CN109190352A - A kind of authorization text Accuracy Verification method and apparatus - Google Patents

A kind of authorization text Accuracy Verification method and apparatus Download PDF

Info

Publication number
CN109190352A
CN109190352A CN201810716237.8A CN201810716237A CN109190352A CN 109190352 A CN109190352 A CN 109190352A CN 201810716237 A CN201810716237 A CN 201810716237A CN 109190352 A CN109190352 A CN 109190352A
Authority
CN
China
Prior art keywords
party
service
user
text
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810716237.8A
Other languages
Chinese (zh)
Other versions
CN109190352B (en
Inventor
郑鸿咚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810716237.8A priority Critical patent/CN109190352B/en
Publication of CN109190352A publication Critical patent/CN109190352A/en
Application granted granted Critical
Publication of CN109190352B publication Critical patent/CN109190352B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/30Semantic analysis

Abstract

This specification provides a kind of authorization text Accuracy Verification method and apparatus, the third party's service applied to request user information authorization.First obtain authorization text to be verified, semantic analysis is carried out to the authorization text to be verified, determine user identifier, third party's service mark and the user information for being provided to third party's service for including in the authorization text to be verified, it is retrieved in the information output record generated after authorizing successfully according to the user identifier and third party's service mark, determines the actual user's information exported to third party's service;It compares in the authorization text to be verified and is provided to the user information of third party's service, with the actual user's information exported to third party's service, the accuracy of authorization text is determined according to comparing result.

Description

A kind of authorization text Accuracy Verification method and apparatus
Technical field
This specification is related to internet area more particularly to a kind of authorization text Accuracy Verification method and apparatus.
Background technique
Platform can be serviced to third party's service by related API, SDK etc. and provide user information, so that user uses the The related service of tripartite's service.To ensure user's right, during user information is supplied to third party's service, need straight It connects or the authorization of indirect gain user.Specifically, it is desirable that provided in information process to third party, it is necessary to list authorization to user Content and authorization object, to obtain the express authorization of user.
Need to request the third party's service of authorization may include, mobile terminal application, small routine, web are applied etc., need to The user information that third party's service provides may include the client-side information of user, telephone number information, ID card information etc.. Since the user information for needing the third party's service authorized and needs to authorize is various, if requesting the text of authorization to occur to user When copy writing mistake or actual grant information change but official documents and correspondence does not timely update, traditional dependence manual inspection Authorize the mode of text is possibly can not timely discovery and modification.
Summary of the invention
In view of the above technical problems, this specification embodiment provides a kind of authorization text Accuracy Verification method and apparatus, Technical solution is as follows:
According to this specification embodiment in a first aspect, provide a kind of authorization text Accuracy Verification method, applied to asking The third party's service of user information authorization is sought, this method comprises:
Authorization text to be verified is obtained, when the authorization text to be verified is that third party's service requests to authorize to user, to User lists authorization message so that user carries out the text exhibition of Authorized operation;
Semantic analysis is carried out to the authorization text to be verified, determines the user's mark for including in the authorization text to be verified Knowledge, third party's service mark and the user information for being provided to third party's service;
In the information output record generated after authorizing successfully according to the user identifier and third party's service mark It is retrieved, determines the actual user's information exported to third party's service;
It compares in the authorization text to be verified and is provided to the user information of third party's service, and to third party's service Actual user's information of output determines the accuracy of authorization text according to comparing result.
According to the second aspect of this specification embodiment, a kind of authorization text Accuracy Verification device is provided, applied to asking The third party's service of user information authorization is sought, which includes:
Text obtains module: for obtaining authorization text to be verified, the authorization text to be verified for third party's service to When user requests authorization, authorization message is listed to user so that user carries out the text exhibition of Authorized operation;
Text analysis model: for carrying out semantic analysis to the authorization text to be verified, the authorization to be verified is determined User identifier, third party's service mark and the user information for being provided to third party's service for including in text;
Output obtains module: for being generated after authorizing successfully according to the user identifier and third party's service mark Information output record in retrieved, determine actual user's information for exporting to third party's service;
Transcription comparison's module: for comparing the user's letter for being provided to third party's service in the authorization text to be verified Breath determines the accuracy of authorization text according to comparing result with the actual user's information exported to third party's service.
According to the third aspect of this specification embodiment, a kind of computer equipment is provided, including memory, processor and deposit Store up the computer program that can be run on a memory and on a processor, wherein the processor is realized when executing described program A kind of authorization text Accuracy Verification method, the third party's service applied to request user information authorization, which comprises
Authorization text to be verified is obtained, when the authorization text to be verified is that third party's service requests to authorize to user, to User lists authorization message so that user carries out the text exhibition of Authorized operation;
Semantic analysis is carried out to the authorization text to be verified, determines the user's mark for including in the authorization text to be verified Knowledge, third party's service mark and the user information for being provided to third party's service;
In the information output record generated after authorizing successfully according to the user identifier and third party's service mark It is retrieved, determines the actual user's information exported to third party's service;
It compares in the authorization text to be verified and is provided to the user information of third party's service, and to third party's service Actual user's information of output determines the accuracy of authorization text according to comparing result.
Technical solution provided by this specification embodiment, the flow that platform generates when requesting and authorize to user by obtaining The practical user information exported to third-party application of message, the authorization content of text that true directional user shows, then monitoring platform, leads to The authorization content of text and the practical user information exported to third-party application that comparison is shown to user are crossed, verifies and is shown to user Authorization content of text whether there is mistake.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not This specification embodiment can be limited.
In addition, any embodiment in this specification embodiment does not need to reach above-mentioned whole effects.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only The some embodiments recorded in this specification embodiment for those of ordinary skill in the art can also be attached according to these Figure obtains other attached drawings.
Fig. 1 is a kind of flow chart of the authorization text Accuracy Verification method shown in one exemplary embodiment of this specification;
Fig. 2 is that the authorization text accuracy that third party's signing information is added shown in one exemplary embodiment of this specification is tested The flow chart of card method;
Fig. 3 is another process of the authorization text Accuracy Verification method shown in one exemplary embodiment of this specification Figure;
Fig. 4 is a kind of schematic diagram of the authorization text Accuracy Verification device shown in one exemplary embodiment of this specification;
Fig. 5 is a kind of structural schematic diagram of computer equipment shown in one exemplary embodiment of this specification.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with this specification.On the contrary, they are only and such as institute The example of the consistent device and method of some aspects be described in detail in attached claims, this specification.
It is only to be not intended to be limiting this explanation merely for for the purpose of describing particular embodiments in the term that this specification uses Book.The "an" of used singular, " described " and "the" are also intended to packet in this specification and in the appended claims Most forms are included, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein is Refer to and includes that one or more associated any or all of project listed may combine.
It will be appreciated that though various information may be described using term first, second, third, etc. in this specification, but These information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not taking off In the case where this specification range, the first information can also be referred to as the second information, and similarly, the second information can also be claimed For the first information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... " or " in response to determination ".
Platform can be serviced to third party's service by related API, SDK etc. and provide user information, so that user uses the The related service of tripartite's service.To ensure user's right, during user information is supplied to third party's service, need straight It connects or the authorization of indirect gain user.Specifically, it is desirable that provided in information process to third party, it is necessary to list authorization to user Content and authorization object, to obtain the express authorization of user.
The third party's service for needing to authorize may include, and mobile terminal application, small routine, web application etc. are needed to third The user information that side's service provides may include the client-side information of user, telephone number information, ID card information etc..Due to The third party's service for needing to authorize and the user information that needs authorize are various, if requesting the text of authorization official documents and correspondence occur to user It writes mistake or actual grant information changes but when official documents and correspondence does not timely update, traditional dependence manually checks authorization The mode of text is possibly can not timely discovery and modification.
In view of the above problems, this specification embodiment provides a kind of authorization text Accuracy Verification method and a kind of use In the risk rule generating means for executing this method.The method that this specification embodiment is mentioned is mainly used in request user information The third party's service of authorization, specifically, platform may include that ant gold takes open platform, sesame credit open platform etc..
The authorization text Accuracy Verification method that the present embodiment is related to is described in detail below, it is shown in Figure 1, it should Method may comprise steps of:
S101, obtains authorization text to be verified, and the authorization text to be verified is that third party's service requests to authorize to user When, authorization message is listed to user so that user carries out the text exhibition of Authorized operation;
Platform would generally gather a variety of third party's services to facilitate user to select and use, and user can pass through operating platform The interface for being supplied to third party's service so that use third party's service, such as: user platform interface click icon " doctor Treat ", third party's service interface, and then the diagnosis provided using third party can be provided, register and wait health services.
Still by taking third party's service " medical treatment " as an example, when user wants to use the third party's service, for example, when user wants to lead to When crossing third party's service progress " registering ", which needs to obtain the name of user, identification card number etc. by platform For information to complete the operation of registering, platform needs to request the authorization of user before providing these user informations, it is generally the case that It is that an authorization interface is shown to user, comprising listing authorization message to user so that user carries out the exhibition of Authorized operation in interface Show text.
Wherein, the mode for obtaining text exhibition can be with are as follows: the traffic messages generated when requesting and authorize to user is obtained, by institute It states the authorization text for including in traffic messages and is determined as authorization text to be verified.
Further, the traffic messages generated when requesting and authorize to user are obtained, are awarded include in the traffic messages Power text is determined as authorization text to be verified can be with are as follows: obtains the traffic messages generated when requesting and authorize to user, extraction is wherein The page of text for showing user is positioned in page of text according to preset keyword, to extract the text The authorization text is determined as authorization text to be verified by the authorization text for including in the page.
Authorization text usually has similar text formatting, even carries out writing, example according to preset text formatting Such as, the official documents and correspondence of authorization text beginning is usual are as follows: and " XX service needs to obtain following information ... ", according to similar in authorization text Vocabulary presets one or more keywords, and navigates to authorization text in all texts of page of text according to the keyword This.
Further, the traffic messages generated when requesting and authorize to user are obtained, the text for wherein showing user is extracted The mode of the page can be with are as follows: obtains the traffic messages generated when requesting and authorize to user, extracts and store crucial message therein; The crucial message is subjected to normalization processing, to obtain the page of text for wherein showing user.
Normalization processing is to arrange the message content of chaotic format, according to unified pattern output, so as to subsequent Carry out transcription comparison.
S102 carries out semantic analysis to the authorization text to be verified, determines in the authorization text to be verified and includes User identifier, third party's service mark and the user information for being provided to third party's service;
Wherein, user identifier at least may include the unique information that platform can be used for identifying the user, which can be Platform distributes to the id information of the user;Third party's service mark at least may include that platform can be used for identifying the third party's service Unique information, when third party's service mark can move into platform for third party's service, platform is generated and assigned to third party clothes The id information of business.
S103, the information output note generated after authorizing successfully according to the user identifier and third party's service mark It is retrieved in record, determines the actual user's information exported to third party's service;
S104 is compared in the authorization text to be verified and is provided to the user information of third party's service, and to third Actual user's information of side's service output, the accuracy of authorization text is determined according to comparing result.
If comparing result shows to be provided to the user information of third party's service in authorization text to be verified, and to the Actual user's information category that tripartite services output is identical, then can verify that authorization text accuracy is errorless, say if the two difference Bright authorization text accuracy is wrong.
The method that this specification provides can find rapidly the authorization text of description inaccuracy, and then correct authorization in time Text, and can be found in historical record according to the discovery time of inaccuracy authorization text with corresponding third party's service The user that the inaccuracy authorizes text was provided for it when request authorization, to provide the augmentation requests such as authorized to the user Etc. relevant treatments.
In order to further ensure the accuracy of verifying, in addition to being provided to third party's service in authorization text to be verified User information, and outside actual user's information for being exported to third party's service, can also add-on third party signing information tested jointly Card, third party's signing information is third party's service when moving into platform, the label relevant to third party's service that platform can save About information, the signing information are generally held in third party's signing table, wherein may include the title of third party's service, mark ID, classification, the user information etc. for needing to obtain.When the user information of third party's service demand changes, need to notify to put down Platform simultaneously modifies signing information.Such as: third party's service increases new service content after updating, in addition to obtaining original user's letter Breath is outer, increases the demand for obtaining station address information newly, needs to revise signing information at this time, is added believes about station address wherein The demand entry of breath.
With reference to attached drawing 2, for the flow chart that third party's signing information is added to authorization text Accuracy Verification method, this method It may comprise steps of:
S201 obtains the third party's signing table itself prestored, according to third party's service mark in third party's signing table In retrieved, to extract the signing record of the third party's service, include third party's service needs in signing record The user information of acquisition;
S202 compares third party's service in the signing record and needs the user information that obtains, and defeated to third party's service Whether actual user's information out, both verifyings are identical;
S203 compares the user information that third party's service needs to obtain in the signing record, with authorization text to be verified In be provided to the user information of third party's service, whether both verifyings identical.
This specification embodiment also provides a kind of more specifically authorization text Accuracy Verification method, shown in Figure 3, This method may comprise steps of:
S301 obtains the traffic messages generated when requesting and authorize to user, extracts and stores crucial message therein;
The crucial message is carried out normalization processing, to obtain the page of text for wherein showing user by S302;
S303 is positioned in page of text according to preset keyword, is wrapped with extracting in the page of text The authorization text is determined as authorization text to be verified by the authorization text contained;
S304 carries out semantic analysis to the authorization text to be verified, determines in the authorization text to be verified and includes User identifier, third party's service mark and the user information for being provided to third party's service;
S305, the information output note generated after authorizing successfully according to the user identifier and third party's service mark It is retrieved in record, determines the actual user's information exported to third party's service;
S306 is compared in the authorization text to be verified and is provided to the user information of third party's service, and to third Actual user's information of side's service output, the accuracy of authorization text is determined according to comparing result;
Corresponding to above method embodiment, this specification embodiment also provides a kind of risk rule generating means, referring to fig. 4 It is shown, the apparatus may include: text obtains module 410, similar computing module 420, network struction module 430, group's hair Existing module 440.
Text obtains module 410: for obtaining authorization text to be verified, the authorization text to be verified is third party's service When requesting to authorize to user, authorization message is listed to user so that user carries out the text exhibition of Authorized operation;
Text analysis model 420: for the authorization text to be verified progress semantic analysis, determining described to be verified award User identifier, third party's service mark and the user information for being provided to third party's service for including in power text;
Output obtains module 430: for being identified after authorizing successfully according to the user identifier and the third party's service It is retrieved in the information output record of generation, determines the actual user's information exported to third party's service;
Transcription comparison's module 440: for comparing the use for being provided to third party's service in the authorization text to be verified Family information determines the accuracy of authorization text according to comparing result with the actual user's information exported to third party's service.
This specification embodiment also provides a kind of computer equipment, includes at least memory, processor and is stored in On reservoir and the computer program that can run on a processor, wherein processor realizes that aforementioned authorization is literary when executing described program This Accuracy Verification method, the method include at least:
Authorization text to be verified is obtained, when the authorization text to be verified is that third party's service requests to authorize to user, to User lists authorization message so that user carries out the text exhibition of Authorized operation;
Semantic analysis is carried out to the authorization text to be verified, determines the user's mark for including in the authorization text to be verified Knowledge, third party's service mark and the user information for being provided to third party's service;
In the information output record generated after authorizing successfully according to the user identifier and third party's service mark It is retrieved, determines the actual user's information exported to third party's service;
It compares in the authorization text to be verified and is provided to the user information of third party's service, and to third party's service Actual user's information of output determines the accuracy of authorization text according to comparing result.
Fig. 5 shows one kind provided by this specification embodiment and more specifically calculates device hardware structural schematic diagram, The equipment may include: processor 1010, memory 1020, input/output interface 1030, communication interface 1040 and bus 1050.Wherein processor 1010, memory 1020, input/output interface 1030 and communication interface 1040 are real by bus 1050 The now communication connection inside equipment each other.
Processor 1010 can use general CPU (Central Processing Unit, central processing unit), micro- place Reason device, application specific integrated circuit (Application Specific Integrated Circuit, ASIC) or one Or the modes such as multiple integrated circuits are realized, for executing relative program, to realize technical side provided by this specification embodiment Case.
Memory 1020 can use ROM (Read Only Memory, read-only memory), RAM (Random Access Memory, random access memory), static storage device, the forms such as dynamic memory realize.Memory 1020 can store Operating system and other applications are realizing technical solution provided by this specification embodiment by software or firmware When, relevant program code is stored in memory 1020, and execution is called by processor 1010.
Input/output interface 1030 is for connecting input/output module, to realize information input and output.Input and output/ Module can be used as component Configuration (not shown) in a device, can also be external in equipment to provide corresponding function.Wherein Input equipment may include keyboard, mouse, touch screen, microphone, various kinds of sensors etc., output equipment may include display, Loudspeaker, vibrator, indicator light etc..
Communication interface 1040 is used for connection communication module (not shown), to realize the communication of this equipment and other equipment Interaction.Wherein communication module can be realized by wired mode (such as USB, cable etc.) and be communicated, can also be wirelessly (such as mobile network, WIFI, bluetooth etc.) realizes communication.
Bus 1050 include an access, equipment various components (such as processor 1010, memory 1020, input/it is defeated Outgoing interface 1030 and communication interface 1040) between transmit information.
It should be noted that although above equipment illustrates only processor 1010, memory 1020, input/output interface 1030, communication interface 1040 and bus 1050, but in the specific implementation process, which can also include realizing normal fortune Other assemblies necessary to row.In addition, it will be appreciated by those skilled in the art that, it can also be only comprising real in above equipment Component necessary to existing this specification example scheme, without including all components shown in figure.
This specification embodiment also provides a kind of computer readable storage medium, is stored thereon with computer program, the journey Realize that authorization text Accuracy Verification method above-mentioned, the method include at least when sequence is executed by processor:
Authorization text to be verified is obtained, when the authorization text to be verified is that third party's service requests to authorize to user, to User lists authorization message so that user carries out the text exhibition of Authorized operation;
Semantic analysis is carried out to the authorization text to be verified, determines the user's mark for including in the authorization text to be verified Knowledge, third party's service mark and the user information for being provided to third party's service;
In the information output record generated after authorizing successfully according to the user identifier and third party's service mark It is retrieved, determines the actual user's information exported to third party's service;
It compares in the authorization text to be verified and is provided to the user information of third party's service, and to third party's service Actual user's information of output determines the accuracy of authorization text according to comparing result.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitorymedia), such as the data-signal and carrier wave of modulation.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual The purpose for needing to select some or all of the modules therein to realize this specification scheme.Those of ordinary skill in the art are not In the case where making the creative labor, it can understand and implement.
As seen through the above description of the embodiments, those skilled in the art can be understood that this specification Embodiment can be realized by means of software and necessary general hardware platform.Based on this understanding, this specification is implemented Substantially the part that contributes to existing technology can be embodied the technical solution of example in the form of software service in other words, The computer software service can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are to make It is each to obtain computer equipment (can be personal computer, server or the network equipment etc.) execution this specification embodiment Method described in certain parts of a embodiment or embodiment.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the service with certain function.A kind of typically to realize that equipment is computer, the concrete form of computer can To be personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play In device, navigation equipment, E-mail receiver/send equipment, game console, tablet computer, wearable device or these equipment The combination of any several equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device reality For applying example, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to embodiment of the method Part explanation.The apparatus embodiments described above are merely exemplary, wherein described be used as separate part description Module may or may not be physically separated, can be each module when implementing this specification example scheme Function realize in the same or multiple software and or hardware.Can also select according to the actual needs part therein or Person's whole module achieves the purpose of the solution of this embodiment.Those of ordinary skill in the art are not the case where making the creative labor Under, it can it understands and implements.
The above is only the specific embodiment of this specification embodiment, it is noted that for the general of the art For logical technical staff, under the premise of not departing from this specification embodiment principle, several improvements and modifications can also be made, this A little improvements and modifications also should be regarded as the protection scope of this specification embodiment.

Claims (13)

1. a kind of authorization text Accuracy Verification method, applied to the third party's service of request user information authorization, the method Include:
Authorization text to be verified is obtained, when the authorization text to be verified is that third party's service requests to authorize to user, to user Authorization message is listed so that user carries out the text exhibition of Authorized operation;
Semantic analysis is carried out to the authorization text to be verified, determine the user identifier for including in the authorization text to be verified, Third party's service identifies and is provided to the user information of third party's service;
It is carried out in the information output record generated after authorizing successfully according to the user identifier and third party's service mark Retrieval determines the actual user's information exported to third party's service;
The user information for being provided to third party's service in the authorization text to be verified is compared, is exported with to third party's service Actual user's information, according to comparing result determine authorization text accuracy.
2. the method as described in claim 1, described to obtain authorization text to be verified, comprising:
Obtain the traffic messages that generate when requesting to authorize to user, by the authorization text for including in the traffic messages be determined as to Verifying authorization text.
3. method according to claim 2, described to obtain the traffic messages generated when requesting and authorize to user, by the flow The authorization text for including in message is determined as authorization text to be verified, comprising:
The traffic messages generated when requesting and authorize to user are obtained, the page of text for wherein showing user is extracted;
It is positioned in page of text according to preset keyword, to extract the authorization for including in page of text text This, is determined as authorization text to be verified for the authorization text.
4. method as claimed in claim 3, described to obtain the traffic messages generated when requesting and authorize to user, extraction is wherein opened up Show to the page of text of user, comprising:
The traffic messages generated when requesting and authorize to user are obtained, extract and store crucial message therein;
The crucial message is subjected to normalization processing, to obtain the page of text for wherein showing user.
5. the method as described in claim 1, after actual user's information that the determination is exported to third party's service, further includes:
The third party's signing table itself prestored is obtained, is examined in third party's signing table according to third party's service mark Rope, to extract the signing record of the third party's service, the use for needing to obtain comprising third party's service in the signing record Family information;
The user information that third party's service needs to obtain in the signing record is compared, with the practical use exported to third party's service Whether family information, both verifyings are identical.
6. the method as described in claim 1, after actual user's information that the determination is exported to third party's service, further includes:
The third party's signing table itself prestored is obtained, is examined in third party's signing table according to third party's service mark Rope, to extract the signing record of the third party's service, the use for needing to obtain comprising third party's service in the signing record Family information;
It compares third party's service in the signing record and needs the user information that obtains, and need to provide in authorization text to be verified To the user information of third party's service, whether both verifyings are identical.
7. a kind of authorization text Accuracy Verification device, applied to the third party's service of request user information authorization, described device Include:
Text obtains module: for obtaining authorization text to be verified, the authorization text to be verified is third party's service to user When request authorization, authorization message is listed to user so that user carries out the text exhibition of Authorized operation;
Text analysis model: for carrying out semantic analysis to the authorization text to be verified, the authorization text to be verified is determined In include user identifier, third party's service mark be provided to the user information of third party's service;
Output obtains module: for identifying the letter generated after authorizing successfully according to the user identifier and the third party's service It is retrieved in breath output record, determines the actual user's information exported to third party's service;
Transcription comparison's module: for comparing the user information for being provided to third party's service in the authorization text to be verified, With the actual user's information exported to third party's service, the accuracy of authorization text is determined according to comparing result.
8. device as claimed in claim 6, described to obtain authorization text to be verified, comprising:
Obtain the traffic messages that generate when requesting to authorize to user, by the authorization text for including in the traffic messages be determined as to Verifying authorization text.
9. device as claimed in claim 8, described to obtain the traffic messages generated when requesting and authorize to user, by the flow The authorization text for including in message is determined as authorization text to be verified, comprising:
The traffic messages generated when requesting and authorize to user are obtained, the page of text for wherein showing user is extracted;
It is positioned in page of text according to preset keyword, to extract the authorization for including in page of text text This, is determined as authorization text to be verified for the authorization text.
10. device as claimed in claim 9, described to obtain the traffic messages generated when requesting and authorize to user, extract wherein Show the page of text of user, comprising:
The traffic messages generated when requesting and authorize to user are obtained, extract and store crucial message therein;
The crucial message is subjected to normalization processing, to obtain the page of text for wherein showing user.
11. device as claimed in claim 6, after actual user's information that the determination is exported to third party's service, further includes:
The third party's signing table itself prestored is obtained, is examined in third party's signing table according to third party's service mark Rope, to extract the signing record of the third party's service, the use for needing to obtain comprising third party's service in the signing record Family information;
The user information that third party's service needs to obtain in the signing record is compared, with the practical use exported to third party's service Whether family information, both verifyings are identical.
12. device as claimed in claim 6, after actual user's information that the determination is exported to third party's service, further includes:
The third party's signing table itself prestored is obtained, is examined in third party's signing table according to third party's service mark Rope, to extract the signing record of the third party's service, the use for needing to obtain comprising third party's service in the signing record Family information;
It compares third party's service in the signing record and needs the user information that obtains, and need to provide in authorization text to be verified To the user information of third party's service, whether both verifyings are identical.
13. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, wherein the processor realizes the method as described in claim 1 when executing described program.
CN201810716237.8A 2018-07-03 2018-07-03 Method and device for verifying accuracy of authorization text Active CN109190352B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810716237.8A CN109190352B (en) 2018-07-03 2018-07-03 Method and device for verifying accuracy of authorization text

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810716237.8A CN109190352B (en) 2018-07-03 2018-07-03 Method and device for verifying accuracy of authorization text

Publications (2)

Publication Number Publication Date
CN109190352A true CN109190352A (en) 2019-01-11
CN109190352B CN109190352B (en) 2022-05-17

Family

ID=64948847

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810716237.8A Active CN109190352B (en) 2018-07-03 2018-07-03 Method and device for verifying accuracy of authorization text

Country Status (1)

Country Link
CN (1) CN109190352B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112862590A (en) * 2021-01-15 2021-05-28 中国建设银行股份有限公司上海市分行 Business authorization method, computing device and medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196012A (en) * 2010-03-17 2011-09-21 华为技术有限公司 Service opening method, system and service opening server
CN102664933A (en) * 2012-04-06 2012-09-12 中国联合网络通信集团有限公司 User authorization method, application terminal, open platform and system
CN102821085A (en) * 2011-11-23 2012-12-12 腾讯科技(深圳)有限公司 Third party authorization login method, open platform and system
CN103139178A (en) * 2011-12-01 2013-06-05 腾讯数码(天津)有限公司 Validation method and device of internet open platform data request interface
CN105871786A (en) * 2015-01-22 2016-08-17 阿里巴巴集团控股有限公司 User information authentication method, device and system
CN105897668A (en) * 2015-10-22 2016-08-24 乐视致新电子科技(天津)有限公司 Third party account authorization method, device, server and system
CN105991614A (en) * 2015-03-03 2016-10-05 阿里巴巴集团控股有限公司 Open authorization, resource access method and device, and a server
US20170019402A1 (en) * 2015-07-16 2017-01-19 Avaya Inc. Authorization Activation
CN106534072A (en) * 2016-10-13 2017-03-22 腾讯科技(深圳)有限公司 User information authorization method, apparatus, equipment and system
CN106899546A (en) * 2015-12-17 2017-06-27 阿里巴巴集团控股有限公司 The acquisition methods and device of user profile
CN106953831A (en) * 2016-01-06 2017-07-14 阿里巴巴集团控股有限公司 A kind of authorization method of user resources, apparatus and system
CN107231335A (en) * 2016-03-24 2017-10-03 阿里巴巴集团控股有限公司 A kind of method for processing business and device
US9853959B1 (en) * 2012-05-07 2017-12-26 Consumerinfo.Com, Inc. Storage and maintenance of personal data
CN107786571A (en) * 2017-11-07 2018-03-09 昆山云景商务服务有限公司 A kind of method of user's unified certification

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196012A (en) * 2010-03-17 2011-09-21 华为技术有限公司 Service opening method, system and service opening server
CN102821085A (en) * 2011-11-23 2012-12-12 腾讯科技(深圳)有限公司 Third party authorization login method, open platform and system
CN103139178A (en) * 2011-12-01 2013-06-05 腾讯数码(天津)有限公司 Validation method and device of internet open platform data request interface
CN102664933A (en) * 2012-04-06 2012-09-12 中国联合网络通信集团有限公司 User authorization method, application terminal, open platform and system
US9853959B1 (en) * 2012-05-07 2017-12-26 Consumerinfo.Com, Inc. Storage and maintenance of personal data
CN105871786A (en) * 2015-01-22 2016-08-17 阿里巴巴集团控股有限公司 User information authentication method, device and system
CN105991614A (en) * 2015-03-03 2016-10-05 阿里巴巴集团控股有限公司 Open authorization, resource access method and device, and a server
US20170019402A1 (en) * 2015-07-16 2017-01-19 Avaya Inc. Authorization Activation
CN105897668A (en) * 2015-10-22 2016-08-24 乐视致新电子科技(天津)有限公司 Third party account authorization method, device, server and system
CN106899546A (en) * 2015-12-17 2017-06-27 阿里巴巴集团控股有限公司 The acquisition methods and device of user profile
CN106953831A (en) * 2016-01-06 2017-07-14 阿里巴巴集团控股有限公司 A kind of authorization method of user resources, apparatus and system
CN107231335A (en) * 2016-03-24 2017-10-03 阿里巴巴集团控股有限公司 A kind of method for processing business and device
CN106534072A (en) * 2016-10-13 2017-03-22 腾讯科技(深圳)有限公司 User information authorization method, apparatus, equipment and system
CN107786571A (en) * 2017-11-07 2018-03-09 昆山云景商务服务有限公司 A kind of method of user's unified certification

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
L.FERRETTI等: ""Verifiable Delegated Authorization for User-Centric Architectures and an OAuth2 Implementation,"", 《2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC)》 *
夏盛新: ""基于Android的移动开放平台SDK的设计与实现"", 《中国优秀硕士学位论文全文数据库信息科技辑》 *
李梁磊 等: ""基于U2F与OAuth的认证授权方案研究"", 《保密科学技术》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112862590A (en) * 2021-01-15 2021-05-28 中国建设银行股份有限公司上海市分行 Business authorization method, computing device and medium

Also Published As

Publication number Publication date
CN109190352B (en) 2022-05-17

Similar Documents

Publication Publication Date Title
US10372938B2 (en) Resource protection using tokenized information
CN104572278B (en) The method, device and equipment of light application calling local side ability
US11586772B2 (en) Method and device for displaying information
CN113268336B (en) Service acquisition method, device, equipment and readable medium
KR20150064063A (en) Secure identification of computing device and secure identification methods
WO2021203919A1 (en) Method and apparatus for evaluating joint training model
CN109408250A (en) Call application programming interface API approach, device, electronic equipment
CN107729246A (en) For the auxiliary test methods of intended application, device, equipment and storage medium
CN110659206A (en) Simulation architecture establishing method, device, medium and electronic equipment based on microservice
CN109255035A (en) Method and apparatus for constructing knowledge mapping
CN105993156A (en) Server access authentication method and device
CN106465113A (en) Venue-specific wi-fi connectivity notifications
CN109344572A (en) The Licensing Methods and system of distributed objects
CN107203372A (en) Control shows method and device
CN109145530A (en) Online document automatic authorization method, apparatus and electronic equipment
CN110119386A (en) Data processing method, data processing equipment, medium and calculating equipment
CN106384255A (en) Method and device for creating information code promotion information
CN108763881A (en) Method and apparatus for controlling user right
CN109213468A (en) A kind of speech playing method and device
US20230281695A1 (en) Determining and presenting information related to a semantic context of electronic message text or voice data
CN113742005A (en) Platform docking method and device
CN109190352A (en) A kind of authorization text Accuracy Verification method and apparatus
CN109635558A (en) Access control method, device and system
CN109840072A (en) Information processing method and device
CN108667647A (en) A kind of setting method of device parameter, equipment and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant