CN109450953B - Authorization method and device, electronic equipment and computer readable storage medium - Google Patents
Authorization method and device, electronic equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN109450953B CN109450953B CN201811636873.6A CN201811636873A CN109450953B CN 109450953 B CN109450953 B CN 109450953B CN 201811636873 A CN201811636873 A CN 201811636873A CN 109450953 B CN109450953 B CN 109450953B
- Authority
- CN
- China
- Prior art keywords
- authorized
- party
- authorization
- authorized party
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000013475 authorization Methods 0.000 title claims abstract description 159
- 238000000034 method Methods 0.000 title claims abstract description 60
- 238000004891 communication Methods 0.000 claims abstract description 79
- 238000012795 verification Methods 0.000 claims description 15
- 238000004590 computer program Methods 0.000 claims description 9
- 230000008569 process Effects 0.000 abstract description 15
- 230000006870 function Effects 0.000 description 28
- 238000010586 diagram Methods 0.000 description 7
- 230000003993 interaction Effects 0.000 description 4
- 238000007726 management method Methods 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
- G10L15/26—Speech to text systems
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The present disclosure provides an authorization method and apparatus, an electronic device, and a computer-readable storage medium. The authorization method comprises the following steps: acquiring video communication information of an authorized party and an authorizing party; authenticating the authorized party and the authorizing party based on the video communication information; if the authorized party and the authorizing party are confirmed to pass the identity authentication, determining the authorizing content provided by the authorizing party for the authorized party; authorization is performed for the authorized party based on the authorization content. The method and the device perform identity authentication on the authorized party and the authorized party based on the video communication information, determine the authorization content provided by the authorized party for the authorized party if the authorized party and the authorized party are confirmed to pass the identity authentication, and perform authorization on the authorized party based on the authorization content, so that the identities of both the authorized party and the authorized party are verified in the authorization process.
Description
Technical Field
The present disclosure relates to communication technologies, and in particular, to an authorization method and apparatus, an electronic device, and a computer-readable storage medium.
Background
The authority management generally refers to that a user can access and only can access the authorized resource according to the security rule or security policy set by the system. Rights management occurs in almost any system where there is a user and password.
In the authorization scenario, the authorized person may authorize the authorized person through various notification mechanisms, for example, the authorized person is authorized through short messages, Instant Messaging (IM) messages, mails, or system prompts, and the authorized person may perform corresponding operations after obtaining authorization.
However, the current authorization method cannot verify the identities of both the authorizer and the authorized person.
Disclosure of Invention
In view of the above, the present disclosure provides an authorization method and apparatus, an electronic device, and a computer-readable storage medium.
Specifically, the present disclosure is realized by the following technical solutions:
according to a first aspect of embodiments of the present disclosure, there is provided an authorization method, the method including:
acquiring video communication information of an authorized party and an authorizing party;
authenticating the authorized party and the authorizing party based on the video communication information;
if the authorized party and the authorizing party are confirmed to pass identity authentication, determining the authorized content provided by the authorizing party for the authorized party;
and authorizing the authorized party based on the authorization content.
In an embodiment, the method further comprises:
before the authorization for the authorized party based on the authorization content, verifying the authorization authority of the authorization party and the authorized authority of the authorized party based on the authorization content, the attribute information of the authorized party and the attribute information of the authorization party;
the authorizing the authorized party based on the authorization content includes:
and if the authorization authority of the authorizer and the authorized authority of the authorized party are verified, authorizing the authorized party based on the authorization content.
In an embodiment, the authenticating the authorized party and the authorizing party based on the video communication information includes:
and performing face recognition on the face picture in the video communication information so as to perform identity authentication on the authorized party and the authorizing party.
In one embodiment, the determining the authorized content provided by the authorizer for the authorized party includes:
and performing voice recognition on voice information in the video communication information to determine the authorized content.
In one embodiment, the performing speech recognition on the speech information in the video communication information includes:
analyzing voice information in the video communication information to convert the voice information into character information;
extracting key information from the converted character information;
and comparing the key information with a pre-stored authorized content range.
In an embodiment, the performing face recognition on a face picture in the video communication information includes:
and comparing the face picture in the video communication information with a pre-stored face picture of an authorized party and a pre-stored face picture of an authorized party.
According to a second aspect of embodiments of the present disclosure, there is provided an authorization apparatus, the apparatus comprising:
the acquisition module is used for acquiring video communication information of an authorized party and an authorized party;
a first authentication module for authenticating the authorized party and the authorizing party based on the video communication information;
the determining module is used for determining the authorization content provided by the authorizing party for the authorized party if the first verifying module confirms that the authorized party and the authorizing party both pass identity verification;
and the authorization module is used for authorizing the authorized party based on the authorization content determined by the determination module.
In one embodiment, the apparatus further comprises:
a second verification module, configured to verify an authorization right of the authorizer and an authorized right of the authorized party based on the authorization content, the attribute information of the authorized party, and the attribute information of the authorizer before the authorizing module authorizes the authorized party based on the authorization content;
the authorization module is specifically configured to:
and if the authorization authority of the authorizer and the authorized authority of the authorized party are verified, authorizing the authorized party based on the authorization content.
According to a third aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium storing a computer program for executing the above-described authorization method.
According to a fourth aspect of the embodiments of the present disclosure, there is provided an electronic device, including a processor, a memory, and a computer program stored on the memory and executable on the processor, wherein the processor implements the authorization method when executing the computer program.
According to the method and the device, the authorized party and the authorizing party are subjected to identity authentication based on the video communication information, if the authorized party and the authorizing party are confirmed to pass the identity authentication, the authorization content provided by the authorizing party for the authorized party is determined, authorization is carried out on the authorized party based on the authorization content, and therefore the identity of both the authorizing party and the authorized party is verified in the authorization process.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flow chart illustrating an authorization method according to an exemplary embodiment of the present disclosure;
FIG. 2 is a flow chart illustrating another authorization method according to an exemplary embodiment of the present disclosure;
FIG. 3 is a flow chart illustrating another authorization method according to an exemplary embodiment of the present disclosure;
fig. 4 is a hardware structure diagram of an electronic device in which an authorization apparatus according to an exemplary embodiment of the present disclosure is located;
FIG. 5 is a block diagram of an authorization device shown in an exemplary embodiment of the present disclosure;
FIG. 6 is a block diagram of another authorization device shown in an exemplary embodiment of the present disclosure;
fig. 7 is a block diagram of another authorization apparatus shown in an exemplary embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Fig. 1 is a flowchart illustrating an authorization method according to an exemplary embodiment of the disclosure, where the authorization method includes:
step S101, video communication information of an authorized party and an authorized party is obtained.
The authorized party may be, but is not limited to, a user, and the authorized party may be, but is not limited to, a merchant.
In this embodiment, when an authorized party, such as a user, wants to obtain authorization of an authorized party, such as a merchant, video communication can be performed with the merchant through an Application (APP), and the background of the APP installed by the authorized party at this time can obtain video communication information established by the authorized party with the authorized party through the application.
And S102, authenticating the authorized party and the authorizing party based on the video communication information.
In this embodiment, after the video communication information between the authorized party and the authorizing party is obtained, a face recognition algorithm may be used to perform face recognition on the face picture in the video communication information, for example, the face picture in the video communication information may be compared with the pre-stored face picture of the authorized party and the face picture of the authorizing party, so as to perform identity verification on the authorized party and the authorizing party, thereby realizing verification of authenticity and validity of identities of the authorizing party and the authorized party in the same interaction process.
Step S103, if the authorized party and the authorizing party are confirmed to pass the identity authentication, the authorizing party is determined to be the authorized content provided by the authorized party.
After the identity information of the authorized party and the authorized party is verified, voice recognition can be carried out on voice information in the video communication information to determine the authorized content.
The performing voice recognition on the voice information in the video communication information may include: analyzing voice information in the video communication information to convert the voice information into character information; extracting key information from the converted character information; and comparing the key information with a pre-stored authorized content range to determine authorized content.
For example, when the authorized party desires that the authorized party opens the authority of the XX function of the XX system, the background may recognize "the authority of the XX function of the XX system", extract the key information "the XX system and the XX function", and compare the "XX system and the XX function" with a pre-stored authorization content range, thereby determining the authorization content.
Optionally, in order to determine the authorized content, the method may further include: and storing the authorized content range, the identity related information of the authorized party and the identity related information of the authorized party.
The identity-related information of the authorized party may include, but is not limited to, one or more of a user Identification (ID), a mobile phone number, and an identification number. The identity-related information of the authorized party may include, but is not limited to, one or more of a merchant ID and a merchant name.
And step S104, authorizing the authorized party based on the authorization content.
The background, after determining the authorization content, may authorize the authorized party based on the authorization content and display the authorization result.
For example, an authorized party, such as a user, may be authorized to operate a function or read data of a function.
In the above embodiment, the authorized party and the authorized party are authenticated based on the video communication information, if it is determined that both the authorized party and the authorized party pass the authentication, the authorization content provided by the authorized party is determined, and the authorized party is authorized based on the authorization content, so that the identities of both the authorized party and the authorized party are authenticated in the authorization process.
Fig. 2 is a flowchart illustrating another authorization method according to an exemplary embodiment of the disclosure, and as shown in fig. 2, the authorization method includes:
step S201, obtaining video communication information between the authorized party and the authorizing party.
Optionally, the method may further include: the video communication information is saved for use as verification information.
The authorized party may be, but is not limited to, a user, and the authorized party may be, but is not limited to, a merchant.
In this embodiment, when an authorized party, such as a user, wants to obtain authorization of an authorized party, such as a merchant, video communication can be performed with the merchant through an Application (APP), and the background of the APP installed by the authorized party at this time can obtain video communication information established by the authorized party with the authorized party through the application.
And S202, authenticating the authorized party and the authorizing party based on the video communication information.
In this embodiment, after the video communication information between the authorized party and the authorizing party is obtained, a face recognition algorithm may be used to perform face recognition on the face picture in the video communication information, for example, the face picture in the video communication information may be compared with the pre-stored face picture of the authorized party and the face picture of the authorizing party, so as to perform identity verification on the authorized party and the authorizing party, thereby realizing verification of authenticity and validity of identities of the authorizing party and the authorized party in the same interaction process.
Step S203, if it is confirmed that both the authorized party and the authorizing party pass the identity authentication, it is determined that the authorizing party is the authorized content provided by the authorized party.
After the identity information of the authorized party and the authorized party is verified, voice recognition can be carried out on voice information in the video communication information to determine the authorized content.
The performing voice recognition on the voice information in the video communication information may include: analyzing voice information in the video communication information to convert the voice information into character information; extracting key information from the converted character information; and comparing the key information with a pre-stored authorized content range to determine authorized content.
For example, when the authorized party desires that the authorized party opens the authority of the XX function of the XX system, the background may recognize "the authority of the XX function of the XX system", extract the key information "the XX system and the XX function", and compare the "XX system and the XX function" with a pre-stored authorization content range, thereby determining the authorization content.
Optionally, in order to determine the authorized content, the method may further include: and storing the authorized content range, the identity related information of the authorized party and the identity related information of the authorized party.
The identity-related information of the authorized party may include, but is not limited to, one or more of a user Identification (ID), a mobile phone number, and an identification number. The identity-related information of the authorized party may include, but is not limited to, one or more of a merchant ID and a merchant name.
Step S204, based on the authorization content, the attribute information of the authorized party and the attribute information of the authorized party, the authorization authority of the authorized party and the authorized authority of the authorized party are verified.
The attribute information of the authorized party may include, but is not limited to, a location or an area where the authorized party is located, and the attribute information of the authorized party may include, but is not limited to, a location or an area where the authorized party is located.
In this embodiment, the authorization authority of the authorizer and the authorized authority of the authorized party may be verified based on the authorization content, the attribute information of the authorized party, and the attribute information of the authorizer, so as to ensure the correspondence between the authorizer and the authorized party, thereby preventing the unauthorized operation or the handover operation of the authorized party, and further improving the security of the authorizer system, such as a merchant system.
In step S205, if the authorization right of the authorizer and the authorized right of the authorized party both pass the verification, authorization is performed for the authorized party based on the authorization content.
For example, an authorized party, such as a user, may be authorized to operate a function or read data of a function.
In the above embodiment, the authorization right of the authorizer and the authorized right of the authorized party are verified based on the authorization content, the attribute information of the authorized party and the attribute information of the authorizer, and when the authorization right of the authorizer and the authorized right of the authorized party are both verified, authorization is performed for the authorized party based on the authorization content to ensure the correspondence between the authorizer and the authorized party, so that unauthorized operation or over-zone operation of the authorized party is prevented, and the security of the authorizer system is improved.
Fig. 3 is a flowchart illustrating another authorization method according to an exemplary embodiment of the disclosure, and as shown in fig. 3, the authorization method includes:
step S301, video communication information of the authorized party and the authorizing party is obtained.
The authorized party may be, but is not limited to, a user, and the authorized party may be, but is not limited to, a merchant.
In this embodiment, when an authorized party, such as a user, wants to obtain authorization of an authorized party, such as a merchant, video communication can be performed with the merchant through an Application (APP), and the background of the APP installed by the authorized party at this time can obtain video communication information established by the authorized party with the authorized party through the application.
Step S302, face recognition is carried out on the face picture in the video communication information by adopting a face recognition algorithm so as to carry out identity authentication on the authorized party and the authorized party.
After the video communication information between the authorized party and the authorizing party is obtained, a face recognition algorithm can be used for carrying out face recognition on the video communication information, for example, a face picture in the video communication information can be compared with a pre-stored face picture of the authorized party and a pre-stored face picture of the authorizing party so as to verify the identity information of the authorized party and the authorizing party, and therefore the authenticity and the validity of the identities of the authorizing party and the authorized party can be verified in the same interaction process.
Step S303, if it is determined that both the authorized party and the authorizing party pass the authentication, performing voice recognition on the voice information in the video communication information to determine the authorization content provided by the authorizing party for the authorized party.
In this embodiment, after the identity information of the authorized party and the authorizing party is verified, voice recognition may be performed on the voice information in the video communication information, in other words, if it is determined that any one of the authorized party and the authorizing party fails in the identity verification, the voice recognition on the voice information in the video communication information is stopped, that is, the authorization process is stopped, so as to save system resources.
In the embodiment, after the authorized party and the authorizing party are confirmed to pass the identity authentication, the voice recognition is carried out on the video communication information, so that the authorization flow is simplified, unnecessary system resources are prevented from being wasted, and the timeliness of authorization can be improved.
The performing voice recognition on the voice information in the video communication information may include: analyzing voice information in the video communication information to convert the voice information into character information; extracting key information from the converted character information; and comparing the key information with a pre-stored authorized content range to determine authorized content.
For example, when the authorized party desires that the authorized party opens the authority of the XX function of the XX system, the background may recognize "the authority of the XX function of the XX system", extract the key information "the XX system and the XX function", and compare the "XX system and the XX function" with a pre-stored authorization content range, thereby determining the authorization content.
Optionally, in order to determine the authorized content, the method may further include: and storing the authorized content range, the identity related information of the authorized party and the identity related information of the authorized party.
The identity-related information of the authorized party may include, but is not limited to, one or more of a user Identification (ID), a mobile phone number, and an identification number. The identity-related information of the authorized party may include, but is not limited to, one or more of a merchant ID and a merchant name.
And step S304, authorizing the authorized party based on the authorization content.
In this embodiment, the authorization right of the authorizer and the authorized right of the authorizer can be verified based on the authorization content, the attribute information of the authorizer, and the attribute information of the authorizer. If the authorization authority of the authorizer and the authorized authority of the authorized party are verified, authorization can be performed for the authorized party based on the authorization content.
For example, an authorized party, such as a user, may be authorized to operate a function or read data of a function.
In the above embodiment, the face recognition algorithm is adopted to perform face recognition on the face picture in the video communication information, so as to perform identity authentication on the authorized party and the authorized party, and after the authorized party and the authorized party are confirmed to pass the identity authentication, the voice information in the video communication information is subjected to voice recognition, so as to simplify the authorization flow, avoid wasting unnecessary system resources, and perform authorization for the authorized party based on the authorization content, thereby realizing the identity authentication of both the authorized party and the authorized party in the authorization process.
Corresponding to the foregoing embodiments of the authorization method, the present disclosure also provides embodiments of an authorization apparatus.
The embodiment of the authorization device disclosed by the disclosure can be applied to electronic equipment. Wherein the electronic device may be a server. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. As shown in fig. 4, a hardware structure of an electronic device in which the authorization apparatus 400 of the present disclosure is located, the electronic device includes a processor 410, a memory 420, and a computer program stored on the memory 420 and capable of running on the processor 410, and the processor 410 implements the authorization method when executing the computer program. In addition to the processor 410 and the memory 420 shown in fig. 4, the electronic device in which the apparatus is located in the embodiment may also include other hardware according to the authorized actual function, which is not described in detail herein.
Fig. 5 is a block diagram illustrating an authorization apparatus according to an exemplary embodiment of the present disclosure, and as shown in fig. 5, the authorization apparatus includes: an acquisition module 51, a first authentication module 52, a determination module 53 and an authorization module 54.
The obtaining module 51 is used for obtaining video communication information of the authorized party and the authorized party.
The authorized party may be, but is not limited to, a user, and the authorized party may be, but is not limited to, a merchant.
In this embodiment, when an authorized party, such as a user, wants to obtain authorization of an authorized party, such as a merchant, video communication can be performed with the merchant through an Application (APP), and the background of the APP installed by the authorized party at this time can obtain video communication information established by the authorized party with the authorized party through the application.
The first authentication module 52 is configured to authenticate the authorized party and the authorized party based on the video communication information acquired by the acquisition module 51.
In this embodiment, after the video communication information between the authorized party and the authorizing party is obtained, a face recognition algorithm may be used to perform face recognition on the face picture in the video communication information, for example, the face picture in the video communication information may be compared with the pre-stored face picture of the authorized party and the face picture of the authorizing party, so as to perform identity verification on the authorized party and the authorizing party, thereby realizing verification of authenticity and validity of identities of the authorizing party and the authorized party in the same interaction process.
The determining module 53 is configured to determine the authorized content provided by the authorized party if the first verifying module 52 confirms that both the authorized party and the authorizing party are authenticated.
After the identity information of the authorized party and the authorized party is verified, voice recognition can be carried out on voice information in the video communication information to determine the authorized content.
The performing voice recognition on the voice information in the video communication information may include: analyzing voice information in the video communication information to convert the voice information into character information; extracting key information from the converted character information; and comparing the key information with a pre-stored authorized content range to determine authorized content.
For example, when the authorized party desires that the authorized party opens the authority of the XX function of the XX system, the background may recognize "the authority of the XX function of the XX system", extract the key information "the XX system and the XX function", and compare the "XX system and the XX function" with a pre-stored authorization content range, thereby determining the authorization content.
The authorization module 54 is used for authorizing the authorized party based on the authorized content determined by the determination module 53.
After determining the authorization content, authorization may be performed for the authorized party based on the authorization content, and the authorization result may be displayed.
For example, an authorized party, such as a user, may be authorized to operate a function or read data of a function.
In the above embodiment, the authorized party and the authorized party are authenticated based on the video communication information, if it is determined that both the authorized party and the authorized party pass the authentication, the authorization content provided by the authorized party is determined, and the authorized party is authorized based on the authorization content, so that the identities of both the authorized party and the authorized party are authenticated in the authorization process.
Fig. 6 is a block diagram of another authorization apparatus according to an exemplary embodiment of the disclosure, and as shown in fig. 6, based on the embodiment shown in fig. 5, the authorization apparatus may further include:
the second verification module 55 is configured to verify the authorization right of the authorizer and the authorized right of the authorized party based on the authorization content, the attribute information of the authorized party, and the attribute information of the authorizer before the authorization module 54 authorizes the authorized party based on the authorization content.
The attribute information of the authorized party may include, but is not limited to, a location or an area where the authorized party is located, and the attribute information of the authorized party may include, but is not limited to, a location or an area where the authorized party is located.
In this embodiment, the authorization authority of the authorizer and the authorized authority of the authorized party may be verified based on the authorization content, the attribute information of the authorized party, and the attribute information of the authorizer, so as to ensure the correspondence between the authorizer and the authorized party, thereby preventing the unauthorized operation or the handover operation of the authorized party, and further improving the security of the authorizer system, such as a merchant system.
The authorization module 54 is specifically configured to: and if the authorization authority of the authorizer and the authorized authority of the authorized party are verified, authorizing the authorized party based on the authorization content.
For example, an authorized party, such as a user, may be authorized to operate a function or read data of a function.
In the above embodiment, the authorization right of the authorizer and the authorized right of the authorized party are verified based on the authorization content, the attribute information of the authorized party and the attribute information of the authorizer, and when the authorization right of the authorizer and the authorized right of the authorized party are both verified, authorization is performed for the authorized party based on the authorization content to ensure the correspondence between the authorizer and the authorized party, so that unauthorized operation or over-zone operation of the authorized party is prevented, and the security of the authorizer system is improved.
Fig. 7 is a block diagram of another authorization apparatus according to an exemplary embodiment of the disclosure, and as shown in fig. 7, on the basis of the embodiment shown in fig. 5 or fig. 6, the determining module 53 may include: parsing submodule 531, extracting submodule 532 and comparing submodule 533.
The parsing submodule 531 is configured to parse the voice information in the video communication information to convert the voice information into text information.
The extraction sub-module 532 is used for extracting key information from the converted text information obtained by the parsing sub-module 531.
The comparison sub-module 533 is configured to compare the key information with a pre-stored authorized content range.
In the embodiment, the key information is extracted from the converted text information obtained by the analysis submodule, and the key information is compared with the pre-stored authorized content range to determine the authorized content, so that the implementation mode is simple.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
In an exemplary embodiment, there is also provided a computer-readable storage medium storing a computer program for executing the above-mentioned authorization method, wherein the authorization method includes:
acquiring video communication information of an authorized party and an authorizing party;
authenticating the authorized party and the authorizing party based on the video communication information;
if the authorized party and the authorizing party are confirmed to pass the identity authentication, determining the authorizing content provided by the authorizing party for the authorized party;
authorization is performed for the authorized party based on the authorization content.
The computer readable storage medium may be a Read Only Memory (ROM), a Random Access Memory (RAM), a compact disc read only memory (CD-ROM), a magnetic tape, a floppy disk, an optical data storage device, and the like.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the disclosed solution. One of ordinary skill in the art can understand and implement it without inventive effort.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The present disclosure is to be considered as limited only by the preferred embodiments and not limited to the specific embodiments described herein, and all changes, equivalents, and modifications that come within the spirit and scope of the disclosure are desired to be protected.
Claims (8)
1. A method of authorization, the method comprising:
when an authorized party carries out video communication with an authorizing party, video communication information established by the authorized party and the authorizing party through application is acquired;
performing face recognition on a face picture in the video communication information to perform identity authentication on the authorized party and the authorizing party;
if the authorized party and the authorizing party are confirmed to pass identity authentication, voice recognition is carried out on voice information in the video communication information so as to determine authorized content provided by the authorizing party for the authorized party;
and authorizing the authorized party based on the authorization content.
2. The method of claim 1, further comprising:
before the authorization for the authorized party based on the authorization content, verifying the authorization authority of the authorization party and the authorized authority of the authorized party based on the authorization content, the attribute information of the authorized party and the attribute information of the authorization party;
the authorizing the authorized party based on the authorization content includes:
and if the authorization authority of the authorizer and the authorized authority of the authorized party are verified, authorizing the authorized party based on the authorization content.
3. The method of claim 1 or 2, wherein the performing speech recognition on the speech information in the video communication information comprises:
analyzing voice information in the video communication information to convert the voice information into character information;
extracting key information from the converted character information;
and comparing the key information with a pre-stored authorized content range.
4. The method of claim 1, wherein the performing face recognition on the face picture in the video communication information comprises:
and comparing the face picture in the video communication information with a pre-stored face picture of an authorized party and a pre-stored face picture of an authorized party.
5. An authorization apparatus, characterized in that the apparatus comprises:
the acquisition module is used for acquiring video communication information established by an authorized party and an authorizing party through application when the authorized party and the authorizing party carry out video communication;
the first verification module is used for carrying out face recognition on a face picture in the video communication information so as to carry out identity verification on the authorized party and the authorized party;
the determining module is used for carrying out voice recognition on voice information in the video communication information to determine the authorized content provided by the authorized party for the authorized party if the authorized party and the authorized party are confirmed to pass identity authentication;
and the authorization module is used for authorizing the authorized party based on the authorization content determined by the determination module.
6. The apparatus of claim 5, further comprising:
a second verification module, configured to verify an authorization right of the authorizer and an authorized right of the authorized party based on the authorization content, the attribute information of the authorized party, and the attribute information of the authorizer before the authorizing module authorizes the authorized party based on the authorization content;
the authorization module is specifically configured to:
and if the authorization authority of the authorizer and the authorized authority of the authorized party are verified, authorizing the authorized party based on the authorization content.
7. A computer-readable storage medium, characterized in that the storage medium stores a computer program for executing the authorization method according to any of the preceding claims 1-4.
8. An electronic device comprising a processor, a memory, and a computer program stored on the memory and executable on the processor, wherein the processor implements the authorization method of any of claims 1-4 when executing the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811636873.6A CN109450953B (en) | 2018-12-29 | 2018-12-29 | Authorization method and device, electronic equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811636873.6A CN109450953B (en) | 2018-12-29 | 2018-12-29 | Authorization method and device, electronic equipment and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109450953A CN109450953A (en) | 2019-03-08 |
CN109450953B true CN109450953B (en) | 2020-09-04 |
Family
ID=65542182
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811636873.6A Active CN109450953B (en) | 2018-12-29 | 2018-12-29 | Authorization method and device, electronic equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109450953B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110717163B (en) * | 2019-10-15 | 2022-02-01 | 维沃移动通信有限公司 | Interaction method and terminal equipment |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104751573B (en) * | 2014-10-28 | 2019-02-12 | 郑利红 | The safe and intelligent cabinet system and application thereof delivered for article/express delivery |
CN105577385B (en) * | 2015-12-21 | 2020-02-18 | 东莞酷派软件技术有限公司 | Method and device for acquiring signature authority |
CN105512348B (en) * | 2016-01-28 | 2019-03-26 | 北京旷视科技有限公司 | For handling the method and apparatus and search method and device of video and related audio |
CN108206803B (en) * | 2016-12-16 | 2021-02-05 | 腾讯科技(深圳)有限公司 | Service agency processing method and device |
CN108171495B (en) * | 2018-01-08 | 2020-03-17 | 平安科技(深圳)有限公司 | Transfer method, device, server and storage medium based on VTM |
CN108471517A (en) * | 2018-03-19 | 2018-08-31 | 广州启盟信息科技有限公司 | A kind of caller management method and device |
-
2018
- 2018-12-29 CN CN201811636873.6A patent/CN109450953B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN109450953A (en) | 2019-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102307665B1 (en) | identity authentication | |
US10027641B2 (en) | Method and apparatus of account login | |
US8213583B2 (en) | Secure access to restricted resource | |
CN110149328B (en) | Interface authentication method, device, equipment and computer readable storage medium | |
US10219154B1 (en) | Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network | |
CN106453205B (en) | identity verification method and device | |
CN106161348B (en) | Single sign-on method, system and terminal | |
CN109784031B (en) | Account identity verification processing method and device | |
US20090320117A1 (en) | Remote sign-out of web based service sessions | |
US11663306B2 (en) | System and method for confirming a person's identity | |
WO2017076216A1 (en) | Server, mobile terminal, and internet real name authentication system and method | |
US10735398B1 (en) | Rolling code authentication techniques | |
US9697346B2 (en) | Method and apparatus for identifying and associating devices using visual recognition | |
CN105429943B (en) | Information processing method and terminal thereof | |
US10764049B2 (en) | Method for determining approval for access to gate through network, and server and computer-readable recording media using the same | |
US9680814B2 (en) | Method, device, and system for registering terminal application | |
CN105577619B (en) | Client login method, client and system | |
EP3079329B1 (en) | Terminal application registration method, device and system | |
CN109450953B (en) | Authorization method and device, electronic equipment and computer readable storage medium | |
EP2482575A1 (en) | Authenticating and localizing a mobile user | |
CN108965335B (en) | Method for preventing malicious access to login interface, electronic device and computer medium | |
CN106533685B (en) | Identity authentication method, device and system | |
CN111835692B (en) | Information management and distribution system and method | |
CN107590662B (en) | Authentication method for calling online bank system, authentication server and system | |
CN108513299B (en) | Method, device and system for calling terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |