CN109033774B - Method and device for acquiring and feeding back user resources and electronic equipment - Google Patents

Method and device for acquiring and feeding back user resources and electronic equipment Download PDF

Info

Publication number
CN109033774B
CN109033774B CN201811015333.6A CN201811015333A CN109033774B CN 109033774 B CN109033774 B CN 109033774B CN 201811015333 A CN201811015333 A CN 201811015333A CN 109033774 B CN109033774 B CN 109033774B
Authority
CN
China
Prior art keywords
preset
target user
resource
authorization
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811015333.6A
Other languages
Chinese (zh)
Other versions
CN109033774A (en
Inventor
胡燚铠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811015333.6A priority Critical patent/CN109033774B/en
Publication of CN109033774A publication Critical patent/CN109033774A/en
Priority to TW108122339A priority patent/TWI704470B/en
Priority to PCT/CN2019/096267 priority patent/WO2020042791A1/en
Application granted granted Critical
Publication of CN109033774B publication Critical patent/CN109033774B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method, a device and electronic equipment for acquiring and feeding back user resources, wherein the method for acquiring the user resources can send an authorization request for requesting to acquire the access authority of preset resources of a target user to the target user, and the preset resources are stored in a resource server of a preset social application; receiving an authorization certificate fed back after the target user confirms that the access authority is granted; applying for obtaining authorization information of the preset resource to an authentication server of the preset social application based on the authorization voucher, wherein the authorization information comprises a token and an identity of the target user; and accessing the resource server to acquire the preset resource based on the token and the identity.

Description

Method and device for acquiring and feeding back user resources and electronic equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, and an electronic device for feeding back and acquiring user resources.
Background
With the progress of scientific technology, more and more organizations or organizations provide services to users through network service platforms. For example, insurance companies often accept traffic accident claims through the network service platform, and in case of clear accident responsibility, responsible parties are required to submit the certificate information related to the responsible parties and the non-responsible parties to the network service platform of the insurance companies.
However, in this case, not only the responsible party needs to collect the own certificate information in advance, but also the responsible party needs to collect the related certificate information of the non-responsible party in advance, which means that some resources such as privacy and sensitive information of the non-responsible party are leaked to the responsible party in the process of submitting the related certificate information to the network service platform of the insurance company.
Disclosure of Invention
The embodiment of the application provides a method, a device and electronic equipment for feeding back and acquiring user resources, so as to protect the user resources from being leaked.
In order to solve the above technical problem, the embodiment of the present application is implemented as follows:
in a first aspect, a method for acquiring a user resource is provided, where the method includes:
sending an authorization request to a target user, wherein the authorization request is used for requesting to acquire the access authority of a preset resource of the target user, and the preset resource is stored in a resource server of a preset social application;
receiving an authorization certificate fed back after the target user confirms that the access authority is granted;
applying for obtaining authorization information of the preset resource to an authentication server of the preset social application based on the authorization voucher, wherein the authorization information comprises a token and an identity of the target user;
and accessing the resource server to acquire the preset resource based on the token and the identity.
In a second aspect, a method for feeding back user resources is provided, the method comprising:
receiving an authorization information application request sent by a third-party application, wherein the authorization information application request carries an authorization certificate, and the authorization certificate is a certificate for a target user to confirm that the third-party application has an access right of a preset resource of the target user;
feeding back authorization information for acquiring the preset resource to the third-party application, wherein the authorization information comprises a token and an identity of the target user;
receiving a resource acquisition request sent by the third-party application, wherein the resource acquisition request carries the token and the identity;
and feeding back the preset resource to the third-party application based on the token and the identity.
In a third aspect, an apparatus for acquiring user resources is provided, where the apparatus includes:
the system comprises an authorization request sending module, a resource server and a resource management module, wherein the authorization request sending module is used for sending an authorization request to a target user, the authorization request is used for requesting to acquire the access authority of a preset resource of the target user, and the preset resource is stored in the resource server of a preset social application;
the authorization voucher receiving module is used for receiving the authorization voucher fed back after the target user confirms the authority granted;
the authorization information application module is used for applying to an authentication server of the preset social application for obtaining authorization information of the preset resource based on the authorization certificate, wherein the authorization information comprises a token and an identity of the target user;
and the resource acquisition module is used for accessing the resource server to acquire the preset resource based on the token and the identity.
In a fourth aspect, an apparatus for feeding back user resources is provided, the apparatus comprising:
the first request receiving module is used for receiving an authorization information application request sent by a third-party application, wherein the authorization information application request carries an authorization certificate, and the authorization certificate is a certificate for a target user to confirm that the third-party application has the access right of a preset resource of the target user;
the authorization information sending module is used for feeding back authorization information for acquiring the preset resource to the third-party application, wherein the authorization information comprises a token and the identity of the target user;
a second request receiving module, configured to receive a resource acquisition request sent by the third-party application, where the resource acquisition request carries the token and the identity;
and the resource feedback module is used for feeding back the preset resource to the third-party application based on the token and the identity.
In a fifth aspect, an electronic device is provided, including:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
sending an authorization request to a target user, wherein the authorization request is used for requesting to acquire the access authority of a preset resource of the target user, and the preset resource is stored in a resource server of a preset social application;
receiving an authorization certificate fed back after the target user confirms that the access authority is granted;
applying for obtaining authorization information of the preset resource to an authentication server of the preset social application based on the authorization voucher, wherein the authorization information comprises a token and an identity of the target user;
and accessing the resource server to acquire the preset resource based on the token and the identity.
In a sixth aspect, a computer-readable storage medium is presented, storing one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to:
sending an authorization request to a target user, wherein the authorization request is used for requesting to acquire the access authority of a preset resource of the target user, and the preset resource is stored in a resource server of a preset social application;
receiving an authorization certificate fed back after the target user confirms that the access authority is granted;
applying for obtaining authorization information of the preset resource to an authentication server of the preset social application based on the authorization voucher, wherein the authorization information comprises a token and an identity of the target user;
and accessing the resource server to acquire the preset resource based on the token and the identity.
In a seventh aspect, an electronic device is provided, including:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving an authorization information application request sent by a third-party application, wherein the authorization information application request carries an authorization certificate, and the authorization certificate is a certificate for a target user to confirm that the third-party application has an access right of a preset resource of the target user;
feeding back authorization information for acquiring the preset resource to the third-party application, wherein the authorization information comprises a token and an identity of the target user;
receiving a resource acquisition request sent by the third-party application, wherein the resource acquisition request carries the token and the identity;
and feeding back the preset resource to the third-party application based on the token and the identity.
In an eighth aspect, a computer-readable storage medium is presented, the computer-readable storage medium storing one or more programs that, when executed by an electronic device that includes a plurality of application programs, cause the electronic device to:
receiving an authorization information application request sent by a third-party application, wherein the authorization information application request carries an authorization certificate, and the authorization certificate is a certificate for a target user to confirm that the third-party application has an access right of a preset resource of the target user;
feeding back authorization information for acquiring the preset resource to the third-party application, wherein the authorization information comprises a token and an identity of the target user;
receiving a resource acquisition request sent by the third-party application, wherein the resource acquisition request carries the token and the identity;
and feeding back the preset resource to the third-party application based on the token and the identity.
As can be seen from the technical solutions provided in the embodiments of the present application, the solutions provided in the embodiments of the present application have at least one of the following technical effects: the third-party application can acquire the preset resources pre-stored by the target user by accessing the resource server of the preset social application under the condition that the target user grants the access right, and does not need to manually submit the preset resources of the target user to the third-party application. Therefore, the situation that preset resources of the target user are transmitted among different persons can be avoided, and further resources such as personal privacy and sensitive information of the target user can be protected from being leaked.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a flowchart of a method for acquiring a user resource according to an embodiment of the present disclosure.
Fig. 2 is a schematic architecture diagram of a method for acquiring a user resource according to an embodiment of the present disclosure.
Fig. 3 is a second flowchart of a method for acquiring a user resource according to an embodiment of the present disclosure.
Fig. 4 is a flowchart illustrating a method for feeding back user resources according to an embodiment of the present disclosure.
Fig. 5 is a schematic structural diagram of an electronic device provided in an embodiment of the present specification.
Fig. 6 is a schematic structural diagram of another electronic device provided in an embodiment of this specification.
Fig. 7 is a schematic structural diagram of an apparatus for acquiring a user resource according to an embodiment of the present specification.
Fig. 8 is a schematic structural diagram of an apparatus for feeding back user resources according to an embodiment of the present specification.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In order to protect resources of a user from being leaked, embodiments of the present specification provide a method and an apparatus for acquiring user resources, and a method and an apparatus for feeding back user resources. The method and the device for acquiring the user resource can be applied to a third party application needing to acquire the user resource, for example, can be applied to an insurance company network service platform needing to acquire the related certificate information of a non-responsible party. The method and the device for feeding back the user resources can be applied to preset social applications, for example, applications with social functions such as WeChat and Paibao.
A method for acquiring a user resource according to an embodiment of the present disclosure is described in detail below with reference to fig. 1 to 3.
As shown in fig. 1, a method for acquiring a user resource provided in an embodiment of the present disclosure may be applied to a third-party application, where the method may include the following steps:
step 102, sending an authorization request to a target user, wherein the authorization request is used for requesting to acquire an access right of a preset resource of the target user, and the preset resource is stored in a resource server of a preset social application.
The target user may be a user who needs to submit a preset resource to a third-party application, for example, a non-responsible party in a traffic accident as described in the background of the present specification.
The third party application may be, for example, a web services platform of an insurance company.
The preset resource may be any resource that needs the target user to submit to the third-party application, for example, related certificate information that needs the target user to submit to the network service platform of the insurance company. The related certificate information of the non-responsible party may be, for example, identity card information, driving license information, and the like of the non-responsible party.
The preset social application can be any application with social function. Alternatively, the preset social application may be a social application with an open platform, such as a WeChat with a public number, a Payment treasures with a life number, and so on.
In one example, the "sending an authorization request to a target user" in step 101 may include: and sending an authorization request to the target user by sending a short message to the target user or sending information to an instant messaging account of the target user. For example, a link for guiding the user to grant the access right may be sent to the target user through a short message, and after the target user clicks the link, whether the access right is granted may be selected.
In another example, the "sending an authorization request to a target user" in step 101 may include: and directly sending the authorization request to the target user through the preset social application, wherein the target user is a registered user of the social application.
Optionally, in a specific implementation manner of this example, before sending the authorization request to the target user through the preset social application, the method shown in fig. 1 may further include: registering a public service number in the preset social application, for example, assuming that the preset social application is a pay bank, a pay bank life number may be registered on an open platform of the pay bank; on this basis, the sending the authorization request to the target user through the preset social application may include: and sending the authorization request to the target user through the public service number, for example, pushing the authorization request to the target user through a Payment treasure Life number.
Still further, before sending the authorization request to the target user through the preset social application, the method shown in fig. 1 may further include: and acquiring an account number registered by the target user in the social application, for example, acquiring an account number registered by the target user in a payment bank, where the account number is generally a mobile phone number of the target user. On this basis, the sending the authorization request to the target user through the public service number may include: and sending the authorization request to the account of the target user through the public service number, for example, sending the authorization request to a Payment account of the target user.
And 104, receiving an authorization certificate fed back after the target user confirms that the access authority is granted.
Wherein the authorization credential may be an authorization code. It is to be understood that after the target user confirms that the access right is granted, the default social application may generate an authorization code accordingly.
And 106, applying for obtaining authorization information of the preset resource from an authentication server of the preset social application based on the authorization certificate, wherein the authorization information comprises a token and the identity of the target user.
In this step, the third-party application may send the authorization credential to an authentication server of the preset social application, and obtain authorization information by replacing the authorization credential with the authentication server. Correspondingly, in an embodiment, the authentication server of the preset social application may maintain a correspondence table between an Identity (ID) of the target user and the token, and when the authentication server determines that the third-party application has an access right to acquire the preset resource of the target user according to the authorization credential, the token and the corresponding Identity are fed back to the third-party application as authorization information.
And 108, accessing the resource server to acquire the preset resource based on the token and the identity.
As an example, step 108 may include: acquiring the authority of accessing a preset interface of the resource server based on the token, wherein the preset resource is stored under the preset interface; acquiring the authority for accessing the preset resource under the preset interface based on the identity; and accessing the preset interface to obtain the preset resource.
The steps 102 to 108 may be implemented based on the open protocol oauth (open authorization). With reference to fig. 2, a description is provided below of a principle of obtaining authorization of a target user by a third-party application, obtaining authorization information issued by an authentication server of a preset social application, and obtaining a preset resource by using the authorization information in the embodiment of the present invention.
As shown in FIG. 2, ① a Client 11(Client) of a third-party application 1 sends an Authorization Request (Authorization Request) to a Resource Owner (Resource Owner)21 (target user) of a preset social application 2, the Authorization Request is used for requesting to acquire an Access right of a preset Resource of the target user, the preset Resource is stored in a Resource Server 23 of the preset social application 2, ② the target user 21 grants the Access right of the third-party application 1, and the preset social application 2 feeds back an Authorization credential (Authorization Grant) to the Client 11 of the third-party application 1, ③ the Client 11 of the third-party application 1 applies for acquiring Authorization information to an authentication Server (Authorization Server)22 of the preset social application 2 according to the Authorization credential, the Authorization information comprises a Token (Access Token) and an ID of the target user, ④ the authentication Server 22 sends Authorization information to the Client 11 of the third-party application 1 after the Authorization authentication of the credential passes, ⑤ sends the Authorization information to the Client 11 of the Client 1 after the Authorization authentication of the Client passes the authentication, the Client 1 queries the Client 11 of the preset Resource and sends the Authorization Request to the Client 23 and the Resource Request to the target user through the preset Resource Server ID of the preset Resource Server 23, and the Client 23, and the Authorization Request of the Resource carried by the third-party application 1 and the ID of the preset Resource, and the ID of the Resource, when the Client 23 of the Client 23.
It should be noted that, in practical applications, the authentication server 22 and the resource server 23 of the preset social application 1 may be the same server or different servers, but the functions to be implemented by the two servers may be implemented by different service domains of the preset social application 1. For example, when the predetermined social application is a pay bank and the predetermined resource is certificate information of the target user, the process of feeding back the predetermined resource by the resource server 23 may be implemented by a member domain of the pay bank, because certificate information such as an identification number of the target user is stored in a server corresponding to the member domain; and the process of the authentication server 22 for authority authentication and authorization information feedback can be realized by an open platform of the payment instrument.
Certainly, in practical applications, the preset social application may also be used to specifically establish a certificate repository, and the third-party application may access the certificate repository to obtain the preset resource.
In the method for acquiring user resources provided by the embodiment shown in fig. 1, since the third-party application can acquire the preset resources pre-stored by the target user by accessing the resource server of the preset social application under the condition that the target user grants the access right, it is not necessary for the third-party application to manually submit the preset resources of the target user to the third-party application. Therefore, the situation that preset resources of the target user are transmitted among different persons can be avoided, and further resources such as personal privacy and sensitive information of the target user can be protected from being leaked.
In order to more clearly understand the method for acquiring the resources of the user provided by the embodiment of the present disclosure, a network service platform of an insurance company is described as an example of acquiring the related certificate information of an untrustworthy party in a traffic accident with reference to fig. 3.
As shown in fig. 3, in this embodiment, the third-party application is a network service platform of an insurance company (for convenience of understanding, the insurance company 5 is used instead of the insurance company in fig. 3), the predetermined social application is the payment treasure 4, the target user is an irresponsible party 6 in the traffic accident, the predetermined resource to be acquired is related certificate information of the irresponsible party 6, and the process of acquiring the related piece information of the target user is triggered by the responsible party 3 in the traffic accident. Also, in this embodiment, the insurance company 5 may be accessible through the payment instrument 4.
As shown in fig. 3, a method for acquiring a user resource provided in an embodiment of this specification may include the following steps:
step 31, the responsible party 3 in the traffic accident selects an insurance company 5 in the insurance service of the payment treasures 4, and fills in the payment treasury account number of the responsible party 6 (for example, fills in the mobile phone number of the responsible party 6).
Step 32, the payment instrument 4 reports to the insurance company 5 based on the operation of the responsible party 3.
And step 33, the insurance company 5 audits the reporting materials submitted by the responsible party 3 through the payment treasure 4, and sends an authorization request to the non-responsible party 6 through the payment treasure 4 after the audit is passed, wherein the authorization request is used for requesting to acquire the access authority of the related certificate information of the non-responsible party 6, and the related certificate information of the non-responsible party 6 is stored in the resource server of the payment treasure 4.
And step 34, the party without responsibility 6 agrees to grant the access right to the insurance company 5.
And step 35, the payment treasure 4 generates an authorization certificate and feeds the authorization certificate back to the insurance company 5.
And step 36, the insurance company 5 applies for obtaining authorization information from the authentication server of the payment treasure 4 based on the authorization certificate, wherein the authorization information comprises the token and the ID of the non-responsible party 6.
Step 37, the authentication server of the payment instrument 4 feeds back the authorization information to the insurance company 5.
And step 38, the insurance company 5 accesses the resource server of the payment treasure 4 to obtain the related certificate information of the party without responsibility 6 based on the ID of the token in the authorization information.
And step 39, the resource server of the payment treasure 4 feeds back the related certificate information of the party without responsibility 6 to the insurance company 5.
The embodiment shown in fig. 3 provides a method for acquiring user resources, since the insurance company 5 can acquire the certificate information related to the liability party 6 by accessing the resource server of the payment instrument 4 under the condition that the liability party 6 grants the access right, and the liability party 3 is not required to manually submit the certificate information related to the liability party 6 to the insurance company 5. Therefore, the related certificate information of the non-responsible party 6 can be prevented from being leaked to the responsible party 3, and the security of resources such as the personal privacy and sensitive information of the non-responsible party 6 is protected.
The above is a description of a method for acquiring user resources provided in this specification, and a method for feeding back user resources provided in this specification is described below.
As shown in fig. 4, a method for feeding back user resources provided in an embodiment of the present specification may be applied to a preset social application, and the method may include:
step 402, receiving an authorization information application request sent by a third-party application, where the authorization information application request carries an authorization credential, and the authorization credential is a credential for a target user to confirm that the third-party application has an access right to a preset resource of the target user.
For example, the authentication server of the payment apparatus may receive an authorization information application request sent by a network service platform of an insurance company.
Step 404, feeding back authorization information for acquiring the preset resource to the third-party application, where the authorization information includes a token and an identity of the target user.
For example, the authentication server of the payment apparatus may feed back authorization information for acquiring the preset resource to a network service platform of an insurance company.
Step 406, receiving a resource obtaining request sent by the third party application, where the resource obtaining request carries the token and the identity.
For example, the resource server of the payment treasure may receive a resource acquisition request sent by a network service platform of an insurance company.
And step 408, feeding back the preset resource to the third-party application based on the token and the identity.
For example, the resource server of the payment treasure may feed back the preset resource to the network service platform of the insurance company.
In one embodiment, step 408 may comprise: opening the access right of a preset interface of the resource server to the third-party application based on the token, wherein the preset resource is stored under the preset interface; opening the authority for accessing the preset resource under the preset interface to the third-party application based on the identity; and feeding back the preset resource to the third party application through the preset interface.
It should be noted that, in this embodiment, step 402 and step 404 may be performed by an authentication server of a preset social application (which may correspond to an open platform service domain of the preset social application), step 406 and step 408 may be performed by a resource server of the preset social application (which may correspond to a member domain of the preset social application), and the authentication server and the resource server of the preset social application may be the same server or different servers.
In the method for feeding back user resources provided in the embodiment shown in fig. 4, since the resource server of the preset social application can feed back the preset resources of the target user stored on the resource server of the preset social application to the third-party application under the condition that the third-party application obtains the access right granted by the target user, there is no need for others to manually submit the preset resources of the target user to the third-party application. Therefore, the situation that preset resources of the target user are transmitted among different persons can be avoided, and further resources such as personal privacy and sensitive information of the target user can be protected from being leaked.
The above is a description of a method for feeding back user resources provided in this specification, and the electronic device provided in this specification is described below.
Fig. 5 is a schematic structural diagram of an electronic device provided in an embodiment of the present specification. Referring to fig. 5, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (peripheral component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 5, but this does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program, and a device for acquiring the user resource is formed on a logic level. The processor is used for executing the program stored in the memory and is specifically used for executing the following operations:
sending an authorization request to a target user, wherein the authorization request is used for requesting to acquire the access authority of a preset resource of the target user, and the preset resource is stored in a resource server of a preset social application;
receiving an authorization certificate fed back after the target user confirms that the access authority is granted;
applying for obtaining authorization information of the preset resource to an authentication server of the preset social application based on the authorization voucher, wherein the authorization information comprises a token and an identity of the target user;
and accessing the resource server to acquire the preset resource based on the token and the identity.
The method for acquiring user resources disclosed in the embodiment of fig. 1 in this specification may be applied to or implemented by the processor shown in fig. 5. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps and logic blocks disclosed in one or more embodiments of the present specification may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with one or more embodiments of the present disclosure may be embodied directly in hardware, in a software module executed by a hardware decoding processor, or in a combination of the hardware and software modules executed by a hardware decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
The electronic device shown in fig. 5 may further execute the method for acquiring a user resource shown in fig. 1, and this description is not repeated here.
Fig. 6 is a schematic structural diagram of an electronic device provided in another embodiment of the present specification. The apparatus shown in fig. 6 differs from the electronic apparatus shown in fig. 5 in that the processor executes the program stored in the memory and is specifically configured to perform the following operations:
receiving an authorization information application request sent by a third-party application, wherein the authorization information application request carries an authorization certificate, and the authorization certificate is a certificate for a target user to confirm that the third-party application has an access right of a preset resource of the target user;
feeding back authorization information for acquiring the preset resource to the third-party application, wherein the authorization information comprises a token and an identity of the target user;
receiving a resource acquisition request sent by the third-party application, wherein the resource acquisition request carries the token and the identity;
and feeding back the preset resource to the third-party application based on the token and the identity.
The electronic device shown in fig. 6 may further perform the method for feeding back user resources shown in fig. 4, which is not described herein again.
Of course, besides the software implementation, the electronic device in this specification does not exclude other implementations, such as logic devices or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or logic devices.
Embodiments of the present specification also propose a computer-readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a portable electronic device comprising a plurality of application programs, are capable of causing the portable electronic device to perform the method of the embodiment shown in fig. 1, and in particular to perform the following:
sending an authorization request to a target user, wherein the authorization request is used for requesting to acquire the access authority of a preset resource of the target user, and the preset resource is stored in a resource server of a preset social application;
receiving an authorization certificate fed back after the target user confirms that the access authority is granted;
applying for obtaining authorization information of the preset resource to an authentication server of the preset social application based on the authorization voucher, wherein the authorization information comprises a token and an identity of the target user;
and accessing the resource server to acquire the preset resource based on the token and the identity.
In another embodiment, this specification embodiment also proposes a computer-readable storage medium storing one or more programs, the one or more programs including instructions, which when executed by a portable electronic device including a plurality of application programs, enable the portable electronic device to perform the method of the embodiment shown in fig. 1, and are specifically configured to perform the following operations:
receiving an authorization information application request sent by a third-party application, wherein the authorization information application request carries an authorization certificate, and the authorization certificate is a certificate for a target user to confirm that the third-party application has an access right of a preset resource of the target user;
feeding back authorization information for acquiring the preset resource to the third-party application, wherein the authorization information comprises a token and an identity of the target user;
receiving a resource acquisition request sent by the third-party application, wherein the resource acquisition request carries the token and the identity;
and feeding back the preset resource to the third-party application based on the token and the identity.
The following describes an apparatus for acquiring user resources provided in this specification.
Fig. 7 is a schematic structural diagram of an apparatus 700 for acquiring user resources provided in this specification. Referring to fig. 7, in a software implementation, an apparatus 700 for acquiring a user resource may include: an authorization request sending module 701, an authorization credential receiving module 702, an authorization information applying module 703 and a resource obtaining module 704.
An authorization request sending module 701, configured to send an authorization request to a target user, where the authorization request is used to request to obtain an access right of a preset resource of the target user, and the preset resource is stored in a resource server of a preset social application.
Optionally, in an example, the authorization request sending module 701 may be configured to send the authorization request to the target user by sending a short message to the target user or by sending information to an instant messaging account of the target user.
Optionally, in another example, the authorization request sending module 701 may be configured to send the authorization request to the target user through the preset social application, where the target user is a registered user of the social application.
Further, on the basis of this example, the apparatus 700 for acquiring user resources may further include: the registration module is used for registering a public service number in the preset social application before the authorization request is sent to the target user through the preset social application. Accordingly, the authorization request sending module 701 may be configured to send the authorization request to the target user through the public service number, for example, push the authorization request to the target user through a pay baby number.
Further, on the basis of this example, the apparatus 700 for acquiring user resources may further include: and the obtaining module is used for obtaining the account number registered in the social application by the target user before the authorization request is sent to the target user through the preset social application. Correspondingly, the authorization request sending module 701 may be configured to send the authorization request to the account of the target user through the public service number.
An authorization credential receiving module 702, configured to receive an authorization credential fed back after the target user confirms that the authority is granted.
An authorization information application module 703 is configured to apply for obtaining authorization information of the preset resource from an authentication server of the preset social application based on the authorization credential, where the authorization information includes a token and an identity of the target user.
A resource obtaining module 704, configured to access the resource server to obtain the preset resource based on the token and the identity.
As a specific example, the resource obtaining module 704 may be configured to obtain, based on the token, a right to access a preset interface of the resource server, where the preset resource is stored under the preset interface; acquiring the authority for accessing the preset resource under the preset interface based on the identity; and accessing the preset interface to obtain the preset resource.
The apparatus 700 for acquiring a user resource according to the embodiment shown in fig. 7 may acquire the preset resource pre-stored by the target user by accessing the resource server of the preset social application without requiring a person to manually submit the preset resource of the target user to the third-party application, in case that the target user grants the access right. Therefore, the situation that preset resources of the target user are transmitted among different persons can be avoided, and further resources such as personal privacy and sensitive information of the target user can be protected from being leaked.
It should be noted that, the apparatus 700 for acquiring a user resource can implement the method in the embodiment of the method in fig. 1, and specifically refer to the method for acquiring a user resource in the embodiment shown in fig. 1, which is not described again.
Fig. 8 is a schematic structural diagram of an apparatus 800 for feeding back user resources provided in the present specification. Referring to fig. 8, in a software implementation, the apparatus 800 for feeding back user resources may include: a first request receiving module 801, an authorization information sending module 802, a second request receiving module 803 and a resource feedback module 804.
The first request receiving module 801 is configured to receive an authorization information application request sent by a third-party application, where the authorization information application request carries an authorization credential, and the authorization credential is a credential for a target user to confirm that the third-party application has an access right to a preset resource of the target user.
An authorization information sending module 802, configured to feed back, to the third-party application, authorization information used for obtaining the preset resource, where the authorization information includes a token and an identity of the target user.
A second request receiving module 803, configured to receive a resource obtaining request sent by the third-party application, where the resource obtaining request carries the token and the identity.
A resource feedback module 804, configured to feed back the preset resource to the third-party application based on the token and the identity.
In a specific embodiment, the resource feedback module 804 is configured to open an access right of a preset interface of the resource server to the third party application based on the token, where the preset resource is stored under the preset interface; opening the authority for accessing the preset resource under the preset interface to the third-party application based on the identity; and feeding back the preset resource to the third party application through the preset interface.
The apparatus 800 for feeding back user resources according to the embodiment shown in fig. 8 can feed back the preset resources of the target user stored on the resource server of the preset social application to the third-party application without manually submitting the preset resources of the target user to the third-party application, when the third-party application obtains the access right granted by the target user. Therefore, the situation that preset resources of the target user are transmitted among different persons can be avoided, and further resources such as personal privacy and sensitive information of the target user can be protected from being leaked.
It should be noted that, the apparatus 800 for acquiring a user resource can implement the method in the embodiment of the method in fig. 4, and specifically refer to the method for acquiring a user resource in the embodiment shown in fig. 4, which is not described again.
In short, the above description is only a preferred embodiment of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of one or more embodiments of the present disclosure should be included in the scope of protection of one or more embodiments of the present disclosure.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.

Claims (9)

1. A method for obtaining user resources is applied to a network service platform of an insurance company, and the method comprises the following steps:
sending an authorization request to a target user through a public service number registered in a preset social application in advance, wherein the authorization request is used for requesting to acquire access authority of preset resources of the target user, the preset resources are stored in a resource server of the preset social application, the target user is a non-responsible party in a traffic accident, the preset resources are certificate information needing the target user to submit to the network service platform, and the target user is a registered user of the social application;
receiving an authorization certificate fed back after the target user confirms that the access authority is granted;
applying for obtaining authorization information of the preset resource to an authentication server of the preset social application based on the authorization voucher, wherein the authorization information comprises a token and an identity of the target user;
and acquiring the authority of accessing a preset interface of the resource server based on the token, accessing the preset interface and acquiring the preset resource based on the identity, wherein the preset resource is stored under the preset interface.
2. The method of claim 1, prior to said sending said authorization request to said target user via said public service number, further comprising:
acquiring an account number registered by the target user in the preset social application;
wherein the sending the authorization request to the target user through the public service number comprises:
and sending the authorization request to the account of the target user through the public service number.
3. A method for feeding back user resources, which is applied to a preset social application, comprises the following steps:
receiving an authorization information application request sent by a third-party application, wherein the authorization information application request carries an authorization certificate, the authorization certificate is a certificate for a target user to confirm that the third-party application has an access right of a preset resource of the target user, the third-party application is a network service platform of an insurance company, the target user is a party without responsibility in a traffic accident, the preset resource is certificate information needing the target user to submit to the network service platform, the certificate is fed back after the target user receives the authorization request of the third-party application, and the authorization request is sent to the target user by the third-party application through a public service number registered in the preset social application in advance;
feeding back authorization information for acquiring the preset resource to the third-party application, wherein the authorization information comprises a token and an identity of the target user;
receiving a resource acquisition request sent by the third-party application, wherein the resource acquisition request carries the token and the identity;
opening the access right of a preset interface of the resource server to the third-party application based on the token, wherein the preset resource is stored under the preset interface; opening the authority for accessing the preset resource under the preset interface to the third-party application based on the identity; and feeding back the preset resource to the third party application through the preset interface.
4. An apparatus for acquiring user resources, applied to a network service platform of an insurance company, the apparatus comprising:
the system comprises an authorization request sending module, a target user and a service processing module, wherein the authorization request sending module is used for sending an authorization request to the target user through a public service number registered in a preset social application in advance, the authorization request is used for requesting to acquire access authority of preset resources of the target user, the preset resources are stored in a resource server of the preset social application, the target user is a party without responsibility in a traffic accident, the preset resources are certificate information needing to be submitted to the network service platform by the target user, and the target user is a registered user of the social application;
the authorization voucher receiving module is used for receiving the authorization voucher fed back after the target user confirms the authority granted;
the authorization information application module is used for applying to an authentication server of the preset social application for obtaining authorization information of the preset resource based on the authorization certificate, wherein the authorization information comprises a token and an identity of the target user;
and the resource acquisition module is used for acquiring the authority of accessing a preset interface of the resource server based on the token, accessing the preset interface and acquiring the preset resource based on the identity, wherein the preset resource is stored under the preset interface.
5. An apparatus for feeding back user resources, the apparatus comprising:
the system comprises a first request receiving module, a first authorization module and a second request receiving module, wherein the first request receiving module is used for receiving an authorization information application request sent by a third-party application, the authorization information application request carries an authorization certificate, the authorization certificate is a certificate of a target user for confirming that the third-party application has access authority of preset resources of the target user, the third-party application is a network service platform of an insurance company, the target user is a non-responsible party in a traffic accident, the preset resources are certificate information needing the target user to submit to the network service platform, the certificate is fed back after the target user receives the authorization request of the third-party application, and the authorization request is sent to the target user through a public service number which is registered in the preset social application in advance;
the authorization information sending module is used for feeding back authorization information for acquiring the preset resource to the third-party application, wherein the authorization information comprises a token and the identity of the target user;
a second request receiving module, configured to receive a resource acquisition request sent by the third-party application, where the resource acquisition request carries the token and the identity;
the resource feedback module is used for opening the access authority of a preset interface of the resource server to the third-party application based on the token, and the preset resource is stored under the preset interface; opening the authority for accessing the preset resource under the preset interface to the third-party application based on the identity; and feeding back the preset resource to the third party application through the preset interface.
6. An electronic device, comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
sending an authorization request to a target user through a public service number registered in a preset social application in advance, wherein the authorization request is used for requesting to acquire the access authority of a preset resource of the target user, the preset resource is stored in a resource server of the preset social application, the target user is a non-responsible party in a traffic accident, the preset resource is certificate information required to be submitted to a network service platform of an insurance company by the target user, and the target user is a registered user of the social application;
receiving an authorization certificate fed back after the target user confirms that the authority is granted;
applying for obtaining authorization information of the preset resource to an authentication server of the preset social application based on the authorization voucher, wherein the authorization information comprises a token and an identity of the target user;
and acquiring the authority of accessing a preset interface of the resource server based on the token, accessing the preset interface and acquiring the preset resource based on the identity, wherein the preset resource is stored under the preset interface.
7. A computer-readable storage medium storing one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to:
sending an authorization request to a target user through a public service number registered in a preset social application in advance, wherein the authorization request is used for requesting to acquire the access authority of a preset resource of the target user, the preset resource is stored in a resource server of the preset social application, the target user is a non-responsible party in a traffic accident, the preset resource is certificate information required to be submitted to a network service platform of an insurance company by the target user, and the target user is a registered user of the social application;
receiving an authorization certificate fed back after the target user confirms that the authority is granted;
applying for obtaining authorization information of the preset resource to an authentication server of the preset social application based on the authorization voucher, wherein the authorization information comprises a token and an identity of the target user;
and acquiring the authority of accessing a preset interface of the resource server based on the token, accessing the preset interface and acquiring the preset resource based on the identity, wherein the preset resource is stored under the preset interface.
8. An electronic device, comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving an authorization information application request sent by a third-party application, wherein the authorization information application request carries an authorization certificate, the authorization certificate is a certificate for a target user to confirm that the third-party application has an access right of a preset resource of the target user, the third-party application is a network service platform of an insurance company, the target user is a party without responsibility in a traffic accident, the preset resource is certificate information needing the target user to submit to the network service platform, the certificate is fed back after the target user receives the authorization request of the third-party application, and the authorization request is sent to the target user by the third-party application through a public service number registered in the preset social application in advance;
feeding back authorization information for acquiring the preset resource to the third-party application, wherein the authorization information comprises a token and an identity of the target user;
receiving a resource acquisition request sent by the third-party application, wherein the resource acquisition request carries the token and the identity;
opening the access right of a preset interface of the resource server to the third-party application based on the token, wherein the preset resource is stored under the preset interface; opening the authority for accessing the preset resource under the preset interface to the third-party application based on the identity; and feeding back the preset resource to the third party application through the preset interface.
9. A computer-readable storage medium storing one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to:
receiving an authorization information application request sent by a third-party application, wherein the authorization information application request carries an authorization certificate, the authorization certificate is a certificate for a target user to confirm that the third-party application has an access right of a preset resource of the target user, the third-party application is a network service platform of an insurance company, the target user is a party without responsibility in a traffic accident, the preset resource is certificate information needing the target user to submit to the network service platform, the certificate is fed back after the target user receives the authorization request of the third-party application, and the authorization request is sent to the target user by the third-party application through a public service number registered in the preset social application in advance;
feeding back authorization information for acquiring the preset resource to the third-party application, wherein the authorization information comprises a token and an identity of the target user;
receiving a resource acquisition request sent by the third-party application, wherein the resource acquisition request carries the token and the identity;
opening the access right of a preset interface of the resource server to the third-party application based on the token, wherein the preset resource is stored under the preset interface; opening the authority for accessing the preset resource under the preset interface to the third-party application based on the identity; and feeding back the preset resource to the third party application through the preset interface.
CN201811015333.6A 2018-08-31 2018-08-31 Method and device for acquiring and feeding back user resources and electronic equipment Active CN109033774B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201811015333.6A CN109033774B (en) 2018-08-31 2018-08-31 Method and device for acquiring and feeding back user resources and electronic equipment
TW108122339A TWI704470B (en) 2018-08-31 2019-06-26 Method, device and electronic equipment for acquiring and returning user resources
PCT/CN2019/096267 WO2020042791A1 (en) 2018-08-31 2019-07-17 Method and device for acquiring and feeding back user resource, and electronic apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811015333.6A CN109033774B (en) 2018-08-31 2018-08-31 Method and device for acquiring and feeding back user resources and electronic equipment

Publications (2)

Publication Number Publication Date
CN109033774A CN109033774A (en) 2018-12-18
CN109033774B true CN109033774B (en) 2020-08-07

Family

ID=64623310

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811015333.6A Active CN109033774B (en) 2018-08-31 2018-08-31 Method and device for acquiring and feeding back user resources and electronic equipment

Country Status (3)

Country Link
CN (1) CN109033774B (en)
TW (1) TWI704470B (en)
WO (1) WO2020042791A1 (en)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109033774B (en) * 2018-08-31 2020-08-07 阿里巴巴集团控股有限公司 Method and device for acquiring and feeding back user resources and electronic equipment
CN109976914A (en) * 2019-04-01 2019-07-05 北京百度网讯科技有限公司 Method and apparatus for controlling resource access
CN111861611B (en) * 2019-05-19 2024-05-28 北京骑胜科技有限公司 Resource processing method and device based on block chain, electronic equipment and storage medium
CN110348195A (en) * 2019-05-24 2019-10-18 深圳壹账通智能科技有限公司 Data certificate authority method, apparatus, computer equipment and storage medium
CN112016065B (en) * 2019-05-31 2023-10-10 杭州海康威视数字技术股份有限公司 Dual-user authentication method and device
WO2021003751A1 (en) * 2019-07-11 2021-01-14 深圳市鹰硕技术有限公司 Single-account multi-identity login method and apparatus, server, and storage medium
CN111327582B (en) * 2019-08-22 2022-12-20 刘高峰 Authorization method, device and system based on OAuth protocol
CN111064708B (en) * 2019-11-25 2022-05-17 北京秒针人工智能科技有限公司 Authorization authentication method and device and electronic equipment
CN111159693B (en) * 2019-12-28 2022-11-29 西安精雕软件科技有限公司 Electronic equipment permission verification method, device and system and readable medium
CN111241555B (en) * 2019-12-30 2022-07-12 北京顺达同行科技有限公司 Access method and device for simulating user login, computer equipment and storage medium
CN111222973B (en) * 2020-01-03 2023-02-10 深圳市思凯科技开发有限公司 Information processing system and method
CN111294515B (en) * 2020-02-25 2021-07-16 维沃软件技术有限公司 Image acquisition method and first electronic device
CN113328971B (en) * 2020-02-28 2023-07-11 中国移动通信集团福建有限公司 Access resource authentication method and device and electronic equipment
CN111639319B (en) * 2020-06-02 2023-04-25 抖音视界有限公司 User resource authorization method, device and computer readable storage medium
CN111753291B (en) * 2020-06-18 2023-03-10 支付宝(杭州)信息技术有限公司 Application container creating method, device and equipment
CN111814186B (en) * 2020-07-13 2021-03-16 四川虹魔方网络科技有限公司 Menu authority access control method of intelligent equipment operation platform
CN112084527B (en) * 2020-08-18 2024-06-18 中国银联股份有限公司 Data storage and acquisition method, device, equipment and medium
CN112085419A (en) * 2020-09-25 2020-12-15 中国建设银行股份有限公司 Resource acquisition method, device and equipment
CN112241544B (en) * 2020-10-27 2023-10-31 北京百家科技集团有限公司 Service system, access method, access device, computer equipment and storage medium
CN113312653A (en) * 2021-06-25 2021-08-27 中国农业银行股份有限公司 Open platform authentication and authorization method, device and storage medium
CN113743882A (en) * 2021-08-02 2021-12-03 深圳兆日科技股份有限公司 Resource management method, device, equipment and storage medium
CN113382024B (en) * 2021-08-12 2021-12-21 阿里云计算有限公司 Rotation method of credential, computing device and storage medium
CN114546316A (en) * 2022-02-18 2022-05-27 阿里巴巴(中国)有限公司 Information processing method, device, equipment and storage medium based on interactive whiteboard
CN114666126B (en) * 2022-03-21 2024-06-07 阿里云计算有限公司 Resource management method, device, server and system
CN114978673B (en) * 2022-05-19 2023-07-04 中国联合网络通信集团有限公司 User authority authentication method and device, electronic equipment and storage medium
CN114978551B (en) * 2022-06-14 2024-02-06 中国电信股份有限公司 Access token issuing method, access token obtaining method, access token issuing device, access token obtaining system, access token issuing equipment and access token issuing medium
CN115118697B (en) * 2022-06-27 2024-04-26 北京爱奇艺科技有限公司 Method and device for activating resource access rights
CN116702100B (en) * 2022-10-21 2024-04-16 荣耀终端有限公司 Authority management method and electronic equipment

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638473A (en) * 2012-05-04 2012-08-15 盛趣信息技术(上海)有限公司 User data authorization method, device and system
CN102938757A (en) * 2011-08-15 2013-02-20 中兴通讯股份有限公司 Method for sharing user data in network and identity provider
CN103220261A (en) * 2012-01-21 2013-07-24 华为技术有限公司 Proxy method, device and system of open authentication application program interface
CN103327100A (en) * 2013-06-21 2013-09-25 华为技术有限公司 Resource processing method and site server
EP2765529A1 (en) * 2013-02-12 2014-08-13 Canon Europa N.V. A method of authenticating a user of a peripheral apparatus, a peripheral apparatus, and a system for authenticating a user of a peripheral apparatus
CN104144158A (en) * 2013-05-08 2014-11-12 国际商业机器公司 Policy-based automated consent method and device
CN104869102A (en) * 2014-02-24 2015-08-26 腾讯科技(北京)有限公司 Authorization method, device and system based on xAuth protocols
EP2925037A1 (en) * 2014-03-28 2015-09-30 Nxp B.V. NFC-based authorization of access to data from a third party device
CN105207974A (en) * 2014-06-18 2015-12-30 中国电信股份有限公司 Method for realizing user resource differentiated openness, platform, application and system
CN105681259A (en) * 2014-11-20 2016-06-15 中兴通讯股份有限公司 Open authorization method and apparatus and open platform
CN106230838A (en) * 2016-08-04 2016-12-14 中国银联股份有限公司 A kind of third-party application accesses the method and apparatus of resource
CN106295394A (en) * 2016-07-22 2017-01-04 飞天诚信科技股份有限公司 Resource authorization method and system and authorization server and method of work
CN108011862A (en) * 2016-10-31 2018-05-08 中兴通讯股份有限公司 The mandate of mirror image warehouse, access, management method and server and client side

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9532222B2 (en) * 2010-03-03 2016-12-27 Duo Security, Inc. System and method of notifying mobile devices to complete transactions after additional agent verification
CN102546534A (en) * 2010-12-15 2012-07-04 上海杉达学院 Auto-distributive system for access permissions
CN103220344B (en) * 2013-03-29 2016-08-31 新浪技术(中国)有限公司 Microblogging licenses method and system
CN104869175B (en) * 2015-06-16 2018-07-27 腾讯科技(北京)有限公司 Cross-platform account resource-sharing implementation method, apparatus and system
CN106330813A (en) * 2015-06-16 2017-01-11 华为技术有限公司 Method, device and system for processing authorization
CN106341234B (en) * 2015-07-17 2020-09-11 华为技术有限公司 Authorization method and device
TWI620087B (en) * 2017-02-15 2018-04-01 財團法人資訊工業策進會 Authorization server, authorization method and computer program product thereof
CN109033774B (en) * 2018-08-31 2020-08-07 阿里巴巴集团控股有限公司 Method and device for acquiring and feeding back user resources and electronic equipment

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102938757A (en) * 2011-08-15 2013-02-20 中兴通讯股份有限公司 Method for sharing user data in network and identity provider
CN103220261A (en) * 2012-01-21 2013-07-24 华为技术有限公司 Proxy method, device and system of open authentication application program interface
CN102638473A (en) * 2012-05-04 2012-08-15 盛趣信息技术(上海)有限公司 User data authorization method, device and system
EP2765529A1 (en) * 2013-02-12 2014-08-13 Canon Europa N.V. A method of authenticating a user of a peripheral apparatus, a peripheral apparatus, and a system for authenticating a user of a peripheral apparatus
CN104144158A (en) * 2013-05-08 2014-11-12 国际商业机器公司 Policy-based automated consent method and device
CN103327100A (en) * 2013-06-21 2013-09-25 华为技术有限公司 Resource processing method and site server
CN104869102A (en) * 2014-02-24 2015-08-26 腾讯科技(北京)有限公司 Authorization method, device and system based on xAuth protocols
EP2925037A1 (en) * 2014-03-28 2015-09-30 Nxp B.V. NFC-based authorization of access to data from a third party device
CN105207974A (en) * 2014-06-18 2015-12-30 中国电信股份有限公司 Method for realizing user resource differentiated openness, platform, application and system
CN105681259A (en) * 2014-11-20 2016-06-15 中兴通讯股份有限公司 Open authorization method and apparatus and open platform
CN106295394A (en) * 2016-07-22 2017-01-04 飞天诚信科技股份有限公司 Resource authorization method and system and authorization server and method of work
CN106230838A (en) * 2016-08-04 2016-12-14 中国银联股份有限公司 A kind of third-party application accesses the method and apparatus of resource
CN108011862A (en) * 2016-10-31 2018-05-08 中兴通讯股份有限公司 The mandate of mirror image warehouse, access, management method and server and client side

Also Published As

Publication number Publication date
WO2020042791A1 (en) 2020-03-05
CN109033774A (en) 2018-12-18
TW202011244A (en) 2020-03-16
TWI704470B (en) 2020-09-11

Similar Documents

Publication Publication Date Title
CN109033774B (en) Method and device for acquiring and feeding back user resources and electronic equipment
CN111401902B (en) Service processing method, device and equipment based on block chain
CN112333198B (en) Secure cross-domain login method, system and server
US10848310B2 (en) Method and device for identifying user identity
CN111191268A (en) Storage method, device and equipment capable of verifying statement
CN111324875A (en) User data operation authority control and account management method, device and system
US20180212954A1 (en) Information registration and authentication method and device
CN111639308A (en) Software serial number distribution verification method and device based on block chain
CN113259910B (en) Activation method and device for vehicle-mounted networking equipment
CN113704734A (en) Distributed digital identity-based method for realizing certificate verification and related device
CN111062057B (en) Neutral data application method, device and system
CN111355583B (en) Service providing system, method, device, electronic equipment and storage medium
CN112734349A (en) Interface generation method, data calling method, device and electronic equipment
CN112131545B (en) Method, device and equipment for processing voice authorization and voice related service
CN113065120B (en) Interface calling authentication method and device, electronic equipment and readable storage medium
CN113420284B (en) Login and user login related service processing method, device and equipment
CN114579951A (en) Service access method, electronic device and storage medium
CN113761503A (en) Interface call processing method and device
CN112989401A (en) Authority management method and device, electronic equipment and storage medium
CN111444483A (en) Authentication method, device and equipment
CN110648123A (en) Digital asset construction method and device and electronic equipment
CN116527708B (en) Data processing method, equipment and medium for rural treatment digital platform
CN115204872A (en) Interaction method based on block chain, block chain and interaction system
CN115987558A (en) Request processing method and system
CN116260852A (en) Calling method, equipment and medium for third party service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.