is clear to those skilled in the art that the embodiments of the present disclosure can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the embodiments of the present specification may be essentially or partially implemented in the form of software services, which may be stored in a storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and include instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments of the present specification.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a service with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus embodiment, since it is substantially similar to the method embodiment, it is relatively simple to describe, and reference may be made to some descriptions of the method embodiment for relevant points. The above-described apparatus embodiments are merely illustrative, and the modules described as separate components may or may not be physically separate, and the functions of the modules may be implemented in one or more software and/or hardware when implementing the embodiments of the present disclosure. And part or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The foregoing is only a specific embodiment of the embodiments of the present disclosure, and it should be noted that, for those skilled in the art, a plurality of modifications and decorations can be made without departing from the principle of the embodiments of the present disclosure, and these modifications and decorations should also be regarded as the protection scope of the embodiments of the present disclosure.

Claims (13)

1. A method for verifying accuracy of an authorization text is applied to a platform for providing a third-party service interface for a user, and comprises the following steps:
obtaining an authorization text to be verified, wherein the authorization text to be verified is a display text which lists authorization information to a user to enable the user to perform authorization operation when the third-party service requests authorization from the user;
performing semantic analysis on the authorization text to be verified, and determining a user identifier, a third-party service identifier and user information required to be provided for a third-party service, which are contained in the authorization text to be verified;
retrieving in an information output record generated after successful authorization according to the user identification and the third-party service identification, and determining actual user information output to the third-party service;
and comparing the type of the user information which needs to be provided for the third-party service in the authorization text to be verified with the type of the actual user information output to the third-party service, and determining the accuracy of the authorization text according to the comparison result.
2. The method of claim 1, wherein the obtaining of the authorization text to be verified comprises:
the method comprises the steps of obtaining a flow message generated when a user requests authorization, and determining an authorization text contained in the flow message as an authorization text to be verified.
3. The method according to claim 2, wherein the obtaining of the traffic message generated when requesting authorization from the user and determining the authorization text included in the traffic message as the authorization text to be verified comprises:
acquiring a flow message generated when a user requests authorization, and extracting a text page displayed to the user;
and positioning in a text page according to preset keywords to extract an authorization text contained in the text page, and determining the authorization text as an authorization text to be verified.
4. The method of claim 3, wherein the obtaining of the traffic message generated when the authorization is requested from the user and the extracting of the text page presented to the user comprises:
acquiring a flow message generated when a user requests authorization, and extracting and storing a key message in the flow message;
and normalizing the key message to obtain a text page displayed for the user.
5. The method of claim 1, after determining the actual user information output to the third-party service, further comprising:
acquiring a third party signing table prestored in the device, and retrieving in the third party signing table according to the third party service identification to extract a signing record of the third party service, wherein the signing record contains user information required to be acquired by the third party service;
and comparing the type of the user information required to be acquired by the third-party service in the signing record with the type of the actual user information output to the third-party service, and verifying whether the type of the user information is the same as the type of the actual user information output to the third-party service.
6. The method of claim 1, after determining the actual user information output to the third-party service, further comprising:
acquiring a third-party subscription table prestored by the third-party service server, and retrieving in the third-party subscription table according to the third-party service identifier so as to extract a subscription record of the third-party service, wherein the subscription record contains user information required to be acquired by the third-party service;
and comparing the type of the user information required to be acquired by the third-party service in the signing record with the type of the user information required to be provided for the third-party service in the authorization text to be verified, and verifying whether the types are the same.
7. An apparatus for verifying accuracy of authorization text, applied to a platform for providing a third-party service interface to a user, the apparatus comprising:
a text acquisition module: the display text is used for acquiring the authorization text to be verified, and when the authorization text to be verified requests authorization from the user for the third-party service, the display text lists authorization information for the user so that the user can perform authorization operation;
a text analysis module: the system comprises a text analysis module, a verification module and a verification module, wherein the text analysis module is used for performing semantic analysis on the authorized text to be verified, and determining a user identifier, a third-party service identifier and user information required to be provided for a third-party service, which are contained in the authorized text to be verified;
an output acquisition module: the system comprises a third-party service identifier, a user identification and a third-party service identifier, wherein the third-party service identifier is used for identifying the user identification and the third-party service identifier;
a text comparison module: the method is used for comparing the type of the user information which needs to be provided for the third-party service in the authorization text to be verified with the type of the actual user information output to the third-party service, and determining the accuracy of the authorization text according to the comparison result.
8. The apparatus of claim 7, wherein the obtaining of the authorization text to be verified comprises:
the method comprises the steps of obtaining a flow message generated when a user requests authorization, and determining an authorization text contained in the flow message as an authorization text to be verified.
9. The apparatus according to claim 8, wherein the obtaining of the traffic message generated when requesting authorization from the user and determining the authorization text included in the traffic message as the authorization text to be verified comprises:
acquiring a flow message generated when a user requests authorization, and extracting a text page displayed to the user;
and positioning in a text page according to preset keywords to extract an authorization text contained in the text page, and determining the authorization text as an authorization text to be verified.
10. The apparatus of claim 9, wherein the obtaining of the traffic message generated when the authorization is requested from the user and the extraction of the text page presented to the user comprises:
acquiring a flow message generated when a user requests authorization, and extracting and storing a key message in the flow message;
and normalizing the key message to obtain a text page displayed for the user.
11. The apparatus of claim 7, after determining the actual user information output to the third party service, further comprising:
acquiring a third-party subscription table prestored by the third-party service server, and retrieving in the third-party subscription table according to the third-party service identifier so as to extract a subscription record of the third-party service, wherein the subscription record contains user information required to be acquired by the third-party service;
and comparing the type of the user information required to be acquired by the third-party service in the signing record with the type of the actual user information output to the third-party service, and verifying whether the type of the user information is the same as the type of the actual user information output to the third-party service.
12. The apparatus of claim 7, after determining the actual user information output to the third party service, further comprising:
acquiring a third-party subscription table prestored by the third-party service server, and retrieving in the third-party subscription table according to the third-party service identifier so as to extract a subscription record of the third-party service, wherein the subscription record contains user information required to be acquired by the third-party service;
and comparing the type of the user information required to be acquired by the third-party service in the signing record with the type of the user information required to be provided for the third-party service in the authorization text to be verified, and verifying whether the types are the same.
13. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of claim 1 when executing the program.
CN201810716237.8A 2018-07-03 2018-07-03 Method and device for verifying accuracy of authorization text Active CN109190352B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810716237.8A CN109190352B (en) 2018-07-03 2018-07-03 Method and device for verifying accuracy of authorization text

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810716237.8A CN109190352B (en) 2018-07-03 2018-07-03 Method and device for verifying accuracy of authorization text

Publications (2)

Publication Number Publication Date
CN109190352A CN109190352A (en) 2019-01-11
CN109190352B true CN109190352B (en) 2022-05-17

Family

ID=64948847

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810716237.8A Active CN109190352B (en) 2018-07-03 2018-07-03 Method and device for verifying accuracy of authorization text

Country Status (1)

Country Link
CN (1) CN109190352B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112862590A (en) * 2021-01-15 2021-05-28 中国建设银行股份有限公司上海市分行 Business authorization method, computing device and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196012A (en) * 2010-03-17 2011-09-21 华为技术有限公司 Service opening method, system and service opening server
CN103139178A (en) * 2011-12-01 2013-06-05 腾讯数码(天津)有限公司 Validation method and device of internet open platform data request interface
CN105991614A (en) * 2015-03-03 2016-10-05 阿里巴巴集团控股有限公司 Open authorization, resource access method and device, and a server
CN106899546A (en) * 2015-12-17 2017-06-27 阿里巴巴集团控股有限公司 The acquisition methods and device of user profile

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821085B (en) * 2011-11-23 2015-12-02 腾讯科技(深圳)有限公司 Third party authorizes login method, open platform and system
CN102664933B (en) * 2012-04-06 2015-03-18 中国联合网络通信集团有限公司 User authorization method, application terminal, open platform and system
US9853959B1 (en) * 2012-05-07 2017-12-26 Consumerinfo.Com, Inc. Storage and maintenance of personal data
CN105871786B (en) * 2015-01-22 2019-06-04 阿里巴巴集团控股有限公司 A kind of verification method of user information, device and system
US11196739B2 (en) * 2015-07-16 2021-12-07 Avaya Inc. Authorization activation
CN105897668A (en) * 2015-10-22 2016-08-24 乐视致新电子科技(天津)有限公司 Third party account authorization method, device, server and system
CN106953831B (en) * 2016-01-06 2020-12-01 阿里巴巴集团控股有限公司 User resource authorization method, device and system
CN107231335B (en) * 2016-03-24 2021-05-25 创新先进技术有限公司 Service processing method and device
CN106534072B (en) * 2016-10-13 2019-12-10 腾讯科技(深圳)有限公司 user information authorization method, device, equipment and system
CN107786571A (en) * 2017-11-07 2018-03-09 昆山云景商务服务有限公司 A kind of method of user's unified certification

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196012A (en) * 2010-03-17 2011-09-21 华为技术有限公司 Service opening method, system and service opening server
CN103139178A (en) * 2011-12-01 2013-06-05 腾讯数码(天津)有限公司 Validation method and device of internet open platform data request interface
CN105991614A (en) * 2015-03-03 2016-10-05 阿里巴巴集团控股有限公司 Open authorization, resource access method and device, and a server
CN106899546A (en) * 2015-12-17 2017-06-27 阿里巴巴集团控股有限公司 The acquisition methods and device of user profile

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation,";L.Ferretti等;《2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)》;20170708;第718-723页 *
"基于Android的移动开放平台SDK的设计与实现";夏盛新;《中国优秀硕士学位论文全文数据库信息科技辑》;20141115(第2014-11期);第I138-210页 *
"基于U2F与OAuth的认证授权方案研究";李梁磊 等;《保密科学技术》;20170320(第3期);第32-37页 *

Also Published As

Publication number Publication date
CN109190352A (en) 2019-01-11

Similar Documents

Publication Publication Date Title
US20200143012A1 (en) Digital rights management using a digital agent
JP2019537112A (en) Method, apparatus and server for account login
CN109145238B (en) Card display method and device and mobile device
JP2017521769A (en) Login account prompt
US10223239B1 (en) Definition-driven test agent
CN107741935B (en) Data importing method and data importing device
CN113268336B (en) Service acquisition method, device, equipment and readable medium
CN109522705B (en) Authority management method, device, electronic equipment and medium
CN107479868B (en) Interface loading method, device and equipment
US9510182B2 (en) User onboarding for newly enrolled devices
CN110362630B (en) Data management method, device, equipment and computer readable storage medium
CN111352952A (en) Information query method, server and computer readable storage medium
CN110058992B (en) Text template effect feedback method and device and electronic equipment
CN109190352B (en) Method and device for verifying accuracy of authorization text
CN113408254A (en) Page form information filling method, device, equipment and readable medium
US11309065B2 (en) Management and tracking solution for specific patient consent attributes and permissions
CN108632348B (en) Service checking method and device
CN114817707A (en) Method and device for creating node and problem, electronic equipment and storage medium
CN109656805B (en) Method and device for generating code link for business analysis and business server
CN109408368B (en) Test auxiliary information output method, storage medium and server
CN111967769A (en) Risk identification method, device, equipment and medium
US20160182649A1 (en) Url issuing device, url issuing method, and url issuing program
CN111159759A (en) Mixed sensitive information discovery method and device based on black and white list and electronic equipment
CN112131550B (en) Windows system unlocking method and device, electronic equipment and computer readable medium
CN111191427A (en) PDF document annotation method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant