CN111245841A - Account authorization method and system - Google Patents
Account authorization method and system Download PDFInfo
- Publication number
- CN111245841A CN111245841A CN202010034761.4A CN202010034761A CN111245841A CN 111245841 A CN111245841 A CN 111245841A CN 202010034761 A CN202010034761 A CN 202010034761A CN 111245841 A CN111245841 A CN 111245841A
- Authority
- CN
- China
- Prior art keywords
- verification code
- server
- identification information
- sends
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/18—Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
The application discloses an account authorization method, which comprises the following steps: the verification code acquisition end sends the identity identification information and the verification code request information to the first server; the first server generates a corresponding verification code according to the identity identification information and the verification code request information, and sends the verification code to the verification code acquisition end; the user sends the identification information and the verification code to a second server; the second server checks and sends the identification information and the verification code to the first server; the first server verifies the identification information and the verification code sent by the second server and generates a verification result; and allowing the user to log in the second server by the second server according to the verification result. Compared with the prior art, the method has the following beneficial effects: the traditional mode of inputting the user name and the password is converted into the mode that the user obtains the verification code in the App and the verification code is copied and filled in, and the burden on the user cannot be increased.
Description
Technical Field
The application relates to the field of database backup, in particular to an account authorization method.
Background
With the development of the internet, various internet services are more and more, and the association between the internet services is more and more compact, so that a user needs to complete account authorization with a corresponding third-party platform before using the services, and how to complete an account authorization process quickly, simply and accurately is a problem that needs to be solved urgently. The method and the device can be applied to all scenes needing account binding and authorization, so that a user can conveniently complete the whole authorization process.
In the prior art, account verification is generally performed and an authorization process is completed based on a user name and a password, the implementation of the scheme is based on the premise that a user keeps in mind the user name and the password of the user, but at present, internet services are unprecedented, and the user has already registered a great number of accounts, so that the accounts and the passwords are likely to be forgotten and mixed, and the user cannot complete account binding and cannot use required services.
Disclosure of Invention
The main objective of the present application is to provide an account authorization method, which includes:
the verification code acquisition end sends the identity identification information and the verification code request information to the first server;
the first server generates a corresponding verification code according to the identity identification information and the verification code request information, and sends the verification code to the verification code acquisition end;
the user sends the identification information and the verification code to a second server;
the second server checks and sends the identification information and the verification code to the first server;
the first server verifies the identification information and the verification code sent by the second server and generates a verification result;
and allowing the user to log in the second server by the second server according to the verification result.
Optionally, the verification code obtaining end is a mobile phone app.
Optionally, the account authorization method further includes:
and the second server calls a login window, and the login window prompts the input of the identification information and the corresponding verification code of the first server.
Optionally, the account authorization method further includes:
the user sends a login request to the second server;
and the second server calls a login window according to the login request.
Optionally, every preset time period, the first server regenerates the corresponding verification code according to the identification information and the verification code request information, and sends the verification code to the verification code obtaining end.
Optionally, when the verification code exceeds the preset time, the login window displays "the verification code is failed"; when the verification code is used, the login window displays 'the verification code is used'; when the verification code does not exist, the login window displays that the verification code does not exist; and when the verification code is verified successfully, displaying success in the login window, and completing the login process.
According to another aspect of the present application, there is provided an account authorization system, including: the system comprises a first server, a second server and a verification code acquisition end;
the verification code acquisition end sends identity identification information and verification code request information to the first server; the first server generates a corresponding verification code according to the identity identification information and the verification code request information, and sends the verification code to the verification code acquisition end; the user sends the identification information and the verification code to a second server; the second server checks and sends the identification information and the verification code to the first server; the first server verifies the identification information and the verification code sent by the second server and generates a verification result; and allowing the user to log in the second server by the second server according to the verification result.
The application also discloses a computer device, which comprises a memory, a processor and a computer program stored in the memory and capable of being executed by the processor, wherein the processor realizes the method of any one of the above items when executing the computer program.
The application also discloses a computer-readable storage medium, a non-volatile readable storage medium, having stored therein a computer program which, when executed by a processor, implements the method of any of the above.
The present application also discloses a computer program product comprising computer readable code which, when executed by a computer device, causes the computer device to perform the method of any of the above.
Compared with the prior art, the method has the following beneficial effects:
the traditional mode of inputting the user name and the password is converted into the mode that the user obtains the verification code in the App and the verification code is copied and filled in, and the burden on the user cannot be increased.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
fig. 1 is a flowchart illustrating an account authorization method according to an embodiment of the present application;
fig. 2 is a flowchart illustrating an account authorization method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a computer device according to one embodiment of the present application; and
FIG. 4 is a schematic diagram of a computer-readable storage medium according to one embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Referring to fig. 1-2, an embodiment of the present application provides an account authorization method, including:
s1: the verification code acquisition end sends the identity identification information and the verification code request information to the first server;
s2: the first server generates a corresponding verification code according to the identity identification information and the verification code request information, and sends the verification code to the verification code acquisition end;
s3: the user sends the identification information and the verification code to a second server;
s4: the second server checks and sends the identification information and the verification code to the first server;
s5: the first server verifies the identification information and the verification code sent by the second server and generates a verification result;
s6: and allowing the user to log in the second server by the second server according to the verification result.
In an embodiment of the application, the verification code obtaining end is a mobile app. However, the present invention is not limited thereto, and those skilled in the art can use any known mobile device, even a desktop computer or a notebook computer, etc. as the terminal of the verification code obtaining end according to actual needs, and all such known mobile devices are within the scope of the present invention as claimed in the present application.
In an embodiment of the present application, the account authorization method further includes:
and the second server calls a login window, and the login window prompts the input of the identification information and the corresponding verification code of the first server. But the invention is not limited to this, and those skilled in the art can use any known login prompting method according to the actual requirement, and the method is within the scope of the claimed application.
In an embodiment of the present application, the account authorization method further includes:
the user sends a login request to the second server;
and the second server calls a login window according to the login request. But not limited to this, those skilled in the art can use any known login window calling method according to actual needs, and even directly display the login window without calling, and all that is claimed in the present application is included in the scope of the present invention.
In an embodiment of the present application, every preset time period, the first server regenerates the corresponding verification code according to the identification information and the verification code request information, and sends the verification code to the verification code obtaining end.
In an embodiment of the present application, when the verification code exceeds the preset time, the login window displays "the verification code is invalid"; when the verification code is used, the login window displays 'the verification code is used'; when the verification code does not exist, the login window displays that the verification code does not exist; and when the verification code is verified successfully, displaying success in the login window, and completing the login process.
According to an aspect of the present application, there is provided an account authorization system, including: the system comprises a first server, a second server and a verification code acquisition end;
the verification code acquisition end sends identity identification information and verification code request information to the first server; the first server generates a corresponding verification code according to the identity identification information and the verification code request information, and sends the verification code to the verification code acquisition end; the user sends the identification information and the verification code to a second server; the second server checks and sends the identification information and the verification code to the first server; the first server verifies the identification information and the verification code sent by the second server and generates a verification result; and allowing the user to log in the second server by the second server according to the verification result.
Cloud generates authorization verification code for user
When a user initiates a request to acquire an authorization verification code through a mobile phone App, the cloud end can generate a globally unique verification code for the user to use when the user authorizes and binds, and the validity period is 30 minutes. The user can use the verification code only once within the validity period, if the validity period is exceeded, the verification code is judged to be invalid, if the verification code is repeatedly used, the verification code is judged to be repeatedly used, and error information is prompted to the user.
The mobile phone App acquires and displays the verification code, and when a user acquires the authorized verification code by clicking a button on the mobile phone App, the App calls a corresponding interface of the cloud to acquire the verification code generated for the current user and displays the verification code on the interface. Because the validity period of the verification code is 30 minutes, the interface is refreshed every 30 minutes, and the cloud interface is called again to obtain the latest verification code and display the latest verification code to the user.
And after the user finishes binding the corresponding service found by the user in each third-party platform through the authorization binding page and clicks, popping up a page for the user to fill in the verification code, filling the verification code obtained in the App into an input box of the page by the user, and then clicking to confirm to finish the authorization process. When the user clicks and determines, the page calls a cloud interface to check the correctness of the verification code input by the user, and if the verification code exceeds 30 minutes, the user is prompted that the verification code is invalid, and the user is guided to obtain the verification code again; if the verification code is used, prompting the user that the verification code is used, and guiding the user to obtain the verification code again; if the verification code does not exist, prompting the user that the verification code does not exist; if the verification code is successfully verified, the success is prompted, and the authorization process is completed.
Compared with the prior art, the method has the following beneficial effects:
the traditional mode of inputting the user name and the password is converted into the mode that the user obtains the verification code in the App and the verification code is copied and filled in, and the burden on the user cannot be increased.
Referring to fig. 3, the present application further provides a computer device including a memory, a processor, and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of the above methods when executing the computer program.
Referring to fig. 4, a computer-readable storage medium, a non-volatile readable storage medium, having stored therein a computer program which, when executed by a processor, implements any of the methods described above.
A computer program product comprising computer readable code which, when executed by a computer device, causes the computer device to perform the method of any of the above.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (10)
1. An account authorization method is characterized by comprising the following steps:
the verification code acquisition end sends the identity identification information and the verification code request information to the first server;
the first server generates a corresponding verification code according to the identity identification information and the verification code request information, and sends the verification code to the verification code acquisition end;
the user sends the identification information and the verification code to a second server;
the second server checks and sends the identification information and the verification code to the first server;
the first server verifies the identification information and the verification code sent by the second server and generates a verification result;
and allowing the user to log in the second server by the second server according to the verification result.
2. The account authorization method according to claim 1, wherein the verification code acquisition end is a mobile app.
3. The account authorization method according to claim 2, wherein the account authorization method further comprises:
and the second server calls a login window, and the login window prompts the input of the identification information and the corresponding verification code of the first server.
4. The account authorization method according to claim 3, wherein the account authorization method further comprises:
the user sends a login request to the second server;
and the second server calls a login window according to the login request.
5. The account authorization method according to claim 4, wherein the first server regenerates the corresponding verification code according to the identification information and the verification code request information every preset time period, and sends the verification code to the verification code obtaining end.
6. The account authorization method according to claim 5, wherein when the verification code exceeds the preset time, the login window displays "the verification code is invalid"; when the verification code is used, the login window displays 'the verification code is used'; when the verification code does not exist, the login window displays that the verification code does not exist; and when the verification code is verified successfully, displaying success in the login window, and completing the login process.
7. An account authorization system, comprising: the system comprises a first server, a second server and a verification code acquisition end;
the verification code acquisition end sends identity identification information and verification code request information to the first server; the first server generates a corresponding verification code according to the identity identification information and the verification code request information, and sends the verification code to the verification code acquisition end; the user sends the identification information and the verification code to a second server; the second server checks and sends the identification information and the verification code to the first server; the first server verifies the identification information and the verification code sent by the second server and generates a verification result; and allowing the user to log in the second server by the second server according to the verification result.
8. A computer device comprising a memory, a processor and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of claims 1-6 when executing the computer program.
9. A computer-readable storage medium, a non-transitory readable storage medium, having stored therein a computer program, characterized in that the computer program, when executed by a processor, implements the method according to any one of claims 1-6.
10. A computer program product comprising computer readable code that, when executed by a computer device, causes the computer device to perform the method of any of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010034761.4A CN111245841A (en) | 2020-01-14 | 2020-01-14 | Account authorization method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010034761.4A CN111245841A (en) | 2020-01-14 | 2020-01-14 | Account authorization method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111245841A true CN111245841A (en) | 2020-06-05 |
Family
ID=70880789
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010034761.4A Pending CN111245841A (en) | 2020-01-14 | 2020-01-14 | Account authorization method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111245841A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112035810A (en) * | 2020-08-19 | 2020-12-04 | 绿盟科技集团股份有限公司 | Access control method, device, medium and equipment |
CN112149177A (en) * | 2020-09-16 | 2020-12-29 | 河北盖隆网络科技有限公司 | Bidirectional protection method and system for network information security |
CN112651014A (en) * | 2021-02-05 | 2021-04-13 | 湖南华辰悦科技有限公司 | Data authorization method and device for block chain system, storage medium and electronic equipment |
WO2023050524A1 (en) * | 2021-09-30 | 2023-04-06 | 传仲智能数字科技(上海)有限公司 | Im-based user identity authentication method and apparatus, and server and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101582762A (en) * | 2009-04-02 | 2009-11-18 | 北京飞天诚信科技有限公司 | Method and system for identity authentication based on dynamic password |
CN103685311A (en) * | 2013-12-27 | 2014-03-26 | 网易(杭州)网络有限公司 | Log-in validation method and device |
CN109089264A (en) * | 2018-08-02 | 2018-12-25 | 江苏满运软件科技有限公司 | A kind of mobile terminal exempts from the method and system of close login |
-
2020
- 2020-01-14 CN CN202010034761.4A patent/CN111245841A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101582762A (en) * | 2009-04-02 | 2009-11-18 | 北京飞天诚信科技有限公司 | Method and system for identity authentication based on dynamic password |
CN103685311A (en) * | 2013-12-27 | 2014-03-26 | 网易(杭州)网络有限公司 | Log-in validation method and device |
CN109089264A (en) * | 2018-08-02 | 2018-12-25 | 江苏满运软件科技有限公司 | A kind of mobile terminal exempts from the method and system of close login |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112035810A (en) * | 2020-08-19 | 2020-12-04 | 绿盟科技集团股份有限公司 | Access control method, device, medium and equipment |
CN112149177A (en) * | 2020-09-16 | 2020-12-29 | 河北盖隆网络科技有限公司 | Bidirectional protection method and system for network information security |
CN112651014A (en) * | 2021-02-05 | 2021-04-13 | 湖南华辰悦科技有限公司 | Data authorization method and device for block chain system, storage medium and electronic equipment |
WO2023050524A1 (en) * | 2021-09-30 | 2023-04-06 | 传仲智能数字科技(上海)有限公司 | Im-based user identity authentication method and apparatus, and server and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111245841A (en) | Account authorization method and system | |
CN108156237B (en) | Product information pushing method and device, storage medium and computer equipment | |
KR102151331B1 (en) | Electronic payment service processing method and device, and electronic payment method and device | |
CN107426711B (en) | Method, device and system for binding or unbinding mobile phone number | |
US20180218121A1 (en) | System and Method for Online Identity Management | |
CN106254451B (en) | Embedded device web menu control system and method | |
CN101771993B (en) | System and method thereof for realizing polymerization application based on mobile network | |
CN103020826B (en) | Payment processing method and server | |
US9213806B2 (en) | Managing and providing access to applications in an application-store module | |
CN104025539A (en) | Methods And Apparatus To Facilitate Single Sign-On Services | |
CN105378703A (en) | Methods and systems for validating multiple methods of input using unified rule set | |
CN108990047B (en) | Test method, device and medium for subscription relationship management data preparation platform | |
CN106572081B (en) | The method of logon rights verifying | |
WO2016025756A1 (en) | Form filling method and related terminal | |
CN110659569A (en) | Electronic signature method, device, storage medium and electronic equipment | |
CN106453396A (en) | Double token account login method and login verification device | |
CN111355720B (en) | Method, system and equipment for accessing intranet by application and computer storage medium | |
US20210168140A1 (en) | System and Method for Automatically Registering a Verified Identity in an On-Line Environment | |
CN106888086B (en) | System and method for managing account password | |
CN106878244B (en) | Authenticity certification information providing method and device | |
CN111143814A (en) | Single sign-on method, micro-service access platform and storage medium | |
CN107203576A (en) | Information synchronization method and device | |
CN105791249A (en) | Third-party application processing method, device and system | |
CN106790252A (en) | Log-on message sharing method and device | |
CN103415847A (en) | A system and method for accessing a service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200605 |
|
RJ01 | Rejection of invention patent application after publication |