CN105426743A - Account permission authorization method, account login method, server and client - Google Patents

Account permission authorization method, account login method, server and client Download PDF

Info

Publication number
CN105426743A
CN105426743A CN201510713640.1A CN201510713640A CN105426743A CN 105426743 A CN105426743 A CN 105426743A CN 201510713640 A CN201510713640 A CN 201510713640A CN 105426743 A CN105426743 A CN 105426743A
Authority
CN
China
Prior art keywords
account
key
mandate
client
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510713640.1A
Other languages
Chinese (zh)
Other versions
CN105426743B (en
Inventor
刘杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510713640.1A priority Critical patent/CN105426743B/en
Publication of CN105426743A publication Critical patent/CN105426743A/en
Application granted granted Critical
Publication of CN105426743B publication Critical patent/CN105426743B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Embodiments of the present invention disclose an account permission authorization method, an account login method, a server and a client. The account permission authorization method comprises: acquiring an authorization time when an account carrying out permission authorization; generating a temporary identification based on the account information and the authorization time, wherein the temporary identification can be used to use the account within the authorization time; and returning the temporary identification to the client.

Description

The permission grant method of account, account login method, server and client
Technical field
The present invention relates to areas of information technology art, particularly relate to a kind of permission grant method of account, account login method, server and client.
Background technology
Along with the development of network technology, people utilize network to carry out learning, work and the various activity such as life.When carrying out these and being movable, conveniently identify or be in security consideration, being usually directed to a lot of account.Such as, GID, the account of communication in time, the shopping account of shopping, the viewing account etc. of viewing video of game player.These accounts can identify and safety verification user on the one hand, also represent certain authority on the other hand simultaneously.
In order to ensure the safe handling of account, usually account and key are supported the use.But return in the use procedure of account occur a kind of account use or public.In the prior art, if desired using account, then need account and key together to tell and use user, after account is given back, in order to ensure the security of account, needing to reset key.But usually some user can forget change key or account and key transmission and use in process problems such as again leaking outside.If use user during use account, privately reset key, this phenomenon that account owner will be caused to use.
Summary of the invention
In view of this, the embodiment of the present invention is expected to provide a kind of permission grant method of account, account login method, server and client, to solve other people problem of complex operation of using of account mandate at least partly.
For achieving the above object, technical scheme of the present invention is achieved in that
The permission grant method of a kind of account that embodiment of the present invention first aspect provides, described method comprises:
Obtain the mandate time that account carries out permission grant;
Based on information and the described mandate time of described account, generate temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Described temporary mark is returned to client.
Based on such scheme, the described information based on described account and described mandate time, generate temporary mark, comprising:
What obtain account logs in key;
Log in key and described mandate time based on described, generate and log in key temporarily.
Based on such scheme, describedly log in key and described mandate time based on described, generate and log in key temporarily, comprising:
The validity of key is logged in described in checking;
If described in log in key effective, then log in key and described mandate time described in combining, generate and describedly log in key temporarily.
Based on such scheme, log in key if described effective, then log in key and described mandate time described in combining, generate and describedly log in key temporarily, comprising:
What obtain described account logs in key;
In conjunction with described in log in key, the described mandate time and described in log in key, generate and describedly log in key temporarily;
Described log in temporarily key also for based on described log in temporarily key obtain described in log in key.
Based on such scheme, the described information based on described account and described mandate time, generate temporary mark, comprising:
Obtain authority record information;
Based on described authority record information, in conjunction with described account and described mandate time, generate described temporary mark.
Based on such scheme, described method also comprises:
Receive and record the authority information of the described account scope of authority;
Wherein, described temporary mark can also be used for the index inquiring about described authority information.
Based on such scheme, described acquisition account carries out the mandate time of permission grant, comprising:
The mandate instruction formed from the first client or mandate feedback, extract the mandate time of described account;
Wherein, described mandate is fed back to the feedback information that the first client is formed based on the authorization requests of the second client.
Embodiment of the present invention second aspect provides a kind of permission grant method of account, and described method comprises:
Obtain the mandate time;
The information of account and mandate time are sent to server;
The information of reception server based on described account and the temporary mark of generation of described mandate time; Wherein, described temporary mark can be used in using described account within the described mandate time;
The authorization message generated based on described temporary mark is sent to the second client.
Based on such scheme, described the information of account and mandate time are sent to server, comprising:
First client utilizes and logs in key login account, obtains and logs in key;
Key is logged in and the described mandate time sends to server by described;
The information of described reception server based on described account and the temporary mark of generation of described mandate time, comprising:
Receive described server based on described log in that key and described mandate time generates log in key temporarily.
Based on such scheme, described method also comprises:
Based on user's instruction, form the authority information of the described account scope of authority;
Described authority information is sent to described server;
Described reception server, based on the described temporary mark logging in key and the generation of described mandate time, comprising:
Receive described server based on the described described temporary mark logging in key, described mandate time and described authority information and generate.
Based on such scheme, described method comprises:
Based on user's instruction, send described mandate instruction to described server;
The described acquisition mandate time, comprising:
The human-computer interaction interface of described first client is utilized to receive the described mandate time.
Based on such scheme, receive the authorization requests that the second client sends;
The described acquisition mandate time, comprising:
The mandate time of the second client-requested mandate is extracted from described authorization requests;
Described method also comprises:
Mandate feedback is sent to described second client and/or server based on user's instruction.
The embodiment of the present invention third aspect provides a kind of permission grant method of account, and described method comprises:
Obtain the information of the account of requested mandate;
Obtain the mandate time;
Based on information and the described mandate time of described account, send authorization requests to the first client;
Receive the temporary mark forming the mandate to account based on described authorization requests; Described temporary mark can be used for the second client and use described account within the described mandate time.
Based on such scheme, described reception forms the temporary mark of the mandate to account based on described authorization requests, comprising:
Receive the mandate feedback that the first client sends based on authorization requests;
Described mandate feedback is sent to server;
Receive described server based on described temporary mark of authorizing feedback to be formed.
Embodiment of the present invention fourth aspect provides a kind of account login method, and described method comprises:
Obtain temporary mark;
Resolve described temporary mark, obtain information and the time of mandate of account;
If within the described mandate time, based on described account log described in account.
Based on such scheme, described temporary mark comprises and logs in key temporarily;
The described temporary mark of described parsing, obtains information and the time of mandate of account, comprising:
Resolve and describedly log in key temporarily, what obtain account logs in key and mandate time;
If described within the described mandate time, based on described account log described in account, comprising:
If current time is within the described mandate time, then log in described account based on the described key that logs in.
Based on such scheme, described acquisition temporary mark, comprising:
Receive the authorization message comprising described temporary mark that the first client sends;
Or,
The described temporary mark that reception server sends.
Embodiment of the present invention fourth aspect provides a kind of server, and described server comprises:
First acquiring unit, carries out the mandate time of permission grant for obtaining account;
Generation unit, for based on the information of described account and described mandate time, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Transmitting element, for returning to client by described temporary mark.
Based on such scheme, described generation unit, comprising:
First acquisition module, logs in key for what obtain account;
Generation module, for logging in key and described mandate time based on described, generating and logging in key temporarily.
Based on such scheme, described generation module, specifically for logging in the validity of key described in verifying; And if described in log in key effective, then log in key and described mandate time described in combining, generate and describedly log in key temporarily.
Based on such scheme, described generation module, also logs in key specifically for what obtain described account; In conjunction with described in log in key, the described mandate time and described in log in key, generate and describedly log in key temporarily;
Described log in temporarily key also for based on described log in temporarily key obtain described in log in key.
Based on such scheme, described generation unit, specifically for obtaining authority record information; Based on described authority record information, in conjunction with described account and described mandate time, generate described temporary mark.
Based on such scheme, described server also comprises:
Communication memory unit, for receiving and recording the authority information of the described account scope of authority;
Wherein, described temporary mark can also be used for the index inquiring about described authority information.
Based on such scheme,
Described first acquiring unit, the mandate specifically for being formed from the first client indicates or authorizes feedback, extracts the mandate time of described account;
Wherein, described mandate is fed back to the feedback information that the first client is formed based on the authorization requests of the second client.
The embodiment of the present invention the 5th aspect provides a kind of client, described client is the first client, and described first client comprises:
Second acquisition unit, for obtaining the mandate time;
First transmitting element, for sending to server by the information of account and mandate time;
First receiving element, for the information of reception server based on described account and the temporary mark of generation of described mandate time; Wherein, described temporary mark can be used in using described account within the described mandate time;
Described first transmitting element, also for sending the authorization message generated based on described temporary mark to the second client.
Based on such scheme, described first transmitting element, utilizes specifically for the first client and logs in key login account, obtain and log in key; Key is logged in and the described mandate time sends to server by described;
Described first receiving element, specifically for receive described server based on described log in that key and described mandate time generates log in key temporarily.
Based on such scheme, described first receiving element, also for receiving the authorization requests that the second client sends;
Described second acquisition unit, specifically for extracting the mandate time of the second client-requested mandate from described authorization requests;
Described first transmitting element, also for sending mandate feedback based on user's instruction to described second client and/or server.
The embodiment of the present invention the 5th aspect provides a kind of client, and described client is the second client, and described second client comprises:
3rd acquiring unit, for obtaining the information of the account of requested mandate;
4th acquiring unit, for obtaining the mandate time;
Second transmitting element, for based on the information of described account and described mandate time, sends authorization requests to the first client;
Second receiving element, for receiving the temporary mark forming the mandate to account based on described authorization requests; Described temporary mark can be used for the second client and use described account within the described mandate time.
Based on such scheme, described second receiving element, specifically for receiving the mandate feedback that the first client sends based on authorization requests;
Described second transmitting element, also for described mandate feedback is sent to server;
Described second receiving element, also specifically for receiving described server based on described temporary mark of authorizing feedback to be formed.
The embodiment of the present invention the 6th aspect provides a kind of client, and described client comprises:
5th acquiring unit, for obtaining temporary mark;
Resolution unit, for resolving described temporary mark, obtains information and the time of mandate of account;
Login unit, if within the described mandate time, based on described account log described in account.
Based on such scheme, described temporary mark comprises and logs in key temporarily;
Described resolution unit, describedly logs in key specifically for resolving temporarily, and what obtain account logs in key and mandate time;
Described login unit, if specifically for current time within the described mandate time, then logs in described account based on the described key that logs in.
The permission grant method of the account that the embodiment of the present invention provides, account login method, server and client, server passes through information and the time of mandate of account, the temporary mark for other users corresponding account within the mandate time can be generated, other users obtain this temporary mark like this, just can within the mandate time, log in this account and use this account.The owner of account does not worry that account number cipher is revealed and forgets the loaded down with trivial details of change password, improve account mandate intelligent, simplify user operation and improve the satisfaction that user carries out the mandate of account.
Accompanying drawing explanation
The schematic flow sheet of the permission grant method of the first account that Fig. 1 provides for the embodiment of the present invention;
The schematic flow sheet of the permission grant method of the second account that Fig. 2 provides for the embodiment of the present invention;
The schematic flow sheet of the permission grant method of the third account that Fig. 3 provides for the embodiment of the present invention;
The schematic flow sheet of the permission grant method of the 4th kind of account that Fig. 4 provides for the embodiment of the present invention;
The schematic flow sheet of a kind of account login method that Fig. 5 provides for the embodiment of the present invention;
The schematic flow sheet of the permission grant method of the 5th kind of account that Fig. 6 provides for the embodiment of the present invention;
The structural representation of a kind of server that Fig. 7 provides for the embodiment of the present invention;
The structural representation of a kind of first client that Fig. 8 provides for the embodiment of the present invention;
The structural representation of a kind of second client that Fig. 9 provides for the embodiment of the present invention;
The structural representation of the another kind of client that Figure 10 provides for the embodiment of the present invention.
Embodiment
Below in conjunction with Figure of description and specific embodiment technical scheme of the present invention done and further elaborate.
Embodiment one:
As shown in Figure 1, the present embodiment provides a kind of permission grant method of account, and described method comprises:
Step S110: obtain the mandate time that account carries out permission grant;
Step S120: based on information and the described mandate time of described account, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Step S130: described temporary mark is returned to client.
Account described in the present embodiment can comprise various account, the GID of such as game player, in time communications account, shopping account, the use account of video website, various types of account such as listen to the teacher account and learning account etc.Described timely communications account can as various communications account such as QQ account, micro-letter account and footpath between fields, footpath between fields accounts.The use account of described video website, as the paying account of Tengxun's video.
Method described in the present embodiment is for being applied in server.The described server of the present embodiment can be the account that above-mentioned account provides service, and above-mentioned various account carries out the account of registration and authorisation process.
The mandate time of authorizing is carried out in step S110 acquisition account.Here the mandate time be account owner account is lent to other people or with the time range of other people this account public.The usual described mandate time can be a time span or comprises a time period.This time period can comprise a start time and termination time.
In the present embodiment in described step S120 by based on the information of described account and described mandate time, generate temporary mark.This temporary mark can make other users except account owner, can use this account, but only can use this account in the time range of the time of mandate.
In the step s 120 based on account and the time of mandate, can be that identification information and mandate time carry out combined coding based on identification informations such as the account sequence of account or the titles of account, generate temporary mark.Identification information and mandate time can be extracted like this by the described temporary mark of decoding.
Like this, outside the time beyond the mandate time, other users beyond account cannot use this account, avoid the leakage directly account and key being given to the key that other users cause.And the temporary mark provided, other users can be avoided like this to revise key and to cause account owner cannot use the phenomenon of account, and by the setting of mandate time, account owner can be avoided to forget amendment key, cause other people can indefinite use account.
Such as, user A wants the QQ account B using user B.The mandate time that server is asked according to user A, or the mandate time of account B input, based on account B and the time of mandate, generate described temporary mark.If user A utilizes temporary mark login account B, account B can be utilized to carry out QQ communication, comprise and conversing with the QQ good friend of account B, utilize account B to check the operations such as QQ account recommendation information.
In a word, the permission grant method of the account described in the present embodiment, can ensure account lend or public, improve the security of account, simplify user operation, improve the intelligent of account mandate, improve user's user satisfaction.
Embodiment two:
As shown in Figure 1, the present embodiment provides a kind of permission grant method of account, and described method comprises:
Step S110: obtain the mandate time that account carries out permission grant;
Step S120: based on information and the described mandate time of described account, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Step S130: described temporary mark is returned to client.
As shown in Figure 2, described step S120 can comprise:
Step S121: what obtain account logs in key;
Step S122: log in key and described mandate time based on described, generates and logs in key temporarily.
In the present embodiment, described temporary mark is for log in key temporarily.
Describedly log in key to can be server be the information of server in account server-assignment when registering, account to be logged in by key or the operation such as communication time, server will log in key and verify, like this, to guarantee the safety in utilization of account this.
Generate in step S120 in the present embodiment temporary mark be utilize account log in key.The temporary mark generated in the present embodiment is also log in key temporarily.
Described log in temporarily can to obtain described account after key is resolved log in key, then other users utilize this to log in key when logging in temporarily, log in key temporarily and can send to server and log in key, and then log in by resolving.
Present embodiments provide in a kind of permission grant process of account, how to utilize the key that logs in of account to generate temporary mark, realize fast and convenient mandate.
Embodiment three:
As shown in Figure 1, the present embodiment provides a kind of permission grant method of account, and described method comprises:
Step S110: obtain the mandate time that account carries out permission grant;
Step S120: based on information and the described mandate time of described account, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Step S130: described temporary mark is returned to client.
As shown in Figure 2, described step S120 can comprise:
Step S121: what obtain account logs in key;
Step S122: log in key and described mandate time based on described, generates and logs in key temporarily.
Described step S122 can comprise:
The validity of key is logged in described in checking;
If described in log in key effective, then log in key and described mandate time described in combining, generate and describedly log in key temporarily.
First the validity of key will be logged in described in checking in the present embodiment, here the validity logging in key described in checking comprise the described account of checking whether log in key correct, whether correct with the binding relationship of described account, described in log in key whether to wait within effective time in checking at least one of them.
Described log in key effective time, in conjunction with described in log in key and described mandate time, generate and describedly log in key temporarily.Here combination logs in key and described mandate time, can comprise logging in key and described mandate time described in utilization and carrying out combined coding and form interim login account.Here combined coding can comprise and converts corresponding sequence to by logging in key and mandate time, then by the logical operation between sequence, generates new sequence.Namely the new sequence generated can be and describedly logs in key temporarily.Described logical operation can comprise xor operation, with the operation such as operation.Described logical operation can be the handling function realizing determining, can be the process etc. of one or more logical operation.
Log in the validation verification of key described in passing through in the present embodiment, the phenomenon that temporary mark (namely described temporarily log in key) can not be used for other user's successful log accounts can be reduced.
Embodiment four:
As shown in Figure 1, the present embodiment provides a kind of permission grant method of account, and described method comprises:
Step S110: obtain the mandate time that account carries out permission grant;
Step S120: based on information and the described mandate time of described account, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Step S130: described temporary mark is returned to client.
As shown in Figure 2, described step S120 can comprise:
Step S121: what obtain account logs in key;
Step S122: log in key and described mandate time based on described, generates and logs in key temporarily.
Described step S122 can comprise:
The validity of key is logged in described in checking;
If described in log in key effective, then log in key and described mandate time described in combining, generate and describedly log in key temporarily.
Log in key if described effective, then log in key and described mandate time described in combining, generate and describedly log in key temporarily, comprising:
What obtain described account logs in key;
In conjunction with described in log in key, the described mandate time and described in log in key, generate and describedly log in key temporarily;
Described log in temporarily key also for based on described log in temporarily key obtain described in log in key.
Here the key that logs in is the password that account logs in, and generally can be and prestore in the client, such client is when logging in, and Auto-writing logs in.The described information logging in key and manually can input at log-in interface for user is can the security of guarantee account to a certain degree.
In the present embodiment generate described log in key temporarily time, logging in key described in also introducing, like this, can be carry out combined coding by logging in key, mandate time and logging in key three, generates describedly to log in key temporarily.The described key that logs in can be other users and uses and log in key temporarily and carry out account and log in provide and log in key.Such as, the account of the first client is utilized the described key that temporarily logs in log in by the second client, described second client describedly logs in key by decoding temporarily, obtain account, the logging in key, log in key of account, second client utilizes account and logs in key and log in, and utilizes and log in key and carry out background authentication process.
In a word, by logging in the introducing of key in the present embodiment, the generation temporarily logging in key on the one hand increases according to factor, improve the difficulty logging in key temporarily and illegally cracked by disabled user, and the second client is when logging in, must account, log in key and log in key three correct and meet corresponding relation, just can log in, again improve the security of account.
Embodiment five:
As shown in Figure 1, the present embodiment provides a kind of permission grant method of account, and described method comprises:
Step S110: obtain the mandate time that account carries out permission grant;
Step S120: based on information and the described mandate time of described account, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Step S130: described temporary mark is returned to client.
Described step S120 can comprise:
Obtain authority record information;
Based on described authority record information, in conjunction with described in log in key and described mandate time, generate described temporary mark
Described authority record information can comprise the authority record information such as mandate number of times, mandate frequency of this account in the present embodiment.
In the present embodiment based on authority record information, generate described temporary mark.Like this, account is authorized after other people use each time, and authority record information all changes, thus carries out each time authorizing the temporary mark formed all different.Such as, the mandate account of carrying out authorizing is identical, the mandate time is identical, but also because of the change of authority record information, can form different temporary marks.Facilitate empowerment management and differentiation like this, avoid confusion; And introduce authority record information further to form described temporary mark, add the foundation factor of temporary mark so undoubtedly, add the difficulty that temporary mark is cracked, improve the security of account.
Method right described in the present embodiment, can in conjunction with any one embodiment above-mentioned
Embodiment six:
As shown in Figure 1, the present embodiment provides a kind of permission grant method of account, and described method comprises:
Step S110: obtain the mandate time that account carries out permission grant;
Step S120: based on information and the described mandate time of described account, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Step S130: described temporary mark is returned to client.
Described method also comprises:
Receive and record the authority information of the described account scope of authority;
Wherein, described temporary mark can also be used for the index inquiring about described authority information.
Receive in the present embodiment and record the authority information of the described account scope of authority.Such as, described account is communications account, beyond the communication authority that can comprise, also comprises the amendment authority of account information.This amendment authority can comprise the amendment of account head portrait, amendment user basic information etc.Described server also comprises receiving from client and recording instruction and carries out the authority information that the scope of authority carries out drawing a circle to approve in the present embodiment.
In the present embodiment described temporary mark can directly as inquiry described authority information index, also can described temporary mark be resolved after resolving information can be used as the index inquiring about described authority information, described authority information can be inquired about.
Authority information described in the embodiment of the present invention can combine with any one technical scheme in previous embodiment and use.Such as, receive and record authority information with utilizing and log in key and generate the scheme temporarily logging in key, be combined.In a word, this authority information limits be used for the use of other users to account, and other users forbidding beyond account owner utilize temporary mark to use authority outside the account scope of authority, prevent account by the abuse of other users, improve the safety in utilization of account.
Embodiment seven:
As shown in Figure 1, the present embodiment provides a kind of permission grant method of account, and described method comprises:
Step S110: obtain the mandate time that account carries out permission grant;
Step S120: based on information and the described mandate time of described account, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Step S130: described temporary mark is returned to client.
Described step S110 can comprise:
The mandate instruction formed from the first client or mandate feedback, extract the mandate time of described account;
Wherein, described mandate is fed back to the feedback information that the first client is formed based on the authorization requests of the second client.
Described mandate is designated as the information that the first client is formed under the active instruction of account owner, and this mandate instruction can be the mandate that instruction server carries out account.The described mandate time can be carried in described indication information in the present embodiment, and convenient service device obtains the mandate time needed for authorizing while carrying out authorizing according to described mandate instruction.
Also comprise another scheme in the present embodiment, the mandate feedback that can also be formed from the first client is authorized, described feedback of authorizing can be the mandate indicating server to carry out account equally, also carry the mandate time simultaneously, can server receive this mandate feedback after, be triggered and perform the mandate of account, from mandate feedback, extract the mandate time needed for authorizing simultaneously.It should be noted that gathering described mandate feedback at the present embodiment is send authorization requests to the first client, the feedback information that the first client is formed based on the second client authorization request by the second client.
Described authorize instruction to can be described server directly directly receives from the first client, and describedly authorizing feedback can be directly to receive from the first client, also can be from the second client reception.
Server is based on mandate instruction or authorize feedback to authorize, and directly from authorizing instruction or authorizing the scheme extracting the mandate time feedback, has and realize easy feature.
Embodiment eight:
As shown in Figure 3, the present embodiment provides a kind of permission grant method of account, and described method comprises:
Step S210: obtain the mandate time;
Step S220: the information of account and mandate time are sent to server;
Step S230: the information of reception server based on described account and the temporary mark of generation of described mandate time; Wherein, described temporary mark can be used in using described account within the described mandate time;
Step S240: send the authorization message generated based on described temporary mark to the second client.
The permission grant method of the account that the present embodiment provides, can be applicable in the first client.The terminal that described first client is run for needing the account with power of attorney of authorizing other users.
The step S210 acquisition mandate time can comprise the first client and obtain the authorization the time by receiving user's instruction, also can be described first client according to the mandate time in account authority record in the past, the mandate time determined voluntarily can certainly be the mandate time determined the time of the request of the second client be authorized to as required.
The information of the account described in step S220 is the relevant information of authorizing account, the account of such as described mandate account itself, the title of account, account to log in the information such as key one or more.
In step S230, the first client will receive server according to the information of account and the temporary mark of mandate time generation that send to server.This temporary mark may be the information of account and the information of the combined coding of the time of mandate formation.
First client itself obtains described temporary mark, needs forwarding or share to the authorized client of needs, so authorization message can be sent to the second client.Described second client can be directly described temporary mark, also can be the information generated according to described temporary mark; But this authorization message can be resolved out described temporary mark.Such as, described authorization message can be the bar code and/or figure and/or word that generate according to described temporary mark.Described bar code can comprise Quick Response Code or one-dimension code.Described figure can include the various figures of special marking.
Method described in the present embodiment, can facilitate the first client to carry out the mandate of account, simplifies Hang Hu operation, improves security and user's user satisfaction of account.
Embodiment nine:
As shown in Figure 3, the present embodiment provides a kind of permission grant method of account, and described method comprises:
Step S210: obtain the mandate time;
Step S220: the information of account and mandate time are sent to server;
Step S230: the information of reception server based on described account and the temporary mark of generation of described mandate time; Wherein, described temporary mark can be used in using described account within the described mandate time;
Step S240: send the authorization message generated based on described temporary mark to the second client.
Described step S220 can comprise:
First client utilizes and logs in key login account, obtains and logs in key;
Key is logged in and the described mandate time sends to server by described;
Described step S230 can comprise:
Receive described server based on described log in that key and described mandate time generates log in key temporarily.
The account obtained in the present embodiment log in key, together send to the information of the account of server for logging in key with the mandate time.
Also to be server log in key according to what log in that key and mandate time generates to the temporary mark received in the present embodiment temporarily.
Second client, by after authorization message, obtains after logging in key temporarily, can login account efficiently, and uses and correspond to the account that this logs in key temporarily; Method described in the present embodiment, has and realizes easy feature.
Embodiment ten:
As shown in Figure 3, the present embodiment provides a kind of permission grant method of account, and described method comprises:
Step S210: obtain the mandate time;
Step S220: the information of account and mandate time are sent to server;
Step S230: the information of reception server based on described account and the temporary mark of generation of described mandate time; Wherein, described temporary mark can be used in using described account within the described mandate time;
Step S240: send the authorization message generated based on described temporary mark to the second client.
Described method also comprises:
Based on user's instruction, form the authority information of the described account scope of authority;
Described authority information is sent to described server;
Described step S230 can comprise: receive described server based on the described described temporary mark logging in key, described mandate time and described authority information and generate.
Described user's instruction in the present embodiment can be the information received by the human-computer interaction interface of the first client.Such as, the user received by mouse, keyboard, contact panel, touch screen, suspension touch control screen or audio frequency interactive interface is indicated.Described user's instruction can be used for the authority information indicating the account scope of authority.Same account has multiple authority, and user only may want that carrying out some authority authorizes, therefore is indicated by this user, and instruction forms corresponding authority information.Such as, by dialog box or the information comprising authorization options in the first client, described user instruction can comprise and waits user to indicate based on the selection of described dialog box or choosing of described authorization options.
Like this, the mandate that account owner can not only be easy, and the scope of authority of account can be controlled, improve the control of user to the mandate of mandate account.
Embodiment 11:
As shown in Figure 3, the present embodiment provides a kind of permission grant method of account, and described method comprises:
Step S210: obtain the mandate time;
Step S220: the information of account and mandate time are sent to server;
Step S230: the information of reception server based on described account and the temporary mark of generation of described mandate time; Wherein, described temporary mark can be used in using described account within the described mandate time;
Step S240: send the authorization message generated based on described temporary mark to the second client.
Described method comprises:
Based on user's instruction, send described mandate instruction to described server;
Described step S210 can comprise:
The human-computer interaction interface of described first client is utilized to receive the described mandate time.
Described first client is based on user's instruction in the present embodiment, initiatively sends to server and authorizes instruction, indicate and carry out account mandate to other users.
The described mandate time in the present embodiment is also that described first client obtains from user's instruction that human-computer interaction interface receives.
Method described in the present embodiment, what the information for the formation of the account of described temporary mark can be account logs in key.The described temporary mark generated can be and logs in key temporarily.
In a word, account owner can initiatively utilize the first account to carry out Unsolicited Grant in the present embodiment, has the advantages that subscriber authorisation control is strong.
Embodiment 12:
As shown in Figure 3, the present embodiment provides a kind of permission grant method of account, and described method comprises:
Step S210: obtain the mandate time;
Step S220: the information of account and mandate time are sent to server;
Step S230: the information of reception server based on described account and the temporary mark of generation of described mandate time; Wherein, described temporary mark can be used in using described account within the described mandate time;
Step S240: send the authorization message generated based on described temporary mark to the second client.
Described method also comprises:
Receive the authorization requests that the second client sends;
Described step S210 can comprise:
The mandate time of the second client-requested mandate is extracted from described authorization requests;
Described method also comprises:
Mandate feedback is sent to described second client and/or server based on user's instruction.
Other users also can ask account owner to carry out account mandate in the present embodiment.Second client can send authorization requests to the first client.The mandate time can be carried in described authorization requests.First client according to the large user's instruction replying described authorization requests, can be formed and authorize feedback.This mandate feedback can comprise agreement and authorizes, and the mandate time is time of the second client-requested.This mandate feedback also can be authorized for agreeing to, but user's instruction is based on the mandate time of the second client-requested, upgrades the mandate time.This mandate feedback can be used for instruction server and account is licensed to other users use.Described mandate feedback is directly sent to server by described first client in the present embodiment, is authorized based on mandate feedback by server.Described mandate feedback also can be sent to the second client by described first client, the mandate sending to server to carry out account by the second client.Certain first client also can send to the second client and server simultaneously, server is directly authorized after receiving the mandate feedback of the first client transmission, second client just can inform that user first client have received authorization requests after receiving and authorizing feedback, and gives corresponding feedback.
In a word, the first client described in the present embodiment according to the acquisition request mandate time of the second client, and can provide mandate feedback, thus carries out the Intelligent treatment of the mandate of account.
Embodiment 13:
As shown in Figure 4, the present embodiment provides a kind of permission grant method of account, and described method comprises:
Step S310: the information obtaining the account of requested mandate;
Step S320: obtain the mandate time;
Step S330: based on information and the described mandate time of described account, sends authorization requests to the first client;
Step S340: receive the temporary mark forming the mandate to account based on described authorization requests; Described temporary mark can be used for the second client and use described account within the described mandate time.
Method described in the present embodiment can be the method be applied in the second client.Obtain the account information of the account of requested mandate in the present embodiment in step S310, such as, receive the account number of the account of requested mandate that user manually takes in, account number here can comprise the information such as title of account sequence, account.
The reception mandate time in step s 320, can comprise and receive user's instruction, determine the described mandate time according to user's instruction.Such as user input the mandate time be October 1 to October 15, or the mandate time be 15 days.Start at when the described mandate time is the moment that can obtain permission from mandate in 15 days.
Second client, by the information of account and the time of mandate, sends authorization requests to the first client.Certainly described first client is run the client having described account.
Next, the second client can receive the temporary mark obtained based on described authorization requests.This temporary mark can be that server directly sends, and also can be the temporary mark sent from the first client.Utilize this temporary mark second client can log in described account within the mandate time, use this account execution function within the scope of authority.
Like this, the second client described in the present embodiment can intelligence request use a certain account, improve account mandate intelligent, simplify user operation and improve user's user satisfaction.
Embodiment 14:
As shown in Figure 4, the present embodiment provides a kind of permission grant method of account, and described method comprises:
Step S310: the information obtaining the account of requested mandate;
Step S320: obtain the mandate time;
Step S330: based on information and the described mandate time of described account, sends authorization requests to the first client;
Step S340: receive the temporary mark forming the mandate to account based on described authorization requests; Described temporary mark can be used for the second client and use described account within the described mandate time.
Described step S340 can comprise:
Receive the mandate feedback that the first client sends based on authorization requests;
Described mandate feedback is sent to server;
Receive described server based on described temporary mark of authorizing feedback to be formed.
Described second client sends after authorization requests to the first client in the present embodiment, first client can respond described authorization requests and form mandate feedback, described second client can receive the mandate feedback that described first client is formed in the present embodiment, and the most described mandate feedback sends to server.Like this, described server, by according to described mandate of authorizing feedback finally to carry out account, forms temporary mark and sends to the second client.
The present embodiment, on the basis of a upper embodiment, has been specialized how to obtain described temporary mark, has been had and realize easy feature.
In concrete implementation procedure, described temporary mark can be and aforesaidly logs in key temporarily.This log in temporarily key be according to account log in that key and mandate time formed log in key temporarily.In step S340, final can be of reception logs in key temporarily like this.
Method described in the embodiment of the present invention, can facilitate the second client-requested first client to carry out the mandate of account, have and realize simple and efficient feature.
Embodiment 15:
As shown in Figure 5, the present embodiment provides a kind of account login method, and described method comprises:
Step S410: obtain temporary mark;
Step S420: resolve described temporary mark, obtains information and the time of mandate of account;
Step S430: if within the described mandate time, based on described account log described in account.
The second client is can be applicable to or other obtain the client of described temporary mark in the present embodiment.Temporary mark is obtained in the present embodiment in described step S410, the temporary mark of reception server or the transmission of other clients can be comprised, also can be the temporary mark of the display of client scan first client performing this method or the information based on temporary mark formation, obtain described temporary mark.
Described client will resolve temporary mark in the step s 420 in the present embodiment, obtain information and the time of mandate of account.The information of described account can comprise the information such as sequence or title of account.The described mandate time can be regarded as and can to log in based on this temporary mark and to use the time range of this account.If therefore in step S440 within the mandate time, then can based on this account of the log of this account.
Like this, logging in of the account described in the present embodiment, as lending side or the lessor of account, just account and password are not given to group then respectively, which enhance the security of account, simultaneously just can login account based on temporary mark, improve the simplicity that account logs in.
Embodiment 16:
As shown in Figure 5, the present embodiment provides a kind of account login method, and described method comprises:
Step S410: obtain temporary mark;
Step S420: resolve described temporary mark, obtains information and the time of mandate of account;
Step S430: if within the described mandate time, based on described account log described in account.
Described temporary mark comprises and logs in key temporarily;
Described step S420 can comprise: resolve and describedly log in key temporarily, and what obtain account logs in key and mandate time;
Described step S430 can comprise: if current time is within the described mandate time, then log in described account based on the described key that logs in.
In the present embodiment described temporary mark be according to described account log in key formed log in key temporarily.Resolve in the present embodiment log in temporarily key obtain be account log in key and mandate time.In step S430 within the mandate time, can based on logging in the direct login account of key, improve the safety in utilization of convenience that account logs in and account.
Embodiment 17:
As shown in Figure 5, the present embodiment provides a kind of account login method, and described method comprises:
Step S410: obtain temporary mark;
Step S420: resolve described temporary mark, obtains information and the time of mandate of account;
Step S430: if within the described mandate time, based on described account log described in account.
Described temporary mark comprises and logs in key temporarily;
Described step S410 can comprise: receive the authorization message comprising described temporary mark that the first client sends; Or, the described temporary mark that reception server sends.
Described authorization message can be directly described temporary mark in the present embodiment, also can comprise the information beyond temporary mark.Described temporary mark can be described first client send, also can server send.Described first client is the client that account is run originally, can be the client that account owner holds.
Certainly this temporary mark is also provided with the information such as the corresponding scope of authority in the server, and this temporary mark can be used as the index retrieving the described scope of authority, and hirer or sharer only can use this account within the scope of authority.Such as, user C obtains the QQ account of user D by temporary mark, has QQ wallet in QQ account, and QQ wallet relates to QQ coin or bank card binding etc.When forming the temporary mark of other people use of this QQ account mandate, server to be obtained the authorization scope based on the instruction of user C, this does not comprise the use of QQ wallet within the scope of authority, therefore this temporary mark can be utilized by user D to log in this QQ account, but can not use the QQ wallet in this QQ account.
In a word, the client described in the present embodiment by logging in key temporarily, the easy account of using or renting or sharing other people, other people account of final utilization.
A concrete example is provided below in conjunction with above-mentioned any embodiment:
As shown in Figure 6, this example provides a kind of information processing method based on account, and described method comprises:
Step S1: the first client receives the mandate time of user's input.
Step S2: the first user end to server sends the mandate time and logs in key.
Step S3: the validity logging in key described in server qualification.
Step S4: if server logs in key qualification effectively, then according to the described mandate time, log in key and log in secret generating and log in key temporarily.
Step S5: the described key that temporarily logs in is sent to the first client by server.
Step S6: the first client converts login Quick Response Code to by logging in key temporarily.
Described login Quick Response Code is sent to the second client by the step S7: the first client, or the second client scans described login Quick Response Code from the display interface of the first client.
Step S8: the second client resolves described login Quick Response Code, obtains and logs in key temporarily, and further parsing log in that key obtains account temporarily log in key.
Step S9: the second client logs in key and server carries out information interaction thus login account described in utilizing, and uses the authority of account.
Embodiment 18:
As shown in Figure 7, the present embodiment provides a kind of server, and described server comprises:
First acquiring unit 110, carries out the mandate time of permission grant for obtaining account;
Generation unit 120, for based on the information of described account and described mandate time, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Transmitting element 130, for returning to client by described temporary mark.
Server described in the present embodiment can be various types of computing machine, can carry out the process of information.Described first acquiring unit 110 can comprise receiving interface, by receiving aforesaid first client, the information of account that the second client sends and mandate time.Described generation unit 120 can comprise processor or treatment circuit.Described processor can comprise the processors such as central processing unit, digital signal processor, application processor, microprocessor or programmable circuit.Described treatment circuit can comprise special IC.Described processor can be connected by structures such as data buss with the storage medium in server, by reading the executable code stored in storage medium, run this executable code, just according to the information of described account and described mandate time, described temporary mark can be generated.
Described transmitting element 130 can comprise transmission interface.Described transmission interface or receiving interface can be wireline interface or wave point.Described wireline interface can comprise optical cable interface or cable interface.Described wave point can comprise dual-mode antenna etc.
Described temporary mark is sent to client by transmitting element 130 described in the present embodiment, and client here can be the first client or the second client etc.
In a word, server described in the present embodiment obtain account information or after the mandate time, the described temporary mark of generation that can be intelligent, authorize within the mandate time, limit authorized user and use this account within the mandate time, improve the security of the intelligent of account mandate and account.
Embodiment 19:
As shown in Figure 7, the present embodiment provides a kind of server, and described server comprises:
First acquiring unit 110, carries out the mandate time of permission grant for obtaining account;
Generation unit 120, for based on the information of described account and described mandate time, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Transmitting element 130, for returning to client by described temporary mark.
Described generation unit 120, comprising:
First acquisition module, logs in key for what obtain account;
Generation module, for logging in key and described mandate time based on described, generating and logging in key temporarily.
The first acquisition module that generation unit 120 described in the present embodiment comprises can comprise receiving interface, logs in key described in can receiving from the first client or the second client.Described first acquisition module also can comprise processor or treatment circuit, can log in key according to other information of account (such as the title of account sequence number or account) to described in database lookup,
Described generation module can comprise processor or treatment circuit, key or mandate time is logged according to described, generate according to the generation strategy preset (such as, according to the generating function preset, such as will log in key or mandate time be considered as numerical value and carry out logical operation) and describedly log in key temporarily.
Log in key to decode for client, what can obtain this account after decoding logs in key, and client logs in key login account by this, and uses this account temporarily.
In the present embodiment on the basis of previous embodiment, provide a kind of concrete structure of generation unit 120, it is simple and realize easy feature that this generation unit 120 has structure.
Embodiment 20:
As shown in Figure 7, the present embodiment provides a kind of server, and described server comprises:
First acquiring unit 110, carries out the mandate time of permission grant for obtaining account;
Generation unit 120, for based on the information of described account and described mandate time, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Transmitting element 130, for returning to client by described temporary mark.
Described generation unit 120, comprising:
First acquisition module, logs in key for what obtain account;
Generation module, for logging in key and described mandate time based on described, generating and logging in key temporarily.
Described generation module, specifically for logging in the validity of key described in verifying; And if described in log in key effective, then log in key and described mandate time described in combining, generate and describedly log in key temporarily.
Described generation module will have for verifying the validity logging in key in the present embodiment, and the validity that checking here logs in key comprises verifying to log in the whether correct of key.Such as, suppose to log in key be one long be the character string of 10 characters, if the character number that the character string logging in key received comprises is not equal to 10, obviously this is one and incorrectly abnormal logs in key.Here checking also can comprise in validation database and whether is stored in this and logs in key, also can comprise the information such as whether this corresponding relation logging in key and account correct.If by the checking of the validity that logs in key, then combine and log in key and mandate time, generate can be used for carrying out logging in the mandate time log in key temporarily.
There is in the present embodiment the generation module logging in key checking, the security of convenience that account logs in and account can be improved.
Embodiment 21:
As shown in Figure 7, the present embodiment provides a kind of server, and described server comprises:
First acquiring unit 110, carries out the mandate time of permission grant for obtaining account;
Generation unit 120, for based on the information of described account and described mandate time, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Transmitting element 130, for returning to client by described temporary mark.
Described generation unit 120, comprising:
First acquisition module, logs in key for what obtain account;
Generation module, for logging in key and described mandate time based on described, generating and logging in key temporarily.
Described generation module, specifically for logging in the validity of key described in verifying; And if described in log in key effective, then log in key and described mandate time described in combining, generate and describedly log in key temporarily.
Described generation module, also logs in key specifically for what obtain described account; In conjunction with described in log in key, the described mandate time and described in log in key, generate and describedly log in key temporarily;
Described log in temporarily key also for based on described log in temporarily key obtain described in log in key.
Generation module described in the present embodiment is when generating described temporary mark, also can log in key according to account, such generation log in temporarily key to crack difficulty larger, crack according to the correct mode that cracks and log in key temporarily, can also obtain and log in the quick login account of key.
Embodiment 22:
As shown in Figure 7, the present embodiment provides a kind of server, and described server comprises:
First acquiring unit 110, carries out the mandate time of permission grant for obtaining account;
Generation unit 120, for based on the information of described account and described mandate time, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Transmitting element 130, for returning to client by described temporary mark.
Described generation unit 120, specifically for obtaining authority record information; Based on described authority record information, in conjunction with described account and described mandate time, generate described temporary mark.
Described generation unit 120 also generates described temporary mark based on authority record information in the present embodiment, and the temporary mark reference factor generated like this is more, can increase the difficulty that temporary mark is cracked like this, improve the security of account.
Embodiment 23:
As shown in Figure 7, the present embodiment provides a kind of server, and described server comprises:
First acquiring unit 110, carries out the mandate time of permission grant for obtaining account;
Generation unit 120, for based on the information of described account and described mandate time, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Transmitting element 130, for returning to client by described temporary mark.
Described server also comprises:
Communication memory unit, for receiving and recording the authority information of the described account scope of authority;
Wherein, described temporary mark can also be used for the index inquiring about described authority information.
Described storing communication unit also comprises storage medium and communication interface, and described communication interface can be wireline interface or wave point.Described storage medium is for storing authority information.
Which authority other users follow-up like this, when using temporary mark login account, can use, control by this authority information, improve the control of account injection to account mandate.
Server described in the present embodiment can arbitrary technical scheme provides in previous embodiment server be combined, and forms the technical scheme of new server.Such as described generation unit 120 can comprise the first acquisition module and generation module.Described temporary mark can be and logs in key etc. temporarily.
Embodiment 24:
As shown in Figure 7, the present embodiment provides a kind of server, and described server comprises:
First acquiring unit 110, carries out the mandate time of permission grant for obtaining account;
Generation unit 120, for based on the information of described account and described mandate time, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Transmitting element 130, for returning to client by described temporary mark.
Described first acquiring unit 110, the mandate specifically for being formed from the first client indicates or authorizes feedback, extracts the mandate time of described account;
Wherein, described mandate is fed back to the feedback information that the first client is formed based on the authorization requests of the second client.
Described first acquiring unit 110 can comprise receiving interface in the present embodiment, after the mandate instruction receiving the first client formation or mandate feedback, extracts the mandate time be carried in authorization requests or mandate feedback.The mandate time is carried on and authorizes instruction or authorize in feedback, decrease the information interaction between server and client, authorize instruction simultaneously or authorize feedback to generate the trigger message of temporary mark as server, can easy trigger server be authorized by account.
Embodiment 25:
As shown in Figure 8, the present embodiment provides a kind of client, and described client is the first client, and described first client comprises:
Second acquisition unit 210, for obtaining the mandate time;
First transmitting element 220, for sending to server by the information of account and mandate time;
First receiving element 230, for the information of reception server based on described account and the temporary mark of generation of described mandate time; Wherein, described temporary mark can be used in using described account within the described mandate time;
Described first transmitting element 220, also for sending the authorization message generated based on described temporary mark to the second client.
Described in the present embodiment, second acquisition unit 210 can comprise Man Machine Interface, utilizes Man Machine Interface obtain by detecting user operation and confirm the described mandate time.The concrete structure of described second acquisition unit 210 also can comprise receiving interface, and this receiving interface can be used for receiving the described mandate time from other equipment.
The concrete structure of described first transmitting element 220 and described first receiving element 230 all may correspond in communication interface, and this communication interface can be wave point or wireline interface.Described wave point can comprise dual-mode antenna.Described first transmitting element 220 and described first connects to be searched unit 230 and may correspond in different communication interfaces, also may correspond to the communication interface in have transmission-receiving function simultaneously.
Terminal described in the present embodiment can be the electronic equipments such as mobile phone, panel computer, wearable device.Client described in the present embodiment is the first client, can be the client that account owner holds.Such account owner can by the easy mandate carrying out account of the first client.In the present embodiment, described client also can comprise display unit, and this display unit can comprise various types of display screen.Described display screen can comprise LCDs, electric ink display screen or projection display screen etc., can be used for showing described temporary mark or showing the authorization message generated based on temporary mark.Described authorization message can comprise the graph text informations such as the Quick Response Code generated based on temporary mark.
In a word, client described in the present embodiment can be the hardware of the permission grant method implementing account described in previous embodiment, the mandate realizing account of safety that like this can be easy.
Embodiment 26:
As shown in Figure 8, the present embodiment provides a kind of client, and described client is the first client, and described first client comprises:
Second acquisition unit 210, for obtaining the mandate time;
First transmitting element 220, for sending to server by the information of account and mandate time;
First receiving element 230, for the information of reception server based on described account and the temporary mark of generation of described mandate time; Wherein, described temporary mark can be used in using described account within the described mandate time;
Described first transmitting element 220, also for sending the authorization message generated based on described temporary mark to the second client.
Described first transmitting element 220, utilizes specifically for the first client and logs in key login account, obtain and log in key; Key is logged in and the described mandate time sends to server by described;
Described first receiving element 230, specifically for receive described server based on described log in that key and described mandate time generates log in key temporarily.
The temporary mark of described first receiving element 230 reception is for log in key temporarily in the present embodiment, and the described key that temporarily logs in has generation simply, other user's login account feature easily.
Embodiment 27:
As shown in Figure 8, the present embodiment provides a kind of client, and described client is the first client, and described first client comprises:
Second acquisition unit 210, for obtaining the mandate time;
First transmitting element 220, for sending to server by the information of account and mandate time;
First receiving element 230, for the information of reception server based on described account and the temporary mark of generation of described mandate time; Wherein, described temporary mark can be used in using described account within the described mandate time;
Described first transmitting element 220, also for sending the authorization message generated based on described temporary mark to the second client.
Described first receiving element 220, also for receiving the authorization requests that the second client sends;
Described second acquisition unit 210, specifically for extracting the mandate time of the second client-requested mandate from described authorization requests;
Described first transmitting element 220, also for sending mandate feedback based on user's instruction to described second client and/or server.
The concrete structure processor of described second acquisition unit 210 or treatment circuit, can be used for obtaining the mandate time the information received from the second client.
Described first transmitting element 220 is also for receiving the authorization requests that the second client sends in the present embodiment; Simultaneously described first transmitting element 220 also can comprise Man Machine Interface and processor, and this Man Machine Interface can be used for receiving described user instruction, and described processor can be used for indicating based on user forming described mandate feedback.First send large warm 220 communication interface can the most described authorize feedback send to server or the second client at least one of them.
First client described in the present embodiment can arbitrary technical scheme of the first client in previous embodiment be combined, and forms the first client of combination, may be used for user and easily the account of oneself is licensed to other people and use.
In concrete implementation procedure, also comprise in the first client described in aforementioned any embodiment:
Forming unit, for based on user's instruction, forms the authority information of the described account scope of authority;
Described first transmitting element also will be used for described authority information to send to described server;
Described first receiving element, also receives described server based on the described described temporary mark logging in key, described mandate time and described authority information and generate by being used for.
Setting by described forming unit also can be controlled the scope of authority of account by described like this first client, thus improves the controllability of mandate and the intelligent of the first client.
In addition, described first transmitting element, also will be used for, based on user's instruction, sending described mandate instruction to described server; Described second acquisition unit also utilizes the human-computer interaction interface of described first client to receive the described mandate time by being used for.Described first transmitting element authorizes instruction by sending to server in the present embodiment, and the account of instruction server to correspondence that can be easy licenses to other people and use.Second acquisition unit can comprise described human-computer interaction interface, this human-computer interaction interface can comprise the interactive structures such as keyboard, mouse, contact panel, touch screen or suspension touch control screen, the described mandate time can be received, thus better can realize the control of user to account mandate.
Implement 28:
As shown in Figure 9, the present embodiment provides a kind of client, and described client is the second client, and described second client comprises:
3rd acquiring unit 310, for obtaining the information of the account of requested mandate;
4th acquiring unit 320, for obtaining the mandate time;
Second transmitting element 330, for based on the information of described account and described mandate time, sends authorization requests to the first client;
Second receiving element 340, for receiving the temporary mark forming the mandate to account based on described authorization requests; Described temporary mark can be used for the second client and use described account within the described mandate time.
Client described in the present embodiment is the second client, can be the terminal devices such as mobile phone, panel computer, Wearable device, network TV or electronic reader.
Various structures is there is in the concrete structure of the 3rd acquiring unit 310 described in the present embodiment according to the mode difference of the information of acquisition account.Such as described 3rd acquiring unit 310 can comprise communication interface, the information of account described in information acquisition is received from other electronic equipments, also Man Machine Interface can be comprised, receive user's input information by Man Machine Interface thus obtain the information of described account, also can be information by inquiring about the second client storage inside and obtain the information of described account.3rd acquiring unit 310 described in this time can comprise processor or treatment circuit etc. from storage medium inquiry and can read the information processing architecture of information.
The structure of described 4th acquiring unit 320 and the similar of described 3rd acquiring unit 310, the mode obtaining the described mandate time also can be similar with the mode of the information obtaining described account, and just obtaining information object is different.
Second transmitting element 330 and the second receiving element 340 may correspond to the communication interface in the second client, and this communication interface can be wave point usually, as having the antenna etc. of transmission-receiving function simultaneously.If described second client is wireline equipment certainly, namely the communication interface of described second receiving element 340 and described second transmitting element 330 correspondence can be wireline interface.Described second transmitting element 330 and the second receiving element 340 can distinguish corresponding different communication interfaces, also can correspond to the interface that has transmitting-receiving dual-use function simultaneously.
Provide a kind of client in the present embodiment and active request first client can carry out the mandate of account, facilitate the authorisation process of the account between user.
Embodiment 29:
As shown in Figure 9, the present embodiment provides a kind of client, and described client is the second client, and described second client comprises:
3rd acquiring unit 310, for obtaining the information of the account of requested mandate;
4th acquiring unit 320, for obtaining the mandate time;
Second transmitting element 330, for based on the information of described account and described mandate time, sends authorization requests to the first client;
Second receiving element 340, for receiving the temporary mark forming the mandate to account based on described authorization requests; Described temporary mark can be used for the second client and use described account within the described mandate time.
Described second receiving element 340, specifically for receiving the mandate feedback that the first client sends based on authorization requests;
Described second transmitting element 330 is also for sending to server by described mandate feedback;
Described second receiving element 340 is also for receiving described server based on described temporary mark of authorizing feedback to be formed.
Described second receiving element 340 also will receive from described first client and authorize feedback in the present embodiment, described mandate feedback is sent to server by described second transmitting element 330, then will obtain described temporary mark, described like this second receiving element 340 will receive described temporary mark from described server, and the client facilitating the second client or obtain described temporary mark from the second client logs in the account that authorizes and uses this account within the mandate time.
The second client described in the present embodiment active request first client can carry out the mandate of account, and the software and hardware resources of better the second client utilized, improves the intelligent of the second client.
In the implementing of the second above-mentioned client, described temporary mark can be and describedly logs in key temporarily.Described temporary mark also can based on the temporary mark logging in key or authority record information or authority information formation.The detailed description of described temporary mark can see any one embodiment aforesaid.
Embodiment 30:
As shown in Figure 10, the present embodiment provides a kind of client, and described client comprises:
5th acquiring unit 410, for obtaining temporary mark;
Resolution unit 420, for resolving described temporary mark, obtains information and the time of mandate of account;
Login unit 430, if within the described mandate time, based on described account log described in account.
Client described in the present embodiment can be any one client, such as, in previous embodiment the second client, or the 3rd client beyond described first client and the second client.Client described in the embodiment of the present invention can comprise the various electronic equipments such as mobile phone, panel computer or Wearable device, such as various mobile terminal.
Described in the present embodiment, the 5th acquiring unit 410 can comprise image acquisition units, and described image acquisition units can comprise the structure that camera or camera etc. gather image.Described image acquisition units is presented at based on the image of temporary mark formation and/or Word message in described first client or the second client by the mode collection of taking pictures or scan, thus gets described temporary mark.Described 5th acquiring unit 410 also can comprise communication interface, by receiving described temporary mark from other clients.Described the also can comprise Man Machine Interface without acquiring unit 410, acting on the operation of described Man Machine Interface, obtaining described temporary mark by detecting user.
Described resolution unit 420 can comprise processor or treatment circuit, and the structure of described processor and treatment circuit see the description in embodiment, just can not be repeated at this.
Described login unit can comprise communication interface and the structure such as processor or treatment circuit, temporary mark is resolved the resolving information obtained and is sent to server by communication interface, thus pass through account game server corresponding to temporary mark, obtain the various services that server provides this account.
Client described in the present embodiment, by temporary mark login account within the mandate time quickly and easily, facilitates the using of account, public and rent.
Embodiment 31:
As shown in Figure 10, the present embodiment provides a kind of client, and described client comprises:
5th acquiring unit 410, for obtaining temporary mark;
Resolution unit 420, for resolving described temporary mark, obtains information and the time of mandate of account;
Login unit 430, if within the described mandate time, based on described account log described in account.
Described temporary mark comprises and logs in key temporarily;
Described resolution unit 420, describedly logs in key specifically for resolving temporarily, and what obtain account logs in key and mandate time;
Described login unit 430, if specifically for current time within the described mandate time, then logs in described account based on the described key that logs in.
The described key that temporarily logs in is aforesaidly log in key temporarily in the present embodiment.Described resolution unit 420 by resolve described log in that key can obtain account temporarily log in key and mandate time, described mandate time and the described key that logs in can be sent to server by described login unit 430, thus the described account logged in quickly and easily, thus use, rent or share other people account easily, facilitate leasing and sharing of account.
Below in conjunction with any one embodiment above-mentioned, provide two concrete examples:
Example one:
Illustrate with mobile phone QQ account in this example, other account numbers can be analogized.
Such as user B thinks the number QQA temporarily using user A, so user A enters hand Q, input an interim borrowing time, then hand Q generates a Quick Response Code, user B is by the temporary Authorization of the QQA that gets Number after hand Q scanning Quick Response Code, can use number QQA in described interim borrowing time, overtime mandate was lost efficacy.This is the one of aforesaid mandate time temporarily all if having time.Described Quick Response Code is the authorization message comprising described temporary mark.
Interactive mode also can be contrary, and B uses number, and B enters hand Q input time, generates Quick Response Code, and after then number owner A sweep Quick Response Code also confirms, user B obtains the authorization, and can use number A in interim borrowing time.
Example two:
This example provides a disposal system, and this system can be divided into five modules below.
Logon rights correction verification module, for performing following operation:
After verifying QQ number and password login, can obtain the key that a backstage is distributed, user goes to backstage mutual (such as sending and receiving qq message etc.) to need to be with this key to background authentication, the operation that key validated user could be just follow-up at every turn.Be called after this key and log in key.
Temporary authority generation module, for performing following operation:
After number owner logins successfully, when needs are checked numbers and are carried out temporary Authorization, input a temporary Authorization time tmp_time, client is with the mandate time and log in key to temporary authority generation module, module arrives first logon rights correction verification module and goes to check the validity logging in key, then combines to log in key and authorize the rear generation of time tmp_time encryption to log in key temporarily to return to client.
Temporary authority correction verification module, for performing following operation:
Temporary authority correction verification module can be resolved logging in key temporarily, obtains logging in key and tmp_time.If tmp_time is within effective time, just returns and log in key, if time-out has just returned and logs in key error information.
Temporary Authorization generation module, for performing following operation:
After client is taken log in key temporarily from server, generate Quick Response Code or file by generation module.
Temporary Authorization access modules, for performing following operation:
By scanning Quick Response Code, or after number owner passes to number borrower file by modes such as bluetooths.Then, number borrower parses in client and logs in key temporarily, then verifies to temporary authority correction verification module by logging in key temporarily, key is logged in if returned, can register, if obtain logging in key error information, then time-out is described, needs again to apply for authority.
The flow process of the mandate of account described in this example can comprise:
Authorize that account logs in, account generate there is temporary authority log in key temporarily, borrower obtains power of authorizing and obtains and describedly log in key temporarily, and borrower is based on logging in key rights of using within the mandate time temporarily.
In several embodiments that the application provides, should be understood that disclosed equipment and method can realize by another way.Apparatus embodiments described above is only schematic, such as, the division of described unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, and as: multiple unit or assembly can be in conjunction with, maybe can be integrated into another system, or some features can be ignored, or do not perform.In addition, the coupling each other of shown or discussed each ingredient or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of equipment or unit or communication connection can be electrical, machinery or other form.
The above-mentioned unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, also can be distributed in multiple network element; Part or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in various embodiments of the present invention can all be integrated in a processing module, also can be each unit individually as a unit, also can two or more unit in a unit integrated; Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form that hardware also can be adopted to add SFU software functional unit realizes.
One of ordinary skill in the art will appreciate that: all or part of step realizing said method embodiment can have been come by the hardware that programmed instruction is relevant, aforesaid program can be stored in a computer read/write memory medium, this program, when performing, performs the step comprising said method embodiment; And aforesaid storage medium comprises: movable storage device, ROM (read-only memory) (ROM, Read-OnlyMemory), random access memory (RAM, RandomAccessMemory), magnetic disc or CD etc. various can be program code stored medium.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; change can be expected easily or replace, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection domain of described claim.

Claims (31)

1. a permission grant method for account, is characterized in that, described method comprises:
Obtain the mandate time that account carries out permission grant;
Based on information and the described mandate time of described account, generate temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Described temporary mark is returned to client.
2. method according to claim 1, is characterized in that,
The described information based on described account and described mandate time, generate temporary mark, comprising:
What obtain account logs in key;
Log in key and described mandate time based on described, generate and log in key temporarily.
3. method according to claim 2, is characterized in that,
Describedly log in key and described mandate time based on described, generate and log in key temporarily, comprising:
The validity of key is logged in described in checking;
If described in log in key effective, then log in key and described mandate time described in combining, generate and describedly log in key temporarily.
4. method according to claim 3, is characterized in that,
Log in key if described effective, then log in key and described mandate time described in combining, generate and describedly log in key temporarily, comprising:
What obtain described account logs in key;
In conjunction with described in log in key, the described mandate time and described in log in key, generate and describedly log in key temporarily;
Described log in temporarily key also for based on described log in temporarily key obtain described in log in key.
5., according to the method that claim 1 is stated, it is characterized in that,
The described information based on described account and described mandate time, generate temporary mark, comprising:
Obtain authority record information;
Based on described authority record information, in conjunction with described account and described mandate time, generate described temporary mark.
6. the method according to any one of claim 1 to 5, is characterized in that,
Described method also comprises:
Receive and record the authority information of the described account scope of authority;
Wherein, described temporary mark can also be used for the index inquiring about described authority information.
7. the method according to any one of claim 1 to 5, is characterized in that,
Described acquisition account carries out the mandate time of permission grant, comprising:
The mandate instruction formed from the first client or mandate feedback, extract the mandate time of described account;
Wherein, described mandate is fed back to the feedback information that the first client is formed based on the authorization requests of the second client.
8. a permission grant method for account, is characterized in that, described method comprises:
Obtain the mandate time;
The information of account and mandate time are sent to server;
The information of reception server based on described account and the temporary mark of generation of described mandate time; Wherein, described temporary mark can be used in using described account within the described mandate time;
The authorization message generated based on described temporary mark is sent to the second client.
9. method according to claim 8, is characterized in that,
Described the information of account and mandate time are sent to server, comprising:
First client utilizes and logs in key login account, obtains and logs in key;
Key is logged in and the described mandate time sends to server by described;
The information of described reception server based on described account and the temporary mark of generation of described mandate time, comprising:
Receive described server based on described log in that key and described mandate time generates log in key temporarily.
10. method according to claim 8, is characterized in that,
Described method also comprises:
Based on user's instruction, form the authority information of the described account scope of authority;
Described authority information is sent to described server;
Described reception server, based on the described temporary mark logging in key and the generation of described mandate time, comprising:
Receive described server based on the described described temporary mark logging in key, described mandate time and described authority information and generate.
11. methods according to claim 8 or claim 9, is characterized in that,
Described method comprises:
Based on user's instruction, send described mandate instruction to described server;
The described acquisition mandate time, comprising:
The human-computer interaction interface of described first client is utilized to receive the described mandate time.
12. methods according to claim 8 or claim 9, is characterized in that,
Described method also comprises:
Receive the authorization requests that the second client sends;
The described acquisition mandate time, comprising:
The mandate time of the second client-requested mandate is extracted from described authorization requests;
Described method also comprises:
Mandate feedback is sent to described second client and/or server based on user's instruction.
The permission grant method of 13. 1 kinds of accounts, is characterized in that, described method comprises:
Obtain the information of the account of requested mandate;
Obtain the mandate time;
Based on information and the described mandate time of described account, send authorization requests to the first client;
Receive the temporary mark forming the mandate to account based on described authorization requests; Described temporary mark can be used for the second client and use described account within the described mandate time.
14. methods according to claim 13, is characterized in that,
Described reception forms the temporary mark of the mandate to account based on described authorization requests, comprising:
Receive the mandate feedback that the first client sends based on authorization requests;
Described mandate feedback is sent to server;
Receive described server based on described temporary mark of authorizing feedback to be formed.
15. 1 kinds of account login methods, is characterized in that, described method comprises:
Obtain temporary mark;
Resolve described temporary mark, obtain information and the time of mandate of account;
If within the described mandate time, based on described account log described in account.
16. methods according to claim 15, is characterized in that,
Described temporary mark comprises and logs in key temporarily;
The described temporary mark of described parsing, obtains information and the time of mandate of account, comprising:
Resolve and describedly log in key temporarily, what obtain account logs in key and mandate time;
If described within the described mandate time, based on described account log described in account, comprising:
If current time is within the described mandate time, then log in described account based on the described key that logs in.
17. methods according to claim 15, is characterized in that,
Described acquisition temporary mark, comprising:
Receive the authorization message comprising described temporary mark that the first client sends;
Or,
The described temporary mark that reception server sends.
18. 1 kinds of servers, is characterized in that, described server comprises:
First acquiring unit, carries out the mandate time of permission grant for obtaining account;
Generation unit, for based on the information of described account and described mandate time, generates temporary mark; Wherein, described temporary mark can be used in using described account within the described mandate time;
Transmitting element, for returning to client by described temporary mark.
19. servers according to claim 18, is characterized in that,
Described generation unit, comprising:
First acquisition module, logs in key for what obtain account;
Generation module, for logging in key and described mandate time based on described, generating and logging in key temporarily.
20. servers according to claim 19, is characterized in that,
Described generation module, specifically for logging in the validity of key described in verifying; And if described in log in key effective, then log in key and described mandate time described in combining, generate and describedly log in key temporarily.
21. servers according to claim 20, is characterized in that,
Described generation module, also logs in key specifically for what obtain described account; In conjunction with described in log in key, the described mandate time and described in log in key, generate and describedly log in key temporarily;
Described log in temporarily key also for based on described log in temporarily key obtain described in log in key.
22. servers stated according to claim 18, is characterized in that,
Described generation unit, specifically for obtaining authority record information; Based on described authority record information, in conjunction with described account and described mandate time, generate described temporary mark.
23., according to claim 18 to the server described in 22 any one, is characterized in that,
Described server also comprises:
Communication memory unit, for receiving and recording the authority information of the described account scope of authority;
Wherein, described temporary mark can also be used for the index inquiring about described authority information.
24., according to claim 18 to the server described in 22 any one, is characterized in that,
Described first acquiring unit, the mandate specifically for being formed from the first client indicates or authorizes feedback, extracts the mandate time of described account;
Wherein, described mandate is fed back to the feedback information that the first client is formed based on the authorization requests of the second client.
25. 1 kinds of clients, is characterized in that, described client is the first client, and described first client comprises:
Second acquisition unit, for obtaining the mandate time;
First transmitting element, for sending to server by the information of account and mandate time;
First receiving element, for the information of reception server based on described account and the temporary mark of generation of described mandate time; Wherein, described temporary mark can be used in using described account within the described mandate time;
Described first transmitting element, also for sending the authorization message generated based on described temporary mark to the second client.
26. clients according to claim 25, is characterized in that,
Described first transmitting element, utilizes specifically for the first client and logs in key login account, obtain and log in key; Key is logged in and the described mandate time sends to server by described;
Described first receiving element, specifically for receive described server based on described log in that key and described mandate time generates log in key temporarily.
27. clients according to claim 25 or 26, is characterized in that,
Described first receiving element, also for receiving the authorization requests that the second client sends;
Described second acquisition unit, specifically for extracting the mandate time of the second client-requested mandate from described authorization requests;
Described first transmitting element, also for sending mandate feedback based on user's instruction to described second client and/or server.
28. 1 kinds of clients, is characterized in that, described client is the second client, and described second client comprises:
3rd acquiring unit, for obtaining the information of the account of requested mandate;
4th acquiring unit, for obtaining the mandate time;
Second transmitting element, for based on the information of described account and described mandate time, sends authorization requests to the first client;
Second receiving element, for receiving the temporary mark forming the mandate to account based on described authorization requests; Described temporary mark can be used for the second client and use described account within the described mandate time.
29. clients according to claim 28, is characterized in that,
Described second receiving element, specifically for receiving the mandate feedback that the first client sends based on authorization requests;
Described second transmitting element, also for described mandate feedback is sent to server;
Described second receiving element, also specifically for receiving described server based on described temporary mark of authorizing feedback to be formed.
30. 1 kinds of clients, is characterized in that, described client comprises:
5th acquiring unit, for obtaining temporary mark;
Resolution unit, for resolving described temporary mark, obtains information and the time of mandate of account;
Login unit, if within the described mandate time, based on described account log described in account.
31. clients according to claim 30, is characterized in that,
Described temporary mark comprises and logs in key temporarily;
Described resolution unit, describedly logs in key specifically for resolving temporarily, and what obtain account logs in key and mandate time;
Described login unit, if specifically for current time within the described mandate time, then logs in described account based on the described key that logs in.
CN201510713640.1A 2015-10-28 2015-10-28 Account authority authorization method, account login method, server and client Active CN105426743B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510713640.1A CN105426743B (en) 2015-10-28 2015-10-28 Account authority authorization method, account login method, server and client

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510713640.1A CN105426743B (en) 2015-10-28 2015-10-28 Account authority authorization method, account login method, server and client

Publications (2)

Publication Number Publication Date
CN105426743A true CN105426743A (en) 2016-03-23
CN105426743B CN105426743B (en) 2020-08-11

Family

ID=55504948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510713640.1A Active CN105426743B (en) 2015-10-28 2015-10-28 Account authority authorization method, account login method, server and client

Country Status (1)

Country Link
CN (1) CN105426743B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105920840A (en) * 2016-06-24 2016-09-07 苏州天鸣信息科技有限公司 Game leveling method based on designated task
CN106778178A (en) * 2016-12-28 2017-05-31 广东虹勤通讯技术有限公司 The call method and device of fingerprint business card
CN106790220A (en) * 2017-01-12 2017-05-31 安徽省刀锋网络科技有限公司 A kind of GID lease management system
CN106850636A (en) * 2017-02-13 2017-06-13 深圳市沃特沃德股份有限公司 A kind of authority acquiring method, authority opening method, terminal and server
CN106911666A (en) * 2017-01-04 2017-06-30 青岛海信移动通信技术股份有限公司 A kind of wearable smart machine and its message treatment method, system
CN107920046A (en) * 2016-10-09 2018-04-17 中兴通讯股份有限公司 Account management method and device
CN109977172A (en) * 2019-03-29 2019-07-05 北京金山安全软件有限公司 Information interaction method and device for block chain, electronic equipment and storage medium
CN110519056A (en) * 2019-10-11 2019-11-29 广东虹勤通讯技术有限公司 A kind of login method, method for generating cipher code and its relevant apparatus
CN112003724A (en) * 2020-07-17 2020-11-27 新华三技术有限公司 Network management method and device
CN115086052A (en) * 2022-06-23 2022-09-20 全知科技(杭州)有限责任公司 Method for automatically analyzing account based on HTTP traffic
CN117974128A (en) * 2024-03-29 2024-05-03 成都智元汇信息技术股份有限公司 Accounting method based on active subway complement

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080134294A1 (en) * 2006-11-30 2008-06-05 Microsoft Corporation Personal Site Privacy Policy
CN102959922A (en) * 2010-06-25 2013-03-06 瑞典爱立信有限公司 Method, server and system for granting temporary access to electronic content
CN103401868A (en) * 2013-07-31 2013-11-20 广东欧珀移动通信有限公司 Temporary authorization method for mobile communication equipment of authorizing party and authorized party and temporary authorization management method and device for manager
CN103475480A (en) * 2013-09-05 2013-12-25 北京星网锐捷网络技术有限公司 Certificate authority method and device
CN103473499A (en) * 2013-09-16 2013-12-25 笔笔发信息技术(上海)有限公司 Acquisition device and data authorization method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080134294A1 (en) * 2006-11-30 2008-06-05 Microsoft Corporation Personal Site Privacy Policy
CN102959922A (en) * 2010-06-25 2013-03-06 瑞典爱立信有限公司 Method, server and system for granting temporary access to electronic content
CN103401868A (en) * 2013-07-31 2013-11-20 广东欧珀移动通信有限公司 Temporary authorization method for mobile communication equipment of authorizing party and authorized party and temporary authorization management method and device for manager
CN103475480A (en) * 2013-09-05 2013-12-25 北京星网锐捷网络技术有限公司 Certificate authority method and device
CN103473499A (en) * 2013-09-16 2013-12-25 笔笔发信息技术(上海)有限公司 Acquisition device and data authorization method thereof

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105920840A (en) * 2016-06-24 2016-09-07 苏州天鸣信息科技有限公司 Game leveling method based on designated task
CN105920840B (en) * 2016-06-24 2019-08-30 深圳淘乐网络科技有限公司 A kind of game generation white silk method based on appointed task
CN107920046A (en) * 2016-10-09 2018-04-17 中兴通讯股份有限公司 Account management method and device
CN106778178A (en) * 2016-12-28 2017-05-31 广东虹勤通讯技术有限公司 The call method and device of fingerprint business card
CN106911666A (en) * 2017-01-04 2017-06-30 青岛海信移动通信技术股份有限公司 A kind of wearable smart machine and its message treatment method, system
CN106790220A (en) * 2017-01-12 2017-05-31 安徽省刀锋网络科技有限公司 A kind of GID lease management system
CN106790220B (en) * 2017-01-12 2019-10-11 安徽省刀锋网络科技有限公司 A kind of game account lease management system
CN106850636A (en) * 2017-02-13 2017-06-13 深圳市沃特沃德股份有限公司 A kind of authority acquiring method, authority opening method, terminal and server
WO2018145432A1 (en) * 2017-02-13 2018-08-16 深圳市沃特沃德股份有限公司 Method for obtaining permission, method for opening permission, terminal, and server
CN109977172A (en) * 2019-03-29 2019-07-05 北京金山安全软件有限公司 Information interaction method and device for block chain, electronic equipment and storage medium
CN110519056A (en) * 2019-10-11 2019-11-29 广东虹勤通讯技术有限公司 A kind of login method, method for generating cipher code and its relevant apparatus
CN112003724A (en) * 2020-07-17 2020-11-27 新华三技术有限公司 Network management method and device
CN112003724B (en) * 2020-07-17 2022-07-12 新华三技术有限公司 Network management method and device
CN115086052A (en) * 2022-06-23 2022-09-20 全知科技(杭州)有限责任公司 Method for automatically analyzing account based on HTTP traffic
CN115086052B (en) * 2022-06-23 2023-07-18 全知科技(杭州)有限责任公司 Method for automatically analyzing account based on HTTP (hyper text transport protocol) traffic
CN117974128A (en) * 2024-03-29 2024-05-03 成都智元汇信息技术股份有限公司 Accounting method based on active subway complement

Also Published As

Publication number Publication date
CN105426743B (en) 2020-08-11

Similar Documents

Publication Publication Date Title
CN105426743A (en) Account permission authorization method, account login method, server and client
US8800003B2 (en) Trusted device-specific authentication
US20180348721A1 (en) Automatic portable electronic device configuration
KR101451359B1 (en) User account recovery
KR102214247B1 (en) Method and apparatus for service implementation
US20110185181A1 (en) Network authentication method and device for implementing the same
CN103929400A (en) Two-dimension code obtaining method, generating method, validation method, device and system
CN103609090A (en) Method and device for identity login
CN106657068A (en) Login authorization method and device, login method and device
CN105337974A (en) Account authorization method, account login method, account authorization device and client end
CN107809438A (en) A kind of network authentication method, system and its user agent device used
CN102077210A (en) Authorization for transient storage devices with multiple authentication silos
EP2894891A2 (en) Mobile token
CN104704511A (en) Qr code utilization in self-registration in a network
CN106034123A (en) Authentication method, application system server and client
US7856657B2 (en) Secure access of resources at shared appliances
CN102469068A (en) Intelligent code management system
TWI668586B (en) Data communication method and system, client and server
US8219804B2 (en) Approach for managing device usage data
CN106161475A (en) The implementation method of subscription authentication and device
KR101027228B1 (en) User-authentication apparatus for internet security, user-authentication method for internet security, and recorded medium recording the same
CN109617703B (en) Key management method and device, electronic equipment and storage medium
CN116915493A (en) Secure login method, device, system, computer equipment and storage medium
CN114499975A (en) Method for verifying login server, server and storage medium
US10250778B2 (en) Distributed smart card reader for multifunction printer

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant