CN108632291A - A kind of third party authorizes login method and system - Google Patents

A kind of third party authorizes login method and system Download PDF

Info

Publication number
CN108632291A
CN108632291A CN201810465208.9A CN201810465208A CN108632291A CN 108632291 A CN108632291 A CN 108632291A CN 201810465208 A CN201810465208 A CN 201810465208A CN 108632291 A CN108632291 A CN 108632291A
Authority
CN
China
Prior art keywords
party
website
authorized
user
service end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810465208.9A
Other languages
Chinese (zh)
Inventor
张德峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810465208.9A priority Critical patent/CN108632291A/en
Publication of CN108632291A publication Critical patent/CN108632291A/en
Priority to TW108105614A priority patent/TWI706265B/en
Priority to PCT/CN2019/076021 priority patent/WO2019218747A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10544Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation by scanning of the records by radiation in the optical part of the electromagnetic spectrum
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A kind of third party's mandate login method is disclosed, this method includes:When authorized website monitors third party's account register triggering of user, it is authorized to website and generates Quick Response Code corresponding with third party's account;It is authorized to website and shows the Quick Response Code to user;When the two-dimensional code scanning of third party's client monitors to user operates triggering, third party's client identifies the Quick Response Code, prompts the user whether to authorize;When the license confirmation of third party's client monitors to user operates triggering, third party's authorization identifying is carried out between third party's service end and authorized website;After third party's authorization identifying passes through between third party's service end and authorized website, it is authorized to website third party mandate and logins successfully.

Description

A kind of third party authorizes login method and system
Technical field
This specification embodiment is related to Internet technical field more particularly to a kind of third party authorizes login method and is System.
Background technology
When user logs in a certain website, it usually needs registration login account and setting log in close accordingly on the web site Code.Such as the account that user registers in the websites A can only log in the websites A, it is not possible to log in the websites B, therefore, if desired user logs in Multiple websites then need to register multiple corresponding accounts so that user needs to manage multiple accounts, causes inconvenience to the user.For It solves the above problems, third party occurs and authorize the mode logged in, it is meant that user can be authorized by third party and not logged in not Same website, wherein third party are as authorized party, and website is square as being authorized to, such as user can be micro- by QQ, wechat, Sina The rich website for waiting third parties to authorize login different.
Existing third party authorizes login method:During third party authorizes and logs in authorized website, user is needed Jump to third party website log in oneself third party's account and password authorize, confirm authorize after jump back to this and awarded Weigh website.Existing third party authorizes login method, and for a user, operating process is comparatively laborious, reduces the body of user It tests.
Invention content
In view of the above technical problems, a kind of third party of this specification embodiment offer authorizes login method and system, technology Scheme is as follows:
A kind of third party's mandate login method, this method include:
When be authorized to website monitor user third party's account register triggering when, be authorized to website generate with it is described The corresponding Quick Response Code of third party's account;
It is authorized to website and shows the Quick Response Code to user;
When the two-dimensional code scanning of third party's client monitors to user operates triggering, third party's client identification described two Code is tieed up, prompts the user whether to authorize;
When the license confirmation of third party's client monitors to user operates triggering, third party's service end and authorized website Between carry out third party's authorization identifying;
After third party's authorization identifying passes through between third party's service end and authorized website, it is authorized to website third party Mandate logins successfully.
A kind of third party's mandate login system, the system include:Third party's client, third party's service end and authorized net It stands;
When be authorized to website monitor user third party's account register triggering when, be authorized to website generate with it is described The corresponding Quick Response Code of third party's account;
It is authorized to website and shows the Quick Response Code to user;
When the two-dimensional code scanning of third party's client monitors to user operates triggering, third party's client identification described two Code is tieed up, prompts the user whether to authorize;
When the license confirmation of third party's client monitors to user operates triggering, third party's service end and authorized website Between carry out third party's authorization identifying;
After third party's authorization identifying passes through between third party's service end and authorized website, it is authorized to website third party Mandate logins successfully.
The technical solution that this specification embodiment is provided, when user is logged in using third party's account is authorized to website, It is authorized to website and generates Quick Response Code, user can uses third party's client scan Quick Response Code, and can be stepped on after confirming mandate Record this be authorized to website, thus user need not jump to third party website log in oneself third party's account and password award Power, so that it may to complete that register is authorized to simplify operating process for a user, improve the experience of user.
It should be understood that above general description and following detailed description is only exemplary and explanatory, not This specification embodiment can be limited.
In addition, any embodiment in this specification embodiment does not need to reach above-mentioned whole effects.
Description of the drawings
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only Some embodiments described in this specification embodiment for those of ordinary skill in the art can also be attached according to these Figure obtains other attached drawings.
Fig. 1 is that the third party of this specification embodiment authorizes the interaction schematic diagram of login method;
Fig. 2 is a kind of schematic diagram for displaying Quick Response Code that this specification embodiment provides;
Fig. 3 is progress third party's authorization identifying between the third party's service end of this specification embodiment and authorized website Interaction schematic diagram;
Fig. 4 is that the third party of this specification embodiment authorizes the preferred interactive schematic diagram of login method;
Fig. 5 is that the third party applied to third party's client of this specification embodiment authorizes the structural representation of entering device Figure;
Fig. 6 is that the third party applied to third party's service end of this specification embodiment authorizes the structural representation of entering device Figure;
Fig. 7 is a kind of structural schematic diagram of equipment for configuring this specification embodiment device.
Specific implementation mode
Downloaded data, works of the general PC as user's routine office work are consulted since user often accesses website up in PC Tool, especially as common PC, the sensitive information of third party's account and password as user oneself can't be grown on PC Phase makes the third party's account of oneself be online, and third party's account can be Alipay account, QQ accounts, wechat account here Number, microblog account etc., the third party's account of oneself can be just logged in when only in need.So being authorized to when user accesses some When website needs to log in, third party's account is selected to log in, needs to jump to third party website and log in the third party's account of oneself Number and password authorized, then jumping back to this be authorized to website, at this moment this be authorized to website show user logged in.It is right For user, operating process is comparatively laborious, reduces the experience of user.
In view of the above problems, this specification embodiment provides the following technical solutions:
When authorized website monitors third party's account register triggering of user, it is authorized to website generation and third The corresponding Quick Response Code of square account, and show the Quick Response Code to user, user is using third party's client scan Quick Response Code, and really After recognizing mandate, authorized website can show that user has logged in.
As user private tool, such as mobile phone, tablet used in everyday etc., user can install respectively terminal in terminal Third party's client of kind various kinds, such as QQ clients, wechat client, Alipay client, use above-mentioned institute for convenience The third party's client said, user can be such that the third party's account of oneself is online for a long time, for a user, only The two-dimensional code scanning function that third party's client carries in using terminal is needed, goes to scan the Quick Response Code that authorized website is shown, And authorized website can be logged in after confirming mandate.The operating process for thereby simplifying user improves the experience of user.
In the embodiment of this specification, third party authorize log in flow be related to third client, third party's service end, Be authorized to website, third party's client can be mounted in the application program in terminal, as Alipay client, QQ clients, Wechat client, microblogging client etc., authorized website can be the current arbitrary website for supporting third party's account to log in, such as new The websites such as unrestrained microblogging, Taobao, Baidu, third party's service end can be the forms of a specific server or server cluster, Third client can be communicated with third party's service end, third party's service end with authorized website by various forms of real-time performances Connection, this specification are not construed as limiting this.
In order to make those skilled in the art more fully understand the technical solution in this specification embodiment, below in conjunction with this Attached drawing in specification embodiment is described in detail the technical solution in this specification embodiment, it is clear that described Embodiment is only a part of the embodiment of this specification, instead of all the embodiments.The embodiment of base in this manual, The every other embodiment that those of ordinary skill in the art are obtained, should all belong to the range of protection.
This specification embodiment is authorized to website by showing Quick Response Code to user, is stepped on for scanning input Quick Response Code mandate Record, the technical solution that specific this specification embodiment provides are as follows:
As shown in Figure 1, authorizing the interaction schematic diagram of login method, this method for the third party that this specification embodiment provides It may comprise steps of:
S101 is authorized to website and generates when authorized website monitors third party's account register triggering of user Quick Response Code corresponding with third party's account;
Currently authorized website is to reduce the user being lost in by registration, gradually support user using third party's account into Row log in, it is meant that be authorized to website allow user need not register account number, can be logged in using third party's account.Here Tripartite's account can be QQ accounts as stated above, wechat account, Alipay account, microblog account etc., and user is logging in When being authorized to website, any one can be selected to be authorized to third party's account that website is supported and logged in.When user's selection the When tripartite's account logs in authorized website, authorized website can generate the URL for obtaining authorization code according to oAuth agreements, and The URL is generated into Quick Response Code corresponding with the selected third party's account of user.
Here oAuth agreements provide safety, open and easy standard for the mandate of user resources.With with Past authorization the difference is that will not make is authorized to the account information that website touches user, for example, the account of user and Password, that is, being authorized to website can apply for obtaining the mandate of the user resources without using the account and password of user.
As an example, when user selects Alipay account to log in the forum website of current accessed, forum website will URL is generated according to oAuth agreements, and the URL is generated into Quick Response Code, the Quick Response Code and the selected Alipay account pair of user It answers.
S102 is authorized to website and shows the Quick Response Code to user;
Be authorized to website generate the corresponding Quick Response Code of selected third party's account when logging in authorized website with user it Afterwards, it needs to show the Quick Response Code to user, wherein showing that there are many kinds of the realization methods of the Quick Response Code, this specification is real to user It applies example and a kind of realization method is provided, it is notable that this specification embodiment is only to do to show to one of which realization method Example property explanation, be not limit how to user show Quick Response Code.
One of which shows that the realization method of Quick Response Code is to user:It is authorized to website in generation and user's login to be authorized to When website after the corresponding Quick Response Code of selected third party's account, the Quick Response Code is showed into user in the form of dialog box, A dialog box that can be optionally stretched is popped up in current page, the Quick Response Code is in the dialog box middle position, as shown in Figure 2. Particularly can be that life cycle is arranged in the dialog box, after some time has elapsed, which can disappear automatically.
S103, when the two-dimensional code scanning of third party's client monitors to user operates triggering, the identification of third party's client The Quick Response Code prompts the user whether to authorize;
User is carried after seeing authorized website displaying Quick Response Code using the third party's client installed in terminal Scanning function scans the Quick Response Code, and the two-dimensional code scanning operation triggering of third party's client monitors to user identifies and is authorized to net The Quick Response Code shown of standing prompts the user whether to authorize after identification Quick Response Code success.As an example, user utilizes mobile phone The Quick Response Code for the scanning function scanning forum website displaying that the Alipay client of upper installation carries, Alipay client monitors arrive The two-dimensional code scanning operation triggering of user, can identify the Quick Response Code in Current Scan region, user can be prompted after identifying successfully Whether authorize.
Special, the Quick Response Code due to being authorized to website generation logs in selected third party when being authorized to website with user Account corresponds to, and user can select corresponding third party's client to go to scan the Quick Response Code, inevitably, user under normal circumstances It is possible that other third party's clients go to scan the Quick Response Code in using terminal.For this special circumstances, this specification is real The URL for generating the Quick Response Code can be shown by applying example on the subscriber terminal, but can't prompt the user whether to authorize, and can not also be continued Follow-up process.As an example, user selects Alipay account to log in forum website, and forum website generates and Alipay account Corresponding Quick Response Code, user can select the Alipay client in terminal to go to scan the Quick Response Code under normal circumstances, but user has The wechat client in terminal may be selected to go to scan the Quick Response Code, will be shown on corresponding user terminal and generate the Quick Response Code URL, can't prompt the user whether to authorize, except non-user gravity treatment selection terminal on Alipay client go scanning two dimension Otherwise code means that third party authorizes login failure.
S104, when third party's client monitors to user license confirmation operate triggering when, third party's service end with awarded Power carries out third party's authorization identifying between website;
User is after using the success of third party's client scan Quick Response Code, and confirmation is authorized to being authorized to website, Third party's client sends identified two dimension to third party's service end when monitoring above-mentioned user's license confirmation operation triggering Code information, after receiving identified 2 D code information, progress third party awards between third party's service end and authorized website Weigh certification.
After user confirms to being authorized to website mandate, third party's client sends identified two to third party's service end Code information is tieed up, which includes but not limited to loopback address information.
Third party's client to third party's service end in addition to sending 2 D code information, it is also necessary to send other message.Example Such as, it on the one hand needs to send user to third party's service end and confirms authorization message, user's license confirmation information is for informing the Tripartite services end subscriber and has been acknowledged mandate, can carry out third party's authorization identifying with authorized website;On the other hand need to Third party's service end sends the information such as third party's client identification and the user account currently logged in third party's client, In order to subsequently be authorized to website when asking user information, the corresponding user information of the user account is returned at third party's service end Back to authorized website.As an example, Alipay client is logged in by self ID and currently in Alipay client Alipay account is sent to Alipay server-side, so that forum website is when asking user information, which is corresponded to User information return to forum website.
Third party's authorization identifying is carried out between third party's service end and authorized website, detailed process was as shown in figure 3, should Third party's authorization identifying flow may comprise steps of:
Step S104a, after receiving identified 2 D code information, according to the readjustment carried on the Quick Response Code identified The authorization code of generation is sent to authorized website by address information, third party's service end;
Third party's service end can be authorized according to the loopback address information carried on Quick Response Code, the loopback address information The authorization code of generation is sent to authorized website by the IP address information of website.The authorization code that third party's service end generates has The term of validity of certain time, within the effective time, for the authority checking to being authorized to website, it is meant that in the effective time Interior authorized website needs to be verified to third party's service end using the authorization code, and authorization token is obtained after being verified, Authorization token can be as a kind of voucher authorized to being authorized to website later.The authorization code can be Any Digit and/or word The combination of symbol, length are not construed as limiting.
As an example, the authorization code of generation is sent to forum's net by Alipay server-side according to loopback address information It stands, which is as0123, and the term of validity of the authorization code is 1 minute.
Step S104b, authorized website receives the authorization code, and the authorization code by being received is sent out to third party's service end Send the request for obtaining authorization token;
Due to authorization code as to be authorized to website authorize a kind of verification, be authorized to website receive authorization code it Afterwards, it goes to obtain authorization token by the authorization code.
Authorization token serve not only as obtain user information one of which foundation and third party's service end to be authorized to net Stand authorize a kind of voucher, authorization token can be the combination of Any Digit and/or character, and length is not construed as limiting.For example, awarding It can be 1234asdf45 to weigh token.
As an example, forum website is after receiving authorization code, within the effective time of the authorization code, forum's net It stands and sends the request of acquisition authorization token to Alipay server-side by the authorization code, Alipay server-side carries out the authorization code After being verified, authorization token is returned to forum website for verification.
Step S104c is authorized to website and receives the authorization token that third party's service end returns;
Step S104d is authorized to website to third party's service after the authorization token for receiving the return of third party's service end End sends the request for obtaining user's unique mark;
It needs to obtain user information due to being authorized to website, user information includes but not limited to:User's pet name uses account Picture, user good friend etc..Therefore it is authorized to website after receiving authorization token, needs that acquisition user is further gone uniquely to mark Know, the user identifier is as the one of which foundation for obtaining user information.
Step S104e is authorized to website and receives user's unique mark that third party's service end returns;
It, will be with third party after third party's service termination receives the request for acquisition user's unique mark that authorized website is sent The corresponding user's unique mark of user account that client is sent returns to authorized website.
Step S104f is authorized to website and is obtained to the transmission of third party's service end by authorization token and user's unique mark Take the request of user information;
Authorization token and user's unique mark are authorized to website and are receiving mandate as the foundation for obtaining user information After token and user's unique mark, user information can be obtained according to authorization token and user's unique mark.As one A example, forum website are obtained by authorization token 1234asdf45 and user's unique mark 1236 to the transmission of Alipay server-side Take the request of the user informations such as the family pet name, user's head portrait, user good friend.
Step S104g is authorized to website and receives the user information that third party's service end returns.
Third party's service end receives the request for being authorized to the acquisition user information that website is sent, according to authorization token and use Family unique mark determines user information, which is returned to authorized website, is authorized to website and is receiving third party After the user information that server-side returns, so far third party's authorization identifying passes through.
S105 after third party's authorization identifying passes through between third party's service end and authorized website, is authorized to website Third party authorizes and logins successfully.
Be authorized to website receive third party's service end return user information after, it is meant that third party's service end with Third party's authorization identifying passes through between being authorized to website, is authorized to website third party mandate and logins successfully, user can awarded It weighs website and carries out subsequent operation, such as access downloaded data etc..
On the basis of above-described embodiment, shown in Figure 4, this specification embodiment can further include:
S106, after third party's authorization identifying passes through between third party's service end and authorized website, third party's service End will authorize successful message to be sent to third party's client;
Third party's client after receiving the message, authorizes successfully to user's displaying.
After user information is returned to authorized website by third party's service end, it is meant that third party's authorization identifying is logical It crosses, third party's service end will authorize successful message to be sent to third party's client, be awarded from third party's client to user's displaying It weighs successfully, and then user can go to be authorized to the subsequent operation of website progress.
It is used by the description of the above-mentioned technical solution to this specification embodiment when user is logged in using third party's account The scanning function that family is carried by third party's client in terminal scans the Quick Response Code for being authorized to website displaying, is awarded in confirmation It can be logged in after power.
Using the technical solution that this specification embodiment provides, avoids user from jumping to third party website and log in oneself the Tripartite's account and password authorize, and for a user, simplify operating process, improve the experience of user.
In order to illustrate more clearly of the scheme of this specification embodiment, separately below again from unilateral angle, to execution Method illustrates:
For third party's client, need executing for task mainly as follows:
Step a is identified when the two-dimensional code scanning of third party's client monitors to user operates triggering and is authorized to website institute The Quick Response Code of displaying prompts the user whether to authorize;
Step b is sent when the license confirmation of third party's client monitors to user operates triggering to third party's service end The 2 D code information identified so that third party's service end is after receiving the 2 D code information, with authorized website into Row third party's authorization identifying.
For third party's service end, need executing for task mainly as follows:
Step A receives the 2 D code information that third party's client is sent;
Step B takes after the 2 D code information for receiving the transmission of third party's client according on the Quick Response Code identified The authorization code of generation is sent to authorized website by the loopback address information of band;
Step C receives the request for being authorized to the acquisition authorization token that website is sent by the authorization code, and returns to mandate Token;
Step D receives the request for being authorized to acquisition user's unique mark that website is sent, and returns to user's unique mark;
Step E receives the acquisition user information for being authorized to that website is sent by authorization token and user's unique mark Request, and return to user information.
For being authorized to website, need the main task executed as follows:
Step 1, it when authorized website monitors third party's account register triggering of user, generates and the third The corresponding Quick Response Code of square account;
Step 2, the Quick Response Code is shown to user;
Step 3, the authorization code that third party's service end is sent is received, and the authorization code by being received is to third party's service end Send the request for obtaining authorization token;
Step 4, the authorization token that third party's service end returns is received, and in the mandate for receiving the return of third party's service end After token, the request for obtaining user's unique mark is sent to third party's service end;
Step 5, user's unique mark that third party's service end returns is received;
Step 6, it is sent to third party's service end by authorization token and user's unique mark and obtains asking for user information It asks;
Step 7, the user information that third party's service end returns is received, third party authorizes and logins successfully.
About third party's client, third party's service end, the unilateral execution method details for being authorized to website, before may refer to The description of face embodiment, which is not described herein again.
Corresponding to above method embodiment, this specification embodiment also provides a kind of third party's mandate entering device, application It is shown in Figure 5 in third party's client, may include:Quick Response Code identification module 510, information sending module 520.
Quick Response Code identification module 510 is used for when the two-dimensional code scanning of third party's client monitors to user operates triggering, Identification is authorized to the Quick Response Code that website is shown, prompts the user whether to authorize;
Information sending module 520, for when the operation of the license confirmation of third party's client monitors to user triggers, to the Tripartite's server-side sends identified 2 D code information, so that third party's service end is after receiving the 2 D code information, Third party's authorization identifying is carried out with authorized website.
This specification embodiment also provides a kind of third party's mandate entering device, is applied to third party's service end, referring to Fig. 6 It is shown, may include:Information receiving module 610, authentication module 620.
Information receiving module 610, the 2 D code information for receiving the transmission of third party's client;
Authentication module 620, for receive third party's client transmission 2 D code information after, with authorized website Carry out third party's authorization identifying.
This specification embodiment also provides a kind of third party's mandate login system, which may include:Third party client End, third party's service end and authorized website.
When be authorized to website monitor user third party's account register triggering when, be authorized to website generate with it is described The corresponding Quick Response Code of third party's account;
It is authorized to website and shows the Quick Response Code to user;
When the two-dimensional code scanning of third party's client monitors to user operates triggering, third party's client identification described two Code is tieed up, prompts the user whether to authorize;
When the license confirmation of third party's client monitors to user operates triggering, third party's service end and authorized website Between carry out third party's authorization identifying;
After third party's authorization identifying passes through between third party's service end and authorized website, it is authorized to website third party Mandate logins successfully.
The function of modules and the realization process of effect specifically refer to and correspond to step in the above method in above-mentioned apparatus Realization process, details are not described herein.
It is used by the description of the above-mentioned technical solution to this specification embodiment when user is logged in using third party's account The scanning function that family is carried by third party's client in terminal scans the Quick Response Code for being authorized to website displaying, is awarded in confirmation It can be logged in after power.
Using the technical solution that this specification embodiment provides, avoids user from jumping to third party website and log in oneself the Tripartite's account and password authorize, and for a user, simplify operating process, improve the experience of user.
This specification embodiment also provides a kind of computer equipment, as shown in fig. 7, the equipment may include:Processor 710, memory 720, input/output interface 730, communication interface 740 and bus 750.Wherein processor 710, memory 720, Input/output interface 730 and communication interface 740 pass through the communication connection between the realization of bus 750 inside equipment.
General CPU (Central Processing Unit, central processing unit), microprocessor may be used in processor 710 Device, application specific integrated circuit (Application Specific Integrated Circuit, ASIC) or one or The modes such as multiple integrated circuits are realized, for executing relative program, to realize technical solution that this specification embodiment is provided.
ROM (Read Only Memory, read-only memory), RAM (Random Access may be used in memory 720 Memory, random access memory), static storage device, the forms such as dynamic memory realize.Memory 720 can store Operating system and other applications are realizing technical solution that this specification embodiment is provided by software or firmware When, relevant program code is stored in memory 720, and is executed by processor 710 to call.
Input/output interface 730 is for connecting input/output module, to realize information input and output.Input and output/ Module can be used as component Configuration (not shown) in a device, can also be external in equipment to provide corresponding function.Wherein Input equipment may include keyboard, mouse, touch screen, microphone, various kinds of sensors etc., output equipment may include display, Loud speaker, vibrator, indicator light etc..
Communication interface 740 is used for connection communication module (not shown), to realize the communication of this equipment and other equipment Interaction.Wherein communication module can be realized by wired mode (such as USB, cable etc.) and be communicated, can also be wirelessly (such as mobile network, WIFI, bluetooth etc.) realizes communication.
Bus 750 includes an access, in various components (such as processor 710, memory 720, the input/output of equipment Interface 730 and communication interface 740) between transmit information.
It should be noted that although above equipment illustrates only processor 710, memory 720, input/output interface 730, communication interface 740 and bus 750, but in specific implementation process, which can also include realizing normal operation Necessary other assemblies.In addition, it will be appreciated by those skilled in the art that, can also only include to realize in above equipment Component necessary to this specification example scheme, without including all components shown in figure.
This specification embodiment also provides a kind of computer readable storage medium, is stored thereon with computer program, the journey Realize that third party above-mentioned authorizes login method when sequence is executed by processor.This method includes at least:
When the two-dimensional code scanning of third party's client monitors to user operates triggering, identifies and be authorized to what website was shown Quick Response Code prompts the user whether to authorize;
When the license confirmation of third party's client monitors to user operates triggering, sends and identified to third party's service end 2 D code information carry out third with authorized website so that third party's service end is after receiving the 2 D code information Square authorization identifying.
This specification embodiment also provides a kind of computer readable storage medium, is stored thereon with computer program, the journey Realize that third party above-mentioned authorizes login method when sequence is executed by processor.This method includes at least:
Receive the 2 D code information that third party's client is sent;
After the 2 D code information for receiving the transmission of third party's client, carries out third party's mandate with authorized website and recognize Card.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or other magnetic storage apparatus Or any other non-transmission medium, it can be used for storage and can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
As seen through the above description of the embodiments, those skilled in the art can be understood that this specification Embodiment can add the mode of required general hardware platform to realize by software.Based on this understanding, this specification is implemented Substantially the part that contributes to existing technology can be expressed in the form of software products the technical solution of example in other words, The computer software product can be stored in a storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are making It is each to obtain computer equipment (can be personal computer, server or the network equipment etc.) execution this specification embodiment Method described in certain parts of a embodiment or embodiment.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.A kind of typically to realize that equipment is computer, the concrete form of computer can To be personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play In device, navigation equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or these equipment The combination of arbitrary several equipment.
Each embodiment in this specification is described in a progressive manner, identical similar portion between each embodiment Point just to refer each other, and each embodiment focuses on the differences from other embodiments.Especially for device reality For applying example, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to embodiment of the method Part explanation.The apparatus embodiments described above are merely exemplary, wherein described be used as separating component explanation Module may or may not be physically separated, can be each module when implementing this specification example scheme Function realize in the same or multiple software and or hardware.Can also select according to the actual needs part therein or Person's whole module achieves the purpose of the solution of this embodiment.Those of ordinary skill in the art are not the case where making the creative labor Under, you can to understand and implement.
The above is only the specific implementation mode of this specification embodiment, it is noted that for the general of the art For logical technical staff, under the premise of not departing from this specification embodiment principle, several improvements and modifications can also be made, this A little improvements and modifications also should be regarded as the protection domain of this specification embodiment.

Claims (18)

1. a kind of third party's mandate login method, this method include:
When authorized website monitors third party's account register triggering of user, it is authorized to website and generates and the third The corresponding Quick Response Code of square account;
It is authorized to website and shows the Quick Response Code to user;
When the two-dimensional code scanning of third party's client monitors to user operates triggering, third party's client identifies the two dimension Code, prompts the user whether to authorize;
When the license confirmation of third party's client monitors to user operates triggering, between third party's service end and authorized website Carry out third party's authorization identifying;
After third party's authorization identifying passes through between third party's service end and authorized website, it is authorized to website third party and authorizes It logins successfully.
2. according to the method described in claim 1, the third party's account register for monitoring user when authorized website When triggering, it is authorized to website and generates Quick Response Code corresponding with third party's account, including:
When authorized website monitors third party's account register triggering of user, authorized website will be assisted according to oAuth The URL that view generates generates Quick Response Code corresponding with third party's account.
3. according to the method described in claim 1, described when the license confirmation of third party's client monitors to user operates triggering When, third party's authorization identifying is carried out between third party's service end and authorized website, including:
When the license confirmation of third party's client monitors to user operates triggering, third party's client is sent out to third party's service end Send identified 2 D code information;
Third party's mandate is carried out after receiving identified 2 D code information, between third party's service end and authorized website to recognize Card.
4. according to the method described in claim 3, described after receiving identified 2 D code information, third party's service end with Third party's authorization identifying is carried out between authorized website, including:
According to the loopback address information carried on the Quick Response Code identified, third party's service end by the authorization code of generation be sent to by Website, the authorization code is authorized to be used to carry out authority checking to being authorized to website;
It is authorized to website and receives the authorization code, and is sent to third party's service end by the authorization code and obtain user information Request;
It is authorized to website and receives the user information that third party's service end returns;
It is described after third party's authorization identifying passes through between third party's service end and authorized website, it is authorized to website third party Mandate logins successfully, including:
It is authorized to website after the user information for receiving the return of third party's service end, is authorized to website third party and authorizes login Success.
5. according to the method described in claim 4, the authorized website receives the authorization code, and by the authorization code to Third party's service end sends the request for obtaining user information, including:
It is authorized to website and receives the authorization code, and the authorization code by being received sends to third party's service end and obtains warrant The request of board, the authorization token is as the one of which foundation for obtaining user information;
It is authorized to website and receives the authorization token that third party's service end returns, and in the mandate for receiving the return of third party's service end After token, the request for obtaining user's unique mark is sent to third party's service end;
It is authorized to website and receives user's unique mark that third party's service end returns;
It is authorized to website and asking for acquisition user information is sent to third party's service end by authorization token and user's unique mark It asks.
6. method according to any one of claims 1 to 5, the method further include:
After third party's authorization identifying passes through between third party's service end and authorized website, third party's service end will authorize at The message of work(is sent to third party's client;
Third party's client after receiving the message, authorizes successfully to user's displaying.
7. a kind of third party authorizes login method, it is applied to third party's client, this method includes:
When the two-dimensional code scanning of third party's client monitors to user operates triggering, identifies and be authorized to the two dimension that website is shown Code, prompts the user whether to authorize;
When the license confirmation of third party's client monitors to user operates triggering, identified two are sent to third party's service end Code information is tieed up, is awarded so that third party's service end carries out third party after receiving the 2 D code information, with authorized website Weigh certification.
8. a kind of third party authorizes login method, it is applied to third party's service end, this method includes:
Receive the 2 D code information that third party's client is sent;
After the 2 D code information for receiving the transmission of third party's client, third party's authorization identifying is carried out with authorized website.
9. a kind of third party's mandate login system, the system include:Third party's client, third party's service end and authorized net It stands;
When authorized website monitors third party's account register triggering of user, it is authorized to website and generates and the third The corresponding Quick Response Code of square account;
It is authorized to website and shows the Quick Response Code to user;
When the two-dimensional code scanning of third party's client monitors to user operates triggering, third party's client identifies the two dimension Code, prompts the user whether to authorize;
When the license confirmation of third party's client monitors to user operates triggering, between third party's service end and authorized website Carry out third party's authorization identifying;
After third party's authorization identifying passes through between third party's service end and authorized website, it is authorized to website third party and authorizes It logins successfully.
10. system according to claim 9, the authorized website is specifically used for generating in the following manner and described the The corresponding Quick Response Code of tripartite's account:
When authorized website monitors third party's account register triggering of user, authorized website will be assisted according to oAuth The URL that view generates generates Quick Response Code corresponding with third party's account.
11. system according to claim 9 carries out between the third party's service end and authorized website in following situations Third party's authorization identifying:
When the license confirmation of third party's client monitors to user operates triggering, third party's client is sent out to third party's service end Send identified 2 D code information;
Third party's mandate is carried out after receiving identified 2 D code information, between third party's service end and authorized website to recognize Card.
12. system according to claim 11, especially by following between the third party's service end and authorized website Mode carries out third party's authorization identifying:
According to the loopback address information carried on the Quick Response Code identified, third party's service end by the authorization code of generation be sent to by Website, the authorization code is authorized to be used to carry out authority checking to being authorized to website;
It is authorized to website and receives the authorization code, and is sent to third party's service end by the authorization code and obtain user information Request;
It is authorized to website and receives the user information that third party's service end returns;
The authorized website is specifically used for third party's mandate in the following manner and logins successfully:
It is authorized to website after the user information for receiving the return of third party's service end, is authorized to website third party and authorizes login Success.
13. system according to claim 12, the authorized website is specifically used for sending to obtain in the following manner using The request of family information:
It is authorized to website and receives the authorization code, and the authorization code by being received sends to third party's service end and obtains warrant The request of board, the authorization token is as the one of which foundation for obtaining user information;
It is authorized to website and receives the authorization token that third party's service end returns, and in the mandate for receiving the return of third party's service end After token, the request for obtaining user's unique mark is sent to third party's service end;
It is authorized to website and receives user's unique mark that third party's service end returns;
It is authorized to website and asking for acquisition user information is sent to third party's service end by authorization token and user's unique mark It asks.
14. according to claim 9 to 13 any one of them system, third party's client is specifically used in the following manner Displaying authorizes successfully:
After third party's authorization identifying passes through between third party's service end and authorized website, third party's service end will authorize at The message of work(is sent to third party's client;
Third party's client after receiving the message, authorizes successfully to user's displaying.
15. a kind of third party authorizes entering device, it is applied to third party's client, which includes:
Quick Response Code identification module, for when the two-dimensional code scanning of third party's client monitors to user operates triggering, identifying quilt The Quick Response Code for authorizing website to be shown, prompts the user whether to authorize;
Information sending module, for when the license confirmation of third party's client monitors to user operates triggering, being taken to third party End of being engaged in sends identified 2 D code information, so that third party's service end is after receiving the 2 D code information, and is awarded It weighs website and carries out third party's authorization identifying.
16. a kind of third party authorizes entering device, it is applied to third party's service end, which includes:
Information receiving module, the 2 D code information for receiving the transmission of third party's client;
Authentication module, for after the 2 D code information for receiving the transmission of third party's client, the to be carried out with authorized website Tripartite's authorization identifying.
17. a kind of computer equipment, including memory, processor and storage are on a memory and the meter that can run on a processor Calculation machine program, wherein the processor is realized the method for claim 7 when executing described program.
18. a kind of computer equipment, including memory, processor and storage are on a memory and the meter that can run on a processor Calculation machine program, wherein the processor realizes method as claimed in claim 8 when executing described program.
CN201810465208.9A 2018-05-16 2018-05-16 A kind of third party authorizes login method and system Pending CN108632291A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201810465208.9A CN108632291A (en) 2018-05-16 2018-05-16 A kind of third party authorizes login method and system
TW108105614A TWI706265B (en) 2018-05-16 2019-02-20 Third-party authorized login method and system
PCT/CN2019/076021 WO2019218747A1 (en) 2018-05-16 2019-02-25 Third party authorized login method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810465208.9A CN108632291A (en) 2018-05-16 2018-05-16 A kind of third party authorizes login method and system

Publications (1)

Publication Number Publication Date
CN108632291A true CN108632291A (en) 2018-10-09

Family

ID=63693599

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810465208.9A Pending CN108632291A (en) 2018-05-16 2018-05-16 A kind of third party authorizes login method and system

Country Status (3)

Country Link
CN (1) CN108632291A (en)
TW (1) TWI706265B (en)
WO (1) WO2019218747A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109347855A (en) * 2018-11-09 2019-02-15 南京医渡云医学技术有限公司 Data access method, device, system, Electronic Design and computer-readable medium
CN110336870A (en) * 2019-06-27 2019-10-15 深圳前海微众银行股份有限公司 Method for building up, device, system and the storage medium in telecommuting O&M channel
WO2019218747A1 (en) * 2018-05-16 2019-11-21 阿里巴巴集团控股有限公司 Third party authorized login method and system
CN110909330A (en) * 2019-11-28 2020-03-24 安徽江淮汽车集团股份有限公司 Vehicle networking platform authorization method, device, equipment and storage medium
CN111177690A (en) * 2019-12-31 2020-05-19 中国工商银行股份有限公司 Two-dimensional code scanning login method and device
CN111182015A (en) * 2018-11-12 2020-05-19 北京场景互娱传媒科技有限公司 User information acquisition and unification method and device and electronic equipment
CN111193718A (en) * 2019-12-13 2020-05-22 航天信息股份有限公司 Safe login method and system based on third party authorization
CN111654468A (en) * 2020-04-29 2020-09-11 平安国际智慧城市科技股份有限公司 Secret-free login method, device, equipment and storage medium
CN112448917A (en) * 2019-08-29 2021-03-05 北京京东尚科信息技术有限公司 Website login method and device, readable medium and electronic equipment
CN112738797A (en) * 2020-12-24 2021-04-30 上海华申智能卡应用系统有限公司 WEB application authentication login method and system based on Bluetooth
CN113347197A (en) * 2021-06-22 2021-09-03 重庆广播电视大学重庆工商职业学院 WeChat platform-based web application code scanning authorization login method
CN113794678A (en) * 2021-07-29 2021-12-14 深圳思为科技有限公司 Method and device compatible with multiple login modes and computer storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821104A (en) * 2012-08-09 2012-12-12 腾讯科技(深圳)有限公司 Authorization method, authorization device and authorization system
CN103067381A (en) * 2012-12-26 2013-04-24 百度在线网络技术(北京)有限公司 Third-party service login method, login system and login device by means of platform-party account
US20140289508A1 (en) * 2013-03-21 2014-09-25 Tencent Technology (Shenzhen) Company Limited Method, client and system of identity authentication
CN104348777A (en) * 2013-07-24 2015-02-11 腾讯科技(深圳)有限公司 Method and system for controlling access of mobile terminal to third party server
CN106559384A (en) * 2015-09-25 2017-04-05 阿里巴巴集团控股有限公司 A kind of utilization public number realizes the method and device for logging in
CN106961415A (en) * 2016-01-11 2017-07-18 广州市动景计算机科技有限公司 Login method, equipment, browser, client and server

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8763097B2 (en) * 2011-03-11 2014-06-24 Piyush Bhatnagar System, design and process for strong authentication using bidirectional OTP and out-of-band multichannel authentication
CN103986720B (en) * 2014-05-26 2017-11-17 网之易信息技术(北京)有限公司 A kind of login method and device
CN107835160A (en) * 2017-10-20 2018-03-23 浙江工商大学 Third party's user authen method based on Quick Response Code
CN108632291A (en) * 2018-05-16 2018-10-09 阿里巴巴集团控股有限公司 A kind of third party authorizes login method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102821104A (en) * 2012-08-09 2012-12-12 腾讯科技(深圳)有限公司 Authorization method, authorization device and authorization system
CN103067381A (en) * 2012-12-26 2013-04-24 百度在线网络技术(北京)有限公司 Third-party service login method, login system and login device by means of platform-party account
US20140289508A1 (en) * 2013-03-21 2014-09-25 Tencent Technology (Shenzhen) Company Limited Method, client and system of identity authentication
CN104348777A (en) * 2013-07-24 2015-02-11 腾讯科技(深圳)有限公司 Method and system for controlling access of mobile terminal to third party server
CN106559384A (en) * 2015-09-25 2017-04-05 阿里巴巴集团控股有限公司 A kind of utilization public number realizes the method and device for logging in
CN106961415A (en) * 2016-01-11 2017-07-18 广州市动景计算机科技有限公司 Login method, equipment, browser, client and server

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019218747A1 (en) * 2018-05-16 2019-11-21 阿里巴巴集团控股有限公司 Third party authorized login method and system
CN109347855A (en) * 2018-11-09 2019-02-15 南京医渡云医学技术有限公司 Data access method, device, system, Electronic Design and computer-readable medium
CN111182015A (en) * 2018-11-12 2020-05-19 北京场景互娱传媒科技有限公司 User information acquisition and unification method and device and electronic equipment
CN110336870A (en) * 2019-06-27 2019-10-15 深圳前海微众银行股份有限公司 Method for building up, device, system and the storage medium in telecommuting O&M channel
CN110336870B (en) * 2019-06-27 2024-03-05 深圳前海微众银行股份有限公司 Method, device and system for establishing remote office operation and maintenance channel and storage medium
CN112448917B (en) * 2019-08-29 2023-08-04 北京京东尚科信息技术有限公司 Website login method and device, readable medium and electronic equipment
CN112448917A (en) * 2019-08-29 2021-03-05 北京京东尚科信息技术有限公司 Website login method and device, readable medium and electronic equipment
CN110909330A (en) * 2019-11-28 2020-03-24 安徽江淮汽车集团股份有限公司 Vehicle networking platform authorization method, device, equipment and storage medium
CN111193718A (en) * 2019-12-13 2020-05-22 航天信息股份有限公司 Safe login method and system based on third party authorization
CN111177690A (en) * 2019-12-31 2020-05-19 中国工商银行股份有限公司 Two-dimensional code scanning login method and device
CN111177690B (en) * 2019-12-31 2022-07-05 中国工商银行股份有限公司 Two-dimensional code scanning login method and device
CN111654468A (en) * 2020-04-29 2020-09-11 平安国际智慧城市科技股份有限公司 Secret-free login method, device, equipment and storage medium
CN112738797A (en) * 2020-12-24 2021-04-30 上海华申智能卡应用系统有限公司 WEB application authentication login method and system based on Bluetooth
CN113347197A (en) * 2021-06-22 2021-09-03 重庆广播电视大学重庆工商职业学院 WeChat platform-based web application code scanning authorization login method
CN113347197B (en) * 2021-06-22 2022-07-15 重庆广播电视大学重庆工商职业学院 WeChat platform-based web application code scanning authorization login method
CN113794678A (en) * 2021-07-29 2021-12-14 深圳思为科技有限公司 Method and device compatible with multiple login modes and computer storage medium

Also Published As

Publication number Publication date
WO2019218747A1 (en) 2019-11-21
TWI706265B (en) 2020-10-01
TW201947438A (en) 2019-12-16

Similar Documents

Publication Publication Date Title
CN108632291A (en) A kind of third party authorizes login method and system
US10057251B2 (en) Provisioning account credentials via a trusted channel
US9864852B2 (en) Approaches for providing multi-factor authentication credentials
EP3308525B1 (en) Single sign-on for unmanaged mobile devices
CN111556006B (en) Third-party application system login method, device, terminal and SSO service platform
US9979712B2 (en) Synchronizing authentication sessions between applications
US10362026B2 (en) Providing multi-factor authentication credentials via device notifications
CN101990183B (en) Method, device and system for protecting user information
CN104917721B (en) Authorization method, device and system based on oAuth agreement
CN110351269A (en) The method for logging in open platform by third-party server
CN104065616A (en) Single sign-on method and system
CN102238007A (en) Method, device and system for acquiring session token of user by third-party application
US10841297B2 (en) Providing multi-factor authentication credentials via device notifications
CN106331003B (en) The access method and device of application door system on a kind of cloud desktop
CN104348617A (en) Verification code processing method and device, and terminal and server
WO2019159894A1 (en) Authentication approval information integration device and authentication approval information integration method
CN111241523B (en) Authentication processing method, device, equipment and storage medium
KR101425854B1 (en) Methods and Apparatus for Integrated Authentication for Auto-Login
CN114745156A (en) Distributed single sign-on realization method and device, electronic equipment and storage medium
CN109951487A (en) A kind of portal authentication method and device
CN105635059B (en) A kind of WLAN access authentication method, relevant device and system
EP3329650B1 (en) Providing multi-factor authentication credentials via device notifications
CN114095483A (en) Password substitution filling method and device, electronic equipment and storage medium
JP2012003338A (en) Authentication system, authentication proxy server, control program, and authentication method
JP5749222B2 (en) Access permission control system and access permission control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1261594

Country of ref document: HK

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181009