CN114676459A - Resource access processing method, device, equipment, medium and product - Google Patents

Resource access processing method, device, equipment, medium and product Download PDF

Info

Publication number
CN114676459A
CN114676459A CN202210324652.5A CN202210324652A CN114676459A CN 114676459 A CN114676459 A CN 114676459A CN 202210324652 A CN202210324652 A CN 202210324652A CN 114676459 A CN114676459 A CN 114676459A
Authority
CN
China
Prior art keywords
protocol
user
authorization
resource
authorized
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210324652.5A
Other languages
Chinese (zh)
Inventor
付学浩
杨超瑞
高小冬
郝斌
李振
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN202210324652.5A priority Critical patent/CN114676459A/en
Publication of CN114676459A publication Critical patent/CN114676459A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Automation & Control Theory (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a resource access processing method, a device, equipment, a medium and a product. The method comprises the following steps: responding to a first access request of a first user to a first resource of a first application program, and acquiring a first authorization protocol corresponding to the first resource and an authorized protocol list of the first user; determining whether a first authorized protocol is included in the list of authorized protocols; under the condition that a second authorization protocol in the first authorization protocol is not included in the authorized protocol list, sending a first authorization request aiming at the second authorization protocol to the first user; the first user is allowed access to the first resource in response to a first input by the first user authorizing the second authorization protocol. By adopting the resource access processing method, device, equipment, medium and product provided by the application, the problem that a user cannot log in due to the fact that the user does not want to authorize certain protocols can be avoided, so that all functions of the application program cannot be used, and user experience is improved.

Description

Resource access processing method, device, equipment, medium and product
Technical Field
The present application belongs to the field of data processing technologies, and in particular, to a method, an apparatus, a device, a medium, and a product for processing resource access.
Background
With the enhancement of personal information protection awareness, an application program that needs to acquire personal information generally authorizes an authorization protocol by a user when the user logs in, and allows a platform to which the application program belongs to acquire the personal information of the user.
In the prior art, authorization of a user to an authorization protocol usually occurs before logging in an application program, the user needs to authorize all authorization protocols before logging in the application program, if authorization is rejected, login cannot be performed, but a protocol that the user does not want to authorize exists in the authorization protocols, but the user can only authorize all or reject all authorization, if authorization is rejected, the user cannot log in the application program, and if authorization is against the will of the user, bad experience is brought to the user.
Disclosure of Invention
The embodiment of the application provides a resource access processing method, a resource access processing device, a resource access processing medium and a resource access processing product, and the method and the device can at least solve the problems that in the prior art, a user can only authorize all or refuse all, if authorization is refused all, the user cannot log in the application program, and if authorization is refused all, the user will be violated, and bad experience is brought to the user.
In a first aspect, an embodiment of the present application provides a resource access processing method, where the method includes:
responding to a first access request of a first user to a first resource of a first application program, and acquiring a first authorization protocol corresponding to the first resource and an authorized protocol list of the first user, wherein the first authorization protocol comprises at least one protocol which is required to obtain user authorization when the first resource is provided for the user;
determining whether a first authorized protocol is included in the list of authorized protocols;
under the condition that a second authorization protocol in the first authorization protocol is not included in the authorized protocol list, sending a first authorization request aiming at the second authorization protocol to the first user;
the first user is allowed access to the first resource in response to a first input by the first user authorizing the second authorization protocol.
In a second aspect, an embodiment of the present application provides a resource access processing apparatus, including:
the first obtaining module is used for responding to a first access request of a first user to a first resource of a first application program, obtaining a first authorization protocol corresponding to the first resource and an authorized protocol list of the first user, wherein the first authorization protocol comprises at least one protocol which is required to obtain user authorization when the first resource is provided for the user;
a first determining module, configured to determine whether the authorized protocol list includes a first authorized protocol;
the first sending module is used for sending a first authorization request aiming at a second authorization protocol to a first user under the condition that the second authorization protocol in the first authorization protocol is not included in the authorized protocol list;
a first processing module to allow the first user to access the first resource in response to a first input by the first user authorizing the second authorization protocol.
In a third aspect, an embodiment of the present application provides an electronic device, where the device includes: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements a resource access processing method as shown in any embodiment of the first aspect.
In a fourth aspect, the present application provides a computer storage medium having computer program instructions stored thereon, where the computer program instructions, when executed by a processor, implement the resource access processing method shown in any one of the embodiments of the first aspect.
In a fifth aspect, the present application provides a computer program product, and when executed by a processor of an electronic device, the instructions of the computer program product cause the electronic device to execute the resource access processing method shown in any one of the embodiments of the first aspect.
The resource access processing method, device, equipment, medium and product in the embodiments of the present application can respond to a first access request of a first user to a first resource of a first application, obtain a first authorization protocol corresponding to the first resource and an authorized protocol list of the first user, determine whether the authorized protocol list includes the first authorization protocol, send a first authorization request for a second authorization protocol to the first user under the condition that the authorized protocol list does not include the second authorization protocol in the first authorization protocol, and then respond to a first input that the first user authorizes the second authorization protocol, allow the first user to access the first resource. Therefore, the user does not need to authorize all authorization protocols during login, only needs to authorize the protocol which needs to be authorized during login, and only needs to authorize the protocol which needs to be authorized for other resources when other resources are accessed, so that the problem that the user cannot login due to the fact that the user does not want to authorize some protocols is avoided, all resources of the application program cannot be accessed, and user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a resource access processing method according to an embodiment of the present application;
FIG. 2 is a flow diagram of another method for processing resource access according to an embodiment of the present application;
FIG. 3 is a functional architecture diagram of a resource access processing system according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a resource access processing apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Features and exemplary embodiments of various aspects of the present application will be described in detail below, and in order to make objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are intended to be illustrative only and are not intended to be limiting. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
In addition, it should be noted that, in the technical solution of the present application, the acquisition, storage, use, processing, etc. of data all conform to relevant regulations of national laws and regulations.
Fig. 1 shows a flowchart of a resource access processing method according to an embodiment of the present application, and it should be noted that the resource access processing method may be applied to a resource access processing system, as shown in fig. 1, the resource access processing method may include the following steps:
s110, responding to a first access request of a first user to a first resource of a first application program, and acquiring a first authorization protocol corresponding to the first resource and an authorized protocol list of the first user;
s120, determining whether the authorized protocol list comprises a first authorized protocol;
s130, under the condition that a second authorization protocol in the first authorization protocol is not included in the authorized protocol list, a first authorization request aiming at the second authorization protocol is sent to the first user;
s140, in response to a first input by the first user authorizing the second authorization protocol, the first user is allowed to access the first resource.
Therefore, the first authorization protocol corresponding to the first resource and the authorized protocol list of the first user can be obtained in response to a first access request of the first user to the first resource of the first application program, whether the authorized protocol list comprises the first authorization protocol or not is determined, in the case that a second authorization protocol in the first authorization protocol is not included in the authorized protocol list, a first authorization request aiming at the second authorization protocol is sent to the first user, and then the first user is allowed to access the first resource in response to a first input of the first user authorizing the second authorization protocol. Therefore, the user does not need to authorize all authorization protocols during login, only needs to authorize the protocol which needs to be authorized during login, and only needs to authorize the protocol which needs to be authorized for other resources when other resources are accessed, so that the problem that the user cannot login due to the fact that the user does not want to authorize some protocols is avoided, all resources of the application program cannot be accessed, and user experience is improved.
Referring to S110, the first user may be a user using the first application. The first resource may be a function, an interface, or display content of the first application. The first access request may be a request sent by the first user to the resource access processing system to access the first resource. The first authorization protocol may include at least one protocol that must obtain user authorization when providing the first resource to the user, and the first authorization protocol may be a protocol in which the user authorizes a provider of the first application to obtain personal information of the user. The authorized protocol list includes authorized protocols that have been authorized by the first user.
Here, when the first user wants to access the first resource, it needs to send a first access request to the resource access processing system, and after the resource access processing system receives the first access request, the first authorization protocol corresponding to the first resource and the authorized list of the first user may be obtained in response to the first access request.
Referring to S120, after acquiring the first authorization protocol corresponding to the first resource and the authorized list of the first user, it may be queried whether all protocols in the first authorization protocol are included in the authorized list.
Referring to S130, the first authorization protocol may include at least one authorization protocol, and the second authorization protocol may be a protocol that is not authorized by the first user in the at least one protocol included in the first authorization protocol, that is, the second authorization protocol is not included in the authorized protocol list of the first user. The first authorization request may be a request sent by the resource access processing system to the first user requesting authorization of the second authorization protocol by the first user.
Here, if the second authorization protocol in the first authorization protocol is not included in the authorized protocol list, a first authorization request for the second authorization protocol may be sent to the first user, and at the same time, the second authorization protocol may also be sent to the first user; if all protocols in the first authorization protocol are included in the authorized protocol list, no authorization request needs to be sent to the first user.
Referring to S140, the first input may be an input by the first user authorizing the second authorization protocol, e.g., clicking an "agree" button or checking a box to be checked for an approval authorization.
Here, in a case where the resource access processing system sends the first authorization request to the first user without including the second authorization protocol in the authorized protocol list of the first user, if the first user authorizes the second authorization protocol, the resource access processing system may allow the first user to access the first resource; if the first user denies authorization of the second authorization protocol, the resource access processing system may deny the first user access to the first resource.
The resource access processing system may also determine whether the first user's authorization for the second authorization protocol is valid, e.g., if the first user is less than 14 years old, the authorization is invalid even if the first user authorizes the second authorization protocol. If the authorization of the first user is not valid, the first user is not allowed to access the first resource.
In some examples, the first user may be user a and the first resource may be function M. When a user A wants to use a function M in a first application program, an icon corresponding to the function M is clicked, a first access request can be sent to a resource access processing system, and after the resource access processing system receives the first access request, a first authorization protocol corresponding to the function M and an authorized protocol list of the user A can be obtained in response to the first access request. The first authorized protocol comprises a protocol a, a protocol b and a protocol c, and the authorized protocol list comprises a protocol d, a protocol e, a protocol a and a protocol c. That is, the protocol b in the first authorization protocol, i.e., the second authorization protocol, is not included in the authorized list. Therefore, the resource access processing system can send the protocol b and a first authorization request aiming at the protocol b to the user A, after the user A receives the first authorization request and the protocol b, the user A clicks an 'consent' button to authorize the protocol b, and in response to the user A authorizing the protocol b, the resource access processing system can allow the user A to use the function M.
Further, in some embodiments, the method may further comprise: after receiving a first access request of a first user to a first resource of a first application program, whether a first authorization protocol is included in an authorized list of the first user or not, the first user is reminded of personal information of the first user, which is required to be acquired by a provider of the first application program if the first user accesses the first resource, so that the first user can determine whether the provider of the first application program is authorized to acquire the personal information again.
Therefore, even if the first user has authorized the first authorization protocol before, when the authorized personal information specified in the first authorization protocol is to be obtained, the first user is still given the opportunity of reselecting, the personal information of the first user is protected to the greatest extent, and the experience of the first user is improved.
In some embodiments, as the application program is upgraded or the laws and regulations related to personal information protection are changed, the content of the authorization protocol also needs to be modified, and in the prior art, modifying the content of the authorization protocol requires redevelopment by developers, which is time-consuming and labor-consuming, and in order to modify the content of the authorization protocol more flexibly, after S140, the method may further include:
in response to a fourth input by the second user for the second authorized protocol, displaying protocol content of the second authorized protocol;
in response to a fifth input by the second user to modify the protocol content, a modified sixth authorization protocol is determined.
Here, the second user may be a business person of the first application provider. The fourth input may be an input to open a second authorization protocol for the second user, e.g., double-clicking on the second authorization protocol. The fifth input may be an input by the second user to edit the content of the second authorization protocol. The sixth authorization protocol may be a protocol obtained by modifying the protocol content of the second authorization protocol.
Specifically, when the second user wants to modify the second authorization protocol, the second user may click the second authorization protocol, the resource access processing system may display the protocol content of the second authorization protocol in response to the second user clicking a fourth input of the second authorization protocol, the second user may then modify the displayed protocol content, and the resource access processing system may determine the modified sixth authorization protocol in response to a fifth input of the second user modifying the protocol content.
In addition, after determining the modified sixth authorization protocol, a version number of the sixth authorization protocol may also be set. When the sixth authorization protocol is obtained through modification, the second authorization protocol can be kept as a historical version, and the latest version and the authorization protocols of all historical versions are distinguished through the version number.
In some examples, the second user may be a service person B and the sixth authorization protocol may be protocol f. When the protocol B needs to be modified, the service personnel B can display the protocol content of the protocol B by double-clicking the protocol B, then the service personnel B can modify the protocol content of the protocol B, and can complete the modification of the protocol B by clicking a 'save' button after the modification is completed, so that the protocol f is obtained. The service person B may also set the version number of the protocol f, for example, if the version number of the protocol B is 2.0, the version number of the protocol f may be set to 3.0.
Therefore, the authorization protocol can be flexibly modified through the process without redevelopment, and time and labor are saved.
In some embodiments, in order to ensure the accuracy of the modified sixth authorization protocol, after determining the modified sixth authorization protocol, the method may further include:
responding to a seventh input of the second user to the sixth authorization protocol, and sending the sixth authorization protocol to the third user so that the third user can check the sixth authorization protocol;
determining a sixth authorization protocol that is audit-error-free in response to an eighth input to the sixth authorization protocol by the third user.
Here, in order to ensure the accuracy of the sixth authorization protocol, the sixth authorization protocol may be audited. The third user may be a service person other than the second user. The seventh input may be an input to maintain a sixth authorization protocol. The eighth input may be an input confirming the sixth authorization protocol audit is error free for a third user.
Specifically, after the second user modifies the second authorization protocol to obtain a sixth authorization protocol, the second user may click to save, the resource access processing system may respond to an input that the second user clicks to save, and send the sixth authorization protocol to the third user, so that the third user can perform an audit, if the audit of the third user is correct, the audit of the sixth authorization protocol can be confirmed to be correct, and the resource access processing system may respond to an input that the third user confirms that the audit of the sixth authorization protocol is correct, and determine the correct audit of the sixth authorization protocol.
In some examples, the third user may be business person C. And after the service personnel B modifies the protocol B to obtain the protocol f, clicking to store the protocol f, sending the protocol f to the service personnel C by the resource access processing system, auditing the protocol f by the service personnel C, and clicking a confirmation button after the audit is correct, so that the protocol f can be confirmed to be a final protocol by the resource access processing system.
Therefore, the accuracy of the sixth authorization protocol can be ensured through the process.
In some embodiments, after the modification of the authorization protocol, the provider of the application may need to obtain more personal information of the user, and in order to ensure that the personal information of the user is obtained legally, after the fifth input of the second user modifying the protocol content is received and the modified sixth authorization protocol is determined, the method may further include:
responding to a third access request of the first user to the first resource, and acquiring a sixth authorization protocol;
displaying a sixth authorization protocol to remind the first user to authorize the sixth authorization protocol;
in response to a sixth input by the first user authorizing a sixth authorization protocol, the first user is allowed to access the first resource.
Here, the third access request may be a request for accessing the first resource, which is sent by the first user to the resource access processing system after the protocol modification. The sixth input may be an input by the first user authorizing the sixth authorization protocol, such as clicking an "agree" button or checking a to-do box for the agree authorization.
Specifically, when the first user wants to access the first resource again, a third access request needs to be sent to the resource access processing system, and after receiving the third access request, the resource access processing system can respond to the third access request to obtain the modified sixth authorization protocol, and then display the sixth authorization protocol to remind the first user of authorizing the modified sixth authorization protocol; if the first user authorizes the sixth authorization protocol, the resource access processing system may allow the first user to access the first resource; if the first user denies authorization of the sixth authorization protocol, the resource access processing system may deny the first user access to the first resource.
In some examples, when the user a wants to use the function M in the first application again, the user a may click an icon corresponding to the function M, may send a third access request to the resource access processing system, and after the resource access processing system receives the third access request, the resource access processing system may obtain a protocol f corresponding to the function M in response to the third resource access request, then display the protocol f, and the user a may click an "ok" button, may authorize the protocol f, and in response to the user a authorizing the protocol f, the resource access processing system may allow the user a to use the function M.
Therefore, the user can be reminded of authorizing the modified authorization protocol, and is allowed to access the corresponding resource after the user is authorized, so that the user is prevented from acquiring the personal information of the user under the condition that the user does not authorize the modified authorization protocol.
In some embodiments, the user may be prudent in authorizing the personal information, and after S140, the method may further include:
acquiring an authorization period of a second authorization protocol;
periodically alerting the first user to authorize the second authorization protocol according to an authorization period.
Here, an authorization period of the second authorization protocol may be set. The authorization period may be obtained from the latest protocol authorization information. The latest agreement authorization information may include an authorization contract number, an agreement number, a version number, a channel number, an authorizer name, an authorization period, and a delete flag. Since the user may authorize multiple versions of the protocol, the latest protocol authorization information may be associated with multiple historical protocol authorization information, each of which may include an authorization contract number, a protocol number, a version number, a channel number, an authorizer name, an authorization period, and a delete flag. The latest protocol authorization information may also correspond to a protocol version information.
Wherein, the authorization cycle may include: permanent authorization, per-authorization and monthly authorization, although other preset time periods may be used as the authorization period, and are not limited herein. The audit state may include to-be-audited, audit in progress, audit passed and audit not passed, and may also include other states, which are not limited herein.
Specifically, the protocol definition information of the second authorization protocol may include an authorization period of the second authorization protocol, and the resource access processing system may periodically pop up the window to remind the first user of authorization according to the authorization period.
In some examples, the authorization period for protocol b is monthly, and if user a authorizes protocol b at 1/2021, the resource access processing system may remind user a to authorize protocol b again at 2/1/2021.
Therefore, the authorization period of the protocol can be set, the user does not need to permanently authorize all the protocols, the user experience is improved, and the user can be automatically reminded of re-authorization when the authorization of the user to the protocol expires.
Based on the foregoing S110-S140, in some embodiments, as shown in fig. 2, before the foregoing S110, the resource access processing method may further include: S150-S180, wherein:
s150, in response to the login request of the first user to login the first application program, obtaining the login authorization protocol corresponding to the first application program and the authorized protocol list of the first user.
Here, the login request may be a request for logging in the first application, which is transmitted to the resource access processing system by the first user. The login authorization protocol may include at least one protocol that allows a user to have to obtain user authorization for logging in to the first application, and the login authorization protocol may be a protocol in which the user authorizes a provider of the first application to obtain personal information of the user.
And S160, determining whether the authorized protocol list includes the login authorized protocol.
Here, after acquiring the login authorization protocol corresponding to the first application and the authorized list of the first user, it may be queried whether all protocols in the login authorization protocol are included in the authorized list.
S170, in case that the third authorization protocol in the login authorization protocol is not included in the authorized protocol list, sending a second authorization request for the third authorization protocol to the first user.
Here, the login authorization protocol may include at least one authorization protocol, and the third authorization protocol may be a protocol that is not authorized by the first user from among the at least one protocol included in the login authorization protocol, that is, the third authorization protocol is not included in the authorized protocol list of the first user. The second authorization request may be a request sent by the resource access processing system to the first user requesting authorization of the third authorization protocol by the first user.
Specifically, if the authorized protocol list does not include a third authorization protocol in the login authorization protocol, a second authorization request for the third authorization protocol may be sent to the first user, and meanwhile, the third authorization protocol may also be sent to the first user; if all protocols in the login authorization protocol are included in the authorized protocol list, no authorization request needs to be sent to the first user.
S180, allowing the first user to log in the first application program in response to the first user authorizing the second input of the third protocol.
Here, the second input may be an input by which the first user authorizes the third authorization protocol, for example, clicking an "agree" button or checking a to-be-selected box for an approval authorization.
Specifically, when the authorized protocol list of the first user does not include the third authorization protocol and the resource access processing system sends the second authorization request to the first user, if the first user authorizes the third authorization protocol, the resource access processing system may allow the first user to log in the first application program; if the first user refuses to authorize the third authorization protocol, the resource access processing system may refuse the first user to log in to the first application.
The resource access processing system may also determine whether the first user's authorization for the third authorization protocol is valid, e.g., if the first user is less than 14 years old, the authorization may be invalid even if the first user authorizes the third authorization protocol. If the authorization of the first user is invalid, the first user is not allowed to log in the first application program.
In some examples, the first application may be application N. When a user A wants to log in an application program N, a login button of the application program N is clicked, a login request can be sent to the resource access processing system, and after the resource access processing system receives the login request, a login authorization protocol corresponding to the application program N and an authorized protocol list of the user A can be obtained in response to the login request. The login authorization protocol comprises a protocol a, a protocol d and a protocol e, and the authorized protocol list comprises the protocol d, the protocol e and a protocol c. That is, the protocol a in the login authorization protocol, i.e., the third authorization protocol, is not included in the authorized list. Therefore, the resource access processing system can send the protocol a and a second authorization request aiming at the protocol a to the user A, after the user A receives the second authorization request and the protocol a, the user A can authorize the protocol a by clicking an 'consent' button, and in response to the user A authorizing the protocol a, the resource access processing system can allow the user A to log in the application program N.
Therefore, the user can not authorize all authorization protocols during login, only need to authorize the protocol which must be authorized during login, and only need to authorize the protocol which must be authorized for other resources when accessing other resources, so that the problem that the user cannot login due to the fact that the user does not want to authorize some protocols is avoided, all resources of the application program cannot be accessed, and user experience is improved.
In some embodiments, the provider of the application may cooperate with a third party, the third party provides services for the user through some functions in the application, the third party may need to acquire personal information of the user when the user uses the functions, the provider of the application needs to send the personal information of the user to the third party, and in order to be able to legally send the personal information of the user to the third party, after S180, the method may further include:
responding to a second access request of the first user to a second resource of the first application program, and acquiring a fourth authorization protocol corresponding to the second resource and an authorized protocol list of the first user;
determining whether a fourth authorized protocol is included in the authorized protocol list;
in the case that a fifth authorization protocol in the fourth authorization protocol is not included in the authorized protocol list, sending a third authorization request for the fifth authorization protocol to the first user;
in response to a third input by the first user authorizing the fifth authorization protocol, the first user is allowed to access the second resource.
Here, the second resource may be a resource provided by a third party, the third party not being a provider of the first application. The second access request may be a request sent by the first user to the resource access processing system to access the second resource. The fourth authorization protocol may include at least one protocol that must take the user's authorization when providing the second resource to the user, and the fourth authorization protocol may be a protocol that the user authorizes to transmit the user's personal information to a third party. The fourth authorization protocol may include at least one authorization protocol, and the fifth authorization protocol may be a protocol that is not authorized by the first user in the at least one protocol included in the fourth authorization protocol, that is, the fifth authorization protocol is not included in the authorized protocol list of the first user. The third authorization request may be a request sent by the resource access processing system to the first user requesting authorization of the fifth authorization protocol by the first user. The third input may be an input by the first user authorizing the fifth authorization protocol, e.g., clicking an "agree" button or checking a to-be-checked box for an approval authorization.
Specifically, when a first user wants to access a second resource, a second access request needs to be sent to a resource access processing system, after the resource access processing system receives the second access request, the resource access processing system may obtain, in response to the second access request, a fourth authorization protocol corresponding to the second resource and an authorized list of the first user, and then may query whether all protocols in the fourth authorization protocol are included in the authorized list, and if a fifth authorization protocol in the fourth authorization protocol is not included in the authorized protocol list, may send a third authorization request for the fifth authorization protocol to the first user, and at the same time, may also send the fifth authorization protocol to the first user; if all protocols in the fourth authorization protocol are included in the authorized protocol list, no authorization request needs to be sent to the first user. If the first user authorizes the fifth authorization protocol, the resource access processing system may allow the first user to access the second resource when the resource access processing system sends a third authorization request to the first user without including the fifth authorization protocol in the authorized protocol list of the first user; if the first user denies authorization of the fifth authorization protocol, the resource access processing system may deny the first user access to the second resource.
The resource access processing system may also determine whether the authorization of the fifth authorization protocol by the first user is valid, e.g., if the first user is less than 14 years old, the authorization may be invalid even if the first user authorizes the fifth authorization protocol. If the authorization of the first user is not valid, the first user is not allowed to access the second resource.
In some examples, the second resource may be function S through which merchant D may provide service for user a. When the user A wants to use the function S, the user A clicks the icon corresponding to the function S, so that a second access request can be sent to the resource access processing system, and after receiving the second access request, the resource access processing system can respond to the second access request to acquire a fourth authorization protocol corresponding to the function S and an authorized protocol list of the user A. The fourth authorization protocol comprises a protocol a, a protocol j and a protocol c, and the authorized protocol list comprises a protocol d, a protocol e, a protocol a and a protocol c. That is, the protocol j in the fourth authorization protocol, i.e., the fifth authorization protocol, is not included in the authorized list. Therefore, the resource access processing system can send the protocol j and a third authorization request aiming at the protocol j to the user A, after the user A receives the third authorization request and the protocol j, the user A clicks an 'consent' button to authorize the protocol j, and in response to the user A authorizing the protocol j, the resource access processing system can allow the user A to use the function S.
Thus, the personal information of the user can be legally sent to the third party through the process.
In some embodiments, the method may further comprise: after receiving a second access request of the first user to the second resource of the first application program, whether the authorized list of the first user comprises the fourth authorization protocol or not, the first user is reminded that if the first user accesses the second resource, a third party needs to acquire the personal information of the first user, so that the first user can determine whether the third party is authorized to acquire the personal information again.
Therefore, even if the first user has authorized the fourth authorization protocol before, when the personal information specified and authorized in the fourth authorization protocol is sent to the third party, the first user is still given a chance to reselect, the personal information of the first user is protected to the greatest extent, and the experience of the first user is improved.
The embodiment of the application also provides a functional architecture diagram of the resource access processing system. The functional architecture of the resource access processing system provided in the embodiment of the present application is described in detail below with reference to fig. 3.
Fig. 3 is a diagram illustrating a functional architecture of a resource access processing system according to an embodiment of the present application.
As shown in fig. 3, the functional architecture of the resource access processing system may include: a development module 310, a business module 320, and a user module 330.
The development module 310 may be operated by a developer, and the functions of the development module 310 may include an addition protocol definition function 311 and a maintenance protocol resource relationship function 312. The newly added protocol definition function 311 may be configured to newly add protocol definition information, where the protocol definition information may include a protocol number, a protocol name, a protocol remark, a protocol path, an authorization mode code, a protocol prompt mode, a channel number, a minimum version, a creator name, creation time, an operator name, and operation time; the maintain protocol resource relationship function 312 may be used for protocol resource relationship information, which may include a primary key, a protocol number, a minimum version, a uniform resource locator, a delete flag, a creator name, a creation time, an operator name, and an operation time.
The business module 320 may be operated by business personnel and the functions of the business module 320 may include a maintenance protocol definition function 321, a maintenance protocol version function 322, a viewing protocol list function 323, a viewing protocol content function 324, and a save protocol content function 325. The maintenance protocol definition function 321 may be used for protocol definition information, and specific contents of the protocol definition information are not described herein again; the maintenance protocol version function 322 may be configured to maintain protocol version information, where the protocol version information may include a version number, a protocol path, a creator name, creation time, an auditor name, audit time, audit status, audit remarks, and release time, and multiple pieces of protocol version information may correspond to one piece of protocol definition information and may also correspond to one protocol resource relationship; a view protocols list function 323 may be used to view a list of authorized protocols; the view protocol content function 324 may be used to view the specific content of the authorization protocol; the save protocol contents function 325 may be used to save the modified protocol after modifying the protocol contents.
The user module 330 may be operated by a user using the first application, and the functions of the user module 330 may include an authorization function 331, a denial authorization function 332, and a revocation authorization function 333. Authorization function 331 may be used for user authorization of an authorization protocol; the deny authorization function 332 may be used to deny authorization to an authorization protocol; the revocation authorization function 333 may be used to proactively revoke authorization of an authorization protocol.
Therefore, in response to a first access request of a first user to a first resource of a first application program, a first authorization protocol corresponding to the first resource and an authorized protocol list of the first user can be obtained, whether the authorized protocol list includes the first authorization protocol or not is determined, if the authorized protocol list does not include a second authorization protocol in the first authorization protocol, a first authorization request aiming at a second authorization protocol is sent to the first user, and then the first user is allowed to access the first resource in response to a first input of the first user authorizing the second authorization protocol. Therefore, the user does not need to authorize all authorization protocols during login, only needs to authorize the protocol which needs to be authorized during login, and only needs to authorize the protocol which needs to be authorized for other resources when other resources are accessed, so that the problem that the user cannot login due to the fact that the user does not want to authorize some protocols is avoided, all resources of the application program cannot be accessed, and user experience is improved.
Based on the same inventive concept, the embodiment of the application also provides a resource access processing device. The resource access processing apparatus according to the embodiment of the present application is described in detail below with reference to fig. 4.
Fig. 4 shows a schematic structural diagram of a resource access processing apparatus according to an embodiment of the present application.
As shown in fig. 4, the resource access processing apparatus may include:
a first obtaining module 401, configured to, in response to a first access request of a first user for a first resource of a first application program, obtain a first authorization protocol corresponding to the first resource and an authorized protocol list of the first user, where the first authorization protocol includes at least one protocol that must obtain user authorization when providing the first resource to the user;
a first determining module 402, configured to determine whether the first authorized protocol is included in the authorized protocol list;
a first sending module 403, configured to send a first authorization request for a second authorization protocol to the first user if the second authorization protocol in the first authorization protocol is not included in the authorized protocol list;
a first processing module 404 for allowing the first user to access the first resource in response to a first input by the first user authorizing the second authorization protocol.
Therefore, in response to a first access request of a first user to a first resource of a first application program, a first authorization protocol corresponding to the first resource and an authorized protocol list of the first user can be obtained, whether the authorized protocol list includes the first authorization protocol or not is determined, if the authorized protocol list does not include a second authorization protocol in the first authorization protocol, a first authorization request aiming at a second authorization protocol is sent to the first user, and then the first user is allowed to access the first resource in response to a first input of the first user authorizing the second authorization protocol. Therefore, the user does not need to authorize all authorization protocols during login, only needs to authorize the protocol which needs to be authorized during login, and only needs to authorize the protocol which needs to be authorized for other resources when other resources are accessed, so that the problem that the user cannot login due to the fact that the user does not want to authorize some protocols is avoided, all resources of the application program cannot be accessed, and user experience is improved.
In some embodiments, the apparatus may further comprise:
the second obtaining module is used for obtaining a login authorization protocol corresponding to the first application program and an authorized protocol list of the first user in response to a login request of the first user for logging in the first application program before obtaining a first authorization protocol corresponding to the first resource and the authorized protocol list of the first user in response to a first access request of the first user for the first resource of the first application program, wherein the login authorization protocol comprises at least one protocol which allows the user to obtain user authorization when the user logs in the first application program;
the second determining module is used for determining whether the authorized protocol list comprises a login authorization protocol;
the second sending module is used for sending a second authorization request aiming at a third authorization protocol to the first user under the condition that the third authorization protocol in the login authorization protocol is not included in the authorized protocol list;
a second processing module for allowing the first user to log in to the first application in response to a second input by the first user authorizing the third protocol.
In some embodiments, the provider of the application may cooperate with a third party, the third party providing services for the user through some functions in the application, the third party may need to acquire personal information of the user when the user uses the functions, the provider of the application needs to transmit the personal information of the user to the third party, and in order to be able to legally transmit the personal information of the user to the third party, the apparatus may further include:
a third obtaining module, configured to, after allowing the first user to log in the first application program in response to a second input that the first user authorizes the third protocol, obtain, in response to a second access request of the first user to a second resource of the first application program, a fourth authorization protocol corresponding to the second resource and an authorized protocol list of the first user, where the fourth authorization protocol includes at least one protocol that the user must obtain authorization when providing the second resource to the user, the second resource is a resource provided by a third party, and the third party is not a provider of the first application program;
a third determining module, configured to determine whether a fourth authorized protocol is included in the authorized protocol list;
a third sending module, configured to send a third authorization request for a fifth authorization protocol to the first user when the fifth authorization protocol in the fourth authorization protocol is not included in the authorized protocol list;
a third processing module to allow the first user to access the second resource in response to a third input by the first user authorizing the fifth authorization protocol.
In some embodiments, as the application program is upgraded or the laws and regulations related to personal information protection are changed, the content of the authorization protocol also needs to be modified, and in the prior art, modifying the content of the authorization protocol needs to be redeveloped by a developer, which is time-consuming and labor-consuming, and in order to modify the content of the authorization protocol more flexibly, the device may further include:
a first display module for displaying protocol contents of a second authorization protocol in response to a fourth input of the second user for the second authorization protocol after the first user is allowed to access the first resource in response to a first input of the first user authorizing the second authorization protocol;
and the fourth determining module is used for responding to a fifth input of the second user for modifying the protocol content and determining a modified sixth authorization protocol.
In some embodiments, after the modification of the authorization protocol, the provider of the application may need to obtain more personal information of the user, and in order to ensure that the personal information of the user is obtained legally, the apparatus may further include:
the fourth obtaining module is used for responding to a third access request of the first user to the first resource after receiving a fifth input of the second user for modifying the protocol content and determining a modified sixth authorization protocol, and obtaining the sixth authorization protocol;
the second display module is used for displaying the sixth authorization protocol so as to remind the first user of authorizing the sixth authorization protocol;
a fourth processing module to allow the first user to access the first resource in response to a sixth input by the first user authorizing a sixth authorization protocol.
In some embodiments, the user may be prudent in authorizing the personal information, and to enhance the user experience, the apparatus may further comprise:
a fifth obtaining module, configured to obtain an authorization period of the second authorization protocol after allowing the first user to access the first resource in response to the first input of the first user authorizing the second authorization protocol;
and the reminding module is used for periodically reminding the first user of authorizing the second authorization protocol according to the authorization period.
Fig. 5 shows a schematic structural diagram of an electronic device according to an embodiment of the present application.
As shown in fig. 5, the electronic device 5 is capable of implementing a structure diagram of an exemplary hardware architecture of an electronic device according to the resource access processing method and the resource access processing apparatus in the embodiment of the present application.
The electronic device may refer to an electronic device in the embodiments of the present application.
The electronic device 5 may comprise a processor 501 and a memory 402 storing computer program instructions.
Specifically, the processor 501 may include a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 502 may include mass storage for data or instructions. By way of example, and not limitation, memory 502 may include a Hard Disk Drive (HDD), a floppy Disk Drive, flash memory, an optical Disk, a magneto-optical Disk, tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 502 may include removable or non-removable (or fixed) media, where appropriate. The memory 502 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In a particular embodiment, the memory 502 is non-volatile solid-state memory. In particular embodiments, memory 502 may include Read Only Memory (ROM), Random Access Memory (RAM), magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible memory storage devices. Thus, in general, the memory 502 comprises one or more tangible (non-transitory) computer-readable storage media (e.g., a memory device) encoded with software comprising computer-executable instructions and when the software is executed (e.g., by one or more processors), it is operable to perform operations described with reference to the methods according to an aspect of the present application.
The processor 501 reads and executes the computer program instructions stored in the memory 502 to implement any one of the resource access processing methods in the above embodiments.
In one example, the electronic device can also include a communication interface 503 and a bus 504. As shown in fig. 5, the processor 501, the memory 502, and the communication interface 503 are connected via a bus 504 to complete communication therebetween.
The communication interface 503 is mainly used for implementing communication between modules, apparatuses, units and/or devices in the embodiments of the present application.
The bus 504 includes hardware, software, or both to couple the components of the electronic device to one another. By way of example, and not limitation, a bus may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a Hypertransport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a Micro Channel Architecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus or a combination of two or more of these. Bus 504 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the application, any suitable buses or interconnects are contemplated by the application.
The electronic device may execute the resource access processing method in this embodiment, so as to implement the resource access processing method and apparatus described in conjunction with fig. 1 to fig. 3.
In addition, in combination with the resource access processing method in the foregoing embodiments, the embodiments of the present application may provide a computer storage medium to implement. The computer storage medium having computer program instructions stored thereon; the computer program instructions, when executed by a processor, implement any of the resource access processing methods in the above embodiments.
It is to be understood that the present application is not limited to the particular arrangements and instrumentality described above and shown in the attached drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications and additions, or change the order between the steps, after comprehending the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include electronic circuits, semiconductor memory devices, ROM, flash memory, Erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, Radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
Aspects of the present application are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, enable the implementation of the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based computer instructions which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As described above, only the specific embodiments of the present application are provided, and it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, and these modifications or substitutions should be covered within the scope of the present application.

Claims (10)

1. A resource access processing method, comprising:
responding to a first access request of a first user to a first resource of a first application program, and acquiring a first authorization protocol corresponding to the first resource and an authorized protocol list of the first user, wherein the first authorization protocol comprises at least one protocol which is required to obtain user authorization when the first resource is provided for the user;
determining whether the first authorized protocol is included in the list of authorized protocols;
sending a first authorization request for a second authorization protocol of the first authorization protocols to the first user if the second authorization protocol is not included in the list of authorized protocols;
allowing the first user to access the first resource in response to a first input by the first user authorizing the second authorization protocol.
2. The method of claim 1, wherein before the obtaining a first authorized protocol corresponding to the first resource and the list of authorized protocols of the first user in response to the first user's first access request to the first resource of the first application, the method further comprises:
responding to a login request of a first user for logging in the first application program, and acquiring a login authorization protocol corresponding to the first application program and an authorized protocol list of the first user, wherein the login authorization protocol comprises at least one protocol which allows the user to obtain user authorization when the user logs in the first application program;
determining whether the login authorization protocol is included in the authorized protocol list;
sending a second authorization request for a third authorization protocol of the login authorization protocols to the first user if the third authorization protocol is not included in the authorized protocol list;
allowing the first user to log into the first application in response to the first user authorizing a second input of the third protocol.
3. The method of claim 2, wherein after the allowing the first user to login to the first application in response to the first user authorizing the second input of the third protocol, the method further comprises:
responding to a second access request of a first user to a second resource of a first application program, and acquiring a fourth authorization protocol corresponding to the second resource and an authorized protocol list of the first user, wherein the fourth authorization protocol comprises at least one protocol which is required to acquire user authorization when the second resource is provided for the user, the second resource is provided by a third party, and the third party is not a provider of the first application program;
determining whether the fourth authorized protocol is included in the list of authorized protocols;
sending a third authorization request for a fifth authorization protocol of the fourth authorization protocols to the first user if the fifth authorization protocol is not included in the authorized protocol list;
allowing the first user to access the second resource in response to a third input by the first user authorizing the fifth authorization protocol.
4. The method of claim 1, wherein after the allowing the first user to access the first resource in response to the first user authorizing the first input of the second authorization protocol, the method further comprises:
in response to a fourth input of a second user for a second authorization protocol, displaying protocol content of the second authorization protocol;
determining a modified sixth authorized protocol in response to a fifth input by the second user to modify the protocol content.
5. The method of claim 4, wherein after said receiving a fifth input by said second user to modify said protocol content, determining a modified sixth authorized protocol, said method further comprises:
responding to a third access request of the first user to the first resource, and acquiring a sixth authorization protocol;
displaying the sixth authorization protocol to remind the first user to authorize the sixth authorization protocol;
allowing the first user to access the first resource in response to a sixth input by the first user authorizing the sixth authorization protocol.
6. The method of claim 1, wherein after the allowing the first user to access the first resource in response to the first user authorizing the first input of the second authorization protocol, the method further comprises:
acquiring an authorization period of the second authorization protocol;
and periodically reminding the first user of authorizing the second authorization protocol according to the authorization period.
7. An apparatus for processing resource access, the apparatus comprising:
the first obtaining module is used for responding to a first access request of a first user to a first resource of a first application program, and obtaining a first authorization protocol corresponding to the first resource and an authorized protocol list of the first user, wherein the first authorization protocol comprises at least one protocol which is required to obtain user authorization when the first resource is provided for the user;
a first determining module, configured to determine whether the first authorized protocol is included in the authorized protocol list;
a first sending module, configured to send a first authorization request for a second authorization protocol of the first authorization protocols to the first user if the authorized protocol list does not include the second authorization protocol;
a first processing module to allow the first user to access the first resource in response to a first input by the first user authorizing the second authorization protocol.
8. An electronic device, characterized in that the device comprises: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the resource access processing method of any of claims 1-6.
9. A computer storage medium having computer program instructions stored thereon which, when executed by a processor, implement the resource access processing method of any one of claims 1 to 6.
10. A computer program product, wherein instructions in the computer program product, when executed by a processor of an electronic device, cause the electronic device to perform the method of resource access handling according to any one of claims 1 to 6.
CN202210324652.5A 2022-03-30 2022-03-30 Resource access processing method, device, equipment, medium and product Pending CN114676459A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210324652.5A CN114676459A (en) 2022-03-30 2022-03-30 Resource access processing method, device, equipment, medium and product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210324652.5A CN114676459A (en) 2022-03-30 2022-03-30 Resource access processing method, device, equipment, medium and product

Publications (1)

Publication Number Publication Date
CN114676459A true CN114676459A (en) 2022-06-28

Family

ID=82076169

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210324652.5A Pending CN114676459A (en) 2022-03-30 2022-03-30 Resource access processing method, device, equipment, medium and product

Country Status (1)

Country Link
CN (1) CN114676459A (en)

Similar Documents

Publication Publication Date Title
CN101513008B (en) System for implementing safety of telecommunication terminal
US11429565B2 (en) Terms of service platform using blockchain
CN101164333A (en) Application identity and rating service
US7340773B2 (en) Multi-stage authorisation system
CN112801655A (en) Payment card migration method and device, electronic equipment, server and medium
CN113852639A (en) Data processing method and device, electronic equipment and computer readable storage medium
CN108965108B (en) Message pushing method and related equipment
CN109858235B (en) Portable equipment and password obtaining method and device thereof
CN114676459A (en) Resource access processing method, device, equipment, medium and product
CN115829572A (en) Cross-chain data interaction method, device, equipment, medium and product
CN116069751A (en) Information processing method, apparatus, device and computer readable storage medium
CN115858320A (en) Operation log recording method, apparatus, medium and product
CN115905145A (en) File processing method, device, equipment and computer storage medium
CN110968632B (en) Method and system for unified data exchange
CN112636954B (en) Server upgrading method and device
WO2020228564A1 (en) Application service method and device
CN114691742A (en) Information processing method, device, equipment and medium
CN114677211A (en) Credit parameter updating method, apparatus, electronic device, medium, and program product
CN112383411A (en) Network security early warning notification method, electronic device and storage medium
CN111277638A (en) Control method and server
CN114186221A (en) Privacy block information management method and system based on block chain APP
CN115967522A (en) Data processing method, device, equipment and storage medium
CN117993852A (en) Data processing method, apparatus, device, computer storage medium, and program product
CN116245525A (en) Transaction data processing method, device and equipment of blockchain and storage medium
CN115114601A (en) Authentication method, system, equipment and computer readable storage medium for data center station

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination