CN112100610A - Processing method, device and equipment for login and user login related services - Google Patents

Processing method, device and equipment for login and user login related services Download PDF

Info

Publication number
CN112100610A
CN112100610A CN202011313343.5A CN202011313343A CN112100610A CN 112100610 A CN112100610 A CN 112100610A CN 202011313343 A CN202011313343 A CN 202011313343A CN 112100610 A CN112100610 A CN 112100610A
Authority
CN
China
Prior art keywords
authorization
information
application
login
target user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011313343.5A
Other languages
Chinese (zh)
Other versions
CN112100610B (en
Inventor
刘佳伟
金戈
沈陈侃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202011313343.5A priority Critical patent/CN112100610B/en
Priority to CN202110688520.6A priority patent/CN113420284B/en
Publication of CN112100610A publication Critical patent/CN112100610A/en
Application granted granted Critical
Publication of CN112100610B publication Critical patent/CN112100610B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the specification provides a method, a device and equipment for processing login and user login related services, wherein the login method comprises the following steps: responding to a one-key login operation executed by a target user on a first application, and inquiring a verifiable statement distributed to the target user by a block chain system; if the verifiable statement is inquired, obtaining login information according to the verifiable statement; executing corresponding processing of a target user for logging in the first application by one key according to the acquired login information; wherein the verifiable statement is used for proving that the target user grants the right of one-key login to the first application based on the login information of the one-key login first application.

Description

Processing method, device and equipment for login and user login related services
Technical Field
The present invention relates to the field of block chain technologies, and in particular, to a method, an apparatus, and a device for processing login and user login related services.
Background
With the continuous development of internet technology, various applications are widely used in people's lives, such as social applications, shopping applications, payment applications, and the like. In order to improve user experience, different login modes are also provided for some applications, such as account and password login, account and mobile phone verification code login, mobile phone number login and the like; and after obtaining the user authorization, logging in the application based on the corresponding logging-in mode.
In practical application, a user may perform authorization due to misoperation, so that the user is not satisfied with a login mode corresponding to the authorization operation, and thus the user complains. In the process of complaint handling, the complaint accepting party cannot prove the authenticity of the authorization information of the user provided by the application related party, so that the complaint handling difficulty is increased, the satisfactory response cannot be given to the user, and the adverse effect can be caused to the application related party.
Disclosure of Invention
One or more embodiments of the present specification provide a login processing method. The method includes querying a verifiable statement assigned by a blockchain system to a target user in response to a one-touch login operation performed by the target user on a first application. The verifiable statement is used for proving that the target user grants the first application the right of one-key login based on login information of one-key login of the first application. And if the verifiable statement is inquired, obtaining the login information according to the verifiable statement. And executing corresponding processing of the target user for logging in the first application by one key according to the login information.
One or more embodiments of the present specification provide a login processing method. The method includes receiving an authorization request sent by a first application of a target user. The authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application. A verifiable statement is created by the blockchain system based on authorization information included in the authorization request. Wherein the verifiable statement is used for proving that the target user grants the one-touch login right to the first application. And sending authorization result information to the first application according to the verifiable statement so that the first application executes corresponding processing of one-key login of the target user to the first application according to the verifiable statement based on one-key login operation of the target user.
One or more embodiments of the present specification provide a method for processing a user login related service. The method includes obtaining authorization confirmation information of a target user. The authorization confirmation information represents that the target user confirms that the first application to be authorized is granted the right of one-key login based on the login information of one-key login of the first application. And sending an authorization request to the blockchain system according to the determined authorization information based on the authorization confirmation information so as to enable the blockchain system to create a verifiable statement and store authorization record information generated based on the verifiable statement into the blockchain. When the blockchain system receives a processing request of a verifiable statement sent by a first user, the corresponding processing is carried out based on the authorization record information in the blockchain. So that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information. The first user is the user who receives the complaint request sent by the target user. The complaint request is used for requesting complaint on the login mode of the one-touch login of the first application. The verifiable statement is used for proving that the target user authorizes the one-key login authority for the first application. And receiving authorization result information sent by the block chain system. And responding to the one-key login operation executed by the target user on the first application, and executing corresponding processing of the target user for one-key login on the first application based on the verifiable statement.
One or more embodiments of the present specification provide a method for processing a user login related service. The apparatus includes receiving an authorization request sent by a first application of a target user. The authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application. A verifiable statement is created by the blockchain system based on authorization information included in the authorization request. Wherein the verifiable statement is used for proving that the target user grants the one-touch login right to the first application. And sending authorization result information to the first application according to the verifiable statement. So that the first application responds to the one-key login operation of the target user and executes the corresponding processing of the one-key login of the target user to the first application based on the verifiable statement. And saving the authorization record information generated based on the verifiable statement to a blockchain. When a processing request of a verifiable statement sent by a first user is received, corresponding processing is carried out based on the authorization record information in the block chain, and processing result information is sent to the first user. So that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information. The first user is the user who receives the complaint request sent by the target user. The complaint request is used for complaint about a login mode of the one-touch login of the first application.
One or more embodiments of the present specification provide a login processing apparatus. The apparatus includes a query module that queries a verifiable statement assigned by a blockchain system to a target user in response to a one-touch login operation performed by the target user on a first application. The verifiable statement is used for proving that the target user grants the first application the right of one-key login based on login information of one-key login of the first application. The device also comprises a first obtaining module, and if the query module queries the verifiable statement, the login information is obtained according to the verifiable statement. The device also comprises a processing module which executes corresponding processing of one-key login of the first application by the target user according to the login information.
One or more embodiments of the present specification provide a login processing apparatus. The device comprises a receiving module for receiving an authorization request sent by a first application of a target user. The authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application. The apparatus also includes a creation module that creates a verifiable claim via a blockchain system based on authorization information included in the authorization request. Wherein the verifiable statement is used for proving that the target user grants the one-touch login right to the first application. The apparatus also includes a sending module that sends authorization result information to the first application according to the verifiable statement. And enabling the first application to execute corresponding processing of the target user for one-key login to the first application according to the verifiable statement based on the one-key login operation of the target user.
One or more embodiments of the present specification provide a processing apparatus for a user to log in a related service. The device comprises an acquisition module for acquiring the authorization confirmation information of the target user. The authorization confirmation information represents that the target user confirms that the first application to be authorized is granted the right of one-key login based on the login information of one-key login of the first application. The device also comprises a sending module which sends an authorization request to the blockchain system according to the determined authorization information based on the authorization confirmation information. Such that the blockchain system creates a verifiable claim and saves authorization record information generated based on the verifiable claim into a blockchain. When the blockchain system receives a processing request of a verifiable statement sent by a first user, the corresponding processing is carried out based on the authorization record information in the blockchain. So that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information. The first user is the user who receives the complaint request sent by the target user. The complaint request is used for requesting complaint on the login mode of the one-touch login of the first application. The verifiable statement is used for proving that the target user authorizes the one-key login authority for the first application. The device also comprises a receiving module for receiving the authorization result information sent by the block chain system. The device further comprises a login module, and the corresponding processing of the target user for logging in the first application by one key is executed based on the verifiable statement in response to the one-key login operation executed by the target user on the first application.
One or more embodiments of the present specification provide a processing apparatus for a user to log in a related service. The device comprises a receiving module for receiving an authorization request sent by a first application of a target user. The authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application. The apparatus also includes a creation module that creates a verifiable claim via a blockchain system based on authorization information included in the authorization request. Wherein the verifiable statement is used for proving that the target user grants the one-touch login right to the first application. The apparatus also includes a sending module that sends authorization result information to the first application according to the verifiable statement. So that the first application responds to the one-key login operation of the target user and executes the corresponding processing of the one-key login of the target user to the first application based on the verifiable statement. The device also comprises a storage module which stores the authorization record information generated based on the verifiable declaration into the block chain. When a processing request of a verifiable statement sent by a first user is received, corresponding processing is carried out based on the authorization record information in the block chain, and processing result information is sent to the first user. So that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information. The first user is the user who receives the complaint request sent by the target user. The complaint request is used for complaint about a login mode of the one-touch login of the first application.
One or more embodiments of the present specification provide a login processing system. The system includes a blockchain system and a first application. The blockchain system receives an authorization request sent by a first application of a target user. An authenticatable assertion is created based on authorization information included in the authorization request. And sending authorization result information to the first application according to the verifiable statement. The authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application. The verifiable statement is used for proving that the target user grants the one-touch login authority to the first application. The first application, in response to a one-key login operation performed by a target user on the first application, queries the verifiable statement that the blockchain system assigned to the target user. And if the verifiable statement is inquired, obtaining the login information according to the verifiable statement. And executing corresponding processing of the target user for logging in the first application by one key according to the login information.
One or more embodiments of the present specification provide a login processing device. The apparatus includes a processor. The apparatus also comprises a memory arranged to store computer executable instructions. The computer-executable instructions, when executed, cause the processor to query a verifiable statement assigned by a blockchain system to a target user in response to a one-touch login operation performed by the target user on a first application. The verifiable statement is used for proving that the target user grants the first application the right of one-key login based on login information of one-key login of the first application. And if the verifiable statement is inquired, obtaining the login information according to the verifiable statement. And executing corresponding processing of the target user for logging in the first application by one key according to the login information.
One or more embodiments of the present specification provide a login processing device. The apparatus includes a processor. The apparatus also comprises a memory arranged to store computer executable instructions. The computer-executable instructions, when executed, cause the processor to receive an authorization request sent by a first application of a target user. The authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application. A verifiable statement is created by the blockchain system based on authorization information included in the authorization request. Wherein the verifiable statement is used for proving that the target user grants the one-touch login right to the first application. And sending authorization result information to the first application according to the verifiable statement so that the first application executes corresponding processing of one-key login of the target user to the first application according to the verifiable statement based on one-key login operation of the target user.
One or more embodiments of the present specification provide a processing device for a user to log in a related service. The apparatus includes a processor. The apparatus also comprises a memory arranged to store computer executable instructions. The computer-executable instructions, when executed, cause the processor to obtain authorization confirmation information for a target user. The authorization confirmation information represents that the target user confirms that the first application to be authorized is granted the right of one-key login based on the login information of one-key login of the first application. And sending an authorization request to the blockchain system according to the determined authorization information based on the authorization confirmation information so as to enable the blockchain system to create a verifiable statement and store authorization record information generated based on the verifiable statement into the blockchain. When the blockchain system receives a processing request of a verifiable statement sent by a first user, the corresponding processing is carried out based on the authorization record information in the blockchain. So that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information. The first user is the user who receives the complaint request sent by the target user. The complaint request is used for requesting complaint on the login mode of the one-touch login of the first application. The verifiable statement is used for proving that the target user authorizes the one-key login authority for the first application. And receiving authorization result information sent by the block chain system. And responding to the one-key login operation executed by the target user on the first application, and executing corresponding processing of the target user for one-key login on the first application based on the verifiable statement.
One or more embodiments of the present specification provide a processing device for a user to log in a related service. The apparatus includes a processor. The apparatus also comprises a memory arranged to store computer executable instructions. The computer-executable instructions, when executed, cause the processor to receive an authorization request sent by a first application of a target user. The authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application. A verifiable statement is created by the blockchain system based on authorization information included in the authorization request. Wherein the verifiable statement is used for proving that the target user grants the one-touch login right to the first application. And sending authorization result information to the first application according to the verifiable statement. So that the first application responds to the one-key login operation of the target user and executes the corresponding processing of the one-key login of the target user to the first application based on the verifiable statement. And saving the authorization record information generated based on the verifiable statement to a blockchain. When a processing request of a verifiable statement sent by a first user is received, corresponding processing is carried out based on the authorization record information in the block chain, and processing result information is sent to the first user. So that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information. The first user is the user who receives the complaint request sent by the target user. The complaint request is used for complaint about a login mode of the one-touch login of the first application.
One or more embodiments of the present specification provide a storage medium. The storage medium is used to store computer-executable instructions. The computer-executable instructions, when executed by the processor, query a verifiable statement assigned by the blockchain system to the target user in response to the target user performing a one-touch login operation on the first application. The verifiable statement is used for proving that the target user grants the first application the right of one-key login based on login information of one-key login of the first application. And if the verifiable statement is inquired, obtaining the login information according to the verifiable statement. And executing corresponding processing of the target user for logging in the first application by one key according to the login information.
One or more embodiments of the present specification provide a storage medium. The storage medium is used to store computer-executable instructions. The computer-executable instructions, when executed by the processor, receive an authorization request sent by a first application of a target user. The authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application. A verifiable statement is created by the blockchain system based on authorization information included in the authorization request. Wherein the verifiable statement is used for proving that the target user grants the one-touch login right to the first application. And sending authorization result information to the first application according to the verifiable statement so that the first application executes corresponding processing of one-key login of the target user to the first application according to the verifiable statement based on one-key login operation of the target user.
One or more embodiments of the present specification provide a storage medium. The storage medium is used to store computer-executable instructions. The computer-executable instructions, when executed by the processor, obtain authorization confirmation information for the target user. The authorization confirmation information represents that the target user confirms that the first application to be authorized is granted the right of one-key login based on the login information of one-key login of the first application. And sending an authorization request to the blockchain system according to the determined authorization information based on the authorization confirmation information so as to enable the blockchain system to create a verifiable statement and store authorization record information generated based on the verifiable statement into the blockchain. When the blockchain system receives a processing request of a verifiable statement sent by a first user, the corresponding processing is carried out based on the authorization record information in the blockchain. So that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information. The first user is the user who receives the complaint request sent by the target user. The complaint request is used for requesting complaint on the login mode of the one-touch login of the first application. The verifiable statement is used for proving that the target user authorizes the one-key login authority for the first application. And receiving authorization result information sent by the block chain system. And responding to the one-key login operation executed by the target user on the first application, and executing corresponding processing of the target user for one-key login on the first application based on the verifiable statement.
One or more embodiments of the present specification provide a storage medium. The storage medium is used to store computer-executable instructions. The computer-executable instructions, when executed by the processor, receive an authorization request sent by a first application of a target user. The authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application. A verifiable statement is created by the blockchain system based on authorization information included in the authorization request. Wherein the verifiable statement is used for proving that the target user grants the one-touch login right to the first application. And sending authorization result information to the first application according to the verifiable statement. So that the first application responds to the one-key login operation of the target user and executes the corresponding processing of the one-key login of the target user to the first application based on the verifiable statement. And saving the authorization record information generated based on the verifiable statement to a blockchain. When a processing request of a verifiable statement sent by a first user is received, corresponding processing is carried out based on the authorization record information in the block chain, and processing result information is sent to the first user. So that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information. The first user is the user who receives the complaint request sent by the target user. The complaint request is used for complaint about a login mode of the one-touch login of the first application.
Drawings
In order to more clearly illustrate one or more embodiments or technical solutions in the prior art in the present specification, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present specification, and for those skilled in the art, other drawings can be obtained according to the drawings without inventive exercise;
fig. 1 is a schematic view of a scenario of a login processing method according to one or more embodiments of the present disclosure;
fig. 2 is a first flowchart of a login processing method according to one or more embodiments of the present disclosure;
fig. 3 is a second flowchart of a login processing method according to one or more embodiments of the present disclosure;
fig. 4 is a third flowchart illustrating a login processing method according to one or more embodiments of the present disclosure;
fig. 5 is a fourth flowchart illustrating a login processing method according to one or more embodiments of the present disclosure;
fig. 6 is a fifth flowchart illustrating a login processing method according to one or more embodiments of the present disclosure;
fig. 7 is a schematic view of a scenario of a processing method for a user to log in a related service according to one or more embodiments of the present disclosure;
fig. 8 is a first flowchart of a method for processing a user login related service according to one or more embodiments of the present disclosure;
fig. 9 is a second flowchart of a method for processing a user login related service according to one or more embodiments of the present disclosure;
fig. 10 is a schematic diagram illustrating a first module composition of a login processing device according to one or more embodiments of the present disclosure;
fig. 11 is a schematic diagram illustrating a second module composition of a login processing device according to one or more embodiments of the present disclosure;
fig. 12 is a schematic diagram illustrating a first module of a processing apparatus for a user to log in a related service according to one or more embodiments of the present disclosure;
fig. 13 is a schematic diagram illustrating a second module of a device for processing a user login related service according to one or more embodiments of the present disclosure;
fig. 14 is a schematic diagram of a first structure of a login processing system according to one or more embodiments of the present disclosure;
FIG. 15 is a second architectural diagram of a login processing system in accordance with one or more embodiments of the present disclosure;
fig. 16 is a schematic structural diagram of a login processing device according to one or more embodiments of the present specification;
fig. 17 is a schematic structural diagram of a processing device for a user to log in a related service according to one or more embodiments of the present disclosure.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in one or more embodiments of the present disclosure, the technical solutions in one or more embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in one or more embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, and not all embodiments. All other embodiments that can be derived by a person skilled in the art from one or more of the embodiments described herein without making any inventive step shall fall within the scope of protection of this document.
Fig. 1 is a schematic view of an application scenario of a login processing method according to one or more embodiments of the present specification, as shown in fig. 1, the scenario includes: a first terminal device and a block chain system of a target user; the first terminal device may be a mobile phone, a tablet computer, a desktop computer, a portable notebook computer, or the like (only the mobile phone is shown in fig. 1), and a first application is installed in the first terminal device; the blockchain system includes at least one blockchain node (only one is shown in fig. 1) accessing the blockchain, and data such as authorization record information is stored in the blockchain.
Specifically, the first application allocates a Verifiable statement (VC for short) to the target user through the blockchain system in advance based on the acquired authorization information of the target user, where the Verifiable statement is used to prove that the target user grants the right of performing one-key login to the login information of the first application based on one-key login to the first application. When the first application monitors that a target user performs one-key login operation on the first application, responding to the one-key login operation, and inquiring a verifiable statement distributed to the target user by the block chain system; if the verifiable statement is inquired, obtaining login information according to the verifiable statement; and executing corresponding processing of the target user for logging in the first application by one key according to the acquired login information. The login information may be a mobile phone number of the target user, login information of other second applications of the target user, which are associated with the first application, and the like. Therefore, a verifiable statement is distributed to the target user through the blockchain system so as to prove that the target user grants the right of one-key login based on the login information of the one-key login first application to the first application; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the rapidity of login, the authorization operation of the user has effective basis to be checked and verified, and the convenience and the basis are provided for the complaint handling of a complaint accepting party, so that the verification and cancellation processing of complaint events can be performed timely, and the adverse effect on related parties of the first application caused by complaints of target users is avoided.
Based on the application scenario architecture, one or more embodiments of the present specification provide a login processing method. Fig. 2 is a flowchart illustrating a login processing method according to one or more embodiments of the present disclosure, where the method in fig. 2 can be executed by a first application, as shown in fig. 2, and the method includes the following steps:
step S102, responding to a one-key login operation executed by a target user on a first application, and inquiring a verifiable statement distributed to the target user by a block chain system; the verifiable statement is used for proving that the target user grants the right of one-key login to the first application based on the login information of the one-key login first application;
optionally, when a starting event triggered by a starting operation of a target user on the first application is monitored, a verifiable statement distributed to the target user by the blockchain system is queried; or when a one-key login event triggered by the target user operating a specified control (such as a login control) in a login page of the first application is monitored, a verifiable statement distributed to the target user by the blockchain system is queried.
In this embodiment of the present specification, the login information for logging in the first application by one key may be a mobile phone number of the target user, that is, the target user grants a login permission for logging in the first application by one key based on the mobile phone number of the target user to the first application. The login information of the one-touch login first application can also be login information of a second application of the target user, which is associated with the first application, namely the target user grants the login authority of the first application to login the first application by one-touch based on the login information of the second application of the target user. The first application and the second application may be associated in service, or may be associated with an application provider, etc.
Step S104, if the verifiable statement is inquired, obtaining login information according to the verifiable statement;
and step S106, executing corresponding processing of the target user for logging in the first application by one key according to the acquired login information.
In one or more embodiments of the present specification, a verifiable statement is assigned to a target user through a blockchain system to prove that the target user grants a right to perform one-key login based on login information of the one-key login first application to the first application; so that the first application can perform corresponding processing of the target user to log in the first application by one key based on the verifiable statement. Therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, and the method provides convenience for the complaint handling of a complaint accepting party, so that the verification and cancellation processing of complaint events can be performed timely, and adverse effects on related parties of the first application due to complaints of target users are avoided.
In order to enable the authorization operation of the user to be verified and verifiable effectively, the first application applies a verifiable statement from the blockchain system in advance based on the acquired authorization confirmation information of the target user. Specifically, as shown in fig. 3, step S102 further includes the following steps S100-2 to S100-6 before:
s100-2, obtaining authorization confirmation information of a target user; wherein, the authorization confirmation information represents that the target user confirms the authority granted to the one-key login by the first application;
considering that different users have different application use habits, some users can perform one-touch login authorization during registration, and some users can perform one-touch login authorization after using the application for a period of time. Based on this, in one or more embodiments of the present specification, as shown in fig. 4, step S100-2 may include: responding to the registration operation of a target user, and acquiring login information; or, in response to the login operation of the target user, if the verifiable statement is determined not to be inquired, acquiring login information. The inquiry information is displayed according to the acquired login information so as to inquire whether a target user grants one-key login permission to the first application; and obtaining authorization confirmation information generated by the authorization confirmation operation performed by the target user based on the display interface of the inquiry information.
The method for acquiring the login information can be set in practical application according to the requirement; as an example, the login information is a mobile phone number of the target user; when login information is acquired based on the registration operation of a target user, if a first application is installed in a mobile phone of the target user, the mobile phone number of the mobile phone where the first application is located can be acquired through a first preset interface; if the first application is installed in the notebook of the target user, the mobile phone number input by the target user can be acquired. When login information is acquired based on login operation of a target user, if a first application is installed in a mobile phone of the target user, a mobile phone number of the mobile phone where the first application is located can be acquired through a first preset interface, and a mobile phone number provided by the target user during registration can be acquired from a server corresponding to the first application according to application identification information of the first application; if the first application is installed in a notebook of the target user, the mobile phone number input by the target user can be acquired, and the mobile phone number provided by the target user during registration can be acquired from a server corresponding to the first application according to the application identification information of the first application. As another example, the login information is login information of a second application associated with the first application, and the login information of the second application of the target user may be acquired through a second preset interface. In this specification, the acquisition mode of the login information is not particularly limited, and may be set as needed in practical applications.
Step S100-4, based on the obtained authorization confirmation information, sending an authorization request to the blockchain system according to the determined authorization information, so that the blockchain system creates a verifiable statement according to the authorization information;
in order to ensure that the first application can perform effective data interaction with the blockchain system and ensure that the authorization process can be performed smoothly, in one or more embodiments of the present specification, an authorization program, such as an authorization SDK (Software Development Kit) or the like, for performing data communication with the blockchain system for authorization-related processing is provided, and the authorization program can be integrated in the first application; accordingly, as shown in fig. 4, before sending the authorization request to the blockchain system, the first application also performs an initialization process on the authorization program, and performs data interaction with the blockchain system through the authorization program. Specifically, step S100-4 may be preceded by the following step S100-3:
step S100-3, if the specified authorization program is determined to be in an uninitialized state, initializing the authorization program;
specifically, the first application may perform initialization processing of the authorization program when the target user performs account registration of the first application, or may perform initialization processing of the authorization program when the authorization confirmation information of the target user is acquired; and after the initialization processing is completed, setting the designated state flag to characterize the initialization completion state. Since the authorization process may be currently performed based on the registration operation of the target user or based on the login operation of the target user, the authorization procedure may be in an initialized complete state. Therefore, when acquiring the authorization confirmation information of the user, the first application first acquires the specified state identifier, and if the acquired state identifier represents that the authorization program is in an uninitialized state, the first application performs initialization processing on the authorization program. The method comprises the steps that initialization processing is carried out on an authorization program, wherein the step of initialization processing comprises the steps of determining version information of the integrated authorization program, obtaining latest version information of the authorization program from a specified position, matching the determined version information with the obtained latest version information, and if matching is successful, initialization processing is carried out on the authorization program integrated with a first application; if the matching fails, the authorization program of the latest version information is acquired according to a preset acquisition mode, and initialization processing is performed on the acquired authorization program of the latest version, such as setting default values of parameters and the like.
Corresponding to step S100-3, step S100-4 may include the following steps S100-42:
and S100-42, based on the acquired confirmation authorization information, sending an authorization request to the blockchain system according to the determined authorization information through an authorization program.
Further, considering that the target user and/or the first application may not currently apply for digital identity information, to ensure the valid creation of the verifiable claims, as shown in fig. 4, the first application may further include, before sending the authorization request to the blockchain system: if the target user and/or the first application do not apply for the digital identity information through the authorization program, sending a digital identity information application request to the blockchain system according to the determined user information of the target user and/or the application information of the first application, so that the blockchain system generates the first digital identity information of the target user and/or the second digital identity information of the first application; and receiving the first digital identity information and/or the second digital identity information sent by the blockchain system through an authorization procedure. Wherein, determining that the target user does not apply for the digital identity information may include: and determining whether the first digital identity information is stored in the appointed storage area of the first terminal equipment where the first application is located, and if not, determining that the target user does not apply for the digital identity information. Determining that the first application does not apply for digital identity information may include: and determining whether the second digital identity information is stored in the designated storage area of the first application, and if not, determining that the first application does not apply for the digital identity information. The digital Identity information may be presented in various ways, such as a DID (Decentralized Identity), which may also be referred to as a distributed digital Identity.
Further, in order to avoid leakage of login information when the target user logs in the first application by one key, as shown in fig. 4, in one or more embodiments of the present specification, before the first application sends the authorization request to the blockchain system, the method may further include: sending a desensitization processing request to the blockchain system through the authorization program according to the acquired login information so that the blockchain system performs desensitization processing on the login information in the desensitization processing request to obtain desensitization data; desensitization data sent by the blockchain system is received by an authorization procedure.
It should be noted that fig. 4 is only used for illustration and not for limitation, and some operations may be performed in an interchangeable order and may also be performed simultaneously, for example, the order of operations for sending the digital identity information application request and sending the desensitization processing request may be interchanged and may also be performed simultaneously. If the authorization program is in the initialized state, the initialization operation may not be executed. The desensitization processing request may be sent when the login information is acquired, or may be sent after the authorization confirmation information of the target user is acquired.
After the first application acquires the desensitization data of the first digital identity information of the target user, the second digital identity information of the first application and the login information through the authorization program, a verifiable statement can be applied from the blockchain system. Specifically, the step S100-4 of sending the authorization request to the blockchain system according to the determined authorization information includes: determining the acquired first digital identity information of the target user, the second digital identity information of the first application, desensitization data of login information and authority information of one-key login authority to be authorized as authorization information; and sending an authorization request to the blockchain system according to the authorization information. When the blockchain system receives the authorization request, a verifiable statement is created according to the authorization information in the authorization request, and authorization record information generated based on the verifiable statement is saved in the blockchain. Wherein, the authority information represents that the authority to be granted is one-key login authority.
Further, in order to avoid impersonating the target user to perform an authorization operation after the relevant information of the target user is stolen by others, the authorization request may further include first signature data obtained by signing the first specified data based on a first private key corresponding to the first digital identity information, so that the block chain system verifies the first signature data before the verifiable statement is created; or after the first application sends the authorization request to the blockchain system through the authorization program, the first application receives the signature request sent by the blockchain system through the authorization program, and sends the first signature data to the blockchain system according to the first signature data obtained by performing signature processing on the first specified data through the first private key corresponding to the acquired first digital identity information. The first private key corresponding to the first digital identity information may be stored in a designated location of the first terminal device of the target user, for example, in a secure environment.
Therefore, according to the first digital identity information of the target user, the second digital identity information of the first application and desensitization data of the login information, the verifiable statement is applied from the blockchain system, and the validity of authorization and the authenticity of the verifiable statement are ensured; by storing the authorization record information generated based on the verifiable statement into the blockchain system, an effective basis is provided for query and verification of authorization operation of the user, so that convenience is provided for complaint handling of complaint acceptors, and the problem that the complaint of the target user to the first application causes adverse effects on the relevant parties of the first application is avoided.
Step S100-6, receiving authorization result information sent by the blockchain system, and storing verifiable statements in the authorization result information to a specified storage area of the first application; or receiving first authorization success information sent by the blockchain system, wherein the first authorization success information represents that the verifiable statement is successfully created and is stored to a server corresponding to the first application; or receiving second authorization success information sent by the server corresponding to the first application, wherein the second authorization success information represents and stores a verifiable statement sent by the server already receiving the blockchain system.
Specifically, authorization result information sent by the blockchain system is received through an authorization program, and verifiable statements in the authorization result information are stored in a specified storage area of the first application; or, receiving first authorization success information sent by the blockchain system through an authorization program, wherein the first authorization success information represents that the verifiable statement is successfully created and is stored to a server corresponding to the first application; or receiving second authorization success information sent by the server corresponding to the first application, wherein the second authorization success information represents that the server has received and stored the verifiable statement. More specifically, after creating the verifiable statement, the blockchain system may send authorization result information to the first application through the authorization program according to the verifiable statement, and the first application stores the verifiable statement in the authorization result information to a designated storage area of the first application. Or after the blockchain system creates the verifiable statement, the verifiable statement is sent to the service end corresponding to the first application, so that the first service end stores the verifiable statement; when the blockchain system determines that the first service end successfully stores the verifiable statement, first authorization success information is sent to the first application through the authorization program; or after the first service end saves the verifiable statement sent by the blockchain system, the first service end sends second authorization success information to the first application.
Further, when saving the verifiable statement to the designated storage area of the first application, after receiving the verifiable statement, can save the verifiable statement to the designated storage area of the first application in association with the login information; accordingly, the step S102 of querying the verifiable statement allocated to the target user by the blockchain system includes: inquiring whether a verifiable statement distributed to a target user by a block chain system is stored in a designated storage area of the first application; in step S104, obtaining login information according to the verifiable statement includes: and obtaining the login information saved in association with the verifiable declaration from the specified storage area according to the verifiable declaration. Or after the first application acquires desensitization data of the login information, establishing and storing an association relation between the login information and the desensitization data, and storing a verifiable statement to a designated storage area of the first application when the verifiable statement is received; correspondingly, the step S104 of obtaining login information according to the verifiable statement includes: desensitization data of the login information are obtained from the verifiable statement, and login information related to the desensitization data is obtained based on the association relationship between the stored desensitization data and the login information; the association relationship between the login information and the desensitization data may be stored in a designated storage area of the first application, or may be stored in another storage area of the first application.
Further, when the verifiable statement is stored to the server corresponding to the first application, after the first application acquires the desensitization data of the login information, the login information and the desensitization data can be sent to the server corresponding to the first application, and the server stores the received login information and the desensitization data in an associated manner; accordingly, the querying the verifiable statement allocated to the target user by the blockchain system in step S102 may include: sending a query request to a server corresponding to the first application, and determining whether a verifiable statement is queried according to query result information sent by the server; in step S104, obtaining login information according to the verifiable statement includes: acquiring login information from query result information sent by a server; the login information is obtained by the server according to the inquired verifiable statement. Specifically, the server matches second digital identity information of the first application included in the query request with second digital identity information in a stored verifiable statement, determines a verifiable statement corresponding to the second digital identity information which is successfully matched as a query-to-target verifiable statement, acquires associated login information from an association relation between stored desensitization data and the login information according to desensitization data in the target verifiable statement, and sends query result information representing successful query to the first application according to the acquired login information.
Furthermore, in order to make the target user know the authorization result, the first application displays the authorization success information when receiving the authorization result information which is sent by the blockchain system and is used for representing authorization.
In one or more embodiments of the present specification, a verifiable statement is assigned to a target user through a blockchain system to prove that the target user grants a right to perform one-key login based on login information of the one-key login first application to the first application; so that the first application can perform corresponding processing of the target user to log in the first application by one key based on the verifiable statement. Therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience is provided for the complaint handling of a complaint accepting party, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
Corresponding to the above-described login processing method, based on the same technical concept, one or more embodiments of the present specification further provide another login processing method, fig. 5 is a flowchart of another login processing method provided by one or more embodiments of the present specification, and the method in fig. 5 can be executed by a blockchain system; as shown in fig. 5, the method comprises the steps of:
step S202, receiving an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of the first application to be authorized;
step S204, according to the authorization information included in the authorization request, a verifiable statement is created through a blockchain system; the verifiable statement is used for proving that the target user grants the right of one-key login to the first application based on the login information of the one-key login first application;
the authorization information includes first digital identity information of the target user, second digital identity information of the first application, ciphertext data of the login information, authority information and the like.
Step S206, authorization result information is sent to the first application according to the created verifiable statement, so that the first application executes corresponding processing of the target user for logging in the first application by one key according to the verifiable statement based on the one-key login operation of the target user.
In one or more embodiments of the present specification, the blockchain system creates a verifiable statement for a target user based on an authorization request sent by a first application of the target user, so as to prove that the target user grants a right to log in the first application by one key based on login information of the first application; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience is provided for the complaint handling of a complaint accepting party, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
In order to ensure the validity of the verifiable claims, in one or more embodiments of the present specification, after receiving an authorization request, the blockchain system first determines whether authorization information included in the authorization request meets the creation conditions of the verifiable claims. Specifically, step S204 may include the following step S204-2:
step S204-2, if the authorization information included in the authorization request is determined to meet the creation condition of the preset verifiable statement, generating the verifiable statement according to the authorization information.
Specifically, a first public key corresponding to first digital identity information of a target user, which is included in first signature data and authorization information, is acquired; and verifying the first signature data according to the first public key, and if the first signature data passes the verification, determining that the authorization information meets the creation condition of a preset verifiable statement. The first signature data is obtained by performing signature processing on the first specified data based on a first private key corresponding to the first digital identity information.
Further, the authorization information may include first signature data, and correspondingly, the blockchain system obtains the first signature data from the authorization information; or, the blockchain system sends a signature request to the first application when receiving the authorization request, and receives first signature data sent by the first application.
Further, acquiring a first public key corresponding to the first digital identity information, which may be acquiring an associated first public key from an association relationship between the digital identity information and the public key stored in the block chain according to the first digital identity information; the first public key is a public key in a public and private key pair distributed for the first digital identity information when the first digital identity information is generated.
Because the first private key corresponding to the first digital identity information is only held by the target user, the risk that other people pretend to be the target user to perform authorization operation is effectively avoided by acquiring the first signature data and verifying the first signature data, and the validity of the verifiable statement is further ensured.
In order to prove the authenticity and authority of the verifiable claims, in one or more embodiments of the present specification, the blockchain system creates the target verifiable claims based on the second signature data obtained by the second private key corresponding to the third digital identity information of the blockchain system performing signature processing on the second specified data. Specifically, step S204 may include the following steps S204-4 to S204-8:
step S204-4, determining the statement identification information of the verifiable statement to be created through the blockchain system;
step S204-6, signing the second designated data according to a second private key corresponding to the third digital identity information of the block chain system to obtain second signed data;
step S204-8, a verifiable statement is created according to the determined statement identification information, the obtained second signature data, the obtained first signature data, the first digital identity information included by the authorization information, the second digital identity information included by the authorization information, the desensitization data included by the authorization information and the authority information included by the authorization information.
And generating the verifiable statement according to the second signature data, so that the related user can ensure the validity and authority of the verifiable statement by verifying the second signature data, avoid the forgery of the verifiable statement and further ensure the validity of the authorization.
Further, in order to ensure that the authorization process can be performed smoothly, in one or more embodiments of the present disclosure, the first application performs data interaction with the blockchain system through a specified authorization procedure. Accordingly, step S202 includes: receiving an authorization request sent by a first application of a target user through an authorization program; step S206 includes: and sending authorization result information to the first application through the authorization program according to the created verifiable statement.
To ensure the valid creation of verifiable claims, the first application also sends a request for a digital identity application to the blockchain system through an authorization procedure before sending the request for authorization to the blockchain system through an authorization procedure, taking into account that the target user and/or the first application may not have applied for digital identity information when the target user performs a positive authorization operation. Correspondingly, before step S202, the method may further include:
receiving a digital identity information application request sent by a first application through an authorization program; the application request is used for applying for digital identity information for a target user and/or a first application; generating first digital identity information of a target user and/or second digital identity information of a first application according to a digital identity information application request; and sending the generated first digital identity information and/or the second digital identity information to the first application through an authorization program.
In order to ensure that the verifiable statement is created based on the authorization operation of the target user when the verifiable statement is created based on the digital identity information, after the blockchain system generates the first digital identity information, a corresponding public and private key pair is also distributed to the first digital identity information, a first public key in the public and private key pair and the first digital identity information are stored in the blockchain in an associated manner, and a first private key in the public and private key pair is sent to a first application through an authorization program, so that the first application stores the first private key to a specified position, such as a security unit of a first terminal device where the first application is located. The first private key and the first digital identity information may be sent to the first application together, or may be sent to the first application separately.
By applying for the digital identity information for the target user and the first application, the target user and the first application can be uniquely identified by the first digital identity information and the second digital identity information, and each application of the target user can be associated based on the first digital identity information.
Further, in order to avoid leakage of login information when the target user logs in the first application by one key, the first application sends a desensitization processing request of the login information to the blockchain system through the authorization program before sending the authorization request to the blockchain system through the authorization program. Correspondingly, step S102 may be preceded by:
receiving a desensitization processing request sent by a first application through an authorization program; the desensitization processing request comprises login information to be desensitized; desensitization processing is carried out on the login information according to a preset desensitization mode to obtain desensitization data, and the desensitization data are sent to the first application through an authorization program.
It should be noted that the digital identity information application request and the desensitization processing request may be sent to the blockchain system at the same time, or may be sent to the blockchain system separately.
In order to provide an effective basis for complaint handling of a complaint acceptor when a subsequent target user complains about a one-touch login manner of a first application, as shown in fig. 6, in one or more embodiments of the present specification, after creating a verifiable statement, a blockchain system stores authorization record information generated based on the verifiable statement into a blockchain. Specifically, step S204 may be followed by step S208 of:
step S208, generating authorization record information according to the verifiable statement, and storing the authorization record information into the block chain.
Alternatively, step S208 may include the following step S208-2:
and step S208-2, recording the first digital identity information of the target user, the second digital identity information of the first application, desensitization data and the determined declaration identification information of the verifiable declaration in a correlation manner, determining the recorded information as authorization record information, and storing the authorization record information into a block chain.
Corresponding to step S208-2, as shown in fig. 6, when receiving the complaint request sent by the target user, the first user may send an inquiry request to the blockchain system, and the blockchain system performs inquiry processing based on the authorization record information in the blockchain. Specifically, step S208 may be followed by steps S210 to S214 as follows:
step S210, receiving a query request sent by a first user; the query request comprises first digital identity information, second digital identity information and login information; the first user is a user for receiving a complaint request sent by a target user; the complaint request is used for requesting complaint on a login mode of one-key login of the first application;
specifically, when the target user does not want to perform the one-touch login of the first application through the authorized login information, or when the first user forgets that the first user has granted the login information for logging in the first application through one-touch login to the first application to perform the one-touch login of the first application, or when the target user is dissatisfied with the one-touch login method of the first application due to other factors, the target user may send a complaint request to the first user to request complaint with the one-touch login method of the first application. After receiving the complaint request, the first user sends a query request to the blockchain system according to the first digital identity information of the target user, the second digital identity information of the first application, the login information and the like included in the complaint request.
Step S212, if the associated authorization record information is inquired from the block chain according to the first digital identity information and the second digital identity information included in the inquiry request, performing preset processing on desensitization data in the inquired authorization record information to obtain corresponding login information;
it should be noted that the complaint request may also include application information of the first application, such as an application name; correspondingly, when the blockchain system receives the query request, the corresponding second digital identity information may be determined according to the application information included in the query request, and then the associated authorization record information may be queried from the blockchain according to the first digital identity information and the second digital identity information.
Step S214, if it is determined that the obtained login information matches the login information included in the query request, sending query result information representing that the query is successful to the first user, so that the first user performs a cancel-out process on a complaint event corresponding to the complaint request.
Therefore, when the blockchain system receives the query request, the query and matching processing is carried out based on the authorization record information stored in the blockchain, and the processing result is sent to the first user, so that when the target user grants the login information for logging in the first application by one key to the first application for one-key login, the first user can carry out cancel-check processing on the complaint event corresponding to the complaint request. Therefore, based on the characteristics of the block chain, inquiry and verification of user authorization operation are realized, an effective basis is provided for the complaint event processing of the first user, and adverse effects of complaints of the target user on related parties of the first application are avoided.
In one or more embodiments of the present description, step S208 may include the following step S208-4:
s208-4, performing hash processing on the verifiable statement according to a preset algorithm to obtain a hash value; and recording the hash value and the determined declaration identification information of the verifiable declaration in an associated manner, determining the recorded information as authorization record information, and storing the authorization record information into the blockchain.
Corresponding to step S208-4, as shown in fig. 6, when receiving the complaint request sent by the target user, the first user may send an authentication request to the blockchain system, and the blockchain system performs authentication processing based on the authorization record information in the blockchain. Specifically, step S208 may be followed by steps S216 to S220 of:
step S216, receiving a verification request sent by a first user; the verification request comprises a verifiable statement to be verified, which is acquired from the first application or a server side corresponding to the first application; the first user is a user for receiving a complaint request sent by a target user; the complaint request is used for complaint about the login mode of the one-key login of the first application;
specifically, when a first user receives a complaint request sent by a target user, a verifiable statement of the target user is obtained from a first application or a server of the first application according to the complaint request, and if it is determined that first digital identity information and second digital identity information in the obtained verifiable statement are matched with first digital identity information and second digital identity information included in the complaint request, a verification request is sent to the blockchain system according to the obtained verifiable statement.
Step S218, carrying out hash processing on the verifiable statement to be verified according to a preset algorithm to obtain a hash value to be verified;
step S220, if it is determined that the associated authorization record information is queried from the block chain according to the statement identification information in the verifiable statement to be verified and the hash value in the queried authorization record information matches the hash value to be verified, sending verification result information that represents that the verification passes to the first user, so that the first user performs a verification and cancellation process on the complaint event corresponding to the complaint request.
Therefore, when the blockchain system receives the verification request, verification processing is carried out based on the authorization record information stored in the blockchain, and the processing result is sent to the first user, so that when the target user grants the login information for logging in the first application through one key to the first application for one-key login, the first user can carry out cancel verification processing on the complaint event corresponding to the complaint request. Therefore, based on the characteristics of the block chain, inquiry and verification of user authorization operation are realized, an effective basis is provided for the complaint event processing of the first user, and adverse effects of complaints of the target user on related parties of the first application are avoided.
It should be noted that fig. 6 is only used for illustration and not for limitation, and some operations may be performed in an interchangeable order and may also be performed simultaneously, for example, the order of operations for sending the digital identity information application request and sending the desensitization processing request may be interchanged and may also be performed simultaneously. If the authorization program is in the initialized state, the initialization operation may not be executed. The desensitization processing request can be sent when the login information is acquired, or can be sent after the authorization confirmation information of the target user is acquired; the operation of saving the authorization record information to the blockchain may be performed when the verifiable declaration creation is completed, may also be performed after the authorization result information is sent to the first application by the authorization application, and the like.
The authorization record information can also simultaneously comprise the first digital identity information, the second digital identity information, desensitization data, a hash value of the verifiable statement and statement identification information of the verifiable statement; the authorization record information may also include a validity field or the like that characterizes the verifiable assertion as being in a valid state. The specific form of the authorization record information can be set in practical application according to the requirement.
In one or more embodiments of the present specification, the blockchain system creates a verifiable statement for a target user based on an authorization request sent by a first application of the target user, so as to prove that the target user grants a right to log in the first application by one key based on login information of the first application; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, and the method provides convenience for the complaint handling of a complaint accepting party, so that the verification and cancellation processing of complaint events can be performed timely, and adverse effects on related parties of the first application due to the complaint operation of the target user are avoided.
Corresponding to the login processing method provided above, based on the same technical concept, one or more embodiments of the present specification further provide a processing method for a user to log in a related service. Fig. 7 is a schematic application scenario diagram of a processing method for a user login related service according to one or more embodiments of the present specification, and as shown in fig. 7, the scenario includes: the system comprises a first terminal device of a target user, a second terminal device of the first user and a block chain system; the first terminal device and the second terminal device may be a mobile phone, a tablet computer, a desktop computer, a portable notebook computer, or the like (only the mobile phone is shown in fig. 7); a first application is installed in the first terminal device; a complaint handling related second application is installed in the second terminal equipment; the blockchain system includes at least one blockchain node (only one is shown in fig. 7) of the access blockchain, and data such as authorization record information is stored in the blockchain.
Specifically, the first application acquires the authorization confirmation information, and based on the acquired authorization confirmation information, sends an authorization request to the blockchain system according to the determined authorization information; a block chain link point in the block chain system creates a verifiable statement according to an authorization request, stores authorization record information generated based on the verifiable statement into a block chain, and sends authorization result information to a first application; the verifiable statement is used for proving that the target user grants the first application the right to perform the one-key login based on the login information of the one-key login first application. When the first application monitors that the target user performs one-key login operation on the first application, corresponding processing of the target user to log in the first application by one key is performed on the basis of the verifiable statement of the target user in response to the one-key login operation. When a target user wants to complain about the one-key login mode of the first user, the first terminal equipment of the target user can be operated to send a complaint request to second terminal equipment of a second user; the second terminal equipment sends a processing request capable of verifying the statement to the blockchain system based on the complaint request; the block chain link point in the block chain system carries out corresponding processing based on the authorization record information in the block chain according to the received processing request, and sends the processing result information to the second terminal equipment; and the second terminal equipment performs the verification and cancellation processing of the complaint event based on the received processing result information. The login information may be a mobile phone number of the target user, login information of a second application of the target user, which is associated with the first application, and the like. Therefore, the verifiable statement is distributed to the target user through the blockchain system, and the authorization record information generated based on the verifiable statement is stored in the blockchain; the target user is proved to grant the right of one-key login to the first application based on the login information of one-key login to the first application based on the verifiable statement; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the rapidity of login, the authorization operation of the user has effective basis to be checked and verified, and the convenience and the basis are provided for the complaint handling of the first user, so that the verification and cancellation processing of complaint events can be performed timely, and adverse effects on related parties of the first application due to complaints of target users are avoided.
Fig. 8 is a flowchart illustrating a method for processing a user login related service according to one or more embodiments of the present disclosure, where the method in fig. 8 can be executed by a first application. As shown in fig. 8, the method includes:
step S302, obtaining authorization confirmation information of a target user; the authorization confirmation information represents that a target user confirms that the first application to be authorized grants the right of one-key login based on login information of the one-key login first application;
step S304, based on the obtained authorization confirmation information, sending an authorization request to the blockchain system according to the determined authorization information, so that the blockchain system creates a verifiable statement and stores authorization record information generated based on the verifiable statement into the blockchain; when the blockchain system receives a processing request of a verifiable statement sent by a first user, corresponding processing is carried out based on authorization record information in the blockchain; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user for receiving a complaint request sent by a target user; the complaint request is used for requesting complaint on a login mode of the first application based on login information one-key login; the verifiable statement is used for proving that the target user authorizes the right of one-key login based on the login information for the first application;
step S306, receiving authorization result information sent by the blockchain system, and in response to a one-key login operation performed by the target user on the first application, performing corresponding processing of the target user to log in the first application by one key based on the verifiable statement.
The specific implementation manner of step S302 to step S306 can refer to the related description, and repeated details are not repeated here.
In order to ensure that the authorization process can be performed smoothly, in one or more embodiments of the present specification, the processing device for the user to log in the related service performs data interaction with the blockchain system through a specified authorization procedure. Correspondingly, step S304 is preceded by: if the specified authorization program is determined to be in the uninitialized state, initializing the authorization program; correspondingly, step S304 includes: based on the obtained authorization confirmation information, sending an authorization request to the blockchain system through an authorization program according to the determined authorization information; in step S306, the receiving of the authorization result information sent by the blockchain system includes: and receiving authorization result information sent by the blockchain system through an authorization procedure. The specific manner of initializing the authorization procedure may refer to the related description, and repeated details are not described herein.
In one or more embodiments of the present description, when obtaining authorization confirmation information of a target user, a verifiable statement is allocated to the target user through a blockchain system, and authorization record information generated based on the verifiable statement is stored in a blockchain; the target user is proved to grant the right of one-key login to the first application based on the login information of one-key login to the first application based on the verifiable statement; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; and the blockchain system can correspondingly process the processing request sent by the first user based on the authorization record information in the blockchain, so that the first user can perform the verification and cancellation processing of the complaint event according to the processing result information. Therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience and the basis are provided for the complaint handling of the first user, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
On the basis of the same technical concept, one or more embodiments of the present specification further provide another method for processing the user login related service, corresponding to the above-described method for processing the user login related service. Fig. 9 is another processing method for a user login related service according to one or more embodiments of the present disclosure, where the method in fig. 9 can be executed by a blockchain system, as shown in fig. 9, and the method includes:
step S402, receiving an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of the first application to be authorized;
step S404, according to the authorization information included in the authorization request, a verifiable statement is created through the blockchain system; the verifiable statement is used for proving that the target user grants the right of one-key login to the first application based on the login information of the one-key login first application;
step S406, sending authorization result information to the first application according to the verifiable statement, so that the first application responds to the one-key login operation of the target user and executes the corresponding processing of the target user for one-key login of the first application based on the verifiable statement;
step S408, storing the authorization record information generated based on the verifiable statement into the blockchain, so as to perform corresponding processing based on the authorization record information in the blockchain and send processing result information to the first user when receiving a processing request of the verifiable statement sent by the first user; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user for receiving a complaint request sent by a target user; the complaint request is used for complaint about a login mode in which the first application is logged in by one key based on the login information.
The specific implementation manner of steps S402 to S408 can refer to the related description, and repeated details are not repeated here.
In one or more embodiments of the present specification, the blockchain system allocates a verifiable statement to a target user according to an authorization request sent by a first application, and stores authorization record information generated based on the verifiable statement into the blockchain; the target user is proved to grant the right of one-key login to the first application based on the login information of one-key login to the first application based on the verifiable statement; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; and the blockchain system performs corresponding processing based on the authorization record information in the blockchain according to the processing request which can be verified and declared and is sent by the first user, so that the first user performs the verification and cancellation processing of the complaint event according to the processing result information. Therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience and the basis are provided for the complaint handling of the first user, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
Corresponding to the login processing method described above, based on the same technical concept, one or more embodiments of the present specification further provide a login processing apparatus applied to a first application. Fig. 10 is a schematic block diagram of a login processing apparatus according to one or more embodiments of the present disclosure, where as shown in fig. 10, the apparatus includes:
a query module 501, configured to query, in response to a one-key login operation performed by a target user on a first application, a verifiable statement assigned to the target user by a blockchain system; the verifiable statement is used for proving that the target user grants the right of one-key login to the first application based on login information of one-key login to the first application;
a first obtaining module 502, configured to obtain the login information according to the verifiable statement if the query module queries the verifiable statement;
and the processing module 503 is configured to execute corresponding processing for logging in the first application by the target user through one key according to the login information.
Optionally, the apparatus further comprises: the device comprises a second acquisition module, a sending module and a receiving module;
the second acquisition module acquires the authorization confirmation information of the target user; the authorization confirmation information represents that the target user confirms the authority granted to the first application for the one-key login;
the sending module is used for sending an authorization request to the blockchain system according to the determined authorization information based on the authorization confirmation information so that the blockchain system creates the verifiable statement according to the authorization information;
the receiving module is used for receiving authorization result information sent by the blockchain system and storing the verifiable statement in the authorization result information to a specified storage area of the first application; or receiving first authorization success information sent by the blockchain system, wherein the first authorization success information represents that the verifiable statement is successfully created and is stored to a server corresponding to the first application; or receiving second authorization success information sent by a server corresponding to the first application, wherein the second authorization success information represents that the server has received and stored the verifiable statement.
Optionally, the second obtaining module obtains the login information in response to a registration operation of the target user; or responding to the login operation of the target user, and if the verifiable statement is determined not to be inquired, acquiring the login information;
inquiring whether the target user grants the one-key login permission to the first application or not by showing inquiry information according to the acquired login information;
and obtaining authorization confirmation information generated by the confirmation authorization operation performed by the target user based on the display interface of the inquiry information.
Optionally, the apparatus further comprises: initializing a module;
the initialization module is used for initializing the authorization program if the specified authorization program is determined to be in an uninitialized state before the sending module sends the authorization request to the blockchain system according to the determined authorization information;
the sending module sends an authorization request to the blockchain system according to the determined authorization information through the authorization program;
and the receiving module receives the authorization result information sent by the block chain system through the authorization program.
Optionally, the sending module determines the acquired first digital identity information of the target user, the second digital identity information of the first application, desensitization data of the login information, and authority information of the authority to be authorized as authorization information; and sending an authorization request to the blockchain system according to the authorization information.
The login processing device provided by one or more embodiments of the present specification allocates a verifiable statement to a target user through a blockchain system to prove that the target user grants a right to perform one-key login based on login information of the first application for the first application; so that the first application can perform corresponding processing of the target user to log in the first application by one key based on the verifiable statement. Therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience is provided for the complaint handling of a complaint accepting party, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
Corresponding to the above-described login processing method, based on the same technical concept, one or more embodiments of the present specification further provide a login processing apparatus applied to a blockchain system. Fig. 11 is a schematic block diagram of a login processing apparatus according to one or more embodiments of the present disclosure, where as shown in fig. 11, the apparatus includes:
a receiving module 601, configured to receive an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application;
a creating module 602, which creates a verifiable statement through the blockchain system according to the authorization information included in the authorization request; wherein the verifiable statement is used for proving that the target user grants the one-touch login authority to the first application;
the sending module 603 sends authorization result information to the first application according to the verifiable statement, so that the first application executes corresponding processing of logging in the first application by one key of the target user according to the verifiable statement based on the one-key logging operation of the target user.
Optionally, the receiving module 601 receives an authorization request sent by a first application of the target user through an authorization program;
the sending module 603 sends authorization result information to the first application through the authorization program according to the verifiable statement.
Optionally, the apparatus further comprises: a generation module;
and the generating module generates authorization record information according to the verifiable statement and stores the authorization record information into a block chain.
Optionally, the authorization information includes: first digital identity information of the target user, second digital identity information of the first application, desensitization data of the login information;
the generating module is used for associating the first digital identity information, the second digital identity information, the desensitization data and the determined statement identification information of the verifiable statement with a record and determining the recorded information as the authorization record information.
Correspondingly, the device further comprises: a query module;
the receiving module 601, after the generating module stores the authorization record information into the block chain, further receives a query request sent by the first user; wherein the query request includes the first digital identity information, the second digital identity information, and the login information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for requesting complaint on a login mode of the one-key login of the first application;
the query module is used for performing preset processing on desensitization data in the queried authorization record information to obtain corresponding login information if the associated authorization record information is queried from the block chain according to the first digital identity information and the second digital identity information which are included in the query request;
and if the obtained login information is matched with the login information included in the query request, sending query result information representing successful query to the first user so that the first user can carry out cancel-verification processing on the complaint event corresponding to the complaint request.
Optionally, the generating module performs hash processing on the verifiable statement according to a preset algorithm to obtain a hash value;
and associating the hash value with the determined declaration identification information of the verifiable declaration to record, and determining the recorded information as the authorization record information.
Correspondingly, the device further comprises: a verification module;
the receiving module 601, after the generating module stores the authorization record information into the block chain, further receives a verification request sent by the first user; the verification request comprises the verifiable statement to be verified, which is acquired from the first application or a server side corresponding to the first application; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for complaint about a login mode of the one-key login of the first application;
the verification module performs hash processing on the verifiable statement to be verified according to the preset algorithm to obtain a hash value to be verified; and the number of the first and second groups,
if it is determined that the associated authorization record information is inquired from the block chain according to the statement identification information in the verifiable statement to be verified and the inquired hash value in the authorization record information is matched with the hash value to be verified, sending verification result information representing that the verification is passed to the first user so that the first user can perform cancel verification processing on the complaint event corresponding to the complaint request.
The login processing device provided by one or more embodiments of the present specification creates a verifiable statement for a target user based on an authorization request sent by a first application of the target user, so as to prove that the target user grants a right to perform one-key login based on login information of the first application for the first application; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience is provided for the complaint handling of a complaint accepting party, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
It should be noted that the embodiment of the login processing apparatus in this specification and the embodiment of the login processing method in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to the implementation of the corresponding login processing method, and repeated details are not described again.
On the basis of the same technical concept, corresponding to the processing method for the user login related service described above, one or more embodiments of the present specification further provide a processing apparatus for the user login related service, which is applied to the first application. Fig. 12 is a schematic block diagram illustrating a processing apparatus for a user to log in a related service according to one or more embodiments of the present disclosure, and as shown in fig. 12, the apparatus includes:
an obtaining module 701, configured to obtain authorization confirmation information of a target user; the authorization confirmation information represents that the target user confirms that the first application to be authorized grants the right of one-key login based on login information of one-key login of the first application;
a sending module 702, configured to send an authorization request to a blockchain system according to determined authorization information based on the authorization confirmation information, so that the blockchain system creates a verifiable statement and stores authorization record information generated based on the verifiable statement into a blockchain; when the blockchain system receives a processing request of a verifiable statement sent by a first user, corresponding processing is carried out based on authorization record information in the blockchain; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for requesting complaint on a login mode of the one-key login of the first application; the verifiable statement is used for proving that the target user authorizes the authority of the one-key login to the first application;
a receiving module 703, configured to receive authorization result information sent by the blockchain system;
a login module 704, responsive to a one-touch login operation performed by the target user on the first application, executing corresponding processing of the target user to login to the first application based on the verifiable statement.
Optionally, the obtaining module 701 obtains the login information in response to a registration operation of the target user; or responding to the login operation of the target user, and if the verifiable statement is determined not to be inquired, acquiring the login information; and the number of the first and second groups,
inquiring whether the target user grants the one-key login permission to the first application or not by showing inquiry information according to the acquired login information;
and obtaining authorization confirmation information generated by the confirmation authorization operation performed by the target user based on the display interface of the inquiry information.
Optionally, the apparatus further comprises: initializing a module;
the initialization module, before the sending module 702 sends the authorization request to the blockchain system according to the determined authorization information, if it is determined that the designated authorization program is in an uninitialized state, performs initialization processing on the authorization program;
the sending module 702 sends an authorization request to the blockchain system according to the determined authorization information through the authorization program;
the receiving module 703 receives the authorization result information sent by the blockchain system through the authorization procedure.
When obtaining the authorization confirmation information of the target user, the processing device for the user to log in the related service provided in one or more embodiments of the present specification allocates a verifiable statement to the target user through the blockchain system, and stores the authorization record information generated based on the verifiable statement into the blockchain; the target user is proved to grant the right of one-key login to the first application based on the login information of one-key login to the first application based on the verifiable statement; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; and the blockchain system can correspondingly process the processing request sent by the first user based on the authorization record information in the blockchain, so that the first user can perform the verification and cancellation processing of the complaint event according to the processing result information. Therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience and the basis are provided for the complaint handling of the first user, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
On the basis of the same technical concept, one or more embodiments of the present disclosure further provide another processing apparatus for user login related services, which is applied to a block chain system. Fig. 13 is a schematic block diagram illustrating another processing apparatus for a user login related service according to one or more embodiments of the present disclosure, and as shown in fig. 13, the apparatus includes:
a receiving module 801, which receives an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application;
a creating module 802 for creating a verifiable statement through the blockchain system according to the authorization information included in the authorization request; wherein the verifiable statement is used for proving that the target user grants the one-touch login authority to the first application;
a sending module 803, configured to send authorization result information to the first application according to the verifiable statement, so that the first application responds to the one-key login operation of the target user, and executes corresponding processing of the target user to log in the first application by one key based on the verifiable statement; and the number of the first and second groups,
the saving module 804 is configured to save the authorization record information generated based on the verifiable statement into the blockchain, so that when a processing request of the verifiable statement sent by a first user is received, corresponding processing is performed based on the authorization record information in the blockchain, and processing result information is sent to the first user; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for complaint about a login mode of the one-touch login of the first application.
Optionally, the receiving module 801 is configured to receive an authorization request sent by a first application of the target user through an authorization program;
the sending module 803 sends authorization result information to the first application through the authorization program according to the verifiable statement.
Optionally, the authorization information includes: first digital identity information of the target user, second digital identity information of the first application, desensitization data of the login information;
the saving module 804 associates and records the first digital identity information, the second digital identity information, the desensitization data, and the determined declaration identification information of the verifiable declaration, and determines the recorded information as the authorization record information.
Optionally, the saving module 804 performs hash processing on the verifiable statement according to a preset algorithm to obtain a hash value; and the number of the first and second groups,
and associating the hash value with the determined declaration identification information of the verifiable declaration to record, and determining the recorded information as the authorization record information.
According to the processing device for the user login related service provided by one or more embodiments of the present specification, according to the authorization request sent by the first application, a verifiable statement is allocated to the target user, and authorization record information generated based on the verifiable statement is stored in the blockchain; the target user is proved to grant the right of one-key login to the first application based on the login information of one-key login to the first application based on the verifiable statement; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; and the blockchain system performs corresponding processing based on the authorization record information in the blockchain according to the processing request which can be verified and declared and is sent by the first user, so that the first user performs the verification and cancellation processing of the complaint event according to the processing result information. Therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience and the basis are provided for the complaint handling of the first user, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
It should be noted that, the embodiment of the processing apparatus related to the user login related service in this specification and the embodiment of the processing method related to the user login related service in this specification are based on the same inventive concept, so that specific implementation of this embodiment may refer to implementation of the foregoing corresponding processing method related to the user login related service, and repeated details are not repeated.
On the basis of the same technical concept, corresponding to the login processing method described above, one or more embodiments of the present specification further provide a login processing system. Fig. 14 is a schematic diagram illustrating a component of a login processing system according to one or more embodiments of the present disclosure, where as shown in fig. 14, the system includes: a blockchain system 901 and a first application 902;
the blockchain system 901 receives an authorization request sent by a first application 902 of a target user, and creates a verifiable statement according to authorization information included in the authorization request; sending authorization result information to the first application 902 in accordance with the verifiable claims; the authorization request is used for requesting that the first application 902 to be authorized is granted the authority of one-key login based on the login information of one-key login of the first application 902; the verifiable assertion is used to prove that the target user has granted the one-touch login to the first application 902;
the first application 902, in response to a one-key login operation performed by a target user on the first application 902, queries the verifiable statement assigned to the target user by the blockchain system 901; if the verifiable statement is inquired, obtaining the login information according to the verifiable statement; and executing corresponding processing of logging in the first application 902 by one key of the target user according to the login information.
Optionally, as shown in fig. 15, the system further includes: a second terminal device 903 of the first user;
the second terminal device 903 is configured to receive the complaint request sent by the first user, and send a processing request capable of verifying a statement to the blockchain system 901 according to the complaint request; performing a verification and cancellation process on a complaint event corresponding to the complaint request based on the processing result information sent by the blockchain system 901; the complaint request is used for requesting complaint on a login mode of the one-key login of the first application;
the blockchain system 901, after creating a verifiable statement according to the authorization information included in the authorization request, further saves the authorization record information generated based on the verifiable statement into a blockchain; and when receiving the processing request sent by the second terminal device 903, performing corresponding processing based on the authorization record information in the block chain and sending the processing result information to the second terminal device 903.
In the login processing system provided in one or more embodiments of the present specification, the blockchain system creates a verifiable statement for the target user based on an authorization request sent by a first application of the target user, so as to prove that the target user grants a right to perform one-key login based on login information of the first application for the first application; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience is provided for the complaint handling of a complaint accepting party, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
It should be noted that the embodiment of the login processing system in this specification and the embodiment of the login processing method in this specification are based on the same inventive concept, so that the specific implementation of this embodiment may refer to the implementation of the corresponding login processing method, and repeated details are not repeated.
Further, corresponding to the login processing method described above, based on the same technical concept, one or more embodiments of the present specification further provide a login processing device, which is configured to execute the login processing method described above, and fig. 16 is a schematic structural diagram of the login processing device provided in one or more embodiments of the present specification.
As shown in fig. 16, the login processing device may have a relatively large difference due to different configurations or performances, and may include one or more processors 11 and a memory 12, and one or more stored applications or data may be stored in the memory 12. Wherein the memory 12 may be a transient storage or a persistent storage. The application program stored in memory 12 may include one or more modules (not shown), each of which may include a series of computer-executable instructions in a login processing device. Still further, the processor 11 may be arranged to communicate with the memory 12, executing a series of computer executable instructions in the memory 12 on the login processing device. The login processing device may also comprise one or more power supplies 13, one or more wired or wireless network interfaces 14, one or more input output interfaces 15, one or more keyboards 16, etc.
In a particular embodiment, the login processing device comprises a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may comprise one or more modules, and each module may comprise a series of computer-executable instructions for the login processing device, and the one or more programs configured to be executed by the one or more processors comprise computer-executable instructions for:
querying a verifiable statement assigned to a target user by a blockchain system in response to a one-touch login operation performed by the target user on a first application; the verifiable statement is used for proving that the target user grants the right of one-key login to the first application based on login information of one-key login to the first application;
if the verifiable statement is inquired, obtaining the login information according to the verifiable statement;
and executing corresponding processing of the target user for logging in the first application by one key according to the login information.
Optionally, the computer executable instructions, when executed, further comprise, prior to responding to a one-touch login operation performed by a target user on a first application:
obtaining authorization confirmation information of the target user; the authorization confirmation information represents that the target user confirms the authority granted to the first application for the one-key login;
based on the authorization confirmation information, sending an authorization request to the blockchain system according to the determined authorization information so that the blockchain system creates the verifiable statement according to the authorization information;
receiving authorization result information sent by the blockchain system, and storing the verifiable statement in the authorization result information to a specified storage area of the first application; or receiving first authorization success information sent by the blockchain system, wherein the first authorization success information represents that the verifiable statement is successfully created and is stored to a server corresponding to the first application; or receiving second authorization success information sent by a server corresponding to the first application, wherein the second authorization success information represents that the server has received and stored the verifiable statement.
Optionally, the computer-executable instructions, when executed, obtain the authorization confirmation information of the target user, including:
responding to the registration operation of the target user, and acquiring the login information; or responding to the login operation of the target user, and if the verifiable statement is determined not to be inquired, acquiring the login information;
inquiring whether the target user grants the one-key login permission to the first application or not by showing inquiry information according to the acquired login information;
and obtaining authorization confirmation information generated by the confirmation authorization operation performed by the target user based on the display interface of the inquiry information.
Optionally, when executed, before sending an authorization request to the blockchain system according to the determined authorization information, the computer-executable instructions further include:
if the specified authorization program is determined to be in an uninitialized state, initializing the authorization program;
the sending an authorization request to the blockchain system according to the determined authorization information includes:
sending an authorization request to the blockchain system according to the determined authorization information through the authorization program;
the receiving authorization result information sent by the blockchain system includes:
and receiving authorization result information sent by the blockchain system through the authorization program.
Optionally, when executed, the computer-executable instructions, when sending an authorization request to the blockchain system according to the determined authorization information, include:
determining the acquired first digital identity information of the target user, the second digital identity information of the first application, desensitization data of the login information and authority information of the authority to be authorized as authorization information;
and sending an authorization request to the blockchain system according to the authorization information.
The login processing device provided by one or more embodiments of the present specification allocates a verifiable statement to a target user through a blockchain system to prove that the target user grants a right to perform one-key login based on login information of the first application for the first application; so that the first application can perform corresponding processing of the target user to log in the first application by one key based on the verifiable statement. Therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience is provided for the complaint handling of a complaint accepting party, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
In another particular embodiment, a login processing apparatus includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the login processing apparatus, and configured for execution by the one or more processors the one or more programs include computer-executable instructions for:
receiving an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application;
creating a verifiable statement through a blockchain system according to authorization information included in the authorization request; wherein the verifiable statement is used for proving that the target user grants the one-touch login authority to the first application;
and sending authorization result information to the first application according to the verifiable statement so that the first application executes corresponding processing of one-key login of the target user to the first application according to the verifiable statement based on one-key login operation of the target user.
Optionally, the computer executable instructions, when executed, receiving an authorization request sent by a first application of a target user, include:
receiving an authorization request sent by a first application of the target user through an authorization program;
the sending authorization result information to the first application according to the verifiable statement comprises:
and sending authorization result information to the first application through the authorization program according to the verifiable statement.
Optionally, when executed, the computer-executable instructions, after creating a verifiable statement by a blockchain system according to authorization information included in the authorization request, further include:
and generating authorization record information according to the verifiable statement, and storing the authorization record information into a block chain.
The login processing device provided by one or more embodiments of the present specification creates a verifiable statement for a target user based on an authorization request sent by a first application of the target user, so as to prove that the target user grants a right to perform one-key login based on login information of the first application for the first application; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience is provided for the complaint handling of a complaint accepting party, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
It should be noted that the embodiment of the login processing device in this specification and the embodiment of the login processing method in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the corresponding login processing method, and repeated details are not described again.
Further, corresponding to the processing method for user login related services described above, based on the same technical concept, one or more embodiments of the present specification further provide a processing device for user login related services, where the device is configured to execute the processing method for user login related services, and fig. 17 is a schematic structural diagram of the processing device for user login related services provided in one or more embodiments of the present specification.
As shown in fig. 17, the processing device for the user login related service may have a relatively large difference due to different configurations or performances, and may include one or more processors 21 and a memory 22, where the memory 22 may store one or more stored applications or data. Wherein the memory 22 may be a transient or persistent storage. The application program stored in memory 22 may include one or more modules (not shown), each of which may include a series of computer-executable instructions in a processing device for user login to the associated service. Still further, the processor 21 may be configured to communicate with the memory 22 to execute a series of computer-executable instructions in the memory 22 on a processing device where a user logs into the associated service. The processing equipment for user login related services may also comprise one or more power supplies 23, one or more wired or wireless network interfaces 24, one or more input-output interfaces 25, one or more keyboards 26, etc.
In one particular embodiment, a processing device for user login related services includes a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may include one or more modules, and each module may include a series of computer-executable instructions for the processing device for user login related services, and the one or more programs configured for execution by the one or more processors include computer-executable instructions for:
obtaining authorization confirmation information of a target user; the authorization confirmation information represents that the target user confirms that the first application to be authorized grants the right of one-key login based on login information of one-key login of the first application;
based on the authorization confirmation information, sending an authorization request to a blockchain system according to the determined authorization information so that the blockchain system creates a verifiable statement and stores authorization record information generated based on the verifiable statement into a blockchain; when the blockchain system receives a processing request of a verifiable statement sent by a first user, corresponding processing is carried out based on authorization record information in the blockchain; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for requesting complaint on a login mode of the one-key login of the first application; the verifiable statement is used for proving that the target user authorizes the authority of the one-key login to the first application;
receiving authorization result information sent by the blockchain system, and responding to a one-key login operation executed by the target user on the first application, and executing corresponding processing of the target user for one-key login to the first application based on the verifiable statement.
Optionally, when executed, before sending an authorization request to the blockchain system according to the determined authorization information, the computer-executable instructions further include:
if the specified authorization program is determined to be in an uninitialized state, initializing the authorization program;
the sending an authorization request to the blockchain system according to the determined authorization information includes:
sending an authorization request to the blockchain system according to the determined authorization information through the authorization program;
the receiving authorization result information sent by the blockchain system includes:
and receiving authorization result information sent by the blockchain system through the authorization program.
When obtaining the authorization confirmation information of the target user, the processing device for the user to log in the related service provided in one or more embodiments of the present specification allocates a verifiable statement to the target user through the blockchain system, and stores the authorization record information generated based on the verifiable statement into the blockchain; the target user is proved to grant the right of one-key login to the first application based on the login information of one-key login to the first application based on the verifiable statement; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; and the blockchain system can correspondingly process the processing request sent by the first user based on the authorization record information in the blockchain, so that the first user can perform the verification and cancellation processing of the complaint event according to the processing result information. Therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience and the basis are provided for the complaint handling of the first user, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
In another specific embodiment, a processing device for user login related services comprises a memory, and one or more programs, wherein the one or more programs are stored in the memory, and the one or more programs may comprise one or more modules, and each module may comprise a series of computer-executable instructions for the processing device for user login related services, and the one or more programs configured to be executed by the one or more processors comprise computer-executable instructions for:
receiving an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application;
creating a verifiable statement through a blockchain system according to authorization information included in the authorization request; wherein the verifiable statement is used for proving that the target user grants the one-touch login authority to the first application;
sending authorization result information to the first application according to the verifiable statement so as to enable the first application to respond to the one-key login operation of the target user and execute the corresponding processing of the target user for one-key login of the first application based on the verifiable statement; and the number of the first and second groups,
storing authorization record information generated based on the verifiable statement into a block chain, so that when a processing request of the verifiable statement sent by a first user is received, corresponding processing is carried out based on the authorization record information in the block chain, and processing result information is sent to the first user; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for complaint about a login mode of the one-touch login of the first application.
According to the processing equipment for the user login related service provided by one or more embodiments of the specification, a verifiable statement is distributed to a target user according to an authorization request sent by a first application, and authorization record information generated based on the verifiable statement is stored in a block chain; the target user is proved to grant the right of one-key login to the first application based on the login information of one-key login to the first application based on the verifiable statement; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; and the blockchain system performs corresponding processing based on the authorization record information in the blockchain according to the processing request which can be verified and declared and is sent by the first user, so that the first user performs the verification and cancellation processing of the complaint event according to the processing result information. Therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience and the basis are provided for the complaint handling of the first user, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
It should be noted that, the embodiment of the processing device related to the user login related service in this specification and the embodiment of the processing method related to the user login related service in this specification are based on the same inventive concept, so that specific implementation of this embodiment may refer to implementation of the foregoing corresponding processing method related to the user login related service, and repeated details are not described again.
Further, corresponding to the login processing method described above, based on the same technical concept, one or more embodiments of the present specification further provide a storage medium for storing computer-executable instructions, in a specific embodiment, the storage medium may be a usb disk, an optical disk, a hard disk, and the like, and the computer-executable instructions stored in the storage medium, when being executed by the processor, can implement the following processes:
querying a verifiable statement assigned to a target user by a blockchain system in response to a one-touch login operation performed by the target user on a first application; the verifiable statement is used for proving that the target user grants the right of one-key login to the first application based on login information of one-key login to the first application;
if the verifiable statement is inquired, obtaining the login information according to the verifiable statement;
and executing corresponding processing of the target user for logging in the first application by one key according to the login information.
Optionally, the storage medium stores computer-executable instructions that, when executed by the processor, further comprise, prior to responding to a one-touch login operation performed by a target user on a first application:
obtaining authorization confirmation information of the target user; the authorization confirmation information represents that the target user confirms the authority granted to the first application for the one-key login;
based on the authorization confirmation information, sending an authorization request to the blockchain system according to the determined authorization information so that the blockchain system creates the verifiable statement according to the authorization information;
receiving authorization result information sent by the blockchain system, and storing the verifiable statement in the authorization result information to a specified storage area of the first application; or receiving first authorization success information sent by the blockchain system, wherein the first authorization success information represents that the verifiable statement is successfully created and is stored to a server corresponding to the first application; or receiving second authorization success information sent by a server corresponding to the first application, wherein the second authorization success information represents that the server has received and stored the verifiable statement.
Optionally, the storage medium stores computer-executable instructions that, when executed by the processor, obtain the authorization confirmation information of the target user, including:
responding to the registration operation of the target user, and acquiring the login information; or responding to the login operation of the target user, and if the verifiable statement is determined not to be inquired, acquiring the login information;
inquiring whether the target user grants the one-key login permission to the first application or not by showing inquiry information according to the acquired login information;
and obtaining authorization confirmation information generated by the confirmation authorization operation performed by the target user based on the display interface of the inquiry information.
Optionally, the storage medium stores computer-executable instructions that, when executed by the processor, further comprise, before sending an authorization request to the blockchain system according to the determined authorization information:
if the specified authorization program is determined to be in an uninitialized state, initializing the authorization program;
the sending an authorization request to the blockchain system according to the determined authorization information includes:
sending an authorization request to the blockchain system according to the determined authorization information through the authorization program;
the receiving authorization result information sent by the blockchain system includes:
and receiving authorization result information sent by the blockchain system through the authorization program.
One or more embodiments of the present specification provide a storage medium storing computer executable instructions that, when executed by a processor, assign a verifiable statement to a target user via a blockchain system to prove that the target user grants a first application a right to perform a one-touch login based on login information of the first application; so that the first application can perform corresponding processing of the target user to log in the first application by one key based on the verifiable statement. Therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience is provided for the complaint handling of a complaint accepting party, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
In another specific embodiment, the storage medium may be a usb disk, an optical disk, a hard disk, or the like, and the storage medium stores computer executable instructions that, when executed by the processor, implement the following process:
receiving an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application;
creating a verifiable statement through a blockchain system according to authorization information included in the authorization request; wherein the verifiable statement is used for proving that the target user grants the one-touch login authority to the first application;
and sending authorization result information to the first application according to the verifiable statement so that the first application executes corresponding processing of one-key login of the target user to the first application according to the verifiable statement based on one-key login operation of the target user.
Optionally, the storage medium stores computer-executable instructions that, when executed by the processor, receive an authorization request sent by a first application of a target user, including:
receiving an authorization request sent by a first application of the target user through an authorization program;
the sending authorization result information to the first application according to the verifiable statement comprises:
and sending authorization result information to the first application through the authorization program according to the verifiable statement.
Optionally, the storage medium stores computer-executable instructions, which when executed by the processor, further include, after creating a verifiable statement through the blockchain system according to authorization information included in the authorization request:
generating authorization record information according to the verifiable statement, and storing the authorization record information into a block chain
One or more embodiments of the present specification provide a storage medium storing computer-executable instructions that, when executed by a processor, create an authenticatable statement for a target user based on an authorization request sent by a first application of the target user to prove that the target user grants a right to perform one-touch login for login information of the first application based on the one-touch login to the first application; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience is provided for the complaint handling of a complaint accepting party, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the login processing method in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to implementation of the corresponding login processing method, and repeated details are not described again.
Further, corresponding to the above-described processing method for user login related services, based on the same technical concept, one or more embodiments of the present specification further provide a storage medium for storing computer executable instructions, where in a specific embodiment, the storage medium may be a usb disk, an optical disk, a hard disk, and the like, and when the computer executable instructions stored in the storage medium are executed by a processor, the following processes can be implemented:
obtaining authorization confirmation information of a target user; the authorization confirmation information represents that the target user confirms that the first application to be authorized grants the right of one-key login based on login information of one-key login of the first application;
based on the authorization confirmation information, sending an authorization request to a blockchain system according to the determined authorization information so that the blockchain system creates a verifiable statement and stores authorization record information generated based on the verifiable statement into a blockchain; when the blockchain system receives a processing request of a verifiable statement sent by a first user, corresponding processing is carried out based on authorization record information in the blockchain; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for requesting complaint on a login mode of the one-key login of the first application; the verifiable statement is used for proving that the target user authorizes the authority of the one-key login to the first application;
receiving authorization result information sent by the blockchain system, and responding to a one-key login operation executed by the target user on the first application, and executing corresponding processing of the target user for one-key login to the first application based on the verifiable statement.
Optionally, the storage medium stores computer-executable instructions that, when executed by the processor, further comprise, before sending an authorization request to the blockchain system according to the determined authorization information:
if the specified authorization program is determined to be in an uninitialized state, initializing the authorization program;
the sending an authorization request to the blockchain system according to the determined authorization information includes:
sending an authorization request to the blockchain system according to the determined authorization information through the authorization program;
the receiving authorization result information sent by the blockchain system includes:
and receiving authorization result information sent by the blockchain system through the authorization program.
When executed by a processor, computer-executable instructions stored in a storage medium provided in one or more embodiments of the present specification allocate a verifiable statement to a target user through a blockchain system when obtaining authorization confirmation information of the target user, and store authorization record information generated based on the verifiable statement into a blockchain; the target user is proved to grant the right of one-key login to the first application based on the login information of one-key login to the first application based on the verifiable statement; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; and the blockchain system can correspondingly process the processing request sent by the first user based on the authorization record information in the blockchain, so that the first user can perform the verification and cancellation processing of the complaint event according to the processing result information. Therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience and the basis are provided for the complaint handling of the first user, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
In another specific embodiment, the storage medium may be a usb disk, an optical disk, a hard disk, or the like, and the storage medium stores computer executable instructions that, when executed by the processor, implement the following process:
receiving an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application;
creating a verifiable statement through a blockchain system according to authorization information included in the authorization request; wherein the verifiable statement is used for proving that the target user grants the one-touch login authority to the first application;
sending authorization result information to the first application according to the verifiable statement so as to enable the first application to respond to the one-key login operation of the target user and execute the corresponding processing of the target user for one-key login of the first application based on the verifiable statement; and the number of the first and second groups,
storing authorization record information generated based on the verifiable statement into a block chain, so that when a processing request of the verifiable statement sent by a first user is received, corresponding processing is carried out based on the authorization record information in the block chain, and processing result information is sent to the first user; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for complaint about a login mode of the one-touch login of the first application.
One or more embodiments of the present specification provide a storage medium storing computer-executable instructions that, when executed by a processor, allocate a verifiable statement to a target user according to an authorization request sent by a first application, and store authorization record information generated based on the verifiable statement into a blockchain; the target user is proved to grant the right of one-key login to the first application based on the login information of one-key login to the first application based on the verifiable statement; the first application can perform corresponding processing of one-key login of the target user to the first application based on the verifiable statement; and the blockchain system performs corresponding processing based on the authorization record information in the blockchain according to the processing request which can be verified and declared and is sent by the first user, so that the first user performs the verification and cancellation processing of the complaint event according to the processing result information. Therefore, on the basis of ensuring the validity of authorization, the authenticity of verifiable statement, the convenience and the quickness of login, the authorization operation of the user has effective basis to be checked and verified, the convenience and the basis are provided for the complaint handling of the first user, and the adverse effect on the related party of the first application caused by the complaint of the target user is avoided.
It should be noted that the embodiment of the storage medium in this specification and the embodiment of the method for processing the user login related service in this specification are based on the same inventive concept, and therefore, for specific implementation of this embodiment, reference may be made to the implementation of the foregoing corresponding method for processing the user login related service, and repeated details are not described again.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
In the 80's of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually manufacturing an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as ABEL (Advanced Boolean Expression Language), AHDL (alternate Hardware Description Language), traffic, CUPL (core universal Programming Language), HDCal, jhddl (Java Hardware Description Language), Lava, Lola, HDL, PALASM, rhyd (Hardware Description Language), and vhigh-Language (Hardware Description Language), which is currently used in most popular applications. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functions of the units may be implemented in the same software and/or hardware or in multiple software and/or hardware when implementing the embodiments of the present description.
One skilled in the art will recognize that one or more embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, one or more embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The description has been presented with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the description. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
One or more embodiments of the present description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. One or more embodiments of the specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of this document and is not intended to limit this document. Various modifications and changes may occur to those skilled in the art from this document. Any modifications, equivalents, improvements, etc. which come within the spirit and principle of the disclosure are intended to be included within the scope of the claims of this document.

Claims (38)

1. A login processing method comprises the following steps:
querying a verifiable statement assigned to a target user by a blockchain system in response to a one-touch login operation performed by the target user on a first application; the verifiable statement is used for proving that the target user grants the right of one-key login to the first application based on login information of one-key login to the first application;
if the verifiable statement is inquired, obtaining the login information according to the verifiable statement;
and executing corresponding processing of the target user for logging in the first application by one key according to the login information.
2. The method of claim 1, the querying verifiable claims that the blockchain system assigns to the target user, comprising:
inquiring whether a verifiable statement distributed to the target user by the blockchain system is stored in a designated storage area of the first application;
the obtaining the login information according to the verifiable statement comprises:
acquiring the login information saved in association with the verifiable statement from the storage area according to the verifiable statement; or desensitization data of the login information is obtained from the verifiable statement, and the login information related to the desensitization data is obtained based on the association relationship between the saved desensitization data and the login information.
3. The method of claim 1, the querying verifiable claims that the blockchain system assigns to the target user, comprising:
sending a query request to a server corresponding to the first application, and determining whether the verifiable statement is queried according to query result information sent by the server;
the obtaining the login information according to the verifiable statement comprises:
acquiring the login information from the query result information; and the login information is obtained by the server side according to the inquired verifiable statement.
4. The method of claim 1, the responding to the target user performing the one-touch login operation on the first application is preceded by:
obtaining authorization confirmation information of the target user; the authorization confirmation information represents that the target user confirms the authority granted to the first application for the one-key login;
based on the authorization confirmation information, sending an authorization request to the blockchain system according to the determined authorization information so that the blockchain system creates the verifiable statement according to the authorization information;
receiving authorization result information sent by the blockchain system, and storing the verifiable statement in the authorization result information to a specified storage area of the first application; or receiving first authorization success information sent by the blockchain system, wherein the first authorization success information represents that the verifiable statement is successfully created and is stored to a server corresponding to the first application; or receiving second authorization success information sent by a server corresponding to the first application, where the second authorization success information represents and stores the verifiable statement sent by the blockchain system and received by the server.
5. The method of claim 4, wherein the obtaining authorization confirmation information of the target user comprises:
responding to the registration operation of the target user, and acquiring the login information; or responding to the login operation of the target user, and if the verifiable statement is determined not to be inquired, acquiring the login information;
inquiring whether the target user grants the one-key login permission to the first application or not by showing inquiry information according to the acquired login information;
and obtaining authorization confirmation information generated by the confirmation authorization operation performed by the target user based on the display interface of the inquiry information.
6. The method of claim 4, before sending an authorization request to the blockchain system according to the determined authorization information, further comprising:
if the specified authorization program is determined to be in an uninitialized state, initializing the authorization program;
the sending an authorization request to the blockchain system according to the determined authorization information includes:
sending an authorization request to the blockchain system according to the determined authorization information through the authorization program;
the receiving authorization result information sent by the blockchain system includes:
and receiving authorization result information sent by the blockchain system through the authorization program.
7. The method of claim 6, the sending an authorization request to the blockchain system according to the determined authorization information, comprising:
determining the acquired first digital identity information of the target user, the second digital identity information of the first application, desensitization data of the login information and authority information of the authority to be authorized as authorization information;
and sending an authorization request to the blockchain system according to the authorization information.
8. The method of claim 7, before sending an authorization request to the blockchain system according to the determined authorization information by the authorization procedure, further comprising:
if the target user and/or the first application do not apply for the digital identity information through the authorization program, sending a digital identity information application request to a blockchain system according to the determined user information of the target user and/or the determined application information of the first application, so that the blockchain system generates the first digital identity information of the target user and/or the second digital identity information of the first application;
and receiving the first digital identity information and/or the second digital identity information sent by the blockchain system through the authorization program.
9. The method of claim 7, before sending an authorization request to the blockchain system according to the determined authorization information by the authorization procedure, further comprising:
sending a desensitization processing request to the blockchain system through the authorization program according to the login information so that the blockchain system performs desensitization processing on the login information to obtain desensitization data;
and receiving the desensitization data sent by the blockchain system through the authorization procedure.
10. A login processing method comprises the following steps:
receiving an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application;
creating a verifiable statement through a blockchain system according to authorization information included in the authorization request; wherein the verifiable statement is used for proving that the target user grants the one-touch login authority to the first application;
and sending authorization result information to the first application according to the verifiable statement so that the first application executes corresponding processing of one-key login of the target user to the first application according to the verifiable statement based on one-key login operation of the target user.
11. The method of claim 10, the creating a verifiable claim based on authorization information included with the authorization request, comprising:
and if the authorization information included in the authorization request is determined to meet the creation condition of a preset verifiable statement, generating the verifiable statement according to the authorization information.
12. The method of claim 11, the authorization information comprising: first digital identity information of the target user;
the determining that the authorization information included in the authorization request meets the creation condition of a preset verifiable statement includes:
acquiring first signature data and a first public key corresponding to the first digital identity information; the first signature data is signature data obtained by performing signature processing on first specified data based on a first private key corresponding to the first digital identity information;
verifying the first signature data according to the first public key;
and if the verification is passed, determining that the authorization information meets the creation condition of a preset verifiable statement.
13. The method of claim 12, the authorization information further comprising: second digital identity information of the first application, desensitization data of the login information, and authority information of the authority to be granted;
the creating of the verifiable statement through the blockchain system according to the authorization information included in the authorization request comprises:
determining, by a blockchain system, claim identification information for the verifiable claim;
signing the second designated data according to a second private key corresponding to third digital identity information of the block chain system to obtain second signature data;
and creating a verifiable claim according to the claim identification information, the second signature data, the first digital identity information, the second digital identity information, the desensitization data, and the authority information.
14. The method of claim 13, the receiving an authorization request sent by a first application of a target user, comprising:
receiving an authorization request sent by a first application of the target user through an authorization program;
the sending authorization result information to the first application according to the verifiable statement comprises:
and sending authorization result information to the first application through the authorization program according to the verifiable statement.
15. The method of claim 14, prior to receiving the authorization request sent by the first application, further comprising:
receiving a digital identity information application request sent by the first application through the authorization program; the digital identity information application request is used for applying for digital identity information for the target user and/or the first application;
generating the first digital identity information and/or the second digital identity information according to the digital identity information application request;
and sending the generated first digital identity information and/or the second digital identity information to the first application through the authorization program.
16. The method of claim 14, prior to receiving the authorization request sent by the first application of the target user, further comprising:
receiving a desensitization processing request sent by the first application through the authorization program; wherein the desensitization processing request comprises the login information to be desensitized;
desensitization processing is carried out on the login information according to a preset desensitization mode to obtain desensitization data, and the desensitization data are sent to the first application through the authorization program.
17. The method of claim 10, after creating the verifiable statement through the blockchain system according to the authorization information included in the authorization request, further comprising:
and generating authorization record information according to the verifiable statement, and storing the authorization record information into a block chain.
18. The method of claim 17, the authorization information comprising: first digital identity information of the target user, second digital identity information of the first application, desensitization data of the login information;
the authorization record information generated according to the verifiable statement comprises:
and recording the first digital identity information, the second digital identity information, the desensitization data and the determined statement identification information of the verifiable statement in a correlation manner, and determining the recorded information as the authorization record information.
19. The method of claim 18, after saving the authorization record information into a blockchain, further comprising:
receiving a query request sent by a first user; wherein the query request includes the first digital identity information, the second digital identity information, and the login information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for requesting complaint on a login mode of the one-key login of the first application;
if the associated authorization record information is inquired from the block chain according to the first digital identity information and the second digital identity information which are included in the inquiry request, presetting desensitization data in the inquired authorization record information to obtain corresponding login information;
and if the obtained login information is matched with the login information included in the query request, sending query result information representing successful query to the first user so that the first user can carry out cancel-verification processing on the complaint event corresponding to the complaint request.
20. The method of claim 17, the authorization record information generated from the verifiable claim comprising:
performing hash processing on the verifiable statement according to a preset algorithm to obtain a hash value;
and associating the hash value with the determined declaration identification information of the verifiable declaration to record, and determining the recorded information as the authorization record information.
21. The method of claim 20, after saving the authorization record information into a block chain, further comprising:
receiving a verification request sent by a first user; the verification request comprises the verifiable statement to be verified, which is acquired from the first application or a server side corresponding to the first application; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for complaint about a login mode of the one-key login of the first application;
performing hash processing on the verifiable statement to be verified according to the preset algorithm to obtain a hash value to be verified;
if it is determined that the associated authorization record information is inquired from the block chain according to the statement identification information in the verifiable statement to be verified and the inquired hash value in the authorization record information is matched with the hash value to be verified, sending verification result information representing that the verification is passed to the first user so that the first user can perform cancel verification processing on the complaint event corresponding to the complaint request.
22. A processing method for user login related service comprises the following steps:
obtaining authorization confirmation information of a target user; the authorization confirmation information represents that the target user confirms that the first application to be authorized grants the right of one-key login based on login information of one-key login of the first application;
based on the authorization confirmation information, sending an authorization request to a blockchain system according to the determined authorization information so that the blockchain system creates a verifiable statement and stores authorization record information generated based on the verifiable statement into a blockchain; when the blockchain system receives a processing request of a verifiable statement sent by a first user, corresponding processing is carried out based on authorization record information in the blockchain; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for requesting complaint on a login mode of the one-key login of the first application; the verifiable statement is used for proving that the target user authorizes the authority of the one-key login to the first application;
receiving authorization result information sent by the blockchain system, and responding to a one-key login operation executed by the target user on the first application, and executing corresponding processing of the target user for one-key login to the first application based on the verifiable statement.
23. The method of claim 22, prior to sending an authorization request to the blockchain system based on the determined authorization information, further comprising:
if the specified authorization program is determined to be in an uninitialized state, initializing the authorization program;
the sending an authorization request to the blockchain system according to the determined authorization information includes:
sending an authorization request to the blockchain system according to the determined authorization information through the authorization program;
the receiving authorization result information sent by the blockchain system includes:
and receiving authorization result information sent by the blockchain system through the authorization program.
24. A processing method for user login related service comprises the following steps:
receiving an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application;
creating a verifiable statement through a blockchain system according to authorization information included in the authorization request; wherein the verifiable statement is used for proving that the target user grants the one-touch login authority to the first application;
sending authorization result information to the first application according to the verifiable statement so as to enable the first application to respond to the one-key login operation of the target user and execute the corresponding processing of the target user for one-key login of the first application based on the verifiable statement; and the number of the first and second groups,
storing authorization record information generated based on the verifiable statement into a block chain, so that when a processing request of the verifiable statement sent by a first user is received, corresponding processing is carried out based on the authorization record information in the block chain, and processing result information is sent to the first user; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for complaint about a login mode of the one-touch login of the first application.
25. A login processing apparatus comprising:
the query module is used for responding to a one-key login operation executed by a target user on a first application and querying a verifiable statement distributed to the target user by a block chain system; the verifiable statement is used for proving that the target user grants the right of one-key login to the first application based on login information of one-key login to the first application;
the first acquisition module is used for acquiring the login information according to the verifiable statement if the verifiable statement is inquired by the inquiry module;
and the processing module executes corresponding processing of one-key login of the first application by the target user according to the login information.
26. A login processing apparatus comprising:
the receiving module is used for receiving an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application;
the creation module creates a verifiable statement through a blockchain system according to the authorization information included in the authorization request; wherein the verifiable statement is used for proving that the target user grants the one-touch login authority to the first application;
and the sending module is used for sending authorization result information to the first application according to the verifiable statement so that the first application executes corresponding processing of logging in the first application by one key of the target user according to the verifiable statement based on the one-key logging operation of the target user.
27. A processing device for user login related service comprises:
the acquisition module acquires authorization confirmation information of a target user; the authorization confirmation information represents that the target user confirms that the first application to be authorized grants the right of one-key login based on login information of one-key login of the first application;
the sending module is used for sending an authorization request to the blockchain system according to the determined authorization information based on the authorization confirmation information so that the blockchain system can create a verifiable statement and store authorization record information generated based on the verifiable statement into a blockchain; when the blockchain system receives a processing request of a verifiable statement sent by a first user, corresponding processing is carried out based on authorization record information in the blockchain; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for requesting complaint on a login mode of the one-key login of the first application; the verifiable statement is used for proving that the target user authorizes the authority of the one-key login to the first application;
the receiving module is used for receiving the authorization result information sent by the block chain system;
and the login module responds to the one-key login operation executed by the target user on the first application and executes corresponding processing of the target user for one-key login on the first application based on the verifiable statement.
28. A processing device for user login related service comprises:
the receiving module is used for receiving an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application;
the creation module creates a verifiable statement through a blockchain system according to the authorization information included in the authorization request; wherein the verifiable statement is used for proving that the target user grants the one-touch login authority to the first application;
the sending module is used for sending authorization result information to the first application according to the verifiable statement so that the first application responds to the one-key login operation of the target user and executes corresponding processing of the target user for one-key login of the first application based on the verifiable statement; and the number of the first and second groups,
the storage module is used for storing authorization record information generated based on the verifiable statement into a block chain so as to perform corresponding processing based on the authorization record information in the block chain and send processing result information to a first user when a processing request of the verifiable statement sent by the first user is received; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for complaint about a login mode of the one-touch login of the first application.
29. A login processing system comprising: a blockchain system and a first application;
the block chain system receives an authorization request sent by a first application of a target user, and creates a verifiable statement according to authorization information included in the authorization request; sending authorization result information to the first application according to the verifiable statement; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application; the verifiable statement is used for proving that the target user grants the one-key login authority to the first application;
the first application queries the verifiable statement allocated to the target user by the blockchain system in response to a one-key login operation performed by the target user on the first application; if the verifiable statement is inquired, obtaining the login information according to the verifiable statement; and executing corresponding processing of the target user for logging in the first application by one key according to the login information.
30. The system of claim 29, further comprising: a second terminal device of the first user;
the second terminal equipment receives the complaint request sent by the first user, and sends a processing request capable of verifying a statement to the blockchain system according to the complaint request; performing cancel verification processing on a complaint event corresponding to the complaint request based on processing result information sent by the blockchain system; the complaint request is used for requesting complaint on a login mode of the one-key login of the first application;
the blockchain system also stores authorization record information generated based on the verifiable statement into a blockchain after the verifiable statement is created according to the authorization information included in the authorization request; and when the processing request sent by the second terminal equipment is received, performing corresponding processing based on the authorization record information in the block chain and sending the processing result information to the second terminal equipment.
31. A login processing device comprising:
a processor; and the number of the first and second groups,
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
querying a verifiable statement assigned to a target user by a blockchain system in response to a one-touch login operation performed by the target user on a first application; the verifiable statement is used for proving that the target user grants the right of one-key login to the first application based on login information of one-key login to the first application;
if the verifiable statement is inquired, obtaining the login information according to the verifiable statement;
and executing corresponding processing of the target user for logging in the first application by one key according to the login information.
32. A login processing device comprising:
a processor; and the number of the first and second groups,
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application;
creating a verifiable statement through a blockchain system according to authorization information included in the authorization request; wherein the verifiable statement is used for proving that the target user grants the one-touch login authority to the first application;
and sending authorization result information to the first application according to the verifiable statement so that the first application executes corresponding processing of one-key login of the target user to the first application according to the verifiable statement based on one-key login operation of the target user.
33. A processing device for user login related service comprises:
a processor; and the number of the first and second groups,
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
obtaining authorization confirmation information of a target user; the authorization confirmation information represents that the target user confirms that the first application to be authorized grants the right of one-key login based on login information of one-key login of the first application;
based on the authorization confirmation information, sending an authorization request to a blockchain system according to the determined authorization information so that the blockchain system creates a verifiable statement and stores authorization record information generated based on the verifiable statement into a blockchain; when the blockchain system receives a processing request of a verifiable statement sent by a first user, corresponding processing is carried out based on authorization record information in the blockchain; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for requesting complaint on a login mode of the one-key login of the first application; the verifiable statement is used for proving that the target user authorizes the authority of the one-key login to the first application;
receiving authorization result information sent by the blockchain system, and responding to a one-key login operation executed by the target user on the first application, and executing corresponding processing of the target user for one-key login to the first application based on the verifiable statement.
34. A processing device for user login related service comprises:
a processor; and the number of the first and second groups,
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application;
creating a verifiable statement through a blockchain system according to authorization information included in the authorization request; wherein the verifiable statement is used for proving that the target user grants the one-touch login authority to the first application;
sending authorization result information to the first application according to the verifiable statement so as to enable the first application to respond to the one-key login operation of the target user and execute the corresponding processing of the target user for one-key login of the first application based on the verifiable statement; and the number of the first and second groups,
storing authorization record information generated based on the verifiable statement into a block chain, so that when a processing request of the verifiable statement sent by a first user is received, corresponding processing is carried out based on the authorization record information in the block chain, and processing result information is sent to the first user; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for complaint about a login mode of the one-touch login of the first application.
35. A storage medium storing computer-executable instructions that when executed by a processor implement the following:
querying a verifiable statement assigned to a target user by a blockchain system in response to a one-touch login operation performed by the target user on a first application; the verifiable statement is used for proving that the target user grants the right of one-key login to the first application based on login information of one-key login to the first application;
if the verifiable statement is inquired, obtaining the login information according to the verifiable statement;
and executing corresponding processing of the target user for logging in the first application by one key according to the login information.
36. A storage medium storing computer-executable instructions that when executed by a processor implement the following:
receiving an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application;
creating a verifiable statement through a blockchain system according to authorization information included in the authorization request; wherein the verifiable statement is used for proving that the target user grants the one-touch login authority to the first application;
and sending authorization result information to the first application according to the verifiable statement so that the first application executes corresponding processing of one-key login of the target user to the first application according to the verifiable statement based on one-key login operation of the target user.
37. A storage medium storing computer-executable instructions that when executed by a processor implement the following:
obtaining authorization confirmation information of a target user; the authorization confirmation information represents that the target user confirms that the first application to be authorized grants the right of one-key login based on login information of one-key login of the first application;
based on the authorization confirmation information, sending an authorization request to a blockchain system according to the determined authorization information so that the blockchain system creates a verifiable statement and stores authorization record information generated based on the verifiable statement into a blockchain; when the blockchain system receives a processing request of a verifiable statement sent by a first user, corresponding processing is carried out based on authorization record information in the blockchain; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for requesting complaint on a login mode of the one-key login of the first application; the verifiable statement is used for proving that the target user authorizes the authority of the one-key login to the first application;
receiving authorization result information sent by the blockchain system, and responding to a one-key login operation executed by the target user on the first application, and executing corresponding processing of the target user for one-key login to the first application based on the verifiable statement.
38. A storage medium storing computer-executable instructions that when executed by a processor implement the following:
receiving an authorization request sent by a first application of a target user; the authorization request is used for requesting the first application to be authorized to grant the right of one-key login based on login information of one-key login of the first application;
creating a verifiable statement through a blockchain system according to authorization information included in the authorization request; wherein the verifiable statement is used for proving that the target user grants the one-touch login authority to the first application;
sending authorization result information to the first application according to the verifiable statement so as to enable the first application to respond to the one-key login operation of the target user and execute the corresponding processing of the target user for one-key login of the first application based on the verifiable statement; and the number of the first and second groups,
storing authorization record information generated based on the verifiable statement into a block chain, so that when a processing request of the verifiable statement sent by a first user is received, corresponding processing is carried out based on the authorization record information in the block chain, and processing result information is sent to the first user; so that the first user can carry out the verification and cancellation processing of the complaint event based on the processing result information; the first user is a user receiving a complaint request sent by the target user; the complaint request is used for complaint about a login mode of the one-touch login of the first application.
CN202011313343.5A 2020-11-20 2020-11-20 Processing method, device and equipment for login and user login related services Active CN112100610B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011313343.5A CN112100610B (en) 2020-11-20 2020-11-20 Processing method, device and equipment for login and user login related services
CN202110688520.6A CN113420284B (en) 2020-11-20 2020-11-20 Login and user login related service processing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011313343.5A CN112100610B (en) 2020-11-20 2020-11-20 Processing method, device and equipment for login and user login related services

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202110688520.6A Division CN113420284B (en) 2020-11-20 2020-11-20 Login and user login related service processing method, device and equipment

Publications (2)

Publication Number Publication Date
CN112100610A true CN112100610A (en) 2020-12-18
CN112100610B CN112100610B (en) 2021-05-04

Family

ID=73785555

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202110688520.6A Active CN113420284B (en) 2020-11-20 2020-11-20 Login and user login related service processing method, device and equipment
CN202011313343.5A Active CN112100610B (en) 2020-11-20 2020-11-20 Processing method, device and equipment for login and user login related services

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202110688520.6A Active CN113420284B (en) 2020-11-20 2020-11-20 Login and user login related service processing method, device and equipment

Country Status (1)

Country Link
CN (2) CN113420284B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112738253A (en) * 2020-12-30 2021-04-30 北京百度网讯科技有限公司 Data processing method, device and equipment based on block chain and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109936569A (en) * 2019-02-21 2019-06-25 领信智链(北京)科技有限公司 A kind of decentralization digital identity login management system based on ether mill block chain
CN110069908A (en) * 2019-04-11 2019-07-30 深圳前海微众银行股份有限公司 A kind of authority control method and device of block chain
CN110597924A (en) * 2019-09-29 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based user identification processing method, device, equipment and storage medium
CN110619526A (en) * 2019-09-19 2019-12-27 阿里巴巴集团控股有限公司 Business service providing method, device, equipment and system based on block chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881170A (en) * 2018-05-21 2018-11-23 阿里巴巴集团控股有限公司 A kind of data processing method, device, processing equipment and the system of authorization guidance
CN111431936B (en) * 2020-04-17 2021-09-21 支付宝(杭州)信息技术有限公司 Authorization processing method, device, equipment, system and storage medium based on verifiable statement

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109936569A (en) * 2019-02-21 2019-06-25 领信智链(北京)科技有限公司 A kind of decentralization digital identity login management system based on ether mill block chain
CN110069908A (en) * 2019-04-11 2019-07-30 深圳前海微众银行股份有限公司 A kind of authority control method and device of block chain
CN110619526A (en) * 2019-09-19 2019-12-27 阿里巴巴集团控股有限公司 Business service providing method, device, equipment and system based on block chain
CN110597924A (en) * 2019-09-29 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based user identification processing method, device, equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112738253A (en) * 2020-12-30 2021-04-30 北京百度网讯科技有限公司 Data processing method, device and equipment based on block chain and storage medium

Also Published As

Publication number Publication date
CN112100610B (en) 2021-05-04
CN113420284A (en) 2021-09-21
CN113420284B (en) 2024-05-17

Similar Documents

Publication Publication Date Title
US11323260B2 (en) Method and device for identity verification
CN111680274B (en) Resource access method, device and equipment
CN111431936B (en) Authorization processing method, device, equipment, system and storage medium based on verifiable statement
CN110768968B (en) Authorization method, device, equipment and system based on verifiable statement
CN108055132B (en) Method, device and equipment for service authorization
KR100863204B1 (en) Methods and apparatus for providing application credentials
CN112053161B (en) Binding processing method, device and equipment
CN110795501A (en) Method, device, equipment and system for creating verifiable statement based on block chain
CN110222531B (en) Method, system and equipment for accessing database
CN111931154B (en) Service processing method, device and equipment based on digital certificate
CN109831435B (en) Database operation method, system, proxy server and storage medium
CN112434348B (en) Data verification processing method, device and equipment
CN113704826A (en) Privacy protection-based business risk detection method, device and equipment
CN111753270B (en) Application program login verification method, device, equipment and storage medium
CN111327675B (en) Session establishment method, cross-border payment method, device and system
CN113221142A (en) Authorization service processing method, device, equipment and system
CN112100610B (en) Processing method, device and equipment for login and user login related services
CN111600882A (en) Block chain-based account password management method and device and electronic equipment
CN112131545B (en) Method, device and equipment for processing voice authorization and voice related service
CN113065120B (en) Interface calling authentication method and device, electronic equipment and readable storage medium
CN115834074A (en) Identity authentication method, device and equipment
CN113497805A (en) Registration processing method, device, equipment and system
CN113158151B (en) Identity authentication processing method and device
CN115766115A (en) Identity authentication method and device, storage medium and electronic equipment
CN116455657A (en) Service providing method, device, equipment and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40042992

Country of ref document: HK