CN102638473A - User data authorization method, device and system - Google Patents

User data authorization method, device and system Download PDF

Info

Publication number
CN102638473A
CN102638473A CN201210137848XA CN201210137848A CN102638473A CN 102638473 A CN102638473 A CN 102638473A CN 201210137848X A CN201210137848X A CN 201210137848XA CN 201210137848 A CN201210137848 A CN 201210137848A CN 102638473 A CN102638473 A CN 102638473A
Authority
CN
China
Prior art keywords
account
sub
server
authorization
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210137848XA
Other languages
Chinese (zh)
Other versions
CN102638473B (en
Inventor
胡溢洋
杜江杰
王奎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENGQU INFORMATION TECHNOLOGY (SHANGHAI) Co Ltd
Original Assignee
SHENGQU INFORMATION TECHNOLOGY (SHANGHAI) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENGQU INFORMATION TECHNOLOGY (SHANGHAI) Co Ltd filed Critical SHENGQU INFORMATION TECHNOLOGY (SHANGHAI) Co Ltd
Priority to CN201210137848.XA priority Critical patent/CN102638473B/en
Publication of CN102638473A publication Critical patent/CN102638473A/en
Application granted granted Critical
Publication of CN102638473B publication Critical patent/CN102638473B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a user data authorization method, a user data authorization device and a user data authorization system. The method comprises the steps that an authorization server receives an authorization request transmitted by a third-party application server, wherein the authorization request comprises a server identifier and a server address; an identity authentication request is transmitted to an authentication gateway to authenticate the identity of a client user by the authentication gateway; an identity authentication response which is fed back by the authentication gateway is received, wherein the identity authentication response comprises an user identifier of the authenticated user; user sub-accounts which are matched with the user identifier are searched from the authorization server and are transmitted to a client for the client user to select an authorized sub-account; the authorized sub-account which is fed back by the client is received, and a corresponding relationship among the server identifier, the user identifier and the authorized sub-account is built and saved; and the user identifier, the authorized sub-account and an access token are transmitted to the third-party application server by using the server address. The third-party partial use authorization by the user is realized, the network service quality is improved and the service experience of the user is improved.

Description

A kind of user data authorization method, Apparatus and system
Technical field
The present invention relates to the web services technologies field, relate in particular to a kind of user data authorization method, Apparatus and system.
Background technology
Current, the network service comprehensively has been applied in people's the routine work and life.When using the network service, the user data that the Internet Service Provider preserves according to its inside is for the user provides corresponding service.
With the online game is example; When this network service of user's enjoy network recreation; The user data that relates to possibly comprise: a plurality of game roles that user basic information (for example address name, age of user, ownership place etc.), user gradation, this user create, the distinctive information of each game role (for example the game article of role's grade, configuration, and other user roles between relation) etc.; Internet Service Provider's game server just can be according to the above-mentioned user data of its inside preservation, for the user provides game services.
Along with the continuous development of information technology, for the maximum value of excavating the data of Internet Service Provider's preservation, each macroreticular service provider releases open platform one after another, and the data opening of itself storing is gone out, and confession third party developer uses.Yet; Because include the higher user data of security requirement in the data that the Internet Service Provider opens away, therefore, when the third party need visit this part user data; To obtain user's use authority on the one hand; Also to have only and satisfy this two aspects requirement simultaneously the user data that third party's ability access network services provider preserves on the other hand through Internet Service Provider's authentication.
To obtain this requirement of use authority of user for the third party; Be that unit accomplishes with user by the authorization method of extensive employing at present; That is to say; User or the third party carried out use authority, or the third party is not carried out use authority, can not realize that the user is to third-party part use authority.Yet, generally speaking, tend to include a plurality of sub-numbers of the account under user's the number of the account, if only wanting the parton number of the account corresponding user data that it is had, the user carries out use authority to the third party, existing technical scheme just can't satisfy this demand.
It still is example with the online game; A plurality of game roles in the user data just are equivalent to a plurality of sub-number of the account under the user account; If the user only wants to the mandate of third party's application server one of them or several game role, when the scheme that adopts prior art is carried out use authority, as long as the user carries out use authority to third party's application server; What third party's application server obtained so is exactly the use authority of all game roles of user's establishment; This authorization obvious and user is contrary, can not satisfy user's demand, has reduced the service experience of user to online game.
Summary of the invention
Technical problem to be solved by this invention is a kind of user data authorization method, Apparatus and system to be provided, to realize the purpose of user to the part use authority of third party's application server.
For solving the problems of the technologies described above, the embodiment of the invention provides a kind of user data authorization method, comprising:
Authorization server receives the authorization requests that third party's application server sends, and said authorization requests comprises server identification and server address;
Send ID authentication request to authentication gateway, so that said authentication gateway carries out authentication to the client user;
Receive the authentication response that said authentication gateway returns, said authentication response comprises the ID of authentication through the user;
In authorization server, search the sub-number of the account of the user who is complementary with said ID, and be sent to client, supply the client user to select to authorize sub-number of the account;
Receive the sub-number of the account of mandate that client is returned, set up and preserve the corresponding relation between the sub-number of the account of said server identification, ID and mandate;
Utilize said server address that the access token of said ID, the sub-number of the account of said mandate and expression access rights is sent to said third party's application server.
Preferably, said authentication gateway carries out authentication to the client user, specifically comprises:
Obtain client user's logging status, if, judge that then the user passes through the user for authentication for successfully login; If not successfully login then points out the user to carry out the username and password checking, and after the username and password checking is passed through, judges that the user passes through the user for authentication;
Convert the user name of said authentication through the user into ID, and said ID added in the authentication response be sent to authorization server.
Preferably, said method also comprises: after the sub-number of the account of mandate that said reception client is returned,
The user data that the sub-number of the account of said mandate is comprised is sent to client, supplies the client user to select the authorized user data; Then,
Said foundation is also preserved said corresponding relation and is specifically comprised: after receiving the authorized user data that said client returns, set up and preserve the corresponding relation between said server identification, ID, the sub-number of the account of mandate and authorized user data;
Saidly utilize said server address to be specially: ID, to authorize sub-number of the account, authorized user data and access token to the information that said third party's application server sends.
Preferably, said method also comprises: before said foundation and preserving the corresponding relation between said server identification, ID, the sub-number of the account of mandate and authorized user data,
Judge whether the sub-number of the account of said mandate is contained in the sub-number of the account of said user, and judge whether said authorized user data are contained in said user data, if judged result is are, then continue to carry out the step of setting up and preserving said corresponding relation.
Preferably, said utilize said server address with said ID, authorize sub-number of the account and access token to be sent to said third party's application server, specifically comprise:
Generate authorization code, and utilize said server address that said ID, the sub-number of the account of mandate and authorization code are sent to said third party's application server;
Receive server identification and authorization code that said third party's application server sends; If said server identification conforms to server identification in the said authorization requests; And said authorization code conforms to the authorization code of said generation, then said access token is sent to said third party's application server.
Preferably, said method also comprises:
Receive the access request of said third party's application server transmission of open platform gateway forwards; Said access request comprises server identification, access token, ID, four information of sub-number of the account, and the digital signature of said four information and the endorsement method that generates said digital signature employing;
Said access request is carried out the legitimacy authentication, if authentication is passed through all customer data that then allows the sub-number of the account in the said access request of said third party's application server access to comprise;
Wherein, said legitimacy authentication comprises:
Utilize said endorsement method that said four information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
Judge whether server identification, ID and sub-number of the account in the said access request satisfies the corresponding relation between the sub-number of the account of said authorization server, ID and mandate that said authorization server preserves; If satisfy, judge that then authorization server, ID and the sub-number of the account in the said access request is legal;
Judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
Preferably, said method also comprises:
Said access request also comprises user data, then,
Digital signature in the said access request is specially the digital signature of utilizing server identification, access token, ID, sub-number of the account and five information of user data to generate;
Said legitimacy authentication specifically comprises:
Utilize said endorsement method that said five information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
Judge whether server identification, ID, sub-number of the account and user data in the said access request satisfy the sub-number of the account of said authorization server, ID, mandate of said authorization server preservation and the corresponding relation between the authorized user data; If satisfy, judge that then authorization server, ID, sub-number of the account and the user data in the said access request is legal;
Judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
Preferably, said method also comprises:
Said access request also comprises the current time stamp; Then,
Said legitimacy authentication also comprises:
Judge that whether said current time stab in preset time of delay section, if judge that then said current time stamp is legal.
The embodiment of the invention also provides a kind of user data authorization device, comprising:
The authorization requests receiving element is used to receive the authorization requests that third party's application server sends, and said authorization requests comprises server identification and server address;
The authentication request transmitting element is used for sending ID authentication request to authentication gateway, so that said authentication gateway carries out authentication to the client user;
The authentication response receiving element is used to receive the authentication response that said authentication gateway returns, and said authentication response comprises the ID of authentication through the user;
Search the unit, be used in authorization server, searching the sub-number of the account of the user who is complementary with said ID, and be sent to client, supply the client user to select to authorize sub-number of the account;
Corresponding relation is set up the unit, is used to receive the sub-number of the account of mandate that client is returned, and sets up and preserve the corresponding relation between the sub-number of the account of said server identification, ID and mandate;
The authorization message transmitting element is used to utilize said server address that the access token of said ID, the sub-number of the account of said mandate and expression access rights is sent to said third party's application server.
Preferably, said device also comprises:
The user data transmitting element is used for the user data that the sub-number of the account of said mandate comprises is sent to client, supplies the client user to select the authorized user data;
Said corresponding relation is set up the unit, is used for after receiving the authorized user data that said client returns, setting up and preserve the corresponding relation between said server identification, ID, the sub-number of the account of mandate and authorized user data;
Said authorization message transmitting element, be used to utilize said server address with said ID, authorize sub-number of the account, authorized user data and access token to be sent to said third party's application server.
Preferably, said device also comprises:
Judging unit; Be used to judge whether the sub-number of the account of said mandate is contained in the sub-number of the account of said user; And judge whether said authorized user data are contained in said user data, if judged result is are, then notify said corresponding relation to set up the unit and set up and preserve said corresponding relation.
Preferably, said authorization message transmitting element specifically comprises:
The authorization code generation unit is used to generate authorization code;
Communication unit is used to utilize said server address that said ID, the sub-number of the account of mandate and authorization code are sent to said third party's application server; And receive server identification and the authorization code that said third party's application server sends;
Comparing unit; Whether be used for comparing said server identification conforms to the server identification of said authorization requests; And whether said authorization code conforms to the authorization code of said generation, if all conform to, then said access token is sent to said third party's application server.
Preferably, said device also comprises:
The access request receiving element; Be used to receive the access request that said third party's application server of open platform gateway forwards sends; Said access request comprises server identification, access token, ID, four information of sub-number of the account, and the digital signature of said four information and the endorsement method that generates said digital signature employing;
Authenticating unit is used for said access request is carried out the legitimacy authentication, if authentication is passed through all customer data that then allows the sub-number of the account in the said access request of said third party's application server access to comprise;
Wherein, said legitimacy authentication comprises:
Utilize said endorsement method that said four information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
Judge whether server identification, ID and sub-number of the account in the said access request satisfies the corresponding relation between the sub-number of the account of said authorization server, ID and mandate that said authorization server preserves; If satisfy, judge that then authorization server, ID and the sub-number of the account in the said access request is legal;
Judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
The embodiment of the invention also provides a kind of user data authoring system, and said system comprises: authorization server, third party's application server, authentication gateway, client,
Said authorization server; Be used to receive the authorization requests that said third party's application server sends; And to authentication gateway transmission ID authentication request, so that said authentication gateway carries out authentication to the client user, said authorization requests comprises server identification and server address;
Said authentication gateway is used for the client user is carried out authentication, and sends to said authorization server and to comprise that authentication passes through the authentication response of user's ID;
Said authorization server also is used to receive said authentication response, and searches the sub-number of the account of the user who is complementary with said ID, and is sent to client;
Said client is used to receive the sub-number of the account of said user, and therefrom selects to authorize sub-number of the account to be sent to said authorization server;
Said authorization server also is used to receive the sub-number of the account of mandate that client is returned, and sets up and preserve the corresponding relation between the sub-number of the account of said server identification, ID and mandate; And utilize said server address that the access token of said ID, the sub-number of the account of said mandate and expression access rights is sent to said third party's application server.
Preferably, said authentication gateway specifically comprises:
The logging status acquiring unit is used to obtain client user's logging status, if for successfully login, judge that then the user passes through the user for authentication; If not successfully login then points out the user to carry out the username and password checking, and after the username and password checking is passed through, judges that the user passes through the user for authentication;
Converting unit is used for converting the user name of said authentication through the user into ID, and said ID added in the authentication response is sent to authorization server.
Preferably; Said authorization server; Also be used for the user data that the sub-number of the account of said mandate comprises is sent to client; And after receiving the authorized user data that said client returns, set up and preserve the corresponding relation between said server identification, ID, the sub-number of the account of mandate and authorized user data; And utilize said server address with said ID, authorize sub-number of the account, authorized user data and access token to be sent to said third party's application server.
Preferably; Said authorization server is used to also judge whether the sub-number of the account of said mandate is contained in the sub-number of the account of said user, and judges whether said authorized user data are contained in said user data; Be then to continue to carry out the step of setting up and preserving said corresponding relation if judged result is.
Preferably, said system also comprises the open platform gateway;
Said open platform gateway; Be used to receive the access request that said third party's application server sends; And be forwarded to said authorization server; Said access request comprises server identification, access token, ID, four information of sub-number of the account, and the digital signature of said four information and the endorsement method that generates said digital signature employing;
Said authorization server is used for said access request is carried out the legitimacy authentication, if authentication is passed through all customer data that then allows the sub-number of the account in the said access request of said third party's application server access to comprise;
Wherein, said legitimacy authentication comprises:
Utilize said endorsement method that said four information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
Judge whether server identification, ID and sub-number of the account in the said access request satisfies the corresponding relation between the sub-number of the account of said authorization server, ID and mandate that said authorization server preserves; If satisfy, judge that then authorization server, ID and the sub-number of the account in the said access request is legal;
Judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
Preferably; Also comprise user data in the said access request that said authorization server receives, and the digital signature in the said access request is specially the digital signature of utilizing server identification, access token, ID, sub-number of the account and five information of user data to generate;
Then, said authorization server carries out the legitimacy authentication and specifically comprises:
Utilize said endorsement method that said five information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
Judge whether server identification, ID, sub-number of the account and user data in the said access request satisfy the sub-number of the account of said authorization server, ID, mandate of said authorization server preservation and the corresponding relation between the authorized user data; If satisfy, judge that then authorization server, ID, sub-number of the account and the user data in the said access request is legal;
Judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
Preferably, also comprise the current time stamp in the said access request that said authorization server receives;
Then, said authorization server carries out the legitimacy authentication and also comprises:
Judge that whether said current time stab in preset time of delay section, if judge that then said current time stamp is legal.
The user data authorization method of the embodiment of the invention, Apparatus and system; Preserve a plurality of sub-account information under the user account in the authorization server; Thereby when the guiding user carries out use authority to third party's application server; Can therefrom select the parton number of the account as the mode of authorizing sub-number of the account by the user through searching a plurality of sub-account information that is complementary with ID, realize the part use authority of user third party's application server; Improve the service quality of network service, improved user service experience.
Description of drawings
In order to be illustrated more clearly in the application embodiment or technical scheme of the prior art; To do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below; Obviously, the accompanying drawing in describing below only is some embodiment that put down in writing among the application, for those of ordinary skills; Under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the inventive method embodiment 1;
Fig. 2 is the schematic flow sheet of the inventive method embodiment 2;
Fig. 3 is the schematic flow sheet of the inventive method embodiment 3;
Fig. 4 is the schematic flow sheet of the inventive method embodiment 4;
Fig. 5 is the schematic flow sheet of the inventive method embodiment 5;
Fig. 6 is the schematic flow sheet of the inventive method embodiment 6;
Fig. 7 is the structural representation of apparatus of the present invention embodiment 1;
Fig. 8 is the structural representation of authorization message transmitting element 706 among apparatus of the present invention embodiment 1;
Fig. 9 is the structural representation of apparatus of the present invention embodiment 2;
Figure 10 is the structural representation of apparatus of the present invention embodiment 3;
Figure 11 is the structural representation of apparatus of the present invention embodiment 4;
Figure 12 is the structural representation of system embodiment 1 of the present invention;
Figure 13 is the structural representation of authentication gateway 113 in the system embodiment 1 of the present invention;
Figure 14 is the structural representation of system embodiment 2 of the present invention.
Embodiment
In order to make those skilled in the art person understand the present invention program better; To combine the accompanying drawing in the embodiment of the invention below; Technical scheme in the embodiment of the invention is carried out clear, intactly description; Obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills are not making the every other embodiment that is obtained under the creative work prerequisite, all belong to the scope of the present invention's protection.
User data authorization method of the present invention, Apparatus and system are intended to realize the user to third-party part use authority this purpose, understand for ease, at first introduce applied environment of the present invention.
Original network service only relates to two sides; The one, as user's user, the one, as the service provider who serves the provider, the user saves the data in service provider's the server; And send request to server when needed, be that the user provides corresponding network service by the service provider.For example; User A has created a user account on the game server of game services provider magnificence; And (for example on this game server, preserved the user data relevant with user A; The user basic information of filling in during registration, the user data such as role of the user gradation that produces in the game process, game article, establishment), so when user A wants this network service of enjoy network recreation; Only need with game server between sets up and communicates by letter, game server just can provide game services for user A according to the user data of preservation.
Development along with information technology; Open platform arises at the historic moment; The service provider is open to third party (can be that company also can be the individual) with the data of its preservation, and at this new network service mode, the user just can enjoy the network service that the third party provide through service provider's platform; For example, user A can enjoy the stars that provide of playing more and becomes the network service that recreation is supplemented with money through the magnificence open platform of playing; Also can equip inquiry service or the like through the magnificence AION role that open platform enjoys Sina's microblogging and provide that plays.
For this new network service mode; If the user wants to enjoy the service that the third party provides through open platform; So just must can obtain its user data from the service provider with the third party is prerequisite; Otherwise the third party just can't depend on that the user is to third-party use authority and can the third party get access to user data for the user provides service.The user can only do himself as a wholely in the prior art, is that unit carries out use authority to the third party with user, but can not the implementation part use authority, and the present invention has proposed a kind of little user data authorization method of granularity of authorizing under this demand.
Embodiment one
Referring to Fig. 1, show the flow chart of a kind of user data authorization method embodiment 1 of the present invention, can may further comprise the steps:
Step 101, authorization server receives the authorization requests that third party's application server sends, and said authorization requests comprises server identification and server address.
If user A has registered a user account on the platform of game services provider, under this user account, created three sub-numbers of the account simultaneously, be respectively game role A 1, A 2And A 3(game role can be presented as game identifier, Game Zone sign, game sign and the game role sign that each role has), these data just have been stored in game services merchant's the platform so.In addition, if two third party B have been given in game services merchant's platform opening 1And B 2, that is to say third party B 1And B 2On platform, accomplished registration, platform is also preserved B so 1And B 2Log-on message (for example third-party server identification ID 1, communication with information such as keys).
If user A wants with sub-number of the account A 1Identity login third party B 1, enjoy B 1The network service that provides, B so 1Receiving A 1Logging request after, can go open platform to obtain sub-number of the account A 1Corresponding user data, B like this 1Could corresponding network service be provided for user A.If user A is to third party B 1Carried out sub-number of the account A 1Use authority, open platform will be to B so 1Access request carry out authentication, and after judging that request is legal, with B 1The A of request 1User data return to B 1, and then by B 1For the user provides services on the Internet.But, if user A is not to B 1Carry out sub-number of the account A 1Use authority or open platform to B 1Authentication do not pass through, open platform will be pointed out third party B so 1Guide user A that it is carried out sub-number of the account A 1Use authority.
The authorization requests that this step authorization server receives the transmission of third party's application server promptly is that the third party guides the user to carry out the setting up procedure of use authority.Wherein, comprise server identification ID in the authorization requests 1Purpose be for make authorization server know the third party who carries out this authorization requests be who (in addition, authorization server can also be according to ID 1Judge whether this third party registered at open platform; Because the third party who only registered at open platform just has the authority request user that it is carried out use authority); The purpose that comprises server address is for after accomplishing use authority the user, the third party that authorization server can be authorized the authorization message request of sending to accurately.
Need to prove that so-called " guiding " promptly is that webpage is redirected, just forward the fixed again direction of diverse network request to other position through various methods.Guiding in this step is meant that the page that is shown to user A is from third party B 1Login interface jump to the prompting user to B 1Carry out the process at interface of the mandate website of use authority.
Step 102 is sent ID authentication request to authentication gateway, so that said authentication gateway carries out authentication to the client user.
Step 103 receives the authentication response that said authentication gateway returns, and said authentication response comprises the ID of authentication through the user.
After authorization server receives third-party authorization requests, directly do not point out user A to third party B 1Carry out use authority; But to guide user A to carry out authentication (the guiding here is meant the interface that the page that is shown to A is jumped to authentication from the interface of authorizing the website) earlier to authentication gateway; If being, this user is not carried out the identity information that authentication just can't be known the user; And then also just can't know the sub-account information that this user has, cause Authorized operation to be obstructed.
Authentication gateway can be presented as the mode that the user carries out authentication:
At first, obtain the logging status of user A, if, judge that then the user passes through the user for authentication for successfully login; If not successfully login then points out user A to carry out the username and password checking, and after the username and password checking is passed through, judges that the user passes through the user for authentication.
Logging status for the user need be explained here; The user who is directed to authentication gateway through authorization server generally speaking is the user that success is logined; But also possibly (interconnect because of interconnecting between the network; Being meant between different telecommunication networks to set up effectively to connect, make between the user of heterogeneous networks and can communicate by letter, or the user of a network can using the service of another network) situation causes user's logging status for successfully logining.
Secondly, convert the user name of said authentication through the user into ID, and said ID added in the authentication response be sent to authorization server.
Convert the user name of successful login user into ID ID 2Purpose be in order to guarantee safety of user data, directly user's privacy information (for example user name) is not revealed and is given the third party.
Step 104 is searched the sub-number of the account of the user who is complementary with said ID, and is sent to client in authorization server, supply the client user to select to authorize sub-number of the account.
Authorization server extracts ID ID from the authentication response 2, and in this authorization server, search the sub-number of the account of the user who is complementary with this sign, for example find the sub-number of the account that the sign with user A is complementary and comprise A 1, A 2And A 3, then these three sub-numbers of the account are sent to client, show to the user, supply the user therefrom to select desire to third party B 2The sub-number of the account of authorizing, for example the user has selected sub-number of the account A 1
Step 105 receives the sub-number of the account of mandate that client is returned, and sets up and preserve the corresponding relation between the sub-number of the account of said server identification, ID and mandate.
Authorization server is pushed to the whole sub-number of the account of user A after the user checks, just wait for the feedback information that receives the user, and the sub-number of the account that the user is selected licenses to B as this 1The sub-number of the account of mandate, set up server identification ID then 1, ID ID 2With the sub-number of the account A of mandate 1Between corresponding relation.Like this, which user authorization server has just known has licensed to which sub-number of the account of its subordinate for which third party, so that when the third party sends access request, authorization server can carry out the legitimacy authentication to access request.
Step 106 utilizes said server address that the access token of said ID, the sub-number of the account of said mandate and expression access rights is sent to said third party's application server.
Authorization server has just been known the authorization conditions between third party, user and the sub-number of the account after execution in step 105; And if accomplish the user to third-party use authority; Also need let the third party also know the use authority that it has obtained which sub-number of the account of which user, thus authorization server also need according to the server address in step 101 authorization requests with ID, authorize the access token of sub-number of the account and expression access rights to be sent to the third party.So far, just accomplished the user to third-party part use authority process.
According to above-mentioned as an exampleBSEMGVR takeN-PSVSEMOBJ, just realized that through carrying out step of the present invention user A is to third party B 1Authorize sub-number of the account A 1Rights of using (come down to B to the third party 1Authorized its antithetical phrase number of the account A 1The access rights of corresponding user data) this purpose.
A kind of implementation as step 106 can be embodied as:
At first, generate authorization code, and utilize said server address that said ID, the sub-number of the account of mandate and authorization code are sent to said third party's application server.
Secondly; Receive server identification and authorization code that said third party's application server sends; If said server identification conforms to server identification in the said authorization requests; And said authorization code conforms to the authorization code of said generation, then said access token is sent to said third party's application server.
Authorization server can directly send to third party's application server with ID, the sub-number of the account of mandate and access token; But; For fail safe and the reliability that guarantees to communicate by letter between authorization server and third party's application server; Authorization server generates one group of random number as authorization code, and ID, the sub-number of the account of mandate and authorization code are sent to third party's application server; Third party's application server then after receiving above-mentioned authorization message, feeds back to authorization server with authorization code and the server identification of self, exchanges access token for this.
Embodiment two
On the basis of embodiment 1, the also further refinement of the present invention is that unit carries out use authority to the third party to third-party mandate granularity with sub-number of the account corresponding user data.Referring to Fig. 2, show the flow chart of a kind of user data authorization method embodiment 2 of the present invention, can may further comprise the steps:
Step 201, authorization server receives the authorization requests that third party's application server sends, and said authorization requests comprises server identification and server address.
Step 202 is sent ID authentication request to authentication gateway, so that said authentication gateway carries out authentication to the client user.
Step 203 receives the authentication response that said authentication gateway returns, and said authentication response comprises the ID of authentication through the user.
Step 204 is searched the sub-number of the account of the user who is complementary with said ID, and is sent to client in authorization server, supply the client user to select to authorize sub-number of the account.
Step 201 ~ step 204 is identical with step 101 ~ step 104, repeats no more here.
Step 205 receives the sub-number of the account of mandate that client is returned, and the user data that the sub-number of the account of said mandate is comprised is sent to client, supplies the client user to select the authorized user data.
Different with embodiment 1; The further refinement of present embodiment the granularity of authorizing to the third party, after authorization server receives the sub-number of the account of mandate that the user selects, also further remove to obtain the user data that this sub-number of the account comprises; For example; The pet name of sub-number of the account, grade, head portrait, good friend, dynamic dispatching push to client with these user data that sub-number of the account comprises then, are shown to the user and check; So that the user can therefrom select which user data of wanting to authorize to the third party sub-number of the account, promptly select its desire with sub-number of the account A by user A 1Which user data license to third party B 1, for example the user has selected A 1" head portrait " user data.
Step 206 receives the authorized user data that said client is returned, and sets up and preserve the corresponding relation between said server identification, ID, the sub-number of the account of mandate and authorized user data.
Through after the step 205; Authorization server is known in this step, and which third party is exactly which user licensed to which user data of which sub-number of the account of its subordinate; Therefore, the corresponding relation that need set up of authorization server is exactly the corresponding relation between server identification, ID, the sub-number of the account of mandate and authorized user data.
According to above-mentioned as an exampleBSEMGVR takeN-PSVSEMOBJ, that authorization server is set up at this moment and preserved is server identification ID 1, ID ID 2, authorize sub-number of the account A 1And the corresponding relation between the authorized user data " head portrait ".
Step 207, utilize said server address with said ID, authorize sub-number of the account, authorized user data and access token to be sent to said third party's application server.
Embodiment three
In order to improve the mandate reliability, prevent that user's the act of authorization is maliciously tampered, referring to Fig. 3, show the flow chart of a kind of user data authorization method embodiment 3 of the present invention, can may further comprise the steps:
Step 301, authorization server receives the authorization requests that third party's application server sends, and said authorization requests comprises server identification and server address.
Step 302 is sent ID authentication request to authentication gateway, so that said authentication gateway carries out authentication to the client user.
Step 303 receives the authentication response that said authentication gateway returns, and said authentication response comprises the ID of authentication through the user.
Step 304 is searched the sub-number of the account of the user who is complementary with said ID, and is sent to client in authorization server, supply the client user to select to authorize sub-number of the account.
Step 301 ~ step 304 is identical with step 101 ~ step 104, repeats no more here.
Step 305 receives the sub-number of the account of mandate that client is returned, and judges whether the sub-number of the account of said mandate is contained in the sub-number of the account of said user.
The corresponding relation between the sub-number of the account of said server identification, ID and mandate is set up and preserved to step 306 when the sub-number of the account of said mandate is contained in the sub-number of the account of said user.
Authorization server is before setting up and preserving said corresponding relation; Judge the legitimacy of its sub-number of the account of mandate that receives earlier; Whether promptly judge to authorize sub-number of the account is one or more in a plurality of sub-number of the account of user underling; If judge that then the sub-number of the account of mandate that receives is legal, and then set up said corresponding relation.If through authorization server judges, (the sub-number of the account of the mandate that for example, receives is A not have the sub-number of the account of the mandate that receives in the sub-number of the account of discovery user underling 4, user A subordinate's sub-number of the account A 1, A 2And A 3All can't match), the sub-number of the account of mandate of user's selection possibly be maliciously tampered so, judged that the sub-number of the account of mandate that receives is illegal this moment, no longer continued to set up said corresponding relation, also can alarm to the user simultaneously.
Step 307 utilizes said server address that the access token of said ID, the sub-number of the account of said mandate and expression access rights is sent to said third party's application server.
Step 307 is identical with step 106, also repeats no more here.
Embodiment four
Likewise,, prevent that user's the act of authorization is maliciously tampered,, show the flow chart of a kind of user data authorization method embodiment 4 of the present invention, can may further comprise the steps referring to Fig. 4 in order to improve the mandate reliability:
Step 401, authorization server receives the authorization requests that third party's application server sends, and said authorization requests comprises server identification and server address.
Step 402 is sent ID authentication request to authentication gateway, so that said authentication gateway carries out authentication to the client user.
Step 403 receives the authentication response that said authentication gateway returns, and said authentication response comprises the ID of authentication through the user.
Step 404 is searched the sub-number of the account of the user who is complementary with said ID, and is sent to client in authorization server, supply the client user to select to authorize sub-number of the account.
Step 405 receives the sub-number of the account of mandate that client is returned, and the user data that the sub-number of the account of said mandate is comprised is sent to client, supplies the client user to select the authorized user data.
Step 401 ~ step 405 is identical with step 201 ~ step 205, repeats no more here.
Need to prove, after step 405 receives the sub-number of the account of mandate that client returns, also can utilize the sub-number of the account of user underling to judge the legitimacy of the sub-number of the account of mandate that receives, guarantee the mandate reliability of sub-number of the account.
Step 406 receives the authorized user data that said client is returned, and judges whether said authorized user data are contained in said user data.
The corresponding relation between said server identification, ID, the sub-number of the account of mandate and authorized user data is set up and preserved to step 407 when said authorized user packet is contained in said user data.
Authorization server is before setting up and preserving said corresponding relation; Judge the legitimacy of its authorized user data that receive earlier; Judge that promptly whether the authorized user data are to authorize one or more in a plurality of user data that sub-number of the account comprises; If judge that then the authorized user data that receive are legal, and then set up said corresponding relation.If through authorization server judges, there is not authorized user data (for example, the sub-number of the account A of user A that receives in the user data of finding to authorize sub-number of the account to comprise 1The user data that comprises is grade, head portrait, good friend, dynamic, and the authorized user data that authorization server receives are " pet name ", so sub-number of the account A 1The all customer data that comprises all can't match), then the authorized user data of user's selection possibly be maliciously tampered, and judged that the authorized user data that receive are illegal this moment, no longer continued to set up said corresponding relation, also can alarm to the user simultaneously.
Process step 406 and step 407 just can guarantee the mandate reliability of user data.
Step 408, utilize said server address with said ID, authorize sub-number of the account, authorized user data and access token to be sent to said third party's application server.
Embodiment five
Referring to Fig. 5; Show the flow chart of a kind of user data authorization method embodiment 5 of the present invention; After embodiment shown in Figure 11 and embodiment 3 shown in Figure 3 are sent to third party's application server with ID, the sub-number of the account of mandate and access token; Said method can also comprise the process of the access request that authentication third party application server sends, and is embodied as following steps:
Step 501; Receive the access request of said third party's application server transmission of open platform gateway forwards; Said access request comprises server identification, access token, ID, four information of sub-number of the account, and the digital signature of said four information and the endorsement method that generates said digital signature employing.
Step 502 is carried out the legitimacy authentication to said access request, if authentication is passed through all customer data that then allows the sub-number of the account in the said access request of said third party's application server access to comprise;
Wherein, said legitimacy authentication comprises:
(1) utilize said endorsement method that said four information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
(2) judge whether server identification, ID and sub-number of the account in the said access request satisfies the corresponding relation between the sub-number of the account of said authorization server, ID and mandate that said authorization server preserves; If satisfy, judge that then authorization server, ID and the sub-number of the account in the said access request is legal;
(3) judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
If access request, authorization server, ID, sub-number of the account and access token are all legal, judge that then authentication passes through.
Embodiment six
Referring to Fig. 6; Show the flow chart of a kind of user data authorization method embodiment 6 of the present invention; Embodiment shown in Figure 22 and embodiment 4 shown in Figure 4 with ID, authorize after sub-number of the account, authorized user data and access token be sent to third party's application server; Said method can also comprise the process of the access request that authentication third party application server sends, and is embodied as following steps:
Step 601; Receive the access request of said third party's application server transmission of open platform gateway forwards; Said access request comprises server identification, access token, ID, sub-number of the account, user data, and (user data is the content of this request visit of third party; Can be presented as access program interface API Name) five information, and the digital signature of said five information with generate the endorsement method that said digital signature adopts.
Step 602 is carried out the legitimacy authentication to said access request, if authentication is passed through all customer data that then allows the sub-number of the account in the said access request of said third party's application server access to comprise;
Wherein, said legitimacy authentication specifically comprises:
(1) utilize said endorsement method that said five information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
(2) judge whether server identification, ID, sub-number of the account and user data in the said access request satisfy the sub-number of the account of said authorization server, ID, mandate of said authorization server preservation and the corresponding relation between the authorized user data; If satisfy, judge that then authorization server, ID, sub-number of the account and the user data in the said access request is legal;
(3) judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
If access request, authorization server, ID, sub-number of the account, user data and access token are all legal, judge that then authentication passes through.
Embodiment seven
In order to prevent Replay Attack, on the basis of embodiment shown in Figure 55 and embodiment 6 shown in Figure 6, the access request that the present invention also can send according to following method authentication third party application server particularly, comprise also in the said access request that the current time stabs; Then said legitimacy authentication also comprises: judge that whether said current time stab in preset time of delay section, if judge that then said current time stamp is legal.
If it is all legal that access request, authorization server, ID, sub-number of the account, user data, access token and current time stab, judge that then authentication passes through.
Embodiment eight
Referring to Fig. 7, show the structured flowchart of a kind of user data authorization device embodiment 1 of the present invention, said device comprises:
Authorization requests receiving element 701 is used to receive the authorization requests that third party's application server sends, and said authorization requests comprises server identification and server address;
Authentication request transmitting element 702 is used for sending ID authentication request to authentication gateway, so that said authentication gateway carries out authentication to the client user;
Authentication response receiving element 703 is used to receive the authentication response that said authentication gateway returns, and said authentication response comprises the ID of authentication through the user;
Search unit 704, be used in authorization server, searching the sub-number of the account of the user who is complementary with said ID, and be sent to client, supply the client user to select to authorize sub-number of the account;
Corresponding relation is set up unit 705, is used to receive the sub-number of the account of mandate that client is returned, and sets up and preserve the corresponding relation between the sub-number of the account of said server identification, ID and mandate;
Authorization message transmitting element 706 is used to utilize said server address that the access token of said ID, the sub-number of the account of said mandate and expression access rights is sent to said third party's application server.
Further, as shown in Figure 8, said authorization message transmitting element specifically can comprise:
Authorization code generation unit 7061 is used to generate authorization code;
Communication unit 7062 is used to utilize said server address that said ID, the sub-number of the account of mandate and authorization code are sent to said third party's application server; And receive server identification and the authorization code that said third party's application server sends;
Comparing unit 7063; Whether be used for comparing said server identification conforms to the server identification of said authorization requests; And whether said authorization code conforms to the authorization code of said generation, if all conform to, then said access token is sent to said third party's application server.
Embodiment nine
Referring to Fig. 9, show the structured flowchart of a kind of user data authorization device embodiment 2 of the present invention, said device also comprises:
User data transmitting element 707 is used for the user data that the sub-number of the account of said mandate comprises is sent to client, supplies the client user to select the authorized user data;
Said corresponding relation is set up unit 705, is used for after receiving the authorized user data that said client returns, setting up and preserve the corresponding relation between said server identification, ID, the sub-number of the account of mandate and authorized user data;
Said authorization message transmitting element 706, be used to utilize said server address with said ID, authorize sub-number of the account, authorized user data and access token to be sent to said third party's application server.
Embodiment ten
Referring to Figure 10, show the structured flowchart of a kind of user data authorization device embodiment 3 of the present invention, said device also comprises:
Judging unit 708; Be used to judge whether the sub-number of the account of said mandate is contained in the sub-number of the account of said user; And judge whether said authorized user data are contained in said user data, if judged result is are, then notify said corresponding relation to set up the unit and set up and preserve said corresponding relation.
Embodiment 11
Referring to Figure 11, show the structured flowchart of a kind of user data authorization device embodiment 4 of the present invention, said device also comprises:
Access request receiving element 709; Be used to receive the access request that said third party's application server of open platform gateway forwards sends; Said access request comprises server identification, access token, ID, four information of sub-number of the account, and the digital signature of said four information and the endorsement method that generates said digital signature employing;
Authenticating unit 710 is used for said access request is carried out the legitimacy authentication, if authentication is passed through all customer data that then allows the sub-number of the account in the said access request of said third party's application server access to comprise;
Wherein, said legitimacy authentication comprises:
Utilize said endorsement method that said four information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
Judge whether server identification, ID and sub-number of the account in the said access request satisfies the corresponding relation between the sub-number of the account of said authorization server, ID and mandate that said authorization server preserves; If satisfy, judge that then authorization server, ID and the sub-number of the account in the said access request is legal;
Judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
Embodiment 12
Referring to Figure 12, show the structured flowchart of a kind of user data authoring system embodiment 1 of the present invention, said system comprises: authorization server 111, third party's application server 112, authentication gateway 113, client 114, wherein,
Said authorization server; Be used to receive the authorization requests that said third party's application server sends; And to authentication gateway transmission ID authentication request, so that said authentication gateway carries out authentication to the client user, said authorization requests comprises server identification and server address;
Said authentication gateway is used for the client user is carried out authentication, and sends to said authorization server and to comprise that authentication passes through the authentication response of user's ID;
Said authorization server also is used to receive said authentication response, and searches the sub-number of the account of the user who is complementary with said ID, and is sent to client;
Said client is used to receive the sub-number of the account of said user, and therefrom selects to authorize sub-number of the account to be sent to said authorization server;
Said authorization server also is used to receive the sub-number of the account of mandate that client is returned, and sets up and preserve the corresponding relation between the sub-number of the account of said server identification, ID and mandate; And utilize said server address that the access token of said ID, the sub-number of the account of said mandate and expression access rights is sent to said third party's application server.
Authorization server in the user data authoring system of the present invention, third party's application server, authentication gateway and client cooperatively interact and have just realized the purpose of user of the present invention to third party's part use authority.Referring to Figure 13, show the structured flowchart of authentication gateway, specifically comprise:
Logging status acquiring unit 1131 is used to obtain client user's logging status, if for successfully login, judge that then the user passes through the user for authentication; If not successfully login then points out the user to carry out the username and password checking, and after the username and password checking is passed through, judges that the user passes through the user for authentication;
Converting unit 1132 is used for converting the user name of said authentication through the user into ID, and said ID added in the authentication response is sent to authorization server.
Further; But the present invention also refinement user realizes that the user data that comprises with sub-number of the account is that unit is authorized, at this moment to the granularity of third party's mandate; Said authorization server; Also be used for the user data that the sub-number of the account of said mandate comprises is sent to client, and after receiving the authorized user data that said client returns, set up and preserve the corresponding relation between said server identification, ID, the sub-number of the account of mandate and authorized user data; And utilize said server address with said ID, authorize sub-number of the account, authorized user data and access token to be sent to said third party's application server.
Further; In order to improve the mandate reliability, prevent that user's the act of authorization is maliciously tampered, said authorization server; Be used to also judge whether the sub-number of the account of said mandate is contained in the sub-number of the account of said user; And judge whether said authorized user data are contained in said user data, if judged result is are, then continue to carry out the step of setting up and preserving said corresponding relation.
Embodiment 13
Referring to Figure 14, show the structured flowchart of a kind of user data authoring system embodiment 2 of the present invention, said system also comprises open platform gateway 115;
Said open platform gateway; Be used to receive the access request that said third party's application server sends; And be forwarded to said authorization server; Said access request comprises server identification, access token, ID, four information of sub-number of the account, and the digital signature of said four information and the endorsement method that generates said digital signature employing;
Said authorization server is used for said access request is carried out the legitimacy authentication, if authentication is passed through all customer data that then allows the sub-number of the account in the said access request of said third party's application server access to comprise;
Wherein, said legitimacy authentication comprises:
Utilize said endorsement method that said four information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
Judge whether server identification, ID and sub-number of the account in the said access request satisfies the corresponding relation between the sub-number of the account of said authorization server, ID and mandate that said authorization server preserves; If satisfy, judge that then authorization server, ID and the sub-number of the account in the said access request is legal;
Judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
Further; If the user data that the user comprises with sub-number of the account is a unit third party is carried out use authority; So when authentication third party access request legitimacy; Also comprise user data in the said access request that said authorization server receives, and the digital signature in the said access request is specially the digital signature of utilizing server identification, access token, ID, sub-number of the account and five information of user data to generate; Then,
Said authorization server carries out the legitimacy authentication and specifically comprises:
Utilize said endorsement method that said five information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
Judge whether server identification, ID, sub-number of the account and user data in the said access request satisfy the sub-number of the account of said authorization server, ID, mandate of said authorization server preservation and the corresponding relation between the authorized user data; If satisfy, judge that then authorization server, ID, sub-number of the account and the user data in the said access request is legal;
Judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
Further, in order to prevent Replay Attack, when authentication third party access request legitimacy, also comprise the current time stamp in the said access request that said authorization server receives so; Then,
Said authorization server carries out the legitimacy authentication and also comprises:
Judge that whether said current time stab in preset time of delay section, if judge that then said current time stamp is legal.
The present invention can describe in the general context of the computer executable instructions of being carried out by computer, for example program module.Usually, program module comprises the routine carrying out particular task or realize particular abstract, program, object, assembly, data structure or the like.Also can in DCE, put into practice the present invention, in these DCEs, by through communication network connected teleprocessing equipment execute the task.In DCE, program module can be arranged in this locality and the remote computer storage medium that comprises memory device.
Need to prove; In this article; Relational terms such as first and second grades only is used for an entity or operation are made a distinction with another entity or operation, and not necessarily requires or hint relation or the order that has any this reality between these entities or the operation.And; Term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability; Thereby make and comprise that process, method, article or the equipment of a series of key elements not only comprise those key elements; But also comprise other key elements of clearly not listing, or also be included as this process, method, article or equipment intrinsic key element.Under the situation that do not having much more more restrictions, the key element that limits by statement " comprising ... ", and be not precluded within process, method, article or the equipment that comprises said key element and also have other identical element.
For device embodiment, because it corresponds essentially to method embodiment, so relevant part gets final product referring to the part explanation of method embodiment.Device embodiment described above only is schematic; Wherein said unit as the separating component explanation can or can not be physically to separate also; The parts that show as the unit can be or can not be physical locations also; Promptly can be positioned at a place, perhaps also can be distributed on a plurality of NEs.Can realize the purpose of present embodiment scheme according to the needs selection some or all of module wherein of reality.Those of ordinary skills promptly can understand and implement under the situation of not paying creative work.
The above only is an embodiment of the present invention; Should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the principle of the invention; Can also make some improvement and retouching, these improvement and retouching also should be regarded as protection scope of the present invention.

Claims (20)

1. a user data authorization method is characterized in that, comprising:
Authorization server receives the authorization requests that third party's application server sends, and said authorization requests comprises server identification and server address;
Send ID authentication request to authentication gateway, so that said authentication gateway carries out authentication to the client user;
Receive the authentication response that said authentication gateway returns, said authentication response comprises the ID of authentication through the user;
In authorization server, search the sub-number of the account of the user who is complementary with said ID, and be sent to client, supply the client user to select to authorize sub-number of the account;
Receive the sub-number of the account of mandate that client is returned, set up and preserve the corresponding relation between the sub-number of the account of said server identification, ID and mandate;
Utilize said server address that the access token of said ID, the sub-number of the account of said mandate and expression access rights is sent to said third party's application server.
2. method according to claim 1 is characterized in that, said authentication gateway carries out authentication to the client user, specifically comprises:
Obtain client user's logging status, if, judge that then the user passes through the user for authentication for successfully login; If not successfully login then points out the user to carry out the username and password checking, and after the username and password checking is passed through, judges that the user passes through the user for authentication;
Convert the user name of said authentication through the user into ID, and said ID added in the authentication response be sent to authorization server.
3. method according to claim 1 is characterized in that, said method also comprises: after the sub-number of the account of mandate that said reception client is returned,
The user data that the sub-number of the account of said mandate is comprised is sent to client, supplies the client user to select the authorized user data; Then,
Said foundation is also preserved said corresponding relation and is specifically comprised: after receiving the authorized user data that said client returns, set up and preserve the corresponding relation between said server identification, ID, the sub-number of the account of mandate and authorized user data;
Saidly utilize said server address to be specially: ID, to authorize sub-number of the account, authorized user data and access token to the information that said third party's application server sends.
4. method according to claim 3 is characterized in that, said method also comprises: before said foundation and preserving the corresponding relation between said server identification, ID, the sub-number of the account of mandate and authorized user data,
Judge whether the sub-number of the account of said mandate is contained in the sub-number of the account of said user, and judge whether said authorized user data are contained in said user data, if judged result is are, then continue to carry out the step of setting up and preserving said corresponding relation.
5. method according to claim 1 is characterized in that, said utilize said server address with said ID, authorize sub-number of the account and access token to be sent to said third party's application server, specifically comprise:
Generate authorization code, and utilize said server address that said ID, the sub-number of the account of mandate and authorization code are sent to said third party's application server;
Receive server identification and authorization code that said third party's application server sends; If said server identification conforms to server identification in the said authorization requests; And said authorization code conforms to the authorization code of said generation, then said access token is sent to said third party's application server.
6. according to each described method of claim 1-5, it is characterized in that said method also comprises:
Receive the access request of said third party's application server transmission of open platform gateway forwards; Said access request comprises server identification, access token, ID, four information of sub-number of the account, and the digital signature of said four information and the endorsement method that generates said digital signature employing;
Said access request is carried out the legitimacy authentication, if authentication is passed through all customer data that then allows the sub-number of the account in the said access request of said third party's application server access to comprise;
Wherein, said legitimacy authentication comprises:
Utilize said endorsement method that said four information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
Judge whether server identification, ID and sub-number of the account in the said access request satisfies the corresponding relation between the sub-number of the account of said authorization server, ID and mandate that said authorization server preserves; If satisfy, judge that then authorization server, ID and the sub-number of the account in the said access request is legal;
Judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
7. method according to claim 6 is characterized in that, said method also comprises:
Said access request also comprises user data, then,
Digital signature in the said access request is specially the digital signature of utilizing server identification, access token, ID, sub-number of the account and five information of user data to generate;
Said legitimacy authentication specifically comprises:
Utilize said endorsement method that said five information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
Judge whether server identification, ID, sub-number of the account and user data in the said access request satisfy the sub-number of the account of said authorization server, ID, mandate of said authorization server preservation and the corresponding relation between the authorized user data; If satisfy, judge that then authorization server, ID, sub-number of the account and the user data in the said access request is legal;
Judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
8. method according to claim 6 is characterized in that, said method also comprises:
Said access request also comprises the current time stamp; Then,
Said legitimacy authentication also comprises:
Judge that whether said current time stab in preset time of delay section, if judge that then said current time stamp is legal.
9. a user data authorization device is characterized in that, comprising:
The authorization requests receiving element is used to receive the authorization requests that third party's application server sends, and said authorization requests comprises server identification and server address;
The authentication request transmitting element is used for sending ID authentication request to authentication gateway, so that said authentication gateway carries out authentication to the client user;
The authentication response receiving element is used to receive the authentication response that said authentication gateway returns, and said authentication response comprises the ID of authentication through the user;
Search the unit, be used in authorization server, searching the sub-number of the account of the user who is complementary with said ID, and be sent to client, supply the client user to select to authorize sub-number of the account;
Corresponding relation is set up the unit, is used to receive the sub-number of the account of mandate that client is returned, and sets up and preserve the corresponding relation between the sub-number of the account of said server identification, ID and mandate;
The authorization message transmitting element is used to utilize said server address that the access token of said ID, the sub-number of the account of said mandate and expression access rights is sent to said third party's application server.
10. device according to claim 9 is characterized in that, said device also comprises:
The user data transmitting element is used for the user data that the sub-number of the account of said mandate comprises is sent to client, supplies the client user to select the authorized user data;
Said corresponding relation is set up the unit, is used for after receiving the authorized user data that said client returns, setting up and preserve the corresponding relation between said server identification, ID, the sub-number of the account of mandate and authorized user data;
Said authorization message transmitting element, be used to utilize said server address with said ID, authorize sub-number of the account, authorized user data and access token to be sent to said third party's application server.
11. device according to claim 10 is characterized in that, said device also comprises:
Judging unit; Be used to judge whether the sub-number of the account of said mandate is contained in the sub-number of the account of said user; And judge whether said authorized user data are contained in said user data, if judged result is are, then notify said corresponding relation to set up the unit and set up and preserve said corresponding relation.
12. device according to claim 9 is characterized in that, said authorization message transmitting element specifically comprises:
The authorization code generation unit is used to generate authorization code;
Communication unit is used to utilize said server address that said ID, the sub-number of the account of mandate and authorization code are sent to said third party's application server; And receive server identification and the authorization code that said third party's application server sends;
Comparing unit; Whether be used for comparing said server identification conforms to the server identification of said authorization requests; And whether said authorization code conforms to the authorization code of said generation, if all conform to, then said access token is sent to said third party's application server.
13., it is characterized in that said device also comprises according to each described device of claim 9-12:
The access request receiving element; Be used to receive the access request that said third party's application server of open platform gateway forwards sends; Said access request comprises server identification, access token, ID, four information of sub-number of the account, and the digital signature of said four information and the endorsement method that generates said digital signature employing;
Authenticating unit is used for said access request is carried out the legitimacy authentication, if authentication is passed through all customer data that then allows the sub-number of the account in the said access request of said third party's application server access to comprise;
Wherein, said legitimacy authentication comprises:
Utilize said endorsement method that said four information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
Judge whether server identification, ID and sub-number of the account in the said access request satisfies the corresponding relation between the sub-number of the account of said authorization server, ID and mandate that said authorization server preserves; If satisfy, judge that then authorization server, ID and the sub-number of the account in the said access request is legal;
Judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
14. a user data authoring system is characterized in that, said system comprises: authorization server, third party's application server, authentication gateway, client,
Said authorization server; Be used to receive the authorization requests that said third party's application server sends; And to authentication gateway transmission ID authentication request, so that said authentication gateway carries out authentication to the client user, said authorization requests comprises server identification and server address;
Said authentication gateway is used for the client user is carried out authentication, and sends to said authorization server and to comprise that authentication passes through the authentication response of user's ID;
Said authorization server also is used to receive said authentication response, and searches the sub-number of the account of the user who is complementary with said ID, and is sent to client;
Said client is used to receive the sub-number of the account of said user, and therefrom selects to authorize sub-number of the account to be sent to said authorization server;
Said authorization server also is used to receive the sub-number of the account of mandate that client is returned, and sets up and preserve the corresponding relation between the sub-number of the account of said server identification, ID and mandate; And utilize said server address that the access token of said ID, the sub-number of the account of said mandate and expression access rights is sent to said third party's application server.
15. system according to claim 14 is characterized in that, said authentication gateway specifically comprises:
The logging status acquiring unit is used to obtain client user's logging status, if for successfully login, judge that then the user passes through the user for authentication; If not successfully login then points out the user to carry out the username and password checking, and after the username and password checking is passed through, judges that the user passes through the user for authentication;
Converting unit is used for converting the user name of said authentication through the user into ID, and said ID added in the authentication response is sent to authorization server.
16. system according to claim 14 is characterized in that,
Said authorization server; Also be used for the user data that the sub-number of the account of said mandate comprises is sent to client; And after receiving the authorized user data that said client returns, set up and preserve the corresponding relation between said server identification, ID, the sub-number of the account of mandate and authorized user data; And utilize said server address with said ID, authorize sub-number of the account, authorized user data and access token to be sent to said third party's application server.
17. system according to claim 16 is characterized in that,
Said authorization server; Be used to also judge whether the sub-number of the account of said mandate is contained in the sub-number of the account of said user; And judge whether said authorized user data are contained in said user data, if judged result is are, then continue to carry out the step of setting up and preserving said corresponding relation.
18., it is characterized in that said system also comprises the open platform gateway according to each described system of claim 14-17;
Said open platform gateway; Be used to receive the access request that said third party's application server sends; And be forwarded to said authorization server; Said access request comprises server identification, access token, ID, four information of sub-number of the account, and the digital signature of said four information and the endorsement method that generates said digital signature employing;
Said authorization server is used for said access request is carried out the legitimacy authentication, if authentication is passed through all customer data that then allows the sub-number of the account in the said access request of said third party's application server access to comprise;
Wherein, said legitimacy authentication comprises:
Utilize said endorsement method that said four information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
Judge whether server identification, ID and sub-number of the account in the said access request satisfies the corresponding relation between the sub-number of the account of said authorization server, ID and mandate that said authorization server preserves; If satisfy, judge that then authorization server, ID and the sub-number of the account in the said access request is legal;
Judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
19. system according to claim 18 is characterized in that,
Also comprise user data in the said access request that said authorization server receives, and the digital signature in the said access request is specially the digital signature of utilizing server identification, access token, ID, sub-number of the account and five information of user data to generate;
Then, said authorization server carries out the legitimacy authentication and specifically comprises:
Utilize said endorsement method that said five information are carried out digital signature, and with said access request in the digital signature comparison that comprises, if identical, judge that then said access request is legal;
Judge whether server identification, ID, sub-number of the account and user data in the said access request satisfy the sub-number of the account of said authorization server, ID, mandate of said authorization server preservation and the corresponding relation between the authorized user data; If satisfy, judge that then authorization server, ID, sub-number of the account and the user data in the said access request is legal;
Judge that whether said access token conforms to the access token that said authorization server sends to third party's application server, if conform to, judges that then said access token is legal.
20. system according to claim 18 is characterized in that,
Also comprise the current time stamp in the said access request that said authorization server receives;
Then, said authorization server carries out the legitimacy authentication and also comprises:
Judge that whether said current time stab in preset time of delay section, if judge that then said current time stamp is legal.
CN201210137848.XA 2012-05-04 2012-05-04 User data authorization method, device and system Active CN102638473B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210137848.XA CN102638473B (en) 2012-05-04 2012-05-04 User data authorization method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210137848.XA CN102638473B (en) 2012-05-04 2012-05-04 User data authorization method, device and system

Publications (2)

Publication Number Publication Date
CN102638473A true CN102638473A (en) 2012-08-15
CN102638473B CN102638473B (en) 2014-12-10

Family

ID=46622716

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210137848.XA Active CN102638473B (en) 2012-05-04 2012-05-04 User data authorization method, device and system

Country Status (1)

Country Link
CN (1) CN102638473B (en)

Cited By (44)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103490898A (en) * 2013-09-22 2014-01-01 新浪网技术(中国)有限公司 E-mail collection authorization method, device and system
WO2014086111A1 (en) * 2012-12-03 2014-06-12 鹤山世达光电科技有限公司 Fingerprint authentication based information management system and information management method
CN103888451A (en) * 2014-03-10 2014-06-25 百度在线网络技术(北京)有限公司 Method, device and system for certification authorization
WO2014206199A1 (en) * 2013-06-25 2014-12-31 华为技术有限公司 Account login method, equipment and system
CN104320265A (en) * 2014-11-21 2015-01-28 北京奇虎科技有限公司 Authentication method and device for software platform
CN104468635A (en) * 2014-12-31 2015-03-25 广州东海网络科技有限公司 Upgrading authentication method and system for user permission in network platform
CN104702415A (en) * 2015-03-31 2015-06-10 北京奇艺世纪科技有限公司 Account number permission control method and device
CN104869102A (en) * 2014-02-24 2015-08-26 腾讯科技(北京)有限公司 Authorization method, device and system based on xAuth protocols
CN105187417A (en) * 2015-08-25 2015-12-23 北京京东尚科信息技术有限公司 Authority obtaining method and device
CN105306498A (en) * 2014-06-12 2016-02-03 中国电信股份有限公司 Method and system of user for accessing third party application and cloud platform
CN105391725A (en) * 2015-11-27 2016-03-09 深圳市摩艾客科技股份有限公司 Real person 3D data reading module and data transmission method thereof
CN105488366A (en) * 2014-10-13 2016-04-13 阿里巴巴集团控股有限公司 Data permission control method and system
CN105516069A (en) * 2014-09-28 2016-04-20 腾讯科技(深圳)有限公司 Data processing method, data processing device, and data processing system
CN105704108A (en) * 2014-11-28 2016-06-22 中国电信股份有限公司 Method for safety certification, ability opening platform and system
CN106168899A (en) * 2015-05-19 2016-11-30 罗伯特·博世有限公司 For updating method and the more new gateway of embedded Control equipment
WO2017021648A1 (en) * 2015-08-05 2017-02-09 Orange Method and device for identifying visited and home authentication servers
CN106603462A (en) * 2015-10-13 2017-04-26 腾讯科技(深圳)有限公司 API calling method, device and system
CN106856475A (en) * 2015-12-08 2017-06-16 佳能株式会社 Authorization server and certification cooperative system
CN106936779A (en) * 2015-12-29 2017-07-07 北京网御星云信息技术有限公司 A kind of data connecting method, system and device
CN107070945A (en) * 2013-06-19 2017-08-18 华为技术有限公司 Identity logs method and apparatus
CN107124433A (en) * 2017-07-04 2017-09-01 中国联合网络通信集团有限公司 Internet of things system, internet of things equipment access method, access authorization methods and equipment
CN107276963A (en) * 2016-04-06 2017-10-20 泰康之家(北京)投资有限公司 A kind of method and device of renewal authority
CN107273189A (en) * 2016-04-06 2017-10-20 泰康之家(北京)投资有限公司 A kind of method for managing subapplication and application carry platform
CN107545431A (en) * 2016-06-27 2018-01-05 李明 Transaction authorisation method and system and method for commerce and system
CN107590662A (en) * 2017-11-03 2018-01-16 中国银行股份有限公司 A kind of authentication method and certificate server, system for calling internet banking system
CN107885985A (en) * 2017-11-23 2018-04-06 维沃移动通信有限公司 A kind of application program account sharing method and terminal
CN108463982A (en) * 2015-11-16 2018-08-28 万事达卡国际股份有限公司 Carry out the system and method for certification online user for authorization server safe to use
CN108920366A (en) * 2018-06-28 2018-11-30 腾讯科技(深圳)有限公司 One seed application adjustment method, apparatus and system
CN109033774A (en) * 2018-08-31 2018-12-18 阿里巴巴集团控股有限公司 Acquisition, the method, apparatus of feedback user resource and electronic equipment
CN109150864A (en) * 2018-08-03 2019-01-04 中国联合网络通信集团有限公司 Anti-cheating method and device based on re-authentication
CN109347729A (en) * 2018-12-06 2019-02-15 维沃移动通信有限公司 A kind of means of communication and terminal
CN109472547A (en) * 2018-10-16 2019-03-15 平安万家医疗投资管理有限责任公司 A kind of run-length managment method, run-length management managing device and server
CN109511115A (en) * 2017-09-14 2019-03-22 华为技术有限公司 A kind of authorization method and network element
CN109587364A (en) * 2017-09-29 2019-04-05 中国移动通信集团公司 Handle method, server and the equipment of data on flows red packet
CN110224971A (en) * 2018-03-02 2019-09-10 阿里巴巴集团控股有限公司 Authorize method, authorization server, system, equipment and the storage medium logged in
CN110245474A (en) * 2019-04-19 2019-09-17 阿里巴巴集团控股有限公司 A kind of processing method and system for publicly-owned account
CN110334153A (en) * 2019-06-28 2019-10-15 阿里巴巴集团控股有限公司 Authorization method, system, device and equipment in block chain type account book
CN111031332A (en) * 2019-11-26 2020-04-17 北京达佳互联信息技术有限公司 Data interaction method, device, server and storage medium
CN111259363A (en) * 2020-01-19 2020-06-09 数字广东网络建设有限公司 Service access information processing method, system, device, equipment and storage medium
CN113746857A (en) * 2021-09-09 2021-12-03 深圳市腾讯网域计算机网络有限公司 Login method, device, equipment and computer readable storage medium
US11218314B2 (en) 2017-09-28 2022-01-04 Huawei Technologies Co., Ltd. Network function service invocation method, apparatus, and system
CN114448720A (en) * 2022-03-09 2022-05-06 北京京东振世信息技术有限公司 Account registration method and device
CN114793179A (en) * 2022-05-09 2022-07-26 北京明略昭辉科技有限公司 Method and system for tenant access, server and storage medium
US12093419B2 (en) 2018-09-03 2024-09-17 VeChain Global Technology, S.AR.L Methods and devices for managing user identity authentication data

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1459068A (en) * 2000-08-17 2003-11-26 丹尼尔·A·克恩 Automated payment system
CN101562621A (en) * 2009-05-25 2009-10-21 阿里巴巴集团控股有限公司 User authorization method and system and device thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1459068A (en) * 2000-08-17 2003-11-26 丹尼尔·A·克恩 Automated payment system
CN101562621A (en) * 2009-05-25 2009-10-21 阿里巴巴集团控股有限公司 User authorization method and system and device thereof

Cited By (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014086111A1 (en) * 2012-12-03 2014-06-12 鹤山世达光电科技有限公司 Fingerprint authentication based information management system and information management method
CN107070945A (en) * 2013-06-19 2017-08-18 华为技术有限公司 Identity logs method and apparatus
WO2014206199A1 (en) * 2013-06-25 2014-12-31 华为技术有限公司 Account login method, equipment and system
US10021098B2 (en) 2013-06-25 2018-07-10 Huawei Technologies Co., Ltd. Account login method, device, and system
CN103490898B (en) * 2013-09-22 2017-01-18 新浪网技术(中国)有限公司 E-mail collection authorization method, device and system
CN103490898A (en) * 2013-09-22 2014-01-01 新浪网技术(中国)有限公司 E-mail collection authorization method, device and system
CN104869102A (en) * 2014-02-24 2015-08-26 腾讯科技(北京)有限公司 Authorization method, device and system based on xAuth protocols
CN104869102B (en) * 2014-02-24 2019-04-02 腾讯科技(北京)有限公司 Authorization method, device and system based on xAuth agreement
CN103888451A (en) * 2014-03-10 2014-06-25 百度在线网络技术(北京)有限公司 Method, device and system for certification authorization
CN103888451B (en) * 2014-03-10 2017-09-26 百度在线网络技术(北京)有限公司 Authorization method, the apparatus and system of certification
CN105306498B (en) * 2014-06-12 2019-04-16 中国电信股份有限公司 Method, system and the cloud platform of user's access third-party application
CN105306498A (en) * 2014-06-12 2016-02-03 中国电信股份有限公司 Method and system of user for accessing third party application and cloud platform
CN105516069A (en) * 2014-09-28 2016-04-20 腾讯科技(深圳)有限公司 Data processing method, data processing device, and data processing system
WO2016058522A1 (en) * 2014-10-13 2016-04-21 Alibaba Group Holding Limited Method and apparatus for controlling data permissions
US9866565B2 (en) 2014-10-13 2018-01-09 Alibaba Group Holding Limited Method and apparatus for controlling data permissions
CN105488366A (en) * 2014-10-13 2016-04-13 阿里巴巴集团控股有限公司 Data permission control method and system
CN104320265A (en) * 2014-11-21 2015-01-28 北京奇虎科技有限公司 Authentication method and device for software platform
CN104320265B (en) * 2014-11-21 2017-10-24 北京奇虎科技有限公司 Authentication method and authentication device for software platform
CN105704108A (en) * 2014-11-28 2016-06-22 中国电信股份有限公司 Method for safety certification, ability opening platform and system
CN105704108B (en) * 2014-11-28 2019-02-12 中国电信股份有限公司 For the method for safety certification, ability open platform and system
CN104468635A (en) * 2014-12-31 2015-03-25 广州东海网络科技有限公司 Upgrading authentication method and system for user permission in network platform
CN104468635B (en) * 2014-12-31 2018-01-26 广州东海网络科技有限公司 The user right step-up authentication method and system of the network platform
CN104702415B (en) * 2015-03-31 2018-12-14 北京奇艺世纪科技有限公司 account authority control method and device
CN104702415A (en) * 2015-03-31 2015-06-10 北京奇艺世纪科技有限公司 Account number permission control method and device
CN106168899B (en) * 2015-05-19 2021-07-27 罗伯特·博世有限公司 Method for updating embedded control equipment and updating gateway
CN106168899A (en) * 2015-05-19 2016-11-30 罗伯特·博世有限公司 For updating method and the more new gateway of embedded Control equipment
US10856145B2 (en) 2015-08-05 2020-12-01 Orange Method and device for identifying visited and home authentication servers
FR3039954A1 (en) * 2015-08-05 2017-02-10 Orange METHOD AND DEVICE FOR IDENTIFYING VISIT AND HOME AUTHENTICATION SERVERS
WO2017021648A1 (en) * 2015-08-05 2017-02-09 Orange Method and device for identifying visited and home authentication servers
CN105187417A (en) * 2015-08-25 2015-12-23 北京京东尚科信息技术有限公司 Authority obtaining method and device
CN106603462A (en) * 2015-10-13 2017-04-26 腾讯科技(深圳)有限公司 API calling method, device and system
CN108463982A (en) * 2015-11-16 2018-08-28 万事达卡国际股份有限公司 Carry out the system and method for certification online user for authorization server safe to use
CN108463982B (en) * 2015-11-16 2021-11-02 万事达卡国际股份有限公司 System and method for authenticating online users using a secure authorization server
CN105391725A (en) * 2015-11-27 2016-03-09 深圳市摩艾客科技股份有限公司 Real person 3D data reading module and data transmission method thereof
CN106856475A (en) * 2015-12-08 2017-06-16 佳能株式会社 Authorization server and certification cooperative system
CN106856475B (en) * 2015-12-08 2020-11-10 佳能株式会社 Authorization server and authentication collaboration system
CN106936779A (en) * 2015-12-29 2017-07-07 北京网御星云信息技术有限公司 A kind of data connecting method, system and device
CN107276963B (en) * 2016-04-06 2021-09-03 泰康之家(北京)投资有限公司 Method and device for updating authority
CN107273189A (en) * 2016-04-06 2017-10-20 泰康之家(北京)投资有限公司 A kind of method for managing subapplication and application carry platform
CN107276963A (en) * 2016-04-06 2017-10-20 泰康之家(北京)投资有限公司 A kind of method and device of renewal authority
CN107545431A (en) * 2016-06-27 2018-01-05 李明 Transaction authorisation method and system and method for commerce and system
CN107124433B (en) * 2017-07-04 2019-08-06 中国联合网络通信集团有限公司 Internet of things system, internet of things equipment access method, access authorization methods and equipment
CN107124433A (en) * 2017-07-04 2017-09-01 中国联合网络通信集团有限公司 Internet of things system, internet of things equipment access method, access authorization methods and equipment
CN109511115B (en) * 2017-09-14 2020-09-29 华为技术有限公司 Authorization method and network element
US11431695B2 (en) 2017-09-14 2022-08-30 Huawei Technologies Co., Ltd. Authorization method and network element
CN109511115A (en) * 2017-09-14 2019-03-22 华为技术有限公司 A kind of authorization method and network element
US11218314B2 (en) 2017-09-28 2022-01-04 Huawei Technologies Co., Ltd. Network function service invocation method, apparatus, and system
US11956361B2 (en) 2017-09-28 2024-04-09 Huawei Technologies Co., Ltd. Network function service invocation method, apparatus, and system
CN109587364A (en) * 2017-09-29 2019-04-05 中国移动通信集团公司 Handle method, server and the equipment of data on flows red packet
CN107590662A (en) * 2017-11-03 2018-01-16 中国银行股份有限公司 A kind of authentication method and certificate server, system for calling internet banking system
CN107885985A (en) * 2017-11-23 2018-04-06 维沃移动通信有限公司 A kind of application program account sharing method and terminal
CN110224971B (en) * 2018-03-02 2022-05-27 阿里巴巴集团控股有限公司 Method, authorization server, system, device and storage medium for authorizing login
CN110224971A (en) * 2018-03-02 2019-09-10 阿里巴巴集团控股有限公司 Authorize method, authorization server, system, equipment and the storage medium logged in
CN108920366B (en) * 2018-06-28 2020-09-29 腾讯科技(深圳)有限公司 Sub-application debugging method, device and system
CN108920366A (en) * 2018-06-28 2018-11-30 腾讯科技(深圳)有限公司 One seed application adjustment method, apparatus and system
CN109150864A (en) * 2018-08-03 2019-01-04 中国联合网络通信集团有限公司 Anti-cheating method and device based on re-authentication
CN109150864B (en) * 2018-08-03 2021-07-20 中国联合网络通信集团有限公司 Anti-cheating method and device based on secondary authentication
CN109033774B (en) * 2018-08-31 2020-08-07 阿里巴巴集团控股有限公司 Method and device for acquiring and feeding back user resources and electronic equipment
CN109033774A (en) * 2018-08-31 2018-12-18 阿里巴巴集团控股有限公司 Acquisition, the method, apparatus of feedback user resource and electronic equipment
US12093419B2 (en) 2018-09-03 2024-09-17 VeChain Global Technology, S.AR.L Methods and devices for managing user identity authentication data
CN109472547A (en) * 2018-10-16 2019-03-15 平安万家医疗投资管理有限责任公司 A kind of run-length managment method, run-length management managing device and server
CN109347729A (en) * 2018-12-06 2019-02-15 维沃移动通信有限公司 A kind of means of communication and terminal
CN110245474A (en) * 2019-04-19 2019-09-17 阿里巴巴集团控股有限公司 A kind of processing method and system for publicly-owned account
CN110334153A (en) * 2019-06-28 2019-10-15 阿里巴巴集团控股有限公司 Authorization method, system, device and equipment in block chain type account book
CN111031332B (en) * 2019-11-26 2021-09-10 北京达佳互联信息技术有限公司 Data interaction method, device, server and storage medium
CN111031332A (en) * 2019-11-26 2020-04-17 北京达佳互联信息技术有限公司 Data interaction method, device, server and storage medium
CN111259363A (en) * 2020-01-19 2020-06-09 数字广东网络建设有限公司 Service access information processing method, system, device, equipment and storage medium
CN113746857A (en) * 2021-09-09 2021-12-03 深圳市腾讯网域计算机网络有限公司 Login method, device, equipment and computer readable storage medium
CN114448720A (en) * 2022-03-09 2022-05-06 北京京东振世信息技术有限公司 Account registration method and device
CN114793179A (en) * 2022-05-09 2022-07-26 北京明略昭辉科技有限公司 Method and system for tenant access, server and storage medium
CN114793179B (en) * 2022-05-09 2024-07-02 北京明略昭辉科技有限公司 Method and system for tenant access, server and storage medium

Also Published As

Publication number Publication date
CN102638473B (en) 2014-12-10

Similar Documents

Publication Publication Date Title
CN102638473B (en) User data authorization method, device and system
KR101195651B1 (en) System and method for authenticating remote server access
CN101075875B (en) Method and system for realizing monopoint login between gate and system
CN1852094B (en) Method and system for protecting account of network business user
CN102811228B (en) Network login method, equipment and system
CN106779716B (en) Authentication method, device and system based on block chain account address
CN106375270B (en) Token generation and authentication method and authentication server
CN101217367B (en) An operation right judgment system and method realized by introducing right judgment client end
US20210168611A1 (en) Method for securely sharing a url
CN101087193A (en) New method for using the mobile number bond with account for identity identification
CN107295011A (en) The safety certifying method and device of webpage
CN102868702B (en) System login device and system login method
CN103051647B (en) Method, equipment and system that a kind of session realizes
CN104967597A (en) Third-party application message authentication method and system based on secure channel
CN104796436A (en) User login method and system, first platform server and related platform server
CN104618356B (en) Auth method and device
CN104837134B (en) A kind of web authentication user login method, equipment and system
CN105354482A (en) Single sign-on method and device
CN106453321A (en) Authentication server, system and method, and to-be-authenticated terminal
CN102143131A (en) User logout method and authentication server
CN104753872A (en) Authentication method, authentication platform, service platform, network elements and system
HUE029848T2 (en) Method and equipment for establishing secure connection on a communication network
CN103428161A (en) Phone authentication service system
CN105187417B (en) Authority acquiring method and apparatus
CN104113511B (en) A kind of method, system and relevant apparatus for accessing IMS network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant