CN104700040B - Authority control method and device - Google Patents

Authority control method and device Download PDF

Info

Publication number
CN104700040B
CN104700040B CN201310672119.9A CN201310672119A CN104700040B CN 104700040 B CN104700040 B CN 104700040B CN 201310672119 A CN201310672119 A CN 201310672119A CN 104700040 B CN104700040 B CN 104700040B
Authority
CN
China
Prior art keywords
user
task
application
relevance
application relevance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310672119.9A
Other languages
Chinese (zh)
Other versions
CN104700040A (en
Inventor
张振伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310672119.9A priority Critical patent/CN104700040B/en
Publication of CN104700040A publication Critical patent/CN104700040A/en
Application granted granted Critical
Publication of CN104700040B publication Critical patent/CN104700040B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the invention discloses a permission control method and a permission control device, which are used for realizing interaction with a user during permission control and improving participation enthusiasm of the user. The method provided by the embodiment of the invention comprises the following steps: receiving an access request of a user to a network resource; sending an application relevance task to the user according to the access request, wherein the application relevance task is a task type which needs to be executed by the user and feeds back a task report according to an execution condition and is relevant to an application program; acquiring a task report fed back by the user after the application relevance task is executed; and if the task report indicates that the user successfully executes the application relevance task, granting the user the permission of allowing to access the network resource corresponding to the access request.

Description

Authority control method and device
Technical Field
The present invention relates to the field of network security technologies, and in particular, to a method and an apparatus for controlling a right.
Background
In the network application, when a user accesses a network resource in a website, the user usually needs to initiate a resource access request, and the website needs to detect the request to determine whether to grant permission to the user, so that the user can continue to perform operations on the website or view content, and the permission control of the website is to control and establish a mapping relationship from the user to the network resource accessed by the user. For example, when a user initiates access to a network community, for example, the user initiates access to a network resource published by a publisher on a QQ space, a man-machine network, a blog (blog), a micro-blog (microblog), or the like, a website needs to perform permission review on the user to determine whether the user has access permission, allow the user to browse a page or leave a message, comment, or the like when the user has access permission, and deny the user's access request when the user does not have access permission.
The existing access control method usually defines access objects, question reply verification, and other ways, for example, the access of network resources is set to allow access to objects with specific identities, and may be set to only allow access to users in a buddy list, but not to allow access to users other than the buddy list, and for example, the access to network resources is set to allow access to objects that answer specific questions correctly, and only allows access to users when answering specific questions correctly, and the specific questions may be set to "my birthday", "my name", and so on.
However, the user initiating the access request can successfully access the network resource only if the user initiating the access request is an object with a specific identity or an object accurately knowing the answer of a specific question, the method for verifying the response of the limited access object or the question has strict requirements on the user initiating the access request and is dull and single for the user, no interaction exists between the method for limiting the access object and the user initiating the access request, and the user initiating the access request only waits for verification without any selection in the process of initiating the access; although the question answering and verification mode has interaction with the user who initiates the access request, the question answering mode is limited to the mode that the user answers the set questions, the user who initiates the access request can only answer the questions, the answer is the same as the answer in an examination, the answer is boring for the user, and the user who does not know the answer of the question loses the participation enthusiasm of accessing network resources.
Disclosure of Invention
The embodiment of the invention provides a permission control method and device, which are used for realizing interaction with a user during permission control and improving participation enthusiasm of the user.
In order to solve the above technical problems, embodiments of the present invention provide the following technical solutions:
in a first aspect, an embodiment of the present invention provides an authority control method, including:
receiving an access request of a user to a network resource;
sending an application relevance task to the user according to the access request, wherein the application relevance task is a task type which needs to be executed by the user and feeds back a task report according to an execution condition and is relevant to an application program;
acquiring a task report fed back by the user after the application relevance task is executed;
and if the task report indicates that the user successfully executes the application relevance task, granting the user the permission of allowing to access the network resource corresponding to the access request.
In a second aspect, an embodiment of the present invention further provides an authority control device, including:
the receiving module is used for receiving an access request of a user to the network resource;
a sending module, configured to send an application relevance task to the user according to the access request, where the application relevance task is a task type associated with an application program and required to be executed by the user and fed back a task report according to an execution condition;
the acquisition module is used for acquiring a task report fed back by the user after the application relevance task is executed;
and the authorization module is used for granting the user the permission of allowing the user to access the network resource corresponding to the access request when the task report indicates that the user successfully executes the application relevance task.
According to the technical scheme, the embodiment of the invention has the following advantages:
in the embodiment of the invention, an access request initiated by a user for a network resource is received, then an application relevance task is sent to the user according to the access request, wherein the application relevance task is a task type which is required to be executed by the user and is associated with an application program and feeds back a task report according to an execution condition, the task report fed back by the user is received after the user executes the application relevance task, and if the user executes the application relevance task successfully, the user is granted a right for allowing the access to the network resource corresponding to the access request. The access authority control of the user is realized by whether the user can complete the application relevance task or not, the user is required to execute the task in the authority control process of the user and feed back a task report according to the execution condition, the user can participate in the whole process of using the application relevance task to decide whether to grant authority to the user or not, the user is more interested in waiting for verification in the process of being granted the authority, the curiosity of the user is met, the authority can be granted if the user can successfully execute the application relevance task, the interaction with the user is realized in the authority control process, the user can more actively participate in the access of network resources, and the use experience of the user is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings.
Fig. 1 is a schematic flow chart of an authorization control method according to an embodiment of the present invention;
FIG. 2-a is a schematic diagram illustrating a setting manner of an application relevance task according to an embodiment of the present invention;
FIG. 2-b is a schematic diagram illustrating another setting manner of an application relevance task according to an embodiment of the present invention;
2-c are schematic diagrams of another setting mode of the application relevance task according to the embodiment of the present invention;
2-d are schematic diagrams of another arrangement of application relevance tasks provided in embodiments of the present invention;
2-e are schematic diagrams of another arrangement of application relevance tasks provided in embodiments of the present invention;
FIG. 2-f is a schematic diagram of another setting mode of an application relevance task provided in the embodiment of the present invention;
FIG. 3-a is a schematic diagram illustrating another setting manner of an application relevance task according to an embodiment of the present invention;
fig. 3-b is a schematic diagram illustrating a setting manner of a white list object according to an embodiment of the present invention;
fig. 4 is a schematic diagram illustrating another setting manner of an application relevance task according to an embodiment of the present invention;
FIG. 5-a is a schematic diagram illustrating an implementation manner of setting an application relevance task as minesweeping encryption in the embodiment of the present invention;
5-B is a schematic diagram of an implementation manner of sending a mine sweeping task to a user B according to the embodiment of the present invention;
5-c are schematic diagrams illustrating an implementation manner of the user B performing a mine sweeping task according to the embodiment of the present invention;
5-d are schematic diagrams illustrating an implementation manner in which the user B successfully executes the mine sweeping task according to the embodiment of the present invention;
fig. 5-e is a schematic diagram illustrating an implementation manner of the spoken content published by the owner B of the user B accessing the network resource after the user B is granted the right to access the spoken content according to the embodiment of the present invention;
FIG. 6-a is a schematic diagram of a configuration of an authorization control device according to an embodiment of the present invention;
FIG. 6-b is a schematic diagram of another privilege control device according to an embodiment of the present invention;
FIG. 6-c is a schematic diagram of another privilege control device according to an embodiment of the present invention;
FIG. 6-d is a schematic diagram of another privilege control device according to an embodiment of the present invention;
FIG. 6-e is a schematic diagram of another privilege control device according to an embodiment of the present invention;
fig. 6-f is a schematic structural diagram of a transmitting module according to an embodiment of the present invention;
fig. 6-g is a schematic structural diagram of another transmitting module according to an embodiment of the present invention;
fig. 6-h is a schematic structural diagram of another transmitting module according to an embodiment of the present invention;
fig. 6-i is a schematic structural diagram of another transmitting module according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a composition structure of a terminal to which the method for controlling permission provided by the embodiment of the present invention is applied.
Detailed Description
The embodiment of the invention provides a permission control method and device, which are used for realizing interaction with a user during permission control and improving participation enthusiasm of the user.
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the embodiments described below are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments that can be derived by one skilled in the art from the embodiments given herein are intended to be within the scope of the invention. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of elements is not necessarily limited to those elements, but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The following are detailed below.
One embodiment of the method for controlling the authority of the mobile device of the present invention may include: receiving an access request of a user to a network resource; sending an application relevance task to the user according to the access request, wherein the application relevance task is a task type which is required to be executed by the user and is associated with the application program and feeds back a task report according to an execution condition; acquiring a task report fed back by a user after executing the application relevance task; and if the task report indicates that the user successfully executes the application relevance task, granting the user the permission of allowing to access the network resource corresponding to the access request.
Referring to fig. 1, a method for controlling authority according to an embodiment of the present invention includes the following steps:
101. and receiving an access request of a user to the network resource.
In the embodiment of the invention, the network resource is used as an access object, an owner of the network resource can encrypt the network resource, and only a user who passes the authority verification can access the network resource. Specifically, the access request may carry a Uniform Resource Locator (URL) of a network Resource that the user needs to access, and the URL indicates the network Resource that the user requests to access when initiating the access request. For example, when a user requests to access a QQ space of a friend, an access request initiated by the user carries a URL of a network resource corresponding to the QQ space of the friend. In addition, the access request initiated by the user may also carry an Identity Identifier (ID) of the user, so as to distinguish multiple access requests initiated by different users.
102. And sending the application relevance task to the user according to the access request.
The application relevance task is a task type which needs to be executed by a user and feeds back a task report according to an execution condition and is associated with the application program.
In the embodiment of the present invention, an encryption manner of an application relevance task may be adopted for a network resource that a user requests to access, so as to implement authority control for the user, after receiving an access request initiated by the user, an application relevance task may be sent to the user according to the access request initiated by the user, specifically, the application relevance task may be sent to a terminal operated by the user, after receiving the application relevance task, the terminal operated by the user may display the application relevance task to the user on a terminal screen, and the user executes the application relevance task. The application relevance task refers to a task type which is required to be executed by a user and feeds back a task report according to an execution condition and is associated with an application program, namely an encryption mode which is required to judge whether to grant access permission according to an execution result of the user. The encryption mode of the network resources by applying the relevance task can interact with the user when the user executes, so that the participation enthusiasm of the user is improved, certain interest can be brought to the user, the user can wait for granting the authority in the decryption process more interestingly, the curiosity of the user is met, compared with the existing problem response verification mode, the encryption mode is more interesting and not dull, the enthusiasm of the user for participating in accessing the network resources can be improved, and the use experience of the user is improved.
In some embodiments of the present invention, after sending the application relevance task to the user, the user may execute the application relevance task, for example, the application relevance task is displayed on a terminal screen operated by the user, and the user executes the application relevance task on the terminal screen according to a task requirement of the application relevance task.
In some embodiments of the present invention, step 102 sends an application relevance task to the user based on the access request, including:
a1, setting an encryption note for network resources;
and A2, sending an audio relevance task to the user according to the access request, wherein the audio relevance task is a task type which is executed by the user to the audio application program and feeds back a task report according to the execution condition.
That is, the encrypted note for the network resource may be set in advance, and when the access request of the user is received, the audio correlation task is sent to the user, for example, the implementation form of the audio application may be a piano playing task, which will be described in detail in the following embodiments.
In other embodiments of the present invention, step 102 sends the application relevance task to the user according to the access request, including:
b1, setting an encrypted image for the network resource;
and B2, sending an image relevance task to the user according to the access request, wherein the image relevance task is a task type which is executed by the user to execute the image application program and feeds back a task report according to the execution condition.
That is, the encrypted image of the network resource may be set in advance, and when the access request of the user is received, the image correlation task is sent to the user, for example, the implementation form of the image application program may be a jigsaw task, a poker flipping task, a dice shaking task, or a finger guessing task, which will be described in detail in the following embodiments.
In other embodiments of the present invention, step 102 sends the application relevance task to the user according to the access request, including:
and C1, sending a game relevance task to the user according to the access request, wherein the game relevance task is a task type which is executed by the user to the game application program and feeds back a task report according to the execution condition.
That is, when receiving an access request from a user, a game relevance task is sent to the user, for example, the implementation form of the game application program may be a mine sweeping task and a box pushing task, which will be described in detail in the following embodiments.
Specifically, the application relevance task may set the content of the task and the task steps required to be performed by the user in combination with a specific usage scenario, and in practical applications, the application relevance task at least includes one of the following tasks:
(1) the puzzle task refers to using a puzzle game as an encryption mode, as shown in fig. 2-a, which is a schematic view of a setting mode of an application association task provided in an embodiment of the present invention, wherein a network resource owner indicated by a head portrait presents a puzzle encryption saying, the illustration shows the content of the puzzle encryption task to a user initiating an access request, and the user initiating the access request needs to execute the puzzle task, wherein the pattern used by the puzzle task may be a landscape, a head portrait of the network resource owner, or an arbitrary image, and the user initiating the access request completes decryption of the network resource requested to be accessed by executing the puzzle task, which is not a simple permission granted by waiting for authentication for the user, but has a certain interest for the user by executing the puzzle task, the method can better adapt to the requirements of users and improve the use experience of the users.
(2) The mine clearance task refers to that a mine clearance game is adopted as an encryption mode, as shown in fig. 2-b, the mine clearance task is another setting mode schematic diagram of an application relevance task provided by the embodiment of the invention, wherein a network resource owner pointed by a head portrait issues a mine clearance encryption statement, the mine clearance encryption task content is displayed in the diagram to a user initiating an access request, the user initiating the access request is required to execute the mine clearance task, the mine clearance game displayed to the user in the mine clearance task can set the completion difficulty of the mine clearance game according to the confidentiality degree of the network resource, for example, the mine clearance game with lower completion difficulty can be set when the confidentiality degree of the network resource is not required to be kept secret, and the mine clearance game with higher completion difficulty can be set when the confidentiality degree of the network resource is required to be kept secret. The user who initiates the access request completes the decryption of the network resource requested to be accessed through the execution of the minesweeping task, and the user does not simply wait for the verification to grant the authority, but the user has certain interest through the execution of the minesweeping task, so that the method can better adapt to the needs of the user, and the use experience of the user is improved.
(3) The poker flipping task refers to the poker flipping game as an encryption mode, as shown in fig. 2-c, another setting mode diagram of the application relevance task provided by the embodiment of the invention is shown, wherein the network resource owner pointed by the avatar posts a poker encryption statement, the diagram shows the task content of the poker encryption to the user initiating the access request, and the user needing to initiate the access request executes the poker guessing task, wherein the poker game displayed to the user in the poker flipping task can require the user to randomly flip one poker, for example, the user can select to flip one of the poker cards through mouse or keyboard operation, and the user can select to flip one of the poker cards through touch screen operation on a terminal screen. The user who initiates the access request completes the decryption of the network resource requested to be accessed through the execution of the poker turning task, the permission is not simply waited for verification and granted to the user, the user has certain interest through the execution of the poker turning task, the curious psychology of the user is met, the user can be better adapted to the needs of the user, and the use experience of the user is improved.
(4) The dice shaking task refers to a dice rolling game as an encryption mode, and is shown in fig. 2-d, which is a schematic diagram of another setting mode of an application relevance task provided in an embodiment of the present invention, wherein a network resource owner referred to by a head portrait posts a statement of dice shaking encryption, the content of the dice shaking encryption task is displayed to a user initiating an access request in the diagram, the user needing to initiate the access request executes the dice shaking task, a die is displayed on the left side in the diagram, the user needs to shake the dice when executing the dice shaking task, and points displayed on the face with the upward dice are used as a result of the user executing the dice shaking task. The user who initiates the access request completes the decryption of the network resource requested to be accessed through the execution of the swinging dice subtask, the permission is not simply waited for the user to verify and be granted, the user has certain interest through the execution of the swinging dice subtask, the curious psychology of the user can be met, the requirements of the user can be better adapted to, and the use experience of the user is improved.
(5) The finger-guessing task refers to using a finger-guessing game as an encryption mode, as shown in fig. 2-e, which is a schematic diagram of another setting mode of applying a relevance task provided in an embodiment of the present invention, wherein a network resource owner referred to by a head portrait issues a finger-guessing encryption statement, the content of the finger-guessing encryption task is displayed in the diagram to a user initiating an access request, the user initiating the access request is required to execute the finger-guessing task, a finger-guessing gesture is displayed on the left side in the diagram, the user can click a "finger-guessing" button on the right side in the diagram when executing the finger-guessing task, and the gesture used by the user for making a finger-guessing is used as a result of the user executing the finger-guessing task. The user who initiates the access request completes the decryption of the network resource requested to be accessed through the execution of the finger-guessing task, and the user does not simply wait for the verification to grant permission, but the user has certain interest through the execution of the finger-guessing task, so that the curious psychology of the user can be met, the user can be better adapted to the needs of the user, and the use experience of the user is improved.
(6) Playing a piano task refers to using a note corresponding to a pop-up key as an encryption mode, as shown in fig. 2-F, which is a schematic diagram of another setting mode of an application relevance task provided in the embodiment of the present invention, wherein a user of a avatar has a statement of encrypting music, the illustration shows the content of the task encrypted with music to the user initiating an access request, the user initiating the access request is required to execute the playing piano task, the illustration shows keys "C4", "D4", "E4", "F4", "G4", "a 4", "B4", "C5", "D5", "E5" of the piano, and the user can click on the keys in the illustration when executing the playing piano task, and the note represented by the key clicked by the user is used as a result of the user executing the playing piano task. The user who initiates the access request accomplishes the deciphering of the network resource of requesting access through the execution to playing the piano task, and this is not the pure permission of waiting for verification to grant to the user, and has certain interest through carrying out playing the piano task for the user, can satisfy user's curiosity, can better be adapted to user's needs, improves user's use experience.
It should be noted that, in the embodiment of the present invention, the above diagrams 2-a to 2-f are specific implementations of the application relevance task, and certainly, the application relevance task is not limited to the above application relevance task in a specific scenario application, and other application relevance tasks may be set according to personal preferences of the user, for example, the expression guessing task may be sent to the user, that is, multiple expressions, such as "smile", "surprise", "smile", and the like, are displayed to the user, the user who needs to initiate the access request performs the expression guessing task, and the user who initiates the access request needs to guess the mood of the owner of the network resource who says that is expressed by the QQ expression. As another example, the box pushing task may also be sent to the user, i.e., a box pushing game is displayed to the user, with the result of the user playing the box pushing game as the result of the user performing the box pushing task.
The above examples are just a few implementation ways of setting a task that can bring interest to a user, and other types of application-related tasks are also set according to the teachings of the embodiments of the present application, and are not exhaustive here. As can be seen from the above descriptions of the application relevance task, the user initiating the access request completes decryption of the network resource requested to be accessed through execution of the application relevance task, which is not a simple process for waiting for verification of the grant permission for the user, but has a certain interest for the user through execution of the application relevance task, and therefore, the curiosity of the user can be satisfied, the user can better adapt to the needs of the user, and the user experience is improved.
It should be noted that, in some embodiments of the present invention, the setting of the application relevance task may also be determined according to the ID attribute of the user himself, for example, it may be known that the user is interested in the intellectual game according to the ID attribute of the user who initiates the access request, and then after such user initiates the access request, the application relevance task that may be sent to the user may be a task related to the intellectual game, such as a box pushing task and a mine sweeping task, so as to be better adapted to the user of a specific attribute category, and further, for example, it may be known that the user is interested in the card game according to the ID attribute of the user himself, and then after such user initiates the access request, the application relevance task that may be sent to the user may be a task related to the card game, such as a poker task and a dice shaking task, so as to better meet the needs of the user, the user can not feel boring in the decryption process any more, but is more interesting.
It should be noted that, in some embodiments of the present invention, before the step 102 sends the application relevance task to the user according to the access request, the embodiments of the present invention may further include the following steps:
and judging whether the user is a white list object in the authority management list, and if the user is the white list object, triggering and executing the step 101 to send an application relevance task to the user according to the access request.
That is to say, in order to further implement the authority control on the network resource in the embodiment of the present invention, before sending the application relevance task to the user in step 101, it is further required to determine whether the user initiating the access request is a white list object in the authority management list, if the user is the white list object, the application relevance task is sent to the user, and if the user is not the white list object, the application relevance task is no longer sent to the user, and the access request of the user is directly rejected. Wherein, the authority management list records specific objects which allow the request to access the network resource, the users in the white list object can be granted authority preferentially, and the application relevance task can be received only after the users in the white list object initiate the access request. For example, a network resource owner in the QQ space may set "my friend", "send small", and "schoollength" in the group friends as users in the white list object, and if the user initiating the access request is not in the white list objects of the network resource owner, such as "my friend", "send small", and "schoollength", the application association task is not sent to the user, the access request of the user is directly rejected, and only the user that is checked by the white list object can receive the application association task.
It can be seen that, in the embodiment of the present invention, the verification of the white list object and the execution of the application relevance task are completed as the basis for granting the access right to the user, and the user in the white list object is not denied access, only the user authenticated by the white list can receive the application relevance task, only the user authenticated by the white list object and the application relevance task can be granted access right, compared with the existing methods of limiting access object, question reply verification, and the like, on the premise of ensuring the security of the network resource, the method can bring interest to the access of the user, so that the user can wait for verification with more interest in the process of being granted access right, satisfy the curiosity of the user, and if the user can successfully execute the application relevance task, the user can be granted access right to the network resource more actively, the use experience of the user is improved.
It should be noted that, in some embodiments of the present invention, the step 102 sends the application relevance task to the user according to the access request, and specifically includes the following steps:
displaying at least two application relevance tasks to a user;
receiving task selection information of the at least two application relevance tasks from a user;
and sending the application relevance task corresponding to the task selection information to the user.
That is to say, in the embodiment of the present invention, at least two application relevance tasks may be specifically sent to a terminal operated by a user, the terminal operated by the user displays a selection window of a plurality of application relevance tasks on a terminal screen to the user, the user determines which application relevance task needs to be executed, and after receiving task selection information of the user, it is possible to specify which application relevance task the user selects to be executed, so that the application relevance task corresponding to the task selection information may be sent to the user according to the task selection information of the user. Therefore, when the authority control is carried out, the user can select which application relevance task to use to carry out the authority control, the interaction with the user is realized, and the enthusiasm of the user for accessing network resources is improved.
Referring to fig. 3-a, a schematic diagram of another setting manner of an application relevance task provided by the embodiment of the present invention is shown, where a network resource owner may set which people allow to access its own network space, the network resource owner of the network space may set "partial people visible" and people who pass interesting permissions, and designate "friends visible", and four interesting permissions are displayed to a user in the diagram: thunderbolt encryption, box pushing encryption, piano encryption and expression encryption, if a user initiating an access request selects 'piano encryption', a "piano encrypted" game association task is sent to the user, and only the friends of the network resource owner are the users in the white list object, if a user other than the friends of the network resource owner initiates a request to access the network space, these users cannot be authenticated by the whitelist object and are denied access requests and, in addition, besides the network resource owner sets the friend visible, the network resource owner of the network space can further set the 'group friend visible', and selects "my friends", "universities", "teachers", "mechatronics", "schooler" among the group friends, fig. 3-b is a schematic diagram illustrating a setting manner of a white list object according to an embodiment of the present invention. For a user in the whitelist object who initiated the access request, an application relevance task, such as a "piano encrypted" application relevance task, would be received, and the user would need to perform the "piano encrypted" application relevance task.
103. And acquiring a task report fed back by a user after the application relevance task is executed.
In the embodiment of the present invention, after the application relevance task is sent to the user in step 102, the user executes the application relevance task and feeds back a task report, where the task report includes an execution result of the application relevance task by the user, and according to a difference of the application relevance task specifically set, the user needs to adopt a corresponding execution means, and the execution result of the user is recorded in the task report.
In some embodiments of the present invention, when the step 102 specifically adopts the implementation manner of the steps a1 and a2, the step 103 acquires a task report fed back by the user after executing the application relevance task, including:
note information selected by a user on a note interface of an audio application is received.
Then, in step 104, the task report indicates that the user successfully executes the application relevance task, which specifically includes:
the note information selected by the user on the note interface matches the encrypted note.
In some embodiments of the present invention, when the step 102 specifically adopts the implementation manner of the steps B1 and B2, the step 103 acquires a task report fed back by the user after executing the application relevance task, including:
and receiving image information selected by a user on an image interface of the image application program.
Then, in step 104, the task report indicates that the user successfully executes the application relevance task, which specifically includes:
the image information selected by the user on the image interface is matched with the encrypted image.
In some embodiments of the present invention, when the implementation manner of step C1 is specifically adopted in step 102, step 103 obtains a task report fed back by a user after executing the application relevance task, where the task report includes:
and receiving the execution condition of the game task corresponding to the game application program by the user.
Then, in step 104, the task report indicates that the user successfully executes the application relevance task, which specifically includes:
the user's performance of the game task indicates that the user has completed the game task.
For example, if the application relevance task is set as a "jigsaw task" as shown in fig. 2-a, after the user receives the jigsaw task, the user splices scattered blocks in the jigsaw task and feeds back the execution result of the jigsaw task by the user through a task report, if the application relevance task is set as a "mine sweeping task" as shown in fig. 2-b, after the user receives the mine sweeping task, the user searches for mines in the mine sweeping task and feeds back the execution result of the mine sweeping task by the user through the task report, for the "poker flipping task" as shown in fig. 2-c, the user can randomly select one of the poker cards and feed back which poker card is selected through the task report, for the "dice shaking task" as shown in fig. 2-d, the user can click a "one-stroke" button and feed back the number of points displayed on the face of the dice tilted up by the user through the task report, for the "guess punch task" shown in fig. 2-e, the user clicks the "punch" button and feeds back the user's gesture for punching a punch through the task report, and for the "pop piano task" shown in fig. 2-f, the user can randomly click any one of the keys on the piano and feed back the note represented by the key clicked by the user through the task report.
104. And if the task report indicates that the user successfully executes the application relevance task, granting the user the permission of allowing to access the network resource corresponding to the access request.
In the embodiment of the present invention, after the task report fed back by the user is obtained in step 103, whether the user successfully executes the application relevance task is determined according to the task report, and if yes, the user is granted the right to allow access to the network resource corresponding to the access request.
In some embodiments of the present invention, after acquiring the task report fed back by the user after executing the application relevance task, the step 103 further includes:
and if the task report indicates that the user fails to execute the application relevance task, refusing to grant the permission to the user.
That is, when the user fails to perform the application relevance task, the user may be denied access, which still may cause the user to be likely to be denied access when performing the application relevance task, which generally may cause the user to feel fun when performing the application relevance task.
In other embodiments of the present invention, after acquiring the task report fed back by the user after executing the application relevance task, step 103 further includes:
and if the task report indicates that the user fails to execute the application relevance task, prompting the user to execute the application relevance task again.
That is, when the user fails to perform the application relevance task, the user may perform the application relevance task again, which may correct the error made when the application relevance task was performed last time for the user, which may often cause the user's curiosity to retry, making the user feel fun when performing the application relevance task.
For example, if the application relevance task is set as a "jigsaw task" as shown in fig. 2-a, the determination of whether the application relevance task is successfully executed is determined according to whether the pattern shown in the jigsaw is restored to a complete pattern after the user executes the jigsaw task, if the original complete pattern is restored after the user performs the jigsaw, the user executes the jigsaw task successfully, and if the complete pattern cannot be restored after the user performs the jigsaw, the user fails to execute the jigsaw task.
If the relevance task is set as a mine sweeping task as shown in fig. 2-b, whether all mines in the mine sweeping task are found out after the user executes the mine sweeping task is judged, if all mines are found out after the user finishes mine sweeping, the mine sweeping task is successfully executed, and if all mines cannot be found out in the mine sweeping, the mine sweeping task is failed.
For the 'poker flipping task' shown in fig. 2-c, the user randomly selects one of the poker cards and feeds back which poker card is selected by the user through the task report, if the selected poker card is set to be the spade A, the poker flipping task is successfully executed, only if the poker card selected by the user is the spade A, the poker card flipping task is successfully executed by the user, and when the user selects the other poker cards, the poker card flipping task is failed by the user.
For the "shake dice subtask" shown in fig. 2-d, the user may click the "shake" button, and feedback the number of points displayed on the face of the user on which the shake dice faces upward through the task report, if the number of the set dice points is 6 points, it indicates that the shake dice subtask is successfully executed, only if the number of the user-shaken dice is 6 points, it indicates that the user-shaken dice subtask is successfully executed, and if the number of the user-shaken dice is 5 or less, it indicates that the user-shaken dice subtask is failed.
For the "guessing boxing task" shown in fig. 2-e, the user clicks the "guess boxing" button and feeds back the gesture used by the user for punching a fist through the task report, if the gesture used for punching a fist is set to be scissors, the guessing boxing task is successfully executed, only if the gesture used for punching a fist by the user is the scissors, the guessing boxing task is successfully executed by the user, and if the gesture used for punching a fist by the user is a stone or cloth, the guessing boxing task is failed by the user.
For the "piano playing task" shown in fig. 2-f, the user can randomly click any one of the keys on the piano, and feedback the note represented by the key clicked by the user through the task report, and if the key pair D4 is set to indicate that the piano playing task is successfully executed, only the key corresponding to the note popped up by the user is D up to D4, which indicates that the user successfully executes the piano playing task.
In some embodiments of the present invention, after step 104 grants the user the right to allow access to the network resource corresponding to the access request, the following steps may be further included:
and sending friend suggestion request information to an owner of the network resource, wherein the friend suggestion request information is suggestion information added as a friend by a user who successfully executes the application relevance task.
After the user successfully executes the application relevance task, friend suggestion request information can be sent to the owner of the network resource so as to suggest the owner of the network resource to add the user successfully executing the application relevance task as a friend, and therefore friend management can be conveniently performed on the owner of the network resource, and the friend can be conveniently added.
As can be seen from the above description of the embodiments of the present invention, an access request initiated by a user for a network resource is received, and then an application relevance task is sent to the user according to the access request, where the application relevance task is a task type associated with an application program and needs to be executed by the user and feeds back a task report according to an execution condition, the task report fed back by the user is received after the user executes the application relevance task, and if the user executes the application relevance task successfully, a right to allow access to the network resource corresponding to the access request is granted to the user. The access authority control of the user is realized by whether the user can complete the application relevance task or not, the user is required to execute the task in the authority control process of the user and feed back a task report according to the execution condition, the user can participate in the whole process of using the application relevance task to decide whether to grant authority to the user or not, the user is more interested in waiting for verification in the process of being granted the authority, the curiosity of the user is met, the authority can be granted if the user can successfully execute the application relevance task, the interaction with the user is realized in the authority control process, the user can more actively participate in the access of network resources, and the use experience of the user is improved.
In order to better understand and implement the above-mentioned schemes of the embodiments of the present invention, the following description specifically illustrates corresponding application scenarios.
Referring to fig. 4, which is a schematic diagram illustrating another setting manner of applying a correlation task in an embodiment of the present invention, a user a initiates an access request to a network space of a network resource owner a, a program server in the network space sends a piano playing task to the user a according to the access request initiated by the user a, the user a can be allowed to enter the network space of the network resource owner a only by popping up a correct note, the visitor user a can click the pop-up note on a keyboard with a mouse, the program server obtains a task report fed back by the user a after executing the piano playing task, and only when the user a pops up the correct note set by the network resource owner a, the program server grants the user a an authority to allow access the network space of the network resource owner a, allowing the user a to directly enter the space, and when the user a pops up an incorrect note, and the program server feeds back the note error to the user A, refuses the user A to access the network space of the network resource owner A, or prompts the user A to re-execute the piano playing task when the user A pops up the wrong note, allows the user A to pop up the note again and carry out verification, and allows the user A to access the network space of the network resource owner A if the note is correct.
The following description of the method for controlling the right by taking the content of the "say" of the user B requesting to access the network resource owner B as an example mainly includes the following steps:
s01, when the network resource owner B issues a "say," one encryption mode may be selected, for example, a minesweeping encryption mode is selected, please refer to fig. 5-a, which is a schematic diagram of an implementation mode for setting an application relevance task as a minesweeping encryption mode in an embodiment of the present invention.
S02, the user B initiates an access request to the network resource owner B, and the request to access the network resource is the "say" content published by the network resource owner B at a certain time, and after the "say" is published by the network resource owner B, the content is in an encrypted state, and sends a minesweeping task to the user B, and the content can be seen only after completing the minesweeping game, please refer to fig. 5-B, which is a schematic diagram of an implementation manner of sending a minesweeping task to the user B according to an embodiment of the present invention.
S03, the user B may directly perform a mine sweeping operation on the dynamic state, please refer to fig. 5-c, which is a schematic diagram of an implementation manner for the user B to execute a mine sweeping task according to an embodiment of the present invention.
And S04, feeding back a task report to the network resource owner B after the user B executes the mine sweeping task, if the user B successfully executes the mine sweeping task, continuing to execute the step S05, and if the user B fails to execute the mine sweeping task, continuing to execute the step S06.
S05, after the user B successfully completes the mine sweeping task, the content of the utterance published by the network resource owner B can be viewed, please refer to fig. 5-d, which is a schematic diagram of an implementation manner for the user B to successfully execute the mine sweeping task according to the embodiment of the present invention, and refer to fig. 5-e, which is a schematic diagram of an implementation manner for the user B to access the content of the utterance published by the network resource owner B after the user B is granted the right to access the content of the utterance according to the embodiment of the present invention.
S06, the user B does not complete the mine sweeping task, and the user B is prompted to fail and cannot view the content of the statement published by the network resource owner B.
It should be noted that, in some embodiments of the present invention, for the encryption process, after the network resource owner selects the encryption mode, the encryption mode may be called out through JavaScript, and the logic is determined to "display or open the object after completing this task". In the decryption process, after seeing the encrypted content, the friend can complete the application relevance task in the encryption mode, such as completing a picture splicing task and completing a thunder sweeping task, after success, the friend opens the object through JavaScript judgment, and if failure, the friend prompts the user that the failure is repeated. In practical applications, the implementation can be realized by using JavaScript, flash or html5+ css3, but the implementation can still be realized by using other programming modes.
As can be seen from the above description, an access request initiated by a user is received, an application relevance task is sent to the user according to the access request, where the application relevance task is a task type associated with an application program and needs to be executed by the user and feeds back a task report according to an execution condition, the task report fed back by the user is received after the user executes the application relevance task, and if the user executes the application relevance task successfully, a right allowing access to a network resource corresponding to the access request is granted to the user. The access authority control of the user is realized by whether the user can complete the application relevance task or not, the user is required to execute the task in the authority control process of the user and feed back a task report according to the execution condition, the user can participate in the whole process of using the application relevance task to decide whether to grant authority to the user or not, the user is more interested in waiting for verification in the process of being granted the authority, the curiosity of the user is met, the authority can be granted if the user can successfully execute the application relevance task, the interaction with the user is realized in the authority control process, the user can more actively participate in the access of network resources, and the use experience of the user is improved.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
To facilitate a better implementation of the above-described aspects of embodiments of the present invention, the following also provides relevant means for implementing the above-described aspects.
Referring to fig. 6-a, an authority control apparatus 600 according to an embodiment of the present invention may include: a receiving module 601, a sending module 602, an obtaining module 603, and an authorizing module 604, wherein,
a receiving module 601, configured to receive an access request of a user for a network resource;
a sending module 602, configured to send an application relevance task to the user according to the access request, where the application relevance task is a task type associated with an application program that needs to be executed by the user and feeds back a task report according to an execution condition;
an obtaining module 603, configured to obtain a task report fed back by the user after executing the application relevance task;
an authorization module 604, configured to grant, to the user, a right allowing access to a network resource corresponding to the access request when the task report indicates that the user successfully executes the application relevance task.
In some embodiments of the present invention, referring to fig. 6-b, the right control apparatus 600 further includes: a forbidding module 605, configured to refuse to grant the permission to the user when the task report indicates that the user fails to execute the application relevance task.
In other embodiments of the present invention, referring to fig. 6-c, the right control apparatus further includes:
a prompting module 606, configured to prompt the user to re-execute the application relevance task when the task report indicates that the user fails to execute the application relevance task.
In some embodiments of the present invention, please refer to fig. 6-d, the apparatus for controlling authority further includes:
a white list determining module 607, configured to determine, before the sending module sends the application relevance task to the user according to the access request, whether the user is a white list object in an authority management list, and if the user is a white list object, trigger execution of the sending module.
In some embodiments of the present invention, please refer to fig. 6-e, the apparatus for controlling authority further includes:
a friend suggestion module 608, configured to send friend suggestion request information to an owner of the network resource after the authorization module 604 grants, to the user, a right to allow access to the network resource corresponding to the access request, where the friend suggestion request information is suggestion information that the user who successfully executes the application relevance task is added as a friend.
In some embodiments of the present invention, referring to fig. 6-f, the sending module 602 includes:
a multitask presentation sub-module 6021 for displaying at least two application relevance tasks to the user;
a task selection receiving submodule 6022, configured to receive task selection information of the user on the at least two application relevance tasks;
a task sending submodule 6023, configured to send an application relevance task corresponding to the task selection information to the user.
In other embodiments of the present invention, referring to fig. 6-g, the sending module 602 includes:
a note setting submodule 6024 configured to set an encrypted note for the network resource;
and the audio task sending submodule 6025 is configured to send an audio relevance task to the user according to the access request, where the audio relevance task is a task type in which the user executes an audio application program and feeds back a task report according to an execution condition.
The obtaining module 603 is specifically configured to receive note information selected by the user on a note interface of the audio application;
the task report indicates that the user successfully executes the application relevance task, and specifically includes:
the note information selected by the user on the note interface is matched with the encrypted note.
In other embodiments of the present invention, referring to fig. 6-h, the sending module 602 includes:
an image setting submodule 6026 configured to set an encrypted image for the network resource;
the image task sending submodule 6027 is configured to send an image relevance task to the user according to the access request, where the image relevance task is a task type in which the user executes an image application program and feeds back a task report according to an execution condition.
The obtaining module 603 is specifically configured to receive image information selected by the user on an image interface of the image application program;
the task report indicates that the user successfully executes the application relevance task, and specifically includes:
and the image information selected by the user on the image interface is matched with the encrypted image.
In other embodiments of the present invention, referring to fig. 6-i, the sending module 602 includes:
a game task sending submodule 6028, configured to send a game relevance task to the user according to the access request, where the game relevance task is a task type in which the user executes a game application program and feeds back a task report according to an execution condition;
the obtaining module 603 is specifically configured to receive an execution situation of a game task corresponding to the game application program by the user;
the task report indicates that the user successfully executes the application relevance task, and specifically includes:
the user's performance of the game task indicates that the user has completed the game task.
Specifically, the application relevance task sent by the sending module 602 at least includes one of the following tasks: a puzzle task, a mine sweeping task, a poker flipping task, a dice shaking task, a fist guessing task, a piano playing task, an expression guessing task, or a box pushing task.
As can be seen from the description of the embodiment, first, the receiving module receives an access request initiated by a user for a network resource, then the sending module sends an application relevance task to the user according to the access request, where the application relevance task is a task type associated with an application program and needs to be executed by the user and feeds back a task report according to an execution condition, and after the obtaining module user executes the application relevance task, the receiving module receives the task report fed back by the user, and if the user executes the application relevance task successfully, the authorization module grants an authority to allow the user to access the network resource corresponding to the access request. The access authority control of the user is realized by whether the user can complete the application relevance task or not, the user is required to execute the task in the authority control process of the user and feed back a task report according to the execution condition, the user can participate in the whole process of using the application relevance task to decide whether to grant authority to the user or not, the user is more interested in waiting for verification in the process of being granted the authority, the curiosity of the user is met, the authority can be granted if the user can successfully execute the application relevance task, the interaction with the user is realized in the authority control process, the user can more actively participate in the access of network resources, and the use experience of the user is improved.
It should be noted that, because the contents of information interaction, execution process, and the like between the modules/units of the apparatus are based on the same concept as the method embodiment of the present invention, the technical effect brought by the contents is the same as the method embodiment of the present invention, and specific contents may refer to the description in the foregoing method embodiment of the present invention, and are not described herein again.
The following description is mainly given by taking the permission control method of the embodiment of the present invention as an example, and the terminal may include a smart phone, a tablet computer, an e-book reader, a Moving Picture Experts Group Audio Layer III (MP 3) player, a Moving Picture Experts Group Audio Layer IV (MP 4) player, a laptop computer, a desktop computer, and the like.
Referring to fig. 7, a schematic structural diagram of a terminal according to an embodiment of the present invention is shown, specifically:
the terminal may include Radio Frequency (RF) circuitry 20, memory 21 including one or more computer-readable storage media, input unit 22, display unit 23, sensor 24, audio circuitry 25, wireless fidelity (WiFi) module 26, processor 27 including one or more processing cores, and power supply 28. Those skilled in the art will appreciate that the terminal structure shown in fig. 7 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. Wherein:
RF circuit 20 may be used for receiving and transmitting signals during a message transmission or call, and in particular, for receiving downlink information from a base station and processing the received downlink information by one or more processors 27; in addition, data relating to uplink is transmitted to the base station. In general, the RF circuitry 20 includes, but is not limited to, an antenna, at least one Amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuit 20 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The memory 21 may be used to store software programs and modules, and the processor 27 executes various functional applications and data processing by operating the software programs and modules stored in the memory 21. The memory 21 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the terminal, etc. Further, the memory 21 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 21 may further include a memory controller to provide the processor 27 and the input unit 22 access to the memory 21.
The input unit 22 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. In particular, in one particular embodiment, the input unit 22 may include a touch-sensitive surface 221 as well as other input devices 222. The touch-sensitive surface 221, also referred to as a touch screen or a touch pad, may collect touch operations by a user on or near the touch-sensitive surface 221 (e.g., operations by a user on or near the touch-sensitive surface 221 using a finger, a stylus, or any other suitable object or attachment), and drive the corresponding connection device according to a predetermined program. Alternatively, the touch sensitive surface 221 may comprise two parts, a touch detection means and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 27, and can receive and execute commands sent by the processor 27. In addition, the touch-sensitive surface 221 may be implemented in various types, such as resistive, capacitive, infrared, and surface acoustic wave. The input unit 22 may comprise other input devices 222 in addition to the touch sensitive surface 221. In particular, other input devices 222 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 23 may be used to display information input by or provided to the user and various graphical user interfaces of the terminal, which may be made up of graphics, text, icons, video, and any combination thereof. The Display unit 23 may include a Display panel 231, and optionally, the Display panel 231 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch-sensitive surface 221 may overlay the display panel 231, and when a touch operation is detected on or near the touch-sensitive surface 221, the touch operation is transmitted to the processor 27 to determine the type of touch event, and then the processor 27 provides a corresponding visual output on the display panel 231 according to the type of touch event. Although in FIG. 7 the touch-sensitive surface 221 and the display panel 231 are implemented as two separate components for input and output functions, in some embodiments the touch-sensitive surface 221 and the display panel 231 may be integrated for input and output functions.
The terminal may also include at least one sensor 24, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel 231 according to the brightness of ambient light, and a proximity sensor that may turn off the display panel 231 and/or the backlight when the terminal is moved to the ear. As one type of motion sensor, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, can be used for applications for identifying the gesture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration identification related functions (such as pedometer and knocking) and the like, and can be further configured with a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor and other sensors, which are not described herein again.
Audio circuitry 25, speaker 251, microphone 252 may provide an audio interface between the user and the terminal. The audio circuit 25 can transmit the electrical signal converted from the received audio data to the speaker 251, and the electrical signal is converted into a sound signal by the speaker 251 and output; on the other hand, the microphone 252 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 25, and then processes the audio data output processor 27, and then sends the audio data to, for example, another terminal via the RF circuit 20, or outputs the audio data to the memory 21 for further processing. The audio circuit 25 may also include an earbud jack to provide communication of peripheral headphones with the terminal.
WiFi belongs to short-distance wireless transmission technology, and the terminal can help the user to send and receive e-mail, browse web pages, access streaming media and the like through the WiFi module 26, and provides wireless broadband internet access for the user. Although fig. 7 shows the WiFi module 26, it is understood that it does not belong to the essential constitution of the terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 27 is a control center of the terminal, connects various parts of the entire mobile phone by various interfaces and lines, and performs various functions of the terminal and processes data by operating or executing software programs and/or modules stored in the memory 21 and calling data stored in the memory 21, thereby performing overall monitoring of the mobile phone. Alternatively, processor 27 may include one or more processing cores; preferably, the processor 27 may integrate an application processor, which primarily handles operating systems, user interfaces, application programs, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 27.
The terminal also includes a power supply 28 (e.g., a battery) for powering the various components, which may be logically connected to the processor 27 via a power management system that may be used to manage charging, discharging, and power consumption. The power supply 28 may also include any component of one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
Although not shown, the terminal may further include a camera, a bluetooth module, and the like, which will not be described herein. Specifically, in this embodiment, the display unit of the terminal is a touch screen display, and the memory 21 of the terminal may store the sampling time period, the sampling time interval, and the frame rate statistic value, similar to the above-mentioned database.
And one or more programs in the terminal of the present embodiment are stored in the memory 21 and configured to be executed by the one or more processors 27 as operation instructions included in the one or more programs. Specifically, an input unit receives an access request of a user for a network resource, a processor sends an application relevance task to the user according to the access request, wherein the application relevance task is a task type which needs to be executed by the user and feeds back a task report according to an execution condition and is associated with an application program, and the processor obtains the task report fed back by the user after the application relevance task is executed; and if the task report indicates that the user successfully executes the application relevance task, the processor grants the user the permission of allowing the user to access the network resource corresponding to the access request.
In some embodiments of the invention, the operating instructions executed by the processor further comprise: and after the task report fed back by the user after the application relevance task is executed is obtained, if the task report indicates that the user fails to execute the application relevance task, refusing to grant the permission to the user.
In some embodiments of the invention, the operating instructions executed by the processor further comprise: after the task report fed back by the user after the application relevance task is executed is obtained, if the task report indicates that the user fails to execute the application relevance task, the user is prompted to execute the application relevance task again.
In some embodiments of the invention, the operating instructions executed by the processor further comprise: before sending an application relevance task to the user according to the access request, judging whether the user is a white list object in an authority management list, and if the user is the white list object, triggering to execute the following steps: and sending an application relevance task to the user according to the access request.
In some embodiments of the invention, the operating instructions executed by the processor further comprise: and after the user is granted the permission of allowing the access to the network resource corresponding to the access request, friend suggestion request information is sent to an owner of the network resource, and the friend suggestion request information is suggestion information that the user successfully executing the application relevance task is added as a friend.
In some embodiments of the invention, the processor sends an application relevance task to the user according to the access request, including: the display unit displays at least two application relevance tasks to the user, the input unit receives task selection information of the user on the at least two application relevance tasks, and the processor sends the application relevance tasks corresponding to the task selection information to the user.
In some embodiments of the invention, the processor sends an application relevance task to the user according to the access request, including: setting an encryption note for the network resource by the processor; the processor sends an audio relevance task to the user according to the access request, wherein the audio relevance task is a task type which is used by the user to execute an audio application program and feed back a task report according to an execution condition; the processor receives note information selected by the user on a note interface of the audio application through an audio circuit; the task report indicates that the user successfully executes the application relevance task, and specifically includes: the note information selected by the user on the note interface is matched with the encrypted note.
In some embodiments of the invention, the processor sends an application relevance task to the user according to the access request, including: the processor sets an encrypted image for the network resource; the processor sends an image relevance task to the user according to the access request, wherein the image relevance task is a task type which is used by the user to execute an image application program and feed back a task report according to an execution condition; a processor receives image information selected by the user on an image interface of the image application program; the task report indicates that the user successfully executes the application relevance task, and specifically includes: and the image information selected by the user on the image interface is matched with the encrypted image.
In some embodiments of the invention, the processor sends an application relevance task to the user according to the access request, including: the processor sends a game relevance task to the user according to the access request, wherein the game relevance task is a task type which is used by the user to execute a game application program and feed back a task report according to an execution condition; the processor receives the execution condition of the game task corresponding to the game application program by the user; the task report indicates that the user successfully executes the application relevance task, and specifically includes: the user's performance of the game task indicates that the user has completed the game task.
In the embodiment of the invention, an access request initiated by a user for a network resource is received, then an application relevance task is sent to the user according to the access request, wherein the application relevance task is a task type which is required to be executed by the user and is associated with an application program and feeds back a task report according to an execution condition, the task report fed back by the user is received after the user executes the application relevance task, and if the user executes the application relevance task successfully, the user is granted a right for allowing the access to the network resource corresponding to the access request. The access authority control of the user is realized by whether the user can complete the application relevance task or not, the user is required to execute the task in the authority control process of the user and feed back a task report according to the execution condition, the user can participate in the whole process of using the application relevance task to decide whether to grant authority to the user or not, the user is more interested in waiting for verification in the process of being granted the authority, the curiosity of the user is met, the authority can be granted if the user can successfully execute the application relevance task, the interaction with the user is realized in the authority control process, the user can more actively participate in the access of network resources, and the use experience of the user is improved.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable storage medium, and the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
While the method and apparatus for controlling authority provided by the present invention have been described in detail, those skilled in the art will appreciate that the embodiments and applications of the present invention are not limited thereto.

Claims (10)

1. An authority control method, comprising:
receiving an access request of a user to a network resource;
judging whether the user is a white list object in a permission management list or not;
if the user is a white list object, determining the interest of the user according to the ID attribute of the user, and sending an application relevance task related to the interest of the user to the user according to the access request; the application relevance task is a task type which needs to be executed by the user and feeds back a task report according to an execution condition and is relevant to the application program; the application relevance task comprises a game relevance task; the game relevance task is a task type which is used for the user to execute a game application program and feed back a task report according to an execution condition;
acquiring a task report fed back by the user after executing the application relevance task, wherein the task report comprises: receiving the execution condition of the game task corresponding to the game application program by the user;
if the task report indicates that the user successfully executes the application relevance task, granting the user permission to access the network resource corresponding to the access request; the task report indicating that the user successfully performed the application relevance task comprises: the user's performance of the game task indicates that the user has completed the game task; the completion difficulty of the game task is set according to the confidentiality degree of the network resource;
after the permission of allowing access to the network resource corresponding to the access request is granted to the user, friend suggestion request information is sent to an owner of the network resource, and the friend suggestion request information is suggestion information added as a friend by the user who successfully executes the application relevance task.
2. The method of claim 1, wherein after obtaining the task report fed back by the user after executing the application relevance task, further comprising:
if the task report indicates that the user fails to execute the application relevance task, refusing to grant the permission to the user;
or the like, or, alternatively,
and if the task report indicates that the user fails to execute the application relevance task, prompting the user to execute the application relevance task again.
3. The method of claim 1, wherein sending an application relevance task related to the user's interest to the user according to the access request comprises:
displaying at least two application relevance tasks to the user;
receiving task selection information of the user on the at least two application relevance tasks;
and sending the application relevance task corresponding to the task selection information to the user.
4. The method of claim 1, wherein sending an application relevance task related to the user's interest to the user according to the access request comprises:
setting an encrypted note for the network resource;
sending an audio relevance task to the user according to the access request, wherein the audio relevance task is a task type which is executed by the user to execute an audio application program and feeds back a task report according to an execution condition;
the obtaining of the task report fed back by the user after executing the application relevance task includes:
receiving note information selected by the user on a note interface of the audio application;
the task report indicates that the user successfully executes the application relevance task, and specifically includes:
the note information selected by the user on the note interface is matched with the encrypted note.
5. The method of claim 1, wherein sending an application relevance task related to the user's interest to the user according to the access request comprises:
setting an encrypted image for the network resource;
sending an image relevance task to the user according to the access request, wherein the image relevance task is a task type which is executed by the user to execute an image application program and feeds back a task report according to an execution condition;
the obtaining of the task report fed back by the user after executing the application relevance task includes:
receiving image information selected by the user on an image interface of the image application program;
the task report indicates that the user successfully executes the application relevance task, and specifically includes:
and the image information selected by the user on the image interface is matched with the encrypted image.
6. An authorization control device, comprising:
the receiving module is used for receiving an access request of a user to the network resource;
the sending module is used for determining the interest of the user according to the ID attribute of the user and sending an application relevance task related to the interest of the user to the user according to the access request; the application relevance task is a task type which needs to be executed by the user and feeds back a task report according to an execution condition and is relevant to the application program; the application relevance task comprises a game relevance task; the game relevance task is a task type which is used for the user to execute a game application program and feed back a task report according to an execution condition;
an obtaining module, configured to obtain a task report fed back by the user after executing the application relevance task, where the obtaining module includes: receiving the execution condition of the game task corresponding to the game application program by the user;
the authorization module is used for granting the user the permission of allowing the user to access the network resource corresponding to the access request when the task report indicates that the user successfully executes the application relevance task; the task report indicating that the user successfully performed the application relevance task comprises: the user's performance of the game task indicates that the user has completed the game task; the completion difficulty of the game task is set according to the confidentiality degree of the network resource;
a white list judging module, configured to judge whether the user is a white list object in an authority management list before the sending module sends the application relevance task to the user according to the access request, and trigger execution of the sending module if the user is the white list object;
and the friend suggestion module is used for sending friend suggestion request information to an owner of the network resource after the authorization module grants the permission of allowing the user to access the network resource corresponding to the access request, wherein the friend suggestion request information is suggestion information that the user successfully executing the application relevance task is added as a friend.
7. The apparatus of claim 6, wherein the right control apparatus further comprises:
a prohibition module, configured to refuse to grant the permission to the user when the task report indicates that the user fails to execute the application relevance task;
or the like, or, alternatively,
and the prompting module is used for prompting the user to execute the application relevance task again when the task report indicates that the user fails to execute the application relevance task.
8. The apparatus of claim 6, wherein the sending module comprises:
a multitask presentation sub-module for displaying at least two application relevance tasks to the user;
the task selection receiving submodule is used for receiving task selection information of the user on the at least two application relevance tasks;
and the task sending submodule is used for sending the application relevance task corresponding to the task selection information to the user.
9. The apparatus of claim 6, wherein the sending module comprises:
the note setting submodule is used for setting encrypted notes for the network resources;
the audio task sending submodule is used for sending an audio relevance task to the user according to the access request, wherein the audio relevance task is a task type which is executed by the user to execute an audio application program and feeds back a task report according to an execution condition;
the obtaining module is specifically configured to receive note information selected by the user on a note interface of the audio application;
the task report indicates that the user successfully executes the application relevance task, and specifically includes:
the note information selected by the user on the note interface is matched with the encrypted note.
10. The apparatus of claim 6, wherein the sending an application relevance task to the user according to the access request comprises:
the image setting submodule is used for setting an encrypted image for the network resource;
the image task sending submodule is used for sending an image relevance task to the user according to the access request, wherein the image relevance task is a task type which is executed by the user to execute an image application program and feeds back a task report according to an execution condition;
the acquisition module is specifically configured to receive image information selected by the user on an image interface of the image application program;
the task report indicates that the user successfully executes the application relevance task, and specifically includes:
and the image information selected by the user on the image interface is matched with the encrypted image.
CN201310672119.9A 2013-12-10 2013-12-10 Authority control method and device Active CN104700040B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310672119.9A CN104700040B (en) 2013-12-10 2013-12-10 Authority control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310672119.9A CN104700040B (en) 2013-12-10 2013-12-10 Authority control method and device

Publications (2)

Publication Number Publication Date
CN104700040A CN104700040A (en) 2015-06-10
CN104700040B true CN104700040B (en) 2021-08-03

Family

ID=53347140

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310672119.9A Active CN104700040B (en) 2013-12-10 2013-12-10 Authority control method and device

Country Status (1)

Country Link
CN (1) CN104700040B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105228016A (en) * 2015-09-30 2016-01-06 天脉聚源(北京)科技有限公司 A kind of method for authenticating of interactive television system and device
EP3214570A1 (en) * 2016-03-04 2017-09-06 Axis AB Method and device for delegating access rights
CN106873997A (en) * 2017-02-14 2017-06-20 北京奇虎科技有限公司 Puzzle type task-cycle control method and device
CN106851542B (en) * 2017-02-17 2020-05-08 武汉时代华声科技有限公司 Bluetooth pairing method and system for music equipment
CN110636093B (en) * 2018-06-25 2022-04-26 中兴通讯股份有限公司 Microservice registration and discovery method, microservice registration and discovery device, storage medium and microservice system
CN111314324B (en) * 2020-01-22 2022-02-25 北京达佳互联信息技术有限公司 Social relationship establishing method, device, terminal, server, storage medium and system
CN114726816B (en) * 2021-01-05 2023-06-06 腾讯科技(深圳)有限公司 Method and device for establishing association relationship, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102508914A (en) * 2011-11-17 2012-06-20 广州多益网络科技有限公司 Dating website sincerity testing task interaction system and method
CN103077354A (en) * 2013-02-19 2013-05-01 成都索贝数码科技股份有限公司 Method for controlling Windows file system access permissions
CN104579658A (en) * 2013-10-15 2015-04-29 深圳市腾讯计算机系统有限公司 Identity authentication method and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1933398B (en) * 2005-09-16 2011-10-19 腾讯科技(深圳)有限公司 Method and system for automatic right-discriminating plusing good friend in immediate communication
CN100589609C (en) * 2007-09-30 2010-02-10 中兴通讯股份有限公司 Method of implementing handset multimedia message firewall
FR2941312B1 (en) * 2009-01-19 2017-06-23 Cie Ind Et Financiere D'ingenierie Ingenico METHOD OF SECURING AN INTERFACE BETWEEN A USER AND AN APPLICATION, SYSTEM, TERMINAL AND CORRESPONDING COMPUTER PROGRAM PRODUCT.
CN101867581B (en) * 2010-06-08 2015-09-16 中兴通讯股份有限公司 A kind of device and method of pushing fresh news
CN102592088A (en) * 2011-12-28 2012-07-18 广东欧珀移动通信有限公司 Password setting and verifying method
CN103052054B (en) * 2012-12-18 2016-03-30 华为技术有限公司 A kind of method, apparatus and system determining user's accessing WLAN authority

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102508914A (en) * 2011-11-17 2012-06-20 广州多益网络科技有限公司 Dating website sincerity testing task interaction system and method
CN103077354A (en) * 2013-02-19 2013-05-01 成都索贝数码科技股份有限公司 Method for controlling Windows file system access permissions
CN104579658A (en) * 2013-10-15 2015-04-29 深圳市腾讯计算机系统有限公司 Identity authentication method and device

Also Published As

Publication number Publication date
CN104700040A (en) 2015-06-10

Similar Documents

Publication Publication Date Title
CN104700040B (en) Authority control method and device
CN104883358B (en) Interactive approach based on recommendation and device
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
WO2016107501A1 (en) Intelligent device control method and device
WO2019101015A1 (en) Audio data processing method and apparatus, and storage medium
US20150319173A1 (en) Co-verification method, two dimensional code generation method, and device and system therefor
WO2015180672A1 (en) Video-based interaction method, terminal, server and system
WO2015055095A1 (en) Identity authentication method and device and storage medium
US10993090B2 (en) Network access method, apparatus, and system
WO2015062462A1 (en) Matching and broadcasting people-to-search
WO2015043525A1 (en) Method, apparatus, and system for picture sharing
WO2015165283A1 (en) Photo check-in method, apparatus, and system
CN108475304B (en) Method and device for associating application program and biological characteristics and mobile terminal
CN108234124B (en) Identity verification method, device and system
JP6910300B2 (en) A method for displaying chat history records and a device for displaying chat history records
CN106255102B (en) Terminal equipment identification method and related equipment
WO2018095216A1 (en) Relationship chain processing method, terminal and storage medium
WO2018127048A1 (en) Data display method and device, and storage medium
CN109495638B (en) Information display method and terminal
CN104573437B (en) Information authentication method, device and terminal
CN104836716B (en) sorting method, device and system based on relation chain
CN108234113B (en) Identity verification method, device and system
EP3158715B1 (en) Method and apparatus for associating online accounts
US10419816B2 (en) Video-based check-in method, terminal, server and system
KR102263977B1 (en) Methods, devices, and systems for performing information provision

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant