CN109450953B - Authorization method and device, electronic equipment and computer readable storage medium - Google Patents

Authorization method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN109450953B
CN109450953B CN201811636873.6A CN201811636873A CN109450953B CN 109450953 B CN109450953 B CN 109450953B CN 201811636873 A CN201811636873 A CN 201811636873A CN 109450953 B CN109450953 B CN 109450953B
Authority
CN
China
Prior art keywords
authorized
party
authorization
authorized party
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811636873.6A
Other languages
Chinese (zh)
Other versions
CN109450953A (en
Inventor
贺智铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN201811636873.6A priority Critical patent/CN109450953B/en
Publication of CN109450953A publication Critical patent/CN109450953A/en
Application granted granted Critical
Publication of CN109450953B publication Critical patent/CN109450953B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The present disclosure provides an authorization method and apparatus, an electronic device, and a computer-readable storage medium. The authorization method comprises the following steps: acquiring video communication information of an authorized party and an authorizing party; authenticating the authorized party and the authorizing party based on the video communication information; if the authorized party and the authorizing party are confirmed to pass the identity authentication, determining the authorizing content provided by the authorizing party for the authorized party; authorization is performed for the authorized party based on the authorization content. The method and the device perform identity authentication on the authorized party and the authorized party based on the video communication information, determine the authorization content provided by the authorized party for the authorized party if the authorized party and the authorized party are confirmed to pass the identity authentication, and perform authorization on the authorized party based on the authorization content, so that the identities of both the authorized party and the authorized party are verified in the authorization process.

Description

Authorization method and device, electronic equipment and computer readable storage medium
Technical Field
The present disclosure relates to communication technologies, and in particular, to an authorization method and apparatus, an electronic device, and a computer-readable storage medium.
Background
The authority management generally refers to that a user can access and only can access the authorized resource according to the security rule or security policy set by the system. Rights management occurs in almost any system where there is a user and password.
In the authorization scenario, the authorized person may authorize the authorized person through various notification mechanisms, for example, the authorized person is authorized through short messages, Instant Messaging (IM) messages, mails, or system prompts, and the authorized person may perform corresponding operations after obtaining authorization.
However, the current authorization method cannot verify the identities of both the authorizer and the authorized person.
Disclosure of Invention
In view of the above, the present disclosure provides an authorization method and apparatus, an electronic device, and a computer-readable storage medium.
Specifically, the present disclosure is realized by the following technical solutions:
according to a first aspect of embodiments of the present disclosure, there is provided an authorization method, the method including:
acquiring video communication information of an authorized party and an authorizing party;
authenticating the authorized party and the authorizing party based on the video communication information;
if the authorized party and the authorizing party are confirmed to pass identity authentication, determining the authorized content provided by the authorizing party for the authorized party;
and authorizing the authorized party based on the authorization content.
In an embodiment, the method further comprises:
before the authorization for the authorized party based on the authorization content, verifying the authorization authority of the authorization party and the authorized authority of the authorized party based on the authorization content, the attribute information of the authorized party and the attribute information of the authorization party;
the authorizing the authorized party based on the authorization content includes:
and if the authorization authority of the authorizer and the authorized authority of the authorized party are verified, authorizing the authorized party based on the authorization content.
In an embodiment, the authenticating the authorized party and the authorizing party based on the video communication information includes:
and performing face recognition on the face picture in the video communication information so as to perform identity authentication on the authorized party and the authorizing party.
In one embodiment, the determining the authorized content provided by the authorizer for the authorized party includes:
and performing voice recognition on voice information in the video communication information to determine the authorized content.
In one embodiment, the performing speech recognition on the speech information in the video communication information includes:
analyzing voice information in the video communication information to convert the voice information into character information;
extracting key information from the converted character information;
and comparing the key information with a pre-stored authorized content range.
In an embodiment, the performing face recognition on a face picture in the video communication information includes:
and comparing the face picture in the video communication information with a pre-stored face picture of an authorized party and a pre-stored face picture of an authorized party.
According to a second aspect of embodiments of the present disclosure, there is provided an authorization apparatus, the apparatus comprising:
the acquisition module is used for acquiring video communication information of an authorized party and an authorized party;
a first authentication module for authenticating the authorized party and the authorizing party based on the video communication information;
the determining module is used for determining the authorization content provided by the authorizing party for the authorized party if the first verifying module confirms that the authorized party and the authorizing party both pass identity verification;
and the authorization module is used for authorizing the authorized party based on the authorization content determined by the determination module.
In one embodiment, the apparatus further comprises:
a second verification module, configured to verify an authorization right of the authorizer and an authorized right of the authorized party based on the authorization content, the attribute information of the authorized party, and the attribute information of the authorizer before the authorizing module authorizes the authorized party based on the authorization content;
the authorization module is specifically configured to:
and if the authorization authority of the authorizer and the authorized authority of the authorized party are verified, authorizing the authorized party based on the authorization content.
According to a third aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium storing a computer program for executing the above-described authorization method.
According to a fourth aspect of the embodiments of the present disclosure, there is provided an electronic device, including a processor, a memory, and a computer program stored on the memory and executable on the processor, wherein the processor implements the authorization method when executing the computer program.
According to the method and the device, the authorized party and the authorizing party are subjected to identity authentication based on the video communication information, if the authorized party and the authorizing party are confirmed to pass the identity authentication, the authorization content provided by the authorizing party for the authorized party is determined, authorization is carried out on the authorized party based on the authorization content, and therefore the identity of both the authorizing party and the authorized party is verified in the authorization process.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flow chart illustrating an authorization method according to an exemplary embodiment of the present disclosure;
FIG. 2 is a flow chart illustrating another authorization method according to an exemplary embodiment of the present disclosure;
FIG. 3 is a flow chart illustrating another authorization method according to an exemplary embodiment of the present disclosure;
fig. 4 is a hardware structure diagram of an electronic device in which an authorization apparatus according to an exemplary embodiment of the present disclosure is located;
FIG. 5 is a block diagram of an authorization device shown in an exemplary embodiment of the present disclosure;
FIG. 6 is a block diagram of another authorization device shown in an exemplary embodiment of the present disclosure;
fig. 7 is a block diagram of another authorization apparatus shown in an exemplary embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Fig. 1 is a flowchart illustrating an authorization method according to an exemplary embodiment of the disclosure, where the authorization method includes:
step S101, video communication information of an authorized party and an authorized party is obtained.
The authorized party may be, but is not limited to, a user, and the authorized party may be, but is not limited to, a merchant.
In this embodiment, when an authorized party, such as a user, wants to obtain authorization of an authorized party, such as a merchant, video communication can be performed with the merchant through an Application (APP), and the background of the APP installed by the authorized party at this time can obtain video communication information established by the authorized party with the authorized party through the application.
And S102, authenticating the authorized party and the authorizing party based on the video communication information.
In this embodiment, after the video communication information between the authorized party and the authorizing party is obtained, a face recognition algorithm may be used to perform face recognition on the face picture in the video communication information, for example, the face picture in the video communication information may be compared with the pre-stored face picture of the authorized party and the face picture of the authorizing party, so as to perform identity verification on the authorized party and the authorizing party, thereby realizing verification of authenticity and validity of identities of the authorizing party and the authorized party in the same interaction process.
Step S103, if the authorized party and the authorizing party are confirmed to pass the identity authentication, the authorizing party is determined to be the authorized content provided by the authorized party.
After the identity information of the authorized party and the authorized party is verified, voice recognition can be carried out on voice information in the video communication information to determine the authorized content.
The performing voice recognition on the voice information in the video communication information may include: analyzing voice information in the video communication information to convert the voice information into character information; extracting key information from the converted character information; and comparing the key information with a pre-stored authorized content range to determine authorized content.
For example, when the authorized party desires that the authorized party opens the authority of the XX function of the XX system, the background may recognize "the authority of the XX function of the XX system", extract the key information "the XX system and the XX function", and compare the "XX system and the XX function" with a pre-stored authorization content range, thereby determining the authorization content.
Optionally, in order to determine the authorized content, the method may further include: and storing the authorized content range, the identity related information of the authorized party and the identity related information of the authorized party.
The identity-related information of the authorized party may include, but is not limited to, one or more of a user Identification (ID), a mobile phone number, and an identification number. The identity-related information of the authorized party may include, but is not limited to, one or more of a merchant ID and a merchant name.
And step S104, authorizing the authorized party based on the authorization content.
The background, after determining the authorization content, may authorize the authorized party based on the authorization content and display the authorization result.
For example, an authorized party, such as a user, may be authorized to operate a function or read data of a function.
In the above embodiment, the authorized party and the authorized party are authenticated based on the video communication information, if it is determined that both the authorized party and the authorized party pass the authentication, the authorization content provided by the authorized party is determined, and the authorized party is authorized based on the authorization content, so that the identities of both the authorized party and the authorized party are authenticated in the authorization process.
Fig. 2 is a flowchart illustrating another authorization method according to an exemplary embodiment of the disclosure, and as shown in fig. 2, the authorization method includes:
step S201, obtaining video communication information between the authorized party and the authorizing party.
Optionally, the method may further include: the video communication information is saved for use as verification information.
The authorized party may be, but is not limited to, a user, and the authorized party may be, but is not limited to, a merchant.
In this embodiment, when an authorized party, such as a user, wants to obtain authorization of an authorized party, such as a merchant, video communication can be performed with the merchant through an Application (APP), and the background of the APP installed by the authorized party at this time can obtain video communication information established by the authorized party with the authorized party through the application.
And S202, authenticating the authorized party and the authorizing party based on the video communication information.
In this embodiment, after the video communication information between the authorized party and the authorizing party is obtained, a face recognition algorithm may be used to perform face recognition on the face picture in the video communication information, for example, the face picture in the video communication information may be compared with the pre-stored face picture of the authorized party and the face picture of the authorizing party, so as to perform identity verification on the authorized party and the authorizing party, thereby realizing verification of authenticity and validity of identities of the authorizing party and the authorized party in the same interaction process.
Step S203, if it is confirmed that both the authorized party and the authorizing party pass the identity authentication, it is determined that the authorizing party is the authorized content provided by the authorized party.
After the identity information of the authorized party and the authorized party is verified, voice recognition can be carried out on voice information in the video communication information to determine the authorized content.
The performing voice recognition on the voice information in the video communication information may include: analyzing voice information in the video communication information to convert the voice information into character information; extracting key information from the converted character information; and comparing the key information with a pre-stored authorized content range to determine authorized content.
For example, when the authorized party desires that the authorized party opens the authority of the XX function of the XX system, the background may recognize "the authority of the XX function of the XX system", extract the key information "the XX system and the XX function", and compare the "XX system and the XX function" with a pre-stored authorization content range, thereby determining the authorization content.
Optionally, in order to determine the authorized content, the method may further include: and storing the authorized content range, the identity related information of the authorized party and the identity related information of the authorized party.
The identity-related information of the authorized party may include, but is not limited to, one or more of a user Identification (ID), a mobile phone number, and an identification number. The identity-related information of the authorized party may include, but is not limited to, one or more of a merchant ID and a merchant name.
Step S204, based on the authorization content, the attribute information of the authorized party and the attribute information of the authorized party, the authorization authority of the authorized party and the authorized authority of the authorized party are verified.
The attribute information of the authorized party may include, but is not limited to, a location or an area where the authorized party is located, and the attribute information of the authorized party may include, but is not limited to, a location or an area where the authorized party is located.
In this embodiment, the authorization authority of the authorizer and the authorized authority of the authorized party may be verified based on the authorization content, the attribute information of the authorized party, and the attribute information of the authorizer, so as to ensure the correspondence between the authorizer and the authorized party, thereby preventing the unauthorized operation or the handover operation of the authorized party, and further improving the security of the authorizer system, such as a merchant system.
In step S205, if the authorization right of the authorizer and the authorized right of the authorized party both pass the verification, authorization is performed for the authorized party based on the authorization content.
For example, an authorized party, such as a user, may be authorized to operate a function or read data of a function.
In the above embodiment, the authorization right of the authorizer and the authorized right of the authorized party are verified based on the authorization content, the attribute information of the authorized party and the attribute information of the authorizer, and when the authorization right of the authorizer and the authorized right of the authorized party are both verified, authorization is performed for the authorized party based on the authorization content to ensure the correspondence between the authorizer and the authorized party, so that unauthorized operation or over-zone operation of the authorized party is prevented, and the security of the authorizer system is improved.
Fig. 3 is a flowchart illustrating another authorization method according to an exemplary embodiment of the disclosure, and as shown in fig. 3, the authorization method includes:
step S301, video communication information of the authorized party and the authorizing party is obtained.
The authorized party may be, but is not limited to, a user, and the authorized party may be, but is not limited to, a merchant.
In this embodiment, when an authorized party, such as a user, wants to obtain authorization of an authorized party, such as a merchant, video communication can be performed with the merchant through an Application (APP), and the background of the APP installed by the authorized party at this time can obtain video communication information established by the authorized party with the authorized party through the application.
Step S302, face recognition is carried out on the face picture in the video communication information by adopting a face recognition algorithm so as to carry out identity authentication on the authorized party and the authorized party.
After the video communication information between the authorized party and the authorizing party is obtained, a face recognition algorithm can be used for carrying out face recognition on the video communication information, for example, a face picture in the video communication information can be compared with a pre-stored face picture of the authorized party and a pre-stored face picture of the authorizing party so as to verify the identity information of the authorized party and the authorizing party, and therefore the authenticity and the validity of the identities of the authorizing party and the authorized party can be verified in the same interaction process.
Step S303, if it is determined that both the authorized party and the authorizing party pass the authentication, performing voice recognition on the voice information in the video communication information to determine the authorization content provided by the authorizing party for the authorized party.
In this embodiment, after the identity information of the authorized party and the authorizing party is verified, voice recognition may be performed on the voice information in the video communication information, in other words, if it is determined that any one of the authorized party and the authorizing party fails in the identity verification, the voice recognition on the voice information in the video communication information is stopped, that is, the authorization process is stopped, so as to save system resources.
In the embodiment, after the authorized party and the authorizing party are confirmed to pass the identity authentication, the voice recognition is carried out on the video communication information, so that the authorization flow is simplified, unnecessary system resources are prevented from being wasted, and the timeliness of authorization can be improved.
The performing voice recognition on the voice information in the video communication information may include: analyzing voice information in the video communication information to convert the voice information into character information; extracting key information from the converted character information; and comparing the key information with a pre-stored authorized content range to determine authorized content.
For example, when the authorized party desires that the authorized party opens the authority of the XX function of the XX system, the background may recognize "the authority of the XX function of the XX system", extract the key information "the XX system and the XX function", and compare the "XX system and the XX function" with a pre-stored authorization content range, thereby determining the authorization content.
Optionally, in order to determine the authorized content, the method may further include: and storing the authorized content range, the identity related information of the authorized party and the identity related information of the authorized party.
The identity-related information of the authorized party may include, but is not limited to, one or more of a user Identification (ID), a mobile phone number, and an identification number. The identity-related information of the authorized party may include, but is not limited to, one or more of a merchant ID and a merchant name.
And step S304, authorizing the authorized party based on the authorization content.
In this embodiment, the authorization right of the authorizer and the authorized right of the authorizer can be verified based on the authorization content, the attribute information of the authorizer, and the attribute information of the authorizer. If the authorization authority of the authorizer and the authorized authority of the authorized party are verified, authorization can be performed for the authorized party based on the authorization content.
For example, an authorized party, such as a user, may be authorized to operate a function or read data of a function.
In the above embodiment, the face recognition algorithm is adopted to perform face recognition on the face picture in the video communication information, so as to perform identity authentication on the authorized party and the authorized party, and after the authorized party and the authorized party are confirmed to pass the identity authentication, the voice information in the video communication information is subjected to voice recognition, so as to simplify the authorization flow, avoid wasting unnecessary system resources, and perform authorization for the authorized party based on the authorization content, thereby realizing the identity authentication of both the authorized party and the authorized party in the authorization process.
Corresponding to the foregoing embodiments of the authorization method, the present disclosure also provides embodiments of an authorization apparatus.
The embodiment of the authorization device disclosed by the disclosure can be applied to electronic equipment. Wherein the electronic device may be a server. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. As shown in fig. 4, a hardware structure of an electronic device in which the authorization apparatus 400 of the present disclosure is located, the electronic device includes a processor 410, a memory 420, and a computer program stored on the memory 420 and capable of running on the processor 410, and the processor 410 implements the authorization method when executing the computer program. In addition to the processor 410 and the memory 420 shown in fig. 4, the electronic device in which the apparatus is located in the embodiment may also include other hardware according to the authorized actual function, which is not described in detail herein.
Fig. 5 is a block diagram illustrating an authorization apparatus according to an exemplary embodiment of the present disclosure, and as shown in fig. 5, the authorization apparatus includes: an acquisition module 51, a first authentication module 52, a determination module 53 and an authorization module 54.
The obtaining module 51 is used for obtaining video communication information of the authorized party and the authorized party.
The authorized party may be, but is not limited to, a user, and the authorized party may be, but is not limited to, a merchant.
In this embodiment, when an authorized party, such as a user, wants to obtain authorization of an authorized party, such as a merchant, video communication can be performed with the merchant through an Application (APP), and the background of the APP installed by the authorized party at this time can obtain video communication information established by the authorized party with the authorized party through the application.
The first authentication module 52 is configured to authenticate the authorized party and the authorized party based on the video communication information acquired by the acquisition module 51.
In this embodiment, after the video communication information between the authorized party and the authorizing party is obtained, a face recognition algorithm may be used to perform face recognition on the face picture in the video communication information, for example, the face picture in the video communication information may be compared with the pre-stored face picture of the authorized party and the face picture of the authorizing party, so as to perform identity verification on the authorized party and the authorizing party, thereby realizing verification of authenticity and validity of identities of the authorizing party and the authorized party in the same interaction process.
The determining module 53 is configured to determine the authorized content provided by the authorized party if the first verifying module 52 confirms that both the authorized party and the authorizing party are authenticated.
After the identity information of the authorized party and the authorized party is verified, voice recognition can be carried out on voice information in the video communication information to determine the authorized content.
The performing voice recognition on the voice information in the video communication information may include: analyzing voice information in the video communication information to convert the voice information into character information; extracting key information from the converted character information; and comparing the key information with a pre-stored authorized content range to determine authorized content.
For example, when the authorized party desires that the authorized party opens the authority of the XX function of the XX system, the background may recognize "the authority of the XX function of the XX system", extract the key information "the XX system and the XX function", and compare the "XX system and the XX function" with a pre-stored authorization content range, thereby determining the authorization content.
The authorization module 54 is used for authorizing the authorized party based on the authorized content determined by the determination module 53.
After determining the authorization content, authorization may be performed for the authorized party based on the authorization content, and the authorization result may be displayed.
For example, an authorized party, such as a user, may be authorized to operate a function or read data of a function.
In the above embodiment, the authorized party and the authorized party are authenticated based on the video communication information, if it is determined that both the authorized party and the authorized party pass the authentication, the authorization content provided by the authorized party is determined, and the authorized party is authorized based on the authorization content, so that the identities of both the authorized party and the authorized party are authenticated in the authorization process.
Fig. 6 is a block diagram of another authorization apparatus according to an exemplary embodiment of the disclosure, and as shown in fig. 6, based on the embodiment shown in fig. 5, the authorization apparatus may further include:
the second verification module 55 is configured to verify the authorization right of the authorizer and the authorized right of the authorized party based on the authorization content, the attribute information of the authorized party, and the attribute information of the authorizer before the authorization module 54 authorizes the authorized party based on the authorization content.
The attribute information of the authorized party may include, but is not limited to, a location or an area where the authorized party is located, and the attribute information of the authorized party may include, but is not limited to, a location or an area where the authorized party is located.
In this embodiment, the authorization authority of the authorizer and the authorized authority of the authorized party may be verified based on the authorization content, the attribute information of the authorized party, and the attribute information of the authorizer, so as to ensure the correspondence between the authorizer and the authorized party, thereby preventing the unauthorized operation or the handover operation of the authorized party, and further improving the security of the authorizer system, such as a merchant system.
The authorization module 54 is specifically configured to: and if the authorization authority of the authorizer and the authorized authority of the authorized party are verified, authorizing the authorized party based on the authorization content.
For example, an authorized party, such as a user, may be authorized to operate a function or read data of a function.
In the above embodiment, the authorization right of the authorizer and the authorized right of the authorized party are verified based on the authorization content, the attribute information of the authorized party and the attribute information of the authorizer, and when the authorization right of the authorizer and the authorized right of the authorized party are both verified, authorization is performed for the authorized party based on the authorization content to ensure the correspondence between the authorizer and the authorized party, so that unauthorized operation or over-zone operation of the authorized party is prevented, and the security of the authorizer system is improved.
Fig. 7 is a block diagram of another authorization apparatus according to an exemplary embodiment of the disclosure, and as shown in fig. 7, on the basis of the embodiment shown in fig. 5 or fig. 6, the determining module 53 may include: parsing submodule 531, extracting submodule 532 and comparing submodule 533.
The parsing submodule 531 is configured to parse the voice information in the video communication information to convert the voice information into text information.
The extraction sub-module 532 is used for extracting key information from the converted text information obtained by the parsing sub-module 531.
The comparison sub-module 533 is configured to compare the key information with a pre-stored authorized content range.
In the embodiment, the key information is extracted from the converted text information obtained by the analysis submodule, and the key information is compared with the pre-stored authorized content range to determine the authorized content, so that the implementation mode is simple.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
In an exemplary embodiment, there is also provided a computer-readable storage medium storing a computer program for executing the above-mentioned authorization method, wherein the authorization method includes:
acquiring video communication information of an authorized party and an authorizing party;
authenticating the authorized party and the authorizing party based on the video communication information;
if the authorized party and the authorizing party are confirmed to pass the identity authentication, determining the authorizing content provided by the authorizing party for the authorized party;
authorization is performed for the authorized party based on the authorization content.
The computer readable storage medium may be a Read Only Memory (ROM), a Random Access Memory (RAM), a compact disc read only memory (CD-ROM), a magnetic tape, a floppy disk, an optical data storage device, and the like.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the disclosed solution. One of ordinary skill in the art can understand and implement it without inventive effort.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The present disclosure is to be considered as limited only by the preferred embodiments and not limited to the specific embodiments described herein, and all changes, equivalents, and modifications that come within the spirit and scope of the disclosure are desired to be protected.

Claims (8)

1. A method of authorization, the method comprising:
when an authorized party carries out video communication with an authorizing party, video communication information established by the authorized party and the authorizing party through application is acquired;
performing face recognition on a face picture in the video communication information to perform identity authentication on the authorized party and the authorizing party;
if the authorized party and the authorizing party are confirmed to pass identity authentication, voice recognition is carried out on voice information in the video communication information so as to determine authorized content provided by the authorizing party for the authorized party;
and authorizing the authorized party based on the authorization content.
2. The method of claim 1, further comprising:
before the authorization for the authorized party based on the authorization content, verifying the authorization authority of the authorization party and the authorized authority of the authorized party based on the authorization content, the attribute information of the authorized party and the attribute information of the authorization party;
the authorizing the authorized party based on the authorization content includes:
and if the authorization authority of the authorizer and the authorized authority of the authorized party are verified, authorizing the authorized party based on the authorization content.
3. The method of claim 1 or 2, wherein the performing speech recognition on the speech information in the video communication information comprises:
analyzing voice information in the video communication information to convert the voice information into character information;
extracting key information from the converted character information;
and comparing the key information with a pre-stored authorized content range.
4. The method of claim 1, wherein the performing face recognition on the face picture in the video communication information comprises:
and comparing the face picture in the video communication information with a pre-stored face picture of an authorized party and a pre-stored face picture of an authorized party.
5. An authorization apparatus, characterized in that the apparatus comprises:
the acquisition module is used for acquiring video communication information established by an authorized party and an authorizing party through application when the authorized party and the authorizing party carry out video communication;
the first verification module is used for carrying out face recognition on a face picture in the video communication information so as to carry out identity verification on the authorized party and the authorized party;
the determining module is used for carrying out voice recognition on voice information in the video communication information to determine the authorized content provided by the authorized party for the authorized party if the authorized party and the authorized party are confirmed to pass identity authentication;
and the authorization module is used for authorizing the authorized party based on the authorization content determined by the determination module.
6. The apparatus of claim 5, further comprising:
a second verification module, configured to verify an authorization right of the authorizer and an authorized right of the authorized party based on the authorization content, the attribute information of the authorized party, and the attribute information of the authorizer before the authorizing module authorizes the authorized party based on the authorization content;
the authorization module is specifically configured to:
and if the authorization authority of the authorizer and the authorized authority of the authorized party are verified, authorizing the authorized party based on the authorization content.
7. A computer-readable storage medium, characterized in that the storage medium stores a computer program for executing the authorization method according to any of the preceding claims 1-4.
8. An electronic device comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, wherein the processor implements the authorization method of any of claims 1-4 when executing the computer program.
CN201811636873.6A 2018-12-29 2018-12-29 Authorization method and device, electronic equipment and computer readable storage medium Active CN109450953B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811636873.6A CN109450953B (en) 2018-12-29 2018-12-29 Authorization method and device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811636873.6A CN109450953B (en) 2018-12-29 2018-12-29 Authorization method and device, electronic equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN109450953A CN109450953A (en) 2019-03-08
CN109450953B true CN109450953B (en) 2020-09-04

Family

ID=65542182

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811636873.6A Active CN109450953B (en) 2018-12-29 2018-12-29 Authorization method and device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109450953B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110717163B (en) * 2019-10-15 2022-02-01 维沃移动通信有限公司 Interaction method and terminal equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751573B (en) * 2014-10-28 2019-02-12 郑利红 The safe and intelligent cabinet system and application thereof delivered for article/express delivery
CN105577385B (en) * 2015-12-21 2020-02-18 东莞酷派软件技术有限公司 Method and device for acquiring signature authority
CN105512348B (en) * 2016-01-28 2019-03-26 北京旷视科技有限公司 For handling the method and apparatus and search method and device of video and related audio
CN108206803B (en) * 2016-12-16 2021-02-05 腾讯科技(深圳)有限公司 Service agency processing method and device
CN108171495B (en) * 2018-01-08 2020-03-17 平安科技(深圳)有限公司 Transfer method, device, server and storage medium based on VTM
CN108471517A (en) * 2018-03-19 2018-08-31 广州启盟信息科技有限公司 A kind of caller management method and device

Also Published As

Publication number Publication date
CN109450953A (en) 2019-03-08

Similar Documents

Publication Publication Date Title
KR102307665B1 (en) identity authentication
US10027641B2 (en) Method and apparatus of account login
US8213583B2 (en) Secure access to restricted resource
CN110149328B (en) Interface authentication method, device, equipment and computer readable storage medium
US10219154B1 (en) Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network
CN106453205B (en) identity verification method and device
CN106161348B (en) Single sign-on method, system and terminal
CN109784031B (en) Account identity verification processing method and device
US20090320117A1 (en) Remote sign-out of web based service sessions
CN107113613B (en) Server, mobile terminal, network real-name authentication system and method
US9697346B2 (en) Method and apparatus for identifying and associating devices using visual recognition
CN105429943B (en) Information processing method and terminal thereof
US10764049B2 (en) Method for determining approval for access to gate through network, and server and computer-readable recording media using the same
US10735398B1 (en) Rolling code authentication techniques
CN105577619B (en) Client login method, client and system
US11663306B2 (en) System and method for confirming a person's identity
US9680814B2 (en) Method, device, and system for registering terminal application
EP3079329B1 (en) Terminal application registration method, device and system
CN109450953B (en) Authorization method and device, electronic equipment and computer readable storage medium
EP2482575A1 (en) Authenticating and localizing a mobile user
CN108965335B (en) Method for preventing malicious access to login interface, electronic device and computer medium
CN106533685B (en) Identity authentication method, device and system
CN111835692B (en) Information management and distribution system and method
CN107590662B (en) Authentication method for calling online bank system, authentication server and system
CN108513299B (en) Method, device and system for calling terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant