CN106209735A - A kind of information processing method, device and Electronic Health Record system - Google Patents
A kind of information processing method, device and Electronic Health Record system Download PDFInfo
- Publication number
- CN106209735A CN106209735A CN201510219957.XA CN201510219957A CN106209735A CN 106209735 A CN106209735 A CN 106209735A CN 201510219957 A CN201510219957 A CN 201510219957A CN 106209735 A CN106209735 A CN 106209735A
- Authority
- CN
- China
- Prior art keywords
- token
- party application
- information
- data base
- authorization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention provides a kind of information processing method, device and Electronic Health Record system, wherein, method includes: obtain the third-party application ID authentication request that third-party application sends, and generates interim token according to third-party application ID authentication request;Interim token is handed down to third-party application, and interim token is preserved to local data base;Obtain the authenticating user identification request that third-party application sends, ask to generate authorization token according to the interim token in data base and authenticating user identification;Authorization token is handed down to third-party application, and authorization token is preserved to local data base;Obtain authorization identifying request and operation requests that third-party application sends, in data base, transfer the user resources of correspondence according to the authorization token in data base, authorization identifying request and operation requests.This programme ensure that safety when user authorizes third-party application to access the resource of oneself storage, and achieves the flexible configuration to user resources.
Description
Technical field
The present invention relates to data service technical field, particularly relate to a kind of information processing method, device and electronics
Health account system.
Background technology
In prior art, it is allowed to user authorizes third-party application to access the money oneself stored in Resource Server
During source, can by use in the way of the 3rd application interface re-enters account and password, but, the such 3rd
Can enough obtain and record the information (account and password) of user, say, that use this implementation to hold
The privacy informations such as the easy password exposing user to third party, bring potential safety hazard;
Can also use the mode of server end open interface to make third party obtain user profile, but, this
Sample makes user profile be exposed in third-party application, lacks safety, the most also underaction.Especially want
The when of data open towards substantial amounts of third-party application, connect statically for each third-party application
Mouthful and the customization of communication plan with adaptive, the most loaded down with trivial details, develop and the workload safeguarded be big;Another
Aspect also underaction, configurable degree is the lowest;
And, general client configuration, do not account for the third-party application of each seed state.Carrying out EMR (electricity
Sub-health account) in information resources opening with share during, the demand of third-party application is multiple many
Sample, the biggest from the open authority of different partners, the scene of different application and different data types
Differ.Therefore, generic configuration is also difficult to meet these opening and shares demands complicated and changeable.
It addition, the certification of service end based on oauth2 (second filial generation open protocol) and Resource Server do not have
Realize configuring authorization resources flexibly.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of information processing method, device and Electronic Health Record
System, solves to allow user to authorize third-party application to access in prior art and oneself stores in Resource Server
Resource time there is potential safety hazard and the inflexible problem of resource distribution.
In order to solve above-mentioned technical problem, the embodiment of the present invention provides a kind of information processing method, is applied to electricity
Sub-health account system, including:
Obtain the third-party application ID authentication request that third-party application sends, according to described third-party application body
Part certification request generates interim token;
Described interim token is handed down to described third-party application, and described interim token is preserved to this locality
In data base;
Obtain the authenticating user identification request that described third-party application sends, interim according in described data base
Token and authenticating user identification request generate authorization token;
Described authorization token is handed down to described third-party application, and described authorization token is preserved to this locality
In data base;
Obtain authorization identifying request and operation requests that described third-party application sends, according in described data base
Authorization token, authorization identifying request and operation requests transfer in the database correspondence user resources.
Alternatively, the described step according to the described third-party application ID authentication request interim token of generation includes:
Obtain the first parameter information to be verified in described third-party application ID authentication request;
According to the first parameter information corresponding in described data base, described first parameter information to be verified is tested
Card;
When being verified, generate described interim token.
Wherein, described first parameter information to be verified includes agreement return type, self-defined mode bit and institute
State the account of third-party application, password and return address.
Alternatively, described generation is asked to be awarded according to the interim token in described data base and authenticating user identification
The step of power token includes:
Obtain the second parameter information to be verified in the request of described authenticating user identification;
The second parameter information according to the interim token in described data base and correspondence is to described second to be verified
Parameter information is verified;
When being verified, generate described authorization token.
Wherein, described second parameter information to be verified include agreement return type, the first token to be certified and
The account of user, password and the return address of described third-party application.
Alternatively, described according to the authorization token in described data base, authorization identifying request and operation requests
The step of the user resources transferring correspondence in the database includes:
Obtain the second token to be certified in the request of described authorization identifying;
According to the authorization token in described data base, described second token to be certified is authenticated;
When certification is passed through, in described data, transfer the user resources of correspondence according to described operation requests.
Alternatively, the described step according to the described third-party application ID authentication request interim token of generation includes:
Setting pot life and the protocol type of described interim token, wherein, described protocol type is authorization code
Type;
Described ask to generate authorization token according to the interim token in described data base and authenticating user identification
Step includes:
Setting pot life and the protocol type of described authorization token, wherein, described protocol type is authorization code
Type.
Alternatively, before the third-party application ID authentication request that described acquisition third-party application sends, described
Information processing method also includes:
Obtain first user information and the open authority of first resource of manager's input;
Open to described first user information and first resource authority is preserved to local data base.
Alternatively, the described number that open to described first user information and first resource authority is preserved extremely this locality
After in storehouse, described information processing method also includes:
In the case of keeping registered users to use authority, obtain the operational order of manager;
According to described operational order, the former data message in described data base is carried out respective operations.
Present invention also offers a kind of information processor, be applied to Electronic Health Record system, including:
First processing module, for obtaining the third-party application ID authentication request that third-party application sends, root
Interim token is generated according to described third-party application ID authentication request;
Second processing module, for described interim token is handed down to described third-party application, and faces described
Time token preserve to local data base;
3rd processing module, for obtaining the authenticating user identification request that described third-party application sends, according to
Interim token and authenticating user identification request in described data base generate authorization token;
Fourth processing module, for described authorization token is handed down to described third-party application, and awards described
Power token preserves to local data base;
5th processing module, for obtaining authorization identifying request and the operation requests that described third-party application sends,
Adjust in the database according to the authorization token in described data base, authorization identifying request and operation requests
Take the user resources of correspondence.
Alternatively, described first processing module includes:
First obtains submodule, to be verified for obtaining first in described third-party application ID authentication request
Parameter information;
First checking submodule, is used for according to the first parameter information corresponding in described data base described first
Parameter information to be verified is verified;
First generates submodule, for when being verified, generates described interim token.
Wherein, described first parameter information to be verified includes agreement return type, self-defined mode bit and institute
State the account of third-party application, password and return address.
Alternatively, described 3rd processing module includes:
Second obtains submodule, for obtaining the second parameter to be verified letter in the request of described authenticating user identification
Breath;
Second checking submodule, for according to the interim token in described data base and the second parameter of correspondence
Described second parameter information to be verified is verified by information;
Second generates submodule, for when being verified, generates described authorization token.
Wherein, described second parameter information to be verified include agreement return type, the first token to be certified and
The account of user, password and the return address of described third-party application.
Alternatively, described 5th processing module includes:
3rd obtains submodule, for obtaining the second token to be certified in the request of described authorization identifying;
Authentication sub module, for entering described second token to be certified according to the authorization token in described data base
Row certification;
Transferring submodule, for when certification is passed through, it is right to transfer in described data according to described operation requests
The user resources answered.
Alternatively, described first processing module includes:
First sets submodule, for setting pot life and the protocol type of described interim token, wherein,
Described protocol type is authorization code type;
Described 3rd processing module includes:
Second sets submodule, for setting pot life and the protocol type of described authorization token, wherein,
Described protocol type is authorization code type.
Alternatively, described information processor also includes:
First acquisition module, before described first processing module performs the operation obtained, obtains manager
The first user information of input and the open authority of first resource;
Preservation module, for preserving open to described first user information and first resource authority to this locality
In data base.
Alternatively, described information processor also includes:
Second acquisition module, after described preservation module performs associative operation, is keeping registered users
In the case of using authority, obtain the operational order of manager;
6th processing module, for carrying out the former data message in described data base according to described operational order
Respective operations.
Present invention also offers a kind of Electronic Health Record system, including: above-mentioned information processor.
Having the beneficial effect that of the technique scheme of the present invention:
In such scheme, described information processing method obtains the resource of user's storage by authorizing third-party application
, verify before, solve the problem that there is potential safety hazard, simultaneously as user storage resource with
And the relevant information that checking relates to therebetween is stored in the data base of Electronic Health Record system, data base's energy
Enough realizing opening, resource and authority can be configured by manager, it is achieved that flexible to resource
Configuration.
Accompanying drawing explanation
Fig. 1 is information processing method schematic flow sheet in the embodiment of the present invention one;
Fig. 2 is information processing method schematic flow sheet in the embodiment of the present invention two;
Fig. 3 is information processing method schematic flow sheet in the embodiment of the present invention three;
Fig. 4 is information processor structural representation in the embodiment of the present invention four;
Fig. 5 is information processor structural representation in the embodiment of the present invention five;
Fig. 6 is information processor structural representation in the embodiment of the present invention six.
Detailed description of the invention
For making the technical problem to be solved in the present invention, technical scheme and advantage clearer, below in conjunction with attached
Figure and specific embodiment are described in detail.
The present invention is directed to existing technology allow user authorize third-party application to access oneself at Resource Server
Potential safety hazard and the inflexible problem of resource distribution is there is, it is provided that multiple solution party during the resource of middle storage
Case, specific as follows:
Embodiment one
See Fig. 1, the information processing method of the embodiment of the present invention one, be applied to Electronic Health Record system, bag
Include:
Step 11: obtain the third-party application ID authentication request that third-party application sends, according to the described 3rd
Side's application identity certification request generates interim token;
Step 12: described interim token is handed down to described third-party application, and described interim token is preserved
To local data base;
Step 13: obtain the authenticating user identification request that described third-party application sends, according to described data base
In interim token and authenticating user identification request generate authorization token;
Step 14: described authorization token is handed down to described third-party application, and described authorization token is preserved
To local data base;
Step 15: obtain authorization identifying request and operation requests that described third-party application sends, according to described
Authorization token, authorization identifying request and operation requests in data base transfer correspondence in the database
User resources.
In embodiments of the invention one, described information processing method obtains user by authorizing third-party application
Before the resource of storage, verify, solve the problem that there is potential safety hazard, simultaneously as user deposits
The relevant information that the resource of storage and checking relate to therebetween is stored in the data base of Electronic Health Record system,
Data base is capable of opening, and resource and authority can be configured by manager, it is achieved that to money
The flexible configuration in source.
Wherein, the described step according to the described third-party application ID authentication request interim token of generation includes:
Obtain the first parameter information to be verified in described third-party application ID authentication request;According to described data base
Described first parameter information to be verified is verified by the first parameter information of middle correspondence;When being verified,
Generate described interim token.
Concrete, described first parameter information to be verified include agreement return type, self-defined mode bit and
The account of described third-party application, password and return address.Agreement return type should to third party for limiting
With the protocol type of the interim token of feedback, self-defined mode bit is used for informing that related personnel is presently in step
Sequence number, the account of third-party application and password for verifying the identity of third-party application, third-party application
Return address feeds back to third party according to this address after Electronic Health Record system generates interim token should
With.
Wherein, described ask to generate according to the interim token in described data base and authenticating user identification authorize
The step of token includes: obtain the second parameter information to be verified in the request of described authenticating user identification;According to
Interim token in described data base and the second parameter information of correspondence are to described second parameter information to be verified
Verify;When being verified, generate described authorization token.
Concrete, described second parameter information to be verified include agreement return type, the first token to be certified with
And the account of user, password and the return address of described third-party application.Agreement return type for limit to
The protocol type of the authorization token of third-party application feedback, the account of user and password are tested for the identity of user
Card, the return address of third-party application generates after authorization token according to this ground for Electronic Health Record system
Location feeds back to third-party application.In fact, the first token to be certified herein should be Electronic Health Record in theory
The interim token that system issues.
Wherein, described according to the authorization token in described data base, authorization identifying request and operation requests exist
The step of user resources transferring correspondence in described data base includes: obtain the in the request of described authorization identifying
Two tokens to be certified;According to the authorization token in described data base, described second token to be certified is authenticated;
When certification is passed through, in described data, transfer the user resources of correspondence according to described operation requests.Herein
Second token to be certified should be the authorization token that Electronic Health Record system issues in theory.
Wherein, the described step according to the described third-party application ID authentication request interim token of generation includes:
Setting pot life and the protocol type of described interim token, wherein, described protocol type is authorization code type;
Described ask to generate authorization token according to the interim token in described data base and authenticating user identification
Step includes: setting pot life and the protocol type of described authorization token, wherein, described protocol type is
Authorization code type.
Embodiment two
See Fig. 2, on the basis of embodiments of the invention one, in embodiments of the invention two, described acquisition
Before the third-party application ID authentication request that third-party application sends, described information processing method also includes:
Step 21: obtain first user information and the open authority of first resource of manager's input;
Step 22: open to described first user information and first resource authority is preserved to local data base
In.
Embodiments of the invention two provide manager and the user resources of differently configured authority are stored in data base
In scheme, it is achieved that the flexible configuration of user resources.
Embodiment three
See Fig. 3, on the basis of embodiments of the invention two, in embodiments of the invention three, described by institute
After stating in the data base of first user information and first resource open authority preservation extremely this locality, described information
Processing method also includes:
Step 31: in the case of keeping registered users to use authority, obtain the operational order of manager;
Step 32: the former data message in described data base is carried out respective operations according to described operational order.
Wherein, described operational order includes increasing, changing and deletion etc..
The flow process related in embodiments of the invention three can be before the flow process of embodiments of the invention one, it is possible to
With after which, Fig. 3 only for illustrating, is not construed as limiting.
Embodiments of the invention three provide the on-line operation service of user resources, and it is right to solve in prior art
Need system to roll off the production line when user resources operate, cause other normal users cannot use system, bring not
Just problem.
Embodiment four
See Fig. 4, the information processor of the embodiment of the present invention four, be applied to Electronic Health Record system, bag
Include:
First processing module 41, for obtaining the third-party application ID authentication request that third-party application sends,
Interim token is generated according to described third-party application ID authentication request;
Second processing module 42, for being handed down to described third-party application by described interim token, and by described
Interim token preserves to local data base;
3rd processing module 43, for obtaining the authenticating user identification request that described third-party application sends, root
Ask to generate authorization token according to the interim token in described data base and authenticating user identification;
Fourth processing module 44, for being handed down to described third-party application, and by described by described authorization token
Authorization token preserves to local data base;
5th processing module 45, the authorization identifying sent for obtaining described third-party application please sum operation be asked
Ask, ask according to the authorization token in described data base, authorization identifying and operation requests is described data base
In transfer correspondence user resources.
In embodiments of the invention four, described information processor obtains user by authorizing third-party application
Before the resource of storage, verify, solve the problem that there is potential safety hazard, simultaneously as user deposits
The relevant information that the resource of storage and checking relate to therebetween is stored in the data base of Electronic Health Record system,
Data base is capable of opening, and resource and authority can be configured by manager, it is achieved that to money
The flexible configuration in source.
Wherein, described first processing module includes: first obtains submodule, and being used for obtaining described third party should
With the parameter information to be verified of first in ID authentication request;First checking submodule, for according to described number
According to the first parameter information corresponding in storehouse, described first parameter information to be verified is verified;First generates son
Module, for when being verified, generates described interim token.
Concrete, described first parameter information to be verified include agreement return type, self-defined mode bit and
The account of described third-party application, password and return address.Agreement return type should to third party for limiting
With the protocol type of the interim token of feedback, self-defined mode bit is used for informing that related personnel is presently in step
Sequence number, the account of third-party application and password for verifying the identity of third-party application, third-party application
Return address feeds back to third party according to this address after Electronic Health Record system generates interim token should
With.
Wherein, described 3rd processing module includes: second obtains submodule, is used for obtaining described user identity
The second parameter information to be verified in certification request;Second checking submodule, for according in described data base
Interim token and the second parameter information of correspondence described second parameter information to be verified is verified;The
Two generate submodule, for when being verified, generate described authorization token.
Concrete, described second parameter information to be verified include agreement return type, the first token to be certified with
And the account of user, password and the return address of described third-party application.Agreement return type for limit to
The protocol type of the authorization token of third-party application feedback, the account of user and password are tested for the identity of user
Card, the return address of third-party application generates after authorization token according to this ground for Electronic Health Record system
Location feeds back to third-party application.In fact, the first token to be certified herein should be Electronic Health Record in theory
The interim token that system issues.
Wherein, described 5th processing module includes: the 3rd obtains submodule, is used for obtaining described authorization identifying
The second token to be certified in request;Authentication sub module, for according to the authorization token pair in described data base
Described second token to be certified is authenticated;Transfer submodule, for when certification is passed through, according to described behaviour
Ask to transfer the user resources of correspondence in described data.The second token to be certified herein should be in theory
The authorization token that Electronic Health Record system issues.
Wherein, described first processing module includes: first sets submodule, is used for setting described interim token
Pot life and protocol type, wherein, described protocol type is authorization code type;
Described 3rd processing module includes: second sets submodule, for setting the use of described authorization token
Time limit and protocol type, wherein, described protocol type is authorization code type.
In embodiments of the invention four, this information processor can be by existing Electronic Health Record system
System improves the function realizing information processor in embodiment four.
Embodiment five
See Fig. 5, on the basis of embodiments of the invention four, in embodiments of the invention five, described information
Processing means also includes:
First acquisition module 51, before described first processing module performs the operation obtained, obtains management
The first user information of member's input and the open authority of first resource;
Preserve module 52, for preserving open to described first user information and first resource authority to local
Data base in.
Embodiments of the invention two provide manager and the user resources of differently configured authority are stored in data base
In scheme, it is achieved that the flexible configuration of user resources.
In embodiments of the invention five, this information processor can be by existing Electronic Health Record system
System improves the function realizing information processor in embodiment five.
Embodiment six
See Fig. 6, on the basis of embodiments of the invention five, in embodiments of the invention six, described information
Processing means also includes:
Second acquisition module 61, after described preservation module performs associative operation, is keeping registered use
In the case of family uses authority, obtain the operational order of manager;
6th processing module 62, for entering the former data message in described data base according to described operational order
Row respective operations.
Wherein, described operational order includes increasing, changing and deletion etc..
The functional module related in embodiments of the invention six can the functional module of embodiments of the invention four it
Front performing operation, it is also possible to perform operation after which, Fig. 6 only for illustrating, is not construed as limiting.
Embodiments of the invention six provide the on-line operation service of user resources, and it is right to solve in prior art
Need system to roll off the production line when user resources operate, cause other normal users cannot use system, bring not
Just problem.
In embodiments of the invention six, this information processor can be by existing Electronic Health Record system
System improves the function realizing information processor in embodiment six.
The scheme that the present invention provides in the specific implementation, can be arranged external-open in Electronic Health Record system
Put interface API, data base, database management module and authentication module, oriented data base obtain information
Operation is both needed to be realized by API, and all operations being changed data message in data base are both needed to by number
Realize according to database management module.
In summary, the scheme that the present invention provides allows EMR (Electronic Health Record) system flexible configuration open
Resource (providing for outer open interface API, configure in data base);Allow detailed by user
Thin information and token are all in preserving data base, and can be managed user resources.It addition, the present invention carries
The scheme of confession can in data base the base attribute of extending user details, add trusted attribute (trust
Value attribute), it is used for judging whether user is trusty.
Further, the scheme that the present invention provides can be for the different authority of different resource distributions: and authority pipe
Reason combines, and gives different authorization policy for different roles, and the resource identification of role and authentication is carried out
Binding (will the resource that can necessarily operate of a certain role and this role bind), it is possible to realize authority
Strategy, role, the association of resource, carry out fine authority to the various information resource in user health archives
Controlling and management, information resources can be allowed to refine to the concrete role of user opening and shares when, this is right
Have great importance in typical many roles information resources share scene;Can be by resource management's configuration and mirror
Power configuration is separately, it is achieved that the loose coupling configuration of resource management's configuration and authentication configuration.
Above-described is the preferred embodiment of the present invention, it should be pointed out that for the ordinary people of the art
For Yuan, without departing under principle premise of the present invention, it is also possible to make some improvements and modifications, these
Improvements and modifications also should be regarded as protection scope of the present invention.
Claims (19)
1. an information processing method, is applied to Electronic Health Record system, it is characterised in that including:
Obtain the third-party application ID authentication request that third-party application sends, according to described third-party application body
Part certification request generates interim token;
Described interim token is handed down to described third-party application, and described interim token is preserved to this locality
In data base;
Obtain the authenticating user identification request that described third-party application sends, interim according in described data base
Token and authenticating user identification request generate authorization token;
Described authorization token is handed down to described third-party application, and described authorization token is preserved to this locality
In data base;
Obtain authorization identifying request and operation requests that described third-party application sends, according in described data base
Authorization token, authorization identifying request and operation requests transfer in the database correspondence user resources.
2. information processing method as claimed in claim 1, it is characterised in that described according to described third party
Application identity certification request generates the step of interim token and includes:
Obtain the first parameter information to be verified in described third-party application ID authentication request;
According to the first parameter information corresponding in described data base, described first parameter information to be verified is tested
Card;
When being verified, generate described interim token.
3. information processing method as claimed in claim 2, it is characterised in that described first parameter to be verified
Information includes agreement return type, self-defined mode bit and the account of described third-party application, password and returns
Go back to address.
4. information processing method as claimed in claim 1, it is characterised in that described according to described data base
In interim token and authenticating user identification request generate authorization token step include:
Obtain the second parameter information to be verified in the request of described authenticating user identification;
The second parameter information according to the interim token in described data base and correspondence is to described second to be verified
Parameter information is verified;
When being verified, generate described authorization token.
5. information processing method as claimed in claim 4, it is characterised in that described second parameter to be verified
Information includes agreement return type, the first token to be certified and the account of user, password and described third party
The return address of application.
6. information processing method as claimed in claim 1, it is characterised in that described according to described data base
In authorization token, authorization identifying request and operation requests transfer in the database correspondence user money
The step in source includes:
Obtain the second token to be certified in the request of described authorization identifying;
According to the authorization token in described data base, described second token to be certified is authenticated;
When certification is passed through, in described data, transfer the user resources of correspondence according to described operation requests.
7. information processing method as claimed in claim 1, it is characterised in that described according to described third party
Application identity certification request generates the step of interim token and includes:
Setting pot life and the protocol type of described interim token, wherein, described protocol type is authorization code
Type;
Described ask to generate authorization token according to the interim token in described data base and authenticating user identification
Step includes:
Setting pot life and the protocol type of described authorization token, wherein, described protocol type is authorization code
Type.
8. information processing method as claimed in claim 1, it is characterised in that described acquisition third-party application
Before the third-party application ID authentication request sent, described information processing method also includes:
Obtain first user information and the open authority of first resource of manager's input;
Open to described first user information and first resource authority is preserved to local data base.
9. information processing method as claimed in claim 8, it is characterised in that described by described first user
After information and the open authority of first resource preserve to local data base, described information processing method is also
Including:
In the case of keeping registered users to use authority, obtain the operational order of manager;
According to described operational order, the former data message in described data base is carried out respective operations.
10. an information processor, is applied to Electronic Health Record system, it is characterised in that including:
First processing module, for obtaining the third-party application ID authentication request that third-party application sends, root
Interim token is generated according to described third-party application ID authentication request;
Second processing module, for described interim token is handed down to described third-party application, and faces described
Time token preserve to local data base;
3rd processing module, for obtaining the authenticating user identification request that described third-party application sends, according to
Interim token and authenticating user identification request in described data base generate authorization token;
Fourth processing module, for described authorization token is handed down to described third-party application, and awards described
Power token preserves to local data base;
5th processing module, for obtaining authorization identifying request and the operation requests that described third-party application sends,
Adjust in the database according to the authorization token in described data base, authorization identifying request and operation requests
Take the user resources of correspondence.
11. information processors as claimed in claim 10, it is characterised in that described first processing module
Including:
First obtains submodule, to be verified for obtaining first in described third-party application ID authentication request
Parameter information;
First checking submodule, is used for according to the first parameter information corresponding in described data base described first
Parameter information to be verified is verified;
First generates submodule, for when being verified, generates described interim token.
12. information processors as claimed in claim 11, it is characterised in that described first ginseng to be verified
Number information include agreement return type, self-defined mode bit and the account of described third-party application, password and
Return address.
13. information processors as claimed in claim 10, it is characterised in that described 3rd processing module
Including:
Second obtains submodule, for obtaining the second parameter to be verified letter in the request of described authenticating user identification
Breath;
Second checking submodule, for according to the interim token in described data base and the second parameter of correspondence
Described second parameter information to be verified is verified by information;
Second generates submodule, for when being verified, generates described authorization token.
14. information processors as claimed in claim 13, it is characterised in that described second ginseng to be verified
Number information includes agreement return type, the first token to be certified and the account of user, password and the described 3rd
The return address of Fang Yingyong.
15. information processors as claimed in claim 10, it is characterised in that described 5th processing module
Including:
3rd obtains submodule, for obtaining the second token to be certified in the request of described authorization identifying;
Authentication sub module, for entering described second token to be certified according to the authorization token in described data base
Row certification;
Transferring submodule, for when certification is passed through, it is right to transfer in described data according to described operation requests
The user resources answered.
16. information processors as claimed in claim 10, it is characterised in that described first processing module
Including:
First sets submodule, for setting pot life and the protocol type of described interim token, wherein,
Described protocol type is authorization code type;
Described 3rd processing module includes:
Second sets submodule, for setting pot life and the protocol type of described authorization token, wherein,
Described protocol type is authorization code type.
17. information processors as claimed in claim 10, it is characterised in that described information processor
Also include:
First acquisition module, before described first processing module performs the operation obtained, obtains manager
The first user information of input and the open authority of first resource;
Preservation module, for preserving open to described first user information and first resource authority to this locality
In data base.
18. information processors as claimed in claim 17, it is characterised in that described information processor
Also include:
Second acquisition module, after described preservation module performs associative operation, is keeping registered users
In the case of using authority, obtain the operational order of manager;
6th processing module, for carrying out the former data message in described data base according to described operational order
Respective operations.
19. 1 kinds of Electronic Health Record systems, it is characterised in that including: as claim 10 to 18 is arbitrary
Information processor described in Xiang.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510219957.XA CN106209735A (en) | 2015-04-30 | 2015-04-30 | A kind of information processing method, device and Electronic Health Record system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510219957.XA CN106209735A (en) | 2015-04-30 | 2015-04-30 | A kind of information processing method, device and Electronic Health Record system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106209735A true CN106209735A (en) | 2016-12-07 |
Family
ID=57457726
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510219957.XA Pending CN106209735A (en) | 2015-04-30 | 2015-04-30 | A kind of information processing method, device and Electronic Health Record system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106209735A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107896227A (en) * | 2017-12-14 | 2018-04-10 | 珠海格力电器股份有限公司 | A kind of data calling method, device and device data cloud platform |
CN108921257A (en) * | 2018-08-31 | 2018-11-30 | 深圳市研本品牌设计有限公司 | A kind of cleaning unmanned plane and storage medium |
CN109426734A (en) * | 2017-08-28 | 2019-03-05 | 阿里巴巴集团控股有限公司 | A kind of access method, device, system and electronic equipment |
CN112491778A (en) * | 2019-09-11 | 2021-03-12 | 北京京东尚科信息技术有限公司 | Authentication method, device, system and medium |
CN112613073A (en) * | 2020-12-28 | 2021-04-06 | 中国农业银行股份有限公司 | Open platform authentication and authorization method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102713865A (en) * | 2009-10-20 | 2012-10-03 | 汤森路透环球资源公司 | Entitled data cache management |
CN103188244A (en) * | 2011-12-31 | 2013-07-03 | 卓望数码技术(深圳)有限公司 | System and method for achieving authorization management based on OAuth |
CN103581140A (en) * | 2012-08-03 | 2014-02-12 | 腾讯科技(深圳)有限公司 | Authorization control method, device and system and authorization request method and device |
CN104144167A (en) * | 2014-08-15 | 2014-11-12 | 深圳市蜂联科技有限公司 | User login authentication method of open intelligent gateway platform |
-
2015
- 2015-04-30 CN CN201510219957.XA patent/CN106209735A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102713865A (en) * | 2009-10-20 | 2012-10-03 | 汤森路透环球资源公司 | Entitled data cache management |
CN103188244A (en) * | 2011-12-31 | 2013-07-03 | 卓望数码技术(深圳)有限公司 | System and method for achieving authorization management based on OAuth |
CN103581140A (en) * | 2012-08-03 | 2014-02-12 | 腾讯科技(深圳)有限公司 | Authorization control method, device and system and authorization request method and device |
CN104144167A (en) * | 2014-08-15 | 2014-11-12 | 深圳市蜂联科技有限公司 | User login authentication method of open intelligent gateway platform |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109426734A (en) * | 2017-08-28 | 2019-03-05 | 阿里巴巴集团控股有限公司 | A kind of access method, device, system and electronic equipment |
CN107896227A (en) * | 2017-12-14 | 2018-04-10 | 珠海格力电器股份有限公司 | A kind of data calling method, device and device data cloud platform |
CN108921257A (en) * | 2018-08-31 | 2018-11-30 | 深圳市研本品牌设计有限公司 | A kind of cleaning unmanned plane and storage medium |
CN112491778A (en) * | 2019-09-11 | 2021-03-12 | 北京京东尚科信息技术有限公司 | Authentication method, device, system and medium |
CN112613073A (en) * | 2020-12-28 | 2021-04-06 | 中国农业银行股份有限公司 | Open platform authentication and authorization method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11963006B2 (en) | Secure mobile initiated authentication | |
US20210103667A1 (en) | Device and methods for management and access of distributed data sources | |
CN108337260B (en) | Multi-tenant identity and data security management cloud service | |
TWI717728B (en) | Identity verification and login method, device and computer equipment | |
US9237020B2 (en) | Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment | |
US20180041479A1 (en) | System and method for identity authentication | |
CN109314704A (en) | Function is nullified for multi-tenant identity and the single-sign-on and single-point of data safety management cloud service | |
CN109565511A (en) | Tenant and service management for multi-tenant identity and data safety management cloud service | |
CN104917741B (en) | A kind of plain text document public network secure transmission system based on USBKEY | |
CN110300102A (en) | A kind of Internet of Things safety access system and method based on block chain | |
CN108293045A (en) | Single-sign-on Identity Management between local and remote system | |
US20100299738A1 (en) | Claims-based authorization at an identity provider | |
WO2022247359A1 (en) | Cluster access method and apparatus, electronic device, and medium | |
CN106134154A (en) | The technology that the authentication token operation utilizing machine to generate services | |
CN104168304B (en) | Single-node login system and method under VDI environment | |
CN106209735A (en) | A kind of information processing method, device and Electronic Health Record system | |
CN105359491A (en) | User authentication in a cloud environment | |
CN105635168B (en) | A kind of application method of offline transaction device and its security key | |
WO2021127577A1 (en) | Secure mobile initiated authentications to web-services | |
CN109587101A (en) | A kind of digital certificate management method, device and storage medium | |
CN104717261A (en) | Login method and desktop management device | |
CN110599342B (en) | Block chain-based identity information authorization method and device | |
US20170171192A1 (en) | Managing exchanges of sensitive data | |
WO2020056996A1 (en) | Method and apparatus for managing donation information, computer device, and storage medium | |
WO2021127575A1 (en) | Secure mobile initiated authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161207 |
|
RJ01 | Rejection of invention patent application after publication |