CN112016065B - Dual-user authentication method and device - Google Patents

Dual-user authentication method and device Download PDF

Info

Publication number
CN112016065B
CN112016065B CN201910473118.9A CN201910473118A CN112016065B CN 112016065 B CN112016065 B CN 112016065B CN 201910473118 A CN201910473118 A CN 201910473118A CN 112016065 B CN112016065 B CN 112016065B
Authority
CN
China
Prior art keywords
service
user
identifier
processed
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910473118.9A
Other languages
Chinese (zh)
Other versions
CN112016065A (en
Inventor
周明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN201910473118.9A priority Critical patent/CN112016065B/en
Publication of CN112016065A publication Critical patent/CN112016065A/en
Application granted granted Critical
Publication of CN112016065B publication Critical patent/CN112016065B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application provides a dual-user authentication method and a dual-user authentication device, which relate to the technical field of computers, wherein the method is applied to electronic equipment and comprises the following steps: acquiring a first user identifier of a first user carried by a first service request and a target service identifier of a service to be processed; if the dual user authentication is determined to be performed according to the first user identification and/or the target service identification, a preset dual user authentication message is sent to prompt a second user with the authorization authority of the service to be processed to execute a preset authorization operation; and acquiring the authorization message of the service to be processed, and providing the service to be processed for the first user. By adopting the application, the authority management can be more flexible.

Description

Dual-user authentication method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and apparatus for dual user authentication.
Background
In the authority management of a service system, different users using the service system have different operation authorities. For example, in a surveillance video management system, the identity of a user includes an administrator having operation rights for all operations and a general user having operation rights for part of operations such as playback of surveillance video, downloading of surveillance video.
In the related art, when a general user wants to process a service that does not have operation authority through an electronic device, the general user may request a manager to perform authorization, and the specific processing procedure includes: the manager executes a preset configuration operation to send a configuration request to the electronic equipment, wherein the configuration request carries a first user identifier of the common user and a target service identifier of the service to be processed. After receiving the configuration request, the electronic device may store the first user identifier and the target service identifier correspondingly in a corresponding relation between the pre-stored user identifier and the service identifier, so as to allocate the operation authority of the service to be processed for the common user. After receiving the service request of the common user, the electronic device can determine that the target service identifier corresponding to the first user identifier is locally stored, and provide the service to be processed for the first user.
However, when the normal user completes the service to be processed, in order to avoid that the normal user always has the operation authority of the service to be processed, the manager can only execute the preset cancellation operation, so that the electronic device deletes the target service identifier corresponding to the user identifier of the normal user, that is, manually changes the operation authority already given, thereby resulting in low authorization efficiency.
Disclosure of Invention
The embodiment of the application aims to provide a method and a device for dual user authentication, so that authority management is more flexible. The specific technical scheme is as follows:
in a first aspect, a dual user authentication method is provided, where the method is applied to an electronic device, and the method includes:
acquiring a first user identifier of a first user carried by a first service request and a target service identifier of a service to be processed;
if the dual user authentication is determined to be performed according to the first user identification and/or the target service identification, a preset dual user authentication message is sent to prompt a second user with the authorization authority of the service to be processed to execute a preset authorization operation;
and acquiring the authorization message of the service to be processed, and providing the service to be processed for the first user.
Optionally, the determining the manner of performing the dual user authentication includes:
and if the first user identifier and/or the dual-user authentication identifier corresponding to the target service identifier are locally stored, determining to perform dual-user authentication.
Optionally, the determining the manner of performing the dual user authentication includes:
judging whether the target service identifier is a service identifier corresponding to the first user identifier according to a corresponding relation between a pre-stored service identifier and a user identifier;
And if the target service identifier is the service identifier corresponding to the first user identifier, determining to perform dual-user authentication.
Optionally, before sending the preset dual-user authentication message, the method further includes:
determining a data transmission protocol required for processing the service to be processed;
and if the data transmission protocol is a preset data transmission protocol, executing the step of sending the preset double-user authentication message, wherein the preset data transmission protocol is a data transmission protocol with a protocol expansion function.
Optionally, after the obtaining the authorization message of the service to be processed, the method further includes:
determining the authority expiration time according to the receiving time of the authorization message and the preset authorization valid duration;
if the receiving time of the received second service request is within the authority expiration time, providing the service to be processed for the first user, wherein the second service request carries the first user identifier and the target service identifier, and the receiving time of the second service request is later than the receiving time of the first service request;
and if the receiving time of the second service request is not within the authority expiration time, executing the step of sending the preset double-user authentication message.
Optionally, if the received time of the received second service request is within the authority expiration time, the method further includes:
and determining updated authority expiration time according to the preset processing time length of the service to be processed corresponding to the second service request and the authority expiration time.
Optionally, before the obtaining the first user identifier of the first user carried by the first service request and the target service identifier of the service to be processed, the method further includes:
acquiring a user identifier and a service identifier carried by a configuration request;
and establishing a corresponding relation between the service identifier and the user identifier according to the user identifier and the service identifier.
In a second aspect, there is provided a dual user authentication apparatus, the apparatus being applied to an electronic device, the apparatus comprising:
the first acquisition module is used for acquiring a first user identifier of a first user carried by a first service request and a target service identifier of a service to be processed;
the first determining module is used for sending a preset double-user authentication message to prompt a second user with the authorization authority of the service to be processed to execute a preset authorization operation when the double-user authentication is determined to be performed according to the first user identifier and/or the target service identifier;
The providing module is used for obtaining the authorization message of the service to be processed and providing the service to be processed for the first user.
Optionally, the first determining module includes:
and the first determining submodule is used for determining to carry out the double-user authentication when the double-user authentication identifier corresponding to the first user identifier and/or the target service identifier is locally stored.
Optionally, the first determining module includes:
the judging sub-module is used for judging whether the target service identifier is the service identifier corresponding to the first user identifier according to the corresponding relation between the pre-stored service identifier and the user identifier;
and the second determining submodule is used for determining to carry out double-user authentication when the target service identifier is the service identifier corresponding to the first user identifier.
Optionally, the apparatus further includes:
the second determining module is used for determining a data transmission protocol required by processing the service to be processed;
and the execution module is used for executing the step of sending the preset double-user authentication message when the data transmission protocol is a preset data transmission protocol, wherein the preset data transmission protocol is a data transmission protocol with a protocol expansion function.
Optionally, the apparatus further includes:
the third determining module is used for determining the authority expiration time according to the receiving time of the authorization message and the preset authorization valid duration;
the providing module is further configured to provide the service to be processed for the first user when the receiving time of the received second service request is within the authority expiration time, where the second service request carries the first user identifier and the target service identifier, and the receiving time of the second service request is later than the receiving time of the first service request;
and the execution module is further used for executing the step of sending a preset double-user authentication message when the receiving time of the second service request is not within the authority expiration time.
Optionally, if the received time of the received second service request is within the authority expiration time, the apparatus further includes:
and a fourth determining module, configured to determine an updated authority expiration time according to a preset processing duration of the service to be processed corresponding to the second service request and the authority expiration time.
Optionally, the apparatus further includes:
the second acquisition module is used for acquiring the user identifier and the service identifier carried by the configuration request;
And the establishing module is used for establishing the corresponding relation between the service identifier and the user identifier according to the user identifier and the service identifier.
In a third aspect, an electronic device is provided, including a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete communication with each other through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any of the first aspects when executing a program stored on a memory.
In a fourth aspect, a computer-readable storage medium is provided, in which a computer program is stored which, when being executed by a processor, carries out the method steps of any of the first aspects.
The method and the device for dual user authentication, which are provided by the embodiment of the application, are applied to electronic equipment, and can be used for acquiring the first user identification of the first user carried by the first service request and the target service identification of the service to be processed; if the dual user authentication is determined to be performed according to the first user identification and/or the target service identification, a preset dual user authentication message is sent to prompt a second user with the authorization authority of the service to be processed to execute a preset authorization operation; and then, acquiring an authorization message of the service to be processed, and providing the service to be processed for the first user. Because the service to be processed is provided for the first user after the two user authentications are determined and the authorization message of the second user is received aiming at the received first service request, the authority management can be more flexible.
Of course, it is not necessary for any one product or method of practicing the application to achieve all of the advantages set forth above at the same time.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a dual user authentication method according to an embodiment of the present application;
fig. 2a is a schematic diagram of a dual user authentication message according to an embodiment of the present application;
fig. 2b is a schematic diagram of another dual user authentication message according to an embodiment of the present application;
fig. 3 is a flowchart of a dual user authentication method according to an embodiment of the present application;
fig. 4 is a flowchart of a dual user authentication method according to an embodiment of the present application;
fig. 5 is a flowchart of a dual user authentication method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a dual user authentication device according to an embodiment of the present application;
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The embodiment of the application provides a dual user authentication method which is applied to electronic equipment, wherein the electronic equipment can be a server of a business system, for example, the electronic equipment can be a server of a monitoring video management system. The server of the service system can be in communication connection with the user terminal of the service system at the far end, and dual user authentication can be realized based on the communication between the server and the user terminal. The electronic device may also be a user terminal of a service system, for example, the electronic device may be a computer installed with an application program of a surveillance video management system in a surveillance room, an NVR (Network Video Recorder, network hard disk recorder) connected with a display. When authentication information required for performing the dual user authentication is stored in the user terminal in advance, the dual user authentication can be realized through the user terminal, and the authentication information comprises a user identifier of a user to be subjected to the dual user authentication.
In the embodiment of the application, the business system can be a transaction management system which needs to pass through the cross authentication between two users to ensure the operation safety, such as a OA (Office Automation) office automation system of an enterprise and a monitoring video management system. In the embodiment of the application, a service system is taken as a monitoring video management system, an electronic device is taken as a server of the monitoring video management system as an example, and a specific processing procedure of a dual-user authentication method is described. When the electronic device is a user terminal, the specific processing procedure of the dual user authentication method is similar, and will not be described here again.
In the service system, the identity of the user comprises an administrator, a user to be authorized and an authorized user. The user to be authorized has the operation authority of the partial service, and the authorized user has the authorization authority of the partial service. The manager not only has the operation authority and the authorization authority of all the services, but also can allocate the operation authority of a certain user to be authorized and the authorization authority of a certain authorized user. In one possible implementation, a user to be authorized that does not have the operation authority of a certain service may have the authorization authority of another service, and thus, the user to be authorized may be an authorized user of the user to be authorized that requests to perform another service.
For example, user a does not have the operation right of service 1, has the authorization right of service 2, user B has the authorization right of service 1, and user C does not have the operation right of service 2. If the user A wants to request the service 1 which does not have the operation authority, the user A is the user to be authorized, the user B which has the authorization authority of the service 1 is the authorized user, and the user A needs to request the user B to authorize the user. If the user C wants to request the service 2 which does not have the operation authority, the user C is the user to be authorized, and the user a having the authorization authority of the service 2 is the authorized user, namely, the user to be authorized (user a) which requests the service 1 can be used as the authorized user of the user to be authorized (user C) which requests the service 2.
The embodiment of the application divides the authority for executing a certain service into the operation authority and the authorization authority, and distributes the two authorities to two users correspondingly, and provides the service for the user with the operation authority based on the common verification result of the two users, so that the security of service processing is ensured based on the idea of differentiating the authority, and the authority management can be more flexible.
Optionally, before the user logs in the service system, the manager needs to allocate a corresponding operation right for the user to be authorized and allocate a corresponding authorization right for the authorized user.
Step 1, obtaining a user identifier and a service identifier carried by a configuration request.
In implementation, the manager may log in to a user terminal installed with an application program for monitoring the video management system, and perform a first preset operation to generate a configuration request including the user identifier and the service identifier. The first preset operation may be clicking a user identification icon of the user to be authorized (or a user identification icon of the authorized user) and a service identification icon of a service to be assigned an operation right (or an authorized right to be assigned) in a preset configuration page of the monitoring video management system. The first preset operation may also be to input, in a preset input field of the monitoring video management system, a user identifier of a user to be authorized (or a user identifier of an authorized user), and a service identifier of a service to which an operation right (or an authorized right to be assigned) is to be assigned. The user terminal may then send a configuration request to the electronic device.
And then, the electronic equipment can receive the configuration request and acquire the user identifier and the service identifier carried by the configuration request.
And 2, establishing a corresponding relation between the service identifier and the user identifier according to the user identifier and the service identifier.
In implementation, the electronic device may store the user identifier and the service identifier correspondingly, so as to obtain a corresponding relationship between the service identifier and the user identifier.
In one possible implementation, for an authorized user and a user to be authorized, the electronic device may respectively establish a correspondence between a service identifier and a user identifier. In another possible implementation manner, different user identifier naming rules can be set for the authorized user and the user to be authorized, so that the electronic device determines, according to the user identifier naming rules, that the user to which a certain user identifier belongs has the operation authority or the authorization authority of the service corresponding to the user identifier in the corresponding relationship between the service identifier and the user identifier. In another possible implementation manner, the electronic device may set different service identifier naming rules for the service identifier to be assigned with the authorization right and the service identifier to be assigned with the operation right, so that the electronic device determines, according to the service identifier naming rule, that the user corresponding to a certain service identifier has the operation right or the authorization right of the service to which the service identifier belongs in the corresponding relationship between the service identifier and the user identifier.
In the embodiment of the application, when the service system is a monitoring video management system, a manager can configure the operation authority of the user to be authorized and the authorization authority of the authorized user for each video channel. For example, a certain authorized user has the authorized authority of the surveillance video in the download channel a, and does not have the authorized authority of the surveillance video in the download channel B.
In the embodiment of the application, the electronic equipment can acquire the user identifier and the service identifier carried by the configuration request, and establish the corresponding relation between the service identifier and the user identifier, so that when the service request is received later, whether the service request is started for double user authentication or not is determined according to the corresponding relation, and the received authorization information is verified, thereby realizing comprehensive control on the operation of the user and enabling the authority management to be more flexible.
As shown in fig. 1, a specific processing procedure of the dual user authentication method provided in the embodiment of the present application includes:
step 101, a first user identifier of a first user carried by a first service request and a target service identifier of a service to be processed are obtained.
When the service system is a surveillance video management system, the service request received by the electronic device may be one of a playback request, a download request, and a preview request of the surveillance video. The service requests received by the electronic device may be varied for different service systems, and embodiments of the present application are not limited in detail.
In implementation, when the first user wants to process a certain service, the first user may perform a second preset operation to generate a first service request including a first user identifier of the first user and a target service identifier of a service to be processed. The second preset operation may be clicking an icon representing the service to be processed in a preset configuration page of the monitoring video management system. The second preset operation may also be to input a target service identifier of the service to be processed in a preset input field of the monitoring video management system. The user terminal may then send a first service request to the electronic device.
The electronic device may obtain a first user identifier of a first user carried by the first service request and a target service identifier of a service to be processed.
For example, when the first User wants to play back the surveillance video, the first User may click on an icon representing playback in a preset configuration page of the surveillance video management system to generate a first service request containing a first User identification User1, a target service identification HF of playback.
Step 102, if it is determined to perform dual user authentication according to the first user identifier and/or the target service identifier, a preset dual user authentication message is sent to prompt the second user with the authorization authority of the service to be processed to perform a preset authorization operation.
The electronic device may be preset with a dual user authentication message, where the dual user authentication message is used to prompt a second user with authorization authority of the service to be processed to execute a preset authorization operation. The preset authorization operation may be to input a preset authorization password, or to input a fingerprint of the second user, or to click on a preset confirmation icon.
In implementation, the electronic device may determine whether to perform dual user authentication according to the first user identifier and/or the target service identifier, and the specific processing procedure will be described in detail later.
If it is determined that dual user authentication is performed, the electronic device may send a preset dual user authentication message. If it is determined that the dual user authentication is not performed, the electronic device may directly provide the first user with the service to be processed.
In the embodiment of the application, the dual-user authentication messages sent by the electronic equipment can be the same or different aiming at different users to be authorized. As shown in fig. 2a, for a schematic diagram of a dual user authentication message provided in an embodiment of the present application, an electronic device may send the dual user authentication message for each user to be authorized. As shown in fig. 2b, for another schematic diagram of a dual user authentication message provided in an embodiment of the present application, an electronic device may determine, for each user to be authorized, a second user having authorization rights for a service to be processed, and generate a dual user authentication message including a second user identifier of the second user.
In one possible implementation, the electronic device may send a dual user authentication message to the user terminal of the first user to cause the first user to request the second user to perform a preset authorization operation. In another possible implementation, the electronic device may send a dual user authentication message to the user terminal of the second user, so that the second user performs a preset authorization operation based on the received dual user authentication message. When the second user is authorized, the login state of whether the second user logs in the service system is not particularly limited. The manner in which the electronic device sends the dual user authentication message is also varied, for example, sending a short message, sending a mail.
Step 103, obtaining the authorization message of the service to be processed, and providing the service to be processed for the first user.
In implementation, the second user may perform a preset authorization operation to generate an authorization message, and send the authorization message to the electronic device, where the authorization message may carry a second user identifier of the second user and a target service identifier of the service to be processed.
Then, the electronic device may obtain an authorization message of the service to be processed, and provide the service to be processed for the first user.
For example, when receiving the authorization message including the second User identifier User2 and the target service identifier HF, the electronic device may play the monitoring video corresponding to the first service request.
In the embodiment of the application, the electronic equipment can acquire the first user identifier of the first user carried by the first service request and the target service identifier of the service to be processed; if the dual user authentication is determined to be performed according to the first user identification and/or the target service identification, a preset dual user authentication message is sent to prompt a second user with the authorization authority of the service to be processed to execute a preset authorization operation; and then, acquiring an authorization message of the service to be processed, and providing the service to be processed for the first user. Because the service to be processed is provided for the first user after the two user authentications are determined to be performed and the authorization message is received aiming at the received first service request, the authority management can be more flexible.
In one possible implementation, the electronic device may store, after receiving the authorization message, related authentication information of the secondary authentication, where the related authentication information includes one or more of a time of receiving the first service request, a first user identifier, a second user identifier, and a target service identifier. Therefore, the related authentication information can be conveniently checked later, and the historical processing events of the business system can be recorded and managed.
Optionally, the manner in which the electronic device determines whether to perform the dual user authentication is various, and in one possible implementation manner, the electronic device may have a dual user authentication identifier corresponding to the user identifier and/or the service identifier stored in advance for the user or the service that needs to perform the dual user authentication. Therefore, the electronic device can determine whether to perform the dual-user authentication according to whether the user identification and/or the dual-user authentication identification corresponding to the service identification are stored locally, and the specific processing procedure comprises: and if the two user authentication identifications corresponding to the first user identification and/or the target service identification are locally stored, determining to perform the two user authentication.
In an implementation, after receiving the first service request, the electronic device may acquire a first user identifier and a target service identifier carried by the first service request. The electronic device may determine whether a dual user authentication identifier corresponding to the first user identifier, a dual user authentication identifier corresponding to the target service identifier, or a dual user authentication identifier corresponding to the first user identifier and the target service identifier is stored locally. If the dual user authentication identifier is stored locally, the electronic device can determine to perform dual user authentication; if the dual user authentication identifier is not stored locally, the electronic device may provide the first user with the service to be processed.
In the embodiment of the application, the electronic equipment can judge whether the first user identifier and/or the dual user authentication identifier corresponding to the target service identifier are stored locally or not, and if the first user identifier and/or the dual user authentication identifier corresponding to the target service identifier are stored locally, the dual user authentication is determined to be performed. Therefore, by storing the user authentication identifier for the user and the service, the electronic equipment can set different service processing strategies for users with different service processing requirements, so that the functional diversity of service processing is improved.
Optionally, in another possible implementation manner, the electronic device may determine whether to perform dual-user authentication according to a correspondence between a service identifier and a user identifier, where a specific processing procedure includes:
step one, judging whether the target service identifier is a service identifier corresponding to the first user identifier according to the corresponding relation between the pre-stored service identifier and the user identifier.
In implementation, the electronic device may determine, in a correspondence between service identifiers and user identifiers, a service identifier corresponding to the first user identifier, and then the electronic device may determine whether the target service identifier is a service identifier corresponding to the first user identifier.
If the target service identifier is the service identifier corresponding to the first user identifier, the electronic device may execute the second step; if the target service identifier is not the service identifier corresponding to the first user identifier, the electronic device may execute the step three.
And step two, determining to perform dual-user authentication.
Step three, providing a service to be processed for the first user.
In the embodiment of the application, the electronic equipment can judge whether the target service identifier is the service identifier corresponding to the first user identifier according to the corresponding relation between the service identifier and the user identifier. If the target service identifier is not the service identifier corresponding to the first user identifier, the first user is indicated to have the authority to execute the service to be processed, and the electronic equipment can directly provide the service to be processed for the first user. If the target service identifier is the service identifier corresponding to the first user identifier, the first user is indicated to have no authority to execute the service to be processed, only has the operation authority of the service to be processed, and the electronic equipment can determine to perform the dual-user authentication. Therefore, by judging whether the target service identifier is the service identifier corresponding to the first user identifier, the electronic equipment can set different service processing strategies for users with different service processing requirements, so that the service processing function diversity is improved.
Optionally, when the electronic device needs to process the service to be processed based on the data transmission protocol, before sending the dual user authentication message, the electronic device may determine whether the data transmission protocol to be used supports dual user authentication, as shown in fig. 3, and the specific processing procedure includes:
in step 301, the data transmission protocol required for processing the service to be processed is determined.
The electronic device may have a data transmission protocol stored therein, for example, SCTP (Stream Control Transmission Protocol ), RTSP (Real Time Streaming Protocol, real-time stream transmission protocol). According to the different services to be processed, the data transmission protocols required by the electronic equipment to process the services to be processed are also different. When a certain data transmission protocol has a protocol expansion function, the data transmission protocol can support dual user authentication, and the data transmission protocol is a preset data transmission protocol, for example, SCTP is a preset data transmission protocol, and RTSP is not a preset data transmission protocol.
In implementation, the electronic device may use the data transmission protocol used when the same service to be processed is processed last time as the data transmission protocol required for processing the service to be processed this time.
Or, the corresponding relation between the service identifier and the protocol identifier of the data transmission protocol may be stored in the electronic device in advance, and the electronic device may use the data transmission protocol corresponding to the target service identifier as the data transmission protocol required for processing the service to be processed in the corresponding relation.
Then, the electronic device may determine whether the data transmission protocol is a preset data transmission protocol, if the data transmission protocol is the preset data transmission protocol, the electronic device may determine that the data transmission protocol can support the dual user authentication, and then the electronic device may perform step 302. If the data transfer protocol is not a preset data transfer protocol, the electronic device may determine that the data transfer protocol cannot support dual user authentication, and then the electronic device may perform step 303.
Step 302, a preset dual user authentication message is sent.
Step 303, a preset rejection message is sent to reject providing the service to be processed for the first user.
In the embodiment of the application, when the electronic equipment is the user terminal of the service system, the electronic equipment does not need to process the service to be processed based on the data transmission protocol because the communication with the server of the service system is not involved, so the electronic equipment does not need to execute the steps of determining whether the data transmission protocol to be used supports the double user authentication and the like.
In the embodiment of the application, the electronic equipment determines whether the data transmission protocol can support dual-user authentication by determining the data transmission protocol required for processing the service to be processed and then judging whether the data transmission protocol is a preset data transmission protocol. And when the data transmission protocol is judged to be the preset data transmission protocol, sending a double-user authentication message. Therefore, the electronic equipment does not process the service to be processed based on the data transmission protocol which cannot support the dual user authentication, and can ensure the effectiveness of service processing based on the dual user authentication mode, so that the flexibility of authority management can be improved through the dual user authentication mode.
Optionally, after receiving the authorization message, in order to avoid the problem that the first user needs to frequently request for authorization when requesting for the service to be processed multiple times in the preset time period, as shown in fig. 4, the embodiment of the present application provides an implementation manner, and the specific processing procedure includes:
step 401, determining the authority expiration time according to the receiving time of the authorization message and the preset authorization valid duration.
The electronic device may store a preset authorization valid duration in advance, and the manager may set a specific value of the preset authorization valid duration, where the preset authorization valid duration is, for example, 100s.
In implementation, the electronic device may delay the receiving time of the authorization message by a time after the preset authorization valid duration, as the permission expiration time.
For example, when the receiving time of the authorization message is 8:55:00 on 14 th 4 th 2019 and the preset authorization valid duration is 100s, the electronic device may determine that the permission expiration time is 8:56:40 on 14 th 4 th 2019.
After the electronic device provides the service to be processed for the first user, if the first user requests to process the service again, the first user can execute a preset second operation, so that the user terminal generates a second service request carrying the first user identifier and the target service identifier, and the second service request is sent to the electronic device.
The electronic device may then record the time of receipt of the second service request. When the electronic device determines that the user identifier carried by the second service request is the first user identifier and the service identifier is the target service identifier, the electronic device can determine whether the receiving time of the second service request is within the authority expiration time. If the time of receipt is within the rights expiration time, the electronic device may perform step 402; if the time of receipt is not within the rights expiration time, the electronic device may perform step 403.
For example, when the first user wants to play back another surveillance video, the first user may perform a second preset operation, so that the user terminal generates a second service request and sends the second service request to the electronic device. Then, the electronic device may determine that the receiving time of the second service request is 8:56:00 in 2019, 4 months, 14 days, and determine that the receiving time is within 8:56:40 in the authority expiration time 2019, 4 months, 14 days, and then the electronic device may provide the service to be processed for the first user, that is, play back another monitoring video.
In one possible implementation manner, the electronic device may obtain a processing duration required by the first user to process the service to be processed, and then the electronic device may use a receiving time of the authorization message, and delay a time after a preset authorization valid duration and the processing duration as the permission expiration time.
For example, the first service request is to play back the surveillance video, the service to be processed is a surveillance video with a play duration of 5min, and the electronic device may take a duration required for playing back the surveillance video (i.e. a play duration of the surveillance video) as a processing duration required for the first user to process the service to be processed. The receiving time of the authorization message is 8:55:00 of 14 th 4 th 2019, the preset authorization valid duration is 10s, and the electronic device can determine that the authority expiration time is 9:00:10 of 14 th 4 th 2019.
Step 402, providing a service to be processed for a first user.
Step 403, a preset dual user authentication message is sent.
In the embodiment of the application, the electronic equipment can determine the authority expiration time according to the preset authority effective duration after receiving the authorization message, and provide the service to be processed for the first user within the authority expiration time, so as to avoid the problem that the first user needs to frequently request the authorization when requesting the service to be processed within the preset time period. Thus, rights management can be made more flexible.
Optionally, after receiving the second service request, the electronic device may further update the permission expiration time, where the specific processing procedure is: and determining updated authority expiration time according to the preset processing time length and the authority expiration time of the service to be processed corresponding to the second service request.
In implementation, the electronic device may determine a preset processing duration of the service to be processed corresponding to the second service request, and then the electronic device may delay the authority expiration time by the preset processing duration, and use the obtained time as the updated authority expiration time.
For example, when the second service request is to play back another monitoring video, the electronic device may use the playing time length of the other monitoring video as the preset processing time length of the service to be processed corresponding to the second service request, and then the electronic device may delay the rights expiration time 2019, 4 months, 14 days, 9:00:10 by a time period of 4 minutes, 2019, 4 months, 14 days, 9:04:10 as the updated rights expiration time.
In the embodiment of the application, the electronic equipment can update the authority expiration time according to the preset processing time of the to-be-processed service corresponding to the second service request after receiving the second service request, and provide the to-be-processed service for the first user within the updated authority expiration time, so as to avoid the problem that the first user needs to frequently request for authorization when requesting the to-be-processed service within the preset time period. Thus, rights management can be made more flexible.
The embodiment of the application provides a specific processing procedure of a dual user authentication method, as shown in fig. 5, the specific processing procedure comprises:
step 501, a first user identifier of a first user carried by a first service request and a target service identifier of a service to be processed are obtained.
In implementation, the specific processing procedure of this step is similar to that of step 101, and will not be described here again.
Step 502, if it is determined that the dual user authentication is performed according to the first user identifier and/or the target service identifier, a data transmission protocol required for processing the service to be processed is determined.
In implementation, the specific process of determining to perform the dual user authentication according to the first user identifier and/or the target service identifier is described above, which is not described herein. After determining that the dual user authentication is performed, the electronic device may perform step 503 if the data transmission protocol required for processing the service to be processed is not a preset data transmission protocol, and may perform step 504 if the data transmission protocol is a preset data transmission protocol.
Step 503, a preset rejection message is sent to reject providing the service to be processed for the first user.
Step 504, a preset dual user authentication message is sent to prompt the second user with the authorization authority of the service to be processed to execute the preset authorization operation.
In implementation, the specific processing procedure of this step is similar to that of step 102, and will not be described here again.
Step 505, obtain the authorization message of the service to be processed, provide the service to be processed for the first user.
In implementation, the specific processing procedure of this step is similar to that of step 103, and will not be described here again.
Step 506, determining the authority expiration time according to the receiving time of the authorization message and the preset authorization valid duration.
In implementation, the specific processing procedure of this step is similar to that of step 401, and will not be described here again.
Step 507, if the received second service request has a receiving time within the authority expiration time, providing a service to be processed for the first user, where the second service request carries the first user identifier and the target service identifier, and the receiving time of the second service request is later than the receiving time of the first service request.
In implementation, if the time of receipt of the received second service request is within the rights expiration time, the electronic device may perform step 505.
Step 508, if the received time of the second service request is not within the authority expiration time, a step of sending a preset dual user authentication message is performed.
In implementation, if the time of receipt of the second service request is not within the rights expiration time, the electronic device may perform step 504.
The dual-user authentication method provided by the embodiment of the application can acquire the first user identification of the first user carried by the first service request and the target service identification of the service to be processed; and if the dual user authentication is determined to be performed according to the first user identification and/or the target service identification, determining a data transmission protocol required for processing the service to be processed. If the data transmission protocol is a preset data transmission protocol, a preset double-user authentication message is sent to prompt a second user with the authorization authority of the service to be processed to execute preset authorization operation; and then, acquiring an authorization message of the service to be processed, and providing the service to be processed for the first user. On the one hand, for the received first service request, after the dual-user authentication is determined and the authorization message of the second user is received, the service to be processed is provided for the first user, so that the authority management can be more flexible. On the other hand, the authority expiration time is determined for the first service request, so that the problem that when the first user requests the service to be processed in a preset time period, the first user needs to frequently request for authorization is avoided, and the authority management can be more flexible.
The embodiment of the application also provides a dual user authentication device, as shown in fig. 6, the device is applied to electronic equipment, and the device comprises:
a first obtaining module 610, configured to obtain a first user identifier of a first user carried by a first service request and a target service identifier of a service to be processed;
a first determining module 620, configured to send a preset dual-user authentication message to prompt a second user having authorization authority of the service to be processed to perform a preset authorization operation when dual-user authentication is determined according to the first user identifier and/or the target service identifier;
a providing module 630, configured to obtain an authorization message of the service to be processed, and provide the service to be processed for the first user.
Optionally, the first determining module includes:
and the first determining submodule is used for determining to carry out the double-user authentication when the double-user authentication identifier corresponding to the first user identifier and/or the target service identifier is locally stored.
Optionally, the first determining module includes:
the judging sub-module is used for judging whether the target service identifier is the service identifier corresponding to the first user identifier according to the corresponding relation between the pre-stored service identifier and the user identifier;
And the second determining submodule is used for determining to carry out double-user authentication when the target service identifier is the service identifier corresponding to the first user identifier.
Optionally, the apparatus further includes:
the second determining module is used for determining a data transmission protocol required by processing the service to be processed;
and the execution module is used for executing the step of sending the preset double-user authentication message when the data transmission protocol is a preset data transmission protocol, wherein the preset data transmission protocol is a data transmission protocol with a protocol expansion function.
Optionally, the apparatus further includes:
the third determining module is used for determining the authority expiration time according to the receiving time of the authorization message and the preset authorization valid duration;
the providing module is further configured to provide the service to be processed for the first user when the receiving time of the received second service request is within the authority expiration time, where the second service request carries the first user identifier and the target service identifier, and the receiving time of the second service request is later than the receiving time of the first service request;
and the execution module is further used for executing the step of sending a preset double-user authentication message when the receiving time of the second service request is not within the authority expiration time.
Optionally, if the received time of the received second service request is within the authority expiration time, the apparatus further includes:
and a fourth determining module, configured to determine an updated authority expiration time according to a preset processing duration of the service to be processed corresponding to the second service request and the authority expiration time.
Optionally, the apparatus further includes:
the second acquisition module is used for acquiring the user identifier and the service identifier carried by the configuration request;
and the establishing module is used for establishing the corresponding relation between the service identifier and the user identifier according to the user identifier and the service identifier.
The dual-user authentication device provided by the embodiment of the application can acquire the first user identification of the first user carried by the first service request and the target service identification of the service to be processed; if the dual user authentication is determined to be performed according to the first user identification and/or the target service identification, a preset dual user authentication message is sent to prompt a second user with the authorization authority of the service to be processed to execute a preset authorization operation; and then, acquiring an authorization message of the service to be processed, and providing the service to be processed for the first user. Because the service to be processed is provided for the first user after the two user authentications are determined and the authorization message of the second user is received aiming at the received first service request, the authority management can be more flexible.
The embodiment of the present application further provides an electronic device, as shown in fig. 7, including a processor 701, a communication interface 702, a memory 703 and a communication bus 704, where the processor 701, the communication interface 702, and the memory 703 perform communication with each other through the communication bus 704,
a memory 703 for storing a computer program;
the processor 701 is configured to execute the program stored in the memory 703, and implement the following steps:
acquiring a first user identifier of a first user carried by a first service request and a target service identifier of a service to be processed;
if the dual user authentication is determined to be performed according to the first user identification and/or the target service identification, a preset dual user authentication message is sent to prompt a second user with the authorization authority of the service to be processed to execute a preset authorization operation;
and acquiring the authorization message of the service to be processed, and providing the service to be processed for the first user.
Optionally, the determining the manner of performing the dual user authentication includes:
and if the first user identifier and/or the dual-user authentication identifier corresponding to the target service identifier are locally stored, determining to perform dual-user authentication.
Optionally, the determining the manner of performing the dual user authentication includes:
judging whether the target service identifier is a service identifier corresponding to the first user identifier according to a corresponding relation between a pre-stored service identifier and a user identifier;
and if the target service identifier is the service identifier corresponding to the first user identifier, determining to perform dual-user authentication.
Optionally, before sending the preset dual-user authentication message, the method further includes:
determining a data transmission protocol required for processing the service to be processed;
and if the data transmission protocol is a preset data transmission protocol, executing the step of sending a preset double-user authentication message, wherein the preset data transmission protocol is a data transmission protocol with a protocol expansion function.
Optionally, after the obtaining the authorization message of the service to be processed, the method further includes:
determining the authority expiration time according to the receiving time of the authorization message and the preset authorization valid duration;
if the receiving time of the received second service request is within the authority expiration time, providing the service to be processed for the first user, wherein the second service request carries the first user identifier and the target service identifier, and the receiving time of the second service request is later than the receiving time of the first service request;
And if the receiving time of the second service request is not within the authority expiration time, executing the step of sending a preset double-user authentication message.
Optionally, if the received time of the received second service request is within the authority expiration time, the method further includes:
and determining updated authority expiration time according to the preset processing time length of the service to be processed corresponding to the second service request and the authority expiration time.
Optionally, before the obtaining the first user identifier of the first user carried by the first service request and the target service identifier of the service to be processed, the method further includes:
acquiring a user identifier and a service identifier carried by a configuration request;
and establishing a corresponding relation between the service identifier and the user identifier according to the user identifier and the service identifier.
The communication bus mentioned above for the electronic devices may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the electronic device and other devices.
The Memory may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but also digital signal processors (Digital Signal Processing, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
The electronic equipment provided by the embodiment of the application can acquire the first user identifier of the first user carried by the first service request and the target service identifier of the service to be processed; if the dual user authentication is determined to be performed according to the first user identification and/or the target service identification, a preset dual user authentication message is sent to prompt a second user with the authorization authority of the service to be processed to execute a preset authorization operation; and then, acquiring an authorization message of the service to be processed, and providing the service to be processed for the first user. Because the service to be processed is provided for the first user after the two user authentications are determined and the authorization message of the second user is received aiming at the received first service request, the authority management can be more flexible.
In yet another embodiment of the present application, there is also provided a computer readable storage medium having stored therein a computer program which when executed by a processor implements the steps of any of the above-described two-user authentication methods.
In yet another embodiment of the present application, there is also provided a computer program product containing instructions that, when run on a computer, cause the computer to perform any of the two user authentication methods of the above embodiments.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments in part.
The foregoing description is only of the preferred embodiments of the present application and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application are included in the protection scope of the present application.

Claims (8)

1. A dual user authentication method, the method being applied to an electronic device, the method comprising:
acquiring a first user identifier of a first user carried by a first service request and a target service identifier of a service to be processed;
if the dual user authentication is determined to be performed according to the first user identification and/or the target service identification, a preset dual user authentication message is sent to prompt a second user with the authorization authority of the service to be processed to execute a preset authorization operation;
acquiring an authorization message of the service to be processed, and providing the service to be processed for the first user;
after the authorization message of the service to be processed is obtained, the method further comprises the following steps:
determining the authority expiration time according to the receiving time of the authorization message and the preset authorization valid duration; if the receiving time of the received second service request is within the authority expiration time, providing the service to be processed for the first user, wherein the second service request carries the first user identifier and the target service identifier, and the receiving time of the second service request is later than the receiving time of the first service request; if the receiving time of the second service request is not within the authority expiration time, executing the step of sending the preset double-user authentication message;
If the received time of the received second service request is within the authority expiration time, the method further comprises:
and determining updated authority expiration time according to the preset processing time length of the service to be processed corresponding to the second service request and the authority expiration time.
2. The method of claim 1, wherein the determining a manner in which to perform the dual user authentication comprises:
and if the first user identifier and/or the dual-user authentication identifier corresponding to the target service identifier are locally stored, determining to perform dual-user authentication.
3. The method of claim 1, wherein the determining a manner in which to perform the dual user authentication comprises:
judging whether the target service identifier is a service identifier corresponding to the first user identifier according to a corresponding relation between a pre-stored service identifier and a user identifier;
and if the target service identifier is the service identifier corresponding to the first user identifier, determining to perform dual-user authentication.
4. The method of claim 1, wherein prior to sending the preset double user authentication message, further comprising:
determining a data transmission protocol required for processing the service to be processed;
And if the data transmission protocol is a preset data transmission protocol, executing the step of sending the preset double-user authentication message, wherein the preset data transmission protocol is a data transmission protocol with a protocol expansion function.
5. A method according to claim 3, wherein before the obtaining the first user identifier of the first user carried by the first service request and the target service identifier of the service to be processed, the method further comprises:
acquiring a user identifier and a service identifier carried by a configuration request;
and establishing a corresponding relation between the service identifier and the user identifier according to the user identifier and the service identifier.
6. A dual user authentication apparatus, the apparatus being applied to an electronic device, the apparatus comprising:
the first acquisition module is used for acquiring a first user identifier of a first user carried by a first service request and a target service identifier of a service to be processed;
the first determining module is used for sending a preset double-user authentication message to prompt a second user with the authorization authority of the service to be processed to execute a preset authorization operation when the double-user authentication is determined to be performed according to the first user identifier and/or the target service identifier;
The providing module is used for obtaining the authorization message of the service to be processed and providing the service to be processed for the first user;
the third determining module is used for determining the authority expiration time according to the receiving time of the authorization message and the preset authorization valid duration;
the providing module is further configured to provide the service to be processed for the first user when a receiving time of the received second service request is within the authority expiration time, where the second service request carries the first user identifier and the target service identifier, and the receiving time of the second service request is later than the receiving time of the first service request;
the execution module is used for executing the step of sending a preset double-user authentication message when the receiving time of the second service request is not within the authority expiration time;
if the received time of the received second service request is within the authority expiration time, the apparatus further includes:
and a fourth determining module, configured to determine an updated authority expiration time according to a preset processing duration of the service to be processed corresponding to the second service request and the authority expiration time.
7. The electronic equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
A memory for storing a computer program;
a processor for carrying out the method steps of any one of claims 1-5 when executing a program stored on a memory.
8. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored therein a computer program which, when executed by a processor, implements the method steps of any of claims 1-5.
CN201910473118.9A 2019-05-31 2019-05-31 Dual-user authentication method and device Active CN112016065B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910473118.9A CN112016065B (en) 2019-05-31 2019-05-31 Dual-user authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910473118.9A CN112016065B (en) 2019-05-31 2019-05-31 Dual-user authentication method and device

Publications (2)

Publication Number Publication Date
CN112016065A CN112016065A (en) 2020-12-01
CN112016065B true CN112016065B (en) 2023-10-10

Family

ID=73506358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910473118.9A Active CN112016065B (en) 2019-05-31 2019-05-31 Dual-user authentication method and device

Country Status (1)

Country Link
CN (1) CN112016065B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105930693A (en) * 2016-04-29 2016-09-07 杭州华三通信技术有限公司 Software authorization method and apparatus
US9923927B1 (en) * 2015-09-29 2018-03-20 Amazon Technologies, Inc. Methods and systems for enabling access control based on credential properties
US10007779B1 (en) * 2015-09-29 2018-06-26 Amazon Technologies, Inc. Methods and systems for gradual expiration of credentials
CN109033774A (en) * 2018-08-31 2018-12-18 阿里巴巴集团控股有限公司 Acquisition, the method, apparatus of feedback user resource and electronic equipment
CN109117658A (en) * 2018-08-28 2019-01-01 深圳市鼎昇贸易有限公司 The right management method and Related product of inventory

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9009794B2 (en) * 2011-12-30 2015-04-14 Rovi Guides, Inc. Systems and methods for temporary assignment and exchange of digital access rights
JP2016009276A (en) * 2014-06-23 2016-01-18 富士通株式会社 System, authentication device, authentication program, and authentication method
KR102648770B1 (en) * 2016-07-14 2024-03-15 매직 립, 인코포레이티드 Deep neural network for iris identification

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9923927B1 (en) * 2015-09-29 2018-03-20 Amazon Technologies, Inc. Methods and systems for enabling access control based on credential properties
US10007779B1 (en) * 2015-09-29 2018-06-26 Amazon Technologies, Inc. Methods and systems for gradual expiration of credentials
CN105930693A (en) * 2016-04-29 2016-09-07 杭州华三通信技术有限公司 Software authorization method and apparatus
CN109117658A (en) * 2018-08-28 2019-01-01 深圳市鼎昇贸易有限公司 The right management method and Related product of inventory
CN109033774A (en) * 2018-08-31 2018-12-18 阿里巴巴集团控股有限公司 Acquisition, the method, apparatus of feedback user resource and electronic equipment

Also Published As

Publication number Publication date
CN112016065A (en) 2020-12-01

Similar Documents

Publication Publication Date Title
US10038723B2 (en) Method and apparatus for reliable token revocation
CN108540433B (en) User identity verification method and device
CN105991614B (en) It is a kind of it is open authorization, resource access method and device, server
CN104054321A (en) Security management for cloud services
CN111666539B (en) Real estate resource management method, device, server and storage medium
AU2016253670A1 (en) Automatically identifying reduced availability of multi-channel media distributors for authentication or authorization
CN113014546B (en) Certificate-based authentication registration state management method and system
CN110838971B (en) Message sending method and device, electronic equipment and storage medium
CN108289074A (en) User account login method and device
GB2548441B (en) Automatically determining restored availability of multi-channel media distributors for authentication or authorization
US11283611B2 (en) Token management apparatus and non-transitory computer readable medium storing token management program
CN113761498A (en) Third party login information hosting method, system, equipment and storage medium
US9900639B2 (en) Temporary viewer access to videos from programmers while multichannel video programming distributors are unavailable for authentication and authorization
CN112016065B (en) Dual-user authentication method and device
CN110351719B (en) Wireless network management method, system, electronic equipment and storage medium
CN109828852A (en) A kind of right management method, device, system, equipment and readable storage medium storing program for executing
US10409579B1 (en) Application healthcheck communicator
CN116319993A (en) Security business service request access system, method, device and equipment
CN112235251A (en) Block chain management method and device, computer equipment and storage medium
CN112162923A (en) Interface testing method and device
CN106487776A (en) A kind of method of protection equipment for machine type communication, network entity and system
US8819838B2 (en) Piracy prevention in digital rights management systems
CN116016408A (en) Message sending method and device based on enterprise WeChat platform
KR100993961B1 (en) Method and apparatus for providing service opening information of 3rd party, service authentication information generation method using the method, and service authentication system using the apparatus
CN112668051A (en) Data acquisition method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant