CN114338148A - Interaction method and device, server and storage medium - Google Patents

Interaction method and device, server and storage medium Download PDF

Info

Publication number
CN114338148A
CN114338148A CN202111623125.6A CN202111623125A CN114338148A CN 114338148 A CN114338148 A CN 114338148A CN 202111623125 A CN202111623125 A CN 202111623125A CN 114338148 A CN114338148 A CN 114338148A
Authority
CN
China
Prior art keywords
information
application program
request
program
token
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111623125.6A
Other languages
Chinese (zh)
Other versions
CN114338148B (en
Inventor
黄瑾
陈大平
程明远
范雄健
江邹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCB Finetech Co Ltd
Original Assignee
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCB Finetech Co Ltd filed Critical CCB Finetech Co Ltd
Priority to CN202111623125.6A priority Critical patent/CN114338148B/en
Publication of CN114338148A publication Critical patent/CN114338148A/en
Application granted granted Critical
Publication of CN114338148B publication Critical patent/CN114338148B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The application relates to the technical field of big data intelligent analysis, in particular to an interaction method and device, a server and a storage medium. The interaction method comprises the following steps: the method comprises the steps that an interaction request which is sent by a terminal through a first application program and aims at a second application program is obtained, the interaction request comprises a mutual access request and/or a mutual authentication request, the interaction request comprises a first token identification corresponding to the first application program, and the terminal comprises the first application program and the second application program; obtaining first token information corresponding to the first token identification in a user center, wherein the user center comprises a token information set corresponding to at least one application program; and executing the interactive operation corresponding to the interactive request based on the first token information. By the method and the device, the information interaction safety can be improved while the interaction convenience is improved.

Description

Interaction method and device, server and storage medium
Technical Field
The application relates to the technical field of big data intelligent analysis, in particular to an interaction method and device, a server and a storage medium.
Background
With the development of economic technology and the increase of life rhythm and working intensity, how to improve the use experience of users becomes the center of attention of various industries. When a user registers in one of the applications in the terminal, the server corresponding to the application may store the registration information input by the user. When the user needs to use the registration information to access other application programs, the server corresponding to the application program can implement access control on the user. However, there is no clear user interaction standard between servers corresponding to different applications, so that the convenience of interaction is poor, and the security of the registration information in the interaction is poor.
Disclosure of Invention
The application provides an interaction method and device, a server and a storage medium, and mainly aims to improve the interaction convenience and the information interaction safety.
According to an aspect of the present application, there is provided an interaction method, including:
the method comprises the steps that an interaction request aiming at a second application program sent by a terminal through a first application program is obtained, the interaction request comprises a mutual access request and/or a mutual authentication request, and the terminal comprises the first application program and the second application program;
acquiring first token information corresponding to the first application program in a user center;
and executing the interactive operation corresponding to the interactive request based on the first token information.
Optionally, the performing, based on the first token information, an interaction operation corresponding to the interaction request includes:
acquiring first program information corresponding to the first application program and second program information corresponding to the second application program;
and executing the interactive operation corresponding to the interactive request based on the first program information, the second program information and the first token information.
Optionally, the first program information is a first security level, the second program information is a second security level, and the performing, based on the first program information, the second program information, and the first token information, an interactive operation corresponding to the interactive request includes:
if the interactive request is a mutual-recognition request, acquiring a first security level corresponding to the first application program and a second security level corresponding to the second application program;
if the first security level is higher than or equal to the second security level, performing an authentication operation for the second application based on the first token information;
and if the first security level is lower than the second security level, acquiring the input authentication information aiming at a second application program, and executing authentication operation aiming at the second application program.
Optionally, the first program information is a first security level, the second program information is a second security level, and the performing, based on the first program information, the second program information, and the first token information, an interactive operation corresponding to the interactive request includes:
if the interactive request is an interactive access request, acquiring a first security level corresponding to the first application program and a second security level corresponding to the second application program;
if the first security level is higher than or equal to the second security level, performing an access operation for the second application program based on the first token information;
and if the first security level is lower than the second security level, acquiring the input access information aiming at a second application program, and executing the access operation aiming at the second application program.
Optionally, before the obtaining of the first program information corresponding to the first application program and the second program information corresponding to the second application program, the method includes:
acquiring the first application program and first program information corresponding to the first application program, and acquiring the second application program and second program information corresponding to the second application program;
and storing the first application program and the first program information corresponding to the first application program in an associated manner, and storing the second application program and the second program information corresponding to the second application program in an associated manner.
Optionally, the obtaining, in the user center, first token information corresponding to the first application program includes:
acquiring registration information corresponding to the first application program in a user center;
and generating first token information corresponding to the first application program based on the interaction request and the registration information, wherein the first token information comprises a user identifier, a first application identifier corresponding to the first application program, a second application identifier corresponding to the second application program and verification information.
Optionally, after generating the first token information corresponding to the first application program based on the interaction request and the registration information, the method further includes:
and if the verification information meets the verification condition, encrypting the first token information to obtain the encrypted first token information, wherein the use times of the encrypted first token information is one time.
Optionally, after the obtaining of the interaction request for the second application sent by the terminal through the first application, the method includes:
if the interaction request is the mutual authentication request, second token information corresponding to the second application program is obtained in the user center;
and responding to the mutual authentication request based on the second token information, and executing authentication operation aiming at the first application program.
According to an aspect of the present application, there is provided an interaction apparatus, including:
the terminal comprises a request acquisition unit, a request processing unit and a processing unit, wherein the request acquisition unit is used for acquiring an interaction request aiming at a second application program, which is sent by a terminal through a first application program, the interaction request comprises a mutual access request and/or a mutual authentication request, and the terminal comprises the first application program and the second application program;
the information acquisition unit is used for acquiring first token information corresponding to the first application program in a user center;
and the operation execution unit is used for executing the interactive operation corresponding to the interactive request based on the first token information.
Optionally, the operation executing unit, when executing the interactive operation corresponding to the interactive request based on the first token information, is specifically configured to:
acquiring first program information corresponding to the first application program and second program information corresponding to the second application program;
and executing the interactive operation corresponding to the interactive request based on the first program information, the second program information and the first token information.
Optionally, the first program information is a first security level, the second program information is a second security level, and the operation execution unit is configured to, when executing the interactive operation corresponding to the interactive request based on the first program information, the second program information, and the first token information, specifically:
if the interactive request is a mutual-recognition request, acquiring a first security level corresponding to the first application program and a second security level corresponding to the second application program;
if the first security level is higher than or equal to the second security level, performing an authentication operation for the second application based on the first token information;
and if the first security level is lower than the second security level, acquiring the input authentication information aiming at a second application program, and executing authentication operation aiming at the second application program.
Optionally, the first program information is a first security level, the second program information is a second security level, and the operation execution unit is configured to, when executing the interactive operation corresponding to the interactive request based on the first program information, the second program information, and the first token information, specifically:
if the interactive request is an interactive access request, acquiring a first security level corresponding to the first application program and a second security level corresponding to the second application program;
if the first security level is higher than or equal to the second security level, performing an access operation for the second application program based on the first token information;
and if the first security level is lower than the second security level, acquiring the input access information aiming at a second application program, and executing the access operation aiming at the second application program.
Optionally, the apparatus includes an information storage unit, configured to, before the obtaining of the first program information corresponding to the first application program and the second program information corresponding to the second application program, obtain the first program information corresponding to the first application program and the first application program, and obtain the second program information corresponding to the second application program and the second application program;
and storing the first application program and the first program information corresponding to the first application program in an associated manner, and storing the second application program and the second program information corresponding to the second application program in an associated manner.
Optionally, the information obtaining unit is configured to, when obtaining the first token information corresponding to the first application program in the user center, specifically:
acquiring registration information corresponding to the first application program in a user center;
and generating first token information corresponding to the first application program based on the interaction request and the registration information, wherein the first token information comprises a user identifier, a first application identifier corresponding to the first application program, a second application identifier corresponding to the second application program and verification information.
Optionally, the apparatus includes an information encrypting unit, configured to encrypt the first token information to obtain encrypted first token information if the verification information satisfies a verification condition after the first token information corresponding to the first application is generated based on the interaction request and the registration information, where the number of times of use of the encrypted first token information is one.
Optionally, the operation execution unit is further configured to, after the obtaining terminal sends an interaction request for a second application program through a first application program, obtain, in the user center, second token information corresponding to the second application program if the interaction request is the mutual authentication request;
and responding to the mutual authentication request based on the second token information, and executing authentication operation aiming at the first application program.
According to an aspect of the present application, there is provided a server including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of the preceding aspects.
According to an aspect of the present application, there is provided an interaction method, the method including:
acquiring an interactive instruction aiming at a second application program in a first application program;
generating an interaction request corresponding to the interaction instruction, wherein the interaction request comprises a mutual access request and/or a mutual recognition request, and the interaction request comprises a first token identifier corresponding to the first application program;
and sending the interaction request to a server through the first application program, wherein the interaction request is used for indicating the server to acquire first token information corresponding to the first token identification in a user center, and executing interaction operation corresponding to the interaction request based on the first token information.
Optionally, after the sending the interaction request to the server by the first application program, the method further includes:
acquiring an interactive verification result sent by the server aiming at the interactive request;
and displaying a display interface corresponding to the interactive request based on the interactive verification result.
According to an aspect of the present application, there is provided an interaction apparatus, the method including:
the instruction acquisition unit is used for acquiring an interactive instruction aiming at a second application program in the first application program;
a request generating unit, configured to generate an interaction request corresponding to the interaction instruction, where the interaction request includes a mutual access request and/or a mutual authentication request, and the interaction request includes a first token identifier corresponding to the first application program;
and the request sending unit is used for sending the interaction request to a server through the first application program, wherein the interaction request is used for indicating the server to acquire first token information corresponding to the first token identifier in a user center, and executing interaction operation corresponding to the interaction request based on the first token information.
Optionally, the apparatus further includes an interface display unit, configured to obtain an interaction verification result sent by the server for the interaction request after the interaction request is sent to the server by the first application program;
and displaying a display interface corresponding to the interactive request based on the interactive verification result.
According to an aspect of the present application, there is provided a terminal including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of the preceding aspects.
According to an aspect of the application, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of the preceding aspects.
According to an aspect of the application, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the method of any of the preceding aspects.
In one or more embodiments of the present application, by obtaining an interaction request for a second application sent by a terminal through a first application, where the interaction request includes an inter-access request and/or an inter-authentication request, the interaction request includes a first token identifier corresponding to the first application, the terminal includes the first application and the second application, obtaining first token information corresponding to the first token identifier in a user center, and performing an interaction operation corresponding to the interaction request based on the first token information. The token information is stored in the user center, so that the transmission process of the token information can be reduced, the complexity of interactive operation steps is reduced, meanwhile, the token information does not need to be transmitted, and the probability that the token information is lost or tampered in the transmission process is reduced, so that the interactive convenience is improved, and the information interaction safety is improved.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present application, nor do they limit the scope of the present application. Other features of the present application will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not intended to limit the present application. Wherein:
fig. 1 is a background diagram illustrating an interaction method provided in an embodiment of the present application;
fig. 2 is a flowchart illustrating a first interaction method provided in an embodiment of the present application;
fig. 3 is a flowchart illustrating a second interaction method provided in an embodiment of the present application;
fig. 4 is a schematic diagram illustrating an example of a first terminal interface provided in an embodiment of the present application;
fig. 5 is a flowchart illustrating a third interaction method provided in the embodiment of the present application;
fig. 6 is a schematic diagram illustrating an example of a second terminal interface provided in an embodiment of the present application;
fig. 7 is a schematic diagram illustrating an example of a third terminal interface provided in an embodiment of the present application;
fig. 8 is a flowchart illustrating a third interaction method provided in the embodiment of the present application;
fig. 9 is a flowchart illustrating a fourth interaction method provided in the embodiment of the present application;
fig. 10 is a schematic structural diagram of a first interaction device provided in an embodiment of the present application;
fig. 11 is a schematic structural diagram of a second interaction device provided in an embodiment of the present application;
fig. 12 is a schematic structural diagram of a third interaction device provided in an embodiment of the present application;
fig. 13 is a schematic structural diagram of a second interaction device provided in an embodiment of the present application;
fig. 14 is a schematic structural diagram of a third interaction device provided in an embodiment of the present application;
fig. 15 shows a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the description of the present application, it is to be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In the description of the present application, it is noted that, unless explicitly stated or limited otherwise, "including" and "having" and any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art. Further, in the description of the present application, "a plurality" means two or more unless otherwise specified. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
With the development of economic technology and the increase of life rhythm and working intensity, how to improve the use experience of users becomes the center of attention of various industries. The financial science and technology strategy is abbreviated as TOP +. And T, scientific and technological drive, which forms double elements by technology and data and double-wheel drive financial innovation. And O, capability opening, wherein the group business functions and data are opened to the society in a service mode. P, platform ecology, platform construction and platform connection, and the platform connection platform stands on to jointly construct the user ecology. An ecological circle is built through a platform, a social pain point civil hotspot is oriented, a large row is performed, and the opening capability is embedded into an ecological scene.
In some embodiments, fig. 1 illustrates a background diagram of an interaction method provided by an embodiment of the present application. As shown in fig. 1, in order to transfer user information between an organization to which a certain application belongs and a resource providing organization, it is generally required to establish an identity provider (IdP) at the organization to which a certain application belongs, authenticate a user, and manage identity information of the user; a Service Provider (SP) is established at a resource provider to perform access control for a user. Since users accessing the same resource may come from different identity providers, the federation also needs to establish a special Discovery Service (DS) to help the service provider determine the identity provider to which the user belongs.
According to some embodiments, users of the present federation may also be allowed access to other federation resources, for example, a dedicated SP, denoted as an inter-fed-SP, may be established in the present federation. The access behavior of the user is limited, and the user in the local alliance must access the InterFed-SP before accessing any SP in another alliance. Thus, the InterFed-SP can obtain the identity information of the user.
It is easy to understand that there may be some differences in the specific interaction steps between the user, IdP and SP, and the technical details of each step of interaction in different federations. When resource sharing is performed in a federation, the IdP and the SP are often managed by different organizations respectively, wherein sensitive user identity information is involved in the transfer, so that the security of user information is poor, and in addition, no clear user interaction standard exists between different federations, so that the convenience of interaction is poor.
The present application will be described in detail with reference to specific examples.
In one embodiment, as shown in fig. 2, fig. 2 shows a flowchart of a first interaction method provided by the embodiment of the present application, which may be implemented by relying on a computer program and may be run on a device including a display screen. The computer program may be integrated into the application or may run as a separate tool-like application.
Specifically, the interaction method comprises the following steps:
s101, acquiring an interaction request aiming at a second application program, which is sent by a terminal through a first application program;
according to some embodiments, the terminal of the embodiments of the present application refers to a terminal installed with at least one application, and the at least one application does not refer to a certain fixed application specifically, for example, when the number of applications included in the at least one application changes, the at least one application may also change correspondingly. At least one application may also change accordingly, for example, when the type of application that the at least one application includes changes. For example, the terminal may include a first application and a second application.
It is easy to understand that the terminal of the embodiment of the present application includes but is not limited to: wearable devices, handheld devices, personal computers, tablet computers, in-vehicle devices, smart phones, computing devices or other processing devices connected to a wireless modem, and the like. Servers in different networks may be called different names, for example: user equipment, access server, subscriber unit, subscriber station, Mobile station, remote server, Mobile device, subscriber server, wireless Communication device, user agent or user equipment, cellular telephone, cordless telephone, Personal Digital Assistant (PDA), fifth Generation Mobile Communication Technology (5G) network, fourth Generation Mobile Communication Technology (4 th Generation Mobile Communication)
communication technology, 4G) network, a third Generation mobile communication technology (3rd-Generation, 3G) network, or a terminal in a future evolution network, etc.
Optionally, the first application refers to any application in the applications installed in the terminal. The first application is not specific to a fixed application. The first application may also change accordingly, for example, when the terminal detects that the application of the interaction request input by the user changes. The second application is an application used by a terminal other than the first application for interaction through the first application. The second application is not specific to a fixed application. The second application may also change accordingly, for example, when the interaction object changes.
In some embodiments, the interaction request refers to a request for a first application and a second application to effect an interaction. Wherein the interactive request comprises a mutual access request and/or a mutual authentication request. For example, the interactive request may include only an interactive access request, and the interactive request may also include only a mutual authentication request. Wherein the interactive request does not refer specifically to a fixed request. The interaction request may also change accordingly, for example, when the first application or the second application changes.
According to some embodiments, the interaction request includes a first token identification corresponding to the first application. The token identifies a token that identifies the application. The first token identification does not refer to a fixed identification. The first token identification may also change accordingly, for example, when the first application changes.
According to some embodiments, the interactive request may be, for example, an interactive request generated by the terminal when the terminal detects that the user clicks an interactive link corresponding to the second application in the first application.
In some embodiments, when the server performs the interaction method, upon detecting an interaction request for the second application sent by the terminal through the first application, the server may obtain the interaction request for the second application sent by the terminal through the first application.
S102, acquiring first token information corresponding to a first token identification in a user center;
according to some embodiments, the user center refers to a module that the server sets up for managing user information in a unified manner. The user center is not specific to a fixed user center. The user center may change accordingly, for example, when token information included in the user center changes. For example, when the application targeted by the user center changes, the user center may also change accordingly. Wherein the user center comprises a set of token information corresponding to at least one application. That is, at least one token information is stored in the user center, and one token information corresponds to one application program. The token information set does not refer to a fixed information set. The set of token information may also change, for example, when the amount of token information included in the set of token information changes. For example, when the token information in the token information set changes, the token information set may also change accordingly.
In some embodiments, the first token information refers to token information corresponding to the first token identification. The first token information does not refer to a fixed token information. For example, when the acquisition time point of the first token information changes, the first token information may also change accordingly. The first token information may also change accordingly, for example, when the type of information included in the first token information changes.
In some embodiments, when the server performs the interaction method, upon detecting an interaction request for the second application sent by the terminal through the first application, the server may obtain the interaction request for the second application sent by the terminal through the first application. The interaction request comprises a first token identifier, and when the server acquires the interaction request, the server can acquire first token information corresponding to the first token identifier in the user center.
S103, based on the first token information, executing the interactive operation corresponding to the interactive request.
In some embodiments, the interaction may refer to an interaction for the second application, the interaction corresponding to the interaction request. That is, when the interactive request changes, the interactive operation may also change accordingly.
In some embodiments, when the server performs the interaction method, upon detecting an interaction request for the second application sent by the terminal through the first application, the server may obtain the interaction request for the second application sent by the terminal through the first application. When the server obtains the interaction request, the server may obtain first token information corresponding to the first token identifier in the user center. When the server acquires the first token information, the server may execute an interactive operation corresponding to the interactive request based on the first token information.
In one or more embodiments of the present application, by obtaining an interaction request for a second application sent by a terminal through a first application, where the interaction request includes an inter-access request and/or an inter-authentication request, the interaction request includes a first token identifier corresponding to the first application, the terminal includes the first application and the second application, obtaining first token information corresponding to the first token identifier in a user center, and performing an interaction operation corresponding to the interaction request based on the first token information. The token information is stored in the user center, so that the transmission process of the token information can be reduced, the complexity of interactive operation steps is reduced, meanwhile, the token information does not need to be transmitted, and the probability that the token information is lost or tampered in the transmission process is reduced, so that the interactive convenience is improved, and the information interaction safety is improved.
Referring to fig. 3, fig. 3 is a schematic flowchart illustrating a second interaction method according to an embodiment of the present application. Specifically, the method comprises the following steps:
s201, acquiring an interaction request aiming at a second application program, which is sent by a terminal through a first application program;
the specific process is as described above, and is not described herein again.
In some embodiments, the first application may be, for example, an a application and the second application may be, for example, a B application. The display interface of the terminal before the terminal generates no interactive request may be as shown in fig. 4, for example. The interactive link corresponding to the B application program may be displayed in the display interface corresponding to the a application program displayed by the terminal, for example. When the terminal detects that the user clicks the interactive link, the terminal can generate an interactive request, and the terminal can transmit the interactive request aiming at the B application program to the server through the A application program. The a application may be a banking application, for example, and the B application may be a game application, for example.
S202, first token information corresponding to a first token identification is obtained in a user center;
the specific process is as described above, and is not described herein.
According to some embodiments, before acquiring first program information corresponding to a first application program and second program information corresponding to a second application program, a server may acquire the first program information corresponding to the first application program and the first application program, acquire the second program information corresponding to the second application program and the second application program, and store the first program information corresponding to the first application program and the first application program in an associated manner, and store the second program information corresponding to the second application program and the second application program in an associated manner, so that the acquisition duration of program information may be reduced, and the convenience of acquiring the first program information and the second program information may be improved.
In some embodiments, the first program information refers to information corresponding to the first application program stored in the server. The first program information includes, but is not limited to, security level information, frequency of use information, and the like. The first program information does not refer to a fixed information. For example, when the type of information included in the first program information changes, the first program information may also change accordingly. The second program information is information corresponding to the second application program stored in the server. The second program information includes, but is not limited to, security level information, frequency of use information, and the like. The first program information does not refer to a fixed information. For example, when the type of information included in the second program information changes, the second program information may also change accordingly.
For example, the first program information may be, for example, a first security level, and the second program information may be, for example, a second security level. When the server obtains the first security level corresponding to the first application program and the second security level corresponding to the second application program, the server may store the first security level corresponding to the first application program in an associated manner, and store the second security level corresponding to the second application program in an associated manner.
S203, acquiring first program information corresponding to the first application program and second program information corresponding to the second application program;
according to some embodiments, when the server acquires the first token information corresponding to the first application program in the user center, the server may acquire first program information corresponding to the first application program and second program information corresponding to the second application program. For example, when the first program information is a first security level and the second program information is a second security level, the server may obtain the first security level corresponding to the first application program and the second security level corresponding to the second application program.
It is easy to understand that, when the terminal sends the interaction request for the B application program to the server through the a application program, the server may obtain the interaction request. The server may obtain the first token information corresponding to the application program a in the user center. The server can also obtain a first security level corresponding to the application program A and a second security level corresponding to the application program B.
And S204, executing interactive operation corresponding to the interactive request based on the first program information, the second program information and the first token information.
The specific process is as described above, and is not described herein again.
According to some embodiments, when the server acquires the first token information corresponding to the first application program, and acquires the first program information corresponding to the first application program and the second program information corresponding to the second application program in the user center, the server may execute the interactive operation corresponding to the interactive request based on the first program information, the second program information, and the first token information.
It is easy to understand that, for example, when the server obtains the first token information corresponding to the application a in the user center, and the server obtains the first security level corresponding to the application a and the second security level corresponding to the application B, the server may perform the interactive operation corresponding to the interactive request based on the first token information, the first security level, and the second security level.
According to some embodiments, the first program information is a first security level, the second program information is a second security level, and the server may obtain a request type of the interactive request when the server performs an interactive operation corresponding to the interactive request based on the first program information, the second program information, and the first token information. If the request type indicates that the interactive request is a mutual authentication request, the server may obtain a first security level corresponding to the first application program and a second security level corresponding to the second application program. When the server obtains the first security level and the second security level, the server may detect the levels of the first security level and the second security level. If the first security level is higher than or equal to the second security level, the authentication operation for the second application program is executed based on the first token information, so that the input of the authentication information can be reduced, the user does not need to log in again, and the convenience of the authentication operation can be improved; if the first security level is lower than the second security level, the input authentication information aiming at the second application program is obtained, the authentication operation aiming at the second application program is executed, the first security level and the second security level are detected, and the interaction security of the application program can be improved.
It is easily understood that, for example, the server may acquire the first token information corresponding to the a application in the user center. The first security level that the server acquires the application program a corresponding to may be, for example, a fourth security level. The second security level corresponding to the B application may be, for example, a third level security level. And if the numerical value corresponding to the safety level is larger, the safety level is higher. The server determines that the first security level is higher than the second security level, that is, the server determines that the fourth security level is higher than the third security level, the server may perform an authentication operation for the second application based on the first token information, that is, the server may complete the authentication operation for the second application using the first token information without the user inputting authentication information for the second application again.
Optionally, the first security level that the server acquires the application program of a corresponds to may be, for example, a second security level. The second security level corresponding to the B application may be, for example, a third level security level. When the server determines that the second-level security level is lower than the third-level security level, the server may acquire authentication information input for the B application program, and complete an authentication operation for the B application program based on the authentication information.
According to some embodiments, the first program information is a first security level, the second program information is a second security level, and the server may obtain a request type of the interactive request when the server performs an interactive operation corresponding to the interactive request based on the first program information, the second program information, and the first token information. If the request type indicates that the interactive request is an interactive request, the server may obtain a first security level corresponding to the first application program and a second security level corresponding to the second application program. When the server obtains the first security level and the second security level, the server may detect the levels of the first security level and the second security level. If the first security level is higher than or equal to the second security level, the access operation for the second application program is executed based on the first token information, so that the input of authentication information can be reduced, the user does not need to log in again, and the convenience of the authentication operation can be improved; if the first security level is lower than the second security level, the input access information for the second application program is acquired, and the access operation for the second application program is executed, so that the situation that the application program with the lower security level directly accesses the application program with the higher security level, the application program with the higher security level is tampered, and the interaction security of the application program can be improved.
It is easily understood that, for example, the server may acquire the first token information corresponding to the a application in the user center. The first security level that the server acquires the application program a corresponding to may be, for example, a fourth security level. The second security level corresponding to the B application may be, for example, a third level security level. And if the numerical value corresponding to the safety level is larger, the safety level is higher. The server determines that the first security level is higher than the second security level, that is, the server determines that the fourth security level is higher than the third security level, the server may perform an inter-access operation for the second application based on the first token information, that is, the server may complete an access operation for the second application using the first token information without the user inputting access information for the second application again.
Optionally, the first security level that the server acquires the application program of a corresponds to may be, for example, a second security level. The second security level corresponding to the B application may be, for example, a third level security level. When the server determines that the second-level security level is lower than the third-level security level, the server may acquire access information input for the B application program, and based on the access information, complete an access operation for the B application program.
In one or more embodiments of the present application, an interaction request for a second application sent by a terminal through a first application may be obtained, first token information corresponding to the first application may be obtained in a user center, first program information corresponding to the first application and second program information corresponding to the second application may be obtained, and an interaction operation corresponding to the interaction request may be performed based on the first program information, the second program information, and the first token information. The method can determine whether to execute the interactive operation based on the first program information and the second program information, can improve the safety of the interactive operation, and reduce the condition that the operation is inaccurate due to the fact that the first program information or the second program information does not meet the requirement.
Referring to fig. 5, fig. 5 is a flowchart illustrating a second interaction method according to an embodiment of the present application. Specifically, the method comprises the following steps:
s301, acquiring an interaction request aiming at a second application program, which is sent by a terminal through a first application program;
the specific process is as described above, and is not described herein again.
S302, obtaining registration information corresponding to the first token identification in the user center;
in some embodiments, the registration information refers to information entered by the user when first registering in the first application. For example, when the terminal acquires information input when the user registers in the first application program for the first time, the terminal may send the registration information to the server, and the server may store the registration information in the user center.
According to some embodiments, the registration information includes, but is not limited to, a user identification, a login password, and the like.
S303, generating first token information corresponding to the first token identification based on the interaction request and the registration information;
in some embodiments, the first token information includes a user identification, a first application identification corresponding to the first application, a second application identification corresponding to the second application, and verification information. The user identification includes, but is not limited to, a user name, a certificate number, a certificate type, a user identification number, and the like.
According to some embodiments, when the server acquires the interaction request and the registration information, first token information corresponding to the first token identifier may be acquired.
According to some embodiments, after generating the first token information corresponding to the first token identifier based on the interaction request and the registration information, if the verification information satisfies the verification condition, the server may encrypt the first token information to obtain the encrypted first token information, where the number of times of use of the encrypted first token information is one, which may improve security of token information transmission and improve security of interaction between different applications.
According to some embodiments, the server may obtain a first token identifier in the interaction request, that is, a first token identifier sent by the terminal through the first application program, and the server may search, in the user center, for first token information corresponding to the first token identifier based on the first token identifier.
S304, based on the first token information, executing the interactive operation corresponding to the interactive request.
The specific process is as described above, and is not described herein.
According to some embodiments, the first token information includes a user identification, a first application identification corresponding to the first application, a second application identification corresponding to the second application, and verification information. The server may obtain a first application identifier corresponding to the first application program and a second application identifier corresponding to the second application program in the interactive request, and search for a record in the record lookup table based on the verification information, the first application identifier, and the second application identifier. The verification information includes, but is not limited to, validity time, verification flag, etc. If the server determines that the verification time point in the first token information is within the verification validity duration and the verification flag satisfies the verification condition, the server may determine that the interactive operation for the second application may be completed based on the first token information. The server may transmit the encrypted first token information to the terminal. The terminal can start the second application program based on the first token information, and display a display interface corresponding to the second application program on the terminal interface. A schematic diagram of the change of the terminal interface at this time can be shown in fig. 6.
According to some embodiments, after acquiring an interaction request for a second application program sent by a terminal through a first application program, if the interaction request is a mutual authentication request, second token information corresponding to a second token identifier is acquired in a user center, where the second token identifier corresponds to the second application program. And performing an authentication operation for the first application in response to the mutual authentication request based on the second token information. Namely, the server can complete the authentication operation of the first application program based on the token information corresponding to the authenticated application program, thereby improving the convenience of the interactive operation.
In some embodiments, the second token identifier refers to identification information corresponding to the second application, and the second token identifier does not refer to a specific fixed identifier. For example, when the second application changes, the second token identification may also change accordingly.
According to some embodiments, the second token information includes a user identification, a first application identification corresponding to the first application, a second application identification corresponding to the second application, and verification information. The server may obtain a first application identifier corresponding to the first application program and a second application identifier corresponding to the second application program in the interactive request, and search for a record in the record lookup table based on the verification information, the first application identifier, and the second application identifier. If the server determines that the verification time point in the second token information is within the verification validity duration and the verification flag satisfies the verification condition, the server may determine that the interactive operation for the first application program may be completed based on the second token information. The server may transmit the encrypted second token information to the terminal. The terminal may complete an authentication operation for the first application based on the second token information. At this time, the terminal may display a prompt message that the first application completes the authentication operation on the terminal interface. An exemplary schematic of the terminal interface at this time can be as shown in fig. 7.
In one or more embodiments of the present application, an interaction request, which is sent by a terminal through a first application program and is directed to a second application program, is obtained, registration information corresponding to a first token identifier is obtained in a user center, first token information corresponding to the first token identifier is generated based on the interaction request and the registration information, and an interaction operation corresponding to the interaction request is performed based on the first token information. In addition, the token information is stored in the user center, so that the transmission process of the token information can be reduced, the complexity of interactive operation steps is reduced, meanwhile, the token information does not need to be transmitted, and the probability that the token information is lost or tampered in the transmission process is reduced, so that the interactive convenience is improved, and the information interaction safety is improved.
Referring to fig. 8, fig. 8 is a flowchart illustrating a third interaction method according to an embodiment of the present application. Specifically, the method comprises the following steps:
s301, acquiring an interactive instruction aiming at a second application program in a first application program;
according to some embodiments, the first application refers to any one of applications installed by the terminal. The first application is not specific to a fixed application. For example, when the terminal detects that the application program of the interactive instruction input by the user changes, the first application program can also change correspondingly. The second application is an application used by a terminal other than the first application for interaction through the first application. The second application is not specific to a fixed application. The second application may also change accordingly, for example, when the interaction object changes.
It is easy to understand that the interaction instruction refers to an instruction received by the terminal in the first application program for interacting with the second application program. The interactive instructions include, but are not limited to, click interactive instructions, voice interactive instructions, timed interactive instructions, and the like. The timing interactive instruction may be, for example, that the timing interactive instruction is received five seconds after the terminal displays the link corresponding to the second application program.
In some embodiments, the terminal may obtain the interaction instruction, for example, when the terminal detects a click instruction for the second application in the first application. For example, when the terminal detects a click instruction for a program link corresponding to the second application program in the first application program, the terminal may acquire the interaction instruction.
S302, generating an interaction request corresponding to the interaction instruction;
according to some embodiments, an interaction request refers to a request for a first application and a second application to effect an interaction. Wherein the interactive request comprises a mutual access request and/or a mutual authentication request. For example, the interactive request may include only an interactive access request, and the interactive request may also include only a mutual authentication request. Wherein the interactive request does not refer specifically to a fixed request. The interaction request may also change accordingly, for example, when the first application or the second application changes.
According to some embodiments, the interaction request includes a first token identification corresponding to the first application. The token identifies a token that identifies the application. The first token identification does not refer to a fixed identification. The first token identification may also change accordingly, for example, when the first application changes.
In some embodiments, for example, when the terminal detects a click command for the second application program in the first application program, the terminal may acquire the interaction command, and the terminal may generate an interaction request corresponding to the interaction command.
And S303, sending the interaction request to a server through the first application program.
In some embodiments, the interaction request is used to instruct the server to obtain first token information corresponding to the first token identifier in the user center, and perform an interaction operation corresponding to the interaction request based on the first token information.
According to some embodiments, when the terminal acquires the interaction request, the terminal may send the interaction request to the server through the first application program. The interaction request is used for indicating the server to acquire first token information corresponding to the first token identification in the user center, and based on the first token information, the interaction operation corresponding to the interaction request is executed. That is, when the server detects an interaction request for the second application program sent by the terminal through the first application program, the server may obtain the interaction request for the second application program sent by the terminal through the first application program. When the server obtains the interaction request, the server may obtain first token information corresponding to the first token identifier in the user center. When the server acquires the first token information, the server may execute an interactive operation corresponding to the interactive request based on the first token information.
In one or more embodiments of the present application, an interaction instruction for a second application program is obtained in a first application program, an interaction request corresponding to the interaction instruction may be generated, and the interaction request is sent to a server through the first application program.
Referring to fig. 9, fig. 9 is a flowchart illustrating a fourth interaction method according to an embodiment of the present application. Specifically, the method comprises the following steps:
s401, acquiring an interactive instruction aiming at a second application program in a first application program;
the specific process is as described above, and is not described herein again.
S402, generating an interaction request corresponding to the interaction instruction;
the specific process is as described above, and is not described herein again.
S403, sending the interaction request to a server through the first application program;
the specific process is as described above, and is not described herein again.
S404, acquiring an interactive verification result sent by the server aiming at the interactive request;
according to some embodiments, the interactive verification result refers to a result determined by the server based on the first token information, and the interactive verification result does not refer to a fixed result, and the interactive verification result includes, but is not limited to, a verification pass or a verification fail. The interaction check result may include, for example, a check pass and encrypted first token information.
In some embodiments, when the terminal monitors that the server sends the interactive verification result for the interactive request, the terminal may obtain the interactive verification result sent by the server for the interactive request.
S405, displaying a display interface corresponding to the interactive request based on the interactive verification result.
According to some embodiments, when the terminal obtains the interactive verification result, the terminal may display a display interface corresponding to the interactive request based on the interactive verification result. For example, different interactive verification results correspond to different presentation interfaces.
In some embodiments, the interaction verification result may include, for example, verification pass and encrypted first token information. The interactive request may be, for example, a mutual authentication request. When the terminal obtains the interactive verification result, the terminal may authenticate the second application program based on the decrypted first token information for the encrypted first token information, that is, may complete the authentication operation of the second application program based on the first token information corresponding to the first application program. The terminal may further display a display interface corresponding to the mutual authentication request, for example, may display an operation interface for completing authentication for the second application program.
It is easy to understand that the interactive verification result may be, for example, a verification failure, and the terminal may display a prompt message on the terminal interface, where the prompt message may be, for example, an interactive verification failure and please re-input the interactive message.
In one or more embodiments of the present application, an interaction instruction for a second application program is obtained in a first application program, an interaction request corresponding to the interaction instruction may be generated, and the interaction request is sent to a server through the first application program. And secondly, acquiring an interactive verification result sent by the server aiming at the interactive request, and displaying a display interface corresponding to the interactive request based on the interactive verification result, so that the time for a user to acquire the interactive result can be reduced, and the interactive efficiency is improved.
The following are embodiments of the apparatus of the present application that may be used to perform embodiments of the method of the present application. For details which are not disclosed in the embodiments of the apparatus of the present application, reference is made to the embodiments of the method of the present application.
Please refer to fig. 10, which shows a schematic structural diagram of a first interaction apparatus according to an exemplary embodiment of the present application. The interaction means may be implemented as all or part of a device in software, hardware or a combination of both. The interaction apparatus 800 includes a request acquisition unit 801, an information acquisition unit 802, and an operation execution unit 803, where:
a request obtaining unit 801, configured to obtain an interaction request for a second application program, where the interaction request includes a mutual access request and/or a mutual authentication request, the interaction request includes a first token identifier corresponding to the first application program, and the terminal includes the first application program and the second application program;
an information obtaining unit 802, configured to obtain first token information corresponding to a first token identifier in a user center, where the user center includes a token information set corresponding to at least one application;
an operation executing unit 803, configured to execute an interactive operation corresponding to the interactive request based on the first token information.
According to some embodiments, the operation executing unit 803, when executing the interactive operation corresponding to the interactive request based on the first token information, is specifically configured to:
acquiring first program information corresponding to a first application program and second program information corresponding to a second application program;
and executing the interactive operation corresponding to the interactive request based on the first program information, the second program information and the first token information.
According to some embodiments, the first program information is a first security level, the second program information is a second security level, and the operation executing unit 803 is configured to, when executing the interactive operation corresponding to the interactive request based on the first program information, the second program information, and the first token information, specifically:
if the interactive request is a mutual-recognition request, acquiring a first security level corresponding to the first application program and a second security level corresponding to the second application program;
if the first security level is higher than or equal to the second security level, performing an authentication operation for the second application program based on the first token information;
and if the first security level is lower than the second security level, acquiring the input authentication information aiming at the second application program, and executing the authentication operation aiming at the second application program.
According to some embodiments, the first program information is a first security level, the second program information is a second security level, and the operation executing unit 803 is configured to, when executing the interactive operation corresponding to the interactive request based on the first program information, the second program information, and the first token information, specifically:
if the interactive request is an interactive access request, acquiring a first security level corresponding to the first application program and a second security level corresponding to the second application program;
if the first security level is higher than or equal to the second security level, performing access operation aiming at the second application program based on the first token information;
and if the first security level is lower than the second security level, acquiring the input access information aiming at the second application program, and executing the access operation aiming at the second application program.
According to some embodiments, fig. 11 shows a schematic structural diagram of a second interaction device provided in an embodiment of the present application. As shown in fig. 11, the interaction apparatus 800 includes an information storage unit 804, configured to, before acquiring first program information corresponding to a first application program and second program information corresponding to a second application program, acquire the first program information corresponding to the first application program and the first application program, and acquire the second program information corresponding to the second application program and the second application program;
the first application program and the first program information corresponding to the first application program are stored in an associated mode, and the second application program and the second program information corresponding to the second application program are stored in an associated mode.
According to some embodiments, the information obtaining unit 802 is configured to, when obtaining the first token information corresponding to the first application program in the user center, specifically:
acquiring registration information corresponding to the first token identification in the user center;
and generating first token information corresponding to the first token identification based on the interaction request and the registration information, wherein the first token information comprises the user identification, the first application identification corresponding to the first application program, the second application identification corresponding to the second application program and the verification information.
According to some embodiments, fig. 12 shows a schematic structural diagram of a third interaction device provided in an embodiment of the present application. As shown in fig. 12, the interaction apparatus 800 includes an information encryption unit 805, configured to, after generating first token information corresponding to a first token identifier based on the interaction request and the registration information, encrypt the first token information if the verification information satisfies a verification condition, so as to obtain encrypted first token information, where the number of times of use of the encrypted first token information is one.
According to some embodiments, the operation performing unit 803 is further configured to, after acquiring an interaction request for a second application program, sent by the terminal through the first application program, if the interaction request is a mutual authentication request, acquire, in the user center, second token information corresponding to a second token identifier, where the second token identifier corresponds to the second application program;
and performing an authentication operation for the first application in response to the mutual authentication request based on the second token information.
Please refer to fig. 13, which shows a schematic structural diagram of a fourth interaction device according to an exemplary embodiment of the present application. The interaction device 1100 may be implemented as all or part of a device in software, hardware, or a combination of both. The interaction device 1100 includes a request acquisition unit 1101, an information acquisition unit 1102, and an operation execution unit 1103, where:
an instruction obtaining unit 1101, configured to obtain, in a first application program, an interaction instruction for a second application program;
a request generating unit 1102, configured to generate an interaction request corresponding to the interaction instruction, where the interaction request includes a mutual access request and/or a mutual authentication request, and the interaction request includes a first token identifier corresponding to the first application;
the request sending unit 1103 is configured to send an interaction request to the server through the first application, where the interaction request is used to instruct the server to obtain first token information corresponding to the first token identifier in the user center, and execute an interaction operation corresponding to the interaction request based on the first token information.
According to some embodiments, fig. 14 shows a schematic structural diagram of a fifth interaction device provided in an embodiment of the present application. As shown in fig. 14, the apparatus 1100 further includes an interface presentation unit 1104, configured to obtain an interaction verification result sent by the server for the interaction request after the interaction request is sent to the server by the first application program;
and displaying a display interface corresponding to the interactive request based on the interactive verification result.
It should be noted that, when the interaction apparatus provided in the foregoing embodiment executes the interaction method, only the division of the functional modules is illustrated, and in practical applications, the above functions may be distributed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the interaction apparatus and the interaction method provided by the above embodiments belong to the same concept, and details of implementation processes thereof are referred to in the method embodiments and are not described herein again.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
In one or more embodiments of the present application, an interaction request, which is sent by a terminal through a first application and is directed to a second application, may be obtained by a request obtaining unit, where the interaction request includes a mutual access request and/or a mutual authentication request, the terminal includes the first application and the second application, an information obtaining unit may obtain first token information corresponding to the first application in a user center, and an operation performing unit may perform an interaction operation corresponding to the interaction request based on the first token information. The token information is stored in the user center, so that the transmission process of the token information can be reduced, the complexity of interactive operation steps is reduced, meanwhile, the token information does not need to be transmitted, and the probability that the token information is lost or tampered in the transmission process is reduced, so that the interactive convenience is improved, and the information interaction safety is improved.
An embodiment of the present application further provides a computer storage medium, where the computer storage medium may store a plurality of instructions, where the instructions are suitable for being loaded by a processor and executing the interaction method according to the embodiments shown in fig. 2 to fig. 7, and a specific execution process may refer to specific descriptions of the embodiments shown in fig. 2 to fig. 7, which is not described herein again.
The present application further provides a computer program product, where at least one instruction is stored, and the at least one instruction is loaded by the processor and executes the interaction method according to the embodiments shown in fig. 2 to fig. 7, where a specific execution process may refer to specific descriptions of the embodiments shown in fig. 2 to fig. 7, and is not described herein again.
Fig. 15 is a schematic structural diagram of a server according to an embodiment of the present application. As shown in fig. 15, the server 1500 may include: at least one processor 1501, at least one network interface 1504, a user interface 1503, memory 1505, at least one communication bus 1502.
The communication bus 1502 is used to realize connection communication among these components.
The user interface 1503 may include a user authentication center and a user server interface, and the optional user interface 1503 may also include a standard wired interface and a wireless interface.
The network interface 1504 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), among others.
Processor 1501 may include one or more processing cores, among other things. The processor 1501 connects various parts within the entire server 1500 using various interfaces and lines, and performs various functions of the server 1500 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 1505 and calling data stored in the memory 1505. Optionally, the processor 1501 may be implemented in at least one hardware form of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 1501 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing the content required to be displayed by the display screen; the modem is used to handle wireless communications. It is to be understood that the modem may not be integrated into the processor 1501, but may be implemented by a single chip.
The Memory 1505 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). Optionally, the memory 1505 includes a non-transitory computer-readable medium (non-transitory computer-readable storage medium). The memory 1505 may be used to store instructions, programs, code sets, or instruction sets. The memory 1505 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the various method embodiments described above, and the like; the storage data area may store data and the like referred to in the above respective method embodiments. Memory 1505 may optionally also be at least one memory device located remotely from processor 1501, as previously described. As shown in fig. 15, the memory 1505, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and an application program for interaction.
In the server 1500 shown in fig. 15, the user interface 1503 is mainly used as an interface for providing input for a user, and acquiring data input by the user; and processor 1501 may be used to invoke the interactive applications stored in memory 1505 and in particular the above operational steps.
The present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the above-described method. The computer-readable storage medium may include, but is not limited to, any type of disk including floppy disks, optical disks, DVD, CD-ROMs, microdrive, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, DRAMs, VRAMs, flash memory devices, magnetic or optical cards, nanosystems (including molecular memory ICs), or any type of media or device suitable for storing instructions and/or data.
The application also provides a terminal comprising at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of figures 8 to 9.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the interaction methods as recited in the above method embodiments.
It is clear to a person skilled in the art that the solution of the present application can be implemented by means of software and/or hardware. The "unit" and "module" in this specification refer to software and/or hardware that can perform a specific function independently or in cooperation with other components, where the hardware may be, for example, a Field-ProgrammaBLE Gate Array (FPGA), an Integrated Circuit (IC), or the like.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some service interfaces, devices or units, and may be an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory comprises: various media capable of storing program codes, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program, which is stored in a computer-readable memory, and the memory may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above description is only an exemplary embodiment of the present application, and the scope of the present application is not limited thereto. That is, all equivalent changes and modifications made in accordance with the teachings of this application are intended to be included within the scope thereof. Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the application disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.

Claims (24)

1. An interaction method, comprising:
the method comprises the steps that an interaction request which is sent by a terminal through a first application program and aims at a second application program is obtained, the interaction request comprises a mutual access request and/or a mutual authentication request, the interaction request comprises a first token identification corresponding to the first application program, and the terminal comprises the first application program and the second application program;
obtaining first token information corresponding to the first token identification in a user center, wherein the user center comprises a token information set corresponding to at least one application program;
and executing the interactive operation corresponding to the interactive request based on the first token information.
2. The method of claim 1, wherein performing the interactive operation corresponding to the interactive request based on the first token information comprises:
acquiring first program information corresponding to the first application program and second program information corresponding to the second application program;
and executing the interactive operation corresponding to the interactive request based on the first program information, the second program information and the first token information.
3. The method of claim 2, wherein the first program information is a first security level, wherein the second program information is a second security level, and wherein performing the interactive operation corresponding to the interactive request based on the first program information, the second program information, and the first token information comprises:
if the interactive request is a mutual-recognition request, acquiring a first security level corresponding to the first application program and a second security level corresponding to the second application program;
if the first security level is higher than or equal to the second security level, performing an authentication operation for the second application based on the first token information;
and if the first security level is lower than the second security level, acquiring the input authentication information aiming at a second application program, and executing authentication operation aiming at the second application program.
4. The method of claim 2, wherein the first program information is a first security level, wherein the second program information is a second security level, and wherein performing the interactive operation corresponding to the interactive request based on the first program information, the second program information, and the first token information comprises:
if the interactive request is an interactive access request, acquiring a first security level corresponding to the first application program and a second security level corresponding to the second application program;
if the first security level is higher than or equal to the second security level, performing an access operation for the second application program based on the first token information;
and if the first security level is lower than the second security level, acquiring the input access information aiming at a second application program, and executing the access operation aiming at the second application program.
5. The method according to claim 2, wherein before the obtaining of the first program information corresponding to the first application and the second program information corresponding to the second application, the method comprises:
acquiring the first application program and first program information corresponding to the first application program, and acquiring the second application program and second program information corresponding to the second application program;
and storing the first application program and the first program information corresponding to the first application program in an associated manner, and storing the second application program and the second program information corresponding to the second application program in an associated manner.
6. The method of claim 1, wherein obtaining first token information corresponding to the first token identifier in the user center comprises:
acquiring registration information corresponding to the first token identification in a user center;
and generating first token information corresponding to the first token identification based on the interaction request and the registration information, wherein the first token information comprises a user identification, a first application identification corresponding to the first application program, a second application identification corresponding to the second application program and verification information.
7. The method of claim 6, further comprising, after the generating first token information corresponding to the first token identification based on the interaction request and the registration information:
and if the verification information meets the verification condition, encrypting the first token information to obtain the encrypted first token information, wherein the use times of the encrypted first token information is one time.
8. The method according to claim 1, wherein after the obtaining of the interaction request for the second application sent by the terminal through the first application, the method comprises:
if the interaction request is the mutual authentication request, second token information corresponding to a second token identifier is obtained in the user center, wherein the second token identifier corresponds to the second application program;
and responding to the mutual authentication request based on the second token information, and executing authentication operation aiming at the first application program.
9. An interactive apparatus, comprising:
the terminal comprises a request acquisition unit, a first application program and a second application program, wherein the request acquisition unit is used for acquiring an interaction request aiming at the second application program and sent by a terminal through the first application program, the interaction request comprises a mutual access request and/or a mutual authentication request, the interaction request comprises a first token identification corresponding to the first application program, and the terminal comprises the first application program and the second application program;
the information acquisition unit is used for acquiring first token information corresponding to the first application identifier in a user center, and the user center comprises a token information set corresponding to at least one application program;
and the operation execution unit is used for executing the interactive operation corresponding to the interactive request based on the first token information.
10. The apparatus according to claim 9, wherein the operation performing unit, when performing the interactive operation corresponding to the interactive request based on the first token information, is specifically configured to:
acquiring first program information corresponding to the first application program and second program information corresponding to the second application program;
and executing the interactive operation corresponding to the interactive request based on the first program information, the second program information and the first token information.
11. The apparatus according to claim 10, wherein the first program information is a first security level, the second program information is a second security level, and the operation execution unit, when executing the interactive operation corresponding to the interactive request based on the first program information, the second program information, and the first token information, is specifically configured to:
if the interactive request is a mutual-recognition request, acquiring a first security level corresponding to the first application program and a second security level corresponding to the second application program;
if the first security level is higher than or equal to the second security level, performing an authentication operation for the second application based on the first token information;
and if the first security level is lower than the second security level, acquiring the input authentication information aiming at a second application program, and executing authentication operation aiming at the second application program.
12. The apparatus according to claim 10, wherein the first program information is a first security level, the second program information is a second security level, and the operation execution unit, when executing the interactive operation corresponding to the interactive request based on the first program information, the second program information, and the first token information, is specifically configured to:
if the interactive request is an interactive access request, acquiring a first security level corresponding to the first application program and a second security level corresponding to the second application program;
if the first security level is higher than or equal to the second security level, performing an access operation for the second application program based on the first token information;
and if the first security level is lower than the second security level, acquiring the input access information aiming at a second application program, and executing the access operation aiming at the second application program.
13. The apparatus according to claim 10, wherein the apparatus comprises an information storage unit configured to, before the acquiring of the first program information corresponding to the first application and the second program information corresponding to the second application, acquire the first program information corresponding to the first application and the first application, and acquire the second program information corresponding to the second application and the second application;
and storing the first application program and the first program information corresponding to the first application program in an associated manner, and storing the second application program and the second program information corresponding to the second application program in an associated manner.
14. The apparatus according to claim 9, wherein the information obtaining unit, when obtaining the first token information corresponding to the first token identifier in the user center, is specifically configured to:
acquiring registration information corresponding to the first token identification in a user center;
and generating first token information corresponding to the first token identification based on the interaction request and the registration information, wherein the first token information comprises a user identification, a first application identification corresponding to the first application program, a second application identification corresponding to the second application program and verification information.
15. The apparatus according to claim 14, wherein the apparatus includes an information encrypting unit, configured to, after generating first token information corresponding to the first token identifier based on the interaction request and the registration information, encrypt the first token information if the verification information satisfies a verification condition, to obtain encrypted first token information, where a number of times of use of the encrypted first token information is one.
16. The apparatus according to claim 9, wherein the operation performing unit is further configured to, after obtaining an interaction request for a second application program sent by the terminal through a first application program, if the interaction request is the mutual authentication request, obtain second token information corresponding to a second token identifier in the user center, where the second token identifier corresponds to the second application program;
and responding to the mutual authentication request based on the second token information, and executing authentication operation aiming at the first application program.
17. An interactive method, characterized in that the method comprises:
acquiring an interactive instruction aiming at a second application program in a first application program;
generating an interaction request corresponding to the interaction instruction, wherein the interaction request comprises a mutual access request and/or a mutual recognition request, and the interaction request comprises a first token identifier corresponding to the first application program;
and sending the interaction request to a server through the first application program, wherein the interaction request is used for indicating the server to acquire first token information corresponding to the first token identification in a user center, and executing interaction operation corresponding to the interaction request based on the first token information.
18. The method of claim 17, wherein after sending the interaction request to a server by the first application, further comprising:
acquiring an interactive verification result sent by the server aiming at the interactive request;
and displaying a display interface corresponding to the interactive request based on the interactive verification result.
19. An interactive apparatus, characterized in that the method comprises:
the instruction acquisition unit is used for acquiring an interactive instruction aiming at a second application program in the first application program;
a request generating unit, configured to generate an interaction request corresponding to the interaction instruction, where the interaction request includes a mutual access request and/or a mutual authentication request, and the interaction request includes a first token identifier corresponding to the first application program;
and the request sending unit is used for sending the interaction request to a server through the first application program, wherein the interaction request is used for indicating the server to acquire first token information corresponding to the first token identifier in a user center, and executing interaction operation corresponding to the interaction request based on the first token information.
20. The apparatus according to claim 19, further comprising an interface presentation unit, configured to, after the first application program sends the interaction request to a server, obtain an interaction verification result sent by the server for the interaction request;
and displaying a display interface corresponding to the interactive request based on the interactive verification result.
21. A server, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-8.
22. A terminal, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 17-18.
23. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any of claims 1-8 or 17-18.
24. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1-8 or 17-18.
CN202111623125.6A 2021-12-28 2021-12-28 Interaction method and device, server and storage medium Active CN114338148B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111623125.6A CN114338148B (en) 2021-12-28 2021-12-28 Interaction method and device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111623125.6A CN114338148B (en) 2021-12-28 2021-12-28 Interaction method and device, server and storage medium

Publications (2)

Publication Number Publication Date
CN114338148A true CN114338148A (en) 2022-04-12
CN114338148B CN114338148B (en) 2023-05-26

Family

ID=81014224

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111623125.6A Active CN114338148B (en) 2021-12-28 2021-12-28 Interaction method and device, server and storage medium

Country Status (1)

Country Link
CN (1) CN114338148B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309267A (en) * 2007-05-15 2008-11-19 飞力凯网路股份有限公司 Authentication information management system, authentication information management server, authentication onformation management method and program
CN111143816A (en) * 2018-11-05 2020-05-12 纬创资通股份有限公司 Verification and authorization method and verification server
CN112948803A (en) * 2021-02-27 2021-06-11 平安科技(深圳)有限公司 Login method, system, device and storage medium of application program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309267A (en) * 2007-05-15 2008-11-19 飞力凯网路股份有限公司 Authentication information management system, authentication information management server, authentication onformation management method and program
CN111143816A (en) * 2018-11-05 2020-05-12 纬创资通股份有限公司 Verification and authorization method and verification server
CN112948803A (en) * 2021-02-27 2021-06-11 平安科技(深圳)有限公司 Login method, system, device and storage medium of application program

Also Published As

Publication number Publication date
CN114338148B (en) 2023-05-26

Similar Documents

Publication Publication Date Title
CN112733107B (en) Information verification method, related device, equipment and storage medium
CN104967997B (en) A kind of Wi-Fi cut-in method, Wi-Fi equipment, terminal device and system
CN107086984A (en) A kind of method, terminal and server for obtaining and generating identifying code
CN104363226A (en) Method, device and system for logging in operating system
CN107196917B (en) Service response method and middleware thereof
CN113067859B (en) Communication method and device based on cloud mobile phone
CN104967597A (en) Third-party application message authentication method and system based on secure channel
CN105790957A (en) eSIM card data sharing method and related equipment and system thereof
US20140310606A1 (en) Method and device for providing plugin in contact list
US20220366066A1 (en) Display method, display device, and electronic device
CN105577375A (en) Identity authentication method and device
CN108092947B (en) Method and device for identity authentication of third-party application
US11196736B2 (en) Systems and methods for location-aware two-factor authentication
CN114500082A (en) Access authentication method and device, equipment, server, storage medium and system
US9489939B2 (en) Speech server managing one or a plurality of pieces of speech terminal-specifying information and user-specifying information
CN104079527A (en) Information processing method and electronic equipment
CN115801299B (en) Meta universe identity authentication method, device, equipment and storage medium
CN112260983A (en) Identity authentication method, device, equipment and computer readable storage medium
CN105577621B (en) Business operation verification method, device and system
CN111163455A (en) User identification number migration method, device, terminal and storage medium
JP6325654B2 (en) Network service providing apparatus, network service providing method, and program
CN114338148B (en) Interaction method and device, server and storage medium
CN115941217B (en) Method for secure communication and related products
CN108769989B (en) Wireless network connection method, wireless access device and equipment
KR102025659B1 (en) Smart watch and security input system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant