CN105426743B - Account authority authorization method, account login method, server and client - Google Patents

Account authority authorization method, account login method, server and client Download PDF

Info

Publication number
CN105426743B
CN105426743B CN201510713640.1A CN201510713640A CN105426743B CN 105426743 B CN105426743 B CN 105426743B CN 201510713640 A CN201510713640 A CN 201510713640A CN 105426743 B CN105426743 B CN 105426743B
Authority
CN
China
Prior art keywords
authorization
account
client
time
login key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510713640.1A
Other languages
Chinese (zh)
Other versions
CN105426743A (en
Inventor
刘杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201510713640.1A priority Critical patent/CN105426743B/en
Publication of CN105426743A publication Critical patent/CN105426743A/en
Application granted granted Critical
Publication of CN105426743B publication Critical patent/CN105426743B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The embodiment of the invention discloses an account authority authorization method, an account login method, a server and a client. The account authorization method comprises the following steps: obtaining authorization time for authorization of authority of an account; generating a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time; and returning the temporary identifier to the client.

Description

Account authority authorization method, account login method, server and client
Technical Field
The invention relates to the technical field of information, in particular to an account authorization method, an account login method, a server and a client.
Background
With the development of network technology, people use networks to perform various activities such as learning, working and living. Many accounts are typically involved in performing these activities for ease of identification or for security concerns. Such as a game player's game account, a communication-in-time account, a shopping account for shopping, a viewing account for viewing videos, and so forth. The accounts can identify and safely verify the user on one hand, and represent certain authority on the other hand.
In order to ensure the safe use of the account number, the account number and the secret key are usually used together. But a borrowing or public use of the account also occurs back during the use of the account. In the prior art, if an account needs to be borrowed, the account and a key need to be told to a borrowing user together, and after the account is returned, the key needs to be reset in order to ensure the security of the account. But some users usually forget to change the key or leak the key again during the transmission and borrowing of the account and the key. If the borrowing user privately resets the key during the use of the account, this can result in a situation where the account owner cannot use the key.
Disclosure of Invention
In view of this, embodiments of the present invention are intended to provide an account authorization method, an account login method, a server, and a client, so as to at least partially solve the problem of cumbersome operations for authorizing others to use an account.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
in a first aspect of the embodiments of the present invention, a method for authorizing an account right is provided, where the method includes:
obtaining authorization time for authorization of authority of an account;
generating a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
and returning the temporary identifier to the client.
Based on the above scheme, the generating a temporary identifier based on the information of the account and the authorization time includes:
acquiring a login key of an account;
and generating a temporary login key based on the login key and the authorization time.
Based on the above scheme, the generating a temporary login key based on the login key and the authorization time includes:
verifying the validity of the login key;
and if the login key is valid, generating the temporary login key by combining the login key and the authorization time.
Based on the above scheme, if the login key is valid, generating the temporary login key by combining the login key and the authorization time includes:
acquiring a login key of the account;
generating the temporary login key by combining the login key, the authorization time and the login key;
the temporary login key is also used for acquiring the login key based on the temporary login key.
Based on the above scheme, the generating a temporary identifier based on the information of the account and the authorization time includes:
obtaining authorization record information;
and generating the temporary identifier by combining the account and the authorization time based on the authorization record information.
Based on the above scheme, the method further comprises:
receiving and recording authority information of the account authorization range;
wherein the temporary identifier can also be used to query an index of the rights information.
Based on the above scheme, the obtaining of the authorization time for authorization of the account includes:
extracting authorization time of the account from an authorization indication or an authorization feedback formed by the first client;
and the authorization feedback is feedback information formed by the first client based on an authorization request of the second client.
A second aspect of the embodiments of the present invention provides a method for authorizing an account right, where the method includes:
obtaining authorization time;
sending the information of the account and the authorization time to a server;
receiving a temporary identifier generated by a server based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
and sending the authorization information generated based on the temporary identification to the second client.
Based on the above scheme, the sending the information of the account and the authorization time to the server includes:
a first client logs in an account by using a login key to obtain the login key;
sending the login key and the authorization time to a server;
the receiving server generates a temporary identifier based on the information of the account and the authorization time, and the temporary identifier comprises:
and receiving a temporary login key generated by the server based on the login key and the authorization time.
Based on the above scheme, the method further comprises:
forming authority information of the account authorization range based on user indication;
sending the authority information to the server;
the receiving server generates a temporary identifier based on the login key and the authorization time, and the temporary identifier comprises:
and receiving the temporary identifier generated by the server based on the login key, the authorization time and the authority information.
Based on the scheme, the method comprises the following steps:
sending the authorization indication to the server based on a user indication;
the obtaining of the authorization time comprises:
and receiving the authorization time by utilizing a human-computer interaction interface of the first client.
Based on the scheme, receiving an authorization request sent by a second client;
the obtaining of the authorization time comprises:
extracting the authorization time of the second client requesting authorization from the authorization request;
the method further comprises the following steps:
sending authorization feedback to the second client and/or server based on a user indication.
A third aspect of the embodiments of the present invention provides a method for authorizing a permission of an account, where the method includes:
acquiring information of an account requested to be authorized;
obtaining authorization time;
sending an authorization request to a first client based on the information of the account and the authorization time;
receiving a temporary identification forming authorization for an account based on the authorization request; the temporary identifier is available for the second client to use the account within the authorization time.
Based on the above scheme, the receiving a temporary identifier forming authorization for an account based on the authorization request includes:
receiving authorization feedback sent by the first client based on the authorization request;
sending the authorization feedback to a server;
and receiving a temporary identifier formed by the server based on the authorization feedback.
A fourth aspect of the present invention provides an account login method, where the method includes:
acquiring a temporary identifier;
analyzing the temporary identifier to acquire account information and authorization time;
and if so, logging in the account based on the information of the account.
Based on the scheme, the temporary identifier comprises a temporary login key;
the analyzing the temporary identifier to obtain the information of the account and the authorization time includes:
analyzing the temporary login key to obtain a login key and authorization time of an account;
if the account is logged in based on the information of the account within the authorization time, the method includes:
and if the current time is within the authorized time, logging in the account based on the login key.
Based on the above scheme, the obtaining the temporary identifier includes:
receiving authorization information which is sent by a first client and comprises the temporary identifier;
or the like, or, alternatively,
and receiving the temporary identifier sent by the server.
A fourth aspect of the embodiments of the present invention provides a server, including:
the first acquisition unit is used for acquiring authorization time for authorization of authority of the account;
a generating unit, configured to generate a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
and the sending unit is used for returning the temporary identifier to the client.
Based on the above scheme, the generating unit includes:
the first acquisition module is used for acquiring a login key of an account;
and the generation module is used for generating a temporary login key based on the login key and the authorization time.
Based on the scheme, the generation module is specifically used for verifying the validity of the login key; and if the login key is valid, generating the temporary login key by combining the login key and the authorization time.
Based on the scheme, the generating module is further specifically configured to obtain a login key of the account; generating the temporary login key by combining the login key, the authorization time and the login key;
the temporary login key is also used for acquiring the login key based on the temporary login key.
Based on the above scheme, the generating unit is specifically configured to acquire authorization record information; and generating the temporary identifier by combining the account and the authorization time based on the authorization record information.
Based on the above scheme, the server further comprises:
the communication storage unit is used for receiving and recording the authority information of the account authorization range;
wherein the temporary identifier can also be used to query an index of the rights information.
Based on the above-mentioned scheme, the method,
the first obtaining unit is specifically configured to extract authorization time of the account from an authorization instruction or authorization feedback formed by a first client;
and the authorization feedback is feedback information formed by the first client based on an authorization request of the second client.
A fifth aspect of an embodiment of the present invention provides a client, where the client is a first client, and the first client includes:
a second obtaining unit, configured to obtain an authorization time;
the first sending unit is used for sending the information of the account and the authorization time to the server;
a first receiving unit, configured to receive a temporary identifier generated by a server based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
the first sending unit is further configured to send authorization information generated based on the temporary identifier to a second client.
Based on the scheme, the first sending unit is specifically used for the first client to log in the account by using the login key to obtain the login key; sending the login key and the authorization time to a server;
the first receiving unit is specifically configured to receive a temporary login key generated by the server based on the login key and the authorization time.
Based on the above scheme, the first receiving unit is further configured to receive an authorization request sent by a second client;
the second obtaining unit is specifically configured to extract, from the authorization request, authorization time for a second client to request authorization;
the first sending unit is further configured to send authorization feedback to the second client and/or the server based on a user indication.
A fifth aspect of the present invention provides a client, where the client is a second client, and the second client includes:
a third obtaining unit, configured to obtain information of the account requested to be authorized;
a fourth obtaining unit, configured to obtain an authorization time;
a second sending unit, configured to send an authorization request to the first client based on the information of the account and the authorization time;
a second receiving unit, configured to receive a temporary identifier that forms an authorization for an account based on the authorization request; the temporary identifier is available for the second client to use the account within the authorization time.
Based on the above scheme, the second receiving unit is specifically configured to receive authorization feedback sent by the first client based on the authorization request;
the second sending unit is further configured to send the authorization feedback to a server;
the second receiving unit is further specifically configured to receive a temporary identifier formed by the server based on the authorization feedback.
A sixth aspect of the present embodiment provides a client, where the client includes:
a fifth obtaining unit, configured to obtain a temporary identifier;
the analysis unit is used for analyzing the temporary identifier to acquire the information of the account and the authorization time;
and the login unit is used for logging in the account based on the information of the account within the authorization time.
Based on the scheme, the temporary identifier comprises a temporary login key;
the analysis unit is specifically used for analyzing the temporary login key and acquiring a login key and authorization time of an account;
the login unit is specifically configured to log in the account based on the login key if the current time is within the authorized time.
According to the account authorization method, the account login method, the server and the client, the server can generate the temporary identifier for other users to use the corresponding account within the authorization time through the account information and the authorization time, so that the other users can log in the account and use the account within the authorization time after obtaining the temporary identifier. The account owner does not need to worry about the complexity of leakage of the account password and forgetting to change the password, so that the intelligence of account authorization is improved, the user operation is simplified, and the satisfaction of the user in account authorization is improved.
Drawings
Fig. 1 is a schematic flowchart of a method for authorizing a permission of a first account according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a method for authorizing a right of an account according to a second embodiment of the present invention;
fig. 3 is a flowchart illustrating a third method for authorizing a permission of an account according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating a method for authorizing a permission of a fourth account according to an embodiment of the present invention;
fig. 5 is a schematic flowchart of an account login method according to an embodiment of the present invention;
fig. 6 is a flowchart illustrating a fifth method for authorizing a permission of an account according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a server according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a first client according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a second client according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of another client according to an embodiment of the present invention.
Detailed Description
The technical solution of the present invention is further described in detail with reference to the drawings and the specific embodiments of the specification.
The first embodiment is as follows:
as shown in fig. 1, the present embodiment provides a method for authorizing a right of an account, where the method includes:
step S110: obtaining authorization time for authorization of authority of an account;
step S120: generating a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
step S130: and returning the temporary identifier to the client.
The account number described in this embodiment may include various account numbers, such as a game account number of a game player, an instant messaging account number, a shopping account number, a use account number of a video website, a lecture attending account number, a learning account number, and other various account numbers. The timely communication account can be various communication accounts such as a QQ account, a WeChat account, a strange account and the like. And the use account of the video website, such as the payment account of the Tencent video.
The method described in this embodiment is applied to a server. The server of this embodiment may provide an account for the service for the account, and the account for registration and authorization processing of the various accounts.
In step S110, an authorization time for authorization of the account is acquired. The authorization time here is the range of time that the account owner debits or shares the account with others. Typically the authorization time may be a length of time or comprise a period of time. The time period may include a start time and an end time.
In this embodiment, in the step S120, a temporary identifier is generated based on the information of the account and the authorization time. The temporary identification may enable users other than the account owner to use the account, but only within a time frame of authorized time.
In step S120, based on the account number and the authorization time, a temporary identifier may be generated by performing joint coding on the identification information, such as the account number sequence based on the account number or the name of the account number, and the identification information and the authorization time. Thus, by decoding the temporary identifier, the identification information and the authorization time can be extracted.
Therefore, other users except the account can not use the account except the authorized time, and the leakage of the key caused by directly giving the account and the key to other users is avoided. The temporary identifier can avoid the phenomenon that other users cannot use the account number due to the fact that the key is modified by the other users, and the phenomenon that the account number owner forgets to modify the key and other people can use the account number indefinitely due to the fact that the key is modified by the account number owner can be avoided through the setting of the authorization time.
For example, user A wants to borrow user B's QQ account B. And the server generates the temporary identifier based on the account number B and the authorization time according to the authorization time requested by the user A or the authorization time input by the account B. If the user A logs in the account B by using the temporary identifier, the QQ communication can be carried out by using the account B, and the operations of carrying out communication with a QQ friend of the account B, viewing QQ account recommendation information by using the account B and the like are included.
In short, the account authorization method in this embodiment can ensure lending or public use of the account, improve the security of the account, simplify user operations, improve the intelligence of account authorization, and improve the user satisfaction.
Example two:
as shown in fig. 1, the present embodiment provides a method for authorizing a right of an account, where the method includes:
step S110: obtaining authorization time for authorization of authority of an account;
step S120: generating a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
step S130: and returning the temporary identifier to the client.
As shown in fig. 2, the step S120 may include:
step S121: acquiring a login key of an account;
step S122: and generating a temporary login key based on the login key and the authorization time.
In this embodiment, the temporary identifier is a temporary login key.
The login key can be information distributed by the server when the server registers the account, and the server verifies the login key when the account is logged in through a secret key or is in communication and the like, so that the use safety of the account is ensured.
In this embodiment, the temporary identifier generated in step S120 is a login key of the utilized account. The temporary identifier generated in this embodiment is also a temporary login key.
After the temporary login key is analyzed, the login key of the account can be obtained, and when other users log in by using the temporary login key, the login key can be sent to the server by analyzing the temporary login key, so that login is carried out.
The embodiment provides how to generate the temporary identifier by using the login key of the account in the authorization process of the authority of the account, so as to realize quick, simple and convenient authorization.
Example three:
as shown in fig. 1, the present embodiment provides a method for authorizing a right of an account, where the method includes:
step S110: obtaining authorization time for authorization of authority of an account;
step S120: generating a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
step S130: and returning the temporary identifier to the client.
As shown in fig. 2, the step S120 may include:
step S121: acquiring a login key of an account;
step S122: and generating a temporary login key based on the login key and the authorization time.
The step S122 may include:
verifying the validity of the login key;
and if the login key is valid, generating the temporary login key by combining the login key and the authorization time.
In this embodiment, the validity of the login key is verified, where the verification of the validity of the login key includes verifying whether the login key of the account is correct, whether the binding relationship with the account is correct, whether the login key is in valid time, and the like.
And when the login key is effective, generating the temporary login key by combining the login key and the authorization time. The combination of the login key and the authorization time can include that the login key and the authorization time are jointly coded to form a temporary login account. The joint encoding can include converting the login key and the authorization time into corresponding sequences, and generating new sequences through logic operation between the sequences. The generated new sequence can be the temporary login key. The logical operation may include an exclusive-or operation, an and operation, and the like. The logical operations may be functions of operations to implement the determinations, may be processing of one or more logical operations, and the like.
In this embodiment, the phenomenon that the temporary identifier (i.e., the temporary login key) cannot be used for other users to successfully log in the account can be reduced through the validity verification of the login key.
Example four:
as shown in fig. 1, the present embodiment provides a method for authorizing a right of an account, where the method includes:
step S110: obtaining authorization time for authorization of authority of an account;
step S120: generating a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
step S130: and returning the temporary identifier to the client.
As shown in fig. 2, the step S120 may include:
step S121: acquiring a login key of an account;
step S122: and generating a temporary login key based on the login key and the authorization time.
The step S122 may include:
verifying the validity of the login key;
and if the login key is valid, generating the temporary login key by combining the login key and the authorization time.
If the login key is valid, generating the temporary login key by combining the login key and the authorization time, wherein the generation process comprises the following steps:
acquiring a login key of the account;
generating the temporary login key by combining the login key, the authorization time and the login key;
the temporary login key is also used for acquiring the login key based on the temporary login key.
The login key is a password for account login, and may be pre-stored in the client in general, so that the client automatically fills in the login when logging in. The login key can be information manually input by a user on a login interface, and the security of the account can be ensured to a certain extent.
In this embodiment, the login key is also introduced when the temporary login key is generated, and in this case, the login key, the authorization time, and the login key may be jointly encoded to generate the temporary login key. The login key can provide a login key for other users to log in an account by using the temporary login key. For example, the account of the first client is logged in by the second client by using the temporary login key, the second client can obtain the account, the login key of the account and the login key by decoding the temporary login key, and the second client logs in by using the account and the login key and performs background verification processing by using the login key.
In short, by introducing the login key, on one hand, the generation basis factor of the temporary login key is increased, the difficulty that the temporary login key is illegally cracked by an illegal user is improved, and when the second client logs in, the login can be performed only if the account number, the login key and the login key are correct and meet the corresponding relationship, so that the security of the account number is improved again.
Example five:
as shown in fig. 1, the present embodiment provides a method for authorizing a right of an account, where the method includes:
step S110: obtaining authorization time for authorization of authority of an account;
step S120: generating a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
step S130: and returning the temporary identifier to the client.
The step S120 may include:
obtaining authorization record information;
generating the temporary identifier based on the authorization record information by combining the login key and the authorization time
In this embodiment, the authorization record information may include authorization record information such as the authorization times and authorization frequency of the account.
In this embodiment, the temporary identifier is generated based on authorization record information. Therefore, after the account is authorized to be used by others each time, the authorization record information is changed, so that temporary identifications formed by authorization each time are different. For example, the authorized account numbers for authorization are the same, and the authorization time is the same, but different temporary identifications are formed due to the change of the authorization record information. Thus, authorization management and distinction are facilitated, and confusion is avoided; and authorization record information is further introduced to form the temporary identifier, so that the basis factor of the temporary identifier is increased undoubtedly, the difficulty of cracking the temporary identifier is increased, and the safety of the account is improved.
The method of the pair described in this embodiment can be combined with any of the above embodiments
Example six:
as shown in fig. 1, the present embodiment provides a method for authorizing a right of an account, where the method includes:
step S110: obtaining authorization time for authorization of authority of an account;
step S120: generating a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
step S130: and returning the temporary identifier to the client.
The method further comprises the following steps:
receiving and recording authority information of the account authorization range;
wherein the temporary identifier can also be used to query an index of the rights information.
In this embodiment, the authority information of the account authorization range is received and recorded. For example, the account is a communication account, and may include a modification right of account information in addition to a communication right. The modification authority can comprise account head portrait modification, user basic information modification and the like. In this embodiment, the server further includes receiving and recording right information indicating that the authorization scope is defined from the client.
In this embodiment, the temporary identifier may be directly used as an index for querying the authority information, or the analysis information after the temporary identifier is analyzed may be used as an index for querying the authority information, so as to query the authority information.
The authority information in the embodiment of the present invention may be used in combination with any one of the technical solutions in the foregoing embodiments. For example, the permission information is received and recorded, and a scheme of generating a temporary login key by using the login key is used in combination. In a word, the authority information is used for limiting the account number to be used by other users, prohibiting other users except the account number owner from using the authority outside the account number authorization range by using the temporary identifier, preventing the account number from being abused by other users, and improving the use safety of the account number.
Example seven:
as shown in fig. 1, the present embodiment provides a method for authorizing a right of an account, where the method includes:
step S110: obtaining authorization time for authorization of authority of an account;
step S120: generating a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
step S130: and returning the temporary identifier to the client.
The step S110 may include:
extracting authorization time of the account from an authorization indication or an authorization feedback formed by the first client;
and the authorization feedback is feedback information formed by the first client based on an authorization request of the second client.
The authorization indication is information formed by the first client under the active indication of the account owner, and the authorization indication can be information indicating that the server authorizes the account. In this embodiment, the authorization time may be carried in the indication information, so that the server can obtain the authorization time required for authorization while performing authorization according to the authorization indication.
In this embodiment, another scheme is included, authorization feedback may also be formed from the first client to perform authorization, where the authorization feedback may also indicate the server to perform account authorization and also bear authorization time, and after receiving the authorization feedback, the server is triggered to perform account authorization and extracts authorization time required for authorization from the authorization feedback. It is to be noted that, in this embodiment, summarizing the authorization feedback is to send an authorization request from the second client to the first client, and the first client forms feedback information based on the authorization request of the second client.
The authorization indication may be received by the server directly from the first client, and the authorization feedback may be received directly from the first client or from the second client.
The server authorizes based on the authorization indication or the authorization feedback, and directly extracts the authorization time from the authorization indication or the authorization feedback, and the method has the characteristic of simple and convenient implementation.
Example eight:
as shown in fig. 3, the present embodiment provides a method for authorizing a right of an account, where the method includes:
step S210: obtaining authorization time;
step S220: sending the information of the account and the authorization time to a server;
step S230: receiving a temporary identifier generated by a server based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
step S240: and sending the authorization information generated based on the temporary identification to the second client.
The method for authorizing the authority of the account number provided by the embodiment can be applied to a first client. The first client is a terminal operated by an authorization account needing to authorize other users.
The obtaining of the authorization time in step S210 may include obtaining, by the first client, the authorization time by receiving the user instruction, or may be the authorization time determined by the first client according to the authorization time in the past authorization record of the account, or may be the authorization time determined according to the time of the request of the second client that needs to be authorized.
The information of the account in step S220 is related information of the authorized account, for example, one or more items of information of the account itself of the authorized account, the name of the account, the login key of the account, and the like.
In step S230, the first client will receive a temporary identifier generated by the server according to the information of the account sent to the server and the authorization time. The temporary identifier may be information formed by joint coding of account information and authorization time.
The first client obtains the temporary identifier, and needs to forward or share the temporary identifier to the client needing to be authorized, so that the authorization information is sent to the second client. The second client may be the temporary identifier directly or information generated according to the temporary identifier; but the authorization information can be parsed out of the temporary identification. For example, the authorization information may be a bar code and/or a graphic and/or a text generated according to the temporary identifier. The barcode may comprise a two-dimensional code or a one-dimensional code. The graphics may include various graphics with special indicia.
The method in the embodiment can facilitate the first client to authorize the account, simplify the Hangzhou tiger operation, and improve the security of the account and the use satisfaction of the user.
Example nine:
as shown in fig. 3, the present embodiment provides a method for authorizing a right of an account, where the method includes:
step S210: obtaining authorization time;
step S220: sending the information of the account and the authorization time to a server;
step S230: receiving a temporary identifier generated by a server based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
step S240: and sending the authorization information generated based on the temporary identification to the second client.
The step S220 may include:
a first client logs in an account by using a login key to obtain the login key;
sending the login key and the authorization time to a server;
the step S230 may include:
and receiving a temporary login key generated by the server based on the login key and the authorization time.
In the embodiment, the obtained login key of the account and the information of the account sent to the server together with the authorization time are the login key.
The received temporary identifier is also a temporary login key generated by the server according to the login key and the authorization time in the embodiment.
After the second client passes the authorization information and acquires the temporary login key, the second client can quickly log in the account and use the account corresponding to the temporary login key; the method has the characteristic of simple and convenient implementation.
Example ten:
as shown in fig. 3, the present embodiment provides a method for authorizing a right of an account, where the method includes:
step S210: obtaining authorization time;
step S220: sending the information of the account and the authorization time to a server;
step S230: receiving a temporary identifier generated by a server based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
step S240: and sending the authorization information generated based on the temporary identification to the second client.
The method further comprises the following steps:
forming authority information of the account authorization range based on user indication;
sending the authority information to the server;
the step S230 may include: and receiving the temporary identifier generated by the server based on the login key, the authorization time and the authority information.
In this embodiment, the user indication may be information received through a human-computer interaction interface of the first client. For example, a user indication received via a mouse, keyboard, touch panel, touch screen, floating touch screen, or audio interactive interface. The user indication can be used for indicating the authority information of the account authorization range. The same account has multiple rights, and a user may only want to authorize certain rights, so that corresponding rights information is indicated and formed through the user indication. For example, the user indication may include a user indication based on a selection of a dialog box or a checkup of the authorization option, through a dialog box or a prompt message including the authorization option in the first client.
Therefore, the account owner can not only simply and conveniently authorize, but also control the authorization range of the account, and the control force of the user on the authorization of the authorized account is improved.
Example eleven:
as shown in fig. 3, the present embodiment provides a method for authorizing a right of an account, where the method includes:
step S210: obtaining authorization time;
step S220: sending the information of the account and the authorization time to a server;
step S230: receiving a temporary identifier generated by a server based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
step S240: and sending the authorization information generated based on the temporary identification to the second client.
The method comprises the following steps:
sending the authorization indication to the server based on a user indication;
the step S210 may include:
and receiving the authorization time by utilizing a human-computer interaction interface of the first client.
In this embodiment, the first client actively sends an authorization indication to the server based on the user indication, and indicates to perform account authorization to other users.
In this embodiment, the authorization time is also obtained by the first client from a user instruction received by the human-computer interaction interface.
In the method described in this embodiment, the information of the account used for forming the temporary identifier may be a login key of the account. The generated temporary identifier can be a temporary login key.
In short, in this embodiment, the account owner can actively use the first account to perform active authorization, and the method has the characteristic of strong user authorization control.
Example twelve:
as shown in fig. 3, the present embodiment provides a method for authorizing a right of an account, where the method includes:
step S210: obtaining authorization time;
step S220: sending the information of the account and the authorization time to a server;
step S230: receiving a temporary identifier generated by a server based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
step S240: and sending the authorization information generated based on the temporary identification to the second client.
The method further comprises the following steps:
receiving an authorization request sent by a second client;
the step S210 may include:
extracting the authorization time of the second client requesting authorization from the authorization request;
the method further comprises the following steps:
sending authorization feedback to the second client and/or server based on a user indication.
In this embodiment, other users may also request account owners to perform account authorization. The second client may send an authorization request to the first client. The authorization request may carry an authorization time. The first client may form authorization feedback based on the user indication in reply to the authorization request. The authorization feedback may include an authorization grant, the authorization time being a time requested by the second client. The authorization feedback may also be to grant authorization, but the user indicates that the authorization time was updated based on the authorization time requested by the second client. The authorization feedback may be used to instruct the server to authorize the account for use by other users. In this embodiment, the first client directly sends the authorization feedback to the server, and the server performs authorization based on the authorization feedback. The first client may also send the authorization feedback to the second client, and the second client sends the authorization feedback to the server to authorize the account. Certainly, the first client may also send the authorization feedback to the second client and the server at the same time, the server directly authorizes the user after receiving the authorization feedback sent by the first client, and the second client can inform the user that the first client receives the authorization request and gives corresponding feedback after receiving the authorization feedback.
In short, the first client described in this embodiment may obtain the authorization time according to the request of the second client, and give authorization feedback, thereby performing intelligent processing of authorization of the account.
Example thirteen:
as shown in fig. 4, the present embodiment provides a method for authorizing a right of an account, where the method includes:
step S310: acquiring information of an account requested to be authorized;
step S320: obtaining authorization time;
step S330: sending an authorization request to a first client based on the information of the account and the authorization time;
step S340: receiving a temporary identification forming authorization for an account based on the authorization request; the temporary identifier is available for the second client to use the account within the authorization time.
The method described in this embodiment may be a method applied to the second client. In the present embodiment, account information of the account requested to be authorized is acquired in step S310, for example, an account identifier of the account requested to be authorized, which receives manual income from the user, where the account identifier may include information such as an account sequence, a name of the account, and the like.
Receiving the authorized time in step S320 may include receiving a user indication, and determining the authorized time according to the user indication. For example, the user inputs the authorization time from 10 months 1 to 10 months 15 days, or the authorization time is 15 days. When the authorization time is 15 days, the time can be counted from the time when authorization is allowed.
And the second client sends the information of the account number and the authorization time to the first client to request authorization. Of course, the first client is the client running the account.
Next, the second client may receive a temporary identification obtained based on the authorization request. The temporary identifier may be directly sent by the server, or may be a temporary identifier sent from the first client. The second client can log in the account within the authorization time by utilizing the temporary identifier, and execute the function within the authorization range by utilizing the account.
Therefore, the second client in this embodiment can intelligently request to use a certain account, so that the intelligence of account authorization is improved, the user operation is simplified, and the user using satisfaction is improved.
Example fourteen:
as shown in fig. 4, the present embodiment provides a method for authorizing a right of an account, where the method includes:
step S310: acquiring information of an account requested to be authorized;
step S320: obtaining authorization time;
step S330: sending an authorization request to a first client based on the information of the account and the authorization time;
step S340: receiving a temporary identification forming authorization for an account based on the authorization request; the temporary identifier is available for the second client to use the account within the authorization time.
The step S340 may include:
receiving authorization feedback sent by the first client based on the authorization request;
sending the authorization feedback to a server;
and receiving a temporary identifier formed by the server based on the authorization feedback.
In this embodiment, after the second client sends the authorization request to the first client, the first client may form authorization feedback in response to the authorization request, and in this embodiment, the second client may receive the authorization feedback formed by the first client, and finally send the authorization feedback to the server. And then, the server finally authorizes the account according to the authorization feedback, forms a temporary identifier and sends the temporary identifier to the second client.
On the basis of the previous embodiment, the embodiment embodies how to obtain the temporary identifier, and has the characteristic of simple and convenient implementation.
In a specific implementation process, the temporary identifier may be the aforementioned temporary login key. The temporary login key is formed according to the login key and the authorization time of the account. Thus, the temporary login key is finally received in step S340.
The method of the embodiment of the invention can facilitate the second client to request the first client to authorize the account number, and has the characteristics of simple and quick realization.
Example fifteen:
as shown in fig. 5, this embodiment provides an account login method, which includes:
step S410: acquiring a temporary identifier;
step S420: analyzing the temporary identifier to acquire account information and authorization time;
step S430: and if so, logging in the account based on the information of the account.
The embodiment may be applied to a second client or other clients that obtain the temporary identifier. In this embodiment, the step S410 of obtaining the temporary identifier may include receiving the temporary identifier sent by the server or other clients, or may be that the client executing the method scans the temporary identifier displayed by the first client or obtains the temporary identifier based on information formed by the temporary identifier.
In this embodiment, the client parses the temporary identifier in step S420 to obtain the information of the account and the authorization time. The information of the account number may include information such as a sequence or name of the account number. The authorization time may be understood as a time range within which the account can be logged in and used based on the temporary identification. Therefore, in step S440, if the account is within the authorized time, the account can be logged in based on the information of the account.
In this way, the account login described in this embodiment is used as a lender or a lessor of the account, and the account and the password do not need to be respectively connected in a group, so that the security of the account is improved, meanwhile, the account can be logged in based on the temporary identification, and the simplicity of account login is improved.
Example sixteen:
as shown in fig. 5, this embodiment provides an account login method, which includes:
step S410: acquiring a temporary identifier;
step S420: analyzing the temporary identifier to acquire account information and authorization time;
step S430: and if so, logging in the account based on the information of the account.
The temporary identifier comprises a temporary login key;
the step S420 may include: analyzing the temporary login key to obtain a login key and authorization time of an account;
the step S430 may include: and if the current time is within the authorized time, logging in the account based on the login key.
In this embodiment, the temporary identifier is a temporary login key formed according to a login key of the account. In this embodiment, what is obtained by analyzing the temporary login key is the login key and the authorization time of the account. In step S430, the account can be directly logged in based on the login key within the authorization time, so that the convenience of login and the safety of use of the account are improved.
Example seventeen:
as shown in fig. 5, this embodiment provides an account login method, which includes:
step S410: acquiring a temporary identifier;
step S420: analyzing the temporary identifier to acquire account information and authorization time;
step S430: and if so, logging in the account based on the information of the account.
The temporary identifier comprises a temporary login key;
the step S410 may include: receiving authorization information which is sent by a first client and comprises the temporary identifier; or, receiving the temporary identifier sent by the server.
In this embodiment, the authorization information may be the temporary identifier directly, and may further include information other than the temporary identifier. The temporary identifier may be sent by the first client or sent by a server. The first client is a client in which an account number originally runs and can be a client held by an account owner.
Of course, the temporary identifier is also provided with information such as a corresponding authorization range in the server, the temporary identifier can be used as an index for retrieving the authorization range, and a renter or a user can only use the account number within the authorization range. For example, the user C obtains the QQ account of the user D by the temporary identifier, and there is a QQ wallet in the QQ account, and the QQ wallet relates to a QQ coin or a bank card binding, etc. When forming the temporary identifier for the QQ account to authorize others, the server obtains an authorization range based on the indication of the user C, wherein the authorization range does not include the use of the QQ wallet, so that the user D can log in the QQ account by using the temporary identifier, but cannot use the QQ wallet in the QQ account.
In short, the client described in this embodiment may borrow or rent or share the account of another person simply and conveniently through the temporary login key, and finally use the account of another person.
One specific example is provided below in connection with any of the embodiments described above:
as shown in fig. 6, the present example provides an account-based information processing method, including:
step S1: the first client receives the authorization time input by the user.
Step S2: the first client sends the authorization time and the login key to the server.
Step S3: the server identifies the validity of the login key.
Step S4: and if the login key identification is valid, the server generates a temporary login key according to the authorization time, the login key and the login key.
Step S5: and the server sends the temporary login key to the first client.
Step S6: and the first client converts the temporary login key into a login two-dimensional code.
Step S7: and the first client sends the login two-dimensional code to the second client, or the second client scans the login two-dimensional code from a display interface of the first client.
Step S8: and the second client analyzes the login two-dimensional code to obtain a temporary login key, and further analyzes the temporary login key to obtain a login key of the account.
Step S9: and the second client performs information interaction with the server by using the login key so as to log in the account and use the authority of the account.
Example eighteen:
as shown in fig. 7, the present embodiment provides a server, including:
a first obtaining unit 110, configured to obtain authorization time for authorization of an account;
a generating unit 120, configured to generate a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
a sending unit 130, configured to return the temporary identifier to the client.
The server described in this embodiment may be various types of computers, and is capable of processing information. The first obtaining unit 110 may include a receiving interface, and receive the account information and the authorization time sent by the first client and the second client. The generating unit 120 may comprise a processor or a processing circuit. The processor may include a central processing unit, a digital signal processor, an application processor, a microprocessor, or a programmable circuit. The processing circuit may comprise an application specific integrated circuit. The processor can be connected with a storage medium in the server through a data bus and other structures, and the temporary identifier can be generated according to the information of the account and the authorization time by reading the executable code stored in the storage medium and running the executable code.
The transmitting unit 130 may include a transmitting interface. The transmitting interface or the receiving interface may be a wired interface or a wireless interface. The wired interface may include a fiber optic cable interface or a cable interface. The wireless interface may include a transceiver antenna, or the like.
In this embodiment, the sending unit 130 sends the temporary identifier to a client, where the client may be a first client or a second client.
In short, after the server in this embodiment acquires the information of the account or the authorization time, the server can intelligently generate the temporary identifier and perform authorization within the authorization time, so that an authorized user is limited to use the account within the authorization time, and the intelligence of account authorization and the security of the account are improved.
Example nineteenth:
as shown in fig. 7, the present embodiment provides a server, including:
a first obtaining unit 110, configured to obtain authorization time for authorization of an account;
a generating unit 120, configured to generate a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
a sending unit 130, configured to return the temporary identifier to the client.
The generating unit 120 includes:
the first acquisition module is used for acquiring a login key of an account;
and the generation module is used for generating a temporary login key based on the login key and the authorization time.
The first obtaining module included in the generating unit 120 in this embodiment may include a receiving interface, and may receive the login key from the first client or the second client. The first obtaining module may also include a processor or a processing circuit, which may look up the login key in a database according to other information of the account number (such as the serial number of the account number or the name of the account number),
the generation module may include a processor or a processing circuit, and generate the temporary login key according to a preset generation policy (e.g., according to a preset generation function, such as performing a logical operation by regarding the login key or the authorization time as a numerical value) according to the login key or the authorization time.
The temporary login key can be decoded by the client, the login key of the account can be obtained after decoding, and the client can log in the account through the login key and use the account.
In this embodiment, on the basis of the previous embodiment, a specific structure of the generating unit 120 is provided, and the generating unit 120 has the characteristics of simple structure and easy implementation.
Example twenty:
as shown in fig. 7, the present embodiment provides a server, including:
a first obtaining unit 110, configured to obtain authorization time for authorization of an account;
a generating unit 120, configured to generate a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
a sending unit 130, configured to return the temporary identifier to the client.
The generating unit 120 includes:
the first acquisition module is used for acquiring a login key of an account;
and the generation module is used for generating a temporary login key based on the login key and the authorization time.
The generation module is specifically used for verifying the validity of the login key; and if the login key is valid, generating the temporary login key by combining the login key and the authorization time.
In this embodiment, the generating module will have a function of verifying the validity of the login key, where verifying the validity of the login key includes verifying whether the login key is correct. For example, if the login key is a character string with a length of 10 characters, if the number of characters included in the received character string of the login key is not equal to 10, it is obvious that this is an incorrect abnormal login key. The verification here may further include verifying whether the login key is stored in the database, and may further include information whether the corresponding relationship between the login key and the account is correct. And if the validity of the login key is verified, generating a temporary login key which can be used for login within the authorization time by combining the login key and the authorization time.
The generation module for verifying the login key is arranged in the embodiment, so that the convenience of account login and the safety of the account can be improved.
Example twenty one:
as shown in fig. 7, the present embodiment provides a server, including:
a first obtaining unit 110, configured to obtain authorization time for authorization of an account;
a generating unit 120, configured to generate a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
a sending unit 130, configured to return the temporary identifier to the client.
The generating unit 120 includes:
the first acquisition module is used for acquiring a login key of an account;
and the generation module is used for generating a temporary login key based on the login key and the authorization time.
The generation module is specifically used for verifying the validity of the login key; and if the login key is valid, generating the temporary login key by combining the login key and the authorization time.
The generation module is further specifically configured to obtain a login key of the account; generating the temporary login key by combining the login key, the authorization time and the login key;
the temporary login key is also used for acquiring the login key based on the temporary login key.
In this embodiment, when the generation module generates the temporary identifier, the generation module can also use the login key of the account number, so that the generated temporary login key is more difficult to crack, and if the temporary login key is cracked in a correct cracking manner, the login key can be obtained to quickly log in the account number.
Example twenty two:
as shown in fig. 7, the present embodiment provides a server, including:
a first obtaining unit 110, configured to obtain authorization time for authorization of an account;
a generating unit 120, configured to generate a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
a sending unit 130, configured to return the temporary identifier to the client.
The generating unit 120 is specifically configured to obtain authorization record information; and generating the temporary identifier by combining the account and the authorization time based on the authorization record information.
In this embodiment, the generating unit 120 further generates the temporary identifier based on the authorization record information, so that the generated temporary identifier has more reference factors, which can increase the difficulty of cracking the temporary identifier and improve the security of the account.
Example twenty three:
as shown in fig. 7, the present embodiment provides a server, including:
a first obtaining unit 110, configured to obtain authorization time for authorization of an account;
a generating unit 120, configured to generate a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
a sending unit 130, configured to return the temporary identifier to the client.
The server further comprises:
the communication storage unit is used for receiving and recording the authority information of the account authorization range;
wherein the temporary identifier can also be used to query an index of the rights information.
The storage communication unit further comprises a storage medium and a communication interface, wherein the communication interface can be a wired interface or a wireless interface. The storage medium is used for storing the authority information.
When other subsequent users use the temporary identifier to log in the account, which permissions can be used can be controlled through the permission information, so that the control force of account injection for account authorization is improved.
The server described in this embodiment can be combined with the server provided in any of the foregoing embodiments to form a new technical solution of a server. For example, the generating unit 120 may include a first obtaining module and a generating module. The temporary identifier may be a temporary login key or the like.
Example twenty-four:
as shown in fig. 7, the present embodiment provides a server, including:
a first obtaining unit 110, configured to obtain authorization time for authorization of an account;
a generating unit 120, configured to generate a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
a sending unit 130, configured to return the temporary identifier to the client.
The first obtaining unit 110 is specifically configured to extract authorization time of the account from an authorization instruction or authorization feedback formed by a first client;
and the authorization feedback is feedback information formed by the first client based on an authorization request of the second client.
In this embodiment, the first obtaining unit 110 may include a receiving interface, and extract the authorization time carried in the authorization request or the authorization feedback after receiving the authorization indication or the authorization feedback formed by the first client. The authorization time is borne in the authorization indication or the authorization feedback, so that information interaction between the server and the client is reduced, and meanwhile, the authorization indication or the authorization feedback is used as the trigger information for the server to generate the temporary identifier, so that the server can be triggered to authorize the account simply and conveniently.
Example twenty-five:
as shown in fig. 8, this embodiment provides a client, where the client is a first client, and the first client includes:
a second obtaining unit 210, configured to obtain an authorization time;
a first sending unit 220, configured to send the information of the account and the authorization time to the server;
a first receiving unit 230, configured to receive a temporary identifier generated by a server based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
the first sending unit 220 is further configured to send authorization information generated based on the temporary identifier to the second client.
The second obtaining unit 210 of this embodiment may include a human-machine interaction interface, and obtain and confirm the authorization time by detecting a user operation through the human-machine interaction interface. The specific structure of the second obtaining unit 210 may also include a receiving interface, which may be used to receive the authorized time from other devices.
The specific structures of the first transmitting unit 220 and the first receiving unit 230 may correspond to a communication interface, which may be a wireless interface or a wired interface. The wireless interface may include a transceiver antenna. The first sending unit 220 and the first receiving unit 230 may correspond to different communication interfaces, and may also correspond to a communication interface having both sending and receiving functions.
The terminal described in this embodiment can be an electronic device such as a mobile phone, a tablet computer, and a wearable device. The client described in this embodiment is a first client, and may be a client held by an account owner. Therefore, the account owner can conveniently authorize the account through the first client. In this embodiment, the client may further include a display unit, and the display unit may include various types of display screens. The display screen can comprise a liquid crystal display screen, an electronic ink display screen or a projection display screen and the like, and can be used for displaying the temporary identifier or displaying the authorization information generated based on the temporary identifier. The authorization information may include image-text information such as a two-dimensional code generated based on the temporary identifier.
In short, the client in this embodiment may be hardware that implements the account authorization method in the foregoing embodiment, so that account authorization can be implemented simply and safely.
Example twenty-six:
as shown in fig. 8, this embodiment provides a client, where the client is a first client, and the first client includes:
a second obtaining unit 210, configured to obtain an authorization time;
a first sending unit 220, configured to send the information of the account and the authorization time to the server;
a first receiving unit 230, configured to receive a temporary identifier generated by a server based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
the first sending unit 220 is further configured to send authorization information generated based on the temporary identifier to the second client.
The first sending unit 220 is specifically configured to log in an account by a first client using a login key to obtain the login key; sending the login key and the authorization time to a server;
the first receiving unit 230 is specifically configured to receive a temporary login key generated by the server based on the login key and the authorization time.
In this embodiment, the temporary identifier received by the first receiving unit 230 is a temporary login key, and the temporary login key has the characteristics of simple generation and convenience in login accounts of other users.
Example twenty-seven:
as shown in fig. 8, this embodiment provides a client, where the client is a first client, and the first client includes:
a second obtaining unit 210, configured to obtain an authorization time;
a first sending unit 220, configured to send the information of the account and the authorization time to the server;
a first receiving unit 230, configured to receive a temporary identifier generated by a server based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
the first sending unit 220 is further configured to send authorization information generated based on the temporary identifier to the second client.
The first receiving unit 220 is further configured to receive an authorization request sent by a second client;
the second obtaining unit 210 is specifically configured to extract, from the authorization request, authorization time for requesting authorization by a second client;
the first sending unit 220 is further configured to send authorization feedback to the second client and/or the server based on a user indication.
The specific structure of the second obtaining unit 210, namely the processor or the processing circuit, may be configured to obtain the authorization time from the information received by the second client.
In this embodiment, the first sending unit 220 is further configured to receive an authorization request sent by a second client; meanwhile, the first sending unit 220 may further include a human-machine interaction interface operable to receive the user indication, and a processor operable to form the authorization feedback based on the user indication. The communication interface of the first sending warmer 220 may eventually send the authorization feedback to at least one of the server or the second client.
The first client described in this embodiment may be combined with any one of the technical solutions of the first client in the foregoing embodiments to form a combined first client, which may be used for a user to conveniently authorize an account of the user to others.
In a specific implementation process, the first client in any of the foregoing embodiments further includes:
the forming unit is used for forming the authority information of the account authorization range based on the user instruction;
the first sending unit is also used for sending the authority information to the server;
the first receiving unit is further configured to receive the temporary identifier generated by the server based on the login key, the authorization time, and the permission information.
Therefore, the first client can control the authorization range of the account number through the setting of the forming unit, so that the authorization controllability and the intelligence of the first client are improved.
The first sending unit is further configured to send the authorization indication to the server based on a user indication; the second obtaining unit is further configured to receive the authorization time by using a human-computer interaction interface of the first client. In this embodiment, the first sending unit sends the authorization indication to the server, so that the server can be simply and conveniently instructed to authorize the corresponding account to others. The second obtaining unit may include the human-computer interaction interface, and the human-computer interaction interface may include interaction structures such as a keyboard, a mouse, a touch panel, a touch screen, or a floating touch screen, and may receive the authorization time, so that the user may better control the account authorization.
Twenty-eight implementation:
as shown in fig. 9, this embodiment provides a client, where the client is a second client, and the second client includes:
a third obtaining unit 310, configured to obtain information of the account requested to be authorized;
a fourth obtaining unit 320, configured to obtain an authorization time;
a second sending unit 330, configured to send an authorization request to the first client based on the information of the account and the authorization time;
a second receiving unit 340, configured to receive a temporary identifier forming authorization for an account based on the authorization request; the temporary identifier is available for the second client to use the account within the authorization time.
The client described in this embodiment is a second client, and may be a terminal device such as a mobile phone, a tablet computer, a wearable device, a web television, or an e-reader.
The specific structure of the third obtaining unit 310 in this embodiment has various structures according to different ways of obtaining the information of the account. For example, the third obtaining unit 310 may include a communication interface, and receive information from other electronic devices to obtain the information of the account, may also include a human-computer interaction interface, and receive information input by a user through the human-computer interaction interface to obtain the information of the account, or may also obtain the information of the account by querying information stored inside a second client. The third obtaining unit 310 at this time may include an information processing structure such as a processor or a processing circuit capable of inquiring and reading information from the storage medium.
The structure of the fourth obtaining unit 320 is similar to that of the third obtaining unit 310, and the manner of obtaining the authorization time may also be similar to that of obtaining the information of the account, except that an information object is obtained.
The second transmitting unit 330 and the second receiving unit 340 may correspond to a communication interface in the second client, and typically, the communication interface may be a wireless interface, such as an antenna having a transceiving function at the same time, and the like. Of course, if the second client is a wired device, the communication interfaces corresponding to the second receiving unit 340 and the second sending unit 330 may be wired interfaces. The second transmitting unit 330 and the second receiving unit 340 may correspond to different communication interfaces respectively, or may correspond to an interface having dual functions of transmitting and receiving simultaneously.
The embodiment provides a method for authorizing an account by a client, which can actively request a first client to authorize the account, and is convenient for the authorization processing of the account among users.
Example twenty-nine:
as shown in fig. 9, this embodiment provides a client, where the client is a second client, and the second client includes:
a third obtaining unit 310, configured to obtain information of the account requested to be authorized;
a fourth obtaining unit 320, configured to obtain an authorization time;
a second sending unit 330, configured to send an authorization request to the first client based on the information of the account and the authorization time;
a second receiving unit 340, configured to receive a temporary identifier forming authorization for an account based on the authorization request; the temporary identifier is available for the second client to use the account within the authorization time.
The second receiving unit 340 is specifically configured to receive authorization feedback sent by the first client based on the authorization request;
the second sending unit 330 is further configured to send the authorization feedback to a server;
the second receiving unit 340 is further configured to receive a temporary identifier formed by the server based on the authorization feedback.
In this embodiment, the second receiving unit 340 further receives authorization feedback from the first client, and the second sending unit 330 sends the authorization feedback to the server, so that the temporary identifier is obtained, so that the second receiving unit 340 receives the temporary identifier from the server, and the second client or the client that obtains the temporary identifier from the second client conveniently logs in an authorized account within an authorization time and uses the account.
The second client can actively request the first client to authorize the account number, so that software and hardware resources of the second client are better utilized, and the intelligence of the second client is improved.
In the above implementation of the second client, the temporary identifier may be the temporary login key. The temporary identifier can also be formed based on a login key or authorization record information or authority information. For a detailed description of the temporary identifier, reference may be made to any one of the embodiments described above.
Example thirty:
as shown in fig. 10, the present embodiment provides a client, where the client includes:
a fifth obtaining unit 410, configured to obtain a temporary identifier;
an analyzing unit 420, configured to analyze the temporary identifier, and obtain information of the account and authorization time;
a login unit 430, configured to log in the account based on the information of the account in the authorized time.
The client described in this embodiment may be any one of the clients, for example, the second client in the foregoing embodiment, or a third client other than the first client and the second client. The client described in the embodiment of the present invention may include various electronic devices such as a mobile phone, a tablet computer, or a wearable device, for example, various mobile terminals.
The fifth acquiring unit 410 in this embodiment may include an image acquiring unit, and the image acquiring unit may include a structure for acquiring an image, such as a camera or a video camera. The image acquisition unit can acquire and display images and/or text information formed on the first client or the second client based on the temporary identifier in a photographing or scanning mode, so that the temporary identifier is acquired. The fifth obtaining unit 410 may also comprise a communication interface for receiving the temporary identifier from other clients. The second non-acquisition unit 410 may also include a human-computer interaction interface, and acquires the temporary identifier by detecting an operation performed by a user on the human-computer interaction interface.
The parsing unit 420 may include a processor or a processing circuit, and the structure of the processor and the processing circuit may be referred to the description of the embodiments and will not be repeated here.
The login unit may include a communication interface and a processor or a processing circuit, and the communication interface sends the analysis information obtained by analyzing the temporary identifier to the server, so that the server is logged in through the account corresponding to the temporary identifier, and various services provided by the server through the account are obtained.
In the embodiment, the client can rapidly and conveniently log in the account within the authorized time through the temporary identification, so that the account is convenient to borrow, share and rent.
Example thirty one:
as shown in fig. 10, the present embodiment provides a client, where the client includes:
a fifth obtaining unit 410, configured to obtain a temporary identifier;
an analyzing unit 420, configured to analyze the temporary identifier, and obtain information of the account and authorization time;
a login unit 430, configured to log in the account based on the information of the account in the authorized time.
The temporary identifier comprises a temporary login key;
the analyzing unit 420 is specifically configured to analyze the temporary login key, and obtain a login key and an authorization time of an account;
the login unit 430 is specifically configured to log in the account based on the login key if the current time is within the authorized time.
In this embodiment, the temporary login key is the aforementioned temporary login key. The analysis unit 420 may obtain a login key and an authorization time of the account by analyzing the temporary login key, and the login unit 430 may send the authorization time and the login key to the server, so as to quickly and conveniently log in the account, thereby conveniently borrowing, renting, or sharing the account of another person, and facilitating the renting and sharing of the account.
Two specific examples are provided below in connection with any of the embodiments described above:
example one:
in this example, the QQ account of the mobile phone is used as an example, and other accounts can be analogized.
For example, if the user B wants to temporarily borrow the number QQ a of the user a, the user a enters the hand Q, inputs a temporary borrowing time, then the hand Q generates a two-dimensional code, and the user B obtains temporary authorization of the number QQ a after scanning the two-dimensional code through the hand Q, can use the number QQ a within the temporary borrowing time, and the authorization fails after exceeding the time. The temporary time is one of the aforementioned authorized times. The two-dimensional code is authorization information including the temporary identifier.
The interaction mode can be the opposite, B borrows the number, B enters the hand Q to input time to generate the two-dimensional code, then the number owner A scans and confirms the two-dimensional code, the user B obtains authorization, and the number A can be used in the temporary borrowing time.
Example two:
the present example provides a processing system that can be divided into the following five modules.
The login authority checking module is used for executing the following operations:
after the QQ number and the password are verified to log in, a background distributed key can be obtained, the user needs to carry the key to background verification every time the user goes to the background interaction (such as sending and receiving QQ messages and the like), and the user can perform subsequent operation only if the key is valid. This key is hereinafter referred to as the login key.
A temporary permission generation module for performing the following operations:
after the number owner successfully logs in, when the number needs to be temporarily authorized, a temporary authorization time tmp _ time is input, the client carries authorization time and a login key to a temporary authority generating module, the temporary authority generating module firstly enters a login authority checking module to check the validity of the login key, and then the temporary login key is generated and returned to the client after being encrypted by combining the login key and the authorization time tmp _ time.
The temporary permission verification module is used for executing the following operations:
the temporary permission verification module can analyze the temporary login key to obtain the login key and the tmp _ time. If tmp _ time is in effective time, returning to the login key, if timeout has been reached, returning to the login key error message.
A temporary grant generation module to perform the following operations:
and after the client side takes the temporary login key from the server, the two-dimensional code or the file is generated through the generation module.
A temporary grant access module to perform the following operations:
the two-dimensional code is scanned, or the number owner transmits the file to the number borrower in a Bluetooth mode and the like. And then, the number borrower analyzes the temporary login key at the client, then takes the temporary login key to the temporary authority verification module for verification, if the temporary login key is returned, login operation can be carried out, and if the login key error information is obtained, the fact that the login key is overtime is shown, and the authority needs to be applied again.
The process of account authorization in this example may include:
the account is authorized to log in, a temporary login key with temporary authority is generated by the account, the borrower obtains the authorization right to obtain the temporary login key, and the borrower uses the authority within the authorization time based on the temporary login key.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (34)

1. A method for authorizing account authority is characterized by comprising the following steps:
obtaining authorization time for authorization of authority of an account, wherein the authorization time is a time period comprising start time and end time;
generating a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
and returning the temporary identifier to the client so that the client generates authorization information based on the temporary identifier and sends the authorization information to the client needing to be authorized, so that the client needing to be authorized logs in and uses the account within the authorization time based on the temporary identifier.
2. The method of claim 1,
generating a temporary identifier based on the information of the account and the authorization time, wherein the generating comprises:
acquiring a login key of an account;
and generating a temporary login key based on the login key and the authorization time.
3. The method of claim 2,
generating a temporary login key based on the login key and the authorization time, wherein the temporary login key comprises the following steps:
verifying the validity of the login key;
and if the login key is valid, generating the temporary login key by combining the login key and the authorization time.
4. The method of claim 3,
if the login key is valid, generating the temporary login key by combining the login key and the authorization time, wherein the generation process comprises the following steps:
acquiring a login key of the account;
generating the temporary login key by combining the login key, the authorization time and the login key;
the temporary login key is also used for acquiring the login key based on the temporary login key.
5. The method of claim 1,
generating a temporary identifier based on the information of the account and the authorization time, wherein the generating comprises:
obtaining authorization record information;
and generating the temporary identifier by combining the account and the authorization time based on the authorization record information.
6. The method according to any one of claims 1 to 5,
the method further comprises the following steps:
receiving and recording authority information of the account authorization range;
wherein the temporary identifier can also be used to query an index of the rights information.
7. The method according to any one of claims 1 to 5,
the obtaining of the authorization time for authorization of the account for permission includes:
extracting authorization time of the account from an authorization indication or an authorization feedback formed by the first client;
and the authorization feedback is feedback information formed by the first client based on an authorization request of the second client.
8. A method for authorizing account authority is characterized by comprising the following steps:
obtaining authorization time, wherein the authorization time is a time period comprising a start time and an end time;
sending the information of the account and the authorization time to a server;
receiving a temporary identifier generated by a server based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
and sending authorization information generated based on the temporary identifier to a second client, so that the second client logs in and uses the account within the authorization time based on the temporary identifier.
9. The method of claim 8,
the sending the information of the account and the authorization time to the server includes:
a first client logs in an account by using a login key to obtain the login key;
sending the login key and the authorization time to a server;
the receiving server generates a temporary identifier based on the information of the account and the authorization time, and the temporary identifier comprises:
and receiving a temporary login key generated by the server based on the login key and the authorization time.
10. The method of claim 9,
the method further comprises the following steps:
forming authority information of the account authorization range based on user indication;
sending the authority information to the server;
the temporary login key generated by the receiving server based on the login key and the authorization time comprises the following steps:
and receiving the temporary login key generated by the server based on the login key, the authorization time and the authority information.
11. The method according to claim 8 or 9,
the method further comprises the following steps:
sending an authorization indication to the server based on a user indication;
the obtaining of the authorization time comprises:
and receiving the authorization time by utilizing a human-computer interaction interface of the first client.
12. The method according to claim 8 or 9,
the method further comprises the following steps:
receiving an authorization request sent by a second client;
the obtaining of the authorization time comprises:
extracting the authorization time of the second client requesting authorization from the authorization request;
the method further comprises the following steps:
sending authorization feedback to the second client and/or server based on a user indication.
13. A method for authorizing account authority is characterized by comprising the following steps:
acquiring information of an account requested to be authorized;
obtaining authorization time, wherein the authorization time is a time period comprising a start time and an end time;
sending an authorization request to a first client based on the information of the account and the authorization time;
receiving a temporary identification forming authorization for an account based on the authorization request; the temporary identifier is available for the second client to use the account within the authorization time.
14. The method of claim 13,
the receiving of the temporary identifier forming authorization for the account based on the authorization request includes:
receiving authorization feedback sent by the first client based on the authorization request;
sending the authorization feedback to a server;
and receiving a temporary identifier formed by the server based on the authorization feedback.
15. An account login method is characterized by comprising the following steps:
acquiring a temporary identifier, wherein the temporary identifier is formed by authorization of a first client to an account based on an authorization request of a second client, and the second client can use the account within authorization time;
analyzing the temporary identifier, and acquiring information of the account and authorization time, wherein the authorization time is a time period comprising starting time and ending time;
and if so, logging in the account based on the information of the account.
16. The method of claim 15,
the temporary identifier comprises a temporary login key;
the analyzing the temporary identifier to obtain the information of the account and the authorization time includes:
analyzing the temporary login key to obtain a login key and authorization time of an account;
if the account is logged in based on the information of the account within the authorization time, the method includes:
and if the current time is within the authorized time, logging in the account based on the login key.
17. The method of claim 15,
the acquiring the temporary identifier comprises:
receiving authorization information which is sent by a first client and comprises the temporary identifier;
or the like, or, alternatively,
and receiving the temporary identifier sent by the server.
18. A server, characterized in that the server comprises:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring authorization time for authorization of authority of an account, and the authorization time is a time period comprising starting time and ending time;
a generating unit, configured to generate a temporary identifier based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
and the sending unit is used for returning the temporary identifier to the client so that the client generates authorization information based on the temporary identifier and sends the authorization information to the client needing to be authorized so that the client needing to be authorized logs in and uses the account within the authorization time based on the temporary identifier.
19. The server according to claim 18,
the generation unit includes:
the first acquisition module is used for acquiring a login key of an account;
and the generation module is used for generating a temporary login key based on the login key and the authorization time.
20. The server according to claim 19,
the generation module is specifically used for verifying the validity of the login key; and if the login key is valid, generating the temporary login key by combining the login key and the authorization time.
21. The server according to claim 20,
the generation module is further specifically configured to obtain a login key of the account; generating the temporary login key by combining the login key, the authorization time and the login key;
the temporary login key is also used for acquiring the login key based on the temporary login key.
22. The server according to claim 18,
the generation unit is specifically used for acquiring authorization record information; and generating the temporary identifier by combining the account and the authorization time based on the authorization record information.
23. The server according to any one of claims 18 to 22,
the server further comprises:
the communication storage unit is used for receiving and recording the authority information of the account authorization range;
wherein the temporary identifier can also be used to query an index of the rights information.
24. The server according to any one of claims 18 to 22,
the first obtaining unit is specifically configured to extract authorization time of the account from an authorization instruction or authorization feedback formed by a first client;
and the authorization feedback is feedback information formed by the first client based on an authorization request of the second client.
25. A client, wherein the client is a first client, and wherein the first client comprises:
the second acquisition unit is used for acquiring authorized time, wherein the authorized time is a time period comprising a starting time and a terminating time;
the first sending unit is used for sending the information of the account and the authorization time to the server;
a first receiving unit, configured to receive a temporary identifier generated by a server based on the information of the account and the authorization time; wherein the temporary identifier is usable to use the account within the authorization time;
the first sending unit is further configured to send authorization information generated based on the temporary identifier to a second client, so that the second client logs in and uses the account within the authorization time based on the temporary identifier.
26. The client of claim 25,
the first sending unit is specifically used for the first client to log in the account by using the login key to obtain the login key; sending the login key and the authorization time to a server;
the first receiving unit is specifically configured to receive a temporary login key generated by the server based on the login key and the authorization time.
27. The client according to claim 25 or 26,
the first receiving unit is further configured to receive an authorization request sent by a second client;
the second obtaining unit is specifically configured to extract, from the authorization request, authorization time for a second client to request authorization;
the first sending unit is further configured to send authorization feedback to the second client and/or the server based on a user indication.
28. A client, wherein the client is a second client, and wherein the second client comprises:
a third obtaining unit, configured to obtain information of the account requested to be authorized;
a fourth obtaining unit, configured to obtain an authorization time, where the authorization time is a time period including a start time and an end time;
a second sending unit, configured to send an authorization request to the first client based on the information of the account and the authorization time;
a second receiving unit, configured to receive a temporary identifier that forms an authorization for an account based on the authorization request; the temporary identifier is available for the second client to use the account within the authorization time.
29. The client of claim 28,
the second receiving unit is specifically configured to receive authorization feedback sent by the first client based on the authorization request;
the second sending unit is further configured to send the authorization feedback to a server;
the second receiving unit is further specifically configured to receive a temporary identifier formed by the server based on the authorization feedback.
30. A client, the client comprising:
a fifth obtaining unit, configured to obtain a temporary identifier, where the temporary identifier is formed by authorization of the first client for the account based on an authorization request of the second client, and enables the second client to use the account within authorization time;
the analysis unit is used for analyzing the temporary identifier and acquiring the information of the account and the authorization time, wherein the authorization time is a time period comprising a start time and an end time;
and the login unit is used for logging in the account based on the information of the account within the authorization time.
31. The client of claim 30,
the temporary identifier comprises a temporary login key;
the analysis unit is specifically used for analyzing the temporary login key and acquiring a login key and authorization time of an account;
the login unit is specifically configured to log in the account based on the login key if the current time is within the authorized time.
32. A storage medium storing executable instructions which, when executed by a processor, implement a method of authorization of a privilege of an account according to any one of claims 1 to 7.
33. A storage medium storing executable instructions which, when executed by a processor, implement a method of authorising rights to an account according to any of claims 8 to 12.
34. A storage medium having stored thereon executable instructions which, when executed by a processor, carry out the method of any one of claims 13 to 17.
CN201510713640.1A 2015-10-28 2015-10-28 Account authority authorization method, account login method, server and client Active CN105426743B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510713640.1A CN105426743B (en) 2015-10-28 2015-10-28 Account authority authorization method, account login method, server and client

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510713640.1A CN105426743B (en) 2015-10-28 2015-10-28 Account authority authorization method, account login method, server and client

Publications (2)

Publication Number Publication Date
CN105426743A CN105426743A (en) 2016-03-23
CN105426743B true CN105426743B (en) 2020-08-11

Family

ID=55504948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510713640.1A Active CN105426743B (en) 2015-10-28 2015-10-28 Account authority authorization method, account login method, server and client

Country Status (1)

Country Link
CN (1) CN105426743B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105920840B (en) * 2016-06-24 2019-08-30 深圳淘乐网络科技有限公司 A kind of game generation white silk method based on appointed task
CN107920046A (en) * 2016-10-09 2018-04-17 中兴通讯股份有限公司 Account management method and device
CN106778178A (en) * 2016-12-28 2017-05-31 广东虹勤通讯技术有限公司 The call method and device of fingerprint business card
CN106911666B (en) * 2017-01-04 2020-07-17 青岛海信移动通信技术股份有限公司 Wearable intelligent device and message processing method and system thereof
CN106790220B (en) * 2017-01-12 2019-10-11 安徽省刀锋网络科技有限公司 A kind of game account lease management system
CN106850636A (en) * 2017-02-13 2017-06-13 深圳市沃特沃德股份有限公司 A kind of authority acquiring method, authority opening method, terminal and server
CN109977172A (en) * 2019-03-29 2019-07-05 北京金山安全软件有限公司 Information interaction method and device for block chain, electronic equipment and storage medium
CN110519056B (en) * 2019-10-11 2023-02-07 广东虹勤通讯技术有限公司 Login method, password generation method and related devices thereof
CN112003724B (en) * 2020-07-17 2022-07-12 新华三技术有限公司 Network management method and device
CN115086052B (en) * 2022-06-23 2023-07-18 全知科技(杭州)有限责任公司 Method for automatically analyzing account based on HTTP (hyper text transport protocol) traffic

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102959922A (en) * 2010-06-25 2013-03-06 瑞典爱立信有限公司 Method, server and system for granting temporary access to electronic content
CN103401868A (en) * 2013-07-31 2013-11-20 广东欧珀移动通信有限公司 Temporary authorization method for mobile communication equipment of authorizing party and authorized party and temporary authorization management method and device for manager
CN103473499A (en) * 2013-09-16 2013-12-25 笔笔发信息技术(上海)有限公司 Acquisition device and data authorization method thereof
CN103475480A (en) * 2013-09-05 2013-12-25 北京星网锐捷网络技术有限公司 Certificate authority method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8646095B2 (en) * 2006-11-30 2014-02-04 Microsoft Corporation Personal site privacy policy

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102959922A (en) * 2010-06-25 2013-03-06 瑞典爱立信有限公司 Method, server and system for granting temporary access to electronic content
CN103401868A (en) * 2013-07-31 2013-11-20 广东欧珀移动通信有限公司 Temporary authorization method for mobile communication equipment of authorizing party and authorized party and temporary authorization management method and device for manager
CN103475480A (en) * 2013-09-05 2013-12-25 北京星网锐捷网络技术有限公司 Certificate authority method and device
CN103473499A (en) * 2013-09-16 2013-12-25 笔笔发信息技术(上海)有限公司 Acquisition device and data authorization method thereof

Also Published As

Publication number Publication date
CN105426743A (en) 2016-03-23

Similar Documents

Publication Publication Date Title
CN105426743B (en) Account authority authorization method, account login method, server and client
CN101897165B (en) Method of authentication of users in data processing systems
CN104903904B (en) Bar code authentication for resource request
US20070220597A1 (en) Verification system
CN105337974B (en) Account authorization method, account login method, account authorization device and client
CN105227321B (en) Information processing method, server and client
KR102214247B1 (en) Method and apparatus for service implementation
WO2013043534A1 (en) Mobile computing device authentication using scannable images
KR102055625B1 (en) Authentication server device, program, and authentication method
US20180013758A1 (en) Method and system for dynamic password based user authentication and password management
CN104253689B (en) Subscriber card verifying dynamic password method and system based on Quick Response Code
CN104704511A (en) Qr code utilization in self-registration in a network
US11451540B2 (en) Method of authentication
US20210304209A1 (en) Payment two-dimensional code secure payment method and system without two-step authentication
CN110268406A (en) Cipher safety
CN100589382C (en) System and method of dynamic password identification
KR20150135393A (en) Secure automatic authorized access to any application through a third party
CN105763536B (en) Network registering method based on motion graphics password and system
CN103297391A (en) Graphical dynamic password inputting and verifying method
CN109617703B (en) Key management method and device, electronic equipment and storage medium
JP2007133743A (en) Service providing server and authentication system
CN111325538A (en) Payment method based on block chain digital currency and digital watch payment system
CN105956861B (en) Information code reading system
KR102154896B1 (en) System and method for generating security code or virtual account
CN110766388B (en) Virtual card generation method and system and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant