CN109302376A - A kind of raw code method of account, account authorization method and account code taking method - Google Patents

A kind of raw code method of account, account authorization method and account code taking method Download PDF

Info

Publication number
CN109302376A
CN109302376A CN201810485264.9A CN201810485264A CN109302376A CN 109302376 A CN109302376 A CN 109302376A CN 201810485264 A CN201810485264 A CN 201810485264A CN 109302376 A CN109302376 A CN 109302376A
Authority
CN
China
Prior art keywords
account
code
information
authorization
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810485264.9A
Other languages
Chinese (zh)
Other versions
CN109302376B (en
Inventor
顾惠波
岳晓兰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Oracle Polytron Technologies Inc
Original Assignee
Zhejiang Oracle Polytron Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Oracle Polytron Technologies Inc filed Critical Zhejiang Oracle Polytron Technologies Inc
Publication of CN109302376A publication Critical patent/CN109302376A/en
Application granted granted Critical
Publication of CN109302376B publication Critical patent/CN109302376B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Power Engineering (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of first accounts to the method for the second account authorization, it is characterized in that, applied to server, the method includes the steps: S1: the first account application ID, the first account interface ID and the first account code system ID confirmed according to the first account client, the raw code information of the first account is generated, and batch table is written into the raw code information of first account;S2: receiving the second account authorization information that the first account client is sent, and second account authorization information includes at least the second account ID, the second account request code fetch range information and the second account authority information;S3: checking that the own code of the second account generates whether structure with the code of the second account request code fetch generates structure matching, will be in second account authorization information write-in batch table if matching.The beneficial effects of the present invention are: the authority setting that (1) operates different accounts to code is clear;(2) account without corresponding authority is avoided excessively to authorize.

Description

A kind of raw code method of account, account authorization method and account code taking method
Technical field
It traces to the source field the present invention relates to data, is specifically related to a kind of raw code method of account, account authorization method and account Family code taking method.
Background technique
Open platform discloses application programming interface (API) or function (function) by software systems, will service It is packaged into series of computation machine data-interface easy to identify, i.e. open application programming interfaces (OpenAPI), is answered for third party With calling, allow external third party application by Open API, increase the software system function or uses the software The resource of system.
With the rise of internet and open platform, the phenomenon that multiple applications based on same open platform, is increasingly general Time, but the access right setting wherein applied is very fuzzy, and necessary confidential information between applying is caused to have the possibility of leakage.Example Such as, printing house's account is downloaded code by application, but due to not having to carry out permission control, code weight limit is licensed to it by printing house Other people, cause a yard leakage of information to cause very big loss.Based on this defect, the present invention proposes logical by the relationship between account and code Cross the method for carrying out code control using application.
Summary of the invention
It is an object of the present invention to provide a kind of raw code method of account, account authorization method and account code fetch sides Method, so that the authority setting that different accounts operate code is clear.
Specifically, the present invention is achieved through the following technical solutions:
A kind of first account is applied to server to the method for the second account authorization, the method includes the steps:
S1: the first account application ID, the first account interface ID and the first account code confirmed according to the first account client ID processed generates the raw code information of the first account, and batch table is written in the raw code information of first account;
S2: the second account authorization information that the first account client is sent is received, second account authorization information is at least Including the second account ID, the second account request code fetch range information and the second account authority information;
S3: check that the own code of the second account generates whether structure with the code of the second account request code fetch generates structure Match, if matching, second account authorization information is written in batch table.
Preferably, checked in the S3 the second account own code generate structure whether the code with the second account request code fetch Generate structure matching, comprising:
According to the second account " the account ID- application ID-interface ID- code system ID " contingency table prestored, judge whether there is with First account application ID, the first account interface ID and consistent " application ID-interface ID- code system ID " road the first account code system ID Diameter, if so, being judged to matching, if it is not, being then judged to mismatching.
Preferably, the batch table includes ownership account ID marker and right to use account ID marker, it is described by institute It states in the second account authorization information write-in batch table, including ownership is written in the second account ID in the second account authorization information Account ID marker and (or) right to use account ID marker.
Preferably, the batch table includes starting outer code traffic sequence marker and end outer code traffic sequence number mark Position, the second account request code fetch range information include starting symbol and terminate number, it is described by second account authorization in S3 Information is written in batch table, comprising: is respectively written into starting symbol and end number and starts outer code traffic sequence number and terminate outer code industry It is engaged in the corresponding marker of sequence number.
Preferably, after s 2, before S3, the method also includes:
S21: judging whether the first account has the permission to the second account authorization, if so, S3 is then executed, if not having, to First account sends authorization failure information.
Preferably, the batch table includes ownership account ID marker and right to use account ID marker, described second Account authority information includes ownership and the right to use, described to judge whether the first account has to the second account authorization in S21 Permission, comprising:
Whether the marker where judging the first account ID in batch table is consistent with the second account authority information, if one It causes, then determines that the first account has the permission to the second account authorization, if inconsistent, determine that the first account does not have to second The permission of account authorization.
A kind of raw code method of first account, which comprises
SS1: server receives the first account information that client is sent, and first account information includes account ID;
SS2: server is sent and the first account according to the account ID and application ID contingency table that prestore the first account to client The associated each application ID of the account ID at family;
SS3: client confirms that an application ID is stand-by application ID in all application IDs that server is sent, will be described Stand-by application ID confirmation message is sent to server;
SS4: server receives the stand-by application ID confirmation message that client is sent, and according to the first account application prestored ID and interface ID contingency table are sent and the associated each interface ID of stand-by application ID to client;
SS5: client confirms that an interface ID is stand-by interface ID in the total interface ID that server is sent, will be described Stand-by interface ID confirmation message is sent to server;
SS6: server receives the stand-by interface ID confirmation message that client is sent, and according to the first account interface prestored ID and code system ID contingency table determine code system used in the raw code of the first account, and carry out raw code operation, while generating and the secondary code The raw code information of corresponding first account is operated, and batch table is written into the raw code information of first account.
Preferably, the first account interface ID and code system ID contingency table are one-to-one contingency table.
A kind of method of second account code fetch, which comprises
User end to server transmission batch ID, the code to be taken are corresponding in the batch ID where SSS1: the second account Code in range information and the second account ID;
SSS2: server is found and the batch ID in the batch table of server internal storage according to the batch ID Corresponding attribute column;
SSS3: server inspection whether there is the second account ID in the use account ID marker in the attribute column, If it exists, then code corresponding with the range information is sent to the second account, if it does not exist, then server is not sent out to the second account Send code.
Preferably, range information of the code to be taken in the corresponding code of the batch ID, including take starting symbol With take terminate number.
The beneficial effects of the present invention are: the authority setting that (1) operates different accounts to code is clear;(2) it avoids Account without corresponding authority excessively authorizes.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is method schematic diagram of the first account of one kind that provides of first embodiment of the invention to the second account authorization;
Fig. 2 is method schematic diagram of the first account of one kind that provides of second embodiment of the invention to the second account authorization;
Fig. 3 is a kind of raw code method schematic diagram of first account provided by the invention;
Fig. 4 is the method schematic diagram of the second account code fetch provided by the invention.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
It is only to be not intended to limit the invention merely for for the purpose of describing particular embodiments in terminology used in the present invention. It is also intended in the present invention and the "an" of singular used in the attached claims, " described " and "the" including majority Form, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein refers to and wraps It may be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the present invention A little information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not departing from In the case where the scope of the invention, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determination ".
The present invention will be described in detail by way of examples below.
The present invention provides a kind of first accounts to the method for the second account authorization, as shown in Figure 1, it is applied to server, The method includes the steps:
S1: the first account application ID, the first account interface ID and the first account code confirmed according to the first account client ID processed generates the raw code information of the first account, and batch table is written in the raw code information of first account.
Each account generates a raw code information corresponding with this secondary code, the batch when carrying out raw code Table, it can be understood as be the set for the critical data that account carries out in raw code operation, specifically, it is assumed that there are account A, account ID is " zhanghuA ", and the application ID applied used by life code is 1001, the interface ID of interface that life code uses for 2001, the code system ID of code system that life code uses then when first secondary yard of account A progress, are recorded in batch table for 3001 Information it is as shown in table 1 below:
Table 1
It is a displayings example of batch table shown in the upper table 1, is indicated in table 1 with the data that " xxx " is shown and this hair The unrelated data of bright application, the information that can be interpreted from upper table 1 are as follows:
" batch ID " corresponding number is 1, indicates that this is the life code information of first yard generated in the overall situation;
" code system ID " is 3001, indicates that code system used in raw code is the code system that number is 3001;
" ownership account ID " is zhanghuA, and " right to use account ID " is zhanghuA, " starts outer code traffic sequence Number " it is 000, " terminating outer code traffic sequence number " is 999, this four information should be understood simultaneously, that is, is indicated: A pairs of account 1000 codes of generation corresponding to outer code traffic sequence number 000~999 have ownership, also, account A is to outer code business sequence 1000 codes of generation corresponding to row number 000~999 have the right to use.
S2: the second account authorization information that the first account client is sent is received, second account authorization information is at least Including the second account ID, the second account request code fetch range information and the second account authority information.
The relevant information of second account is to be sent to server by the first account.Assuming that there are account B, account ID is " zhanghuB ", when account A wishes that outer code traffic sequence number is that 101~200 this 100 codes license to account in the code generated Family B is in use, the account ID " zhanghuB " of account B is just sent to server by the client where account A, while will be wanted The correspondence outer code traffic sequence range 101~200 and batch ID of the code of authorization are sent to server, in this way, server energy The code for enough uniquely determining the account A account of being licensed to B, be batch ID be in 1 corresponding code outer code traffic sequence number be 101~ 200 code.
S3: check that the own code of the second account code generates whether structure with the code of the second account request code fetch generates structure Match, if matching, second account authorization information is written in batch table;If mismatching, do not handle.
The code of generation is licensed to account B by account A, no matter account A authorize account B be the right to use of code or it is all It is identical as the code of the account A code authorized generation structure to require that the own code of account B generates structure for power.Code generates structure can To be interpreted as the path structure of generated code, i.e. " application ID-interface ID- code system ID " path, for example, in table 2:
Table 2
Equally be account A with code system ID be 1001 codes generated, yard generation path there are three types of, i.e. " application ID-interface The path ID- code system ID " is respectively
Path 1:1001-2001-3001;
Path 2:1003-2001-3001;
Path 3:1004-2001-3001;
Assuming that account A generates a collection of code in a manner of path 1, and it is desirable that this batch of code generated is licensed into account B, and " account ID- application ID-interface ID- code system ID " contingency table such as 3 institute of table of the known account B prestored in the server Show:
Table 3
As it can be seen that the case where " application ID-interface ID- code system ID " is " 1001-2001-3001 " is not present in account B, That is the own code of account B generates structure and the code of account B request code fetch generates structure mismatch, then account A is with the generation of path 1 Code can not license to account B;Likewise, have " application ID-interface ID- code system ID " path 1004-2001-3001 in account A, Equally there is " application ID-interface ID- code system ID " path 1004-2001-3001 in account B, then account A is with " application ID-connects The code that mouth ID- code system ID " path 1004-2001-3001 is generated can license to account B.
Further, the batch table includes ownership account ID marker and right to use account ID marker, the general Second account authorization information is written in the first account batch table, including by the second account ID in the second account authorization information Ownership account ID marker and (or) right to use account ID marker is written.
It is equally exemplified by Table 1, what the column " ownership account ID " was filled in table 1 is " zhanghuA ", " right to use account That ID " is filled on a column is also " zhanghuA ", i.e., ownership account ID marker and right to use account ID mark in batch table The account ID of position write-in is the account ID " zhanghuA " of account A, when needing the code for generating account A to license to account B When, if what is authorized is the right to use, the account ID " zhanghuB " of account B is written to the corresponding column " right to use account ID " In, i.e., it transform table 1 as table 4:
Table 4
Can clearly be interpreted from table 4, batch ID number be 1 code in, account B to outer code traffic sequence number be 50~ 100 this 51 codes have the right to use.It is similar, if by the corresponding column of account ID write-in " ownership account ID " of account B, The ownership of corresponding code is also granted by account B.
Further, the batch table includes starting outer code traffic sequence marker and end outer code traffic sequence number mark Know position, the second account request code fetch range information include starting symbol and terminate number, it is described by second account in S3 Authorization message is written in batch table, comprising: is respectively written into starting symbol and end number and starts outer code traffic sequence number and terminate outer In the corresponding marker of code traffic sequence number.
It is i.e. as shown in table 4, starting symbol 50 and end number 100 are respectively written into and starts outer code traffic sequence number and terminates outer In the corresponding column of code traffic sequence number, that is, specify to account B authorize permission be outer code traffic sequence number be 50~100 this 51 codes.
The beneficial effects of the present invention are: the authority setting that different accounts operate code is clear, i.e. the first account Specify that it authorizes the permission of the code of generation, such as right to use and (or) ownership to the second account.
Further, as shown in Fig. 2, after s 2, before S3, the method also includes:
S21: judging whether the first account has the permission to the second account authorization, if so, S3 is then executed, if not having, to First account sends authorization failure information.
It is also illustrated so that account A is authorized to account B as an example, the step S21 operation to be carried out is i.e. are as follows: server inspection Whether account A is qualified to be authorized corresponding permission to account B, and even account A authorizes the right to use of the code itself generated to account Family B, then account A will have the right to use to these codes, if account A authorizes the ownership of the code itself generated to account B, account Family A will have ownership to these codes.For server, the operation to be completed of server is to judge in batch table Whether the marker where the first account ID consistent with the second account authority information, if unanimously, determine the first account have to The permission of second account authorization determines that the first account does not have the permission to the second account authorization if inconsistent.Such as table 1 In, account A as an example in the first account, corresponding marker where account ID " zhanghuA " is " all Account ID " and " right to use account ID " are weighed, account B is as the second account in the example, regardless of the authority information of account B is " institute Have the right " still " right to use ", marker and account B authority information where the account ID of account A are all consistent, and account A is equal It can be authorized to account B;Assuming that account A is granted by ownership of the right to use of code without authorizing code to account B, it is assumed that There is also account C, account B is merely able to authorize the right to use of corresponding code to account C, and cannot authorize all of corresponding code Power, because account B itself does not have ownership to corresponding code.The beneficial effects of the present invention are: avoiding without corresponding authority Account excessively authorize.For example the solution of the present invention is used, so that there is no ownership only beneficial second account, nothing to code Method authorizes the ownership of these yards to another account, and can only authorize the right to use of another these yards of account.
Adaptable, the present invention also provides a kind of raw code methods of first account, as shown in Figure 3, which comprises
SS1: server receives the first account information that client is sent, and first account information includes account ID;
SS2: server is sent and the first account according to the account ID and application ID contingency table that prestore the first account to client The associated each application ID of the account ID at family;
SS3: client confirms that an application ID is stand-by application ID in all application IDs that server is sent, will be described Stand-by application ID confirmation message is sent to server;
SS4: server receives the stand-by application ID confirmation message that client is sent, and according to the first account application prestored ID and interface ID contingency table are sent and the associated each interface ID of stand-by application ID to client;
SS5: client confirms that an interface ID is stand-by interface ID in the total interface ID that server is sent, will be described Stand-by interface ID confirmation message is sent to server;
SS6: server receives the stand-by interface ID confirmation message that client is sent, and according to the first account interface prestored ID and code system ID contingency table determine code system used in the raw code of the first account, and carry out raw code operation, while generating and the secondary code The raw code information of corresponding first account is operated, and batch table is written into the raw code information of first account.
It illustrates, it is assumed that account A is the first account, and account ID is " zhanghuA ", and user logs in account in client Family A, it is rear to server send account A account ID " zhanghuA ";The account ID for having account A that saves in the server with The contingency table of the incidence relation of each application ID further also preserves the contingency table and interface of application ID Yu interface ID The contingency table of ID and code system ID can be a summary table, as shown in table 2.By taking the information recorded in table 2 as an example, client to After server provides account ID " zhanghuA ", server will return to client using ID number 1001,1002,1003,1004, An application ID is selected in the client according to their own needs for user, it is assumed that the application ID of client's selection is 1001, and will Application ID confirmation message is sent to server, later, server application ID be 1001 corresponding to interface ID number 2001, 2002,2003 and 2004 client is returned to, an interface ID is selected by user in the client according to their own needs, it is false If the interface ID that user selects is 2002, and interface ID confirmation message is sent to server;Server is according to interface ID number 2002, automatically confirm that the code system that code system ID is 3002 is code system used in the raw code of account A.Specifically, as shown in table 2, described the One account interface ID and code system ID contingency table are one-to-one contingency table.
Wherein, server carries out raw code and generates raw code information to be the prior art according to code system ID, and the present invention repeats no more.
The present invention also provides a kind of methods of second account code fetch, as shown in Figure 4, which comprises
User end to server transmission batch ID, the code to be taken are corresponding in the batch ID where SSS1: the second account Code in range information and the second account ID;
SSS2: server is found and the batch ID in the batch table of server internal storage according to the batch ID Corresponding attribute column;
SSS3: server inspection whether there is the second account ID in the use account ID marker in the attribute column, If it exists, then code corresponding with the range information is sent to the second account, if it does not exist, then server is not sent out to the second account Send code.
So-called code fetch, the account for refering in particular to be awarded the corresponding authority of code in the present invention take the operation of corresponding code. For example, as shown in table 4, account B is granted the access right of a collection of code, when account B will take corresponding these yard, such as Shown in SSS1~SSS3, account B sends batch ID corresponding to corresponding code to server, such as the batch ID number 1 in table 4, with And the range for the code to be taken, can clearly it find out in table 4, this 51 codes of account B to outer code traffic sequence number 50~100 With the right to use, account B can according to need some or all of code taken within the scope of this, such as account B this time wishes 56~60 this 5 codes are taken, then number are sent to server using 56 and 60 as taking starting symbol and take end, i.e., to clothes Business device has uniquely determined the data area of the code to be taken.
It, will be in server after server receives batch ID number 1 and takes starting symbol 56 and take end number 60 Attribute column corresponding with the batch ID is found in the batch table of portion's storage;Later, server inspection is in the attribute column Use the account ID that whether there is account B in account ID marker, and if it exists, then send to account B and take starting symbol with described 150 and take terminate number 199 corresponding codes, if it does not exist, then server not to account B send code.Category described herein Property column, i.e., as in table 4 the 2nd~5 column shown in for display code attribute information information arrange.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the present invention.

Claims (10)

1. a kind of first account is to the method for the second account authorization, which is characterized in that be applied to server, the method includes steps It is rapid:
S1: the first account application ID, the first account interface ID and the first account code system ID confirmed according to the first account client, The raw code information of the first account is generated, and batch table is written into the raw code information of first account;
S2: receiving the second account authorization information that the first account client is sent, and second account authorization information includes at least Second account ID, the second account request code fetch range information and the second account authority information;
S3: checking that the own code of the second account generates whether structure with the code of the second account request code fetch generates structure matching, if Then second account authorization information is written in batch table for matching.
2. the first account according to claim 1 is to the method for the second account authorization, which is characterized in that checked in the S3 The own code of second account generates whether structure with the code of the second account request code fetch generates structure matching, comprising:
According to the second account " the account ID- application ID-interface ID- code system ID " contingency table prestored, judge whether there is and first Account application ID, the first account interface ID and consistent " application ID-interface ID- code system ID " path the first account code system ID, if It is then to be judged to matching, if it is not, being then judged to mismatching.
3. the first account according to claim 1 is to the method for the second account authorization, which is characterized in that the batch table packet Ownership account ID marker and right to use account ID marker are included, it is described that batch table is written into second account authorization information In, including ownership account ID marker and (or) right to use account is written in the second account ID in the second account authorization information ID marker.
4. the first account according to claim 1 is to the method for the second account authorization, which is characterized in that the batch table packet It includes and starts outer code traffic sequence marker and end outer code traffic sequence marker, the second account request code fetch range Information includes starting symbol and end number, described that second account authorization information is written in batch table in S3, comprising: will to rise Beginning number and end number, which are respectively written into, to be started in outer code traffic sequence number and the corresponding marker of end outer code traffic sequence number.
5. the first account according to any one of claims 1 to 4 is to the method for the second account authorization, which is characterized in that in S2 Later, before S3, the method also includes:
S21: judging whether the first account has the permission to the second account authorization, if so, S3 is then executed, if not having, to first Account sends authorization failure information.
6. the first account according to claim 5 is to the method for the second account authorization, which is characterized in that the batch table packet Ownership account ID marker and right to use account ID marker are included, the second account authority information includes ownership and use Power, it is described to judge whether the first account has the permission to the second account authorization in S21, comprising:
Whether the marker where judging the first account ID in batch table is consistent with the second account authority information, if unanimously, Determine that the first account has the permission to the second account authorization, if inconsistent, determines that the first account does not have to the second account The permission of authorization.
7. a kind of raw code method of first account, which is characterized in that the described method includes:
SS1: server receives the first account information that client is sent, and first account information includes account ID;
SS2: server is sent and the first account according to the account ID and application ID contingency table for prestoring the first account to client The associated each application ID of account ID;
SS3: client confirms that an application ID is stand-by application ID in all application IDs that server is sent, will be described stand-by Application ID confirmation message is sent to server;
SS4: server receives the stand-by application ID confirmation message that client is sent, and according to the first account application ID for prestoring with Interface ID contingency table is sent and the associated each interface ID of stand-by application ID to client;
SS5: client confirms that an interface ID is stand-by interface ID in the total interface ID that server is sent, will be described stand-by Interface ID confirmation message is sent to server;
SS6: server receives the stand-by interface ID confirmation message that client is sent, and according to the first account interface ID for prestoring with Code system ID contingency table determines code system used in the raw code of the first account, and carries out raw code operation, while generating and operating with the secondary code The raw code information of corresponding first account, and batch table is written into the raw code information of first account.
8. life code method according to claim 7, which is characterized in that the first account interface ID and code system ID contingency table For one-to-one contingency table.
9. a kind of method of second account code fetch, which is characterized in that the described method includes:
SSS1: the second account place user end to server transmission batch ID, the code to be taken are in the corresponding code of the batch ID In range information and the second account ID;
SSS2: server is found corresponding with the batch ID according to the batch ID in the batch table of server internal storage Attribute column;
SSS3: server inspection whether there is the second account ID in the use account ID marker in the attribute column, if depositing Code corresponding with the range information then is being sent to the second account, if it does not exist, then server is not sent to the second account Code.
10. the method for the second account code fetch according to claim 9, which is characterized in that
Range information of the code to be taken in the corresponding code of the batch ID, including take starting symbol and take end Number.
CN201810485264.9A 2018-03-30 2018-05-18 Account code generation method, account authorization method and account code fetching method Active CN109302376B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810296824 2018-03-30
CN2018102968246 2018-03-30

Publications (2)

Publication Number Publication Date
CN109302376A true CN109302376A (en) 2019-02-01
CN109302376B CN109302376B (en) 2021-05-28

Family

ID=65167731

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201810485264.9A Active CN109302376B (en) 2018-03-30 2018-05-18 Account code generation method, account authorization method and account code fetching method
CN201810485262.XA Pending CN109299951A (en) 2018-03-30 2018-05-18 A kind of realization more than one piece commodity are mutually related method
CN201810485534.6A Active CN109299952B (en) 2018-03-30 2018-05-18 System and method for realizing correlated retrieval of multiple commodity codes

Family Applications After (2)

Application Number Title Priority Date Filing Date
CN201810485262.XA Pending CN109299951A (en) 2018-03-30 2018-05-18 A kind of realization more than one piece commodity are mutually related method
CN201810485534.6A Active CN109299952B (en) 2018-03-30 2018-05-18 System and method for realizing correlated retrieval of multiple commodity codes

Country Status (1)

Country Link
CN (3) CN109302376B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110490654B (en) * 2019-08-19 2022-05-20 广州凯晟信息科技有限公司 Film shrinking and code assigning method and device, terminal and computer storage medium
CN110992070B (en) * 2019-12-26 2024-03-01 上海中商网络股份有限公司 Commodity tracing code association method and device
CN115034346B (en) * 2022-06-01 2023-04-07 浙江省标准化研究院(金砖国家标准化(浙江)研究中心、浙江省物品编码中心) Unique product code assigning method and device based on GS1 codes and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110016052A1 (en) * 2009-07-16 2011-01-20 Scragg Ernest M Event Tracking and Velocity Fraud Rules for Financial Transactions
CN102664933A (en) * 2012-04-06 2012-09-12 中国联合网络通信集团有限公司 User authorization method, application terminal, open platform and system
CN104104673A (en) * 2014-06-30 2014-10-15 重庆智韬信息技术中心 Method for realizing security payment through third party unified dynamic authorization code
CN105359179A (en) * 2013-05-15 2016-02-24 维萨国际服务协会 Mobile tokenization hub
US20160125396A1 (en) * 2014-10-29 2016-05-05 Google Inc. Confirming physical possession of plastic nfc cards with a mobile digital wallet application
CN105989491A (en) * 2015-02-17 2016-10-05 孙宏铭 Dynamic authorization code generation method, device, payment transaction method and system
CN106664300A (en) * 2014-06-04 2017-05-10 搜诺思公司 Cloud queue access control

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102013072A (en) * 2010-11-29 2011-04-13 吴东杰 Over two-group associated data-based commodity anti-counterfeiting method
DE102011114248A1 (en) * 2011-04-15 2012-10-18 Oliver C. Mehler Procedure for handling product information
CN104036397A (en) * 2014-05-26 2014-09-10 北京五洲全景信息技术有限公司 Internet of Things anti-counterfeiting and tracing scheme based on NFC and combination of two-dimensional code and password
CN104091258A (en) * 2014-07-23 2014-10-08 湖南中财化学建材有限公司 Dicode anti-counterfeiting anti-channel conflict method for tubular products
CN105023136A (en) * 2015-08-14 2015-11-04 深圳正品创想科技有限公司 Two-dimensional code operating method and apparatus of commodity
CN105956867A (en) * 2016-05-23 2016-09-21 无锡市鸿太阳印刷有限公司 Anti-fake method by associating color codes of commodity and anti-fake system of anti-fake method
CN106897341A (en) * 2016-07-08 2017-06-27 阿里巴巴集团控股有限公司 2 D code information querying method, server, client and system
CN106846013A (en) * 2017-01-24 2017-06-13 浙江甲骨文超级码科技股份有限公司 A kind of false proof identity management system and method for tracing to the source
CN106934439A (en) * 2017-03-03 2017-07-07 信码互通(北京)科技有限公司 The bottle code and the correlating method and bottle cap of case code realized based on concealed code
CN107146060A (en) * 2017-05-26 2017-09-08 现代城市数据科技(深圳)有限公司 The method for building up and its system of a kind of respiratory sensation relation of Quick Response Code and commodity
CN107506817B (en) * 2017-07-13 2023-06-27 拍拍看(海南)人工智能有限公司 Commodity virtual coding method and system based on personality patterns

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110016052A1 (en) * 2009-07-16 2011-01-20 Scragg Ernest M Event Tracking and Velocity Fraud Rules for Financial Transactions
CN102664933A (en) * 2012-04-06 2012-09-12 中国联合网络通信集团有限公司 User authorization method, application terminal, open platform and system
CN105359179A (en) * 2013-05-15 2016-02-24 维萨国际服务协会 Mobile tokenization hub
CN106664300A (en) * 2014-06-04 2017-05-10 搜诺思公司 Cloud queue access control
CN104104673A (en) * 2014-06-30 2014-10-15 重庆智韬信息技术中心 Method for realizing security payment through third party unified dynamic authorization code
US20160125396A1 (en) * 2014-10-29 2016-05-05 Google Inc. Confirming physical possession of plastic nfc cards with a mobile digital wallet application
CN105989491A (en) * 2015-02-17 2016-10-05 孙宏铭 Dynamic authorization code generation method, device, payment transaction method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
赵叶红: "API开放平台高性能技术探索与实践", 《中国金融电脑》 *

Also Published As

Publication number Publication date
CN109299952A (en) 2019-02-01
CN109302376B (en) 2021-05-28
CN109299951A (en) 2019-02-01
CN109299952B (en) 2021-10-29

Similar Documents

Publication Publication Date Title
CN103400067B (en) Right management method, system and server
CN109302376A (en) A kind of raw code method of account, account authorization method and account code taking method
CN105354488B (en) It is a kind of to apply installation method, relevant apparatus and using installation system
CN101217367B (en) An operation right judgment system and method realized by introducing right judgment client end
CN108021805A (en) Detect method, apparatus, equipment and the storage medium of Android application program running environment
CN106411517A (en) Password resetting method and device
CN103634935B (en) WPS (Wi-Fi protected setup) or QSS (quick secure setup)-based network accessing method and device
CN104580112A (en) Service authentication method and system, and server
CN104901970A (en) Two dimension code registration method, server and system
CN112738139B (en) Cross-link access control method and device
CN105933374A (en) Mobile terminal data backup method, system and mobile terminal
CN106408096A (en) Data processing method in online ticketing system and online ticketing system
CN110175833B (en) Computer device, method, system and medium for binding bank card information
CN105871903A (en) Information security control method and system as well as mobile terminal
CN108268420A (en) Communication means, processor and electronic equipment between processor
CN104253834B (en) Method, mobile terminal and the system that mobile application data copy is controlled
WO2006117931A1 (en) Service system and operation method of server device in the system
CN108989418A (en) A kind of resource amount method of mixed cloud object storage common authentication
CN105471884A (en) Authentication method and server
CN105847218A (en) Method, business platform and system for controlling user right
CN106454708A (en) Near field positioning method and near field positioning module
CN105836564B (en) The binding method and device of elevator hardware
CN113362049A (en) Virtual resource transfer method, device, medium and electronic equipment
CN115328530A (en) Application management method, device, equipment and medium for application platform
CN103024021B (en) A kind of information transferring method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant