CN106209735A - A kind of information processing method, device and Electronic Health Record system - Google Patents

A kind of information processing method, device and Electronic Health Record system Download PDF

Info

Publication number
CN106209735A
CN106209735A CN201510219957.XA CN201510219957A CN106209735A CN 106209735 A CN106209735 A CN 106209735A CN 201510219957 A CN201510219957 A CN 201510219957A CN 106209735 A CN106209735 A CN 106209735A
Authority
CN
China
Prior art keywords
token
party application
information
data base
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510219957.XA
Other languages
Chinese (zh)
Inventor
常耀斌
李文海
许利群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201510219957.XA priority Critical patent/CN106209735A/en
Publication of CN106209735A publication Critical patent/CN106209735A/en
Pending legal-status Critical Current

Links

Abstract

The invention provides a kind of information processing method, device and Electronic Health Record system, wherein, method includes: obtain the third-party application ID authentication request that third-party application sends, and generates interim token according to third-party application ID authentication request;Interim token is handed down to third-party application, and interim token is preserved to local data base;Obtain the authenticating user identification request that third-party application sends, ask to generate authorization token according to the interim token in data base and authenticating user identification;Authorization token is handed down to third-party application, and authorization token is preserved to local data base;Obtain authorization identifying request and operation requests that third-party application sends, in data base, transfer the user resources of correspondence according to the authorization token in data base, authorization identifying request and operation requests.This programme ensure that safety when user authorizes third-party application to access the resource of oneself storage, and achieves the flexible configuration to user resources.

Description

A kind of information processing method, device and Electronic Health Record system
Technical field
The present invention relates to data service technical field, particularly relate to a kind of information processing method, device and electronics Health account system.
Background technology
In prior art, it is allowed to user authorizes third-party application to access the money oneself stored in Resource Server During source, can by use in the way of the 3rd application interface re-enters account and password, but, the such 3rd Can enough obtain and record the information (account and password) of user, say, that use this implementation to hold The privacy informations such as the easy password exposing user to third party, bring potential safety hazard;
Can also use the mode of server end open interface to make third party obtain user profile, but, this Sample makes user profile be exposed in third-party application, lacks safety, the most also underaction.Especially want The when of data open towards substantial amounts of third-party application, connect statically for each third-party application Mouthful and the customization of communication plan with adaptive, the most loaded down with trivial details, develop and the workload safeguarded be big;Another Aspect also underaction, configurable degree is the lowest;
And, general client configuration, do not account for the third-party application of each seed state.Carrying out EMR (electricity Sub-health account) in information resources opening with share during, the demand of third-party application is multiple many Sample, the biggest from the open authority of different partners, the scene of different application and different data types Differ.Therefore, generic configuration is also difficult to meet these opening and shares demands complicated and changeable.
It addition, the certification of service end based on oauth2 (second filial generation open protocol) and Resource Server do not have Realize configuring authorization resources flexibly.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of information processing method, device and Electronic Health Record System, solves to allow user to authorize third-party application to access in prior art and oneself stores in Resource Server Resource time there is potential safety hazard and the inflexible problem of resource distribution.
In order to solve above-mentioned technical problem, the embodiment of the present invention provides a kind of information processing method, is applied to electricity Sub-health account system, including:
Obtain the third-party application ID authentication request that third-party application sends, according to described third-party application body Part certification request generates interim token;
Described interim token is handed down to described third-party application, and described interim token is preserved to this locality In data base;
Obtain the authenticating user identification request that described third-party application sends, interim according in described data base Token and authenticating user identification request generate authorization token;
Described authorization token is handed down to described third-party application, and described authorization token is preserved to this locality In data base;
Obtain authorization identifying request and operation requests that described third-party application sends, according in described data base Authorization token, authorization identifying request and operation requests transfer in the database correspondence user resources.
Alternatively, the described step according to the described third-party application ID authentication request interim token of generation includes:
Obtain the first parameter information to be verified in described third-party application ID authentication request;
According to the first parameter information corresponding in described data base, described first parameter information to be verified is tested Card;
When being verified, generate described interim token.
Wherein, described first parameter information to be verified includes agreement return type, self-defined mode bit and institute State the account of third-party application, password and return address.
Alternatively, described generation is asked to be awarded according to the interim token in described data base and authenticating user identification The step of power token includes:
Obtain the second parameter information to be verified in the request of described authenticating user identification;
The second parameter information according to the interim token in described data base and correspondence is to described second to be verified Parameter information is verified;
When being verified, generate described authorization token.
Wherein, described second parameter information to be verified include agreement return type, the first token to be certified and The account of user, password and the return address of described third-party application.
Alternatively, described according to the authorization token in described data base, authorization identifying request and operation requests The step of the user resources transferring correspondence in the database includes:
Obtain the second token to be certified in the request of described authorization identifying;
According to the authorization token in described data base, described second token to be certified is authenticated;
When certification is passed through, in described data, transfer the user resources of correspondence according to described operation requests.
Alternatively, the described step according to the described third-party application ID authentication request interim token of generation includes:
Setting pot life and the protocol type of described interim token, wherein, described protocol type is authorization code Type;
Described ask to generate authorization token according to the interim token in described data base and authenticating user identification Step includes:
Setting pot life and the protocol type of described authorization token, wherein, described protocol type is authorization code Type.
Alternatively, before the third-party application ID authentication request that described acquisition third-party application sends, described Information processing method also includes:
Obtain first user information and the open authority of first resource of manager's input;
Open to described first user information and first resource authority is preserved to local data base.
Alternatively, the described number that open to described first user information and first resource authority is preserved extremely this locality After in storehouse, described information processing method also includes:
In the case of keeping registered users to use authority, obtain the operational order of manager;
According to described operational order, the former data message in described data base is carried out respective operations.
Present invention also offers a kind of information processor, be applied to Electronic Health Record system, including:
First processing module, for obtaining the third-party application ID authentication request that third-party application sends, root Interim token is generated according to described third-party application ID authentication request;
Second processing module, for described interim token is handed down to described third-party application, and faces described Time token preserve to local data base;
3rd processing module, for obtaining the authenticating user identification request that described third-party application sends, according to Interim token and authenticating user identification request in described data base generate authorization token;
Fourth processing module, for described authorization token is handed down to described third-party application, and awards described Power token preserves to local data base;
5th processing module, for obtaining authorization identifying request and the operation requests that described third-party application sends, Adjust in the database according to the authorization token in described data base, authorization identifying request and operation requests Take the user resources of correspondence.
Alternatively, described first processing module includes:
First obtains submodule, to be verified for obtaining first in described third-party application ID authentication request Parameter information;
First checking submodule, is used for according to the first parameter information corresponding in described data base described first Parameter information to be verified is verified;
First generates submodule, for when being verified, generates described interim token.
Wherein, described first parameter information to be verified includes agreement return type, self-defined mode bit and institute State the account of third-party application, password and return address.
Alternatively, described 3rd processing module includes:
Second obtains submodule, for obtaining the second parameter to be verified letter in the request of described authenticating user identification Breath;
Second checking submodule, for according to the interim token in described data base and the second parameter of correspondence Described second parameter information to be verified is verified by information;
Second generates submodule, for when being verified, generates described authorization token.
Wherein, described second parameter information to be verified include agreement return type, the first token to be certified and The account of user, password and the return address of described third-party application.
Alternatively, described 5th processing module includes:
3rd obtains submodule, for obtaining the second token to be certified in the request of described authorization identifying;
Authentication sub module, for entering described second token to be certified according to the authorization token in described data base Row certification;
Transferring submodule, for when certification is passed through, it is right to transfer in described data according to described operation requests The user resources answered.
Alternatively, described first processing module includes:
First sets submodule, for setting pot life and the protocol type of described interim token, wherein, Described protocol type is authorization code type;
Described 3rd processing module includes:
Second sets submodule, for setting pot life and the protocol type of described authorization token, wherein, Described protocol type is authorization code type.
Alternatively, described information processor also includes:
First acquisition module, before described first processing module performs the operation obtained, obtains manager The first user information of input and the open authority of first resource;
Preservation module, for preserving open to described first user information and first resource authority to this locality In data base.
Alternatively, described information processor also includes:
Second acquisition module, after described preservation module performs associative operation, is keeping registered users In the case of using authority, obtain the operational order of manager;
6th processing module, for carrying out the former data message in described data base according to described operational order Respective operations.
Present invention also offers a kind of Electronic Health Record system, including: above-mentioned information processor.
Having the beneficial effect that of the technique scheme of the present invention:
In such scheme, described information processing method obtains the resource of user's storage by authorizing third-party application , verify before, solve the problem that there is potential safety hazard, simultaneously as user storage resource with And the relevant information that checking relates to therebetween is stored in the data base of Electronic Health Record system, data base's energy Enough realizing opening, resource and authority can be configured by manager, it is achieved that flexible to resource Configuration.
Accompanying drawing explanation
Fig. 1 is information processing method schematic flow sheet in the embodiment of the present invention one;
Fig. 2 is information processing method schematic flow sheet in the embodiment of the present invention two;
Fig. 3 is information processing method schematic flow sheet in the embodiment of the present invention three;
Fig. 4 is information processor structural representation in the embodiment of the present invention four;
Fig. 5 is information processor structural representation in the embodiment of the present invention five;
Fig. 6 is information processor structural representation in the embodiment of the present invention six.
Detailed description of the invention
For making the technical problem to be solved in the present invention, technical scheme and advantage clearer, below in conjunction with attached Figure and specific embodiment are described in detail.
The present invention is directed to existing technology allow user authorize third-party application to access oneself at Resource Server Potential safety hazard and the inflexible problem of resource distribution is there is, it is provided that multiple solution party during the resource of middle storage Case, specific as follows:
Embodiment one
See Fig. 1, the information processing method of the embodiment of the present invention one, be applied to Electronic Health Record system, bag Include:
Step 11: obtain the third-party application ID authentication request that third-party application sends, according to the described 3rd Side's application identity certification request generates interim token;
Step 12: described interim token is handed down to described third-party application, and described interim token is preserved To local data base;
Step 13: obtain the authenticating user identification request that described third-party application sends, according to described data base In interim token and authenticating user identification request generate authorization token;
Step 14: described authorization token is handed down to described third-party application, and described authorization token is preserved To local data base;
Step 15: obtain authorization identifying request and operation requests that described third-party application sends, according to described Authorization token, authorization identifying request and operation requests in data base transfer correspondence in the database User resources.
In embodiments of the invention one, described information processing method obtains user by authorizing third-party application Before the resource of storage, verify, solve the problem that there is potential safety hazard, simultaneously as user deposits The relevant information that the resource of storage and checking relate to therebetween is stored in the data base of Electronic Health Record system, Data base is capable of opening, and resource and authority can be configured by manager, it is achieved that to money The flexible configuration in source.
Wherein, the described step according to the described third-party application ID authentication request interim token of generation includes: Obtain the first parameter information to be verified in described third-party application ID authentication request;According to described data base Described first parameter information to be verified is verified by the first parameter information of middle correspondence;When being verified, Generate described interim token.
Concrete, described first parameter information to be verified include agreement return type, self-defined mode bit and The account of described third-party application, password and return address.Agreement return type should to third party for limiting With the protocol type of the interim token of feedback, self-defined mode bit is used for informing that related personnel is presently in step Sequence number, the account of third-party application and password for verifying the identity of third-party application, third-party application Return address feeds back to third party according to this address after Electronic Health Record system generates interim token should With.
Wherein, described ask to generate according to the interim token in described data base and authenticating user identification authorize The step of token includes: obtain the second parameter information to be verified in the request of described authenticating user identification;According to Interim token in described data base and the second parameter information of correspondence are to described second parameter information to be verified Verify;When being verified, generate described authorization token.
Concrete, described second parameter information to be verified include agreement return type, the first token to be certified with And the account of user, password and the return address of described third-party application.Agreement return type for limit to The protocol type of the authorization token of third-party application feedback, the account of user and password are tested for the identity of user Card, the return address of third-party application generates after authorization token according to this ground for Electronic Health Record system Location feeds back to third-party application.In fact, the first token to be certified herein should be Electronic Health Record in theory The interim token that system issues.
Wherein, described according to the authorization token in described data base, authorization identifying request and operation requests exist The step of user resources transferring correspondence in described data base includes: obtain the in the request of described authorization identifying Two tokens to be certified;According to the authorization token in described data base, described second token to be certified is authenticated; When certification is passed through, in described data, transfer the user resources of correspondence according to described operation requests.Herein Second token to be certified should be the authorization token that Electronic Health Record system issues in theory.
Wherein, the described step according to the described third-party application ID authentication request interim token of generation includes: Setting pot life and the protocol type of described interim token, wherein, described protocol type is authorization code type;
Described ask to generate authorization token according to the interim token in described data base and authenticating user identification Step includes: setting pot life and the protocol type of described authorization token, wherein, described protocol type is Authorization code type.
Embodiment two
See Fig. 2, on the basis of embodiments of the invention one, in embodiments of the invention two, described acquisition Before the third-party application ID authentication request that third-party application sends, described information processing method also includes:
Step 21: obtain first user information and the open authority of first resource of manager's input;
Step 22: open to described first user information and first resource authority is preserved to local data base In.
Embodiments of the invention two provide manager and the user resources of differently configured authority are stored in data base In scheme, it is achieved that the flexible configuration of user resources.
Embodiment three
See Fig. 3, on the basis of embodiments of the invention two, in embodiments of the invention three, described by institute After stating in the data base of first user information and first resource open authority preservation extremely this locality, described information Processing method also includes:
Step 31: in the case of keeping registered users to use authority, obtain the operational order of manager;
Step 32: the former data message in described data base is carried out respective operations according to described operational order.
Wherein, described operational order includes increasing, changing and deletion etc..
The flow process related in embodiments of the invention three can be before the flow process of embodiments of the invention one, it is possible to With after which, Fig. 3 only for illustrating, is not construed as limiting.
Embodiments of the invention three provide the on-line operation service of user resources, and it is right to solve in prior art Need system to roll off the production line when user resources operate, cause other normal users cannot use system, bring not Just problem.
Embodiment four
See Fig. 4, the information processor of the embodiment of the present invention four, be applied to Electronic Health Record system, bag Include:
First processing module 41, for obtaining the third-party application ID authentication request that third-party application sends, Interim token is generated according to described third-party application ID authentication request;
Second processing module 42, for being handed down to described third-party application by described interim token, and by described Interim token preserves to local data base;
3rd processing module 43, for obtaining the authenticating user identification request that described third-party application sends, root Ask to generate authorization token according to the interim token in described data base and authenticating user identification;
Fourth processing module 44, for being handed down to described third-party application, and by described by described authorization token Authorization token preserves to local data base;
5th processing module 45, the authorization identifying sent for obtaining described third-party application please sum operation be asked Ask, ask according to the authorization token in described data base, authorization identifying and operation requests is described data base In transfer correspondence user resources.
In embodiments of the invention four, described information processor obtains user by authorizing third-party application Before the resource of storage, verify, solve the problem that there is potential safety hazard, simultaneously as user deposits The relevant information that the resource of storage and checking relate to therebetween is stored in the data base of Electronic Health Record system, Data base is capable of opening, and resource and authority can be configured by manager, it is achieved that to money The flexible configuration in source.
Wherein, described first processing module includes: first obtains submodule, and being used for obtaining described third party should With the parameter information to be verified of first in ID authentication request;First checking submodule, for according to described number According to the first parameter information corresponding in storehouse, described first parameter information to be verified is verified;First generates son Module, for when being verified, generates described interim token.
Concrete, described first parameter information to be verified include agreement return type, self-defined mode bit and The account of described third-party application, password and return address.Agreement return type should to third party for limiting With the protocol type of the interim token of feedback, self-defined mode bit is used for informing that related personnel is presently in step Sequence number, the account of third-party application and password for verifying the identity of third-party application, third-party application Return address feeds back to third party according to this address after Electronic Health Record system generates interim token should With.
Wherein, described 3rd processing module includes: second obtains submodule, is used for obtaining described user identity The second parameter information to be verified in certification request;Second checking submodule, for according in described data base Interim token and the second parameter information of correspondence described second parameter information to be verified is verified;The Two generate submodule, for when being verified, generate described authorization token.
Concrete, described second parameter information to be verified include agreement return type, the first token to be certified with And the account of user, password and the return address of described third-party application.Agreement return type for limit to The protocol type of the authorization token of third-party application feedback, the account of user and password are tested for the identity of user Card, the return address of third-party application generates after authorization token according to this ground for Electronic Health Record system Location feeds back to third-party application.In fact, the first token to be certified herein should be Electronic Health Record in theory The interim token that system issues.
Wherein, described 5th processing module includes: the 3rd obtains submodule, is used for obtaining described authorization identifying The second token to be certified in request;Authentication sub module, for according to the authorization token pair in described data base Described second token to be certified is authenticated;Transfer submodule, for when certification is passed through, according to described behaviour Ask to transfer the user resources of correspondence in described data.The second token to be certified herein should be in theory The authorization token that Electronic Health Record system issues.
Wherein, described first processing module includes: first sets submodule, is used for setting described interim token Pot life and protocol type, wherein, described protocol type is authorization code type;
Described 3rd processing module includes: second sets submodule, for setting the use of described authorization token Time limit and protocol type, wherein, described protocol type is authorization code type.
In embodiments of the invention four, this information processor can be by existing Electronic Health Record system System improves the function realizing information processor in embodiment four.
Embodiment five
See Fig. 5, on the basis of embodiments of the invention four, in embodiments of the invention five, described information Processing means also includes:
First acquisition module 51, before described first processing module performs the operation obtained, obtains management The first user information of member's input and the open authority of first resource;
Preserve module 52, for preserving open to described first user information and first resource authority to local Data base in.
Embodiments of the invention two provide manager and the user resources of differently configured authority are stored in data base In scheme, it is achieved that the flexible configuration of user resources.
In embodiments of the invention five, this information processor can be by existing Electronic Health Record system System improves the function realizing information processor in embodiment five.
Embodiment six
See Fig. 6, on the basis of embodiments of the invention five, in embodiments of the invention six, described information Processing means also includes:
Second acquisition module 61, after described preservation module performs associative operation, is keeping registered use In the case of family uses authority, obtain the operational order of manager;
6th processing module 62, for entering the former data message in described data base according to described operational order Row respective operations.
Wherein, described operational order includes increasing, changing and deletion etc..
The functional module related in embodiments of the invention six can the functional module of embodiments of the invention four it Front performing operation, it is also possible to perform operation after which, Fig. 6 only for illustrating, is not construed as limiting.
Embodiments of the invention six provide the on-line operation service of user resources, and it is right to solve in prior art Need system to roll off the production line when user resources operate, cause other normal users cannot use system, bring not Just problem.
In embodiments of the invention six, this information processor can be by existing Electronic Health Record system System improves the function realizing information processor in embodiment six.
The scheme that the present invention provides in the specific implementation, can be arranged external-open in Electronic Health Record system Put interface API, data base, database management module and authentication module, oriented data base obtain information Operation is both needed to be realized by API, and all operations being changed data message in data base are both needed to by number Realize according to database management module.
In summary, the scheme that the present invention provides allows EMR (Electronic Health Record) system flexible configuration open Resource (providing for outer open interface API, configure in data base);Allow detailed by user Thin information and token are all in preserving data base, and can be managed user resources.It addition, the present invention carries The scheme of confession can in data base the base attribute of extending user details, add trusted attribute (trust Value attribute), it is used for judging whether user is trusty.
Further, the scheme that the present invention provides can be for the different authority of different resource distributions: and authority pipe Reason combines, and gives different authorization policy for different roles, and the resource identification of role and authentication is carried out Binding (will the resource that can necessarily operate of a certain role and this role bind), it is possible to realize authority Strategy, role, the association of resource, carry out fine authority to the various information resource in user health archives Controlling and management, information resources can be allowed to refine to the concrete role of user opening and shares when, this is right Have great importance in typical many roles information resources share scene;Can be by resource management's configuration and mirror Power configuration is separately, it is achieved that the loose coupling configuration of resource management's configuration and authentication configuration.
Above-described is the preferred embodiment of the present invention, it should be pointed out that for the ordinary people of the art For Yuan, without departing under principle premise of the present invention, it is also possible to make some improvements and modifications, these Improvements and modifications also should be regarded as protection scope of the present invention.

Claims (19)

1. an information processing method, is applied to Electronic Health Record system, it is characterised in that including:
Obtain the third-party application ID authentication request that third-party application sends, according to described third-party application body Part certification request generates interim token;
Described interim token is handed down to described third-party application, and described interim token is preserved to this locality In data base;
Obtain the authenticating user identification request that described third-party application sends, interim according in described data base Token and authenticating user identification request generate authorization token;
Described authorization token is handed down to described third-party application, and described authorization token is preserved to this locality In data base;
Obtain authorization identifying request and operation requests that described third-party application sends, according in described data base Authorization token, authorization identifying request and operation requests transfer in the database correspondence user resources.
2. information processing method as claimed in claim 1, it is characterised in that described according to described third party Application identity certification request generates the step of interim token and includes:
Obtain the first parameter information to be verified in described third-party application ID authentication request;
According to the first parameter information corresponding in described data base, described first parameter information to be verified is tested Card;
When being verified, generate described interim token.
3. information processing method as claimed in claim 2, it is characterised in that described first parameter to be verified Information includes agreement return type, self-defined mode bit and the account of described third-party application, password and returns Go back to address.
4. information processing method as claimed in claim 1, it is characterised in that described according to described data base In interim token and authenticating user identification request generate authorization token step include:
Obtain the second parameter information to be verified in the request of described authenticating user identification;
The second parameter information according to the interim token in described data base and correspondence is to described second to be verified Parameter information is verified;
When being verified, generate described authorization token.
5. information processing method as claimed in claim 4, it is characterised in that described second parameter to be verified Information includes agreement return type, the first token to be certified and the account of user, password and described third party The return address of application.
6. information processing method as claimed in claim 1, it is characterised in that described according to described data base In authorization token, authorization identifying request and operation requests transfer in the database correspondence user money The step in source includes:
Obtain the second token to be certified in the request of described authorization identifying;
According to the authorization token in described data base, described second token to be certified is authenticated;
When certification is passed through, in described data, transfer the user resources of correspondence according to described operation requests.
7. information processing method as claimed in claim 1, it is characterised in that described according to described third party Application identity certification request generates the step of interim token and includes:
Setting pot life and the protocol type of described interim token, wherein, described protocol type is authorization code Type;
Described ask to generate authorization token according to the interim token in described data base and authenticating user identification Step includes:
Setting pot life and the protocol type of described authorization token, wherein, described protocol type is authorization code Type.
8. information processing method as claimed in claim 1, it is characterised in that described acquisition third-party application Before the third-party application ID authentication request sent, described information processing method also includes:
Obtain first user information and the open authority of first resource of manager's input;
Open to described first user information and first resource authority is preserved to local data base.
9. information processing method as claimed in claim 8, it is characterised in that described by described first user After information and the open authority of first resource preserve to local data base, described information processing method is also Including:
In the case of keeping registered users to use authority, obtain the operational order of manager;
According to described operational order, the former data message in described data base is carried out respective operations.
10. an information processor, is applied to Electronic Health Record system, it is characterised in that including:
First processing module, for obtaining the third-party application ID authentication request that third-party application sends, root Interim token is generated according to described third-party application ID authentication request;
Second processing module, for described interim token is handed down to described third-party application, and faces described Time token preserve to local data base;
3rd processing module, for obtaining the authenticating user identification request that described third-party application sends, according to Interim token and authenticating user identification request in described data base generate authorization token;
Fourth processing module, for described authorization token is handed down to described third-party application, and awards described Power token preserves to local data base;
5th processing module, for obtaining authorization identifying request and the operation requests that described third-party application sends, Adjust in the database according to the authorization token in described data base, authorization identifying request and operation requests Take the user resources of correspondence.
11. information processors as claimed in claim 10, it is characterised in that described first processing module Including:
First obtains submodule, to be verified for obtaining first in described third-party application ID authentication request Parameter information;
First checking submodule, is used for according to the first parameter information corresponding in described data base described first Parameter information to be verified is verified;
First generates submodule, for when being verified, generates described interim token.
12. information processors as claimed in claim 11, it is characterised in that described first ginseng to be verified Number information include agreement return type, self-defined mode bit and the account of described third-party application, password and Return address.
13. information processors as claimed in claim 10, it is characterised in that described 3rd processing module Including:
Second obtains submodule, for obtaining the second parameter to be verified letter in the request of described authenticating user identification Breath;
Second checking submodule, for according to the interim token in described data base and the second parameter of correspondence Described second parameter information to be verified is verified by information;
Second generates submodule, for when being verified, generates described authorization token.
14. information processors as claimed in claim 13, it is characterised in that described second ginseng to be verified Number information includes agreement return type, the first token to be certified and the account of user, password and the described 3rd The return address of Fang Yingyong.
15. information processors as claimed in claim 10, it is characterised in that described 5th processing module Including:
3rd obtains submodule, for obtaining the second token to be certified in the request of described authorization identifying;
Authentication sub module, for entering described second token to be certified according to the authorization token in described data base Row certification;
Transferring submodule, for when certification is passed through, it is right to transfer in described data according to described operation requests The user resources answered.
16. information processors as claimed in claim 10, it is characterised in that described first processing module Including:
First sets submodule, for setting pot life and the protocol type of described interim token, wherein, Described protocol type is authorization code type;
Described 3rd processing module includes:
Second sets submodule, for setting pot life and the protocol type of described authorization token, wherein, Described protocol type is authorization code type.
17. information processors as claimed in claim 10, it is characterised in that described information processor Also include:
First acquisition module, before described first processing module performs the operation obtained, obtains manager The first user information of input and the open authority of first resource;
Preservation module, for preserving open to described first user information and first resource authority to this locality In data base.
18. information processors as claimed in claim 17, it is characterised in that described information processor Also include:
Second acquisition module, after described preservation module performs associative operation, is keeping registered users In the case of using authority, obtain the operational order of manager;
6th processing module, for carrying out the former data message in described data base according to described operational order Respective operations.
19. 1 kinds of Electronic Health Record systems, it is characterised in that including: as claim 10 to 18 is arbitrary Information processor described in Xiang.
CN201510219957.XA 2015-04-30 2015-04-30 A kind of information processing method, device and Electronic Health Record system Pending CN106209735A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510219957.XA CN106209735A (en) 2015-04-30 2015-04-30 A kind of information processing method, device and Electronic Health Record system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510219957.XA CN106209735A (en) 2015-04-30 2015-04-30 A kind of information processing method, device and Electronic Health Record system

Publications (1)

Publication Number Publication Date
CN106209735A true CN106209735A (en) 2016-12-07

Family

ID=57457726

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510219957.XA Pending CN106209735A (en) 2015-04-30 2015-04-30 A kind of information processing method, device and Electronic Health Record system

Country Status (1)

Country Link
CN (1) CN106209735A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107896227A (en) * 2017-12-14 2018-04-10 珠海格力电器股份有限公司 A kind of data calling method, device and device data cloud platform
CN108921257A (en) * 2018-08-31 2018-11-30 深圳市研本品牌设计有限公司 A kind of cleaning unmanned plane and storage medium
CN109426734A (en) * 2017-08-28 2019-03-05 阿里巴巴集团控股有限公司 A kind of access method, device, system and electronic equipment
CN112491778A (en) * 2019-09-11 2021-03-12 北京京东尚科信息技术有限公司 Authentication method, device, system and medium
CN112613073A (en) * 2020-12-28 2021-04-06 中国农业银行股份有限公司 Open platform authentication and authorization method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102713865A (en) * 2009-10-20 2012-10-03 汤森路透环球资源公司 Entitled data cache management
CN103188244A (en) * 2011-12-31 2013-07-03 卓望数码技术(深圳)有限公司 System and method for achieving authorization management based on OAuth
CN103581140A (en) * 2012-08-03 2014-02-12 腾讯科技(深圳)有限公司 Authorization control method, device and system and authorization request method and device
CN104144167A (en) * 2014-08-15 2014-11-12 深圳市蜂联科技有限公司 User login authentication method of open intelligent gateway platform

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102713865A (en) * 2009-10-20 2012-10-03 汤森路透环球资源公司 Entitled data cache management
CN103188244A (en) * 2011-12-31 2013-07-03 卓望数码技术(深圳)有限公司 System and method for achieving authorization management based on OAuth
CN103581140A (en) * 2012-08-03 2014-02-12 腾讯科技(深圳)有限公司 Authorization control method, device and system and authorization request method and device
CN104144167A (en) * 2014-08-15 2014-11-12 深圳市蜂联科技有限公司 User login authentication method of open intelligent gateway platform

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109426734A (en) * 2017-08-28 2019-03-05 阿里巴巴集团控股有限公司 A kind of access method, device, system and electronic equipment
CN107896227A (en) * 2017-12-14 2018-04-10 珠海格力电器股份有限公司 A kind of data calling method, device and device data cloud platform
CN108921257A (en) * 2018-08-31 2018-11-30 深圳市研本品牌设计有限公司 A kind of cleaning unmanned plane and storage medium
CN112491778A (en) * 2019-09-11 2021-03-12 北京京东尚科信息技术有限公司 Authentication method, device, system and medium
CN112613073A (en) * 2020-12-28 2021-04-06 中国农业银行股份有限公司 Open platform authentication and authorization method and device

Similar Documents

Publication Publication Date Title
US11963006B2 (en) Secure mobile initiated authentication
US20210103667A1 (en) Device and methods for management and access of distributed data sources
CN108337260B (en) Multi-tenant identity and data security management cloud service
TWI717728B (en) Identity verification and login method, device and computer equipment
US9237020B2 (en) Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment
US20180041479A1 (en) System and method for identity authentication
CN109314704A (en) Function is nullified for multi-tenant identity and the single-sign-on and single-point of data safety management cloud service
CN109565511A (en) Tenant and service management for multi-tenant identity and data safety management cloud service
CN104917741B (en) A kind of plain text document public network secure transmission system based on USBKEY
CN110300102A (en) A kind of Internet of Things safety access system and method based on block chain
CN108293045A (en) Single-sign-on Identity Management between local and remote system
US20100299738A1 (en) Claims-based authorization at an identity provider
WO2022247359A1 (en) Cluster access method and apparatus, electronic device, and medium
CN106134154A (en) The technology that the authentication token operation utilizing machine to generate services
CN104168304B (en) Single-node login system and method under VDI environment
CN106209735A (en) A kind of information processing method, device and Electronic Health Record system
CN105359491A (en) User authentication in a cloud environment
CN105635168B (en) A kind of application method of offline transaction device and its security key
WO2021127577A1 (en) Secure mobile initiated authentications to web-services
CN109587101A (en) A kind of digital certificate management method, device and storage medium
CN104717261A (en) Login method and desktop management device
CN110599342B (en) Block chain-based identity information authorization method and device
US20170171192A1 (en) Managing exchanges of sensitive data
WO2020056996A1 (en) Method and apparatus for managing donation information, computer device, and storage medium
WO2021127575A1 (en) Secure mobile initiated authentication

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161207

RJ01 Rejection of invention patent application after publication